2014-05-01 13:52:07 +01:00
|
|
|
|
{ nixpkgs ? { outPath = ./..; revCount = 56789; shortRev = "gfedcba"; }
|
2013-10-10 11:16:20 +01:00
|
|
|
|
, stableBranch ? false
|
2014-04-21 02:06:54 +01:00
|
|
|
|
, supportedSystems ? [ "x86_64-linux" "i686-linux" ]
|
2012-04-09 13:49:03 +01:00
|
|
|
|
}:
|
2012-04-05 14:00:30 +01:00
|
|
|
|
|
2012-02-23 12:00:05 +00:00
|
|
|
|
let
|
|
|
|
|
|
2013-10-01 12:45:14 +01:00
|
|
|
|
version = builtins.readFile ../.version;
|
2013-10-10 11:16:20 +01:00
|
|
|
|
versionSuffix =
|
2014-05-01 13:52:07 +01:00
|
|
|
|
(if stableBranch then "." else "pre") + "${toString nixpkgs.revCount}.${nixpkgs.shortRev}";
|
2013-03-26 13:00:31 +00:00
|
|
|
|
|
2014-04-21 02:06:54 +01:00
|
|
|
|
forAllSystems = pkgs.lib.genAttrs supportedSystems;
|
2013-10-31 07:48:57 +00:00
|
|
|
|
|
2014-09-22 15:58:02 +01:00
|
|
|
|
scrubDrv = drv: let res = { inherit (drv) drvPath outPath type name system meta; outputName = "out"; out = res; }; in res;
|
2014-09-17 18:12:41 +01:00
|
|
|
|
|
|
|
|
|
callTest = fn: args: forAllSystems (system: scrubDrv (import fn ({ inherit system; } // args)));
|
2014-04-14 13:02:44 +01:00
|
|
|
|
|
2013-10-01 14:48:39 +01:00
|
|
|
|
pkgs = import nixpkgs { system = "x86_64-linux"; };
|
2012-04-10 21:28:06 +01:00
|
|
|
|
|
2013-10-31 07:48:57 +00:00
|
|
|
|
lib = pkgs.lib;
|
|
|
|
|
|
2012-02-23 12:00:05 +00:00
|
|
|
|
|
2013-07-02 12:33:27 +01:00
|
|
|
|
versionModule =
|
2013-10-24 18:58:34 +01:00
|
|
|
|
{ system.nixosVersionSuffix = versionSuffix;
|
|
|
|
|
system.nixosRevision = nixpkgs.rev or nixpkgs.shortRev;
|
|
|
|
|
};
|
2013-07-02 12:33:27 +01:00
|
|
|
|
|
|
|
|
|
|
2012-02-23 12:00:05 +00:00
|
|
|
|
makeIso =
|
2013-03-26 13:00:31 +00:00
|
|
|
|
{ module, type, description ? type, maintainers ? ["eelco"], system }:
|
2012-02-23 12:00:05 +00:00
|
|
|
|
|
2013-10-01 14:48:39 +01:00
|
|
|
|
with import nixpkgs { inherit system; };
|
2012-02-23 12:00:05 +00:00
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
|
|
config = (import lib/eval-config.nix {
|
2012-03-04 20:57:34 +00:00
|
|
|
|
inherit system;
|
2013-07-02 12:33:27 +01:00
|
|
|
|
modules = [ module versionModule { isoImage.isoBaseName = "nixos-${type}"; } ];
|
2012-02-23 12:00:05 +00:00
|
|
|
|
}).config;
|
|
|
|
|
|
|
|
|
|
iso = config.system.build.isoImage;
