feat(renovate): enable lockFileMaintenance
Some checks failed
/ build (push) Successful in 2s
/ check (push) Failing after 13s
/ report-size (push) Successful in 7s

This allows it to update the flake.lock and Cargo.lock files.
This commit is contained in:
Jalil David Salamé Messina 2024-12-29 17:41:25 +01:00
parent 69fde96f67
commit 2ba6277778
Signed by: jalil
GPG key ID: F016B9E770737A0B
3 changed files with 60 additions and 53 deletions

View file

@ -6,7 +6,6 @@
checks = checks =
let let
testDomain = "webnstest.example"; testDomain = "webnstest.example";
dynamicZonesDir = "/var/lib/named/zones";
zoneFile = pkgs.writeText "${testDomain}.zoneinfo" '' zoneFile = pkgs.writeText "${testDomain}.zoneinfo" ''
$ORIGIN . $ORIGIN .
$TTL 60 ; 1 minute $TTL 60 ; 1 minute
@ -27,7 +26,14 @@
nsupdate IN AAAA ::1 nsupdate IN AAAA ::1
''; '';
webnsupdate-machine = { webnsupdate-machine =
{ config, ... }:
let
bindCfg = config.services.bind;
bindData = bindCfg.directory;
dynamicZonesDir = "${bindData}/zones";
in
{
imports = [ self.nixosModules.webnsupdate ]; imports = [ self.nixosModules.webnsupdate ];
config = { config = {
@ -71,9 +77,8 @@
# shellcheck disable=SC2211,SC1127 # shellcheck disable=SC2211,SC1127
rm -f ${dynamicZonesDir}/* # reset dynamic zones rm -f ${dynamicZonesDir}/* # reset dynamic zones
${pkgs.coreutils}/bin/mkdir -m 0755 -p ${dynamicZonesDir} mkdir -m 0755 -p ${dynamicZonesDir}
chown "named" ${dynamicZonesDir} chown named ${dynamicZonesDir}
chown "named" /var/lib/named
# copy dynamic zone's file to the dynamic zones dir # copy dynamic zone's file to the dynamic zones dir
cp ${zoneFile} ${dynamicZonesDir}/${testDomain} cp ${zoneFile} ${dynamicZonesDir}/${testDomain}
@ -87,6 +92,7 @@
nodes.machine = webnsupdate-machine; nodes.machine = webnsupdate-machine;
testScript = '' testScript = ''
machine.start(allow_reboot=True) machine.start(allow_reboot=True)
machine.wait_for_unit("bind.service")
machine.wait_for_unit("webnsupdate.service") machine.wait_for_unit("webnsupdate.service")
# ensure base DNS records area available # ensure base DNS records area available

View file

@ -37,17 +37,18 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1734424634, "lastModified": 1735291276,
"narHash": "sha256-cHar1vqHOOyC7f1+tVycPoWTfKIaqkoe1Q6TnKzuti4=", "narHash": "sha256-NYVcA06+blsLG6wpAbSPTCyLvxD/92Hy4vlY9WxFI1M=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "d3c42f187194c26d9f0309a8ecc469d6c878ce33", "rev": "634fd46801442d760e09493a794c4f15db2d0cbb",
"type": "github" "type": "github"
}, },
"original": { "original": {
"id": "nixpkgs", "owner": "NixOS",
"ref": "nixos-unstable", "ref": "nixos-unstable",
"type": "indirect" "repo": "nixpkgs",
"type": "github"
} }
}, },
"root": { "root": {

View file

@ -6,7 +6,7 @@
url = "github:hercules-ci/flake-parts"; url = "github:hercules-ci/flake-parts";
inputs.nixpkgs-lib.follows = "nixpkgs"; inputs.nixpkgs-lib.follows = "nixpkgs";
}; };
nixpkgs.url = "nixpkgs/nixos-unstable"; nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
systems.url = "github:nix-systems/default"; systems.url = "github:nix-systems/default";
treefmt-nix = { treefmt-nix = {
url = "github:numtide/treefmt-nix"; url = "github:numtide/treefmt-nix";