3
0
Fork 0
forked from mirrors/nixpkgs
Commit graph

5553 commits

Author SHA1 Message Date
Sergei Lukianov 136b81be7d nixos/tests/prometheuts-exporters.unpoller: fix test script
Unpoller behaviour changed and now it'll not server metrics if no
controller available, so, let's check for not available controller
message instead.
2022-12-09 21:40:36 -08:00
Yarny0 85aeeac28d cups-pdf: add vm test 2022-12-09 22:20:09 +01:00
Artturi 8ffe22e286
Merge pull request #203956 from Artturin/addforbiddendependenciesregex
nixos/top-level.nix: add forbiddenDependenciesRegex option
2022-12-09 07:54:00 +02:00
Martin Weinelt a4f2ca1ef3
Merge pull request #205123 from Frostman/prometheus-smartctl-exporter-0.9.1 2022-12-09 01:58:06 +01:00
Martin Weinelt c7fbae1289
nixos/tests/prometheus-exporters.smartctl: update test script
We can't actually get metrics for a virtual disk drive so the exporter
fails to start with 0.9.x.

Instead let's just make sure it said that /dev/vda was unavailable.
2022-12-09 01:40:01 +01:00
Robert Hensing 470e6fd1cd
Merge pull request #201902 from ck3mp3r/dockertools-architecture-in-config-200725
Adding ability to set image architecture when creating OCI images using DockerTools
2022-12-08 23:54:50 +01:00
ajs124 3071eef957
Merge pull request #201707 from helsinki-systems/alias-krb5Full
krb5Full: turn into alias
2022-12-08 23:54:02 +01:00
Ryan Lahfa 022c7d777a
Merge pull request #196837 from KoviRobi/dnsmasq-attrsets-config
nixos/dnsmasq: Use attrs instead of plain text config
2022-12-08 23:47:08 +01:00
ajs124 c7930769a7 krb5Full: turn into alias 2022-12-08 23:08:44 +01:00
Raito Bezarius 092e6d39cd nixos/tests/bootspec: init
This will test various scenarios of bootspec generation.
2022-12-08 13:50:04 -08:00
Robert Hensing cf7b358d69 nixosTests.docker-tools: Fix syntax
This may be unnecessary, but I'm not waiting for the tests again.
2022-12-08 22:29:38 +01:00
Christian Kemper afe2d0bb8b fix docker inspect image reference 2022-12-08 20:29:10 +01:00
Christian Kemper f6ae4479ea dockerTools: allowing architecture to be specified
... for buildImage, buildLayeredImage and streamLayeredImage,
adding docs and tests.
2022-12-08 20:29:09 +01:00
Andrei Pampu acb964a35c nixos/tests/bazarr: remove unfree predicate for unrar 2022-12-07 14:59:49 +01:00
Yureka a0e889791f nixos/tests/peering-manager: init 2022-12-07 12:54:55 +01:00
Robert Hensing ab823e3a11 cassandra_4: init 2022-12-06 14:09:38 +01:00
Bjørn Forsman 831fc4f86a nixos/tests/bazarr: remove unneeded timezone workaround
The issue was fixed in bazarr-1.1.3.
2022-12-05 18:51:53 +01:00
Jacob Greenleaf 0111e9547e nixos/borgbackup: Add option for inhibiting sleep
Adds a new option for backup jobs `inhibitsSleep` which prevents
the system from going to sleep while a backup is in progress.
Uses `systemd-inhibit`, which holds a "lock" that prevents the
system from sleeping while the process it invokes is running.

This did require wrapping the existing backup script using
`writeShellScript` so that it could be run by `systemd-inhibit`.
2022-12-04 19:57:41 -08:00
Robert Kovacsics 2c00429560 nixos/dnsmasq: Use attrs instead of plain text config
This should make it easier to configure in multiple places, override
defaults, etc.
2022-12-04 23:08:37 +00:00
Vincent Haupert dbff3c22c1 nixos/aesmd: add option environment 2022-12-04 20:12:50 +01:00
Andreas Stührk da0dc8339c nixos/aesmd: add option to configure quote provider library
Changes sgx-psw to append `aesm` to `LD_LIBRARY_PATH`:
- Append instead of prepend to allow for overriding in service config
- As we already add a wrapper to add `aesm` to `LD_LIBRARY_PATH` it is
  not necessary to also set in `LD_LIBRARY_PATH` of the systemd service.