|
|
|
|
|
|
|
|
|
|
in
|
|
|
|
|
# Declare the ISO as a build product so that it shows up in Hydra.
|
2014-09-17 18:12:41 +01:00
|
|
|
|
scrubDrv (runCommand "nixos-iso-${config.system.nixosVersion}"
|
2012-02-23 12:00:05 +00:00
|
|
|
|
{ meta = {
|
|
|
|
|
description = "NixOS installation CD (${description}) - ISO image for ${system}";
|
|
|
|
|
maintainers = map (x: lib.getAttr x lib.maintainers) maintainers;
|
|
|
|
|
};
|
|
|
|
|
inherit iso;
|
|
|
|
|
passthru = { inherit config; };
|
|
|
|
|
}
|
|
|
|
|
''
|
2013-07-01 23:23:48 +01:00
|
|
|
|
mkdir -p $out/nix-support
|
2012-02-23 12:00:05 +00:00
|
|
|
|
echo "file iso" $iso/iso/*.iso* >> $out/nix-support/hydra-build-products
|
2014-09-17 18:12:41 +01:00
|
|
|
|
''); # */
|
2012-02-23 12:00:05 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
makeSystemTarball =
|
2013-03-26 13:00:31 +00:00
|
|
|
|
{ module, maintainers ? ["viric"], system }:
|
|
|
|
|
|
2013-10-01 14:48:39 +01:00
|
|
|
|
with import nixpkgs { inherit system; };
|
2012-02-23 12:00:05 +00:00
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
|
|
config = (import lib/eval-config.nix {
|
2012-03-04 20:57:34 +00:00
|
|
|
|
inherit system;
|
2012-02-23 12:00:05 +00:00
|
|
|
|
modules = [ module versionModule ];
|
|
|
|
|
}).config;
|
|
|
|
|
|
|
|
|
|
tarball = config.system.build.tarball;
|
2013-07-02 12:33:27 +01:00
|
|
|
|
|
2012-02-23 12:00:05 +00:00
|
|
|
|
in
|
|
|
|
|
tarball //
|
|
|
|
|
{ meta = {
|
|
|
|
|
description = "NixOS system tarball for ${system} - ${stdenv.platform.name}";
|
|
|
|
|
maintainers = map (x: lib.getAttr x lib.maintainers) maintainers;
|
|
|
|
|
};
|
|
|
|
|
inherit config;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
2014-09-18 15:21:00 +01:00
|
|
|
|
makeClosure = module: buildFromConfig module (config: config.system.build.toplevel);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
buildFromConfig = module: sel: forAllSystems (system: scrubDrv (sel (import ./lib/eval-config.nix {
|
2014-08-22 10:37:31 +01:00
|
|
|
|
inherit system;
|
2014-09-18 15:21:00 +01:00
|
|
|
|
modules = [ module versionModule ] ++ lib.singleton
|
2014-08-22 10:37:31 +01:00
|
|
|
|
({ config, lib, ... }:
|
|
|
|
|
{ fileSystems."/".device = lib.mkDefault "/dev/sda1";
|
|
|
|
|
boot.loader.grub.device = lib.mkDefault "/dev/sda";
|
|
|
|
|
});
|
2014-09-18 15:21:00 +01:00
|
|
|
|
}).config));
|
2014-08-22 10:37:31 +01:00
|
|
|
|
|
|
|
|
|
|
2013-10-24 18:31:51 +01:00
|
|
|
|
in rec {
|
2008-12-17 13:25:23 +00:00
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
channel =
|
|
|
|
|
pkgs.releaseTools.makeSourceTarball {
|
|
|
|
|
name = "nixos-channel";
|
2012-04-09 13:49:03 +01:00
|
|
|
|
|
2013-10-01 14:48:39 +01:00
|
|
|
|
src = nixpkgs;
|
2012-04-09 13:49:03 +01:00
|
|
|
|
|
2013-10-10 11:16:20 +01:00
|
|
|
|
officialRelease = false; # FIXME: fix this in makeSourceTarball
|
|
|
|
|
inherit version versionSuffix;
|
2012-04-09 13:49:03 +01:00
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
buildInputs = [ pkgs.nixUnstable ];
|
2008-12-17 13:25:23 +00:00
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
expr = builtins.readFile lib/channel-expr.nix;
|
2008-12-17 13:25:23 +00:00
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
distPhase = ''
|
2013-10-09 14:00:45 +01:00
|
|
|
|
rm -rf .git
|
2013-03-26 13:00:31 +00:00
|
|
|
|
echo -n $VERSION_SUFFIX > .version-suffix
|
2013-10-24 01:02:04 +01:00
|
|
|
|
echo -n ${nixpkgs.rev or nixpkgs.shortRev} > .git-revision
|
2013-03-26 13:00:31 +00:00
|
|
|
|
releaseName=nixos-$VERSION$VERSION_SUFFIX
|
2013-07-01 23:23:48 +01:00
|
|
|
|
mkdir -p $out/tarballs
|
2013-03-26 13:00:31 +00:00
|
|
|
|
mkdir ../$releaseName
|
2013-10-09 14:00:45 +01:00
|
|
|
|
cp -prd . ../$releaseName/nixpkgs
|
2013-10-01 14:48:39 +01:00
|
|
|
|
chmod -R u+w ../$releaseName
|
|
|
|
|
ln -s nixpkgs/nixos ../$releaseName/nixos
|
2013-03-26 13:00:31 +00:00
|
|
|
|
echo "$expr" > ../$releaseName/default.nix
|
|
|
|
|
NIX_STATE_DIR=$TMPDIR nix-env -f ../$releaseName/default.nix -qaP --meta --xml \* > /dev/null
|
|
|
|
|
cd ..
