nixosTests: fix eval
This commit is contained in:
		
							parent
							
								
									30b71544af
								
							
						
					
					
						commit
						fb24b403c1
					
				| @ -616,8 +616,14 @@ in | ||||
|   pyload = runTest ./pyload.nix; | ||||
|   oci-containers = handleTestOn [ "aarch64-linux" "x86_64-linux" ] ./oci-containers.nix { }; | ||||
|   odoo = runTest ./odoo.nix; | ||||
|   odoo17 = handleTest ./odoo.nix { package = pkgs.odoo17; }; | ||||
|   odoo16 = handleTest ./odoo.nix { package = pkgs.odoo16; }; | ||||
|   odoo17 = runTest { | ||||
|     imports = [ ./odoo.nix ]; | ||||
|     _module.args.package = pkgs.odoo17; | ||||
|   }; | ||||
|   odoo16 = runTest { | ||||
|     imports = [ ./odoo.nix ]; | ||||
|     _module.args.package = pkgs.odoo16; | ||||
|   }; | ||||
|   oncall = runTest ./web-apps/oncall.nix; | ||||
|   # 9pnet_virtio used to mount /nix partition doesn't support | ||||
|   # hibernation. This test happens to work on x86_64-linux but | ||||
| @ -1297,8 +1303,9 @@ in | ||||
|   systemd-initrd-btrfs-raid = runTest ./systemd-initrd-btrfs-raid.nix; | ||||
|   systemd-initrd-luks-fido2 = runTest ./systemd-initrd-luks-fido2.nix; | ||||
|   systemd-initrd-luks-keyfile = runTest ./systemd-initrd-luks-keyfile.nix; | ||||
|   systemd-initrd-luks-empty-passphrase = handleTest ./initrd-luks-empty-passphrase.nix { | ||||
|     systemdStage1 = true; | ||||
|   systemd-initrd-luks-empty-passphrase = runTest { | ||||
|     imports = [ ./initrd-luks-empty-passphrase.nix ]; | ||||
|     _module.args.systemdStage1 = true; | ||||
|   }; | ||||
|   systemd-initrd-luks-password = runTest ./systemd-initrd-luks-password.nix; | ||||
|   systemd-initrd-luks-tpm2 = runTest ./systemd-initrd-luks-tpm2.nix; | ||||
| @ -1310,7 +1317,10 @@ in | ||||
|     "x86_64-linux" | ||||
|     "i686-linux" | ||||
|   ] ./initrd-network-openvpn { systemdStage1 = true; }; | ||||
|   systemd-initrd-shutdown = handleTest ./systemd-shutdown.nix { systemdStage1 = true; }; | ||||
|   systemd-initrd-shutdown = runTest { | ||||
|     imports = [ ./systemd-shutdown.nix ]; | ||||
|     _module.args.systemdStage1 = true; | ||||
|   }; | ||||
|   systemd-initrd-simple = runTest ./systemd-initrd-simple.nix; | ||||
|   systemd-initrd-swraid = runTest ./systemd-initrd-swraid.nix; | ||||
|   systemd-initrd-vconsole = runTest ./systemd-initrd-vconsole.nix; | ||||
|  | ||||
| @ -3,6 +3,8 @@ | ||||
|   name = "breitbandmessung"; | ||||
|   meta.maintainers = with lib.maintainers; [ b4dm4n ]; | ||||
| 
 | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { pkgs, ... }: | ||||
|     { | ||||
|  | ||||
| @ -1,34 +1,30 @@ | ||||
| # integration tests for brscan5 sane driver | ||||
| # | ||||
| 
 | ||||
| { pkgs, ... }: | ||||
| { lib, ... }: | ||||
| { | ||||
|   name = "brscan5"; | ||||
|   meta = with pkgs.lib.maintainers; { | ||||
|     maintainers = [ mattchrist ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ mattchrist ]; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { pkgs, ... }: | ||||
|     { | ||||
|       nixpkgs.config.allowUnfree = true; | ||||
|       hardware.sane = { | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.machine = { | ||||