Co-authored-by: Vincent Haupert <mail@vincent-haupert.de>
2022-12-04 20:12:50 +01:00
Maximilian Bosch 331d854662
Merge pull request #203874 from noneucat/fix/grocy/storage
nixos/grocy: fix file uploads
2022-12-04 17:28:07 +01:00
Sandro e38618a657
Merge pull request #203825 from SuperSandro2000/mastodon-tootctl
Closes https://github.com/NixOS/nixpkgs/issues/199029
2022-12-04 11:29:45 +01:00
Luke Granger-Brown c7918fed9e nixos/prometheus/unifi-poller: rename to unpoller. 2022-12-03 20:12:54 +00:00
Henri Menke da053d008f
maintainers: remove and add hmenke 2022-12-03 12:26:58 +01:00
Sandro Jäckel 6e845a8491
nixos/mastodon: replace mastodon-env with a proper wrapper mastodon-tootctl 2022-12-03 02:59:39 +01:00
Artturin a34d7b67fd nixos/top-level.nix: add forbiddenDependenciesRegex option
useful for making sure that there's no dev outputs in the system
2022-12-02 21:15:24 +02:00
Robert Hensing 146620355f nixosTests.postgresql: Fix attribute name shadowing 2022-12-02 18:15:01 +00:00
Robert Hensing 7bfbf037d7 Merge remote-tracking branch 'upstream/master' into allow-configuration-of-roles 2022-12-02 18:12:14 +00:00
Georg Haas 8d47058b32
nixos/tests/tayga: init 2022-12-01 11:17:39 +01:00
Andy Chun @noneucat f8f19f84c6 nixos/grocy: add a basic smoke test for file uploads 2022-11-30 22:18:05 -08:00
Mario Rodas 4a057b08c4
Merge pull request #203733 from nagy/freenet-nixos-test
nixosTests.freenet: init
2022-11-30 21:18:55 -05:00
Thomas Gerbet 622f4ee354 php8*: disable PCRE2 JIT SEAlloc to avoid crashes when forking
This is a follow up to #200815 and #184634.

The PCRE2 JIT SEAlloc does not support the `fork()` as announced in
their README [0]:
> If you are enabling JIT under SELinux environment you may also want to add
>  --enable-jit-sealloc, which enables the use of an executable memory allocator
>  that is compatible with SELinux. Warning: this allocator is experimental!
>  It does not support fork() operation and may crash when no disk space is
>  available. This option has no effect if JIT is disabled.

As a result using it in PHP can break apps and tools, it can only be
enabled under very specific context where you have a full picture of
what the PHP code is doing.

This contribution disables again the PCRE2 JIT SEAlloc and extends the
existing PHP/PCRE2 tests to make sure we do not enable it again by
mistake.

[0] https://www.pcre.org/readme.txt
2022-11-30 13:22:39 +01:00
Daniel Nagy 807c2f1fc0
nixosTests.freenet: init 2022-11-30 12:15:00 +01:00
Bruno Bigras 86730cdb4b
Merge pull request #203452 from robryk/restic
nixos/tests/restic: readability & not parsing human-readable output
2022-11-29 11:35:39 -05:00
Sandro 5b408166d8
Merge pull request #203063 from fabianhauser/fix/musescore-test 2022-11-29 17:24:08 +01:00
Jonathan Lorimer 193aa6faf4
Add declarative role config to postgres.service
remove trailing whitespace

switch docs to markdown

use mdDoc

remove trailing whitespace

get rid of double space

add tests and update options to use submodule

remove whitespace

remove whitespace

use mdDoc

remove whitespace

make default a no-op

make ALTER ROLE a single sql statement

document null case
2022-11-28 09:44:46 -05:00
Robert Obryk ccfc1d2421 nixos/tests/restic: use machine-readable output
This change causes us to stop relying on the way `restic snapshots`
formats its human-readable output.
2022-11-28 14:55:32 +01:00
Robert Obryk 7cdb313558 nixos/tests/restic: unify naming
This commit makes the correspondence between a backup job and location
of its repository clearer.
2022-11-28 14:55:28 +01:00
Robert Obryk 84e05961f8 nixos/tests/restic: cleanup 2022-11-28 14:55:21 +01:00
Sandro 853077236a
Merge pull request #202124 from SuperSandro2000/dbus-passthru-daemon 2022-11-28 01:35:34 +01:00
Sandro 9185121c22
Merge pull request #201060 from gador/sqlite3-to-mysql-init 2022-11-28 00:55:45 +01:00
Gerd Flaig adddfe7932 Use file sink encoding json
Encoding ndjson isn't supported in recent versions.
2022-11-27 12:56:00 -05:00
Mario Rodas 98d30160b4
Merge pull request #202619 from NickCao/stratis
stratisd: 3.3.0 -> 3.4.0