|
|
|
|
|
chmod -R u+w $releaseName
|
|
|
|
|
tar cfJ $out/tarballs/$releaseName.tar.xz $releaseName
|
|
|
|
|
''; # */
|
2009-06-24 10:14:28 +01:00
|
|
|
|
};
|
2009-09-13 11:47:51 +01:00
|
|
|
|
|
2009-08-31 15:56:19 +01:00
|
|
|
|
|
2014-09-18 15:21:00 +01:00
|
|
|
|
manual = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manual);
|
|
|
|
|
manualPDF = (buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manualPDF)).x86_64-linux;
|
|
|
|
|
manpages = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manpages);
|
2014-11-17 12:41:18 +00:00
|
|
|
|
options = (buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.optionsJSON)).x86_64-linux;
|
2013-03-26 13:00:31 +00:00
|
|
|
|
|
|
|
|
|
|
2014-10-09 17:40:37 +01:00
|
|
|
|
# Build the initial ramdisk so Hydra can keep track of its size over time.
|
|
|
|
|
initialRamdisk = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.initialRamdisk);
|
|
|
|
|
|
|
|
|
|
|
2013-10-31 07:48:57 +00:00
|
|
|
|
iso_minimal = forAllSystems (system: makeIso {
|
2013-03-26 13:00:31 +00:00
|
|
|
|
module = ./modules/installer/cd-dvd/installation-cd-minimal.nix;
|
|
|
|
|
type = "minimal";
|
|
|
|
|
inherit system;
|
2013-04-06 17:24:12 +01:00
|
|
|
|
});
|
|
|
|
|
|
2013-10-31 07:48:57 +00:00
|
|
|
|
iso_graphical = forAllSystems (system: makeIso {
|
2013-03-26 13:00:31 +00:00
|
|
|
|
module = ./modules/installer/cd-dvd/installation-cd-graphical.nix;
|
|
|
|
|
type = "graphical";
|
|
|
|
|
inherit system;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
# A variant with a more recent (but possibly less stable) kernel
|
|
|
|
|
# that might support more hardware.
|
2014-06-05 22:00:25 +01:00
|
|
|
|
iso_minimal_new_kernel = forAllSystems (system: makeIso {
|
|
|
|
|
module = ./modules/installer/cd-dvd/installation-cd-minimal-new-kernel.nix;
|
|
|
|
|
type = "minimal-new-kernel";
|
|
|
|
|
inherit system;
|
|
|
|
|
});
|
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
|
2013-10-08 14:40:48 +01:00
|
|
|
|
# A bootable VirtualBox virtual appliance as an OVA file (i.e. packaged OVF).
|
2013-10-31 07:48:57 +00:00
|
|
|
|
ova = forAllSystems (system:
|
2013-08-26 13:06:00 +01:00
|
|
|
|
|
2013-10-01 14:48:39 +01:00
|
|
|
|
with import nixpkgs { inherit system; };
|
2013-07-01 23:23:48 +01:00
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
|
|
config = (import lib/eval-config.nix {
|
|
|
|
|
inherit system;
|
|
|
|
|
modules =
|
2013-07-02 12:33:27 +01:00
|
|
|
|
[ versionModule
|
2013-07-03 12:59:00 +01:00
|
|
|
|
./modules/installer/virtualbox-demo.nix
|
2013-07-01 23:23:48 +01:00
|
|
|
|
];
|
|
|
|
|
}).config;
