Propagate the correct variant of the Nix process management framework as a parameter
This commit is contained in:
parent
400d19786d
commit
6640648dfd
|
@ -10,13 +10,14 @@
|
|||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, enablePAM ? false
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
ids = if builtins.pathExists ./ids-bare.nix then (import ./ids-bare.nix).ids else {};
|
||||
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -10,17 +10,18 @@
|
|||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, enablePAM ? false
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
ids = if builtins.pathExists ./ids-apache-mysql.nix then (import ./ids-apache-mysql.nix).ids else {};
|
||||
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
|
||||
};
|
||||
|
||||
containerProviderConstructors = import ../../service-containers-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -10,17 +10,18 @@
|
|||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, enablePAM ? false
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
ids = if builtins.pathExists ./ids-tomcat-mysql-multi-instance.nix then (import ./ids-tomcat-mysql-multi-instance.nix).ids else {};
|
||||
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
|
||||
};
|
||||
|
||||
containerProviderConstructors = import ../../service-containers-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -10,17 +10,18 @@
|
|||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, enablePAM ? false
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
ids = if builtins.pathExists ./ids-tomcat-mysql.nix then (import ./ids-tomcat-mysql.nix).ids else {};
|
||||
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
|
||||
};
|
||||
|
||||
containerProviderConstructors = import ../../service-containers-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -10,11 +10,12 @@
|
|||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, includeNixDaemon ? false
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
|
||||
instanceSuffix = "";
|
||||
|
|
|
@ -5,9 +5,6 @@
|
|||
, profiles ? [ "privileged" "unprivileged" ]
|
||||
}:
|
||||
|
||||
let
|
||||
pkgs = import nixpkgs {};
|
||||
in
|
||||
{
|
||||
tests = import ./tests {
|
||||
inherit nixpkgs system nix-processmgmt processManagers profiles;
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
|
||||
readiness = {instanceName, instance, stateDir, ...}:
|
||||
if instanceName == "tomcat" then ''
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
|
||||
nixosConfig = {
|
||||
virtualisation.diskSize = 8192;
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
''
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
|
||||
webappStatic = pkgs.stdenv.mkDerivation {
|
||||
|
|
|
@ -14,59 +14,59 @@ let
|
|||
in
|
||||
{
|
||||
apache = import ./apache {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
apache-tomcat = import ./apache-tomcat {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
apache-tomcat-ajp-reverse-proxy = import ./apache-tomcat-ajp-reverse-proxy {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
disnix = import ./disnix/bare {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
disnix-with-apache-mysql = import ./disnix/apache-mysql {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
disnix-with-tomcat-mysql = import ./disnix/tomcat-mysql {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
disnix-with-tomcat-mysql-multi-instance = import ./disnix/tomcat-mysql-multi-instance {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
docker = import ./docker {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
fcron = import ./fcron {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
hydra = import ./hydra {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
influxdb = import ./influxdb {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
mongodb = import ./mongodb {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
mysql = import ./mysql {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
nginx = import ./nginx/simple-webapp {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
nginx-reverse-proxy-hostbased = import ./nginx/reverse-proxy-hostbased {
|
||||
|
@ -74,34 +74,34 @@ in
|
|||
};
|
||||
|
||||
nginx-reverse-proxy-pathbased = import ./nginx/reverse-proxy-pathbased {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
postgresql = import ./postgresql {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
s6-svscan = import ./s6-svscan {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
sshd = import ./sshd {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
supervisord = import ./supervisord {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
svnserve = import ./svnserve {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
xinetd = import ./xinetd/declarative {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
|
||||
xinetd-extendable = import ./xinetd/extendable {
|
||||
inherit pkgs processManagers profiles testService;
|
||||
inherit pkgs processManagers profiles testService nix-processmgmt;
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,10 +1,13 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
let
|
||||
env = "NIX_PATH='nixpkgs=${<nixpkgs>}' SSH_OPTS='-o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' DISNIX_REMOTE_CLIENT=disnix-client";
|
||||
in
|
||||
testService {
|
||||
exprFile = ../../../example-deployments/disnix/processes-with-apache-mysql.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.disnix ];
|
||||
|
||||
initialTests = {forceDisableUserChange, ...}:
|
||||
|
|
|
@ -1,10 +1,13 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
let
|
||||
env = "NIX_PATH='nixpkgs=${<nixpkgs>}' SSH_OPTS='-o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' DISNIX_REMOTE_CLIENT=disnix-client";
|
||||
in
|
||||
testService {
|
||||
exprFile = ../../../example-deployments/disnix/processes-bare.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.disnix ];
|
||||
|
||||
initialTests = {forceDisableUserChange, ...}:
|
||||
|
|
|
@ -1,10 +1,13 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
let
|
||||
env = "NIX_PATH='nixpkgs=${<nixpkgs>}' SSH_OPTS='-o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' DISNIX_REMOTE_CLIENT=disnix-client";
|
||||
in
|
||||
testService {
|
||||
exprFile = ../../../example-deployments/disnix/processes-with-tomcat-mysql-multi-instance.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.disnix ];
|
||||
|
||||
initialTests = {forceDisableUserChange, ...}:
|
||||
|
|
|
@ -1,10 +1,13 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
let
|
||||
env = "NIX_PATH='nixpkgs=${<nixpkgs>}' DISNIX_CLIENT_INTERFACE=disnix-soap-client DISNIX_TARGET_PROPERTY=targetEPR DISNIX_SOAP_CLIENT_USERNAME=admin DISNIX_SOAP_CLIENT_PASSWORD=secret";
|
||||
in
|
||||
testService {
|
||||
exprFile = ../../../example-deployments/disnix/processes-with-tomcat-mysql.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.disnix pkgs.DisnixWebService ];
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.docker ];
|
||||
|
||||
readiness = {instanceName, instance, runtimeDir, ...}:
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,11 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
''
|
||||
'';
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
|
||||
tests = {instanceName, instance, ...}:
|
||||
''
|
||||
|
|
|
@ -11,11 +11,12 @@
|
|||
, callingUser ? null
|
||||
, callingGroup ? null
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange callingUser callingGroup processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange callingUser callingGroup processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
let
|
||||
node-hydra-connector = (import ./nodepkgs {
|
||||
|
@ -63,6 +63,9 @@ let
|
|||
in
|
||||
testService {
|
||||
exprFile = ../../example-deployments/hydra/processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
nixosConfig = {
|
||||
virtualisation.memorySize = 1024;
|
||||
virtualisation.diskSize = 8192;
|
||||
|
@ -161,5 +164,8 @@ testService {
|
|||
)
|
||||
'';
|
||||
|
||||
inherit processManagers profiles;
|
||||
inherit processManagers;
|
||||
|
||||
# We don't support unprivileged user deployments
|
||||
profiles = builtins.filter (profile: profile == "privileged") profiles;
|
||||
}
|
||||
|
|
|
@ -1,8 +1,11 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
systemPackages = [ pkgs.influxdb ];
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
''
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
|
@ -7,6 +7,10 @@ testService {
|
|||
virtualisation.memorySize = 1024;
|
||||
virtualisation.diskSize = 8192;
|
||||
};
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
''
|
||||
machine.wait_for_open_port(${toString instance.port})
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.mysql ];
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,6 +1,5 @@
|
|||
{ pkgs ? import <nixpkgs> { inherit system; }
|
||||
, system ? builtins.currentSystem
|
||||
, nix-processmgmt
|
||||
, stateDir ? "/var"
|
||||
, runtimeDir ? "${stateDir}/run"
|
||||
, logDir ? "${stateDir}/log"
|
||||
|
@ -10,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
sharedConstructors = import ../../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir cacheDir spoolDir libDir tmpDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir cacheDir spoolDir libDir tmpDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
|
||||
constructors = import "${nix-processmgmt}/examples/webapps-agnostic/constructors/constructors.nix" {
|
||||
|
|
|
@ -1,7 +1,11 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
|
||||
nixosConfig = {
|
||||
virtualisation.memorySize = 1024;
|
||||
};
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
|
||||
webappStatic = pkgs.stdenv.mkDerivation {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
''
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
|
||||
webappStatic = from: pkgs.stdenv.mkDerivation {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.postgresql ];
|
||||
nixosConfig = {
|
||||
virtualisation.diskSize = 8192;
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
let
|
||||
generateTestExecutable = instanceName:
|
||||
|
@ -42,6 +42,9 @@ let
|
|||
in
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.s6-rc ];
|
||||
|
||||
readiness = {instanceName, instance, runtimeDir, ...}:
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.openssh ];
|
||||
|
||||
initialTests = {forceDisableUserChange, ...}:
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
let
|
||||
generateTestExecutable = instanceName:
|
||||
|
@ -27,6 +27,9 @@ let
|
|||
in
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.pythonPackages.supervisor ];
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.subversion ];
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.inetutils ];
|
||||
|
||||
readiness = {instanceName, instance, ...}:
|
||||
|
|
|
@ -10,11 +10,12 @@
|
|||
, forceDisableUserChange ? false
|
||||
, callingUser ? null
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
|
@ -1,7 +1,10 @@
|
|||
{ pkgs, testService, processManagers, profiles }:
|
||||
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
|
||||
|
||||
testService {
|
||||
exprFile = ./processes.nix;
|
||||
extraParams = {
|
||||
inherit nix-processmgmt;
|
||||
};
|
||||
systemPackages = [ pkgs.inetutils ];
|
||||
|
||||
tests = {instanceName, instance, stateDir, runtimeDir, forceDisableUserChange, ...}:
|
||||
|
|
|
@ -9,11 +9,12 @@
|
|||
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
|
||||
, forceDisableUserChange ? false
|
||||
, processManager
|
||||
, nix-processmgmt ? ../../../../nix-processmgmt
|
||||
}:
|
||||
|
||||
let
|
||||
constructors = import ../../../services-agnostic/constructors.nix {
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
|
||||
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
|
||||
};
|
||||
in
|
||||
rec {
|
||||
|
|
Loading…
Reference in New Issue