Compare commits

..

2 Commits

Author SHA1 Message Date
bd3fa53a55
container: access test case by index in helper
All checks were successful
Test / Create distribution (push) Successful in 24s
Test / Hakurei (push) Successful in 40s
Test / Sandbox (push) Successful in 38s
Test / Hakurei (race detector) (push) Successful in 41s
Test / Sandbox (race detector) (push) Successful in 38s
Test / Planterette (push) Successful in 39s
Test / Flake checks (push) Successful in 1m17s
This is more elegant and allows for much easier extension of the tests. Mountinfo is still serialised however due to libPaths nondeterminism.

Signed-off-by: Ophestra <cat@gensokyo.uk>
2025-07-26 18:59:19 +09:00
625632c593
nix: update flake lock
All checks were successful
Test / Create distribution (push) Successful in 39s
Test / Sandbox (race detector) (push) Successful in 50s
Test / Sandbox (push) Successful in 52s
Test / Planterette (push) Successful in 50s
Test / Hakurei (race detector) (push) Successful in 57s
Test / Hakurei (push) Successful in 59s
Test / Flake checks (push) Successful in 1m53s
Signed-off-by: Ophestra <cat@gensokyo.uk>
2025-07-26 18:57:54 +09:00
3 changed files with 46 additions and 49 deletions

View File

@ -215,15 +215,14 @@ stdenv.mkDerivation {
# create binary cache # create binary cache
closureInfo="${ closureInfo="${
closureInfo { closureInfo {
rootPaths = rootPaths = [
[ homeManagerConfiguration.activationPackage
homeManagerConfiguration.activationPackage launcher
launcher ]
] ++ optionals gpu [
++ optionals gpu [ mesaWrappers
mesaWrappers nixGL
nixGL ];
];
} }
}" }"
echo "copying application paths..." echo "copying application paths..."

View File

@ -82,7 +82,8 @@ in
own = [ own = [
"${id}.*" "${id}.*"
"org.mpris.MediaPlayer2.${id}.*" "org.mpris.MediaPlayer2.${id}.*"
] ++ ext.own; ]
++ ext.own;
inherit (ext) call broadcast; inherit (ext) call broadcast;
}; };
@ -175,27 +176,26 @@ in
auto_etc = true; auto_etc = true;
cover = [ "/var/run/nscd" ]; cover = [ "/var/run/nscd" ];
symlink = symlink = [
[
"*/run/current-system"
"/run/current-system"
]
]
++ optionals (isGraphical && config.hardware.graphics.enable) (
[ [
[ [
"*/run/current-system" config.systemd.tmpfiles.settings.graphics-driver."/run/opengl-driver"."L+".argument
"/run/current-system" "/run/opengl-driver"
] ]
] ]
++ optionals (isGraphical && config.hardware.graphics.enable) ( ++ optionals (app.multiarch && config.hardware.graphics.enable32Bit) [
[ [
[ config.systemd.tmpfiles.settings.graphics-driver."/run/opengl-driver-32"."L+".argument
config.systemd.tmpfiles.settings.graphics-driver."/run/opengl-driver"."L+".argument /run/opengl-driver-32
"/run/opengl-driver"
]
] ]
++ optionals (app.multiarch && config.hardware.graphics.enable32Bit) [ ]
[ );
config.systemd.tmpfiles.settings.graphics-driver."/run/opengl-driver-32"."L+".argument
/run/opengl-driver-32
]
]
);
}; };
}; };

View File

@ -83,18 +83,17 @@ buildGoModule rec {
# nix build environment does not allow acls # nix build environment does not allow acls
env.GO_TEST_SKIP_ACL = 1; env.GO_TEST_SKIP_ACL = 1;
buildInputs = buildInputs = [
[ libffi
libffi libseccomp
libseccomp acl
acl wayland
wayland ]
] ++ (with xorg; [
++ (with xorg; [ libxcb
libxcb libXau
libXau libXdmcp
libXdmcp ]);
]);
nativeBuildInputs = [ nativeBuildInputs = [
pkg-config pkg-config
@ -130,17 +129,16 @@ buildGoModule rec {
} }
''; '';
passthru.targetPkgs = passthru.targetPkgs = [
[ go
go gcc
gcc xorg.xorgproto
xorg.xorgproto util-linux
util-linux
# for go generate # for go generate
wayland-protocols wayland-protocols
wayland-scanner wayland-scanner
] ]
++ buildInputs ++ buildInputs
++ nativeBuildInputs; ++ nativeBuildInputs;
} }