Closes #203194
2022-11-27 08:58:59 -05:00
Martin Weinelt 8e46323226 nixos/tests/pinnwand: drop reaper, refactor steck setup 2022-11-27 13:50:44 +01:00
Martin Weinelt 35d7617d81
Merge pull request #200354 from mweinelt/kanidm-1.1.0-alpha.10 2022-11-26 22:11:29 +01:00
Nikolay Korotkiy dd1c4ff5fc
vmTools: update current maintained debian versions 2022-11-26 23:53:24 +03:00
Flakebi 887020f39c nixos/kanidm: Add tls options
Since 1.1.0-alpha.10 kanidm requires TLS to be set up or it won't start.
2022-11-26 21:42:35 +01:00
Silvan Mosberger a566d0842e
Merge pull request #172736 from infinisil/docker-nix-shell 2022-11-26 20:21:59 +01:00
Silvan Mosberger 22d1a12f8b
Merge pull request #203028 from NixOS/pure-nixos-tests 2022-11-26 17:13:32 +01:00
Fabian Hauser 7dd3214c52 nixos/tests/musescore: fix 2022-11-26 14:24:45 +01:00
Silvan Mosberger 47813a3214 nixos/tests: Make pure
Just had @fabianhauser at the #ZurichZHF hackathon run into this, causing the
tests to fail evaluation due to some system impurity
2022-11-26 11:52:51 +01:00
Tom Fitzhenry cc16ce5945 nixos/tests/phosh: add subtest to check the on-screen keyboard 2022-11-26 10:17:04 +01:00
Francesco Gazzetta e518978869
Merge pull request #202728 from fgaz/warzone2100/4.3.2
warzone2100: 4.3.1 -> 4.3.2, add nixos test
2022-11-26 08:54:21 +00:00
Izorkin 5cfb7fb716 nixos/tests/mastodon: update test 2022-11-25 15:00:19 +01:00
Izorkin e8927f2631 nixos/tests/mastodon: remove CA service 2022-11-25 15:00:19 +01:00
Martin Weinelt a4e5468bc0
Merge pull request #202187 from hmenke/alps 2022-11-25 01:34:53 +01:00
Lassulus 43b6a1ffe9
Merge pull request #202216 from helsinki-systems/feat/nixos-acme-test-20y
nixos/tests/acme/server: generate certs with longer validity
2022-11-24 21:42:50 +01:00
Francesco Gazzetta cc0182e2d1 nixosTests.warzone2100: init 2022-11-24 20:48:42 +01:00
Nick Cao 7d2faad3b7
nixos/stratis: update tests to use new features 2022-11-24 10:02:20 +08:00
Martin Weinelt 8cbf9ed05b
Merge pull request #202567 from phfroidmont/master 2022-11-23 22:04:36 +01:00
Paul-Henri Froidmont b8ffc572d2
nixos/patroni: only run tests on x86_64-linux
etcd doesn't support other architectures and refuses to start
2022-11-23 21:54:19 +01:00
Linus Heckemann 24e33a4d2e nixos/ec2: remove paravirtualization-specific code
Paravirtualized EC2 instances haven't been supported since 2017.
It's safe to remove this now.
2022-11-23 17:18:18 +01:00
Félix Baylac-Jacqué 8040c468ed
nixosTests/prosody[-mysql]: fix tests TLS setup
The tests TLS setup was bogus: the xmpp-send-message script was trying
to connect to the server through a bogus domain name. Injecting the
right one.

I'm a bit confused about that one. I know for sure this NixOS test
succeeded last time I checked it, but the TLS conf is bogus for sure.
I assume the slixmpp SNI validation was a bit too loose and was
tightened at some point.
2022-11-23 11:05:12 +01:00
Félix Baylac-Jacqué 501d684de8
nixosTests/prosody: add timeout
The xmpp-sendmessage the slixmpp-powered python script tend to timeout
and block the nixos channels.

