aboutsummaryrefslogtreecommitdiff
;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2020, 2021 Marius Bakke <marius@gnu.org>
;;; Copyright © 2023 Nicolas Graves <ngraves@ngraves.fr>
;;; Copyright © 2023, 2024 Clément Lassieur <clement@lassieur.org>
;;;
;;; This file is part of GNU Guix.
;;;
;;; GNU Guix is free software; you can redistribute it and/or modify it
;;; under the terms of the GNU General Public License as published by
;;; the Free Software Foundation; either version 3 of the License, or (at
;;; your option) any later version.
;;;
;;; GNU Guix is distributed in the hope that it will be useful, but
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
;;; GNU General Public License for more details.
;;;
;;; You should have received a copy of the GNU General Public License
;;; along with GNU Guix.  If not, see <http://www.gnu.org/licenses/>.

(define-module (gnu packages browser-extensions)
  #:use-module (guix gexp)
  #:use-module (guix packages)
  #:use-module (guix download)
  #:use-module (guix git-download)
  #:use-module (guix build-system copy)
  #:use-module (guix build-system gnu)
  #:use-module ((guix licenses) #:prefix license:)
  #:use-module (gnu build chromium-extension)
  #:use-module (gnu build icecat-extension)
  #:use-module (gnu packages compression)
  #:use-module (gnu packages password-utils)
  #:use-module (gnu packages python))

(define adaptive-tab-bar-colour
  (package
    (name "adaptive-tab-bar-colour")
    (version "2.1.4")
    (source
     (origin
       (method git-fetch)
       (uri (git-reference
             (url "https://github.com/easonwong-de/Adaptive-Tab-Bar-Colour")
             (commit (string-append "v" version))))
       (file-name (git-file-name name version))
       (sha256
        (base32
         "03w06qrfg3bra6z7bmksj7mj27xnznn0ddm8gsr8z8b32hiifg4r"))))
    (build-system copy-build-system)
    (arguments
     (list #:install-plan
           #~'(("." #$(assq-ref (package-properties this-package) 'addon-id)))))
    (home-page "https://github.com/easonwong-de/Adaptive-Tab-Bar-Colour")
    (synopsis "Adaptive tab bar colour")
    (description
     "This package provides a browser extension for changing tab bar colour to
match website theme.")
    (license license:expat)
    (properties '((addon-id . "ATBC@EasonWong")))))

(define-public adaptive-tab-bar-colour/icecat
  (make-icecat-extension adaptive-tab-bar-colour))

(define play-to-kodi
  (package
    (name "play-to-kodi")
    (version "1.9.1")
    (home-page "https://github.com/khloke/play-to-xbmc-chrome")
    (source (origin
              (method git-fetch)
              (uri (git-reference (url home-page) (commit version)))
              (file-name (git-file-name name version))
              (sha256
               (base32
                "01rmcpbkn9vhcd8mrah2jmd2801k2r5fz7aqvp22hbwmh2z5f1ch"))))
    (build-system copy-build-system)
    (synopsis "Send website contents to Kodi")
    (description
     "Play to Kodi is a browser add-on that can send video, audio, and other
supported content to the Kodi media center.")
    (license license:expat)))

(define-public play-to-kodi/chromium
  (make-chromium-extension play-to-kodi))

(define ublock-main-assets
  ;; Arbitrary commit of branch master,
  ;; Update when updating uBlockOrigin.
  (let* ((name "ublock-main-assets")
         (commit "bfbafa49f72d078fd1126033be1d4434ca6d5009")
         (revision "2")
         (version (git-version "0" revision commit)))
    (origin
      (method git-fetch)
      (uri (git-reference
            (url "https://github.com/uBlockOrigin/uAssets")
            (commit commit)))
      (file-name (git-file-name name version))
      (sha256
       (base32 "0m7v8qjs941g2pr1b50vxa68g9psv2vvxzfz43iyfmv3gyypdh59")))))

(define ublock-prod-assets
  ;; Arbitrary commit of branch gh-pages,
  ;; Update when updating uBlockOrigin.
  (let* ((name "ublock-prod-assets")
         (commit "873eb22777b9a951e64d6453048bec9291db2ed7")
         (revision "2")
         (version (git-version "0" revision commit)))
    (origin
      (method git-fetch)
      (uri (git-reference
            (url "https://github.com/uBlockOrigin/uAssets")
            (commit commit)))
      (file-name (git-file-name name version))
      (sha256
       (base32 "1p3ajvqsvpc3nkh2zjrx6g12fbismc18d0wskva4ifl0ckx521rj")))))

(define ublock-origin
  (package
    (name "ublock-origin")
    (version "1.61.0")
    (home-page "https://github.com/gorhill/uBlock")
    (source (origin
              (method git-fetch)
              (uri (git-reference
                    (url home-page)
                    (commit version)))
              (file-name (git-file-name name version))
              (sha256
               (base32
                "0iikd3l02nd0lgns33i95fzi7xh4hwzkng5r14lk0cmmr97phn6y"))))
    (build-system gnu-build-system)
    (outputs '("xpi" "firefox" "chromium"))
    (properties '((addon-id . "uBlock0@raymondhill.net")))
    (arguments
     (list
      #:tests? #f                      ;no tests
      #:allowed-references '()
      #:phases
      #~(modify-phases (map (lambda (phase)
                              (assq phase %standard-phases))
                            '(set-paths unpack patch-source-shebangs))
          (add-after 'unpack 'do-not-depend-on-git
            (lambda _
              (mkdir-p "dist/build/uAssets/main")
              (copy-recursively #$ublock-main-assets "dist/build/uAssets/main")
              (mkdir-p "dist/build/uAssets/prod")
              (copy-recursively #$ublock-prod-assets "dist/build/uAssets/prod")))
          (add-after 'unpack 'make-files-writable
            (lambda _
              ;; The build system copies some files and later tries
              ;; modifying them.
              (for-each make-file-writable (find-files "."))))
          (add-after 'patch-source-shebangs 'build-xpi
            (lambda _
              (invoke "./tools/make-firefox.sh" "all")))
          (add-after 'build-xpi 'build-chromium
            (lambda _
              (invoke "./tools/make-chromium.sh")))
          (add-after 'build-chromium 'install
            (lambda* (#:key outputs #:allow-other-keys)
              (let* ((addon-id #$(assq-ref properties 'addon-id))
                     (firefox (in-vicinity
                               (assoc-ref outputs "firefox") addon-id))
                     (xpi (assoc-ref outputs "xpi"))
                     (chromium (assoc-ref outputs "chromium")))
                (install-file "dist/build/uBlock0.firefox.xpi"
                              (string-append xpi "/lib/mozilla/extensions"))
                (copy-recursively "dist/build/uBlock0.firefox" firefox)
                (copy-recursively "dist/build/uBlock0.chromium" chromium)))))))
    (native-inputs
     (list python-wrapper zip))
    (synopsis "Block unwanted content from web sites")
    (description
     "uBlock Origin is a @dfn{wide spectrum blocker} for IceCat and
ungoogled-chromium.")
    (license license:gpl3+)))

