3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

33125 commits

Author SHA1 Message Date
Sandro 8f6cd53206
Merge pull request #229022 from SuperSandro2000/nox-mpv-wayland
nixos/no-x-libs: disable wayland for mpv
2023-05-09 19:07:16 +02:00
Weijia Wang 419d7f9c8d
Merge pull request #230753 from fetsorn/typos
several typos
2023-05-09 19:16:12 +03:00
Atemu 9c946bce87
Merge pull request #230680 from alyssais/netboot-squashfs
nixos/netboot: add squashfsCompression option
2023-05-09 18:13:27 +02:00
Ryan Lahfa fb250ff2c9
Merge pull request #172340 from 06kellyjac/k3d
k3d: rename kube3d to k3d
2023-05-09 18:02:30 +02:00
Martin Weinelt daf7d8861f
Merge pull request #230871 from IndeedNotJames/nixos-tests-2047mb
nixosTests.gitea,nixosTests.forgejo,nixosTests.wiki-js: fix test on `i686-linux`
2023-05-09 17:22:32 +02:00
Sandro d199137345
Merge pull request #230560 from legendofmiracles/upddate-nodjs-asf 2023-05-09 16:58:52 +02:00
Alyssa Ross e5e49df7fd
nixos/netboot: add squashfsCompression option
This is copied from isoImage.squashfsCompression.  It's useful to be
able to customise, as iteration cycles are very slow with xz, and
subjectively systems booted with less efficiently compressed squashfs
stores appear to have faster reads (although I didn't test that
scientificly so there could be other factors).
2023-05-09 14:15:10 +00:00
Alyssa Ross 096cdeeac4
nixos/iso-image: type isoImage.squashfsCompression 2023-05-09 14:15:02 +00:00
fetsorn 5e77899001 nixos/tpm2: fix typo
"acess" -> "access"
2023-05-09 18:02:17 +04:00
fetsorn 1a4e993104 nixos/prometheus: fix typo
"nixpgs" -> "nixpkgs"
2023-05-09 18:02:17 +04:00
fetsorn f035683f55 nixos/matomo: fix typo
"suported" -> "supported"
2023-05-09 18:02:17 +04:00
fetsorn d1398dd05c nixos/deluge: fix typo
"secuerly" -> "securely"
2023-05-09 18:02:17 +04:00
fetsorn ac5f6d9100 nixos/apparmor: fix typo
"usualy" -> "usually"
2023-05-09 18:02:17 +04:00
06kellyjac 6b78c0b80e k3d: add notice of rename in release notes 2023-05-09 14:22:59 +01:00
IndeedNotJames 260ddac146
nixosTests.wiki-js: fix test on i686-linux
Fail pattern:
1. Unsuspecting `qemu-kvm` notice:
```
server # qemu-kvm: at most 2047 MB RAM can be simulated
```

2. Hard fail
```
    self.shell.send(out_command.encode())
BrokenPipeError: [Errno 32] Broken pipe
```

(Took me a while to consider those lines are related)
2023-05-09 15:22:35 +02:00
IndeedNotJames 0cbeb283cf
nixosTests.gitea,nixosTests.forgejo: fix test on i686-linux
Fail pattern:
1. Unsuspecting `qemu-kvm` notice:
```
server # qemu-kvm: at most 2047 MB RAM can be simulated
```