Adding a signal-based timeout making sure that whatever happens, the
script won't run for more than 2 minutes. That should be pleinty
enough time to finish regardless of the runner specs. As a data point,
it runs in about 10 secs on my desktop machine.
2022-11-23 11:03:00 +01:00
Henri Menke d02af66091
nixos/alps: fix for Hydra failure
https://hydra.nixos.org/build/199758163
2022-11-22 20:50:28 +01:00
Martin Weinelt 005233baa2
nixos/tests/evcc: init 2022-11-21 22:40:15 +01:00
Sandro Jäckel c7f5becba3 dbus: remove unused daemon passhtru 2022-11-21 20:23:00 +01:00
ajs124 57abd8c1cf nixos/tests/acme/server: generate certs with longer validity 2022-11-21 18:18:17 +01:00
ajs124 7274df353c nixos/tests/acme/server: patch certificate generation for longer validity 2022-11-21 18:17:55 +01:00
Janne Heß c107fb66da
Merge pull request #202132 from ElvishJerricco/systemd-stage-1-tests-hibernate
nixos: ext fixes with systemd-initrd
2022-11-21 10:38:19 +01:00
Nick Cao 46328f5596
nixosTests.systemd-initrd-luks-password: test mounting device unlocked in initrd after switching root 2022-11-21 14:49:20 +08:00
Will Fancher 23b3add0e3 nixos: Fix hibernate test with systemd stage 1 2022-11-20 21:01:51 -05:00
Maximilian Bosch 853d0a3f2b
Merge pull request #199150 from Ma27/grafana-fixup
nixos/grafana: documentation/warning improvements after #191768
2022-11-20 20:53:25 +01:00
Maximilian Bosch 2580440389
Merge pull request #198470 from RaitoBezarius/nc25-openssl
nextcloud25: use openssl 1.1 as a PHP extension to fix RC4 encryption
2022-11-20 18:32:41 +01:00
Maximilian Bosch 9d7e9c5965
nixos/grafana: allow using both directories or single YAML files for non-Nix provisioning 2022-11-20 18:21:41 +01:00
Maximilian Bosch febc8a4307
nixos/tests/grafana: demonstrate how to use the file provider
Yes, it's still a store path, but it's only for demonstration purposes.
Also we now have fewer warnings in the provision test.
2022-11-20 18:21:40 +01:00
Maximilian Bosch afd6199cff
nixos/grafana: re-add legacy notifiers test, mention notifiers in release notes 2022-11-20 18:21:39 +01:00
Maximilian Bosch 957e368f3d
nixos/grafana: provision.{datasources,dashboards} can't be a list anymore
The hack with `either` had the side-effect that the sub-options of the
submodule didn't appear in the manual. I decided to remove this because
the "migration" isn't that hard, you just need to fix some module
declarations.

However, `mkRenamedOptionModule` wouldn't work here because it'd create
a "virtual" option for the deprecated path (i.e.
`services.grafana.provision.{datasources,dashboards}`), but that's the
already a new option, i.e. the submodule for the new stuff.

To make sure that you still get errors, I implemented a small hack using
`coercedTo` which throws an error if a list is specified (as it would be
done on 22.05) which explains what to do instead to make the migration
easier.

Also, I linkified the options in the manual now to make it easier to
navigate between those.
2022-11-20 18:21:35 +01:00
ajs124 626e8b67fa nixos/tests/acme/server: regenerate certs
expired today
2022-11-20 16:37:42 +01:00
Elis Hirwing 14cc62d7e6
Merge pull request #201000 from drupol/php/8.2.0
php82: init at 8.2.0rc6
2022-11-20 16:01:00 +01:00
Georg Haas f20402f8e3
nixos/tests/deluge: fix test
deluge-console always exits with code 1. This is known in https://dev.deluge-torrent.org/ticket/3291
2022-11-20 00:35:59 +01:00
Martin Weinelt c021df5792
Merge pull request #197254 from Atemu/fstab-escape-options 2022-11-19 18:08:40 +01:00
Martin Weinelt 2714a22521
Merge pull request #198820 from talyz/keycloak-admin-password 2022-11-19 15:03:03 +01:00
Martin Weinelt 218e2f5e14
Merge pull request #193740 from illustris/hbase
hbase: remove 1.7, 2.4.11 -> 2.4.15, init 2.5.1, 3.0.0-alpha-2 -> alpha-3
2022-11-19 14:28:11 +01:00
Zhaofeng Li 3d185562b5 nixos/tests/phosh: init 2022-11-19 06:55:25 +01:00
Anderson Torres fc8a4f7291
Merge pull request #201521 from hmenke/alps
nixos/alps: add hardening, extensible options, test
2022-11-18 14:46:03 -03:00
Manuel Bärenz af447367ec nixos/mastodon: Add turion as maintainer 2022-11-17 20:05:50 +01:00
Kerstin Humm 7718720149 nixos/mastodon: increase RAM for NixOS test vm 2022-11-17 20:05:50 +01:00
Henri Menke 9820effbba
nixos/alps: test login and cookie 2022-11-17 17:12:57 +01:00
Henri Menke aeb5a692c3
nixos/alps: add hardening, extensible options, test 2022-11-17 17:12:54 +01:00
Pol Dellaiera 1812d1540e
php82: init at 8.2.0rc6 2022-11-16 18:57:26 +01:00
Carl Richard Theodor Schneider 647ed242dc nixos/adguardhome: allow for empty/unmanaged configs
This commit fixes broken non-declarative configs by
making the assertions more relaxed.
It also allows to remove the forced configuration merge by making
`settings` `null`able (now the default).

