aboutsummaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorPierre Bourdon <delroth@gmail.com>2024-06-08 16:57:08 +0200
committerJade Lovelace <lix@jade.fyi>2024-06-12 15:34:22 -0700
commitf7b655269965ed30d2fb15d2da5f5e1b0c0a61b5 (patch)
treee57963217c25f4be9f9358dc3bd96be97745ada6 /tests
parentf46194faa2fc9c78250702c8eb7a4b756e0bd944 (diff)
[resubmit] flake: update nixpkgs pin 23.11->24.05 (+ boehmgc compat changes)
-- message from cl/1418 -- The boehmgc changes are bundled into this commit because doing otherwise would require an annoying dance of "adding compatibility for < 8.2.6 and >= 8.2.6" then updating the pin then removing the (now unneeded) compatibility. It doesn't seem worth the trouble to me given the low complexity of said changes. Rebased coroutine-sp-fallback.diff patch taken from https://github.com/NixOS/nixpkgs/pull/317227 -- jade resubmit changes -- This is a resubmission of https://gerrit.lix.systems/c/lix/+/1418, which was reverted in https://gerrit.lix.systems/c/lix/+/1432 for breaking CI evaluation without being detected. I have run `nix flake check -Lv` on this one before submission and it passes on my machine and crucially without eval errors, so the CI result should be accurate. It seems like someone renamed forbiddenDependenciesRegex to forbiddenDependenciesRegexes in nixpkgs and also changed the type incompatibly. That's pretty silly, but at least it's just an eval error. Also, `xonsh` regressed the availability of `xonsh-unwrapped`, but it was fixed by us in https://github.com/NixOS/nixpkgs/pull/317636, which is now in our channel, so we update nixpkgs compared to the original iteration of this to simply get that. We originally had a regression related to some reorganization of the nixpkgs lib test suite in which there was broken parameter passing. This, too, we got quickfixed in nixpkgs, so we don't need any changes for it: https://github.com/NixOS/nixpkgs/pull/317772 Related: https://gerrit.lix.systems/c/lix/+/1428 Fixes: https://git.lix.systems/lix-project/lix/issues/385 Change-Id: I26d41ea826fec900ebcad0f82a727feb6bcd28f3
Diffstat (limited to 'tests')
-rw-r--r--tests/nixos/default.nix38
-rw-r--r--tests/nixos/nix-upgrade-nix.nix4
2 files changed, 3 insertions, 39 deletions
diff --git a/tests/nixos/default.nix b/tests/nixos/default.nix
index 5e8bc69ce..301eede46 100644
--- a/tests/nixos/default.nix
+++ b/tests/nixos/default.nix
@@ -33,7 +33,7 @@ let
checkOverrideNixVersion = { pkgs, lib, ... }: {
# pkgs.nix: The new Nix in this repo
# We disallow it, to make sure we don't accidentally use it.
- system.forbiddenDependenciesRegex = lib.strings.escapeRegex "nix-${pkgs.nix.version}";
+ system.forbiddenDependenciesRegexes = [ (lib.strings.escapeRegex "nix-${pkgs.nix.version}") ];
};
in
@@ -53,15 +53,6 @@ in
};
};
- remoteBuilds_remote_2_13 = runNixOSTestFor "x86_64-linux" ({ lib, pkgs, ... }: {
- name = "remoteBuilds_remote_2_13";
- imports = [ ./remote-builds.nix ];
- builders.config = { lib, pkgs, ... }: {
- imports = [ checkOverrideNixVersion ];
- nix.package = lib.mkForce pkgs.nixVersions.nix_2_13;
- };
- });
-
remoteBuilds_remote_2_18 = runNixOSTestFor "x86_64-linux" ({ lib, pkgs, ... }: {
name = "remoteBuilds_remote_2_18";
imports = [ ./remote-builds.nix ];
@@ -82,15 +73,6 @@ in
};
});
- remoteBuilds_local_2_13 = runNixOSTestFor "x86_64-linux" ({ lib, pkgs, ... }: {
- name = "remoteBuilds_local_2_13";
- imports = [ ./remote-builds.nix ];
- nodes.client = { lib, pkgs, ... }: {
- imports = [ checkOverrideNixVersion ];
- nix.package = lib.mkForce pkgs.nixVersions.nix_2_13;
- };
- });
-
remoteBuilds_local_2_18 = runNixOSTestFor "x86_64-linux" ({ lib, pkgs, ... }: {
name = "remoteBuilds_local_2_18";
imports = [ ./remote-builds.nix ];
@@ -115,15 +97,6 @@ in
};
};
- remoteBuildsSshNg_remote_2_13 = runNixOSTestFor "x86_64-linux" {
- name = "remoteBuildsSshNg_remote_2_13";
- imports = [ ./remote-builds-ssh-ng.nix ];
- builders.config = { lib, pkgs, ... }: {
- imports = [ checkOverrideNixVersion ];
- nix.package = lib.mkForce pkgs.nixVersions.nix_2_13;
- };
- };
-
remoteBuildsSshNg_remote_2_18 = runNixOSTestFor "x86_64-linux" {
name = "remoteBuildsSshNg_remote_2_18";
imports = [ ./remote-builds-ssh-ng.nix ];
@@ -146,15 +119,6 @@ in
};
});
- remoteBuildsSshNg_local_2_13 = runNixOSTestFor "x86_64-linux" ({ lib, pkgs, ... }: {
- name = "remoteBuildsSshNg_local_2_13";
- imports = [ ./remote-builds-ssh-ng.nix ];
- nodes.client = { lib, pkgs, ... }: {
- imports = [ checkOverrideNixVersion ];
- nix.package = lib.mkForce pkgs.nixVersions.nix_2_13;
- };
- });
-
# TODO: (nixpkgs update) remoteBuildsSshNg_local_2_18 = ...
*/
diff --git a/tests/nixos/nix-upgrade-nix.nix b/tests/nixos/nix-upgrade-nix.nix
index 039b2d9b3..acccc2e03 100644
--- a/tests/nixos/nix-upgrade-nix.nix
+++ b/tests/nixos/nix-upgrade-nix.nix
@@ -11,7 +11,7 @@ let
lix = pkgs.nix;
lixVersion = lib.getVersion lix;
- newNix = pkgs.nixVersions.unstable;
+ newNix = pkgs.nixVersions.latest;
newNixVersion = lib.getVersion newNix;
in {
@@ -20,7 +20,7 @@ in {
nodes = {
machine = { config, lib, pkgs, ... }: {
virtualisation.writableStore = true;
- virtualisation.additionalPaths = [ pkgs.hello.drvPath ];
+ virtualisation.additionalPaths = [ pkgs.hello.drvPath newNix ];
nix.settings.substituters = lib.mkForce [ ];
nix.settings.experimental-features = [ "nix-command" "flakes" ];
services.getty.autologinUser = "root";