diff options
author | Guillaume Girol <symphorien+git@xlumurb.eu> | 2023-01-21 12:00:00 +0000 |
---|---|---|
committer | Guillaume Girol <symphorien+git@xlumurb.eu> | 2023-01-21 12:00:00 +0000 |
commit | 33afbf39f6f2a6b37e99f070ba7d17a28c416d02 (patch) | |
tree | 6431c14751da2ff638abc06b1c8e11f99315f2c3 /pkgs/tools/security | |
parent | 25193e2732e178f701f517ca15ff802f03b29933 (diff) | |
download | nixlib-33afbf39f6f2a6b37e99f070ba7d17a28c416d02.tar nixlib-33afbf39f6f2a6b37e99f070ba7d17a28c416d02.tar.gz nixlib-33afbf39f6f2a6b37e99f070ba7d17a28c416d02.tar.bz2 nixlib-33afbf39f6f2a6b37e99f070ba7d17a28c416d02.tar.lz nixlib-33afbf39f6f2a6b37e99f070ba7d17a28c416d02.tar.xz nixlib-33afbf39f6f2a6b37e99f070ba7d17a28c416d02.tar.zst nixlib-33afbf39f6f2a6b37e99f070ba7d17a28c416d02.zip |
treewide: switch to nativeCheckInputs
checkInputs used to be added to nativeBuildInputs. Now we have nativeCheckInputs to do that instead. Doing this treewide change allows to keep hashes identical to before the introduction of nativeCheckInputs.
Diffstat (limited to 'pkgs/tools/security')
50 files changed, 51 insertions, 51 deletions
diff --git a/pkgs/tools/security/aflplusplus/default.nix b/pkgs/tools/security/aflplusplus/default.nix index 79a0779e60a1..c25db9e2d398 100644 --- a/pkgs/tools/security/aflplusplus/default.nix +++ b/pkgs/tools/security/aflplusplus/default.nix @@ -105,7 +105,7 @@ let wrapPythonProgramsIn $out/bin ${python.pkgs.pefile} ''; - installCheckInputs = [ perl file ]; + nativeInstallCheckInputs = [ perl file ]; doInstallCheck = true; installCheckPhase = '' # replace references to tools in build directory with references to installed locations diff --git a/pkgs/tools/security/amoco/default.nix b/pkgs/tools/security/amoco/default.nix index 88f614e4c906..a9c182ca4cbc 100644 --- a/pkgs/tools/security/amoco/default.nix +++ b/pkgs/tools/security/amoco/default.nix @@ -40,7 +40,7 @@ python3.pkgs.buildPythonApplication rec { ]; }; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/atomic-operator/default.nix b/pkgs/tools/security/atomic-operator/default.nix index b385cce38061..6db7f0ecdd08 100644 --- a/pkgs/tools/security/atomic-operator/default.nix +++ b/pkgs/tools/security/atomic-operator/default.nix @@ -35,7 +35,7 @@ python3.pkgs.buildPythonApplication rec { urllib3 ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/boofuzz/default.nix b/pkgs/tools/security/boofuzz/default.nix index 220a372b2e9e..dc0179fa35e5 100644 --- a/pkgs/tools/security/boofuzz/default.nix +++ b/pkgs/tools/security/boofuzz/default.nix @@ -29,7 +29,7 @@ python3.pkgs.buildPythonApplication rec { tornado ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ mock netifaces pytest-bdd diff --git a/pkgs/tools/security/cfripper/default.nix b/pkgs/tools/security/cfripper/default.nix index 89a0188b0dcf..da6c865dac60 100644 --- a/pkgs/tools/security/cfripper/default.nix +++ b/pkgs/tools/security/cfripper/default.nix @@ -25,7 +25,7 @@ python3.pkgs.buildPythonApplication rec { setuptools ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ moto pytestCheckHook ]; diff --git a/pkgs/tools/security/chipsec/default.nix b/pkgs/tools/security/chipsec/default.nix index 64a4946136f0..edb10f384bdf 100644 --- a/pkgs/tools/security/chipsec/default.nix +++ b/pkgs/tools/security/chipsec/default.nix @@ -30,7 +30,7 @@ python3.pkgs.buildPythonApplication rec { nasm ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ distro pytestCheckHook ]; diff --git a/pkgs/tools/security/clairvoyance/default.nix b/pkgs/tools/security/clairvoyance/default.nix index fd7942bdd5d3..2ffc101eb983 100644 --- a/pkgs/tools/security/clairvoyance/default.nix +++ b/pkgs/tools/security/clairvoyance/default.nix @@ -23,7 +23,7 @@ python3.pkgs.buildPythonApplication rec { aiohttp ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ aiounittest pytestCheckHook ]; diff --git a/pkgs/tools/security/credslayer/default.nix b/pkgs/tools/security/credslayer/default.nix index 67b0844f3614..c8e403f3b9e5 100644 --- a/pkgs/tools/security/credslayer/default.nix +++ b/pkgs/tools/security/credslayer/default.nix @@ -20,7 +20,7 @@ python3.pkgs.buildPythonApplication rec { pyshark ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ wireshark-cli pytestCheckHook ]; diff --git a/pkgs/tools/security/cve-bin-tool/default.nix b/pkgs/tools/security/cve-bin-tool/default.nix index d36c706e444f..92405c20bb87 100644 --- a/pkgs/tools/security/cve-bin-tool/default.nix +++ b/pkgs/tools/security/cve-bin-tool/default.nix @@ -65,7 +65,7 @@ buildPythonApplication rec { packaging ]; - checkInputs = [ + nativeCheckInputs = [ pytestCheckHook ]; diff --git a/pkgs/tools/security/faraday-agent-dispatcher/default.nix b/pkgs/tools/security/faraday-agent-dispatcher/default.nix index 7b571380b319..dc05255bc7ed 100644 --- a/pkgs/tools/security/faraday-agent-dispatcher/default.nix +++ b/pkgs/tools/security/faraday-agent-dispatcher/default.nix @@ -34,7 +34,7 @@ python3.pkgs.buildPythonApplication rec { websockets ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest-asyncio pytestCheckHook ]; diff --git a/pkgs/tools/security/flare-floss/default.nix b/pkgs/tools/security/flare-floss/default.nix index 6416adec0ece..c301a90a5567 100644 --- a/pkgs/tools/security/flare-floss/default.nix +++ b/pkgs/tools/security/flare-floss/default.nix @@ -55,7 +55,7 @@ py.pkgs.buildPythonPackage rec { vivisect ] ++ viv-utils.optional-dependencies.flirt; - checkInputs = with py.pkgs; [ + nativeCheckInputs = with py.pkgs; [ pytest-sugar pytestCheckHook pyyaml diff --git a/pkgs/tools/security/fprintd/default.nix b/pkgs/tools/security/fprintd/default.nix index 125cab6b3fd0..76b71e24aca6 100644 --- a/pkgs/tools/security/fprintd/default.nix +++ b/pkgs/tools/security/fprintd/default.nix @@ -67,7 +67,7 @@ stdenv.mkDerivation rec { libfprint ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ gobject-introspection # for setup hook python-dbusmock dbus-python diff --git a/pkgs/tools/security/gallia/default.nix b/pkgs/tools/security/gallia/default.nix index 785f6aae9fff..0f5051db0a4d 100644 --- a/pkgs/tools/security/gallia/default.nix +++ b/pkgs/tools/security/gallia/default.nix @@ -35,7 +35,7 @@ python3.pkgs.buildPythonApplication rec { zstandard ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/gitjacker/default.nix b/pkgs/tools/security/gitjacker/default.nix index 14d9ab9ccfa2..05bdb2b17339 100644 --- a/pkgs/tools/security/gitjacker/default.nix +++ b/pkgs/tools/security/gitjacker/default.nix @@ -20,7 +20,7 @@ buildGoModule rec { propagatedBuildInputs = [ git ]; - checkInputs = [ git ]; + nativeCheckInputs = [ git ]; doCheck = !stdenv.isDarwin; diff --git a/pkgs/tools/security/graphinder/default.nix b/pkgs/tools/security/graphinder/default.nix index ce9ccc7079ca..f0256dff7cbe 100644 --- a/pkgs/tools/security/graphinder/default.nix +++ b/pkgs/tools/security/graphinder/default.nix @@ -26,7 +26,7 @@ python3.pkgs.buildPythonApplication rec { setuptools ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest-asyncio pytest-mock pytestCheckHook diff --git a/pkgs/tools/security/grype/default.nix b/pkgs/tools/security/grype/default.nix index 862cde157a2f..f745a2374ff3 100644 --- a/pkgs/tools/security/grype/default.nix +++ b/pkgs/tools/security/grype/default.nix @@ -55,7 +55,7 @@ buildGoModule rec { ldflags+=" -X github.com/anchore/grype/internal/version.buildDate=$(cat SOURCE_DATE_EPOCH)" ''; - checkInputs = [ openssl ]; + nativeCheckInputs = [ openssl ]; preCheck = '' # test all dirs (except excluded) unset subPackages diff --git a/pkgs/tools/security/ioccheck/default.nix b/pkgs/tools/security/ioccheck/default.nix index fb5c887a8bf9..be50d6483228 100644 --- a/pkgs/tools/security/ioccheck/default.nix +++ b/pkgs/tools/security/ioccheck/default.nix @@ -66,7 +66,7 @@ buildPythonApplication rec { vt-py ]; - checkInputs = with py.pkgs; [ + nativeCheckInputs = with py.