Commit graph

6414 commits

Author SHA1 Message Date
IndeedNotJames 254180d508
nixosTests.gitea: fix sshd race condition 2023-04-21 03:56:51 +02:00
github-actions[bot] 7fea76bc9d
Merge master into staging-next 2023-04-21 00:02:18 +00:00
Weijia Wang 8b1ef3b06c
Merge pull request #225222 from Luflosi/test-aaaaxy
nixos/tests/aaaaxy: init
2023-04-20 22:31:30 +03:00
K900 7a86a7f9ed nixos/tests/pipewire: don't enable pipewire in test VM
It's not actually used
2023-04-20 18:02:38 +03:00
Maximilian Bosch 430f1dcdbd
nextcloud: remove nextcloud24, 25.0.5 -> 25.0.6, 26.0.0 -> 26.0.1 2023-04-20 11:34:54 +02:00
Flakebi 603e89eef9 kanidm: BindMount certificate paths
Bind mount the base dirs of the tls key and chain into the service.

Make sure to bind every directory just once. The test failed on ofborg
when /nix/store and the certificate path in /nix/store/<some path> were
bound.
2023-04-20 02:32:37 +02:00
Alyssa Ross e6c0587ee5
nixosTests.power-profiles-daemon: enable polkit
I think this is required for the gdbus invocations used to implement
the test, rather than for power-profiles-daemon itself.

Fixes: a813be071c ("nixos/polkit: don't enable by default")
2023-04-19 14:21:15 +00:00
Sandro 4f6b51d99c
Merge pull request #224212 from Guekka/monica
monica: init at 4.0.0 & nixos-module
2023-04-18 16:58:42 +02:00
Sandro ed7dd78b3f
Merge pull request #225274 from tie/nixos-pufferpanel
nixos/pufferpanel: init
2023-04-18 16:57:14 +02:00
Albert Peschar 0f05321d78 zfs: enable keylocation=http://
When ZFS is built with cURL, it allows retrieving encryption keys from
URLs automatically.
2023-04-18 17:44:25 +03:00
Linus Heckemann b14aded48a
Merge pull request #222617 from oddlama/esphome
nixos/esphome: init module
2023-04-18 06:45:40 +02:00
Will Fancher 3cb9534df6 systemd-initrd: Flush networkd 2023-04-17 16:41:36 -04:00
Will Fancher 834ec135ce systemd-initrd: OpenVPN 2023-04-17 16:41:35 -04:00
Will Fancher 0698a1cf04 systemd-initrd: sshd 2023-04-17 16:41:35 -04:00
Will Fancher 748f1329fc systemd-initrd: Automatically configure networking.interfaces 2023-04-17 16:41:35 -04:00
Will Fancher dd392d7c76 systemd-initrd: networkd 2023-04-17 16:41:34 -04:00
Ryan Lahfa 6bf4cde63f
Merge pull request #226214 from leon-barrett/leon-make-disk-image-dir
nixos/make-disk-image: fix contents dir paths
2023-04-16 21:49:09 +02:00
Guillaume Girol 40bbc9ae53
Merge pull request #225285 from symphorien/ihm-remove
python3.pkgs.ihatemoney: remove
2023-04-16 19:23:00 +00:00
Leon Barrett 15c760d6b8 nixos/make-disk-image: fix contents dir paths
`make-disk-image` is a tool for creating VM images. It takes an argument
`contents` that allows one to specify files and directories that should
be copied into the VM image. However, directories end up not at the
specified target, but instead at a subdirectory of the target, with a
nix-store-like path, e.g.
`/target/xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx-source`. See issue
https://github.com/NixOS/nixpkgs/issues/226203 .

This change adds a test for make-disk-image's contents directory
handling and adds a fix (appending `/` to rsync input directory names).

This closes issue https://github.com/NixOS/nixpkgs/issues/226203 .
2023-04-16 09:54:45 -07:00
Leon Barrett a711e445cc nixos/tests/ec2: Fix test tooling
This change fixes two problems with the qemu testing code:
1. Previously, the qemu-img command was missing a disk image format
   argument.
2. Previously, if a test assertion failed, the test hung because the VM
   was not torn down.
2023-04-16 09:54:10 -07:00
Guillaume Girol 3cc8b4477e python3.pkgs.ihatemoney: remove
sqlalchemy and flask releases break ihatemoney faster than upstream
updates, so the maintenance burden increases over time.
2023-04-16 16:04:35 +02:00
Ivan Trubach 4bbe09068a nixos/pufferpanel: init 2023-04-16 15:41:24 +03:00
Edgar B 33a7f368b4 nixos/monica: init 2023-04-16 11:24:00 +02:00
Luflosi f2be3ae30d
nixos/kubo: restrict access to the API to users in a group by default 2023-04-15 15:25:20 +02:00
Luflosi 7ceebbb35b
nixos/kubo: allow multiple API and Gateway addresses
The daemon allows specifying an array of multiaddrs for Addresses.API and Addresses.Gateway, so the NixOS module should allow that as well.
2023-04-15 15:25:06 +02:00
Luflosi 929a00bd84
nixos/kubo: give normal users access to the daemon by default
Fixes https://github.com/NixOS/nixpkgs/issues/223289.

This doesn't reduce the security in any way since it was already possible for normal users to do what I do here and create such a fake repo for themselves and set their $IPFS_PATH variable to it. It was and still is also possible to just use the --api CLI option.
This change just removes the manual setup that would otherwise be required.

We wouldn't need this workaround if https://github.com/ipfs/kubo/pull/9366 was merged but the fix seems to have been ignored upstream. Patching it ourselves seems like a bad idea since the patch has security implications.
2023-04-15 15:24:58 +02:00
Luflosi 409df93c01
nixos/tests/kubo: use subtests instead of comments
Specify the intent of parts of the tests by using `with subtest("...")` instead of a comment for more clarity.
2023-04-15 15:24:49 +02:00
Luflosi bf97703f0e
nixos/tests/kubo: clean up code
- Use `runTest` instead of `handleTest`, which simplifies the code a little
- Use `lib.maintainers` instead of `pkgs.lib.maintainers`
- Use `ipfs add --quieter` instead of `ipfs add | awk '{ print $2 }'`
- Whitespace and comment changes
2023-04-15 15:24:43 +02:00
Luflosi 62bff9ab15
nixos/tests/kubo: add Luflosi as maintainer 2023-04-15 15:24:37 +02:00
Alyssa Ross 3a776e1e30 nixosTests.cage: fix OCR properly
The underlying problem with OCR in this test has been that the only
font installed was DejaVu Sans, a proportional font, which xterm would
try to render as monospace.  This produced very broken looking text,
which the OCR understandably had trouble with.  With an actual
monospace font installed, there are no more problems and we don't need
the hacks.
2023-04-14 22:32:26 +00:00
Sandro f9e70759cd
Merge pull request #213816 from karmanyaahm/karmanyaahm/nixos/kubo 2023-04-14 00:48:37 +02:00
Jonas Heinrich 86a685ceb1 nixos/maddy: Add option ensureCredentials 2023-04-13 09:36:54 -04:00
Karmanyaah Malhotra 5fb09c9e3a nixos/kubo: Test Kubo restart after a crash
Move strip() to definition

Co-authored-by: Luflosi <Luflosi@users.noreply.github.com>
2023-04-13 03:14:59 -05:00
Karmanyaah Malhotra 28949db47e nixos/kubo: reenable FUSE test with workaround
Update comment notice on broken fuse

Co-authored-by: Luflosi <Luflosi@users.noreply.github.com>
2023-04-13 03:14:59 -05:00
Luflosi 6032e00504
nixos/tests/aaaaxy: init
Add a simple VM test for the game AAAAXY.
2023-04-13 00:43:44 +02:00
Sandro 603320b64f
Merge pull request #204534 from SuperSandro2000/boot-tmp 2023-04-12 21:37:47 +02:00
Will Fancher e70b42bf61 systemd-initrd: Add users and groups with static IDs. 2023-04-12 13:55:50 -04:00
Ryan Lahfa 6a101d0be6
Merge pull request #225225 from puppe/fix-yggdrasil-tests
nixos/yggdrasil: fix yggdrasil local peering test
2023-04-12 13:36:37 +02:00
github-actions[bot] 47157337bf
Merge master into staging-next 2023-04-12 00:02:18 +00:00
Will Fancher fef26d88e2 systemd-initrd: Support secrets when boot loader doesn't
initrd-secrets: Fix service config with systemd-stage-1
2023-04-11 15:20:47 -04:00
Jörg Thalheim 89103b63d2
Merge pull request #225195 from Mic92/buildbot
buildbot: move out of python3.pkgs
2023-04-11 19:49:24 +01:00
github-actions[bot] 4e2c1815ed
Merge master into staging-next 2023-04-11 18:01:18 +00:00
Martin Weinelt 7e8b87566a
Merge pull request #219493 from covert8/ceph-17
ceph: 16.2.10 -> 17.2.5
2023-04-11 19:35:38 +02:00
marius david 83c344fedb nixos/tests/yggdrasil: fix local peering test 2023-04-11 14:34:28 +02:00
Jörg Thalheim 90b750456e buildbot: move out of python3.pkgs
By moving it out we can start apply overrides to python dependendencies
starting with sqlalchemy.

This fixes the build with the current version.
2023-04-11 12:38:58 +02:00
github-actions[bot] fc0616b73d
Merge master into staging-next 2023-04-09 06:01:16 +00:00
Sandro 60a935583a
Merge pull request #211607 from Izorkin/fix-nginx-test 2023-04-09 02:59:58 +02:00
github-actions[bot] 75e19b98bb
Merge master into staging-next 2023-04-08 00:02:03 +00:00
Michele Guerini Rocco 26c3a8a421
Merge pull request #219580 from rnhmjoj/pr-libreswan
libreswan fixes
2023-04-07 20:32:56 +02:00
Vladimír Čunát b856c0f8f4
Merge #218143: GNOME: 43 → 44
...into staging-next
2023-04-07 16:09:13 +02:00
Viv Lim c778f4d225 nixos/mastodon: Allow configuring sidekiq processes
This change allows the number of sidekiq processes and which job classes
they handle to be configured.

An instance admin may choose to have separate sidekiq processes handling
jobs related to local users (`default` job class) and jobs related to
federation (`push`, `pull`, `ingress`), so that as the instance grows
and takes on more federation traffic, the local users' experience is not
as impacted.