|     nixpkgs.config.allowUnfree = true; | ||||
|     hardware.sane = { | ||||
|       enable = true; | ||||
|       brscan5 = { | ||||
|         enable = true; | ||||
|         brscan5 = { | ||||
|           enable = true; | ||||
|           netDevices = { | ||||
|             "a" = { | ||||
|               model = "ADS-1200"; | ||||
|               nodename = "BRW0080927AFBCE"; | ||||
|             }; | ||||
|             "b" = { | ||||
|               model = "ADS-1200"; | ||||
|               ip = "192.168.1.2"; | ||||
|             }; | ||||
|         netDevices = { | ||||
|           "a" = { | ||||
|             model = "ADS-1200"; | ||||
|             nodename = "BRW0080927AFBCE"; | ||||
|           }; | ||||
|           "b" = { | ||||
|             model = "ADS-1200"; | ||||
|             ip = "192.168.1.2"; | ||||
|           }; | ||||
|         }; | ||||
|       }; | ||||
|     }; | ||||
|   }; | ||||
| 
 | ||||
|   testScript = '' | ||||
|     import re | ||||
|  | ||||
| @ -1,4 +1,4 @@ | ||||
| { pkgs, lib, ... }: | ||||
| { lib, ... }: | ||||
| 
 | ||||
| let | ||||
|   # Settings for both servers and agents | ||||
| @ -117,6 +117,8 @@ in | ||||
| { | ||||
|   name = "consul"; | ||||
| 
 | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes = { | ||||
|     server1 = server 0; | ||||
|     server2 = server 1; | ||||
|  | ||||
| @ -1,4 +1,4 @@ | ||||
| { pkgs, lib, ... }: | ||||
| { lib, ... }: | ||||
| let | ||||
|   httpPort = 800; | ||||
| in | ||||
| @ -9,24 +9,19 @@ in | ||||
|     bjornfor | ||||
|   ]; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { | ||||
|       config, | ||||
|       pkgs, | ||||
|       lib, | ||||
|       ... | ||||
|     }: | ||||
|     { | ||||
|       nixpkgs.config.allowUnfree = true; | ||||
|       services.deconz = { | ||||
|         enable = true; | ||||
|         inherit httpPort; | ||||
|         extraArgs = [ | ||||
|           "--dbg-err=2" | ||||
|           "--dbg-info=2" | ||||
|         ]; | ||||
|       }; | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.machine = { | ||||
|     nixpkgs.config.allowUnfree = true; | ||||
|     services.deconz = { | ||||
|       enable = true; | ||||
|       inherit httpPort; | ||||
|       extraArgs = [ | ||||
|         "--dbg-err=2" | ||||
|         "--dbg-info=2" | ||||
|       ]; | ||||
|     }; | ||||
|   }; | ||||
| 
 | ||||
|   testScript = '' | ||||
|     machine.wait_for_unit("deconz.service") | ||||
|  | ||||
| @ -4,9 +4,9 @@ | ||||
| #  3. replying to that message via email. | ||||
| 
 | ||||
| { | ||||
|   package, | ||||
|   pkgs, | ||||
|   lib, | ||||
|   package ? pkgs.discourse, | ||||
|   ... | ||||
| }: | ||||
| let | ||||
| @ -24,9 +24,9 @@ let | ||||
| in | ||||
| { | ||||
|   name = "discourse"; | ||||
|   meta = with pkgs.lib.maintainers; { | ||||
|     maintainers = [ talyz ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ talyz ]; | ||||
| 
 | ||||
|   _module.args.package = lib.mkDefault pkgs.discourse; | ||||
| 
 | ||||
|   nodes.discourse = | ||||
|     { nodes, ... }: | ||||
| @ -62,7 +62,7 @@ in | ||||
| 
 | ||||
|       services.discourse = { | ||||
|         enable = true; | ||||