Both cases (trivial non-declarative config and `null`able config) are
verified with additional tests.

Fixes #198665
2022-11-15 23:43:15 -05:00
Franz Pletz 69f8e94c46
Merge pull request #199587 from lorenz/fscrypt
nixos/pam: support fscrypt login protectors
2022-11-14 09:42:35 +01:00
Franz Pletz 2274143409
Merge pull request #200611 from fpletz/libvirtd-fix-autostart 2022-11-14 09:21:00 +01:00
Florian Brandes ba3f3b73ad
sqlite3-to-mysql: init at 1.4.16
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2022-11-13 20:18:24 +01:00
Justinas Stankevicius 3f6eb10dbd nixos/mastodon: fix definition of mastodon-media-auto-remove 2022-11-12 22:22:41 +01:00
Lorenz Brun f046cc0923 nixos/pam: support fscrypt login protectors
fscrypt can automatically unlock directories with the user's login
password. To do this it ships a PAM module which reads the user's
password and loads the respective keys into the user's kernel keyring.

Significant inspiration was taken from the ecryptfs implementation.
2022-11-11 15:37:39 +01:00
Maximilian Bosch 35b146ca31
nixos/nextcloud: fixup openssl compat change
Upon testing the change itself I realized that it doesn't build properly
because

* the `pname` of a php extension is `php-<name>`, not `<name>`.
* calling the extension `openssl-legacy` resulted in PHP trying to compile
  `ext/openssl-legacy` which broke since it doesn't exist:

      source root is php-8.1.12
      setting SOURCE_DATE_EPOCH to timestamp 1666719000 of file php-8.1.12/win32/wsyslog.c
      patching sources
      cdToExtensionRootPhase
      /nix/store/48mnkga4kh84xyiqwzx8v7iv090i7z66-stdenv-linux/setup: line 1399: cd: ext/openssl-legacy: No such file or directory

I didn't encounter that one before because I was mostly interested in
having a sane behavior for everyone not using this "feature" and the
documentation around this. My findings about the behavior with turning
openssl1.1 on/off are still valid because I tested this on `master` with
manually replacing `openssl` by `openssl_1_1` in `php-packages.nix`.

To work around the issue I had to slightly modify the extension
build-system for PHP:

* The attribute `extensionName` is now relevant to determine the output
  paths (e.g. `lib/openssl.so`). This is not a behavioral change for
  existing extensions because then `extensionName==name`.

  However when specifying `extName` in `php-packages.nix` this value is
  overridden and it is made sure that the extension called `extName` NOT
  `name` (i.e. `openssl` vs `openssl-legacy`) is built and installed.

  The `name` still has to be kept to keep the legacy openssl available
  as `php.extensions.openssl-legacy`.

Additionally I implemented a small VM test to check the behavior with
server-side encryption:

* For `stateVersion` below 22.11, OpenSSL 1.1 is used (in `basic.nix`
  it's checked that OpenSSL 3 is used). With that the "default"
  behavior of the module is checked.

* It is ensured that the PHP interpreter for Nextcloud's php-fpm
  actually loads the correct openssl extension.

* It is tested that (encrypted) files remain usable when (temporarily)
  installing OpenSSL3 (of course then they're not decryptable, but on a
  rollback that should still be possible).

Finally, a few more documentation changes:

* I also mentioned the issue in `nextcloud.xml` to make sure the issue
  is at least mentioned in the manual section about Nextcloud. Not too
  much detail here, but the relevant option `enableBrokenCiphersForSSE`
  is referenced.

* I fixed a few minor wording issues to also give the full context
  (we're talking about Nextcloud; we're talking about the PHP extension
  **only**; please check if you really need this even though it's
  enabled by default).

  This is because I felt that sometimes it might be hard to understand
  what's going on when e.g. an eval-warning appears without telling where
  exactly it comes from.
2022-11-11 14:45:46 +01:00
Martin Weinelt 90ad4d9da7
Merge pull request #200629 from helsinki-systems/fix/test-dhparams 2022-11-11 12:11:55 +01:00