For more details, see https://docs.joinmastodon.org/admin/scaling/#sidekiq

This pr also includes the following changes suggested in review:

- adds syslog identifiers for mastodon services
- moves working directory config to common cfgService
- adds mastodon.target
2023-04-06 16:30:16 +02:00
Jan Tojnar d8dde72fbb nixosTests.gnome: Fix tests for 44
1. Launching an app externally (like we do in tests) does not dismiss the GNOME Shell’s Activities view opened on log-in.
2. Activities view grabs input so that user can type to search.
3. Due to a regression in Mutter 44, a window focus is not acquired when Shell grabs input
   3ac82a58c5

As a result, trying to determine the WMClass would throw:

    TypeError: global.display.focus_window is null

Let’s dismiss the Activities view with Escape key as a workaround.
2023-04-06 04:19:08 +02:00
Jan Tojnar 98d2e797e8 nixos/tests/gnome: Do not use autostart and switch to kgx
Starting terminal with autostart makes it harder to control when it is activated.
This reverts commit 7aaf526225.

Unfortunately, we cannot simply just go back since that would fail
as mentioned in the reverted commit.
It appears that this is due to the app not being able to find DISPLAY,
since switching to a different terminal emulator will complain:

    (kgx:1612): Gtk-WARNING **: 01:12:49.988: cannot open display: :0.0

Let’s use D-Bus activation rather than executing the program through su.
That will hopefully take care of all the necessary environment variables.

And since GNOME Terminal does not support D-Bus activation for the app,
let’s switch to GNOME Console. It probably makes sense anyway,
as it is the default terminal emulator.

Also let’s unify the WMClass detection a bit. Though, weirdly,
the WMClass differs on Wayland.
2023-04-06 04:19:08 +02:00
oddlama 8df62ec46c
nixos/esphome: init module 2023-04-05 17:35:58 +02:00
Sandro aba8811574
Merge pull request #220216 from 06kellyjac/tracee
tracee: 0.11.0 -> 0.13.0
2023-04-05 14:22:50 +02:00
Ryan Lahfa a6bc6ed645
Merge pull request #206983 from minijackson/netbox-3.4.1
netbox: 3.3.9 -> 3.4.7, netbox_3_3: init at 3.3.10, RFC42-style options, more tests
2023-04-05 14:04:27 +02:00
06kellyjac 27f407b4bb tracee: 0.11.0 -> 0.13.0
Also split out into separate outputs and dropped tracee-*
binaries due to the new single tracee binary

Mark aarch64-linux as officially supported
2023-04-05 10:47:26 +01:00
Martin Weinelt ca051755d9
Merge pull request #224495 from Mic92/mediawiki-postgres
mediawiki: add support for postgresql
2023-04-04 12:21:06 +02:00
Minijackson 78eb4d64e7 netbox_3_3: init
reintroduce previous version, use in NixOS module if stateVersion < 23.05
2023-04-04 11:45:31 +02:00
Minijackson 949763988a nixos/tests/netbox: test through proxy, REST API, GraphQL, LDAP integration 2023-04-04 11:45:30 +02:00
ajs124 3acb3d73ae elasticsearch-oss: remove 2023-04-04 10:32:26 +02:00
ajs124 09a6672bbf elasticsearch6*: remove 2023-04-04 10:32:23 +02:00
Jörg Thalheim d9c613d746 mediawiki: add support for postgresql 2023-04-04 07:50:04 +02:00
Bobby Rong 28031f7579
Merge pull request #216737 from FedericoSchonborn/budgie
Budgie Desktop
2023-04-03 10:57:32 +08:00
Federico Damián Schonborn ce6f0af954
nixos/doc: add release note for Budgie Desktop
Signed-off-by: Federico Damián Schonborn <fdschonborn@gmail.com>
2023-04-02 21:52:39 -03:00
Federico Damián Schonborn c0dcb5c24a
nixos/tests/budgie: init
Signed-off-by: Federico Damián Schonborn <fdschonborn@gmail.com>
2023-04-02 21:52:36 -03:00
Izorkin c72007809d
nixos/tests/nginx: update nginx-http3 test 2023-04-01 16:25:44 +03:00
Izorkin 7ec7922b04
nixos/tests/nginx: update test script 2023-04-01 13:51:49 +03:00
Sandro c2ae278eb8
Merge pull request #221851 from Ma27/postgresql-jit-support
postgresql: implement opt-in JIT support
2023-03-29 13:29:30 +02:00
Maximilian Bosch e2fb651752
nixos/postgresql: fix enableJIT
Make sure that JIT is actually available when using

    services.postgresql = {
      enable = true;
      enableJIT = true;
      package = pkgs.postgresql_15;
    };

The current behavior is counter-intuitive because the docs state that
`enableJIT = true;` is sufficient even though it wasn't in that case
because the declared package doesn't have the LLVM dependency.

Fixed by using `package.withJIT` if `enableJIT = true;` and
`package.jitSupport` is `false`.

Also updated the postgresql-jit test to test for that case.
2023-03-29 08:39:47 +02:00
Maximilian Bosch 608cb37533
nixos/tests/postgresql: fix deprecation warning 2023-03-29 08:39:46 +02:00
Maximilian Bosch 2282fa73a1
postgresql: implement opt-in JIT support
Closes #150801

Note: I decided against resuming directly on #150801 because the
conflict was too big (and resolving it seemed too error-prone to me).
Also the `this`-refactoring could be done in an easier manner, i.e. by
exposing JIT attributes with the correct configuration. More on that
below.

This patch creates variants of the `postgresql*`-packages with JIT[1]
support. Please note that a lot of the work was derived from previous
patches filed by other contributors, namely dasJ, andir and abbradar,
hence the co-authored-by tags below.

Effectively, the following things have changed:

* For JIT variants an LLVM-backed stdenv with clang is now used as
  suggested by dasJ[2]. We need LLVM and CLang[3] anyways to build the
  JIT-part, so no need to mix this up with GCC's stdenv. Also, using the
  `dev`-output of LLVM and clang's stdenv for building (and adding llvm
  libs as build-inputs) seems more cross friendly to me (which will
  become useful when cross-building for JIT-variants will actually be
  supported).

* Plugins inherit the build flags from the Makefiles in
  `$out/lib/pgxs/src` (e.g. `-Werror=unguarded-availability-new`). Since
  some of the flags are clang-specific (and stem from the use of the
  CLang stdenv) and don't work on gcc, the stdenv of `pkgs.postgresql`
  is passed to the plugins. I.e., plugins for non-JIT variants are built
  with a gcc stdenv on Linux and plugins for JIT variants with a clang
  stdenv.

  Since `plv8` hard-codes `gcc` as `$CC` in its Makefile[4], I marked it
  as broken for JIT-variants of postgresql only.

* Added a test-matrix to confirm that JIT works fine on each
  `pkgs.postgresql_*_jit` (thanks Andi for the original test in
  #124804!).

* For each postgresql version, a new attribute
  `postgresql_<version>_jit` (and a corresponding
  `postgresqlPackages<version>JitPackages`) are now exposed for better
  discoverability and prebuilt artifacts in the binary cache.

* In #150801 the `this`-argument was replaced by an internal recursion.
  I decided against this approach because it'd blow up the diff even
  more which makes the readability way harder and also harder to revert
  this if necessary.

  Instead, it is made sure that `this` always points to the correct
  variant of `postgresql` and re-using that in an additional
  `.override {}`-expression is trivial because the JIT-variant is
  exposed in `all-packages.nix`.

* I think the changes are sufficiently big to actually add myself as
  maintainer here.

* Added `libxcrypt` to `buildInputs` for versions <v13. While
  building things with an LLVM stdenv, these versions complained that
  the extern `crypt()` symbol can't be found. Not sure what this is
  exactly about, but since we want to switch to libxcrypt for `crypt()`
  usage anyways[5] I decided to add it. For >=13 it's not relevant
  anymore anyways[6].

* JIT support doesn't work with cross-compilation. It is attempted to
  build LLVM-bytecode (`%.bc` is the corresponding `make(1)`-rule) for
  each sub-directory in `backend/` for the JIT apparently, but with a
  $(CLANG) that can produce binaries for the build, not the host-platform.

  I managed to get a cross-build with JIT support working with
  `depsBuildBuild = [ llvmPackages.clang ] ++ buildInputs`, but
  considering that the resulting LLVM IR isn't platform-independent this
  doesn't give you much. In fact, I tried to test the result in a VM-test,
  but as soon as JIT was used to optimize a query, postgres would
  coredump with `Illegal instruction`.

A common concern of the original approach - with llvm as build input -
was the massive increase of closure size. With the new approach of using
the LLVM stdenv directly and patching out references to the clang drv in
`$out` the effective closure size changes are:

    $ nix path-info -Sh $(nix-build -A postgresql_14)
    /nix/store/kssxxqycwa3c7kmwmykwxqvspxxa6r1w-postgresql-14.7	306.4M
    $ nix path-info -Sh $(nix-build -A postgresql_14_jit)
    /nix/store/xc7qmgqrn4h5yr4vmdwy56gs4bmja9ym-postgresql-14.7	689.2M

Most of the increase in closure-size stems from the `lib`-output of
LLVM

    $ nix path-info -Sh /nix/store/5r97sbs5j6mw7qnbg8nhnq1gad9973ap-llvm-11.1.0-lib
    /nix/store/5r97sbs5j6mw7qnbg8nhnq1gad9973ap-llvm-11.1.0-lib	349.8M

which is why this shouldn't be enabled by default.