|         inherit admin package; | ||||
|         inherit admin; | ||||
|         hostname = discourseDomain; | ||||
|         sslCertificate = "${certs.${discourseDomain}.cert}"; | ||||
|         sslCertificateKey = "${certs.${discourseDomain}.key}"; | ||||
|  | ||||
| @ -1,28 +1,15 @@ | ||||
| { | ||||
|   system ? builtins.currentSystem, | ||||
|   config ? { }, | ||||
|   pkgs ? import ../.. { inherit system config; }, | ||||
| }: | ||||
| { lib, pkgs, ... }: | ||||
| { lib, ... }: | ||||
| { | ||||
|   name = "fanout"; | ||||
|   meta.maintainers = [ lib.maintainers.therishidesai ]; | ||||
|   meta.maintainers = with lib.maintainers; [ therishidesai ]; | ||||
| 
 | ||||
|   nodes = | ||||
|     let | ||||
|       cfg = | ||||
|         { ... }: | ||||
|         { | ||||
|           services.fanout = { | ||||
|             enable = true; | ||||
|             fanoutDevices = 2; | ||||
|             bufferSize = 8192; | ||||
|           }; | ||||
|         }; | ||||
|     in | ||||
|     { | ||||
|       machine = cfg; | ||||
|   nodes.machine = { | ||||
|     services.fanout = { | ||||
|       enable = true; | ||||
|       fanoutDevices = 2; | ||||
|       bufferSize = 8192; | ||||
|     }; | ||||
|   }; | ||||
| 
 | ||||
|   testScript = '' | ||||
|     start_all() | ||||
|  | ||||
| @ -3,6 +3,8 @@ | ||||
|   name = "gnome-extensions"; | ||||
|   meta.maintainers = [ ]; | ||||
| 
 | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { pkgs, ... }: | ||||
|     { | ||||
| @ -21,16 +23,14 @@ | ||||
| 
 | ||||
|       # Configure GDM | ||||
|       services.xserver.enable = true; | ||||
|       services.xserver.displayManager = { | ||||
|         gdm = { | ||||
|           enable = true; | ||||
|           debug = true; | ||||
|           wayland = true; | ||||
|         }; | ||||
|         autoLogin = { | ||||
|           enable = true; | ||||
|           user = "alice"; | ||||
|         }; | ||||
|       services.xserver.displayManager.gdm = { | ||||
|         enable = true; | ||||
|         debug = true; | ||||
|         wayland = true; | ||||
|       }; | ||||
|       services.displayManager.autoLogin = { | ||||
|         enable = true; | ||||
|         user = "alice"; | ||||
|       }; | ||||
| 
 | ||||
|       # Configure Gnome | ||||
|  | ||||
| @ -1,22 +1,21 @@ | ||||
| { | ||||
|   system ? builtins.currentSystem, | ||||
|   config ? { }, | ||||
|   pkgs ? import ../.. { inherit system config; }, | ||||
|   systemdStage1 ? false, | ||||
|   systemdStage1, | ||||
|   lib, | ||||
|   pkgs, | ||||
|   ... | ||||
| }: | ||||
| { lib, pkgs, ... }: | ||||
| let | ||||
| 
 | ||||
|   keyfile = pkgs.writeText "luks-keyfile" '' | ||||
|     MIGHAoGBAJ4rGTSo/ldyjQypd0kuS7k2OSsmQYzMH6TNj3nQ/vIUjDn7fqa3slt2 | ||||
|     gV6EK3TmTbGc4tzC1v4SWx2m+2Bjdtn4Fs4wiBwn1lbRdC6i5ZYCqasTWIntWn+6 | ||||
|     FllUkMD5oqjOR/YcboxG8Z3B5sJuvTP9llsF+gnuveWih9dpbBr7AgEC | ||||
|   ''; | ||||
| 
 | ||||
| in | ||||
| { | ||||
|   name = "initrd-luks-empty-passphrase"; | ||||
| 
 | ||||
|   _module.args.systemdStage1 = lib.mkDefault false; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { pkgs, ... }: | ||||
|     { | ||||
|  | ||||
| @ -3,12 +3,12 @@ let | ||||