(define-public ublock-origin/chromium
  (make-chromium-extension ublock-origin "chromium"))

(define-public ublock-origin/icecat
  (make-icecat-extension ublock-origin "firefox"))

(define-public passff-host
  (package
    (name "passff-host")
    (version "1.2.4")
    (home-page "https://github.com/passff/passff-host")
    (source (origin
              (method git-fetch)
              (uri (git-reference (url home-page) (commit version)))
              (file-name (git-file-name name version))
              (sha256
               (base32
                "1lcwa1qzfxlifmj33qndp1wgi6yx6vj21ir0az79vhm5k03p961z"))))
    (build-system copy-build-system)
    (arguments
     (let ((native-manifests "lib/icecat/native-messaging-hosts"))
       (list
        #:install-plan
        `'(("src" ,native-manifests #:include ("passff.json" "passff.py")))
        #:phases
        #~(modify-phases %standard-phases
            (add-after 'unpack 'substitute
              (lambda _
                (substitute* "src/passff.json"
                  (("PLACEHOLDER")
                   (format #f "~a/~a/passff.py" #$output #$native-manifests)))
                (substitute* "src/passff.py"
                  (("_VERSIONHOLDER_") #$version)
                  (("^COMMAND = .*")
                   (format #f "COMMAND = \"~a/bin/pass\"~%"
                           #$(this-package-input "password-store"))))
                (patch-shebang "src/passff.py")))))))
    (inputs (list password-store python))
    (synopsis "Host app for the WebExtension PassFF")
    (description "This piece of software wraps around the zx2c4 pass shell
command.  It has to be installed for the PassFF browser extension to work
properly.")
    (license license:gpl2+)))

(define passff
  (package
    (name "passff")
    (version "1.16")
    (home-page "https://github.com/passff/passff")
    (source (origin
              (method git-fetch)
              (uri (git-reference (url home-page) (commit version)))
              (file-name (git-file-name name version))
              (sha256
               (base32
                "0y3cbgy89lgvq6lfabp7mi1zhphdvihcccn3yw5mmaql9yrdm5kc"))))
    (propagated-inputs (list passff-host))
    (build-system copy-build-system)
    (properties '((addon-id . "passff@invicem.pro")))
    (arguments
     `(#:install-plan '(("src" ,(assq-ref properties 'addon-id)))
       #:phases
       (modify-phases %standard-phases
         (add-after 'unpack 'substitute-placeholder
           (lambda _
             (substitute* "src/manifest.json"
               (("_VERSIONHOLDER_") ,version)))))))
    (synopsis "Pass management extension for Mozilla Firefox")
    (description "This extension will allow you to access your zx2c4 pass
repository directly from your web browser.  You can choose to automatically
fill and submit login forms if a matching password entry is found.")
    (license license:gpl2+)))

(define-public passff/icecat
  (make-icecat-extension passff))

(define keepassxc-browser
  (package
    (name "keepassxc-browser")
    (version "1.8.10")
    (source (origin
              (method git-fetch)
              (uri (git-reference
                    (url
                     "https://github.com/keepassxreboot/keepassxc-browser")
                    (commit version)))
              (file-name (git-file-name name version))
              (sha256
               (base32
                "1059kcb95ig18izbchwlb7pz41l4l3vjwzlmhz3w8zw2qxm6hrvx"))))
    (build-system copy-build-system)
    (properties
     '((addon-id . "keepassxc-browser@keepassxc.org")))
    (arguments
     `(#:install-plan
       '(("keepassxc-browser" ,(assq-ref properties 'addon-id)))))
    (synopsis "Browser extension for the KeePassXC password manager")
    (description
     "This package provides an extension allow the browser to work together
with the @uref{https://keepassxc.org, KeePassXC} password manager.")
    (home-page "https://keepassxc.org")
    (license license:gpl3+)))

(define-public keepassxc-browser/icecat
  (make-icecat-extension keepassxc-browser))

(define livemarks
  (package
    (name "livemarks")
    (version "3.5")
    (source (origin
              (method git-fetch)
              (uri (git-reference
                    (url "https://github.com/nt1m/livemarks")
                    (commit (string-append "v" version))))
              (file-name (git-file-name name version))
              (sha256
               (base32
                "02p2080lgnb2xy4n781ydjdywkg7g7hmz6cpnbh6icldbjy5xa5i"))))
    (build-system copy-build-system)
    (arguments
     (list #:install-plan
           #~'(("." #$(assq-ref (package-properties this-package) 'addon-id)))))
    (home-page "https://github.com/nt1m/livemarks")
    (synopsis "RSS feed bookmark folders")
    (description
     "This browser extension provides auto-updated RSS feed bookmark folders.")
    (license license:expat)
    (properties '((addon-id . "{c5867acc-54c9-4074-9574-04d8818d53e8}")))))

(define-public livemarks/icecat
  (make-icecat-extension livemarks))

(define noscript
  (package
    (name "noscript")
    (version "11.5.2")
    (source (origin
              (method url-fetch/zipbomb)
              (uri (string-append
                    "https://noscript.net/download/releases/noscript-" version
                    ".xpi"))
              (sha256
               (base32
                "0fj96c9pnjyg2dwqnnzd64vnx1inhl72c27ybm0j515zhijal2j6"))))
    (build-system copy-build-system)
    (properties '((addon-id . "{73a6fe31-595d-460b-a920-fcc0f8843232}")))
    (arguments
     `(#:install-plan '(("." ,(assq-ref properties 'addon-id)))))
    (home-page "https://noscript.net")
    (synopsis "Software providing extra protection for various browsers")
    (description "The NoScript Security Suite is a software providing extra
protection for web browsers.")
    (license license:gpl3+)))

(define-public noscript/icecat
  (make-icecat-extension noscript))