While this is quite much because of LLVM, it's still a massive
improvement over the simple approach of adding llvm/clang as
build-inputs and building with `--with-llvm`:

    $ nix path-info -Sh $(nix-build -E '
	with import ./. {};
	postgresql.overrideAttrs ({ configureFlags ? [], buildInputs ? [], ... }: {
	  configureFlags = configureFlags ++ [ "--with-llvm" ];
	  buildInputs = buildInputs ++ [ llvm clang ];
	})' -j0)
    /nix/store/i3bd2r21c6c3428xb4gavjnplfqxn27p-postgresql-14.7	  1.6G

Co-authored-by: Andreas Rammhold <andreas@rammhold.de>
Co-authored-by: Janne Heß <janne@hess.ooo>
Co-authored-by: Nikolay Amiantov <ab@fmap.me>

[1] https://www.postgresql.org/docs/current/jit-reason.html
[2] https://github.com/NixOS/nixpkgs/pull/124804#issuecomment-864616931
    & https://github.com/NixOS/nixpkgs/pull/150801#issuecomment-1467868321
[3] This fails with the following error otherwise:
    ```
    configure: error: clang not found, but required when compiling --with-llvm, specify with CLANG=
    ```
[4] https://github.com/plv8/plv8/blob/v3.1.5/Makefile#L14
[5] https://github.com/NixOS/nixpkgs/pull/181764
[6] c45643d618
2023-03-29 08:39:46 +02:00
Martin Weinelt 0a33e0d071
Merge pull request #223479 from dotlambda/vaultwarden-1.28.0
vaultwarden: 1.27.0 -> 1.28.0
2023-03-28 22:50:12 +02:00
Robert Schütz f672b32b2e vaultwarden: 1.27.0 -> 1.28.0
Diff: https://github.com/dani-garcia/vaultwarden/compare/1.27.0..1.28.0

Changelog: https://github.com/dani-garcia/vaultwarden/releases/tag/1.28.0
2023-03-28 10:15:39 -07:00
Ryan Lahfa 482c735228
Merge pull request #223388 from 06kellyjac/authelia-move
authelia: move module under security and minor fixes
2023-03-27 21:59:57 +02:00
Ryan Lahfa 90b5f42ec9
Merge pull request #222946 from RaitoBezarius/zfs-6_2-6_3-compat
zfsUnstable: make it compatible again with 6.2.8 and potentially 6.3
2023-03-27 21:11:41 +02:00
K900 e74d28259d
Merge pull request #162479 from stuebinm/feature/mattermost-secrets
nixos/mattermost: add secretFile option for declarative configs (again)
2023-03-27 21:50:18 +03:00
stuebinm c29ca6704d mattermost: add environmentFile option to allow declarative secrets
This adds an option `services.mattermost.environmentFile`, intended to be
useful especially when `services.mattermost.mutableConfig` is set to `false`.
Since all mattermost configuration options can also be set by environment
variables, this allows managing secret configuration values in a declarative
manner without placing them in the nix store.
2023-03-27 20:46:01 +02:00
Raito Bezarius 56fa7ab066 nixos/tests/zfs: add zfsUnstable test for systemd-stage 1 2023-03-27 18:18:59 +02:00
06kellyjac 9b60eef4bd authelia: move module under security and minor fixes
Fixed test access to lib
Added nixos test to passthru
2023-03-27 12:00:07 +01:00
Sandro 8c426b77f5
Merge pull request #222584 from IndeedNotJames/nixos-consul 2023-03-27 01:26:44 +02:00
github-actions[bot] 6a3acb9982
Merge master into staging-next 2023-03-25 06:05:24 +00:00
Nick Cao 851cd65a21
Merge pull request #220776 from Vonfry/deprecated/fcitx4
fcitx: remove version 4
2023-03-25 10:23:06 +08:00
06kellyjac 818e73fc43 nixos/authelia: init tests 2023-03-24 21:23:41 -03:00
github-actions[bot] cead7e3e73
Merge master into staging-next 2023-03-25 00:02:20 +00:00
Martin Weinelt adb0c3560b
nixos/tests/ceph*: Enable on aarch64-linux 2023-03-24 23:50:45 +01:00
Martin Weinelt e56ea3c325
Merge pull request #222701 from jopejoe1/firefox
firefox-{beta,devedition}-unwrapped: init at 112.0b6
2023-03-24 21:34:31 +01:00
jopejoe1 8a5a08373f firefox-beta-unwrapped: init at 112.0b6 2023-03-24 14:18:26 +01:00
jopejoe1 80168addbe firefox-devedition-unwrapped: init at 112.0b6 2023-03-24 14:16:22 +01:00
Vladimír Čunát 12dd95fbb1
Merge branch 'master' into staging-next 2023-03-24 09:07:41 +01:00
Will Fancher 5a9b9e620d
Merge pull request #176828 from therishidesai/luks-multi-key-files
nixos/luksroot: add tryEmptyPassphrase option
2023-03-24 03:02:20 -04:00
github-actions[bot] 705ac3185e
Merge master into staging-next 2023-03-23 06:01:22 +00:00
Nick Cao 72a8c49415
Merge pull request #222311 from NickCao/qt6-vf
qt6.qtbase: add patch to fix handling of variable fonts
2023-03-23 13:33:22 +08:00
Nick Cao 1285c0a09b
Merge pull request #222205 from NickCao/zram-writeback-device
nixos/zram: add writebackDevice option and corresponding test
2023-03-23 13:14:08 +08:00
github-actions[bot] 6a3714135d
Merge master into staging-next 2023-03-23 00:02:14 +00:00
Maximilian Bosch c042a318a7
Merge pull request #222372 from NixOS/nextcloud26
nextcloud26: init at 26.0.0
2023-03-22 23:35:31 +01:00
Maximilian Bosch cbc539c19f nixos/nextcloud: minor fixups
* Apply review comments.
* Default to PHP 8.2 for v26.
2023-03-22 22:37:17 +01:00
Raito Bezarius d7a27b38a2 nixos/tests/nextcloud: do not expect failure on NC ≥26 with respect to RC4 bug 2023-03-22 22:37:16 +01:00
Raito Bezarius 5e5c4c975a nixos/web-apps/nextcloud: introduce nextcloud26 2023-03-22 22:37:13 +01:00
IndeedNotJames c229a6463e
nixos/tests/consul: stop consul cleanly
This should fix the flakyness of the test.

Forcefully killing the consul process can lead to
a broken `/var/lib/consul/node-id` file, which
will prevent consul from starting on that node again.
See https://github.com/hashicorp/consul/issues/3489

So instead of crashing the whole node, which leads to
this corruption from time to time, we kill the
networking instead, preventing any cluster
communication and then cleanly stop consul.
2023-03-22 19:18:34 +01:00
github-actions[bot] 85f7b5276e
Merge master into staging-next 2023-03-22 18:01:11 +00:00
Rishi Desai cccc3f8a8e nixos/luksroot: add tryEmptyPassphrase option 2023-03-22 09:17:23 -05:00
woojiq 296e7f92cd keyd: add keyd service and test
The keyd package already exists, but without a systemd service.

Keyd requires write access to /var/run to create its socket. Currently
the directory it uses can be changed with an environment variable, but
the keyd repo state suggests that this may turn into a compile-time
option. with that set, and some supplementary groups added, we can run
the service under DynamicUser.

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>
2023-03-22 15:12:29 +01:00
oxalica f4385d6010
nixosTests.noto-fonts-cjk-qt-default-weight: init 2023-03-22 16:26:30 +08:00
github-actions[bot] 797a2b9bcc
Merge master into staging-next 2023-03-21 18:01:07 +00:00
Lassulus 3839340fdb
Merge pull request #220656 from oxzi/restic-cache-fix
nixos/restic: generalize cache configuration
2023-03-22 00:37:46 +07:00
Martin Weinelt ffe3165b27
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- nixos/doc/manual/release-notes/rl-2305.section.md
2023-03-21 12:35:53 +01:00
Nick Cao cd3ffbdfe6
nixos/zram: add writebackDevice option and corresponding test 2023-03-21 09:26:27 +08:00
Nick Cao ed43ad02db
Merge pull request #222228 from erictapen/gollum
gollum: 5.3.0 -> 5.3.1
2023-03-21 09:25:30 +08:00
github-actions[bot] 75c28ec351
Merge master into staging-next 2023-03-20 18:01:16 +00:00
Kerstin Humm 424c98bf78
nixos/gollum: fix deprecation warning 2023-03-20 18:26:48 +01:00
Maximilian Bosch 5c5f710388
gitea: 1.18.5 -> 1.19.0
ChangeLog: https://github.com/go-gitea/gitea/releases/tag/v1.19.0
2023-03-20 14:32:10 +01:00
github-actions[bot] 84c97a9e91
Merge master into staging-next 2023-03-19 18:00:59 +00:00
Sandro Jäckel a5d95ac5fc
nixos/tmp: move /tmp options under boot.tmp 2023-03-19 18:49:37 +01:00
Francesco Gazzetta 0995aea49b
Merge pull request #202995 from tomfitzhenry/sgtpuzzles-test
nixos/tests/sgtpuzzles: init
2023-03-19 14:11:29 +00:00
github-actions[bot] 7c9f4934b8
Merge master into staging-next 2023-03-19 12:01:32 +00:00
Bjørn Forsman 48b0aa7164 nixos/sssd: create symlinks in /etc to fix sssctl
Without this, sssctl fails to read its configuration. Update the NixOS
test to ensure sssctl doesn't regress.
2023-03-19 09:28:35 +01:00
github-actions[bot] 403b148aa5
Merge master into staging-next 2023-03-18 18:01:02 +00:00
Luke Granger-Brown d384095645
Merge pull request #221838 from devusb/pomerium
pomerium: 0.20.0 -> 0.21.2
2023-03-18 17:49:01 +00:00
github-actions[bot] a912b83051
Merge master into staging-next 2023-03-18 12:01:30 +00:00
Morgan Helton 05655e8ad3 pomerium: add test for UI 2023-03-18 06:49:22 -05:00
Fabian Affolter 5f9354962d
Merge pull request #221690 from RaitoBezarius/nerdsnipe-more
maintainer: Add raitobezarius as maintainer of zfs & netdata
2023-03-18 11:29:05 +01:00
Bobby Rong b7650f44b5
Merge pull request #221278 from bobby285271/upd/xfce
Xfce updates
2023-03-18 17:40:50 +08:00
Atemu bd7309c5a3
Merge pull request #221469 from wegank/solr-drop
solr: drop
2023-03-18 10:17:43 +01:00
github-actions[bot] 36748936f9
Merge master into staging-next 2023-03-18 06:01:16 +00:00
Aidan Gauland 7fb4aae81f
nixos/peroxide: add module for peroxide service 2023-03-18 07:43:59 +13:00
Raito Bezarius 6da5fddeb5 netdata: add raitobezarius as a maintainer 2023-03-17 17:27:01 +01:00
github-actions[bot] 6746017444
Merge master into staging-next 2023-03-17 00:02:33 +00:00
Pascal Bach 7c166f412b
Merge pull request #221096 from awakesecurity/minio-paths
nixos/minio: gracefully handle root credentials file
2023-03-16 20:56:37 +01:00
github-actions[bot] 455127ad5e
Merge master into staging-next 2023-03-16 18:01:20 +00:00
Jacek Galowicz 10988b1ff0
Merge pull request #221251 from astro/test-driver
nixos/test-driver: fix allow_reboot
2023-03-16 17:42:27 +01:00
Weijia Wang c24a8ccc98 solr: drop 2023-03-16 16:17:04 +02:00
Astro 64a4ae6f37 nixos/test-driver: remove allow_reboot state from Machine, make it a start() kwarg 2023-03-16 01:50:15 +01:00
Astro f4331c4983 nixos/tests/login: use machine.reboot() for a proper reboot 2023-03-16 01:42:00 +01:00
github-actions[bot] 795332a826
Merge staging-next into staging 2023-03-15 18:01:44 +00:00
Martin Weinelt 578fb7fd1f
Merge pull request #220557 from mweinelt/libxcrypt-strong
libxcrypt: Build only with strong hashes
2023-03-15 16:43:12 +00:00
Vladimír Čunát a86610144f
Merge #219444: staging-next 2023-03-04 2023-03-15 17:35:39 +01:00
Sandro fbeb9b9a96
Merge pull request #215835 from illustris/hbase
nixos/hbase: add thrift and rest servers
2023-03-15 16:55:36 +01:00
Robert Hensing 816b884b5c nixosTests.nixops.unstable.legacyNetwork: Use system.includeBuildDependencies 2023-03-15 13:37:59 +01:00
Bobby Rong 49ca01bf9d
nixosTests.xfce: silence a deprecation warning
trace: warning: Module argument `nodes.machine.config` is deprecated. Use `nodes.machine` instead.
2023-03-15 17:03:35 +08:00
Martin Weinelt 6b67186fe9
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/python-modules/crownstone-cloud/default.nix
- pkgs/development/python-modules/exrex/default.nix
- pkgs/development/python-modules/mkdocs-minify/default.nix
- pkgs/development/python-modules/myjwt/default.nix
- pkgs/development/tools/analysis/checkov/default.nix
2023-03-14 08:14:26 +01:00
John Soo 29523c05e4
nixosTests/minio: format with nixpkgs-fmt 2023-03-13 18:01:16 -07:00
John Soo 4400f7d72f
nixosTests/minio: make sure editing root credentials restarts minio 2023-03-13 18:00:43 -07:00
Sandro 5e25ffd594
Merge pull request #218843 from teutat3s/garage-0.8.1 2023-03-13 22:23:53 +01:00
teutat3s 78286a06b0
garage: 0.8.0 -> 0.8.1
https://git.deuxfleurs.fr/Deuxfleurs/garage/compare/v0.8.0...v0.8.1