|   rcon-pass = "foobar"; | ||||
|   rcon-port = 43000; | ||||
| in | ||||
| { pkgs, ... }: | ||||
| { lib, pkgs, ... }: | ||||
| { | ||||
|   name = "minecraft-server"; | ||||
|   meta = with pkgs.lib.maintainers; { | ||||
|     maintainers = [ nequissimus ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ nequissimus ]; | ||||
| 
 | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.server = | ||||
|     { ... }: | ||||
|  | ||||
| @ -1,37 +1,33 @@ | ||||
| { | ||||
|   pkgs, | ||||
|   package, | ||||
|   lib, | ||||
|   package ? pkgs.odoo, | ||||
|   pkgs, | ||||
|   ... | ||||
| }: | ||||
| { | ||||
|   name = "odoo"; | ||||
|   meta.maintainers = with lib.maintainers; [ mkg20001 ]; | ||||
| 
 | ||||
|   nodes = { | ||||
|     server = | ||||
|       { ... }: | ||||
|       { | ||||
|         services.nginx = { | ||||
|           enable = true; | ||||
|           recommendedProxySettings = true; | ||||
|         }; | ||||
|   _module.args.package = lib.mkDefault pkgs.odoo; | ||||
| 
 | ||||
|         services.odoo = { | ||||
|           enable = true; | ||||
|           package = package; | ||||
|           autoInit = true; | ||||
|           autoInitExtraFlags = [ "--without-demo=all" ]; | ||||
|           domain = "localhost"; | ||||
|         }; | ||||
|       }; | ||||
|   nodes.server = { | ||||
|     services.nginx = { | ||||
|       enable = true; | ||||
|       recommendedProxySettings = true; | ||||
|     }; | ||||
| 
 | ||||
|     services.odoo = { | ||||
|       enable = true; | ||||
|       package = package; | ||||
|       autoInit = true; | ||||
|       autoInitExtraFlags = [ "--without-demo=all" ]; | ||||
|       domain = "localhost"; | ||||
|     }; | ||||
|   }; | ||||
| 
 | ||||
|   testScript = | ||||
|     { nodes, ... }: | ||||
|     '' | ||||
|       server.wait_for_unit("odoo.service") | ||||
|       server.wait_until_succeeds("curl -s http://localhost:8069/web/database/selector | grep '<title>Odoo</title>'") | ||||
|       server.succeed("curl -s http://localhost/web/database/selector | grep '<title>Odoo</title>'") | ||||
|     ''; | ||||
|   testScript = '' | ||||
|     server.wait_for_unit("odoo.service") | ||||
|     server.wait_until_succeeds("curl -s http://localhost:8069/web/database/selector | grep '<title>Odoo</title>'") | ||||
|     server.succeed("curl -s http://localhost/web/database/selector | grep '<title>Odoo</title>'") | ||||
|   ''; | ||||
| } | ||||
|  | ||||
| @ -54,7 +54,7 @@ in | ||||
|   name = "openldap"; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { pkgs, ... }: | ||||
|     { config, pkgs, ... }: | ||||
|     { | ||||
|       environment.etc."openldap/root_password".text = "notapassword"; | ||||
| 
 | ||||
| @ -124,6 +124,8 @@ in | ||||
|           configuration = | ||||
|             { ... }: | ||||
|             { | ||||
|               nixpkgs.hostPlatform = config.nixpkgs.hostPlatform; | ||||
| 
 | ||||
|               users.ldap = ldapClientConfig; | ||||
|               services.openldap = { | ||||
|                 enable = true; | ||||
| @ -133,6 +135,7 @@ in | ||||
|         }; | ||||
|       }; | ||||
|     }; | ||||
| 
 | ||||
