3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

4431 commits

Author SHA1 Message Date
Patrick Hilhorst 7ef8df8767
nixosTests.nano: replace with script using GNU expect 2022-02-24 21:26:25 +01:00
Martin Weinelt d778e18366
Merge pull request #160042 from stigtsp/test/nginx-modsecurity 2022-02-23 12:02:20 +01:00
Janne Heß e5823f77b3
Merge pull request #159187 from martinetd/logrotate
logrotate service enhancements
2022-02-23 11:24:17 +01:00
Stig Palmquist 21f5ce0bd9 nixos/tests/nginx-modsecurity: init 2022-02-23 08:54:52 +01:00
Martin Weinelt b4ac004d09
nixos/test/networking: test bonding netdev creation
Previously the bonding driver would create an initial `bond0` interface
when it was loaded. If the network management integration used that
interface and did not recreate it, it was stuck to the default
`balance-rr` mode.

Deploying systemds modprobe.d configuration sets `max_bonds=0`, so we
don't run into that issue anymore.

Hence we now make sure that we can indeed create `bond0` with `802.3ad`
(LACP), which is a non default mode.
2022-02-22 17:29:41 +01:00
Guillaume Girol 4846d948b4
Merge pull request #156601 from symphorien/miniflux-password
nixos/miniflux: no cleartext password in the store
2022-02-21 21:18:36 +00:00
markuskowa 0fca9900b1
Merge pull request #157278 from ck3d/default-systemd-nspawn
nixos: Switch to default systemd-nspawn behaviour
2022-02-21 21:56:07 +01:00
Sandro 5a57844cf6
Merge pull request #158592 from SuperSandro2000/nginx-nixos 2022-02-20 16:32:09 +01:00
Renaud 4ccf58647a
Merge pull request #156224 from B4dM4n/nixos-tests-doh-proxy-rust
nixos/test/doh-proxy-rust: fix failing check
2022-02-19 16:31:14 +01:00
Christian Kögler 57fc08cfdb nixos: Switch to default systemd-nspawn behaviour 2022-02-19 09:52:37 +01:00
Aaron Andersen b3c0344c9d
Merge pull request #156763 from ratsclub/blocky
nixos/blocky: init
2022-02-18 11:27:25 -05:00
Janne Heß dcbacb0f62
Merge pull request #160458 from helsinki-systems/fix/stc-backslashes
nixos/switch-to-configuration: Fix backslashes in unit names
2022-02-17 19:08:02 +01:00
Vladimír Čunát fe78cacdff
Merge #159173: libbpf: 0.6.1 -> 0.7.0, bcc 0.23.0 -> 0.24.0 2022-02-17 13:36:46 +01:00
Janne Heß 3617ecb67f
nixos/switch-to-configuration: Fix backslashes in unit names
systemd needs this so special characters (like the ones in wireguard
units that appear because they are part of base64) can be escaped using
the \x syntax.

Root of the issue is that `glob()` handles the backslash internally
which is obviously not what we want here.

Also add a test case and fix some perlcritic issues in the subroutine.
2022-02-17 12:49:45 +01:00
Sandro a6d259faf3
Merge pull request #141650 from 06kellyjac/agate 2022-02-16 00:56:27 +01:00
Martin Weinelt 32bd0aafab
nixos/tests/home-assistant: test package and components passing
There are now multiple combinations of how one can pass either
extraPackages or extraComponents. We now test those passed directly to
the package via an override, and those passed indirectly via the module,
that ultimately results in a second override to the package.
2022-02-15 23:41:52 +01:00
Martin Weinelt 191fb818e6
nixos/tests/home-assistant: test module-based package loading
Passing psycopg2 for PostgreSQL support in the recorder component is one
of the more popular use cases to pass an extra package.
2022-02-15 23:41:50 +01:00
Martin Weinelt 4b47eaee4d
nixos/tests/home-assistant: test module-based component loading 2022-02-15 23:41:49 +01:00
Martin Weinelt 05640ec19d
nixos/tests/home-assistant: add comments & reformat 2022-02-15 23:15:17 +01:00
Victor Freire 6532d3417e nixos/blocky: init 2022-02-14 22:48:32 -03:00
Martin Weinelt 4387ecec59
Merge pull request #159696 from r-ryantm/auto-update/prometheus-nextcloud-exporter 2022-02-14 23:22:55 +01:00
R. Ryantm 9d798e5103 prometheus-nextcloud-exporter: 0.4.0 -> 0.5.0 2022-02-14 21:49:16 +01:00
Dominique Martinet a05f1c9f93 nixos tests: add logrotate test
make sure the service is enabled by default and works.
2022-02-13 07:29:40 +09:00
Julien Moutinho 8f78d31ac1 nixos/sourcehut: test gitsrht 2022-02-12 02:11:34 +01:00
Janne Heß fa3c756621
Merge pull request #157329 from helsinki-systems/feat/nixos-reload-triggers
nixos/systemd: Implement reload triggers
2022-02-11 23:59:26 +01:00
Dominique Martinet 824d26d395 bcc: 0.23.0 -> 0.24.0
Also add an extra test in nixos/tests/bpf.nix for BTF usage in bpftrace