Fix tests by adding cacert

Use garage version 0_8 by default for nixos tests

Use same rust feature set as upstream for release binary and tests:
https://git.deuxfleurs.fr/Deuxfleurs/garage/src/tag/v0.8.1/nix/compile.nix#L181-L192
https://git.deuxfleurs.fr/Deuxfleurs/garage/src/tag/v0.8.1/default.nix#L40-L52
2023-03-13 13:55:36 +01:00
Vonfry f95c20d77d
nixos/fcitx5: init tests 2023-03-13 18:50:05 +08:00
Vonfry 051b74fe7d
nixos/fcitx: deprecated, and suggestions to use fcitx5 instead 2023-03-13 18:47:05 +08:00
Vladimír Čunát 2d51a0e8ad
Merge branch 'master' into staging-next 2023-03-13 08:25:10 +01:00
Martin Weinelt 4472cf44eb
treewide: Make yescrypt the default algorithm for pam_unix.so
This ensures `passwd` will default to yescrypt for newly generated
passwords.
2023-03-13 07:54:27 +01:00
Elis Hirwing ce76a6838c
Merge pull request #203487 from jocelynthode/init-readarr
readarr: init at 0.1.4.1596
2023-03-13 06:56:35 +01:00
Lassulus 47233b27c9
Merge pull request #167319 from schnusch/cgit 2023-03-13 09:51:08 +07:00
Martin Weinelt d03d74aa67
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/python-modules/aiopulse/default.nix
- pkgs/development/python-modules/identify/default.nix
- pkgs/development/python-modules/spur/default.nix
2023-03-12 23:28:23 +01:00
Jocelyn Thode e7f54823b1
readarr: init at 0.1.4.1596 2023-03-12 20:54:23 +01:00
Guillaume Girol db901673ea
Merge pull request #209156 from pwaller/issue-114594
nixos/grub: Name initrd-secrets by system, not by initrd
2023-03-12 18:50:33 +00:00
Vladimír Čunát 1dd94ad62f
Merge branch 'master' into staging-next 2023-03-12 09:06:28 +01:00
Martin Weinelt 2dbef07f09
Merge pull request #218126 from mweinelt/kea-dhcp-ddns-test
nixos/tests/kea: Test dhcp-ddns against knot
2023-03-11 22:58:53 +00:00
Martin Weinelt 487b6a38f3
nixos/tests/knot: Use more appropriate terminology 2023-03-11 22:23:10 +01:00
Martin Weinelt 1fc6f2c412
nixos/tests/knot: Use automatic-acl and drop explicit acls
This is more in line with expected production usage and if people use
this tests as a reference it should reflect that.
2023-03-11 22:23:10 +01:00
Martin Weinelt 2dc78b7a6d
nixos/tests/kea: Test dhcp-ddns against knot
Tests the propagation of DHCP hostnames into a DNS zone.
2023-03-11 22:23:09 +01:00
github-actions[bot] feb117e32c
Merge master into staging-next 2023-03-11 18:01:19 +00:00
Jonas Heinrich 161a1ca129
Merge pull request #191974 from tu-maurice/btrbk-doas
btrbk: Use sudo or doas based on configuration
2023-03-11 16:10:50 +01:00
github-actions[bot] 140a35879a
Merge master into staging-next 2023-03-11 12:01:11 +00:00
Alvar Penning adafbeff4a nixos/restic: generalize cache configuration
The restic repository cache location defaults to ~/.cache/restic when
not overwritten either by the --cache-dir command line parameter or the
universal RESTIC_CACHE_DIR environment variable.

Currently, the --cache-dir variable is set to only some restic commands,
but, e.g., not to the unit's preStart command for the module's
initialize option. This results in two distinct cache locations, one at
~/.cache/restic for the initialize commands and one at the configured
--cache-dir location for the restic backup command.

By explicitly setting RESTIC_CACHE_DIR for the unit, only one cache at
the correct location will be used.

https://restic.readthedocs.io/en/v0.15.1/manual_rest.html#caching
2023-03-11 12:59:10 +01:00
Mario Rodas dae678ad8f
Merge pull request #186276 from typetetris/feature/add-timescaledb-toolkit
timescaledb_toolkit: init at 1.14.0
2023-03-11 06:50:54 -05:00
github-actions[bot] 9ffe17a0be
Merge master into staging-next 2023-03-11 00:02:37 +00:00
Sergei Trofimovich 93fc62fd29
Merge pull request #220308 from amjoseph-nixpkgs/pr/hydra/fix-eval
nixos/tests/installer.nix: fix hydra eval
2023-03-10 21:54:41 +00:00
Alyssa Ross 8c70bfb9f2
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
	pkgs/development/libraries/librsvg/default.nix
	pkgs/development/python-modules/r2pipe/default.nix
2023-03-10 18:46:21 +00:00
Yureka 7efee351ec
Merge branch 'gitlab-pages' of github.com:talyz/nixpkgs into HEAD 2023-03-10 14:36:25 +01:00
Martin Weinelt ef91384e6f Merge remote-tracking branch 'origin/master' into staging-next 2023-03-10 13:09:25 +01:00
Stanisław Pitucha 5496585eb8
Merge pull request #186076 from viraptor/gemstash-service
nixos/gemstash: init module
2023-03-10 14:21:53 +11:00
github-actions[bot] 39f6788067
Merge master into staging-next 2023-03-09 12:01:27 +00:00
Adam Joseph 4d15fb3ade nixos/tests/installer.nix: fix hydra eval
Hydra Eval has been throwing these eval errors for the past four
months, which makes the yellow "Eval Errors" bubble pretty useless:

https://hydra.nixos.org/eval/1790611#tabs-errors

```
in job ‘nixos.tests.installer.separateBoot.aarch64-linux’:
error: Non-EFI boot methods are only supported on i686 / x86_64

in job ‘nixos.tests.installer.simple.aarch64-linux’:
error: Non-EFI boot methods are only supported on i686 / x86_64

in job ‘nixos.tests.installer.lvm.aarch64-linux’:
error: Non-EFI boot methods are only supported on i686 / x86_64
```