(define privacy-redirect
  (package
    (name "privacy-redirect")
    (version "1.1.49")
    (source
     (origin
       (method git-fetch)
       (uri (git-reference
             (url "https://github.com/SimonBrazell/privacy-redirect")
             (commit (string-append "v" version))))
       (file-name (git-file-name name version))
       (sha256
        (base32
         "13j5i6vh4lq9hcqmqbmn8fnymnplwra5rm696h6magbjxnj3nkyz"))))
    (build-system copy-build-system)
    (arguments
     (list
      #:install-plan
      #~'(("src" #$(assq-ref (package-properties this-package) 'addon-id)))))
    (home-page "https://github.com/SimonBrazell/privacy-redirect")
    (synopsis "Redirect to privacy friendly alternative frontends")
    (description
     "This package provides a browser extension that redirects sites to their
privacy friendly alternative frontends.  It's possible to toggle all redirects
on and off and the extension will default to using random instances if none are
selected.")
    (license license:gpl3)
    (properties '((addon-id . "{b7f9d2cd-d772-4302-8c3f-eb941af36f76}")))))

(define-public privacy-redirect/icecat
  (make-icecat-extension privacy-redirect))
target)' instead of 'gcc'" (single-lint-warning-message (check-compiler-for-target (dummy-package "x" (arguments '(#:make-flags '("CC=gcc"))))))) (test-equal "compiler-for-target: looks through G-expressions" "'CC' should be set to '(cc-for-target)' instead of 'gcc'" (single-lint-warning-message (check-compiler-for-target (dummy-package "x" (arguments '(#:make-flags #~'("CC=gcc"))))))) (test-equal "compiler-for-target: (cc-for-target) is acceptable" '() (check-compiler-for-target (dummy-package "x" (arguments (list #:make-flags #~(list (string-append "CC=" (cc-for-target)))))))) (test-equal "compiler-for-target: CC=gcc is acceptable when target=#false" '() (check-compiler-for-target ;; This (dummy) package consists purely of architecture-independent data. (dummy-package "tzdata" (arguments (list #:target #false #:make-flags #~(list "CC=gcc")))))) ;; The emacs-build-system sets #:tests? #f by default. (test-equal "tests-true: #:tests? #t acceptable for emacs packages" '() (let ((pkg (dummy-package "x" (build-system emacs-build-system) (arguments `(#:tests? #t))))) (check-tests-true pkg))) ;; Likewise, though the 'check' phase is deleted by default, ;; so #:tests? #t won't be useful by itself. (test-equal "tests-true: #:tests? #t acceptable for texlive packages" '() (let ((pkg (dummy-package "x" (build-system texlive-build-system) (arguments `(#:tests? #t))))) (check-tests-true pkg))) (test-equal "inputs: pkg-config is probably a native input" "'pkg-config' should probably be a native input" (single-lint-warning-message (let ((pkg (dummy-package "x" (inputs `(("pkg-config" ,pkg-config)))))) (check-inputs-should-be-native pkg)))) (test-equal "inputs: glib:bin is probably a native input" "'glib:bin' should probably be a native input" (single-lint-warning-message (let ((pkg (dummy-package "x" (inputs `(("glib" ,glib "bin")))))) (check-inputs-should-be-native pkg)))) (test-equal "inputs: python-setuptools should not be an input at all (input)" "'python-setuptools' should probably not be an input at all" (single-lint-warning-message (let ((pkg (dummy-package "x" (inputs `(("python-setuptools" ,python-setuptools)))))) (check-inputs-should-not-be-an-input-at-all pkg)))) (test-equal "inputs: python-setuptools should not be an input at all (native-input)" "'python-setuptools' should probably not be an input at all" (single-lint-warning-message (let ((pkg (dummy-package "x" (native-inputs `(("python-setuptools" ,python-setuptools)))))) (check-inputs-should-not-be-an-input-at-all pkg)))) (test-equal "inputs: python-setuptools should not be an input at all (propagated-input)" "'python-setuptools' should probably not be an input at all" (single-lint-warning-message (let ((pkg (dummy-package "x" (propagated-inputs `(("python-setuptools" ,python-setuptools)))))) (check-inputs-should-not-be-an-input-at-all pkg)))) (test-assert "input labels: no warnings" (let ((pkg (dummy-package "x" (inputs `(("glib" ,glib) ("pkg-config" ,pkg-config)))))) (null? (check-input-labels pkg)))) (test-equal "input labels: one warning" "label 'pkgkonfig' does not match package name 'pkg-config'" (single-lint-warning-message (let ((pkg (dummy-package "x" (inputs `(("glib" ,glib) ("pkgkonfig" ,pkg-config)))))) (check-input-labels pkg)))) (test-equal "explicit #:sh argument to 'wrap-program' is acceptable" '() (let* ((phases ;; Loosely based on the "catfish" package `(modify-phases %standard-phases (add-after 'install 'wrap (lambda* (#:key inputs outputs #:allow-other-keys) (define catfish (string-append (assoc-ref outputs "out") "/bin/catfish")) (define hsab (string-append (assoc-ref inputs "hsab") "/bin/hsab")) (wrap-program catfish #:sh hsab `("PYTHONPATH" = (,"blabla"))))))) (pkg (dummy-package "x" (arguments `(#:phases ,phases))))) (check-wrapper-inputs pkg))) (test-equal "'check-wrapper-inputs' detects 'wrap-program' without \"bash\" in inputs" "\"bash-minimal\" should be in 'inputs' when 'wrap-program' is used" (let* ((phases `(modify-phases %standard-phases (add-after 'install 'wrap (lambda _ (wrap-program the-binary bla-bla))))) (pkg (dummy-package "x" (arguments `(#:phases ,phases))))) (single-lint-warning-message (check-wrapper-inputs pkg)))) (test-equal "'check-wrapper-inputs' detects 'wrap-qt-program' without \"bash\" in inputs" "\"bash-minimal\" should be in 'inputs' when 'wrap-qt-program' is used" (let* ((phases `(modify-phases %standard-phases (add-after 'install 'qtwrap (lambda _ (wrap-qt-program the-binary bla-bla))))) (pkg (dummy-package "x" (arguments `(#:phases ,phases))))) (single-lint-warning-message (check-wrapper-inputs pkg)))) (test-equal "\"bash\" in 'inputs' satisfies 'check-wrapper-inputs'" '() (let* ((phases `(modify-phases %standard-phases (add-after 'install 'wrap (lambda _ (wrap-program the-binary bla-bla))))) (pkg (dummy-package "x" (arguments `(#:phases ,phases)) (inputs `(("bash" ,bash)))))) (check-wrapper-inputs pkg))) (test-equal "\"bash-minimal\" in 'inputs' satisfies 'check-wrapper-inputs'" '() (let* ((phases `(modify-phases %standard-phases (add-after 'install 'wrap (lambda _ (wrap-program THE-BINARY bla-bla))))) (pkg (dummy-package "x" (arguments `(#:phases ,phases)) (inputs `(("bash-minimal" ,bash-minimal)))))) (check-wrapper-inputs pkg))) (test-equal "'cut' doesn't hide bad usages of 'wrap-program'" "\"bash-minimal\" should be in 'inputs' when 'wrap-program' is used" (let* ((phases ;; Taken from the "straw-viewer" package `(modify-phases %standard-phases (add-after 'install 'wrap-program (lambda* (#:key outputs #:allow-other-keys) (let* ((out (assoc-ref outputs "out")) (bin-dir (string-append out "/bin/")) (site-dir (string-append out "/lib/perl5/site_perl/")) (lib-path (getenv "PERL5LIB"))) (for-each (cut wrap-program <> `("PERL5LIB" ":" prefix (,lib-path ,site-dir))) (find-files bin-dir))))))) (pkg (dummy-package "x" (arguments `(#:phases ,phases))))) (single-lint-warning-message (check-wrapper-inputs pkg)))) (test-equal "bogus phase specifications don't crash the linter" "invalid phase clause" (let* ((phases `(modify-phases %standard-phases (add-invalid))) (pkg (dummy-package "x" (arguments `(#:phases ,phases))))) (single-lint-warning-message (check-wrapper-inputs pkg)))) (test-equal "file patches: different file name -> warning" "file names of patches should start with the package name" (single-lint-warning-message (let ((pkg (dummy-package "x" (source (dummy-origin (patches (list "/path/to/y.patch"))))))) (check-patch-file-names pkg)))) (test-equal "file patches: same file name -> no warnings" '() (let ((pkg (dummy-package "x" (source (dummy-origin (patches (list "/path/to/x.patch"))))))) (check-patch-file-names pkg))) (test-equal "<origin> patches: different file name -> warning" "file names of patches should start with the package name" (single-lint-warning-message (let ((pkg (dummy-package "x" (source (dummy-origin (patches (list (dummy-origin (file-name "y.patch"))))))))) (check-patch-file-names pkg)))) (test-equal "<origin> patches: same file name -> no warnings" '() (let ((pkg (dummy-package "x" (source (dummy-origin (patches (list (dummy-origin (file-name "x.patch"))))))))) (check-patch-file-names pkg))) (test-equal "patches: file name too long, which may break 'make dist'" (string-append "x-" (make-string 152 #\a) ".patch: file name is too long, which may break 'make dist'") (single-lint-warning-message (let ((pkg (dummy-package "x" (source (dummy-origin (patches (list (string-append "x-" (make-string 152 #\a) ".patch")))))))) (check-patch-file-names pkg)))) (test-equal "patches: not found" "this-patch-does-not-exist!: patch not found\n" (single-lint-warning-message (let ((pkg (dummy-package "x" (source (dummy-origin (patches (list (search-patch "this-patch-does-not-exist!")))))))) (check-patch-file-names pkg)))) (test-assert "patch headers: no warnings" (call-with-temporary-directory (lambda (directory) (call-with-output-file (string-append directory "/t.patch") (lambda (port) (display "This is a patch.\n\n--- a\n+++ b\n" port))) (parameterize ((%patch-path (list directory))) (let ((pkg (dummy-package "x" (source (dummy-origin (patches (search-patches "t.patch"))))))) (null? (check-patch-headers pkg))))))) (test-equal "patch headers: missing comment" "t.patch: patch lacks comment and upstream status" (call-with-temporary-directory (lambda (directory) (call-with-output-file (string-append directory "/t.patch") (lambda (port) (display "\n--- a\n+++ b\n" port))) (parameterize ((%patch-path (list directory))) (let ((pkg (dummy-package "x" (source (dummy-origin (patches (search-patches "t.patch"))))))) (single-lint-warning-message (check-patch-headers pkg))))))) (test-equal "patch headers: empty" "t.patch: empty patch" (call-with-temporary-directory (lambda (directory) (call-with-output-file (string-append directory "/t.patch") (const #t)) (parameterize ((%patch-path '())) (let ((pkg (dummy-package "x" (source (dummy-origin (patches (list (local-file (string-append directory "/t.patch"))))))))) (single-lint-warning-message (check-patch-headers pkg))))))) (test-equal "patch headers: patch not found" "does-not-exist.patch: patch not found\n" (parameterize ((%patch-path '())) (let ((pkg (dummy-package "x" (source (dummy-origin (patches (search-patches "does-not-exist.patch"))))))) (single-lint-warning-message (check-patch-headers pkg))))) (test-equal "derivation: invalid arguments" "failed to create x86_64-linux derivation: (match-error \"match\" \"no matching pattern\" invalid-module)" (match (let ((pkg (dummy-package "x" (arguments '(#:imported-modules (invalid-module)))))) (check-derivation pkg)) (((and (? lint-warning?) first-warning) others ...) (lint-warning-message first-warning)))) (test-equal "profile-collisions: no warnings" '() (check-profile-collisions (dummy-package "x"))) (test-equal "profile-collisions: propagated inputs collide" "propagated inputs p0@1 and p0@2 collide" (let* ((p0 (dummy-package "p0" (version "1"))) (p0* (dummy-package "p0" (version "2"))) (p1 (dummy-package "p1" (propagated-inputs `(("p0" ,p0))))) (p2 (dummy-package "p2" (propagated-inputs `(("p1" ,p1))))) (p3 (dummy-package "p3" (propagated-inputs `(("p0" ,p0*))))) (p4 (dummy-package "p4" (propagated-inputs `(("p2" ,p2) ("p3", p3)))))) (single-lint-warning-message (check-profile-collisions p4)))) (test-assert "profile-collisions: propagated inputs collide, store items" (string-match-or-error "propagated inputs /[[:graph:]]+-p0-1 and /[[:graph:]]+-p0-1 collide" (let* ((p0 (dummy-package "p0" (version "1"))) (p0* (dummy-package "p0" (version "1") (inputs `(("x" ,(dummy-package "x")))))) (p1 (dummy-package "p1" (propagated-inputs `(("p0" ,p0))))) (p2 (dummy-package "p2" (propagated-inputs `(("p1" ,p1))))) (p3 (dummy-package "p3" (propagated-inputs `(("p0" ,p0*))))) (p4 (dummy-package "p4" (propagated-inputs `(("p2" ,p2) ("p3", p3)))))) (single-lint-warning-message (check-profile-collisions p4))))) (test-equal "license: invalid license" "invalid license field" (single-lint-warning-message (check-license (dummy-package "x" (license #f))))) (test-equal "home-page: wrong home-page" "invalid value for home page" (let ((pkg (package (inherit (dummy-package "x")) (home-page #f)))) (single-lint-warning-message (check-home-page pkg)))) (test-equal "home-page: invalid URI" "invalid home page URL: \"foobar\"" (let ((pkg (package (inherit (dummy-package "x")) (home-page "foobar")))) (single-lint-warning-message (check-home-page pkg)))) (test-assert "home-page: host not found" (let ((pkg (package (inherit (dummy-package "x")) (home-page "http://does-not-exist")))) (warning-contains? "domain not found" (check-home-page pkg)))) (parameterize ((%http-server-port 9999)) ;; TODO skip this test if some process is currently listening at 9999 (test-equal "home-page: Connection refused" "URI http://localhost:9999/foo/bar unreachable: Connection refused" (let ((pkg (package (inherit (dummy-package "x")) (home-page (%local-url))))) (single-lint-warning-message (check-home-page pkg))))) (test-equal "home-page: 200" '() (with-http-server `((200 ,%long-string)) (let ((pkg (package (inherit (dummy-package "x")) (home-page (%local-url))))) (check-home-page pkg)))) (with-http-server `((200 "This is too small.")) (test-equal "home-page: 200 but short length" (format #f "URI ~a returned suspiciously small file (18 bytes)" (%local-url)) (let ((pkg (package (inherit (dummy-package "x")) (home-page (%local-url))))) (single-lint-warning-message (check-home-page pkg))))) (with-http-server `((404 ,%long-string)) (test-equal "home-page: 404" (format #f "URI ~a not reachable: 404 (\"Such is life\")" (%local-url)) (let ((pkg (package (inherit (dummy-package "x")) (home-page (%local-url))))) (single-lint-warning-message (check-home-page pkg))))) (with-http-server `((301 ,%long-string)) (test-equal "home-page: 301, invalid" (format #f "invalid permanent redirect from ~a" (%local-url)) (let ((pkg (package (inherit (dummy-package "x")) (home-page (%local-url))))) (single-lint-warning-message (check-home-page pkg))))) (with-http-server `((200 ,%long-string)) (let* ((initial-url (%local-url)) (redirect (build-response #:code 301 #:headers `((location . ,(string->uri initial-url)))))) (parameterize ((%http-server-port 0)) (with-http-server `((,redirect "")) (test-equal "home-page: 301 -> 200" (format #f "permanent redirect from ~a to ~a" (%local-url) initial-url) (let ((pkg (package (inherit (dummy-package "x")) (home-page (%local-url))))) (single-lint-warning-message (check-home-page pkg)))))))) (with-http-server `((404 "booh!")) (let* ((initial-url (%local-url)) (redirect (build-response #:code 301 #:headers `((location . ,(string->uri initial-url)))))) (parameterize ((%http-server-port 0)) (with-http-server `((,redirect "")) (test-equal "home-page: 301 -> 404" (format #f "URI ~a not reachable: 404 (\"Such is life\")" (%local-url)) (let ((pkg (package (inherit (dummy-package "x")) (home-page (%local-url))))) (single-lint-warning-message (check-home-page pkg)))))))) (test-equal "source-file-name" "the source file name should contain the package name" (let ((pkg (dummy-package "x" (version "3.2.1") (source (origin (method url-fetch) (uri "http://www.example.com/3.2.1.tar.gz") (sha256 %null-sha256)))))) (single-lint-warning-message (check-source-file-name pkg)))) (test-equal "source-file-name: v prefix" "the source file name should contain the package name" (let ((pkg (dummy-package "x" (version "3.2.1") (source (origin (method url-fetch) (uri "http://www.example.com/v3.2.1.tar.gz") (sha256 %null-sha256)))))) (single-lint-warning-message (check-source-file-name pkg)))) (test-equal "source-file-name: bad checkout" "the source file name should contain the package name" (let ((pkg (dummy-package "x" (version "3.2.1") (source (origin (method git-fetch) (uri (git-reference (url "http://www.example.com/x.git") (commit "0"))) (sha256 %null-sha256)))))) (single-lint-warning-message (check-source-file-name pkg)))) (test-equal "source-file-name: good checkout" '() (let ((pkg (dummy-package "x" (version "3.2.1") (source (origin (method git-fetch) (uri (git-reference (url "http://git.example.com/x.git") (commit "0"))) (file-name (string-append "x-" version)) (sha256 %null-sha256)))))) (check-source-file-name pkg))) (test-equal "source-file-name: valid" '() (let ((pkg (dummy-package "x" (version "3.2.1") (source (origin (method url-fetch) (uri "http://www.example.com/x-3.2.1.tar.gz") (sha256 %null-sha256)))))) (check-source-file-name pkg))) (test-equal "source-unstable-tarball" "the source URI should not be an autogenerated tarball" (let ((pkg (dummy-package "x" (source (origin (method url-fetch) (uri "https://github.com/example/example/archive/v0.0.tar.gz") (sha256 %null-sha256)))))) (single-lint-warning-message (check-source-unstable-tarball pkg)))) (test-equal "source-unstable-tarball: source #f" '() (let ((pkg (dummy-package "x" (source #f)))) (check-source-unstable-tarball pkg))) (test-equal "source-unstable-tarball: valid" '() (let ((pkg (dummy-package "x" (source (origin (method url-fetch) (uri "https://github.com/example/example/releases/download/x-0.0/x-0.0.tar.gz") (sha256 %null-sha256)))))) (check-source-unstable-tarball pkg))) (test-equal "source-unstable-tarball: package named archive" '() (let ((pkg (dummy-package "x" (source (origin (method url-fetch) (uri "https://github.com/example/archive/releases/download/x-0.0/x-0.0.tar.gz") (sha256 %null-sha256)))))) (check-source-unstable-tarball pkg))) (test-equal "source-unstable-tarball: not-github" '() (let ((pkg (dummy-package "x" (source (origin (method url-fetch) (uri "https://bitbucket.org/archive/example/download/x-0.0.tar.gz") (sha256 %null-sha256)))))) (check-source-unstable-tarball pkg))) (test-equal "source-unstable-tarball: git-fetch" '() (let ((pkg (dummy-package "x" (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/archive/example") (commit "0"))) (sha256 %null-sha256)))))) (check-source-unstable-tarball pkg))) (define (package-with-phase-changes changes) (dummy-package "x" (arguments `(#:phases ,(if (gexp? changes) #~(modify-phases %standard-phases #$@changes) `(modify-phases %standard-phases ,@changes)))))) (test-equal "optional-tests: no check phase" '() (let ((pkg (package-with-phase-changes '()))) (check-optional-tests pkg))) (test-equal "optional-tests: check phase respects #:tests?" '() (let ((pkg (package-with-phase-changes '((replace 'check (lambda* (#:key tests? #:allow-other-keys?) (when tests? (invoke "./the-test-suite")))))))) (check-optional-tests pkg))) (test-equal "optional-tests: check phase ignores #:tests?" "the 'check' phase should respect #:tests?" (let ((pkg (package-with-phase-changes '((replace 'check (lambda _ (invoke "./the-test-suite"))))))) (single-lint-warning-message (check-optional-tests pkg)))) (test-equal "optional-tests: do not crash when #:phases is invalid" "incorrect call to ‘modify-phases’" (let ((pkg (package-with-phase-changes 'this-is-not-a-list))) (single-lint-warning-message (check-optional-tests pkg)))) (test-equal "optional-tests: allow G-exps (no warning)" '() (let ((pkg (package-with-phase-changes #~()))) (check-optional-tests pkg))) (test-equal "optional-tests: allow G-exps (warning)" "the 'check' phase should respect #:tests?" (let ((pkg (package-with-phase-changes #~((replace 'check (lambda _ (invoke "/the-test-suite"))))))) (single-lint-warning-message (check-optional-tests pkg)))) (test-equal "optional-tests: complicated 'check' phase" "the 'check' phase should respect #:tests?" (let ((pkg (package-with-phase-changes '((replace 'check (lambda* (#:key inputs tests? #:allow-other-keys) (let ((something (stuff from inputs or native-inputs))) (delete-file "dateutil/test/test_utils.py") (invoke "pytest" "-vv")))))))) (single-lint-warning-message (check-optional-tests pkg)))) (test-equal "optional-tests: 'check' phase is not first phase" "the 'check' phase should respect #:tests?" (let ((pkg (package-with-phase-changes '((add-after 'unpack (lambda _ (chdir "libtestcase-0.0.0"))) (replace 'check (lambda _ (invoke "./test-suite"))))))) (single-lint-warning-message (check-optional-tests pkg)))) (test-equal "source: 200" '() (with-http-server `((200 ,%long-string)) (let ((pkg (package (inherit (dummy-package "x")) (source (origin (method url-fetch) (uri (%local-url)) (sha256 %null-sha256)))))) (check-source pkg)))) (with-http-server '((200 "This is too small.")) (test-equal "source: 200 but short length" (format #f "URI ~a returned suspiciously small file (18 bytes)" (%local-url)) (let ((pkg (package (inherit (dummy-package "x")) (source (origin (method url-fetch) (uri (%local-url)) (sha256 %null-sha256)))))) (match (check-source pkg) ((first-warning ; All source URIs are unreachable (and (? lint-warning?) second-warning)) (lint-warning-message second-warning)))))) (with-http-server `((404 ,%long-string)) (test-equal "source: 404" (format #f "URI ~a not reachable: 404 (\"Such is life\")" (%local-url)) (let ((pkg (package (inherit (dummy-package "x")) (source (origin (method url-fetch) (uri (%local-url)) (sha256 %null-sha256)))))) (match (check-source pkg) ((first-warning ; All source URIs are unreachable (and (? lint-warning?) second-warning)) (lint-warning-message second-warning)))))) (test-equal "source: 404 and 200" '() (with-http-server `((404 ,%long-string)) (let ((bad-url (%local-url))) (parameterize ((%http-server-port (+ 1 (%http-server-port)))) (with-http-server `((200 ,%long-string)) (let ((pkg (package (inherit (dummy-package "x")) (source (origin (method url-fetch) (uri (list bad-url (%local-url))) (sha256 %null-sha256)))))) ;; Since one of the two URLs is good, this should return the empty ;; list. (check-source pkg))))))) (with-http-server `((200 ,%long-string)) (let* ((initial-url (%local-url)) (redirect (build-response #:code 301 #:headers `((location . ,(string->uri initial-url)))))) (parameterize ((%http-server-port 0)) (with-http-server `((,redirect "")) (test-equal "source: 301 -> 200" (format #f "permanent redirect from ~a to ~a" (%local-url) initial-url) (let ((pkg (package (inherit (dummy-package "x")) (source (origin (method url-fetch) (uri (%local-url)) (sha256 %null-sha256)))))) (match (check-source pkg) ((first-warning ; All source URIs are unreachable (and (? lint-warning?) second-warning)) (lint-warning-message second-warning))))))))) (with-http-server `((200 ,%long-string)) (let* ((initial-url (%local-url)) (redirect (build-response #:code 301 #:headers `((location . ,(string->uri initial-url)))))) (parameterize ((%http-server-port 0)) (with-http-server `((,redirect "")) (test-equal "source, git-reference: 301 -> 200" (format #f "permanent redirect from ~a to ~a" (%local-url) initial-url) (let ((pkg (dummy-package "x" (source (origin (method git-fetch) (uri (git-reference (url (%local-url)) (commit "v1.0.0"))) (sha256 %null-sha256)))))) (single-lint-warning-message (check-source pkg)))))))) (with-http-server '((404 "booh!")) (let* ((initial-url (%local-url)) (redirect (build-response #:code 301 #:headers `((location . ,(string->uri initial-url)))))) (parameterize ((%http-server-port 0)) (with-http-server `((,redirect "")) (test-equal "source: 301 -> 404" (format #f "URI ~a not reachable: 404 (\"Such is life\")" (%local-url)) (let ((pkg (package (inherit (dummy-package "x")) (source (origin (method url-fetch) (uri (%local-url)) (sha256 %null-sha256)))))) (match (check-source pkg) ((first-warning ; The first warning says that all URI's are ; unreachable (and (? lint-warning?) second-warning)) (lint-warning-message second-warning))))))))) (test-equal "source: svn-reference, HTTP 200" '() (with-http-server `((200 ,%long-string)) (let ((pkg (package (inherit (dummy-package "x")) (source (origin (method svn-fetch) (uri (svn-reference (url (%local-url)) (revision 1234))) (sha256 %null-sha256)))))) (check-source pkg)))) (with-http-server `((404 ,%long-string)) (test-equal "source: svn-reference, HTTP 404" (format #f "URI ~a not reachable: 404 (\"Such is life\")" (%local-url)) (let ((pkg (package (inherit (dummy-package "x")) (source (origin (method svn-fetch) (uri (svn-reference (url (%local-url)) (revision 1234))) (sha256 %null-sha256)))))) (match (check-source pkg) ((warning) (lint-warning-message warning)))))) (test-equal "mirror-url" '() (let ((source (origin (method url-fetch) (uri "http://example.org/foo/bar.tar.gz") (sha256 %null-sha256)))) (check-mirror-url (dummy-package "x" (source source))))) (test-equal "mirror-url: one suggestion" "URL should be 'mirror://gnu/foo/foo.tar.gz'" (let ((source (origin (method url-fetch) (uri "http://ftp.gnu.org/pub/gnu/foo/foo.tar.gz") (sha256 %null-sha256)))) (single-lint-warning-message (check-mirror-url (dummy-package "x" (source source)))))) (test-equal "mirror-url: kde suggestion" "URL should be 'mirror://kde/stable/gcompris/qt/src/gcompris-qt-2.3.tar.xz'" (let ((source (origin (method url-fetch) (uri "https://download.kde.org/stable/gcompris/qt/src/gcompris-qt-2.3.tar.xz") (sha256 %null-sha256)))) (single-lint-warning-message (check-mirror-url (dummy-package "x" (source source)))))) (test-equal "github-url" '() (with-http-server `((200 ,%long-string)) (check-github-url (dummy-package "x" (source (origin (method url-fetch) (uri (%local-url)) (sha256 %null-sha256))))))) (let ((github-url "https://github.com/foo/bar/bar-1.0.tar.gz")) (test-equal "github-url: one suggestion" (string-append "URL should be '" github-url "'") (let ((redirect (build-response #:code 301 #:headers `((location . ,(string->uri github-url)))))) (with-http-server `((,redirect "")) (let* ((initial-url (%local-url)) (redirect (build-response #:code 302 #:headers `((location . ,(string->uri initial-url)))))) (parameterize ((%http-server-port 0)) (with-http-server `((,redirect "")) (single-lint-warning-message (check-github-url (dummy-package "x" (source (origin (method url-fetch) (uri (%local-url)) (sha256 %null-sha256)))))))))))) (test-equal "github-url: already the correct github url" '() (check-github-url (dummy-package "x" (source (origin (method url-fetch) (uri github-url) (sha256 %null-sha256))))))) (test-equal "cve" '() (mock ((guix lint) package-vulnerabilities (const '())) (check-vulnerabilities (dummy-package "x")))) (test-equal "cve: one vulnerability" "probably vulnerable to CVE-2015-1234" (let ((dummy-vulnerabilities (lambda (package) (list (make-struct/no-tail (@@ (guix cve) <vulnerability>) "CVE-2015-1234" (list (cons (package-name package) (package-version package)))))))) (single-lint-warning-message (check-vulnerabilities (dummy-package "pi" (version "3.14")) dummy-vulnerabilities)))) (test-equal "cve: one patched vulnerability" '() (mock ((guix lint) package-vulnerabilities (lambda (package) (list (make-struct/no-tail (@@ (guix cve) <vulnerability>) "CVE-2015-1234" (list (cons (package-name package) (package-version package))))))) (check-vulnerabilities (dummy-package "pi" (version "3.14") (source (dummy-origin (patches (list "/a/b/pi-CVE-2015-1234.patch")))))))) (test-equal "cve: known safe from vulnerability" '() (mock ((guix lint) package-vulnerabilities (lambda (package) (list (make-struct/no-tail (@@ (guix cve) <vulnerability>) "CVE-2015-1234" (list (cons (package-name package) (package-version package))))))) (check-vulnerabilities (dummy-package "pi" (version "3.14") (properties `((lint-hidden-cve . ("CVE-2015-1234")))))))) (test-equal "cve: vulnerability fixed in replacement version" '() (mock ((guix lint) package-vulnerabilities (lambda (package) (match (package-version package) ("0" (list (make-struct/no-tail (@@ (guix cve) <vulnerability>) "CVE-2015-1234" (list (cons (package-name package) (package-version package)))))) ("1" '())))) (check-vulnerabilities (dummy-package "foo" (version "0") (replacement (dummy-package "foo" (version "1"))))))) (test-equal "cve: patched vulnerability in replacement" '() (mock ((guix lint) package-vulnerabilities (lambda (package) (list (make-struct/no-tail (@@ (guix cve) <vulnerability>) "CVE-2015-1234" (list (cons (package-name package) (package-version package))))))) (check-vulnerabilities (dummy-package "pi" (version "3.14") (source (dummy-origin)) (replacement (dummy-package "pi" (version "3.14") (source (dummy-origin (patches (list "/a/b/pi-CVE-2015-1234.patch")))))))))) (test-equal "formatting: lonely parentheses" "parentheses feel lonely, move to the previous or next line" (single-lint-warning-message (check-formatting (dummy-package "ugly as hell!" ) ))) (test-assert "formatting: tabulation" (string-match-or-error "tabulation on line [0-9]+, column [0-9]+" (single-lint-warning-message (check-formatting (dummy-package "leave the tab here: "))))) (test-assert "formatting: trailing white space" (string-match-or-error "trailing white space .*" ;; Leave the trailing white space on the next line! (single-lint-warning-message (check-formatting (dummy-package "x"))))) (test-assert "formatting: long line" (string-match-or-error "line [0-9]+ is way too long \\([0-9]+ characters\\)" (single-lint-warning-message (check-formatting (dummy-package "x")) ;here is a stupid comment just to make a long line ))) (test-equal "formatting: alright" '() (check-formatting (dummy-package "x"))) (test-assert "archival: not an origin" (warning-contains? "not an origin" (check-archival (dummy-package "x" (source (computed-file "x-src" #t)))))) (test-assert "archival: missing content" (let* ((origin (origin (method url-fetch) (uri "http://example.org/foo.tgz") (sha256 (make-bytevector 32)))) (warnings (with-http-server '((404 "Not archived.") (404 "Not in Disarchive database.")) (parameterize ((%swh-base-url (%local-url))) (mock ((guix download) %disarchive-mirrors (list (%local-url))) (check-archival (dummy-package "x" (source origin)))))))) (warning-contains? "not