|
|
|
|
|
|
|
|
|
|
in
|
2013-10-08 14:40:48 +01:00
|
|
|
|
# Declare the OVA as a build product so that it shows up in Hydra.
|
2014-09-17 18:12:41 +01:00
|
|
|
|
scrubDrv (runCommand "nixos-ova-${config.system.nixosVersion}-${system}"
|
2013-07-01 23:23:48 +01:00
|
|
|
|
{ meta = {
|
2013-10-08 14:40:48 +01:00
|
|
|
|
description = "NixOS VirtualBox appliance (${system})";
|
2013-07-01 23:23:48 +01:00
|
|
|
|
maintainers = lib.maintainers.eelco;
|
|
|
|
|
};
|
2013-10-08 14:40:48 +01:00
|
|
|
|
ova = config.system.build.virtualBoxOVA;
|
2013-07-01 23:23:48 +01:00
|
|
|
|
}
|
|
|
|
|
''
|
|
|
|
|
mkdir -p $out/nix-support
|
2013-10-08 14:40:48 +01:00
|
|
|
|
fn=$(echo $ova/*.ova)
|
|
|
|
|
echo "file ova $fn" >> $out/nix-support/hydra-build-products
|
2014-09-17 18:12:41 +01:00
|
|
|
|
'') # */
|
2013-08-26 13:06:00 +01:00
|
|
|
|
|
|
|
|
|
);
|
2013-07-01 23:23:48 +01:00
|
|
|
|
|
|
|
|
|
|
2014-09-24 23:20:53 +01:00
|
|
|
|
# Ensure that all packages used by the minimal NixOS config end up in the channel.
|
|
|
|
|
dummy = forAllSystems (system: pkgs.runCommand "dummy"
|
2014-09-25 16:51:09 +01:00
|
|
|
|
{ toplevel = (import lib/eval-config.nix {
|
2014-09-24 23:20:53 +01:00
|
|
|
|
inherit system;
|
2014-09-25 16:51:09 +01:00
|
|
|
|
modules = lib.singleton ({ config, pkgs, ... }:
|
|
|
|
|
{ fileSystems."/".device = lib.mkDefault "/dev/sda1";
|
|
|
|
|
boot.loader.grub.device = lib.mkDefault "/dev/sda";
|
|
|
|
|
});
|
|
|
|
|
}).config.system.build.toplevel;
|
2014-09-24 23:20:53 +01:00
|
|
|
|
}
|
2014-09-25 16:51:09 +01:00
|
|
|
|
"mkdir $out; ln -s $toplevel $out/dummy");
|
2014-09-24 23:20:53 +01:00
|
|
|
|
|
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
# Provide a tarball that can be unpacked into an SD card, and easily
|
|
|
|
|
# boot that system from uboot (like for the sheevaplug).
|
|
|
|
|
# The pc variant helps preparing the expression for the system tarball
|
|
|
|
|
# in a machine faster than the sheevpalug
|
2013-10-31 07:48:57 +00:00
|
|
|
|
system_tarball_pc = forAllSystems (system: makeSystemTarball {
|
2013-03-26 13:00:31 +00:00
|
|
|
|
module = ./modules/installer/cd-dvd/system-tarball-pc.nix;
|
|
|
|
|
inherit system;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
system_tarball_fuloong2f =
|
|
|
|
|
assert builtins.currentSystem == "mips64-linux";
|
|
|
|
|
makeSystemTarball {
|
|
|
|
|
module = ./modules/installer/cd-dvd/system-tarball-fuloong2f.nix;
|
|
|
|
|
system = "mips64-linux";
|
2011-11-08 19:51:39 +00:00
|
|
|
|
};
|
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
system_tarball_sheevaplug =
|
|
|
|
|
assert builtins.currentSystem == "armv5tel-linux";
|
|
|
|
|
makeSystemTarball {
|
|
|
|
|
module = ./modules/installer/cd-dvd/system-tarball-sheevaplug.nix;
|
|
|
|
|
system = "armv5tel-linux";
|
2012-03-16 12:24:29 +00:00
|
|
|
|
};