2. Hard fail
```
    self.shell.send(out_command.encode())
BrokenPipeError: [Errno 32] Broken pipe
```

(Took me a while to consider those lines are related)
2023-05-09 15:21:53 +02:00
Martin Weinelt 558b23afe3
Merge pull request #230844 from pennae/mosquitto-test-fix
nixos/mosquitto: use networkd for tests
2023-05-09 14:57:30 +02:00
Martin Weinelt 35a73717df
Merge pull request #218599 from Izorkin/update-peertube
peertube: 5.0.0 -> 5.1.0
2023-05-09 14:37:44 +02:00
ajs124 ae9c464f31
Merge pull request #230822 from helsinki-systems/fix/mariadb-i686-tests
nixos/mariadb: Fix test on i686
2023-05-09 13:16:39 +02:00
Jacek Galowicz b7dfa5082a
Merge pull request #228220 from R-VdP/test_driver_guest_shell_timeout
nixos-test-driver: include a timeout for the recv call, do not assume sh == bash
2023-05-09 13:05:28 +02:00
Florian Klink 6c9bef6b0f
Merge pull request #230777 from nikstur/systemd-repart-definitions-in-initrd
systemd-repart definitions in initrd
2023-05-09 13:24:04 +03:00
Sandro 443a8f398a
Merge pull request #230756 from NixOS/fzf-fix 2023-05-09 11:54:38 +02:00
pennae 5f5b5a76b9 nixos/mosquitto: use networkd for tests
the non-networkd backend does not wait for slaac to finish (ie, ipv6
addresses coming out of tentative state), and that breaks the mosquitto
bind_interface test slightly. if slaac takes too long the test will run
into mosquitto restart limits and fail.
2023-05-09 11:41:17 +02:00
Janne Heß 20e186b7e2
nixos/mariadb: Fix test on i686
RocksDB is not built on that platform and the .so is missing
2023-05-09 09:15:52 +02:00
lom ea1cef8c00 ArchiSteamFarm.ui: use buildNpmPackage 2023-05-08 20:34:21 -04:00
Aaron Andersen cf0327810b
Merge pull request #207093 from ymarkus/alertmanager
nixos/alertmanager: add checkConfig option
2023-05-08 20:15:17 -04:00
nikstur d85abd2764 nixos/systemd-repart: definition files in initrd
Store the definition files in the initrd instead of reading them from
the Nix store in /sysroot.

This way, the initrd has to be re-generated every time the definition
files change. When the path to the defintion files instead of the
definition files themselves are embedded in the initrd, however, the
initrd also has to be re-generated every time. In this regard, this
change does not improve the status quo.

However, now systemd-repart also works reliable when the Nix store is
mounted separately from the root partition.

This change also enables new use-cases like creating partitions
necessary to boot the system. However, by default, the root partition
cannot be created on first boot because the systemd-repart service
requires a /sysroot to be mounted. Otherwise, systemd-repart cannot
determine the device to operate on.
2023-05-09 00:11:21 +02:00
nikstur 5c2a7490cf nixos/systemd-repart: fix
Since v253, systemd-repart tries to create temporary directories in
/var/tmp. However, this directory doesn't exist in the initrd. This
commit adds an enviroment variable to re-use the existing /tmp directory
instead of /var/tmp.
2023-05-08 23:12:59 +02:00
Izorkin 1afcb4c6ef
nixos/peertube: update nginx configuration 2023-05-08 23:49:03 +03:00
Izorkin 8d76c0b6fb
peertube: 5.0.0 -> 5.1.0 2023-05-08 23:48:32 +03:00
Ryan Lahfa 43a413de73
Merge pull request #230731 from NixOS/bump/netdata
netdata: 1.38.1 -> 1.39.0
2023-05-08 21:59:56 +02:00
Sandro Jäckel edf57fef9b
nixos/fzf: fix evaluation if ohMyZsh is enabled 2023-05-08 21:10:28 +02:00
Raito Bezarius 16658f7634 nixos/netdata: introduce deadlineBeforeStopSec
Previously, we hardcoded a 60 second timer to stop netdata if we didn't have any answer back.
This is wrong and can cause data loss because the SIGTERM sent by systemd can sometimes be not honored.
Which in turn becomes a SIGKILL, causing potential data loss / corruption.

Offer a flag to users and bump the deadline to 2 minutes.
2023-05-08 19:29:13 +02:00
Ryan Lahfa 98167d573d
Merge pull request #229313 from mped-oticon/mped_proxmox_assert
nixos/proxmox-image: Disable O_DIRECT to fix assert when writing to tmpfs
2023-05-08 16:11:40 +02:00
Atemu cb0f64e45d
Merge pull request #230665 from alyssais/iso-image-targetPlatform
nixos/iso-image: targetPlatform -> hostPlatform
2023-05-08 15:06:48 +02:00
Alyssa Ross ecc1ec2c72 llvmPackages_latest: move to aliases.nix
Because llvmPackages_latest is used in Nixpkgs, by quite a few
packages, it's difficult to keep it up to date, because updating it
requires some level of confidence that every package that uses it is
going to keep working after the update.  The result of this is that
llvmPackages_latest is not updated, and so we end up in the situation
that "latest" is two versions older than the latest version we
actually provide.  This is confusing and unexpected.

"But won't this end up fragmenting our LLVM versions, if every package
previously using _latest is separately pinned to LLVM 14?", I hear you
ask.  No.  That fragmentation is already happening, even with an
llvmPackages_latest, because packages that actually require the
_latest_ version of LLVM (15/16), have already been decoupled from
llvmPackages_latest since it hasn't been upgraded.  So like it or not,
we can't escape packages depending on specific recent LLVMs.  The only
real fix is to get better at keeping the default LLVM up to
date (which I'm reasonably confident we're getting into a better
position to be feasibly better able to do).

