Compare commits

..

15 Commits

Author SHA1 Message Date
21d77d6190
weasel: nix-serve bind to 0.0.0.0 2025-10-07 17:05:31 +02:00
b5cd72b0c1
weasel: add custom nix-serve
Proper override for haskell package

madness

Fix nix-serve-ng override
2025-10-07 17:05:31 +02:00
5fcb641eb6
Add https github to allowed uris 2025-10-07 17:05:31 +02:00
407c7e8f2e
Make hydra shut up 2025-10-07 17:05:31 +02:00
753d14d93b
Add bscpm and gitlab-internal to allowed-uris 2025-10-07 17:05:31 +02:00
b3ee6c720a
weasel: enable hydra tcp port in firewall 2025-10-07 17:05:30 +02:00
604b58fe5d
hydra: set listen host 2025-10-07 17:05:30 +02:00
18bb0173be
Enable hydra on weasel 2025-10-07 17:05:30 +02:00
29c87a4bb9
weasel: use tent cache 2025-10-07 17:05:30 +02:00
41cf521e32
Add nixfmt-rfc-style to common packages 2025-10-07 17:05:30 +02:00
a6bbad68bd
Add packages to user abonerib 2025-10-07 17:05:30 +02:00
6bc11a421d
Add nix-output-monitor to default packages 2025-10-07 17:05:30 +02:00
5abf511f17
Set fish shell for user abonerib 2025-10-07 17:05:29 +02:00
2e341f7681
weasel: create user folders in /var/lib/podman-users
/home is a nfs mount, which does not support extra filesystem arguments
needed to run podman. We need to have a local home.
2025-10-07 17:05:29 +02:00
f0132ce2e0
weasel: add podman 2025-10-07 17:05:29 +02:00
6 changed files with 14 additions and 13 deletions

View File

@ -62,7 +62,7 @@ let
};
tests = rec {
hwloc = callPackage ./test/bugs/hwloc.nix { };
#hwloc = callPackage ./test/bugs/hwloc.nix { }; # Broken, no /sys
#sigsegv = callPackage ./test/reproducers/sigsegv.nix { };
hello-c = callPackage ./test/compilers/hello-c.nix { };
hello-cpp = callPackage ./test/compilers/hello-cpp.nix { };

View File

@ -6,7 +6,6 @@
stdenv.mkDerivation {
name = "hwloc-test";
requiredSystemFeatures = [ "sys-devices" ];
src = ./.;
@ -15,7 +14,7 @@ stdenv.mkDerivation {
buildPhase = ''
ls -l /sys
gcc -lhwloc hwloc.c -o hwloc
strace ./hwloc > $out
strace ./hwloc
'';
}

View File

@ -23,8 +23,9 @@ in stdenv.mkDerivation {
dontUnpack = true;
dontConfigure = true;
# nOS-V requires access to /sys/devices to request NUMA information
requiredSystemFeatures = [ "sys-devices" ];
# nOS-V requires access to /sys/devices to request NUMA information. It will
# fail to run otherwise, so we disable the sandbox for this test.
__noChroot = true;
buildInputs = [ openmp ];

View File

@ -36,8 +36,9 @@ in stdenv.mkDerivation {
dontUnpack = true;
dontConfigure = true;
# nOS-V requires access to /sys/devices to request NUMA information
requiredSystemFeatures = [ "sys-devices" ];
# nOS-V requires access to /sys/devices to request NUMA information. It will
# fail to run otherwise, so we disable the sandbox for this test.
__noChroot = true;
buildInputs = [ nosv ];

View File

@ -24,8 +24,9 @@ in stdenv.mkDerivation {
dontUnpack = true;
dontConfigure = true;
# nOS-V requires access to /sys/devices to request NUMA information
requiredSystemFeatures = [ "sys-devices" ];
# nOS-V requires access to /sys/devices to request NUMA information. It will
# fail to run otherwise, so we disable the sandbox for this test.
__noChroot = true;
buildPhase = ''
set -x

View File

@ -25,10 +25,9 @@ stdenv.mkDerivation rec {
hardeningDisable = [ "all" ];
#NIX_DEBUG = 1;
buildInputs = [ ]; #strace gdb;
# NODES requires access to /sys/devices to request NUMA information
requiredSystemFeatures = [ "sys-devices" ];
# NODES requires access to /sys/devices to request NUMA information. It will
# fail to run otherwise, so we disable the sandbox for this test.
__noChroot = true;
buildPhase = ''
set -x
#$CC -v