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/kube-hunter/default.nix b/pkgs/tools/security/kube-hunter/default.nix index e082b3d217e8..823f3db9b432 100644 --- a/pkgs/tools/security/kube-hunter/default.nix +++ b/pkgs/tools/security/kube-hunter/default.nix @@ -31,7 +31,7 @@ python3.pkgs.buildPythonApplication rec { kubernetes ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook requests-mock ]; diff --git a/pkgs/tools/security/lesspass-cli/default.nix b/pkgs/tools/security/lesspass-cli/default.nix index ce64b6847fe2..a7b266c34ece 100644 --- a/pkgs/tools/security/lesspass-cli/default.nix +++ b/pkgs/tools/security/lesspass-cli/default.nix @@ -24,7 +24,7 @@ buildPythonApplication rec { done ''; - checkInputs = [ pytest mock pexpect ]; + nativeCheckInputs = [ pytest mock pexpect ]; checkPhase = '' mv lesspass lesspass.hidden # ensure we're testing against *installed* package pytest tests diff --git a/pkgs/tools/security/log4j-sniffer/default.nix b/pkgs/tools/security/log4j-sniffer/default.nix index d894e39d7faa..72cf2fb851b3 100644 --- a/pkgs/tools/security/log4j-sniffer/default.nix +++ b/pkgs/tools/security/log4j-sniffer/default.nix @@ -17,7 +17,7 @@ buildGoModule rec { vendorSha256 = null; - checkInputs = [ + nativeCheckInputs = [ git ]; diff --git a/pkgs/tools/security/log4shell-detector/default.nix b/pkgs/tools/security/log4shell-detector/default.nix index 6c51c5bcd6e9..76fc65728438 100644 --- a/pkgs/tools/security/log4shell-detector/default.nix +++ b/pkgs/tools/security/log4shell-detector/default.nix @@ -19,7 +19,7 @@ python3.pkgs.buildPythonApplication rec { zstandard ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/maigret/default.nix b/pkgs/tools/security/maigret/default.nix index 0b9b37225016..a8d7f4c6b532 100644 --- a/pkgs/tools/security/maigret/default.nix +++ b/pkgs/tools/security/maigret/default.nix @@ -57,7 +57,7 @@ python3.pkgs.buildPythonApplication rec { yarl ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest-httpserver pytest-asyncio pytestCheckHook diff --git a/pkgs/tools/security/modsecurity/default.nix b/pkgs/tools/security/modsecurity/default.nix index be9b2f8c28d2..0d3b28716712 100644 --- a/pkgs/tools/security/modsecurity/default.nix +++ b/pkgs/tools/security/modsecurity/default.nix @@ -42,7 +42,7 @@ stdenv.mkDerivation rec { patches = [ ./Makefile.am.patch ]; doCheck = true; - checkInputs = [ perl ]; + nativeCheckInputs = [ perl ]; postInstall = '' mkdir -p $nginx diff --git a/pkgs/tools/security/mongoaudit/default.nix b/pkgs/tools/security/mongoaudit/default.nix index 4c15d1cfe948..3ba19256ec34 100644 --- a/pkgs/tools/security/mongoaudit/default.nix +++ b/pkgs/tools/security/mongoaudit/default.nix @@ -22,7 +22,7 @@ python3.pkgs.buildPythonApplication rec { urwid ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/offensive-azure/default.nix b/pkgs/tools/security/offensive-azure/default.nix index 78d254fbbca0..fb5dce6798dc 100644 --- a/pkgs/tools/security/offensive-azure/default.nix +++ b/pkgs/tools/security/offensive-azure/default.nix @@ -31,7 +31,7 @@ python3.pkgs.buildPythonApplication rec { requests ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/pass/default.nix b/pkgs/tools/security/pass/default.nix index afb6d2e0dc31..c856c020d696 100644 --- a/pkgs/tools/security/pass/default.nix +++ b/pkgs/tools/security/pass/default.nix @@ -145,7 +145,7 @@ stdenv.mkDerivation rec { doCheck = false; doInstallCheck = true; - installCheckInputs = [ git ]; + nativeInstallCheckInputs = [ git ]; installCheckTarget = "test"; passthru = { diff --git a/pkgs/tools/security/pass/extensions/audit/default.nix b/pkgs/tools/security/pass/extensions/audit/default.nix index c4c16b8ff848..c9bbabd5fb2f 100644 --- a/pkgs/tools/security/pass/extensions/audit/default.nix +++ b/pkgs/tools/security/pass/extensions/audit/default.nix @@ -33,7 +33,7 @@ in stdenv.mkDerivation rec { # Tests freeze on darwin with: pass-audit-1.1 (checkPhase): EOFError doCheck = !stdenv.isDarwin; - checkInputs = [ pythonPackages.green pass gnupg ]; + nativeCheckInputs = [ pythonPackages.green pass gnupg ]; checkPhase = '' ${pythonEnv}/bin/python3 setup.py green -q ''; diff --git a/pkgs/tools/security/pass/extensions/import.nix b/pkgs/tools/security/pass/extensions/import.nix index d543ef9b2575..ad2d2a7156ae 100644 --- a/pkgs/tools/security/pass/extensions/import.nix +++ b/pkgs/tools/security/pass/extensions/import.nix @@ -35,7 +35,7 @@ python3Packages.buildPythonApplication rec { secretstorage ]; - checkInputs = [ + nativeCheckInputs = [ gnupg pass python3Packages.pytestCheckHook diff --git a/pkgs/tools/security/radamsa/default.nix b/pkgs/tools/security/radamsa/default.nix index c8b084e1e312..ebcd2a42191d 100644 --- a/pkgs/tools/security/radamsa/default.nix +++ b/pkgs/tools/security/radamsa/default.nix @@ -30,7 +30,7 @@ stdenv.mkDerivation rec { makeFlags = [ "PREFIX=${placeholder "out"}" "BINDIR=" ]; - checkInputs = [ bash ]; + nativeCheckInputs = [ bash ]; doCheck = true; meta = { diff --git a/pkgs/tools/security/regexploit/default.nix b/pkgs/tools/security/regexploit/default.nix index be09c34254bb..b921cbcc3b3c 100644 --- a/pkgs/tools/security/regexploit/default.nix +++ b/pkgs/tools/security/regexploit/default.nix @@ -20,7 +20,7 @@ python3.pkgs.buildPythonApplication rec { pyyaml ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/rng-tools/default.nix b/pkgs/tools/security/rng-tools/default.nix index 0795f8433720..d4fb4676e4ae 100644 --- a/pkgs/tools/security/rng-tools/default.nix +++ b/pkgs/tools/security/rng-tools/default.nix @@ -52,7 +52,7 @@ stdenv.mkDerivation rec { doCheck = true; preCheck = "patchShebangs tests/*.sh"; - checkInputs = [ psmisc ]; # rngtestjitter.sh needs killall + nativeCheckInputs = [ psmisc ]; # rngtestjitter.sh needs killall doInstallCheck = true; installCheckPhase = '' diff --git a/pkgs/tools/security/rnp/default.nix b/pkgs/tools/security/rnp/default.nix index 7d96c4f60e26..e7cb9d763779 100644 --- a/pkgs/tools/security/rnp/default.nix +++ b/pkgs/tools/security/rnp/default.nix @@ -36,9 +36,9 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ asciidoctor cmake gnupg gtest pkg-config python3 ]; - # NOTE: check-only inputs should ideally be moved to checkInputs, but it + # NOTE: check-only inputs should ideally be moved to nativeCheckInputs, but it # would fail during buildPhase. - # checkInputs = [ gtest python3 ]; + # nativeCheckInputs = [ gtest python3 ]; outputs = [ "out" "lib" "dev" ]; diff --git a/pkgs/tools/security/routersploit/default.nix b/pkgs/tools/security/routersploit/default.nix index e2a511c811b1..e147e8feac0b 100644 --- a/pkgs/tools/security/routersploit/default.nix +++ b/pkgs/tools/security/routersploit/default.nix @@ -24,7 +24,7 @@ python3.pkgs.buildPythonApplication rec { setuptools ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest-xdist pytestCheckHook threat9-test-bed diff --git a/pkgs/tools/security/rustscan/default.nix b/pkgs/tools/security/rustscan/default.nix index 849a921898a7..099e685fec03 100644 --- a/pkgs/tools/security/rustscan/default.nix +++ b/pkgs/tools/security/rustscan/default.nix @@ -19,7 +19,7 @@ rustPlatform.buildRustPackage rec { buildInputs = lib.optional stdenv.isDarwin Security; - checkInputs = [ perl python3 ]; + nativeCheckInputs = [ perl python3 ]; # these tests require network access checkFlags = [ diff --git a/pkgs/tools/security/scrypt/default.nix b/pkgs/tools/security/scrypt/default.nix index 5a3ab9cb68b4..aad2873d4aca 100644 --- a/pkgs/tools/security/scrypt/default.nix +++ b/pkgs/tools/security/scrypt/default.nix @@ -33,7 +33,7 @@ stdenv.mkDerivation rec { doCheck = true; checkTarget = "test"; - checkInputs = lib.optionals stdenv.isLinux [ util-linux ]; + nativeCheckInputs = lib.optionals stdenv.isLinux [ util-linux ]; meta = with lib; { description = "Encryption utility"; diff --git a/pkgs/tools/security/semgrep/default.nix b/pkgs/tools/security/semgrep/default.nix index c97d877b483e..8a2b8f0273ff 100644 --- a/pkgs/tools/security/semgrep/default.nix +++ b/pkgs/tools/security/semgrep/default.nix @@ -64,7 +64,7 @@ buildPythonApplication rec { ]; doCheck = true; - checkInputs = [ git pytestCheckHook ] ++ (with pythonPackages; [ + nativeCheckInputs = [ git pytestCheckHook ] ++ (with pythonPackages; [ pytest-snapshot pytest-mock pytest-freezegun diff --git a/pkgs/tools/security/sequoia/default.nix b/pkgs/tools/security/sequoia/default.nix index edeaec56daf2..f7f63f126bed 100644 --- a/pkgs/tools/security/sequoia/default.nix +++ b/pkgs/tools/security/sequoia/default.nix @@ -58,7 +58,7 @@ rustPlatform.buildRustPackage rec { lib.optionals pythonSupport [ pythonPackages.setuptools ] ; - checkInputs = lib.optionals pythonSupport [ + nativeCheckInputs = lib.optionals pythonSupport [ pythonPackages.pytest pythonPackages.pytest-runner ]; diff --git a/pkgs/tools/security/sigma-cli/default.nix b/pkgs/tools/security/sigma-cli/default.nix index c0a21ef5440a..d039234f37c9 100644 --- a/pkgs/tools/security/sigma-cli/default.nix +++ b/pkgs/tools/security/sigma-cli/default.nix @@ -33,7 +33,7 @@ python3.pkgs.buildPythonApplication rec { pysigma-pipeline-windows ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/snallygaster/default.nix b/pkgs/tools/security/snallygaster/default.nix index e469e4b004e6..2f7f5d12192a 100644 --- a/pkgs/tools/security/snallygaster/default.nix +++ b/pkgs/tools/security/snallygaster/default.nix @@ -20,7 +20,7 @@ python3Packages.buildPythonApplication rec { dnspython ]; - checkInputs = with python3Packages; [ + nativeCheckInputs = with python3Packages; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/ssh-audit/default.nix b/pkgs/tools/security/ssh-audit/default.nix index 34d39390b438..8a2ad022cef1 100644 --- a/pkgs/tools/security/ssh-audit/default.nix +++ b/pkgs/tools/security/ssh-audit/default.nix @@ -11,7 +11,7 @@ python3Packages.buildPythonApplication rec { sha256 = "0ks1zr0ksma285sm2dyy0nsbrkpssdk4mdzc3srr4mcyd6v927jd"; }; - checkInputs = with python3Packages; [ + nativeCheckInputs = with python3Packages; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/ssh-to-pgp/default.nix b/pkgs/tools/security/ssh-to-pgp/default.nix index fc07714b55b0..1d364fb0ad71 100644 --- a/pkgs/tools/security/ssh-to-pgp/default.nix +++ b/pkgs/tools/security/ssh-to-pgp/default.nix @@ -13,7 +13,7 @@ buildGoModule rec { vendorSha256 = "sha256-OMWiJ1n8ynvIGcmotjuGGsRuAidYgVo5Y5JjrAw8fpc="; - checkInputs = [ gnupg ]; + nativeCheckInputs = [ gnupg ]; checkPhase = '' HOME=$TMPDIR go test . ''; diff --git a/pkgs/tools/security/sshuttle/default.nix b/pkgs/tools/security/sshuttle/default.nix index 686e9eeffc69..f109886c9ca8 100644 --- a/pkgs/tools/security/sshuttle/default.nix +++ b/pkgs/tools/security/sshuttle/default.nix @@ -27,7 +27,7 @@ python3Packages.buildPythonApplication rec { nativeBuildInputs = [ makeWrapper python3Packages.setuptools-scm ]; - checkInputs = with python3Packages; [ pytestCheckHook ]; + nativeCheckInputs = with python3Packages; [ pytestCheckHook ]; postInstall = '' wrapProgram $out/bin/sshuttle \ diff --git a/pkgs/tools/security/stacs/default.nix b/pkgs/tools/security/stacs/default.nix index 352c217b76a4..672cd082849c 100644 --- a/pkgs/tools/security/stacs/default.nix +++ b/pkgs/tools/security/stacs/default.nix @@ -25,7 +25,7 @@ python3.pkgs.buildPythonApplication rec { yara-python ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/swtpm/default.nix b/pkgs/tools/security/swtpm/default.nix index 635fccc00632..e71b88c8c3b9 100644 --- a/pkgs/tools/security/swtpm/default.nix +++ b/pkgs/tools/security/swtpm/default.nix @@ -32,7 +32,7 @@ stdenv.mkDerivation rec { autoreconfHook ]; - checkInputs = [ + nativeCheckInputs = [ which ]; diff --git a/pkgs/tools/security/theharvester/default.nix b/pkgs/tools/security/theharvester/default.nix index a78d9a23c187..b267cab354a0 100644 --- a/pkgs/tools/security/theharvester/default.nix +++ b/pkgs/tools/security/theharvester/default.nix @@ -40,7 +40,7 @@ python3.pkgs.buildPythonApplication rec { uvloop ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest pytest-asyncio ]; diff --git a/pkgs/tools/security/tpm2-abrmd/default.nix b/pkgs/tools/security/tpm2-abrmd/default.nix index b3efb6c542e9..cd3504b45f4c 100644 --- a/pkgs/tools/security/tpm2-abrmd/default.nix +++ b/pkgs/tools/security/tpm2-abrmd/default.nix @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ pkg-config makeWrapper autoreconfHook autoconf-archive which ]; buildInputs = [ tpm2-tss glib dbus ]; - checkInputs = [ cmocka ]; + nativeCheckInputs = [ cmocka ]; enableParallelBuilding = true; diff --git a/pkgs/tools/security/uddup/default.nix b/pkgs/tools/security/uddup/default.nix index 5cde218bacfe..3516b4dcff8d 100644 --- a/pkgs/tools/security/uddup/default.nix +++ b/pkgs/tools/security/uddup/default.nix @@ -19,7 +19,7 @@ python3.pkgs.buildPythonApplication rec { colorama ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/vulnix/default.nix b/pkgs/tools/security/vulnix/default.nix index c3eb53c3b207..a698a0a1527e 100644 --- a/pkgs/tools/security/vulnix/default.nix +++ b/pkgs/tools/security/vulnix/default.nix @@ -21,7 +21,7 @@ python3Packages.buildPythonApplication rec { outputs = [ "out" "doc" "man" ]; nativeBuildInputs = [ ronn ]; - checkInputs = with python3Packages; [ + nativeCheckInputs = with python3Packages; [ freezegun pytest pytest-cov diff --git a/pkgs/tools/security/wad/default.nix b/pkgs/tools/security/wad/default.nix index 9b284a42a018..5dc81a7f56df 100644 --- a/pkgs/tools/security/wad/default.nix +++ b/pkgs/tools/security/wad/default.nix @@ -19,7 +19,7 @@ python3.pkgs.buildPythonApplication rec { six ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ mock pytestCheckHook ]; diff --git a/pkgs/tools/security/wapiti/default.nix b/pkgs/tools/security/wapiti/default.nix index 4769db4816ef..6aec3dd105f2 100644 --- a/pkgs/tools/security/wapiti/default.nix +++ b/pkgs/tools/security/wapiti/default.nix @@ -38,7 +38,7 @@ python3.pkgs.buildPythonApplication rec { ] ++ httpx.optional-dependencies.brotli ++ httpx.optional-dependencies.socks; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ respx pytest-asyncio pytestCheckHook |