This PR moves the failure for the `!isEfi &&
!pkgs.stdenv.hostPlatform.isx86` case from eval-time to runtime, so
the failure gets categorized under the test that produced it, rather
than just being lumped in to the catch-all Eval Errors pile
which... apparently nobody cares about.
2023-03-09 00:58:26 -08:00
Domen Kožar 6a231a6eb7
Merge pull request #197613 from shyim/add-coder
coder: fix web frontend building
2023-03-09 12:04:16 +04:00
github-actions[bot] 7072ae38b6
Merge master into staging-next 2023-03-08 18:01:34 +00:00
Robert Hensing 1e383aada5
Merge pull request #214438 from agbrooks/master
dockerTools.buildImage: Handle base images w/ duplicate rootfs diffs
2023-03-08 18:55:20 +01:00
Martin Weinelt 3c902cd3e4 Merge remote-tracking branch 'origin/master' into staging-next 2023-03-08 03:36:07 +01:00
Bobby Rong 5fb8b948bf
Merge pull request #219677 from bobby285271/upd/pantheon.elementary-files
pantheon.elementary-files: 6.2.2 -> 6.3.0 + nixosTests.pantheon: ensure the password box is focused when login
2023-03-08 08:32:29 +08:00
Bobby Rong 2768866261
nixosTests.pantheon: ensure the password box is focused when login
Sometimes it is not focused for some reasons.
2023-03-07 23:39:22 +08:00
Martin Weinelt e3f019bb71 Merge remote-tracking branch 'origin/master' into staging-next 2023-03-07 15:05:00 +01:00
Florian Klink 5566961d2e nixosTests.hostname: stop using deprecated nodes.machine.config
Module argument `nodes.machine.config` is deprecated.
2023-03-07 13:29:19 +01:00
Florian Klink 27eab436bd nixos/tests/hostname.nix: nixpkgs-fmt 2023-03-07 13:29:19 +01:00
Stanisław Pitucha 70073985ae nixos/gemstash: init module 2023-03-07 15:56:56 +11:00
Martin Weinelt 86eedea2fe Merge remote-tracking branch 'origin/master' into staging-next 2023-03-06 17:38:35 +00:00
Ilan Joselevich edff57cff4
Merge pull request #218455 from veehaitch/gh-runner-builddotnet
github-runner: switch to `buildDotnetModule`
2023-03-06 19:11:06 +02:00
Martin Weinelt b04848e5fe Merge remote-tracking branch 'origin/master' into staging-next 2023-03-06 08:21:14 +01:00
Naïm Favier 6082d5bd0a
Merge pull request #219549 from SEIAROTg/master
nixos/wireguard: fix mtu after switching netns.
2023-03-05 22:56:29 +01:00
Will Fancher 4e9efd3432
Merge pull request #219716 from ElvishJerricco/virtualisation-filesystems-systemd-initrd-simple
nixos: Fix systemd-initrd-simple test
2023-03-05 13:56:38 -05:00
Will Fancher 74bc49a5a4 nixos: Fix systemd-initrd-simple test
This has been broken since 246d09fea2
2023-03-05 12:46:28 -05:00
rnhmjoj 6a6349cc33
nixos/tests/libreswan: attempt to fix flakiness 2023-03-04 20:06:32 +01:00
SEIAROTg 5a4dc2128e
nixos/wireguard: fix mtu after switching netns.
mtu is set after switching netns and thus the new netns should be used.
2023-03-04 18:51:12 +00:00
github-actions[bot] 8480c21d06
Merge master into staging-next 2023-03-04 12:01:17 +00:00
Maximilian Bosch 5cc539ae0f
Merge pull request #219203 from Ma27/gitea.nix-evaluatable
nixos/tests/gitea: keep calling the file itself evaluatable
2023-03-04 12:50:34 +01:00
Maximilian Bosch 8f17e8835a
Merge pull request #219358 from tomfitzhenry/phosh-maintainer
phosh: add tomfitzhenry@ as maintainer
2023-03-04 12:42:11 +01:00
Frederik Rietdijk 8cf8d77121 Merge master into staging-next 2023-03-04 09:38:25 +01:00
K900 84f3520c8f nixos/tests/nat: remove conntrack helpers test
Removed upstream
2023-03-04 10:53:48 +03:00
Martin Weinelt d0286ecd24 Merge remote-tracking branch 'origin/staging' into staging-next 2023-03-04 01:42:06 +00:00
Martin Weinelt b1eec1c61d nixos/tests/mjolnir: Require matrix-nio[e2e] 2023-03-03 23:59:32 +01:00
Maximilian Bosch c9bdd9352a
Merge pull request #219399 from Ma27/ma27-maintainership
maintainers/ma27: updates
2023-03-03 22:02:51 +01:00
Maximilian Bosch 3b02da3fdd
nixos/tests/gitea: keep calling the file itself evaluatable
When I work on something gitea-related I want to be able to just do
`nix-build nixos/tests/gitea.nix` to run the tests.
2023-03-03 22:00:49 +01:00
Maximilian Bosch e62c913822
treewide: remove ma27 from a bunch of packages (again)
Some of the stuff used to be needed for a project, for others I found
alternatives that suited better my needs. Anyways, I don't intend to
spend time maintaining these, so no need to keep that.
2023-03-03 21:25:26 +01:00
github-actions[bot] a74c8d03ea
Merge staging-next into staging 2023-03-03 18:01:44 +00:00
Tom Fitzhenry f86e1e9a79 nixos/tests/sgtpuzzles: init 2023-03-04 00:52:21 +11:00
Tom Fitzhenry a210bb2111 phosh: add tomfitzhenry@ as maintainer 2023-03-04 00:47:15 +11:00
Félix Baylac Jacqué bee41ce735 nixosTests/pleroma: node.xx.config -> node.xx
Accessing a test driver node configuration via node.xxx.config is now
deprecated. Migrating to the new API.
2023-03-03 08:18:29 +01:00
Martin Weinelt 0580d85143 Merge remote-tracking branch 'origin/staging-next' into staging 2023-03-03 04:46:31 +01:00
0x4A6F 8a3d244cc0
atuin: 12.0.0 -> 13.0.1, remove onsails from maintainers (#218841) 2023-03-02 12:23:50 -05:00
Maximilian Bosch f8bbedfcac
Merge pull request #219073 from IndeedNotJames/gitea-gpg
nixos/gitea: fix commit signing (`gpg`) core dump, add nixos test
2023-03-02 17:24:02 +01:00
github-actions[bot] 6c8444842c
Merge staging-next into staging 2023-03-02 12:02:00 +00:00
Arian van Putten 17ca3dd2a6
Merge pull request #217852 from justinas/teleport-12
teleport: 11.3.4 -> 12.0.2, reintroduce teleport_11
2023-03-02 11:18:24 +01:00
IndeedNotJames 249f6c4c1d
nixos/tests/gitea: test gpg commit signing key
`/api/v1/signing-key.gpg` spawns a `gpg` process,
which is great to test if `gpg` is available
and can be invoked from in the unit.

Which is somewhat relevant, since `gpg` was
missing from the unit's `$PATH` until recently.

And even after adding `gpg` to the unit's `$PATH`,
configuring commit signing for a instance
resulted in http/500s nonetheless.

That's due to `@memlock` being present in
`SystemCallFilter=~` and `gpg` trying to
use `mlock` (probably to prevent secrets
in the memory to swap), resulting in an
immediate `SIGKILL` of any spawned `gpg` processes.
2023-03-01 23:44:21 +01:00
github-actions[bot] 445e4a4069
Merge staging-next into staging 2023-02-28 12:01:54 +00:00
Justinas Stankevicius e831a3da98 nixos/tests/teleport: make justinas the maintainer 2023-02-28 13:22:50 +02:00
Justinas Stankevicius 31b5597cbd nixos/teleport: add "package" option 2023-02-28 13:22:50 +02:00
zowoq 2ab049a5c7 nixos/tests/podman: add zfs to rootful test 2023-02-28 18:08:29 +10:00
github-actions[bot] 387a5e220d
Merge staging-next into staging 2023-02-28 00:03:08 +00:00
Robert Scott 3a3d4c8bd2
Merge pull request #217902 from LeSuisse/haproxy-CVE-2023-25725
haproxy: 2.7.2 -> 2.7.3
2023-02-27 21:39:38 +00:00
Thomas Gerbet 43e79015bf nixos/tests/haproxy: stop using nixos/profiles/minimal
The defaults conflicts with the defaults of `services.httpd`:
```
error: The option `nodes.machine.services.logrotate.enable' has conflicting definition values:
       - In `/home/thomas/Workspace/Packaging/nixpkgs/nixos/modules/profiles/minimal.nix': false
       - In `/home/thomas/Workspace/Packaging/nixpkgs/nixos/modules/services/web-servers/apache-httpd/default.nix': true
       Use `lib.mkForce value` or `lib.mkDefault value` to change the priority on any of these definitions.
(use '--show-trace' to show detailed location information)
```

`nixos/profile/minimal` is not used in the majority of the tests and it does not
seem to have a specific reason to use it for the HAProxy test.
2023-02-27 17:56:56 +01:00
github-actions[bot] 5e46cfeba0
Merge staging-next into staging 2023-02-27 12:01:41 +00:00
Vincent Haupert e8df83d417 nixos/tests/github-runner: init 2023-02-26 15:39:19 +01:00
Robert Schütz 9a8272bd01 nixos/tests/txredisapi: stop using python38 2023-02-25 21:32:15 -08:00
Jan Tojnar 9bb986284f Merge branch 'staging-next' into staging
# Conflicts:
#	pkgs/development/python-modules/mdp/default.nix
#	pkgs/top-level/python-aliases.nix
2023-02-26 01:13:37 +01:00
Lily Foster 5508000ddf nixos/tests/shadow: ensure hashedPassword takes precedence over initialHashedPassword 2023-02-25 14:27:35 -05:00
pennae 5dce130d1c nixos/tests/unifi: inherit allowUnfree into test node
mongodb is unfree, so the test won't run without this. we already allow
unfree to grab the unifi packages, so it's not even a big change.
2023-02-25 19:12:08 +01:00
Florian Klink 4ed9534f12
Merge pull request #217942 from lilyinstarlight/fix/nixos-test-systemd-initrd-shutdown
nixos/tests/systemd-shutdown: ensure systemd-initrd variant actually enables it
2023-02-25 19:02:53 +01:00
Benjamin Asbach 546f356db6 remove myself as maintainer for now as I switched to another distro 2023-02-25 18:56:02 +01:00
Nick Cao eb03dde70d
Merge pull request #217890 from IndeedNotJames/nixos-tests-gitea
nixos/tests/gitea: open up test for forgejo
2023-02-25 09:55:43 +08:00
github-actions[bot] 13fb68e8cf
Merge staging-next into staging 2023-02-24 12:01:52 +00:00
Sandro 83b8193be9
Merge pull request #201780 from helsinki-systems/init/nextcloud-notify-push
nextcloud-notify-push: init at 0.5.0
2023-02-24 12:10:02 +01:00
IndeedNotJames 1b304e1dbc
forgejo: use existing nixos/tests/gitea as test
forgejo is a soft-fork of gitea and gitea's existing tests work great
with forgejo.
At least for now, as this could change, though somewhat unlikely.
2023-02-24 02:59:30 +01:00
IndeedNotJames 889eb7a315
nixos/tests/gitea: add indeednotjames as maintainer
Mostly, because I (@IndeedNotJames) made a slight change to those tests and intend on
extending them in the future.
2023-02-24 02:59:30 +01:00
IndeedNotJames 7d05a6a910
nixos/tests/gitea: make gitea package configurable
This allows the same tests to be used for forgejo, a soft-fork of
gitea, which currently does not have any tests.
2023-02-24 02:59:30 +01:00
Lily Foster 308657daec
nixos/tests/systemd-shutdown: ensure systemd-initrd variant actually enables it
It looks like the systemd-initrd variant of the systemd-shutdown test
(systemd-initrd-shutdown) did not actually enable the systemd-initrd and
so was just evaluating to the same store path before this change.
2023-02-23 19:42:45 -05:00
github-actions[bot] 67e4f6dde0
Merge staging-next into staging 2023-02-22 12:02:05 +00:00
Florian Klink 91a20ba38e
Merge pull request #214811 from flokli/google-oslogin-fix-test
nixosTests.google-oslogin: fix tests, provide group mock endpoint
2023-02-22 11:38:40 +01:00
github-actions[bot] f95edd46da
Merge staging-next into staging 2023-02-22 06:01:53 +00:00
zowoq 07b8c65c77 nixos/tests/podman: add test for rootless port forwarding 2023-02-22 10:16:58 +10:00
zowoq 9ab047538f nixos/tests/podman: refactor dns test and fix indentation 2023-02-22 10:16:58 +10:00
zowoq b53ab7f158 nixos/tests/podman: split podman into rootful/rootless 2023-02-22 10:16:58 +10:00
ajs124 8a5596aded nixosTests.nextcloud.with-postgresql-and-redis*: also test notify_push 2023-02-21 15:05:16 +01:00
github-actions[bot] 8d3dc41d38
Merge staging-next into staging 2023-02-21 12:02:07 +00:00
Elian Doran 4c164bc42d keepassxc: fix test timeout
The test was failing because it was timing out. Turns out it was waiting
for `foo.kdbx`, which couldn't be "seen" even if it actually existed
(probably some contrast issues with the theme and OCR couldn't find it).
Fixed it by delegating the check to the next screen, where the full path
to the file is displayed in a bigger size. The test seems to pass.
2023-02-21 09:29:23 +01:00
github-actions[bot] 2d285b1590
Merge staging-next into staging 2023-02-21 06:01:33 +00:00
Martin Weinelt d92d6030be
Merge pull request #217089 from mweinelt/hass-pythonpath
home-assistant: Load optional deps from PYTHONPATH
2023-02-21 00:52:47 +00:00
github-actions[bot] fc3641aa1e
Merge staging-next into staging 2023-02-21 00:03:04 +00:00
Will Fancher bb7cd63150
Merge pull request #215381 from lilyinstarlight/fix/make-initrd-ng-wrapped-executables
make-initrd-ng: support wrapped executables
2023-02-20 14:11:48 -05:00
Florian Klink d7c89bf807
Merge pull request #217254 from hesiod/nixos-test-systemd-credentials-master
nixos/tests/systemd-credentials-tpm2: Add tests for systemd credentials
2023-02-20 20:04:26 +01:00
github-actions[bot] e579b2b641
Merge staging-next into staging 2023-02-20 18:02:05 +00:00
Martin Weinelt f98462a27d
nixos/tests/home-assistant: Resolve deprecation warning
> trace: warning: Module argument `nodes.hass.config` is deprecated. Use `nodes.hass` instead.
2023-02-20 18:37:20 +01:00
Martin Weinelt 9bf8744a73
nixos/tests/home-assistant: Check dependencies arrive in the PYTHONPATH
Both extraPackages and derived packages from extraComponents should
be present in the units PYTHONPATH environment variable.
2023-02-20 18:37:20 +01:00
Martin Weinelt ba3f159cc8
nixos/tests/home-assistant: Overhaul and refactor
Prepare the tests for a change in dependency handling, by not relying on
bespoke files dropped into the package output.