|   testScript = | ||||
|     { nodes, ... }: | ||||
|     let | ||||
|  | ||||
| @ -15,28 +15,28 @@ in | ||||
| 
 | ||||
|   meta.maintainers = lib.teams.cyberus.members; | ||||
| 
 | ||||
|   nodes = { | ||||
|     outline = | ||||
|       { pkgs, config, ... }: | ||||
|       { | ||||
|         nixpkgs.config.allowUnfree = true; | ||||
|         environment.systemPackages = [ pkgs.minio-client ]; | ||||
|         services.outline = { | ||||
|           enable = true; | ||||
|           forceHttps = false; | ||||
|           storage = { | ||||
|             inherit accessKey secretKeyFile; | ||||
|             uploadBucketUrl = "http://localhost:9000"; | ||||
|             uploadBucketName = "outline"; | ||||
|             region = config.services.minio.region; | ||||
|           }; | ||||
|         }; | ||||
|         services.minio = { | ||||
|           enable = true; | ||||
|           inherit rootCredentialsFile; | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.outline = | ||||
|     { pkgs, config, ... }: | ||||
|     { | ||||
|       nixpkgs.config.allowUnfree = true; | ||||
|       environment.systemPackages = [ pkgs.minio-client ]; | ||||
|       services.outline = { | ||||
|         enable = true; | ||||
|         forceHttps = false; | ||||
|         storage = { | ||||
|           inherit accessKey secretKeyFile; | ||||
|           uploadBucketUrl = "http://localhost:9000"; | ||||
|           uploadBucketName = "outline"; | ||||
|           region = config.services.minio.region; | ||||
|         }; | ||||
|       }; | ||||
|   }; | ||||
|       services.minio = { | ||||
|         enable = true; | ||||
|         inherit rootCredentialsFile; | ||||
|       }; | ||||
|     }; | ||||
| 
 | ||||
|   testScript = '' | ||||
|     machine.wait_for_unit("minio.service") | ||||
|  | ||||
| @ -1,7 +1,5 @@ | ||||
| { pkgs, lib, ... }: | ||||
| 
 | ||||
| { lib, ... }: | ||||
| let | ||||
| 
 | ||||
|   # Build Quake with coverage instrumentation. | ||||
|   overrides = pkgs: { | ||||
|     quake3game = pkgs.quake3game.override (args: { | ||||
| @ -23,7 +21,6 @@ let | ||||
| 
 | ||||
|   client = | ||||
|     { pkgs, ... }: | ||||
| 
 | ||||
|     { | ||||
|       imports = [ ./common/x11.nix ]; | ||||
|       hardware.graphics.enable = true; | ||||
| @ -31,14 +28,12 @@ let | ||||
|       nixpkgs.config.packageOverrides = overrides; | ||||
|       nixpkgs.config.allowUnfreePredicate = unfreePredicate; | ||||
|     }; | ||||
| 
 | ||||
| in | ||||
| 
 | ||||
| rec { | ||||
| { | ||||
|   name = "quake3"; | ||||
|   meta = with lib.maintainers; { | ||||
|     maintainers = [ domenkozar ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ domenkozar ]; | ||||
| 
 | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   # TODO: lcov doesn't work atm | ||||
|   #makeCoverageReport = true; | ||||
| @ -46,7 +41,6 @@ rec { | ||||
|   nodes = { | ||||
|     server = | ||||
|       { pkgs, ... }: | ||||
| 
 | ||||
|       { | ||||
|         systemd.services.quake3-server = { | ||||
|           wantedBy = [ "multi-user.target" ]; | ||||
| @ -96,5 +90,4 @@ rec { | ||||
|     client2.shutdown() | ||||
|     server.stop_job("quake3-server") | ||||
