<
aboutsummaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
author宋文武 <iyzsong@gmail.com>2016-06-27 21:10:49 +0800
committer宋文武 <iyzsong@gmail.com>2016-06-27 22:17:21 +0800
commitb26760302a456a8cfe71e596469f98944726543a (patch)
tree78c88217f7f92a003158894b6f36a8fb55bd8fe7 /tests
parent24c9aa18108639f46ceb96fc51a9050f004df240 (diff)
downloadguix-b26760302a456a8cfe71e596469f98944726543a.tar.gz
guix-b26760302a456a8cfe71e596469f98944726543a.zip
gnu: python-orator: Rearrange inputs.
* gnu/packages/python.scm (python-orator)[native-inputs]: Move python-arrow, python-blinker, python-cleo, python-fake-factory, python-inflection, python-lazy-object-proxy, python-pyaml, python-simplejson, python-wrapt ... [propagated-inputs]: to here.
Diffstat (limited to 'tests')
0 files changed, 0 insertions, 0 deletions
che) (nscd-cache (inherit cache) (max-database-size (expt 2 18)))) ;256KiB %nscd-default-caches)) (define* (containerized-operating-system os mappings #:key shared-network? (extra-file-systems '())) "Return an operating system based on OS for use in a Linux container environment. MAPPINGS is a list of <file-system-mapping> to realize in the containerized OS. EXTRA-FILE-SYSTEMS is a list of file systems to add to OS." (define user-file-systems (remove (lambda (fs) (let ((target (file-system-mount-point fs)) (source (file-system-device fs))) (or (string=? target (%store-prefix)) (string=? target "/") (and (string? source) (string-prefix? "/dev/" source)) (string-prefix? "/dev/" target) (string-prefix? "/sys/" target)))) (operating-system-file-systems os))) (define (mapping->fs fs) (file-system (inherit (file-system-mapping->bind-mount fs)) (needed-for-boot? #t))) (define services-to-drop ;; Service types to filter from the original operating-system. Some of ;; these make no sense in a container (e.g., those that access ;; /dev/tty[0-9]), while others just need to be reinstantiated with ;; different configs that are better suited to containers. (append (list console-font-service-type mingetty-service-type agetty-service-type) (if shared-network? ;; Replace these with dummy-networking-service-type below. (list static-networking-service-type dhcp-client-service-type network-manager-service-type connman-service-type) (list)))) (define services-to-add ;; Many Guix services depend on a 'networking' shepherd ;; service, so make sure to provide a dummy 'networking' ;; service when we are sure that networking is already set up ;; in the host and can be used. That prevents double setup. (if shared-network? (list (service dummy-networking-service-type)) '())) (define os-with-base-essential-services (operating-system (inherit os) (swap-devices '()) ; disable swap (services (append services-to-add (filter-map (lambda (s) (cond ((memq (service-kind s) services-to-drop) #f) ((eq? nscd-service-type (service-kind s)) (service nscd-service-type (nscd-configuration (inherit (service-value s)) (caches %nscd-container-caches)))) ((eq? guix-service-type (service-kind s)) ;; Pass '--disable-chroot' so that ;; guix-daemon can build thing even in ;; Docker without '--privileged'. (service guix-service-type (guix-configuration (inherit (service-value s)) (extra-options (cons "--disable-chroot" (guix-configuration-extra-options (service-value s))))))) (else s))) (operating-system-user-services os)))) (file-systems (append (map mapping->fs (if shared-network? (append %network-file-mappings mappings) mappings)) extra-file-systems user-file-systems ;; Provide a dummy root file system so we can create ;; a 'boot-parameters' file. (list (file-system (mount-point "/") (device "nothing") (type "dummy"))))))) ;; `essential-services' is thunked, we need to evaluate it separately. (operating-system (inherit os-with-base-essential-services) (essential-services (container-essential-services os-with-base-essential-services #:shared-network? shared-network?)))) (define* (container-script os #:key (mappings '()) shared-network?) "Return a derivation of a script that runs OS as a Linux container. MAPPINGS is a list of <file-system> objects that specify the files/directories that will be shared with the host system." (define (mountable-file-system? file-system) ;; Return #t if FILE-SYSTEM should be mounted in the container. (and (not (string=? "/" (file-system-mount-point file-system))) (file-system-needed-for-boot? file-system))) (define (os-file-system-specs os) (map file-system->spec (filter mountable-file-system? (operating-system-file-systems os)))) (let* ((os (containerized-operating-system os (cons %store-mapping