So, unless we want to double down on providing a confusingly named
"llvmPackages_latest" attribute that refers to some arbitrary LLVM
version that's probably not the latest one (or even the latest one
available in Nixpkgs), we only have two options here: either we don't
provide such an attribute at all, or we don't use it in Nixpkgs so we
don't become scared to bump it as soon as we have a new LLVM available.
2023-05-08 13:05:33 +00:00
Weijia Wang 6a139314d8
Merge pull request #230653 from wineee/nixos/release.nix
nixos/release: add deepin closure
2023-05-08 15:47:47 +03:00
Nick Cao aa7197b091
Merge pull request #230539 from OPNA2608/update/miriway
miriway: unstable-2023-03-17 -> unstable-2023-04-25
2023-05-08 20:27:47 +08:00
Alyssa Ross bf7de549b9
nixos/iso-image: targetPlatform -> hostPlatform
This is not a compiler, and therefore does not need to care about the
target platform.
2023-05-08 11:50:06 +00:00
Mark Ruvald Pedersen 66fb2f539a nixos/proxmox-image: Disable O_DIRECT to fix assert
Context summary:
'vma create' can't otherwise write to tmpfs such as /dev/shm.
This is important when used from non-nixos machines which may
have /build as tmpfs.

VMA is Proxmox's virtual machine image format that wraps QEMU images,
augmenting these with proxmox-specific configuration file.
proxmox-image.nix uses the VMA tool to create vma image files.
The VMA tool exists as a patchset ontop of QEMU.

VMA writes its output with open() and O_DIRECT flag.
O_DIRECT does not work on Linux tmpfs [1]. Thus:
$ vma create ~/output.vma ...  # works, assuming home isn't tmpfs.
$ vma create /dev/shm/output.vma ...  # fails since /dev/shm is tmpfs
Failure results in assert(*errp == NULL).

O_DIRECT is a cache performance hint.
But it currently blocks our usage of nixos-generate -f proxmox from
Non-NixOS hosts and Docker.

The patch here simply removes O_DIRECT:
vma-writer.c later performs memalign due to O_DIRECT, but this is
safe to do with or without O_DIRECT.
Ideally, this should be fixed in upstream Proxmox: Perhaps by falling
back to open without O_DIRECT.

Another attempt to fix this SIGABRT is [2], which writes the vma file
directory to $out/ folder -- however that may still be tmpfs mounted
which it is in our case.

[1] https://lore.kernel.org/lkml/45A29EC2.8020502@tmr.com/t/
[2] https://github.com/NixOS/nixpkgs/pull/224282
2023-05-08 12:33:41 +02:00
rewine 82c778627d
nixos/release: add deepin closure 2023-05-08 18:25:41 +08:00
Jörg Thalheim 3288479636 nixos/envfs: make mounts non-critical
We usually don't want to bring the whole machine into emergency mode
just because we couldn't mount envfs. It's usually not on the critical
path.
2023-05-08 11:24:18 +02:00
Sandro 6197953fb6
Merge pull request #207106 from autrimpo/gonic-module
nixos/gonic: init
2023-05-08 01:28:24 +02:00
Michal Koutenský 8118e3de43 nixos/gonic: init 2023-05-07 22:43:23 +02:00
Ilan Joselevich 6a751fe806
Merge pull request #227765 from zhaofengli/darling
darling: init at unstable-2023-05-02
2023-05-07 22:29:02 +03:00
Bernardo Meurer 3cf3f4395a
Merge pull request #230449 from lovesegfault/mainsail-module 2023-05-07 11:49:59 -04:00
OPNA2608 fc3c5947a9 nixos/miriway: Adjust default and example config
The keybinds for the WM's internal commands have been made configurable.
2023-05-07 17:32:20 +02:00
Martin Weinelt cd0f4fc67c
Merge pull request #230256 from lovesegfault/systemd-can
nixos/networkd: add TransmitQueues and TransmitQueueLength
2023-05-07 11:53:35 +02:00
Naïm Favier 0767f800e0
Merge pull request #224688 from Izorkin/add-nginx-upstream-timeout
nixos/nginx: allow arbitrary parameters in upstream servers
2023-05-07 11:43:39 +02:00
Izorkin 2809915f19
nixos/nginx: allow arbitrary parameters in upstream servers
Adds a `freeformType` to `services.nginx.upstreams.<name>.servers` to
allow setting arbitrary parameters.
2023-05-07 11:17:49 +02:00