|
2013-03-26 13:00:31 +00:00
|
|
|
|
*/
|
2012-02-23 12:00:05 +00:00
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
|
2014-04-14 13:02:44 +01:00
|
|
|
|
# Run the tests for each platform. You can run a test by doing
|
|
|
|
|
# e.g. ‘nix-build -A tests.login.x86_64-linux’, or equivalently,
|
|
|
|
|
# ‘nix-build tests/login.nix -A result’.
|
|
|
|
|
tests.avahi = callTest tests/avahi.nix {};
|
|
|
|
|
tests.bittorrent = callTest tests/bittorrent.nix {};
|
2014-10-22 04:50:33 +01:00
|
|
|
|
tests.blivet = callTest tests/blivet.nix {};
|
2014-11-18 17:41:56 +00:00
|
|
|
|
tests.chromium = callTest tests/chromium.nix {};
|
2014-10-26 19:15:48 +00:00
|
|
|
|
tests.cjdns = callTest tests/cjdns.nix {};
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.containers = callTest tests/containers.nix {};
|
2014-11-30 00:33:25 +00:00
|
|
|
|
tests.dockerRegistry = scrubDrv (import tests/docker-registry.nix { system = "x86_64-linux"; });
|
|
|
|
|
tests.etcd = scrubDrv (import tests/etcd.nix { system = "x86_64-linux"; });
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.firefox = callTest tests/firefox.nix {};
|
|
|
|
|
tests.firewall = callTest tests/firewall.nix {};
|
|
|
|
|
tests.gnome3 = callTest tests/gnome3.nix {};
|
2014-09-17 18:12:41 +01:00
|
|
|
|
tests.installer.grub1 = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).grub1.test);
|
|
|
|
|
tests.installer.lvm = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).lvm.test);
|
|
|
|
|
tests.installer.rebuildCD = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).rebuildCD.test);
|
|
|
|
|
tests.installer.separateBoot = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).separateBoot.test);
|
|
|
|
|
tests.installer.simple = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).simple.test);
|
|
|
|
|
tests.installer.simpleLabels = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).simpleLabels.test);
|
|
|
|
|
tests.installer.simpleProvided = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).simpleProvided.test);
|
|
|
|
|
tests.installer.btrfsSimple = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).btrfsSimple.test);
|
|
|
|
|
tests.installer.btrfsSubvols = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).btrfsSubvols.test);
|
|
|
|
|
tests.installer.btrfsSubvolDefault = forAllSystems (system: scrubDrv (import tests/installer.nix { inherit system; }).btrfsSubvolDefault.test);
|
2014-05-27 21:54:43 +01:00
|
|
|
|
tests.influxdb = callTest tests/influxdb.nix {};
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.ipv6 = callTest tests/ipv6.nix {};
|
|
|
|
|
tests.jenkins = callTest tests/jenkins.nix {};
|
|
|
|
|
tests.kde4 = callTest tests/kde4.nix {};
|
2014-11-30 00:33:25 +00:00
|
|
|
|
tests.kubernetes = scrubDrv (import tests/kubernetes.nix { system = "x86_64-linux"; });
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.latestKernel.login = callTest tests/login.nix { latestKernel = true; };
|
|
|
|
|
tests.login = callTest tests/login.nix {};
|
2014-09-05 14:28:55 +01:00
|
|
|
|
#tests.logstash = callTest tests/logstash.nix {};
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.misc = callTest tests/misc.nix {};
|
|
|
|
|
tests.mumble = callTest tests/mumble.nix {};
|
|
|
|
|
tests.munin = callTest tests/munin.nix {};
|
|
|
|
|
tests.mysql = callTest tests/mysql.nix {};
|
|
|
|
|
tests.mysqlReplication = callTest tests/mysql-replication.nix {};
|
2014-09-18 21:34:29 +01:00
|
|
|
|
tests.nat.firewall = callTest tests/nat.nix { withFirewall = true; };
|
|
|
|
|
tests.nat.standalone = callTest tests/nat.nix { withFirewall = false; };
|
2014-11-25 23:40:49 +00:00
|
|
|
|
tests.networking.networkd.static = callTest tests/networking.nix { networkd = true; test = "static"; };
|
|
|
|
|
tests.networking.networkd.dhcpSimple = callTest tests/networking.nix { networkd = true; test = "dhcpSimple"; };
|
|
|
|
|
tests.networking.networkd.dhcpOneIf = callTest tests/networking.nix { networkd = true; test = "dhcpOneIf"; };
|
|
|
|
|
tests.networking.networkd.bond = callTest tests/networking.nix { networkd = true; test = "bond"; };