mappings) #:shared-network? shared-network? #:extra-file-systems %container-file-systems)) (specs (os-file-system-specs os))) (define script (with-imported-modules (source-module-closure '((guix build utils) (gnu build linux-container) (guix i18n) (guix diagnostics))) #~(begin (use-modules (gnu build linux-container) (gnu system file-systems) ;spec->file-system (guix build utils) (guix i18n) (guix diagnostics) (srfi srfi-1) (srfi srfi-37) (ice-9 match)) (define (show-help) (display (G_ "Usage: run-container [OPTION ...] Run the container with the given options.")) (newline) (display (G_ " --share=SPEC share host file system with read/write access according to SPEC")) (display (G_ " --expose=SPEC expose host file system directory as read-only according to SPEC")) (newline) (display (G_ " -h, --help display this help and exit")) (newline)) (define %options ;; Specifications of the command-line options. (list (option '(#\h "help") #f #f (lambda args (show-help) (exit 0))) (option '("share") #t #f (lambda (opt name arg result) (alist-cons 'file-system-mapping (specification->file-system-mapping arg #t) result))) (option '("expose") #t #f (lambda (opt name arg result) (alist-cons 'file-system-mapping (specification->file-system-mapping arg #f) result))))) (define (parse-options args options) (args-fold args options (lambda (opt name arg . rest) (report-error (G_ "~A: unrecognized option~%") name) (exit 1)) (lambda (op res) (cons op res)) '())) (define (explain pid) ;; XXX: We can't quite call 'bindtextdomain' so there's actually ;; no i18n. ;; XXX: Should we really give both options? 'guix container exec' ;; is a more verbose command. Hard to fail to enter the container ;; when we list two options. (info (G_ "system container is running as PID ~a~%") pid) (info (G_ "Run 'sudo guix container exec ~a /run/current-system/profile/bin/bash --login'\n") pid) (info (G_ "or run 'sudo nsenter -a -t ~a' to get a shell into it.~%") pid) (newline (guix-warning-port))) (let* ((opts (parse-options (cdr (command-line)) %options)) (mappings (filter-map (match-lambda (('file-system-mapping . mapping) mapping) (_ #f)) opts)) (file-systems (filter-map (lambda (fs) (let ((flags (file-system-flags fs))) (and (or (not (memq 'bind-mount flags)) (file-exists? (file-system-device fs))) fs))) (append (map file-system-mapping->bind-mount mappings) (map spec->file-system '#$specs))))) (call-with-container file-systems (lambda () (setenv "HOME" "/root") (setenv "TMPDIR" "/tmp") (setenv "GUIX_NEW_SYSTEM" #$os) (for-each mkdir-p '("/run" "/bin" "/etc" "/home" "/var")) (primitive-load (string-append #$os "/boot"))) ;; A range of 65536 uid/gids is used to cover 16 bits worth of ;; users and groups, which is sufficient for most cases. ;; ;; See: http://www.freedesktop.org/software/systemd/man/systemd-nspawn.html#--private-users= #:host-uids 65536 #:namespaces (if #$shared-network? (delq 'net %namespaces) %namespaces) #:process-spawned-hook explain))))) (gexp->script "run-container" script))) (define* (eval/container exp #:key (mappings '()) (namespaces %namespaces) (guest-uid 0) (guest-gid 0)) "Evaluate EXP, a gexp, in a new process executing in separate namespaces as listed in NAMESPACES. Add MAPPINGS, a list of <file-system-mapping>, to the set of directories visible in the process's mount namespace. Inside the namespaces, run code as GUEST-UID and GUEST-GID. Return the process' exit status as a monadic value. This is useful to implement processes that, unlike derivations, are not entirely pure and need to access the outside world or to perform side effects." (mlet %store-monad ((lowered (lower-gexp exp))) (define inputs (cons (lowered-gexp-guile lowered) (lowered-gexp-inputs lowered))) (define items (append (append-map derivation-input-output-paths inputs) (lowered-gexp-sources lowered))) (mbegin %store-monad (built-derivations inputs) (mlet %store-monad ((closure ((store-lift requisites) items))) (return (call-with-container (map file-system-mapping->bind-mount (append (map (lambda (item) (file-system-mapping (source item) (target source))) closure) mappings)) (lambda () (apply execl (string-append (derivation-input-output-path (lowered-gexp-guile lowered)) "/bin/guile") "guile" (append (append-map (lambda (directory) `("-L" ,directory)) (lowered-gexp-load-path lowered)) (append-map (lambda (directory) `("-C" ,directory)) (lowered-gexp-load-compiled-path lowered)) (list "-c" (object->string (lowered-gexp-sexp lowered)))))) #:namespaces namespaces #:guest-uid guest-uid #:guest-gid guest-gid))))))