nix: expose sched_priority
All checks were successful
Test / Create distribution (push) Successful in 37s
Test / ShareFS (push) Successful in 42s
Test / Sandbox (push) Successful in 1m44s
Test / Hakurei (push) Successful in 2m2s
Test / Sandbox (race detector) (push) Successful in 2m46s
Test / Hakurei (race detector) (push) Successful in 3m7s
Test / Flake checks (push) Successful in 1m22s
All checks were successful
Test / Create distribution (push) Successful in 37s
Test / ShareFS (push) Successful in 42s
Test / Sandbox (push) Successful in 1m44s
Test / Hakurei (push) Successful in 2m2s
Test / Sandbox (race detector) (push) Successful in 2m46s
Test / Hakurei (race detector) (push) Successful in 3m7s
Test / Flake checks (push) Successful in 1m22s
This was missed when implementing the corresponding option in hst. Signed-off-by: Ophestra <cat@gensokyo.uk>
This commit is contained in:
@@ -140,6 +140,7 @@ in
|
|||||||
inherit (dbusConfig) session_bus system_bus;
|
inherit (dbusConfig) session_bus system_bus;
|
||||||
direct_wayland = app.insecureWayland;
|
direct_wayland = app.insecureWayland;
|
||||||
sched_policy = app.schedPolicy;
|
sched_policy = app.schedPolicy;
|
||||||
|
sched_priority = app.schedPriority;
|
||||||
|
|
||||||
container = {
|
container = {
|
||||||
inherit (app)
|
inherit (app)
|
||||||
|
|||||||
@@ -253,6 +253,13 @@ in
|
|||||||
The zero value retains the current scheduling policy.
|
The zero value retains the current scheduling policy.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
schedPriority = mkOption {
|
||||||
|
type = nullOr (ints.between 1 99);
|
||||||
|
default = null;
|
||||||
|
description = ''
|
||||||
|
Scheduling priority to set for the container.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
nix = mkEnableOption "nix daemon access";
|
nix = mkEnableOption "nix daemon access";
|
||||||
mapRealUid = mkEnableOption "mapping to priv-user uid";
|
mapRealUid = mkEnableOption "mapping to priv-user uid";
|
||||||
|
|||||||
Reference in New Issue
Block a user