Compare commits

..

2 Commits

Author SHA1 Message Date
c959381ed2
container: access test case by index in helper
Some checks failed
Test / Create distribution (push) Successful in 33s
Test / Sandbox (push) Successful in 1m59s
Test / Hakurei (push) Successful in 3m27s
Test / Sandbox (race detector) (push) Successful in 3m55s
Test / Planterette (push) Successful in 4m15s
Test / Hakurei (race detector) (push) Successful in 4m55s
Test / Flake checks (push) Failing after 36s
This is more elegant and allows for much easier extension of the tests. Mountinfo is still serialised however due to libPaths nondeterminism.

Signed-off-by: Ophestra <cat@gensokyo.uk>
2025-07-26 17:21:18 +09:00
3633d24ebc
nix: update flake lock
Some checks failed
Test / Create distribution (push) Successful in 33s
Test / Hakurei (push) Successful in 41s
Test / Hakurei (race detector) (push) Successful in 41s
Test / Planterette (push) Successful in 40s
Test / Sandbox (push) Successful in 1m26s
Test / Sandbox (race detector) (push) Successful in 2m16s
Test / Flake checks (push) Failing after 1m19s
Signed-off-by: Ophestra <cat@gensokyo.uk>
2025-07-26 15:12:39 +09:00
3 changed files with 49 additions and 46 deletions

View File

@ -215,7 +215,8 @@ stdenv.mkDerivation {
# create binary cache # create binary cache
closureInfo="${ closureInfo="${
closureInfo { closureInfo {
rootPaths = [ rootPaths =
[
homeManagerConfiguration.activationPackage homeManagerConfiguration.activationPackage
launcher launcher
] ]

View File

@ -82,8 +82,7 @@ in
own = [ own = [
"${id}.*" "${id}.*"
"org.mpris.MediaPlayer2.${id}.*" "org.mpris.MediaPlayer2.${id}.*"
] ] ++ ext.own;
++ ext.own;
inherit (ext) call broadcast; inherit (ext) call broadcast;
}; };
@ -176,7 +175,8 @@ in
auto_etc = true; auto_etc = true;
cover = [ "/var/run/nscd" ]; cover = [ "/var/run/nscd" ];
symlink = [ symlink =
[
[ [
"*/run/current-system" "*/run/current-system"
"/run/current-system" "/run/current-system"

View File

@ -83,7 +83,8 @@ buildGoModule rec {
# nix build environment does not allow acls # nix build environment does not allow acls
env.GO_TEST_SKIP_ACL = 1; env.GO_TEST_SKIP_ACL = 1;
buildInputs = [ buildInputs =
[
libffi libffi
libseccomp libseccomp
acl acl
@ -129,7 +130,8 @@ buildGoModule rec {
} }
''; '';
passthru.targetPkgs = [ passthru.targetPkgs =
[
go go
gcc gcc
xorg.xorgproto xorg.xorgproto