|   ''; | ||||
| 
 | ||||
| } | ||||
|  | ||||
| @ -1,12 +1,12 @@ | ||||
| { pkgs, lib, ... }: | ||||
| { lib, ... }: | ||||
| { | ||||
|   name = "sabnzbd"; | ||||
|   meta = with pkgs.lib; { | ||||
|     maintainers = with maintainers; [ jojosch ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ jojosch ]; | ||||
| 
 | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { pkgs, ... }: | ||||
|     { lib, ... }: | ||||
|     { | ||||
|       services.sabnzbd = { | ||||
|         enable = true; | ||||
|  | ||||
| @ -43,9 +43,9 @@ let | ||||
| in | ||||
| { | ||||
|   name = "squid"; | ||||
|   meta = with pkgs.lib.maintainers; { | ||||
|     maintainers = [ cobalt ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ cobalt ]; | ||||
| 
 | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes = { | ||||
|     client = | ||||
|  | ||||
| @ -1,14 +1,14 @@ | ||||
| { | ||||
|   pkgs, | ||||
|   latestKernel ? false, | ||||
|   latestKernel, | ||||
|   lib, | ||||
|   ... | ||||
| }: | ||||
| 
 | ||||
| { | ||||
|   name = "systemd-analyze"; | ||||
|   meta = with pkgs.lib.maintainers; { | ||||
|     maintainers = [ raskin ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ raskin ]; | ||||
| 
 | ||||
|   _module.args.latestKernel = lib.mkDefault false; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { pkgs, lib, ... }: | ||||
|  | ||||
| @ -1,6 +1,7 @@ | ||||
| { | ||||
|   systemdStage1, | ||||
|   lib, | ||||
|   pkgs, | ||||
|   systemdStage1 ? false, | ||||
|   ... | ||||
| }: | ||||
| let | ||||
| @ -8,9 +9,9 @@ let | ||||
| in | ||||
| { | ||||
|   name = "systemd-shutdown"; | ||||
|   meta = with pkgs.lib.maintainers; { | ||||
|     maintainers = [ das_j ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ das_j ]; | ||||
| 
 | ||||
|   _module.args.systemdStage1 = lib.mkDefault false; | ||||
| 
 | ||||
|   nodes.machine = { | ||||
|     imports = [ ../modules/profiles/minimal.nix ]; | ||||
|  | ||||
| @ -10,20 +10,23 @@ let | ||||
|       (lib.take 2) | ||||
|       (lib.concatStringsSep ".") | ||||
|     ]; | ||||
|   oldApiVersion = apiVersion pkgs."${oldNetbox}".version; | ||||
|   newApiVersion = apiVersion pkgs."${newNetbox}".version; | ||||
|   oldApiVersion = apiVersion pkgs.${oldNetbox}.version; | ||||
|   newApiVersion = apiVersion pkgs.${newNetbox}.version; | ||||
| in | ||||
| { | ||||
|   name = "netbox-upgrade"; | ||||
| 
 | ||||
|   meta = with lib.maintainers; { | ||||
|     maintainers = [ | ||||
|       minijackson | ||||
|       raitobezarius | ||||
|     ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ | ||||
|     minijackson | ||||
|     raitobezarius | ||||
|   ]; | ||||
| 
 | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     let | ||||
|       pkgs' = pkgs; | ||||
|     in | ||||
|     { config, pkgs, ... }: | ||||
|     { | ||||
|       virtualisation.memorySize = 2048; | ||||
| @ -31,7 +34,7 @@ in | ||||
|         enable = true; | ||||
|         # Pick the NetBox package from this config's "pkgs" argument, | ||||
|         # so that `nixpkgs.config.permittedInsecurePackages` works | ||||
|         package = pkgs."${oldNetbox}"; | ||||
|         package = pkgs.${oldNetbox}; | ||||