Instead we now check the journal log for whether a configured component
was setup, once for the initial specialisation another time for the one
introducing esphome configuration.

Also improve abstractions for getting journal data relative to a cursor
and generally make a few things more concise.
2023-02-20 18:37:19 +01:00
Kim Lindberger e0c0a6c80c
Merge pull request #215523 from talyz/discourse-3.1.0.beta2
discourse: 2.9.0.beta14 -> 3.1.0.beta2
2023-02-20 13:58:05 +01:00
Tobias Markus e83babd493 nixos/tests/systemd-credentials-tpm2: Add tests for systemd credentials
Add a test that checks whether systemd can access the TPM in order
access credentials requested via Load/SetCredentialEncrypted.
2023-02-20 13:54:49 +01:00
github-actions[bot] 0a547ad8b7
Merge staging-next into staging 2023-02-20 12:02:08 +00:00
Nick Cao 504e2f1b85
Merge pull request #216999 from OPNA2608/update/miriway
miriway: Bump, link to upstream issue for VM test problem
2023-02-20 19:13:18 +08:00
Yureka ced929a2d0
nixos/tests: add test for luksroot and initrd keymaps (#189725) 2023-02-20 08:19:02 +01:00
github-actions[bot] b3557e8e31
Merge staging-next into staging 2023-02-19 18:01:52 +00:00
Euan Kemp c154180073 k3s: add ipset runtime dependency
Fixes #176445

The included change to the k3s test fails without the package change.
2023-02-19 14:38:40 +09:00
OPNA2608 0de3431e30 tests/miriway: Explicitly enable X11 for XWayland testing
Works fine without, but just in case
2023-02-18 20:40:53 +01:00
OPNA2608 b2a74bc0ab tests/miriway: Refer to upstream issue about keyboard problem 2023-02-18 20:03:02 +01:00
github-actions[bot] c466fa7ff4
Merge staging-next into staging 2023-02-18 00:02:56 +00:00
Jonas Heinrich 13ff144c70 nixos/maddy: Add option ensureAccounts 2023-02-17 17:42:27 -05:00
K900 9f987b895d
Merge pull request #216658 from K900/sensible-test-timeouts
nixos/tests: sensible test timeouts
2023-02-18 00:10:07 +03:00
github-actions[bot] 3b5c06282d
Merge staging-next into staging 2023-02-17 12:01:58 +00:00
Arian van Putten 98042fc6d3
Merge pull request #216357 from nikstur/systemd-repart-after-activation
nixos/systemd-repart: enable running after initrd
2023-02-17 12:56:24 +01:00
Florian Klink ab566b8656
Merge pull request #208269 from ElvishJerricco/systemd-stage-1-fsck
Systemd stage 1 fsck
2023-02-17 10:06:39 +02:00
K900 84434922bc nixos/tests/quake3: fix eval 2023-02-16 19:11:19 +03:00
K900 a456da3490 nixos/tests/pass-secret-service: fix eval 2023-02-16 19:11:10 +03:00
Martin Weinelt d02a1d779d
Merge pull request #216476 from helsinki-systems/upd/openldap
openldap: 2.6.3 -> 2.6.4
2023-02-16 12:47:17 +00:00
pennae 047bd73c5e nixos/wireguard: make publicKeys singleLineStrs
using readFile instead of fileContents (or using indented strings) can
leave a trailing newline that causes build errors in systemd units and
has previously caused runtime errors in wireguard scripts. use
singleLineStr to strip a trailing newline if it exists, and to fail if
more than one is present.
2023-02-16 11:56:12 +01:00
Kim Lindberger ad36a97de0
Merge pull request #175000 from shyim/add-opensearch
opensearch: init at 2.5.0
2023-02-15 18:11:53 +01:00
talyz 9e9007e45f
nixos/opensearch: Use DynamicUser and StateDirectory by default
...but still allow for setting `dataDir` to a custom path. This gets
rid of the use of the deprecated option PermissionsStartOnly. Also, add
the ability to customize user and group, since that could be useful
with a custom `dataDir`.
2023-02-15 16:38:24 +00:00
ajs124 3df3c93037 nixosTests.openldap: fix deprecation warning 2023-02-15 14:13:23 +01:00
K900 0f923da38b nixos/tests/predictable-interface-names: fix eval 2023-02-14 23:09:34 +03:00
Soner Sayakci 4561785dfc
nixos/tests/opensearch: init 2023-02-14 20:00:27 +00:00
nikstur b1ff1e1658 nixos/systemd-repart: enable running after initrd 2023-02-14 19:42:32 +01:00
Felix Bühler b025cb11c5
Merge pull request #214996 from Stunkymonkey/optionalString-1
treewide: use optionalString
2023-02-14 19:09:46 +01:00
superherointj e836805076
Merge pull request #215482 from moduon/k3s-test-all-versions
k3s: test all versions
2023-02-14 12:31:32 -03:00
Jairo Llopis 0ca947e125
k3s: dynamic detection of all k3s packages 2023-02-14 13:23:35 +00:00
Felix Buehler cdb39a86e0 treewide: use optionalString 2023-02-13 21:52:34 +01:00
Eric Wolf 9dc7a05a85 cargo-pgx/timescaledb_toolkit: add nixos test 2023-02-13 10:58:26 +01:00
github-actions[bot] 15bfb025ab
Merge master into staging-next 2023-02-11 18:01:19 +00:00
Andreas Stührk 8dade1f713 nixos/envoy: add option requireValidConfig to make config validation errors non-fatal
Co-authored-by: Vincent Haupert <vincent@yaxi.tech>
2023-02-11 18:21:21 +01:00
Vincent Haupert a36fc1d72a nixosTests.envoy: use port 80 to test CAP_NET_BIND_SERVICE 2023-02-11 18:21:21 +01:00
illustris 8f1c823ab0
nixos/hbase: add thrift and rest servers 2023-02-11 20:07:28 +05:30
github-actions[bot] e969c56b62
Merge master into staging-next 2023-02-11 00:02:21 +00:00
Arian van Putten 5b23d0e51c
Merge pull request #214396 from nikstur/systemd-repart
systemd-repart
2023-02-10 20:03:09 +01:00
nikstur 4700198654 nixos/systemd-repart: init 2023-02-10 14:05:44 +01:00
Jairo Llopis 52a153aae2
k3s: test all versions
Since https://github.com/NixOS/nixpkgs/issues/213943 got fixed, only the main k3s derivation is tested.

Here I changed the tests a bit to make them test all provided k3s derivations

@moduon MT-1718
2023-02-10 09:12:14 +00:00
github-actions[bot] b5d4dad2b8
Merge master into staging-next 2023-02-09 18:01:11 +00:00
talyz 5757259eee
discourse.tests: nodes.discourse.config -> nodes.discourse 2023-02-09 17:36:42 +01:00
Robert Hensing 1991c40759
Merge pull request #194345 from codedownio/binary-cache
Introduce mkBinaryCache function
2023-02-09 15:25:16 +01:00
github-actions[bot] c76e040c19
Merge master into staging-next 2023-02-09 12:01:30 +00:00
Nick Cao 6fa2bfdf4d
Merge pull request #215110 from gador/pgadmin-use-pstgresqltesthook
pgadmin4-desktopmode: init at 6.19, pgadmin4: simplify tests
2023-02-09 16:05:44 +08:00
Florian Brandes a380674d85
pgadmin4: add option to enable desktop mode
By default, pgadmin4 uses SERVER_MODE = True. This requires
access to system directories (e.g. /var/lib/pgadmin). There is
no easy way to change this mode during runtime. One has to change
or add config files withing pgadmin's directory structure to change it
or add a system-wide config file under `/etc/pgadmin`[1].

This isn't always easy to achive or may not be possible at all. For
those usecases this implements a switch in the pgadmin4 derivation and
adds a new top-level package `pgadmin4-desktopmode`. This builds in
DESKTOP MODE and allows the usage of pgadmin4 without the nixOS module
and without access to system-wide directories.

pgadmin4 module saves the configuration to /etc/pgadmin/config_system.py
pgadmin4-desktopmode tries to read that as well. This normally fails with
a PermissionError, as the config file is owned by the user of the pgadmin module.

With the check-system-config-dir.patch this will just throw a warning
but will continue and not read the file.

If we run pgadmin4-desktopmode as root
(something one really shouldn't do), it can read the config file and fail,
because of the wrong config for desktopmode.

[1]https://www.pgadmin.org/docs/pgadmin4/latest/config_py.html

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-02-09 08:19:05 +01:00
Florian Brandes 2b63943be4 nixosTests.pgadmin4-standalone: format
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-02-09 08:06:54 +01:00
Florian Brandes e4488f5efe pgadmin4: move package tests back into the package
We test pgadmin in nixosTests, because it needs a running postgresql instance.
This is now unnecessary since we can do so in the package itself.