archived" warnings))) (test-equal "archival: content available" '() (let* ((origin (origin (method url-fetch) (uri "http://example.org/foo.tgz") (sha256 (make-bytevector 32)))) ;; https://archive.softwareheritage.org/api/1/content/ (content "{ \"checksums\": {}, \"data_url\": \"xyz\", \"length\": 42 }")) (with-http-server `((404 "") ;extid (200 ,content)) (parameterize ((%swh-base-url (%local-url))) (check-archival (dummy-package "x" (source origin))))))) (test-equal "archival: content unavailable but disarchive available" '() (let* ((origin (origin (method url-fetch) (uri "http://example.org/foo.tgz") (sha256 (make-bytevector 32)))) (disarchive (object->string '(disarchive (version 0) ... "swh:1:dir:aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"))) ;; https://archive.softwareheritage.org/api/1/directory/ (directory "[ { \"checksums\": {}, \"dir_id\": \"aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\", \"type\": \"file\", \"name\": \"README\" \"length\": 42 } ]")) (with-http-server `((404 "") ;lookup-directory-by-nar-hash (404 "") ;lookup-content (200 ,disarchive) ;Disarchive database lookup (200 ,directory)) ;lookup-directory (mock ((guix download) %disarchive-mirrors (list (%local-url))) (parameterize ((%swh-base-url (%local-url))) (check-archival (dummy-package "x" (source origin)))))))) (test-assert "archival: missing revision" (let* ((origin (origin (method git-fetch) (uri (git-reference (url "http://example.org/foo.git") (commit "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"))) (sha256 (make-bytevector 32)))) ;; https://archive.softwareheritage.org/api/1/origin/save/ (save "{ \"origin_url\": \"http://example.org/foo.git\", \"save_request_date\": \"2014-11-17T22:09:38+01:00\", \"save_request_status\": \"accepted\", \"save_task_status\": \"scheduled\" }") (warnings (with-http-server `((404 "No extid.") ;lookup-directory-by-nar-hash (404 "No revision.") ;lookup-revision (404 "No origin.") ;lookup-origin (200 ,save)) ;save-origin (parameterize ((%swh-base-url (%local-url))) (check-archival (dummy-package "x" (source origin))))))) (warning-contains? "scheduled" warnings))) (test-assert "archival: missing svn revision" (let* ((origin (origin (method svn-fetch) (uri (svn-reference (url "http://example.org/svn/foo") (revision "1234"))) (sha256 (make-bytevector 32)))) ;; https://archive.softwareheritage.org/api/1/origin/save/ (save "{ \"origin_url\": \"http://example.org/svn/foo\", \"save_request_date\": \"2014-11-17T22:09:38+01:00\", \"save_request_status\": \"accepted\", \"save_task_status\": \"scheduled\" }") (warnings (with-http-server `((404 "No extid.") ;lookup-directory-by-nar-hash (404 "No revision.") ;lookup-revision (404 "No origin.") ;lookup-origin (200 ,save)) ;save-origin (parameterize ((%swh-base-url (%local-url))) (check-archival (dummy-package "x" (source origin))))))) (warning-contains? "scheduled" warnings))) (test-equal "archival: revision available" '() (let* ((origin (origin (method git-fetch) (uri (git-reference (url "http://example.org/foo.git") (commit "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"))) (sha256 (make-bytevector 32)))) ;; https://archive.softwareheritage.org/api/1/revision/ (revision "{ \"author\": {}, \"parents\": [], \"date\": \"2014-11-17T22:09:38+01:00\" }")) (with-http-server `((404 "No directory.") ;lookup-directory-by-nar-hash (200 ,revision)) (parameterize ((%swh-base-url (%local-url))) (check-archival (dummy-package "x" (source origin))))))) (test-equal "archival: nar-sha256 extid available" '() (let* ((origin (origin (method git-fetch) (uri (git-reference (url "http://example.org/foo.git") (commit "aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa"))) (sha256 (make-bytevector 32)))) ;; https://archive.softwareheritage.org/api/1/extid/doc/ (extid "{ \"extid_type\": \"nar-sha256\", \"extid\": \"1234\", \"extid_version\": 0, \"target\": \"swh:1:dir:cabba93\", \"target_url\": \"boo\" }")) (with-http-server `((200 ,extid)) (parameterize ((%swh-base-url (%local-url))) (check-archival (dummy-package "x" (source origin))))))) (test-assert "archival: rate limit reached" ;; We should get a single warning stating that the rate limit was reached, ;; and nothing more, in particular no other HTTP requests. (let* ((origin (origin (method url-fetch) (uri "http://example.org/foo.tgz") (sha256 (make-bytevector 32)))) (too-many (build-response #:code 429 #:reason-phrase "Too many requests" #:headers '((x-ratelimit-remaining . "0") (x-ratelimit-reset . "3000000000")))) (warnings (with-http-server `((,too-many "Rate limit reached.")) (parameterize ((%swh-base-url (%local-url))) (append-map (lambda (name) (check-archival (dummy-package name (source origin)))) '("x" "y" "z")))))) (string-contains (single-lint-warning-message warnings) "rate limit reached"))) (test-assert "haskell-stackage" (let* ((stackage (string-append "{ \"packages\": [{" " \"name\":\"pandoc\"," " \"synopsis\":\"synopsis\"," " \"version\":\"1.0\" }]," " \"snapshot\": {" " \"ghc\": \"8.6.5\"," " \"name\": \"lts-14.27\"" " }}")) (packages (map (lambda (version) (dummy-package "ghc-pandoc" (version version) (source (dummy-origin (method url-fetch) (uri (string-append "https://hackage.haskell.org/package/" "pandoc-" version "/pandoc-" version ".tar.gz")))))) '("0.9" "1.0" "100.0"))) (warnings (pk (with-http-server `((200 ,stackage) ; memoized (200 "name: pandoc\nversion: 1.0\n") (200 "name: pandoc\nversion: 1.0\n") (200 "name: pandoc\nversion: 1.0\n")) (parameterize ((%hackage-url (%local-url)) (%stackage-url (%local-url))) (append-map check-haskell-stackage packages)))))) (match warnings (((? lint-warning? warning)) (and (string=? (package-version (lint-warning-package warning)) "100.0") (string-contains (lint-warning-message warning) "ahead of Stackage LTS version")))))) (test-end "lint") ;; Local Variables: ;; eval: (put 'with-http-server 'scheme-indent-function 1) ;; eval: (put 'with-warnings 'scheme-indent-function 0) ;; End: