Propagate the correct variant of the Nix process management framework as a parameter

This commit is contained in:
Sander van der Burg 2021-04-23 21:39:52 +02:00 committed by Sander van der Burg
parent 400d19786d
commit 6640648dfd
47 changed files with 165 additions and 79 deletions

View File

@ -10,13 +10,14 @@
, forceDisableUserChange ? false
, processManager
, enablePAM ? false
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
ids = if builtins.pathExists ./ids-bare.nix then (import ./ids-bare.nix).ids else {};
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
};
in
rec {

View File

@ -10,17 +10,18 @@
, forceDisableUserChange ? false
, processManager
, enablePAM ? false
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
ids = if builtins.pathExists ./ids-apache-mysql.nix then (import ./ids-apache-mysql.nix).ids else {};
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
};
containerProviderConstructors = import ../../service-containers-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
};
in
rec {

View File

@ -10,17 +10,18 @@
, forceDisableUserChange ? false
, processManager
, enablePAM ? false
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
ids = if builtins.pathExists ./ids-tomcat-mysql-multi-instance.nix then (import ./ids-tomcat-mysql-multi-instance.nix).ids else {};
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
};
containerProviderConstructors = import ../../service-containers-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
};
in
rec {

View File

@ -10,17 +10,18 @@
, forceDisableUserChange ? false
, processManager
, enablePAM ? false
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
ids = if builtins.pathExists ./ids-tomcat-mysql.nix then (import ./ids-tomcat-mysql.nix).ids else {};
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
};
containerProviderConstructors = import ../../service-containers-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager ids nix-processmgmt;
};
in
rec {

View File

@ -10,11 +10,12 @@
, forceDisableUserChange ? false
, processManager
, includeNixDaemon ? false
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
};
instanceSuffix = "";

View File

@ -5,9 +5,6 @@
, profiles ? [ "privileged" "unprivileged" ]
}:
let
pkgs = import nixpkgs {};
in
{
tests = import ./tests {
inherit nixpkgs system nix-processmgmt processManagers profiles;

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
readiness = {instanceName, instance, stateDir, ...}:
if instanceName == "tomcat" then ''

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
nixosConfig = {
virtualisation.diskSize = 8192;

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
readiness = {instanceName, instance, ...}:
''

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
webappStatic = pkgs.stdenv.mkDerivation {

View File

@ -14,59 +14,59 @@ let
in
{
apache = import ./apache {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
apache-tomcat = import ./apache-tomcat {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
apache-tomcat-ajp-reverse-proxy = import ./apache-tomcat-ajp-reverse-proxy {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
disnix = import ./disnix/bare {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
disnix-with-apache-mysql = import ./disnix/apache-mysql {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
disnix-with-tomcat-mysql = import ./disnix/tomcat-mysql {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
disnix-with-tomcat-mysql-multi-instance = import ./disnix/tomcat-mysql-multi-instance {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
docker = import ./docker {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
fcron = import ./fcron {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
hydra = import ./hydra {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
influxdb = import ./influxdb {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
mongodb = import ./mongodb {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
mysql = import ./mysql {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
nginx = import ./nginx/simple-webapp {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
nginx-reverse-proxy-hostbased = import ./nginx/reverse-proxy-hostbased {
@ -74,34 +74,34 @@ in
};
nginx-reverse-proxy-pathbased = import ./nginx/reverse-proxy-pathbased {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
postgresql = import ./postgresql {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
s6-svscan = import ./s6-svscan {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
sshd = import ./sshd {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
supervisord = import ./supervisord {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
svnserve = import ./svnserve {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
xinetd = import ./xinetd/declarative {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
xinetd-extendable = import ./xinetd/extendable {
inherit pkgs processManagers profiles testService;
inherit pkgs processManagers profiles testService nix-processmgmt;
};
}

View File

@ -1,10 +1,13 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
let
env = "NIX_PATH='nixpkgs=${<nixpkgs>}' SSH_OPTS='-o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' DISNIX_REMOTE_CLIENT=disnix-client";
in
testService {
exprFile = ../../../example-deployments/disnix/processes-with-apache-mysql.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.disnix ];
initialTests = {forceDisableUserChange, ...}:

View File

@ -1,10 +1,13 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
let
env = "NIX_PATH='nixpkgs=${<nixpkgs>}' SSH_OPTS='-o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' DISNIX_REMOTE_CLIENT=disnix-client";
in
testService {
exprFile = ../../../example-deployments/disnix/processes-bare.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.disnix ];
initialTests = {forceDisableUserChange, ...}:

View File

@ -1,10 +1,13 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
let
env = "NIX_PATH='nixpkgs=${<nixpkgs>}' SSH_OPTS='-o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no' DISNIX_REMOTE_CLIENT=disnix-client";
in
testService {
exprFile = ../../../example-deployments/disnix/processes-with-tomcat-mysql-multi-instance.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.disnix ];
initialTests = {forceDisableUserChange, ...}:

View File

@ -1,10 +1,13 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
let
env = "NIX_PATH='nixpkgs=${<nixpkgs>}' DISNIX_CLIENT_INTERFACE=disnix-soap-client DISNIX_TARGET_PROPERTY=targetEPR DISNIX_SOAP_CLIENT_USERNAME=admin DISNIX_SOAP_CLIENT_PASSWORD=secret";
in
testService {
exprFile = ../../../example-deployments/disnix/processes-with-tomcat-mysql.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.disnix pkgs.DisnixWebService ];
readiness = {instanceName, instance, ...}:

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.docker ];
readiness = {instanceName, instance, runtimeDir, ...}:

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,11 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
readiness = {instanceName, instance, ...}:
''
'';
extraParams = {
inherit nix-processmgmt;
};
tests = {instanceName, instance, ...}:
''

View File

@ -11,11 +11,12 @@
, callingUser ? null
, callingGroup ? null
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange callingUser callingGroup processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange callingUser callingGroup processManager nix-processmgmt;
};
in
rec {

View File

@ -1,4 +1,4 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
let
node-hydra-connector = (import ./nodepkgs {
@ -63,6 +63,9 @@ let
in
testService {
exprFile = ../../example-deployments/hydra/processes.nix;
extraParams = {
inherit nix-processmgmt;
};
nixosConfig = {
virtualisation.memorySize = 1024;
virtualisation.diskSize = 8192;
@ -161,5 +164,8 @@ testService {
)
'';
inherit processManagers profiles;
inherit processManagers;
# We don't support unprivileged user deployments
profiles = builtins.filter (profile: profile == "privileged") profiles;
}

View File

@ -1,8 +1,11 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
systemPackages = [ pkgs.influxdb ];
extraParams = {
inherit nix-processmgmt;
};
readiness = {instanceName, instance, ...}:
''

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,4 +1,4 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
@ -7,6 +7,10 @@ testService {
virtualisation.memorySize = 1024;
virtualisation.diskSize = 8192;
};
extraParams = {
inherit nix-processmgmt;
};
readiness = {instanceName, instance, ...}:
''
machine.wait_for_open_port(${toString instance.port})

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.mysql ];
readiness = {instanceName, instance, ...}:

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,6 +1,5 @@
{ pkgs ? import <nixpkgs> { inherit system; }
, system ? builtins.currentSystem
, nix-processmgmt
, stateDir ? "/var"
, runtimeDir ? "${stateDir}/run"
, logDir ? "${stateDir}/log"
@ -10,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../../nix-processmgmt
}:
let
sharedConstructors = import ../../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir cacheDir spoolDir libDir tmpDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir cacheDir spoolDir libDir tmpDir forceDisableUserChange processManager nix-processmgmt;
};
constructors = import "${nix-processmgmt}/examples/webapps-agnostic/constructors/constructors.nix" {

View File

@ -1,7 +1,11 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
nixosConfig = {
virtualisation.memorySize = 1024;
};

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
webappStatic = pkgs.stdenv.mkDerivation {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
readiness = {instanceName, instance, ...}:
''

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
webappStatic = from: pkgs.stdenv.mkDerivation {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.postgresql ];
nixosConfig = {
virtualisation.diskSize = 8192;

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,4 +1,4 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
let
generateTestExecutable = instanceName:
@ -42,6 +42,9 @@ let
in
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.s6-rc ];
readiness = {instanceName, instance, runtimeDir, ...}:

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.openssh ];
initialTests = {forceDisableUserChange, ...}:

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir spoolDir libDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,4 +1,4 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
let
generateTestExecutable = instanceName:
@ -27,6 +27,9 @@ let
in
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.pythonPackages.supervisor ];
readiness = {instanceName, instance, ...}:

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.subversion ];
readiness = {instanceName, instance, ...}:

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../nix-processmgmt
}:
let
constructors = import ../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.inetutils ];
readiness = {instanceName, instance, ...}:

View File

@ -10,11 +10,12 @@
, forceDisableUserChange ? false
, callingUser ? null
, processManager
, nix-processmgmt ? ../../../../nix-processmgmt
}:
let
constructors = import ../../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {

View File

@ -1,7 +1,10 @@
{ pkgs, testService, processManagers, profiles }:
{ pkgs, testService, processManagers, profiles, nix-processmgmt }:
testService {
exprFile = ./processes.nix;
extraParams = {
inherit nix-processmgmt;
};
systemPackages = [ pkgs.inetutils ];
tests = {instanceName, instance, stateDir, runtimeDir, forceDisableUserChange, ...}:

View File

@ -9,11 +9,12 @@
, tmpDir ? (if stateDir == "/var" then "/tmp" else "${stateDir}/tmp")
, forceDisableUserChange ? false
, processManager
, nix-processmgmt ? ../../../../nix-processmgmt
}:
let
constructors = import ../../../services-agnostic/constructors.nix {
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager;
inherit pkgs stateDir runtimeDir logDir tmpDir cacheDir libDir spoolDir forceDisableUserChange processManager nix-processmgmt;
};
in
rec {