Co-authored-by: Jörg Thalheim <joerg@thalheim.io>
2022-02-11 20:37:39 +09:00
Sandro 6a4dea5ffc
Merge pull request #158178 from j0hax/retroarch-wm 2022-02-10 01:23:37 +01:00
Martin Weinelt 607285bc0e
Merge pull request #156873 from mweinelt/wine 2022-02-09 23:55:33 +01:00
Janne Heß 1c1f8c59e1
nixos/switch-test: Test the unit file parser and reloads 2022-02-09 15:14:38 +01:00
Johannes Arnold d282f448ff nixos/retroarch: add RetroArch as a desktop session 2022-02-08 20:52:02 +01:00
Sandro Jäckel ae66e2d5ec
treewide: use configured nginx package 2022-02-08 12:13:30 +01:00
06kellyjac 354b240782 nixos/agate: add nixos test 2022-02-07 16:03:58 +00:00
markuskowa 768dd74738
Merge pull request #140891 from markuskowa/os-moosefs
nixos: init moosefs module and test
2022-02-07 10:48:33 +01:00
Sandro 255417b8f4
Merge pull request #157146 from illustris/cloudinit 2022-02-07 01:27:21 +01:00
Robert Hensing 6be11a84aa
Merge pull request #155892 from hercules-ci/nixos-etc-unit-test
nixos: Refactor to allow `etc` unit test
2022-02-06 16:12:25 +01:00
Florian Klink def482e28d
Merge pull request #150837 from abbradar/google-guest-agent
Move GCE config to google-guest-agent
2022-02-06 11:27:27 +01:00
Nikolay Amiantov 524aecf61e google-compute-config: update config 2022-02-05 23:33:10 +03:00
Michael Weiss 1c4d0f130b
Merge pull request #158027 from Synthetica9/test-sway-swaylock
nixosTests.sway: add swaylock test
2022-02-04 22:13:44 +01:00
Maximilian Bosch 6dfcf377a4
Merge pull request #157393 from LeSuisse/haproxy-2.5.1
haproxy: 2.3.14 -> 2.5.1
2022-02-04 20:31:08 +01:00
Maximilian Bosch 90a27b5771
Merge pull request #157247 from r-ryantm/auto-update/sudo
sudo: 1.9.8p2 -> 1.9.9
2022-02-04 16:05:30 +01:00
rnhmjoj 3b8fa47f58
nixos/wireless: don't attempt fallback on WPA3 only networks 2022-02-04 08:46:32 +01:00
Patrick Hilhorst abcf236f36
nixosTests.sway: add swaylock test 2022-02-03 20:37:27 +01:00
Patrick Hilhorst c39cc2e840
nixosTests.sway: factor out swaymsg 2022-02-03 20:37:21 +01:00
Patrick Hilhorst aca22fb124
nixosTests.sway: format with nixpkgs-fmt 2022-02-03 20:25:05 +01:00
Markus Kowalewski b74dc1a230
nixos/tests: add moosefs test 2022-02-03 12:31:36 +01:00
Euan Kemp dc5859ef7a nixos/tests/k3s: remove stale test reference
https://github.com/NixOS/nixpkgs/pull/142706 renamed this test, but the
old 'k3s' one wasn't removed from all-tests.

Fix that.
2022-02-03 15:38:12 +10:00
Patryk Wychowaniec 62ce6f2c9d
unifi7: add package
https://community.ui.com/releases/UniFi-Network-Application-7-0-20/3e4a4099-c063-42f6-8e21-5fb2c99fcea9

Since that's a release candidate, unifiLTS remains unchanged.
2022-02-02 20:42:06 +01:00
Maciej Krüger 8bb7bec755
Merge pull request #141122 from Luflosi/add-apfs-nixos-module 2022-02-01 17:29:10 +01:00
Sandro 330c63f740
Merge pull request #156342 from midchildan/fix/noto-cjk-src 2022-02-01 16:01:37 +01:00
Maximilian Bosch f5b67f3b27
nixos/sudo: fix test for 1.9.9
The test failed with

> Test "test5 user should not be able to run commands under root" failed with
> error: "invalid literal for int() with base 10: ''"

since 2492da88ea.

The reason for this is that `sudo(8)` writes the lecture to the
tty[1] and only as a fallback to stdout[2]. This means that the
`base64 --wrap 0` executed by `machine.execute()` doesn't affect the
text written to the terminal, however the lecture is part of the string
that's read from the VM via `shell.recv()`.

I confirmed the problem in an interactive test session[3]:

    >>> command = "sudo -u test5 sudo -n -u root true"
    >>> out_command = f"( set -euo pipefail; {command} ) | (base64 --wrap 0; echo)\n"
    >>> machine.shell.send(out_command.encode())
    84

    >>> machine # [   99.015512] sudo[877]:     root : TTY=hvc0 ; PWD=/tmp ; USER=test5 ; COMMAND=/run/wrappers/bin/sudo -n -u root true
    machine # [   99.019373] sudo[877]: pam_unix(sudo:session): session opened for user test5(uid=1005) by (uid=0)
    machine # [   99.038692] sudo[879]: pam_unix(sudo:auth): conversation failed
    machine # sudo: a password is required
    machine # [   99.041860] sudo[879]: pam_unix(sudo:auth): auth could not identify password for [test5]
    machine # [   99.046901] sudo[877]: pam_unix(sudo:session): session closed for user test5
    >>>
    >>> x=machine._next_newline_closed_block_from_shell()
    >>> print(x)
    <newline>
    We trust you have received the usual lecture from the local System
    Administrator. It usually boils down to these three things:
    <newline>
        #1) Respect the privacy of others.
        #2) Think before you type.
        #3) With great power comes great responsibility.
    <newline>
    <newline>
    <newline>
    >>>

Since the lecture isn't strictly necessary to confirm that
`security.sudo` works as expected, I decided to disable lecturing
inside the test, however we may want to fix the underlying problem in
the test-driver at some point.

[1] https://github.com/sudo-project/sudo/blob/SUDO_1_9_9/plugins/sudoers/check.c#L275-L283
[2] https://github.com/sudo-project/sudo/blob/SUDO_1_9_9/src/conversation.c#L95-L120
[3] I replaced each empty line with `<newline>` to make sure these
    aren't swallowed by git.
2022-02-01 12:55:29 +01:00