This reduces the complexity of pgadmin and removes the need for the extra
nixosTests.

Also setting SERVER_MODE in `pkg/pip/setup_pip.py` does not have any effect
on the final package, so we remove it.
In NixOS, we use the module, which expects SERVER_MODE to be true (which it defaults to).
In non-NixOS installations, we will need the directory /var/lib/pgadmin and /var/log/pgadmin

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-02-09 08:06:52 +01:00
Lily Foster 9b31147be9
nixos/tests/systemd-initrd-vconsole: init new test for console.earlySetup 2023-02-08 15:24:10 -05:00
Will Fancher 14b77582da systemd-stage-1: fsck 2023-02-08 00:43:10 -05:00
Tom McLaughlin d1a2a16a3a Introduce mkBinaryCache function 2023-02-07 16:16:07 -08:00
Vladimír Čunát 3356399453
Merge branch 'master' into staging-next 2023-02-07 17:36:16 +01:00
Jacek Galowicz 7f88d9c34c
Merge pull request #214910 from rnhmjoj/pr-gnupg-test
nixos/tests/gnupg: init
2023-02-07 09:17:06 +01:00
rnhmjoj fe34d10e57
nixos/tests/gnupg: init 2023-02-07 08:47:14 +01:00
github-actions[bot] b30088fc3f
Merge master into staging-next 2023-02-07 00:02:12 +00:00
Sandro d47709d1ef
Merge pull request #208189 from numinit/update-nebula-module 2023-02-06 23:14:58 +01:00
Sandro 4397a26637
Merge pull request #211824 from Yarny0/cups-pdf-test 2023-02-06 23:10:12 +01:00
Sandro 2b013e9bc2
Merge pull request #212982 from gador/pgadmin-6.19 2023-02-06 22:29:11 +01:00
Anderson Torres f7e045e149
Merge pull request #209192 from lucasew/cockpit
cockpit: init at 284
2023-02-06 16:02:27 -03:00
Andrew Brooks 298c543e55 dockerTools: Specify 'latest' tag for repeated layer test image 2023-02-06 12:18:23 -06:00
Andrew Brooks c66cabe33e
dockerTools: use more familiar terminology to describe test image
Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
2023-02-06 11:15:33 -06:00
Andrew Brooks eb38ad04ef
dockerTools: ensure runAsRoot script not optimized away in test
Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
2023-02-06 11:05:13 -06:00
Soner Sayakci 56ecab709a
nixos/coder: init module 2023-02-06 13:15:00 +01:00
github-actions[bot] 5b5def96bc
Merge master into staging-next 2023-02-06 12:01:38 +00:00
Florian Klink 5aa52365e7
Merge pull request #214103 from NickCao/zram
nixos/zram: use zram-generator
2023-02-06 12:53:19 +01:00
zowoq 8b031cac44 podman: 4.3.1 -> 4.4.0
https://github.com/containers/podman/releases/tag/v4.4.0
2023-02-06 18:46:38 +10:00
Florian Klink 37bbc00aee nixosTests.google-oslogin: fix tests, provide group mock endpoint
If our (fake) metadata server provides a 404 instead of a JSON document,
the NSS module segfaults, and as we do NSS lookups through ns(n)cd,
not only crashes the application doing the NSS lookup, but our ns(n)cd.

This has been causing segfaults of nscd all along, but since our switch
from glibc-nscd to nsncd, caused the test to fail entirely.

In any case, by handling /computeMetadata/v1/oslogin/groups we get the
NSS lookup to not cause any segfaults, and to succeed the test again.
2023-02-05 20:52:23 +01:00
github-actions[bot] 51cb32c692
Merge master into staging-next 2023-02-05 18:01:22 +00:00
Maximilian Bosch 47611e4acc
Merge pull request #213227 from NixOS/revert-212912-nextcloud
Revert "nextcloud26: init at 26.0.0beta1"
2023-02-05 14:55:13 +01:00
github-actions[bot] 39c285eb4f
Merge master into staging-next 2023-02-05 12:01:29 +00:00
Doron Behar 42b3a6354f
Merge pull request #206559 from doronbehar/pkg/musescore
musescore: 3.6.2 -> 4.0.1
2023-02-05 12:00:06 +02:00
github-actions[bot] cb231fb28d
Merge master into staging-next 2023-02-05 06:01:18 +00:00
Bobby Rong eb5550809f
Merge pull request #214519 from r-ryantm/auto-update/vscodium
vscodium: 1.74.3.23010 -> 1.75.0.23033
2023-02-05 09:54:36 +08:00
Morgan Jones 96e3c9c392 nixos/nebula: fix potential address collision in tests 2023-02-04 16:59:19 -08:00
Morgan Jones eeb37db7cf nixos/nebula: rename test nodes to be more descriptive 2023-02-04 16:24:46 -08:00
Morgan Jones 9d649fd78c nixos/nebula: add tests for relays; clean up nebula passthru test 2023-02-04 16:24:45 -08:00
Morgan Jones 90581c977f nixos/nebula: don't run as root; support relays 2023-02-04 16:24:45 -08:00
github-actions[bot] 22e94a019f
Merge master into staging-next 2023-02-04 18:01:34 +00:00
Bobby Rong 67c3536f79
nixosTests.vscodium: rename "Get Started" to "Welcome"
c258547b50
2023-02-04 21:50:43 +08:00
Anderson Torres bc0944c06f
Merge pull request #214193 from jnsgruk/add-multipass-pkg
multipass: init at 1.11.0
2023-02-04 09:03:54 -03:00
Doron Behar 3917d02350 musescore: Enable test only on x86_64-linux 2023-02-04 12:16:53 +02:00
Jon Seager 978259361b
nixos/tests/multipass: init 2023-02-04 07:44:04 +00:00
github-actions[bot] ae91e9a960
Merge master into staging-next 2023-02-04 06:01:09 +00:00
Nick Cao 3d26221082
nixos/zram: use zram-generator 2023-02-04 10:33:06 +08:00
Nick Cao 3ab1fd296f
Merge pull request #212199 from OPNA2608/init/miriway
miriway: init at unstable-2022-12-18
2023-02-04 09:50:17 +08:00
OPNA2608 7ef7d9e268 nixos/miriway: add test 2023-02-04 02:23:14 +01:00
github-actions[bot] 2e0f3bc57b
Merge master into staging-next 2023-02-04 00:02:11 +00:00
Andrew Brooks 6f63865cf4 dockerTools: Add minimal test case for #214434 2023-02-03 17:49:39 -06:00
Dominique Martinet fd5d7b2586 tests/bpf: add module BTF test
bpftrace 0.17 added module BTF support, check this works.

On bpftrace 0.16, this failed with the following error:
> ERROR: kfunc:nft_trans_alloc_gfp: no BTF data for the function
2023-02-03 16:53:17 -06:00
Florian Brandes cfc77dc410 pgadmin4: 6.18 -> 6.19
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-02-03 12:29:30 +01:00
github-actions[bot] 6d7be19afb
Merge master into staging-next 2023-02-02 18:01:08 +00:00
lucasew 1ef7b45ffb nixos/cockpit: add nixos test
Signed-off-by: lucasew <lucas59356@gmail.com>
2023-02-02 14:47:46 -03:00
Doron Behar f0db4f165e musescore: 3.6.2 -> 4.0.1
Diff: https://github.com/musescore/MuseScore/compare/v3.6.2...v4.0.1

Update license, fix nixos test and add missing inputs.
2023-02-02 15:33:00 +02:00
Florian Klink fbfe2907af nixos/nscd: use nsncd by default
As announced in the NixOS 22.11 release notes, 23.05 will switch NixOS
to using nsncd (a non-caching reimplementation in Rust) as NSS lookup
dispatcher, instead of the buggy and deprecated glibc-provided nscd.

If you need to switch back, set `services.nscd.enableNsncd = false`, but
please open an issue in nixpkgs so your issue can be fixed.
2023-02-02 11:07:25 +01:00
github-actions[bot] ffbbb55ee2
Merge master into staging-next 2023-02-02 06:01:28 +00:00
Nick Cao 035527d61f
Merge pull request #213781 from 06kellyjac/tracee
tracee: 0.10.0 -> 0.11.0
2023-02-02 11:10:29 +08:00
Nick Cao 338657be21
Merge pull request #210190 from NickCao/zram-generator
zram-generator: init at 1.1.2
2023-02-02 11:04:46 +08:00
github-actions[bot] 2cc6469b1d
Merge master into staging-next 2023-02-02 00:02:33 +00:00
Thomas Gerbet 34f5d8cd24
Merge pull request #213534 from drupol/add-prometheus-shelly-exporter
prometheus-shelly-exporter: init at 1.0.0
2023-02-02 00:11:56 +01:00
Pol Dellaiera 9f17e032e7
prometheus-shelly-exporter: add NixOS module 2023-02-01 19:49:33 +01:00
06kellyjac abbedbd514 tracee: 0.10.0 -> 0.11.0
Diff: https://github.com/aquasecurity/tracee/compare/v0.10.0...v0.11.0

Changelog: https://github.com/aquasecurity/tracee/releases/tag/v0.11.0

Fix integration test to work with new tests
2023-02-01 15:27:41 +00:00
github-actions[bot] ba176ec75c
Merge staging-next into staging 2023-02-01 06:01:40 +00:00
github-actions[bot] 9f7ab547e6
Merge staging-next into staging 2023-01-31 18:02:01 +00:00
Luflosi eaf43be84c
linuxPackages.apfs: unstable-2022-10-20 -> 0.3.0
https://github.com/linux-apfs/linux-apfs-rw/releases/tag/v0.3.0

I also added a `longDescription` and modified the test to verify the checksum on all metadata nodes now that it works.
2023-01-31 17:35:05 +01:00
Gregor Kleen 239a93f205 chrony: add gkleen as maintainer for nixos test for ptp_kvm 2023-01-31 10:08:32 -06:00
Gregor Kleen b355be2d91 chrony: add nixos test for ptp_kvm 2023-01-31 10:08:32 -06:00
Maximilian Bosch e6ad298b7c
Merge pull request #213392 from Ma27/grafana-fix-provision-test
nixos/tests/grafana/provision: fix test
2023-01-31 13:49:28 +01:00
Henri Menke 0cfc7e63a6
nixos/zram-generator: add test 2023-01-31 20:18:18 +08:00
schnusch 45f06d9712 nixos/cgit: add package option 2023-01-31 12:13:56 +01:00
schnusch 218c7795a6 nixos/cgit: init 2023-01-31 12:06:12 +01:00
github-actions[bot] 56b467d467
Merge staging-next into staging 2023-01-30 18:02:05 +00:00
Artturi d88425e91c
Merge pull request #199512 from 06kellyjac/tracee 2023-01-30 17:59:23 +02:00
Vladimír Čunát 23ce77d76e Revert #178290: nixos/virtualisation: add option
...for explicitly named network interfaces

