Compare commits

..

2 Commits

Author SHA1 Message Date
c959381ed2
container: access test case by index in helper
Some checks failed
Test / Create distribution (push) Successful in 33s
Test / Sandbox (push) Successful in 1m59s
Test / Hakurei (push) Successful in 3m27s
Test / Sandbox (race detector) (push) Successful in 3m55s
Test / Planterette (push) Successful in 4m15s
Test / Hakurei (race detector) (push) Successful in 4m55s
Test / Flake checks (push) Failing after 36s
This is more elegant and allows for much easier extension of the tests. Mountinfo is still serialised however due to libPaths nondeterminism.

Signed-off-by: Ophestra <cat@gensokyo.uk>
2025-07-26 17:21:18 +09:00
3633d24ebc
nix: update flake lock
Some checks failed
Test / Create distribution (push) Successful in 33s
Test / Hakurei (push) Successful in 41s
Test / Hakurei (race detector) (push) Successful in 41s
Test / Planterette (push) Successful in 40s
Test / Sandbox (push) Successful in 1m26s
Test / Sandbox (race detector) (push) Successful in 2m16s
Test / Flake checks (push) Failing after 1m19s
Signed-off-by: Ophestra <cat@gensokyo.uk>
2025-07-26 15:12:39 +09:00
3 changed files with 49 additions and 46 deletions

View File

@ -215,14 +215,15 @@ stdenv.mkDerivation {
# create binary cache # create binary cache
closureInfo="${ closureInfo="${
closureInfo { closureInfo {
rootPaths = [ rootPaths =
homeManagerConfiguration.activationPackage [
launcher homeManagerConfiguration.activationPackage
] launcher
++ optionals gpu [ ]
mesaWrappers ++ optionals gpu [
nixGL mesaWrappers
]; nixGL
];
} }
}" }"
echo "copying application paths..." echo "copying application paths..."

View File

@ -82,8 +82,7 @@ in
own = [ own = [
"${id}.*" "${id}.*"
"org.mpris.MediaPlayer2.${id}.*" "org.mpris.MediaPlayer2.${id}.*"
] ] ++ ext.own;
++ ext.own;
inherit (ext) call broadcast; inherit (ext) call broadcast;
}; };
@ -176,26 +175,27 @@ in
auto_etc = true; auto_etc = true;
cover = [ "/var/run/nscd" ]; cover = [ "/var/run/nscd" ];
symlink = [ symlink =
[
"*/run/current-system"
"/run/current-system"
]
]
++ optionals (isGraphical && config.hardware.graphics.enable) (
[ [
[ [
config.systemd.tmpfiles.settings.graphics-driver."/run/opengl-driver"."L+".argument "*/run/current-system"
"/run/opengl-driver" "/run/current-system"
] ]
] ]
++ optionals (app.multiarch && config.hardware.graphics.enable32Bit) [ ++ optionals (isGraphical && config.hardware.graphics.enable) (
[ [
config.systemd.tmpfiles.settings.graphics-driver."/run/opengl-driver-32"."L+".argument [
/run/opengl-driver-32 config.systemd.tmpfiles.settings.graphics-driver."/run/opengl-driver"."L+".argument
"/run/opengl-driver"
]
] ]
] ++ optionals (app.multiarch && config.hardware.graphics.enable32Bit) [
); [
config.systemd.tmpfiles.settings.graphics-driver."/run/opengl-driver-32"."L+".argument
/run/opengl-driver-32
]
]
);
}; };
}; };

View File

@ -83,17 +83,18 @@ buildGoModule rec {
# nix build environment does not allow acls # nix build environment does not allow acls
env.GO_TEST_SKIP_ACL = 1; env.GO_TEST_SKIP_ACL = 1;
buildInputs = [ buildInputs =
libffi [
libseccomp libffi
acl libseccomp
wayland acl
] wayland
++ (with xorg; [ ]
libxcb ++ (with xorg; [
libXau libxcb
libXdmcp libXau
]); libXdmcp
]);
nativeBuildInputs = [ nativeBuildInputs = [
pkg-config pkg-config
@ -129,16 +130,17 @@ buildGoModule rec {
} }
''; '';
passthru.targetPkgs = [ passthru.targetPkgs =
go [
gcc go
xorg.xorgproto gcc
util-linux xorg.xorgproto
util-linux
# for go generate # for go generate
wayland-protocols wayland-protocols
wayland-scanner wayland-scanner
] ]
++ buildInputs ++ buildInputs
++ nativeBuildInputs; ++ nativeBuildInputs;
} }