|
|
|
|
|
tests.networking.networkd.bridge = callTest tests/networking.nix { networkd = true; test = "bridge"; };
|
|
|
|
|
tests.networking.networkd.macvlan = callTest tests/networking.nix { networkd = true; test = "macvlan"; };
|
|
|
|
|
tests.networking.networkd.sit = callTest tests/networking.nix { networkd = true; test = "sit"; };
|
|
|
|
|
tests.networking.networkd.vlan = callTest tests/networking.nix { networkd = true; test = "vlan"; };
|
|
|
|
|
tests.networking.scripted.static = callTest tests/networking.nix { networkd = false; test = "static"; };
|
|
|
|
|
tests.networking.scripted.dhcpSimple = callTest tests/networking.nix { networkd = false; test = "dhcpSimple"; };
|
|
|
|
|
tests.networking.scripted.dhcpOneIf = callTest tests/networking.nix { networkd = false; test = "dhcpOneIf"; };
|
|
|
|
|
tests.networking.scripted.bond = callTest tests/networking.nix { networkd = false; test = "bond"; };
|
|
|
|
|
tests.networking.scripted.bridge = callTest tests/networking.nix { networkd = false; test = "bridge"; };
|
|
|
|
|
tests.networking.scripted.macvlan = callTest tests/networking.nix { networkd = false; test = "macvlan"; };
|
|
|
|
|
tests.networking.scripted.sit = callTest tests/networking.nix { networkd = false; test = "sit"; };
|
|
|
|
|
tests.networking.scripted.vlan = callTest tests/networking.nix { networkd = false; test = "vlan"; };
|
2014-11-30 14:22:12 +00:00
|
|
|
|
# TODO: put in networking.nix after the test becomes more complete
|
|
|
|
|
tests.networkingProxy = callTest tests/networking-proxy.nix {};
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.nfs3 = callTest tests/nfs.nix { version = 3; };
|
2014-09-05 01:52:05 +01:00
|
|
|
|
tests.nsd = callTest tests/nsd.nix {};
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.openssh = callTest tests/openssh.nix {};
|
2014-12-01 15:45:38 +00:00
|
|
|
|
tests.peerflix = callTest tests/peerflix.nix {};
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.printing = callTest tests/printing.nix {};
|
|
|
|
|
tests.proxy = callTest tests/proxy.nix {};
|
|
|
|
|
tests.quake3 = callTest tests/quake3.nix {};
|
|
|
|
|
tests.runInMachine = callTest tests/run-in-machine.nix {};
|
|
|
|
|
tests.simple = callTest tests/simple.nix {};
|
|
|
|
|
tests.tomcat = callTest tests/tomcat.nix {};
|
2014-04-19 13:37:05 +01:00
|
|
|
|
tests.udisks2 = callTest tests/udisks2.nix {};
|
2014-04-14 13:02:44 +01:00
|
|
|
|
tests.xfce = callTest tests/xfce.nix {};
|
|
|
|
|
|
2014-08-22 10:37:31 +01:00
|
|
|
|
|
|
|
|
|
/* Build a bunch of typical closures so that Hydra can keep track of
|
|
|
|
|
the evolution of closure sizes. */
|
|
|
|
|
|
|
|
|
|
closures = {
|
|
|
|
|
|
|
|
|
|
smallContainer = makeClosure ({ pkgs, ... }:
|
|
|
|
|
{ boot.isContainer = true;
|
|
|
|
|
services.openssh.enable = true;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
tinyContainer = makeClosure ({ pkgs, ... }:
|
|
|
|
|
{ boot.isContainer = true;
|
|
|
|
|
imports = [ modules/profiles/minimal.nix ];
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
ec2 = makeClosure ({ pkgs, ... }:
|
|
|
|
|
{ imports = [ modules/virtualisation/amazon-image.nix ];
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
kde = makeClosure ({ pkgs, ... }:
|
|
|
|
|
{ services.xserver.enable = true;
|
|
|
|
|
services.xserver.displayManager.kdm.enable = true;
|
|
|
|
|
services.xserver.desktopManager.kde4.enable = true;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
xfce = makeClosure ({ pkgs, ... }:
|
|
|
|
|
{ services.xserver.enable = true;
|
|
|
|
|
services.xserver.desktopManager.xfce.enable = true;
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
# Linux/Apache/PostgreSQL/PHP stack.
|
|
|
|
|
lapp = makeClosure ({ pkgs, ... }:
|
|
|
|
|
{ services.httpd.enable = true;
|
|
|
|
|
services.httpd.adminAddr = "foo@example.org";
|
|
|
|
|
services.postgresql.enable = true;
|
|
|
|
|
services.postgresql.package = pkgs.postgresql93;
|
|
|
|
|
environment.systemPackages = [ pkgs.php ];
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
2013-03-26 13:00:31 +00:00
|
|
|
|
}
|