|         secretKeyFile = pkgs.writeText "secret" '' | ||||
|           abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789 | ||||
|         ''; | ||||
| @ -53,9 +56,9 @@ in | ||||
| 
 | ||||
|       networking.firewall.allowedTCPPorts = [ 80 ]; | ||||
| 
 | ||||
|       nixpkgs.config.permittedInsecurePackages = [ pkgs."${oldNetbox}".name ]; | ||||
|       nixpkgs.config.permittedInsecurePackages = [ pkgs'.${oldNetbox}.name ]; | ||||
| 
 | ||||
|       specialisation.upgrade.configuration.services.netbox.package = lib.mkForce pkgs."${newNetbox}"; | ||||
|       specialisation.upgrade.configuration.services.netbox.package = lib.mkForce pkgs.${newNetbox}; | ||||
|     }; | ||||
| 
 | ||||
|   testScript = | ||||
|  | ||||
| @ -1,30 +1,28 @@ | ||||
| { lib, ... }: | ||||
| { | ||||
|   name = "without-nix"; | ||||
|   meta = with lib.maintainers; { | ||||
|     maintainers = [ ericson2314 ]; | ||||
|   }; | ||||
|   meta.maintainers = with lib.maintainers; [ ericson2314 ]; | ||||
| 
 | ||||
|   nodes.machine = | ||||
|     { ... }: | ||||
|     { | ||||
|       nix.enable = false; | ||||
|       nixpkgs.overlays = [ | ||||
|         (self: super: { | ||||
|           nix = throw "don't want to use pkgs.nix"; | ||||
|           nixVersions = lib.mapAttrs (k: throw "don't want to use pkgs.nixVersions.${k}") super.nixVersions; | ||||
|           # aliases, some deprecated | ||||
|           nix_2_3 = throw "don't want to use pkgs.nix_2_3"; | ||||
|           nix_2_4 = throw "don't want to use pkgs.nix_2_4"; | ||||
|           nix_2_5 = throw "don't want to use pkgs.nix_2_5"; | ||||
|           nix_2_6 = throw "don't want to use pkgs.nix_2_6"; | ||||
|           nixFlakes = throw "don't want to use pkgs.nixFlakes"; | ||||
|           nixStable = throw "don't want to use pkgs.nixStable"; | ||||
|           nixUnstable = throw "don't want to use pkgs.nixUnstable"; | ||||
|           nixStatic = throw "don't want to use pkgs.nixStatic"; | ||||
|         }) | ||||
|       ]; | ||||
|     }; | ||||
|   node.pkgsReadOnly = false; | ||||
| 
 | ||||
|   nodes.machine = { | ||||
|     nix.enable = false; | ||||
|     nixpkgs.overlays = [ | ||||
|       (self: super: { | ||||
|         nix = throw "don't want to use pkgs.nix"; | ||||
|         nixVersions = lib.mapAttrs (k: throw "don't want to use pkgs.nixVersions.${k}") super.nixVersions; | ||||
|         # aliases, some deprecated | ||||
|         nix_2_3 = throw "don't want to use pkgs.nix_2_3"; | ||||
|         nix_2_4 = throw "don't want to use pkgs.nix_2_4"; | ||||
|         nix_2_5 = throw "don't want to use pkgs.nix_2_5"; | ||||
|         nix_2_6 = throw "don't want to use pkgs.nix_2_6"; | ||||
|         nixFlakes = throw "don't want to use pkgs.nixFlakes"; | ||||
|         nixStable = throw "don't want to use pkgs.nixStable"; | ||||
|         nixUnstable = throw "don't want to use pkgs.nixUnstable"; | ||||
|         nixStatic = throw "don't want to use pkgs.nixStatic"; | ||||
|       }) | ||||
|     ]; | ||||
|   }; | ||||
| 
 | ||||
|   testScript = '' | ||||
|     start_all() | ||||
|  | ||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user
	 Sizhe Zhao
						Sizhe Zhao