-
-
Notifications
You must be signed in to change notification settings - Fork 14.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nix: 2.18 -> 2.24 #335342
nix: 2.18 -> 2.24 #335342
Changes from all commits
4584a58
2e702d0
131b8e5
556d5d4
12829a1
0291167
be83fcd
ac849e5
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,8 @@ | ||
{ | ||
x86_64-linux = "/nix/store/f409bhlpp0xkzvdz95qr2yvfjfi8r9jc-nix-2.18.5"; | ||
i686-linux = "/nix/store/ra39jzrxq3bcpf55aahwv5037akvylf5-nix-2.18.5"; | ||
aarch64-linux = "/nix/store/xiw8a4jbnw18svgdb04hyqzg5bsjspqf-nix-2.18.5"; | ||
x86_64-darwin = "/nix/store/k2gzx7i90x3h2c8g6xdi1jkwbl6ic895-nix-2.18.5"; | ||
aarch64-darwin = "/nix/store/rqwymbndaqxma6p8s5brcl9k32n5xx54-nix-2.18.5"; | ||
x86_64-linux = "/nix/store/fmfy9zigxns8f1wfb4v2arf1jmfdjpjc-nix-2.24.6"; | ||
i686-linux = "/nix/store/bl95c09pcihf2fdqpzjyjk4bdq0bsizm-nix-2.24.6"; | ||
aarch64-linux = "/nix/store/2sbzgmvas19iq3nhg8xbnd8k0khahk34-nix-2.24.6"; | ||
riscv64-linux = "/nix/store/7yy1x9sx83wm77mjawd953d6a6wb669q-nix-riscv64-unknown-linux-gnu-2.24.6"; | ||
x86_64-darwin = "/nix/store/vs6bbxkwxqr828q8rj1xlbmsbnx1ry6z-nix-2.24.6"; | ||
aarch64-darwin = "/nix/store/d88r5b1qv1fvz2j9qndz8sr31mqgz45x-nix-2.24.6"; | ||
} |
Original file line number | Diff line number | Diff line change | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
@@ -85,7 +85,9 @@ in | |||||||||||||||
|
||||||||||||||||
# passthru tests | ||||||||||||||||
, pkgsi686Linux | ||||||||||||||||
, pkgsStatic | ||||||||||||||||
, runCommand | ||||||||||||||||
, pkgs | ||||||||||||||||
}: let | ||||||||||||||||
self = stdenv.mkDerivation { | ||||||||||||||||
pname = "nix"; | ||||||||||||||||
|
@@ -259,6 +261,8 @@ self = stdenv.mkDerivation { | |||||||||||||||
|
||||||||||||||||
tests = { | ||||||||||||||||
nixi686 = pkgsi686Linux.nixVersions.${self_attribute_name}; | ||||||||||||||||
nixStatic = pkgsStatic.nixVersions.${self_attribute_name}; | ||||||||||||||||
|
||||||||||||||||
# Basic smoke test that needs to pass when upgrading nix. | ||||||||||||||||
# Note that this test does only test the nixVersions.stable attribute. | ||||||||||||||||
misc = nixosTests.nix-misc.default; | ||||||||||||||||
|
@@ -278,6 +282,12 @@ self = stdenv.mkDerivation { | |||||||||||||||
fi | ||||||||||||||||
touch $out | ||||||||||||||||
''; | ||||||||||||||||
|
||||||||||||||||
/** Intended to test `lib`, but also a good smoke test for Nix */ | ||||||||||||||||
nixpkgs-lib = import ../../../../lib/tests/test-with-nix.nix { | ||||||||||||||||
inherit lib pkgs; | ||||||||||||||||
nix = self; | ||||||||||||||||
}; | ||||||||||||||||
Comment on lines
+286
to
+290
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. See also this: Lines 11 to 17 in 2b875be
I like that you can now test Nix with Nix against every Nix. |
||||||||||||||||
}; | ||||||||||||||||
}; | ||||||||||||||||
|
||||||||||||||||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -115,7 +115,9 @@ let | |
runCommand "test-nix-fallback-paths-version-equals-nix-stable" { | ||
paths = lib.concatStringsSep "\n" (builtins.attrValues (import ../../../../nixos/modules/installer/tools/nix-fallback-paths.nix)); | ||
} '' | ||
if [[ "" != $(grep -v 'nix-${pkg.version}$' <<< "$paths") ]]; then | ||
# NOTE: name may contain cross compilation details between the pname | ||
# and version this is permitted thanks to ([^-]*-)* | ||
if [[ "" != $(grep -vE 'nix-([^-]*-)*${lib.strings.replaceStrings ["."] ["\\."] pkg.version}$' <<< "$paths") ]]; then | ||
Comment on lines
+118
to
+120
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The comment is a bit helpful, but it would be better to extract a few locals here. This combination of Nix, Bash, and regular expressions is quite the stew. |
||
echo "nix-fallback-paths not up to date with nixVersions.stable (nix-${pkg.version})" | ||
echo "The following paths are not up to date:" | ||
grep -v 'nix-${pkg.version}$' <<< "$paths" | ||
|
@@ -239,7 +241,7 @@ in lib.makeExtensible (self: ({ | |
else | ||
nix; | ||
|
||
stable = addFallbackPathsCheck self.nix_2_18; | ||
stable = addFallbackPathsCheck self.nix_2_24; | ||
} // lib.optionalAttrs config.allowAliases ( | ||
lib.listToAttrs (map ( | ||
minor: | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there a method for calling this test without referring to files outside
nix/
dirtree, à la RFC 140?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's not really a package so RFC 140 "doesn't apply", but something would be nice, I agree.
Currently this file documents that it's not entirely private. Something more formal or even machine-checkable would be nice, but I don't think we have a protocol for this yet.
Not an exact match, but maybe something in this direction?:
## devspec
for machine readable development/maintenance metadata #306506