This reverts commit 6ae3e7695e.
(and evaluation fixups 08d26bbb72 7aed90a969)
Some of the tests fail or time out after the merge.
2023-01-30 07:55:50 -08:00
06kellyjac 22ebaedc73 tracee: 0.9.2 -> 0.10.0
Diff: https://github.com/aquasecurity/tracee/compare/v0.9.2...v0.10.0

Changelog: https://github.com/aquasecurity/tracee/releases/tag/v0.10.0

Fix integration tests after recent changes
2023-01-30 15:22:50 +00:00
Michele Guerini Rocco 72c6c848ee
Merge pull request #212685 from rnhmjoj/pr-connman
nixos/wireless: fix failure on missing config file
2023-01-30 13:32:58 +01:00
rnhmjoj fc211deccf
nixos/tests/connman: init 2023-01-30 07:48:51 +01:00
github-actions[bot] ff5d09638c
Merge staging-next into staging 2023-01-29 18:01:44 +00:00
Maximilian Bosch 859f4aa172
nixos/tests/grafana/provision: fix test
Not sure why the tmpfile rule fails now, so let's quick-fix it with an
activation script.
2023-01-29 16:50:56 +01:00
Raphael Robatsch 7aed90a969 nixos/tests/networking: fix evaluation
Fixes commands such as `nix-build -A nixosTests.networking.scripted`.
Currently this fails: "error: The option `nodes' is used but not
defined."
2023-01-29 14:30:29 +01:00
github-actions[bot] fd893034cb
Merge staging-next into staging 2023-01-29 06:01:55 +00:00
Florian Brandes 5b3ce4f78f octoprint: add nixosTests
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
Co-authored-by: Nick Cao <nickcao@nichi.co>
2023-01-29 05:40:28 +01:00
github-actions[bot] 1b9455b894
Merge staging-next into staging 2023-01-29 00:03:07 +00:00
Sandro cef47da8e5
Revert "nextcloud26: init at 26.0.0beta1" 2023-01-28 22:01:42 +01:00
Artturi 4cbf8b05bf
Merge pull request #213118 from vcunat/p/hotfix-networking-tests-eval 2023-01-28 22:10:51 +02:00
Florian Klink 5328e1384a nixosTests.systemd-cryptenroll: mark as not broken
Since 568d6fca33, this has been fixed and
actually succeeds.
2023-01-28 17:06:38 +01:00
Vladimír Čunát 08d26bbb72
nixos/tests/networking.nix: hotfix evaluation
It broke by merge 8803f1da6.
2023-01-28 09:34:11 +01:00
Colin Arnott aefbc9623b
nextcloud26: init at 26.0.0beta1
Because nextcloud ships their prerelease versions on a different url, we
are not parsing the version string to detect which path to use. We also
enabled and validated this change via nixos module testing.
2023-01-27 15:28:41 +00:00
Nick Cao 39b5d060cb
Merge pull request #212512 from NickCao/stratis
stratisd: 3.4.4 -> 3.5.0
2023-01-26 13:49:08 +08:00
Ryan Lahfa 8803f1da66
Merge pull request #178290 from andrew-hoff/ahh/qemu-interfaces
nixos/virtualisation: add option for explicitly named network interfaces
2023-01-25 17:32:53 +01:00
Nick Cao d469096dbd
nixos/fwupd: do no use renamed options in tests 2023-01-25 13:37:00 +08:00
Nick Cao e5c6f32b81
nixosTests.stratis.simple: enlarge disk size to avoid test hanging due
to out of space
2023-01-25 08:58:41 +08:00
Sandro 17631ae82d
Merge pull request #208712 from mattmelling/cloudlog
cloudlog: init at 2.3
2023-01-24 02:52:36 +01:00
Matt Melling c281dd3e05
nixos/cloudlog: init 2023-01-23 22:41:07 +00:00
Maximilian Bosch 48665a4150
linux_6_0: drop
EOLed by upstream, doesn't receive any patches anymore, so let's drop
it.

Currently depends on #211886 which bumps the latest compatible ZFS
version to 6.1.

Also, clean up some old aliases.
2023-01-23 10:59:20 +01:00
Nick Cao b9576dd927
Merge pull request #211723 from tpwrules/fix-systemd-boot-more
nixos/systemd-boot: fix tests and upgrade issues
2023-01-23 15:55:57 +08:00
Bobby Rong 9d801f40e6
Merge pull request #211953 from bobby285271/upd/nixosTests.pantheon
nixosTests.pantheon: ensure switchboard starts + various changes
2023-01-23 10:05:46 +08:00
Andrew Hoff 6ae3e7695e nixos/virtualisation: add option for explicitly named network interfaces
Adds a new option to the virtualisation modules that enables specifying
explicitly named network interfaces in QEMU VMs. The existing
`virtualisation.vlans` is still supported for cases where the name of
the network interface is irrelevant.
2023-01-22 12:20:40 -05:00
Ryan Lahfa 04bf8215a9
Merge pull request #209075 from symphorien/nginx-validate-config-revert
nixos/nginx: revert config validation
2023-01-22 17:57:46 +01:00
Bobby Rong 30d5a2216f
nixosTests.pantheon: nodes.machine.config -> nodes.machine
Silence a warning:
warning: Module argument `nodes.machine.config` is deprecated. Use `nodes.machine` instead.
2023-01-22 20:45:30 +08:00
Bobby Rong 009cdb01c7
nixosTests.pantheon: ensure switchboard starts
I noticed this is something that can be easily broken during libsoup3 migration.
2023-01-22 20:45:30 +08:00
Bobby Rong 5461c2c4b7
nixosTests.pantheon: remove a TODO
Pantheon is moving away from Bamf.
2023-01-22 20:45:29 +08:00
Nick Cao 99f9998309
Merge pull request #204386 from robryk/resticassert
nixos/restic: small enhancements
2023-01-22 16:23:04 +08:00
Peter Waller 678eed323f nixos/grub: Name initrd-secrets by system, not by initrd
Previously, secrets were named according to the initrd they were
associated with. This created a problem: If secrets were changed whilst
the initrd remained the same, there were two versions of the secrets
with one initrd. The result was that only one version of the secrets would
by recorded into the /boot partition and get used. AFAICT this would
only be the oldest version of the secrets for the given initrd version.

This manifests as #114594, which I found frustrating while trying to use
initrd secrets for the first time. While developing the secrets I found
I could not get new versions of the secrets to take effect.
Additionally, it's a nasty issue to run into if you had cause to change
the initrd secrets for credential rotation, etc, if you change them and
discover you cannot, or alternatively that you can't roll back as you
would expect.

Additional changes in this patch.

* Add a regression test that switching to another grub configuration
  with the alternate secrets works. This test relies on the fact that it
  is not changing the initrd. I have checked that the test fails if I
  undo my change.

* Persist the useBootLoader disk state, similarly to other boot state.
  * I had to do this, otherwise I could not find a route to testing the
    alternate boot configuration. I did attempt a few different ways of
    testing this, including directly running install-grub.pl, but what
    I've settled on is most like what a user would do and avoids
    depending on lots of internal details.
  * Making tests that test the boot are a bit tricky (see hibernate.nix
    and installer.nix for inspiration), I found that in addition to
    having to copy quite a bit of code I still couldn't get things to
    work as desired since the bootloader state was being clobbered.

My change to persist the useBootLoader state could break things,
conceptually. I need some help here discovering if that is the case,
possibly by letting this run through a staging CI if there is one.

Fix #114594.

cc potential reviewers:

@lopsided98 (original implementer) @joachifm (original reviewer),
@wkennington (numerous fixes to grub-install.pl), @lheckemann (wrote
original secrets test).
2023-01-21 17:19:26 +00:00
Martin Weinelt 890226f9ba
Merge pull request #210705 from dermetfan/ceph-dashboard
ceph: add missing python library
2023-01-21 00:03:58 +00:00
Robin Stumm 093e3eb20d ceph: enable dashboard in nixos test 2023-01-20 23:59:26 +01:00
Yarny0 53729841e8 nixos/tests/cups-pdf: fix test with socket-activated cups
The cups-pdf vm test previously waited for the
activation of `cups.service` before testing anything.
This method fails since

47d9e7d3d7

as cups auto-stops if it is not used,
causing the test framework to complain
that `cups.service` will never start.

The commit at hand alters the test so it
simply waits for `multi-user.target`.
We could also switch to `cups.socket`,
but `multi-user.target` seems to be more robust
concerning future changes in the cups mechanisms.
2023-01-20 21:53:34 +01:00
Guillaume Girol cb73862665 Revert "nixos/nginx: validate syntax of config file at build time"
This reverts commit a768871934.

This is too fragile, it breaks at least on:
* ssl dh params
* hostnames in proxypass and upstreams are resolved in the sandbox
2023-01-20 20:10:19 +01:00
Michele Guerini Rocco 10222e1e37
Merge pull request #211295 from rnhmjoj/pr-nixos-install
nixos-install: remove root requirement for bind mount
2023-01-20 18:34:38 +01:00
Thomas Watson ddc5d34f61 nixos/tests/systemd-boot: only patch systemd-boot during update test
The update test patches the systemd-boot binary to report a known
version then tests that this is the version updated from. The previous
patch would also search the kernel and initrd binaries, which would
cause sed to write out a temporary file that might cause the disk
to run out of space and the test to fail.

Only attempt to patch binaries which contain systemd-boot (usually
`BOOT<arch>.EFI` and `systemd-boot<arch>.efi` to avoid this problem.
As a bonus, this reduces test time by 20-30%.
2023-01-19 23:52:35 -06:00
Thomas Watson d12040e858 nixos/tests/systemd-boot: fix update test
At some point many months ago, the systemd-boot update script stopped
outputting parentheses around the version being upgraded from, causing
the test to fail. Remove the parentheses from the expected message to
fix the test.
2023-01-19 22:45:41 -06:00
Artturi 257f9de9b6
Merge pull request #211574 from Artturin/remacreintol
treewide: remove accidentally introduced -l
2023-01-20 01:52:14 +02:00
rnhmjoj b139c467e9
Revert "Revert "nixos/tests/installer: test relative paths in initrd secrets""
This reverts commit 8d45d82c71.

The tests shold pass now that systemd-boot handles failures in initrd
for older boot entries.
2023-01-19 20:50:59 +01:00