Janne Heß
0efb6720a4
nixos/console: Fix attribute path to fix eval
2022-04-14 22:07:41 +01:00
Lassulus
15b5c29a41
Merge pull request #168600 from helsinki-systems/feat/systemd-stage-1-keymap
...
nixos/stage-1-systemd: Add keymap support
2022-04-14 21:50:52 +01:00
Michele Guerini Rocco
e674ea6956
Merge pull request #168535 from rnhmjoj/pr-pdns-nixos
...
nixos/pdns-recursor: update default values
2022-04-14 18:02:29 +02:00
Janne Heß
289f38a65b
Merge pull request #168301 from helsinki-systems/feat/systemd-stage-1-mdadm
...
nixos/stage-1-systemd: Add mdraid support (+ test)
2022-04-14 17:56:36 +02:00
rnhmjoj
bad701b1d3
doc/release-notes: mention pdns-recursor options changes
2022-04-14 17:32:57 +02:00
rnhmjoj
fe27976534
nixos/tests/pdns-recursor: test a DNS query
2022-04-14 17:31:27 +02:00
rnhmjoj
fd480f55df
nixos/pdns-recursor: update default values
...
1. Update the default values of several addresses-related settings
that have been changed by upstream.
2. Make `dns.address` take multiple addresses. This is needed
for dual stack, now working by default.
2022-04-14 17:31:16 +02:00
Florian Klink
e97fc37e55
Merge pull request #161253 from flokli/kexec-boot
...
nixos/installer: add kexec-boot
2022-04-14 15:30:30 +02:00
Florian Klink
6ceedff331
nixosTests.kexec: fix tests with kexecBoot format
2022-04-14 15:15:33 +02:00
Alyssa Ross
b825f6db56
nixos/doc/md-to-db.sh: consistent pandoc version
...
Until now, this script has used the version of pandoc from unstable.
This means that running the script on the same version of Nixpkgs
could produce different results, and meant that when Pandoc's output
was changed, random PRs were changing the whole manual when they ran
the script to regenerate docs[1][2].
Here I've changed the manual to use a consistent version of pandoc —
the one from the latest release tag, which will avoid this problem in
future. This will avoid this problem in future. The only time we'll
need to worry about pandoc output changes is when we bump the version
used in this script.
I also considered using the version from the current Nixpkgs branch,
but decided against it as it's unlikely that e.g. the person bumping
Pandoc will remember to regenerate the manual.
[1]: https://github.com/NixOS/nixpkgs/pull/162550
[2]: https://github.com/NixOS/nixpkgs/pull/168535
2022-04-14 12:57:51 +00:00
Jacek Galowicz
6b414c5b66
Merge pull request #168609 from rnhmjoj/pr-test-driver
...
nixos/test-driver: highlight driver log lines
2022-04-14 13:09:36 +02:00
pennae
3e9855f8ac
Merge pull request #168328 from K900/fix-nix-ld-test
...
tests/nix-ld: fix invocation
2022-04-14 10:41:26 +00:00
Janne Heß
dda7e9e3ee
nixos/stage-1-systemd: Add mdraid support (+ test)
2022-04-14 11:39:57 +01:00
Janne Heß
0581d31bf9
Merge pull request #167393 from iblech/patch-docs-cc
...
nixos-rebuild, switch-to-configuration: document and protect against cross compilation subtlety
2022-04-14 12:30:39 +02:00
rnhmjoj
ca1b1f6dc0
nixos/test-driver: highlight driver log lines
...
There is a whole lot of noise in a NixOS test log due to journal,
commands, and test driver messages all being mixing together.
With this commit the test driver messages are highlighted so you don't
have to squint too much to see where a subtest starts and ends or what
was the last command being run.
Here's an excerpt from a highlighted log:
[2mmachine # [ 6.647826] dhcpcd[668]: eth0: adding default route via 10.0.2.2[0m
[2mmachine # I've had a great day![0m
(finished: must succeed: curl -sfL https://example.com/how-are-you ? | tee /dev/stderr, in 0.19 seconds)
(finished: subtest: Privoxy can filter https requests, in 0.22 seconds)
[1m[32msubtest: Blocks are working[0m
machine: [1m[32mwaiting for TCP port 443[0m
[2mmachine # Connection to localhost (::1) 443 port [tcp/https] succeeded![0m
(finished: waiting for TCP port 443, in 0.03 seconds)
machine: [1m[32mmust fail: curl -f https://example.com/ads 1>&2[0m
[2mmachine # [ 6.730608] nscd[742]: 742 monitored file `/etc/resolv.conf` was written to[0m
[2mmachine # [ 6.733071] privoxy[814]: 2022-04-14 09:41:01.695 7fa995c39640 Actions: +block{Fake ads} ...
[2mmachine # curl: (22) The requested URL returned error: 403[0m
[2mmachine # [ 6.753098] systemd[1]: Stopping Name Service Cache Daemon...[0m
[2mmachine # [ 6.755632] systemd[1]: nscd.service: Deactivated successfully.[0m
[2mmachine # [ 6.757069] systemd[1]: Stopped Name Service Cache Daemon.[0m
(finished: must fail: curl -f https://example.com/ads 1>&2, in 0.07 seconds)
machine: [1m[32mmust succeed: curl -f https://example.com/PRIVOXY-FORCE/ads 1>&2[0m
[2mmachine # [ 6.765099] systemd[1]: Starting Name Service Cache Daemon...[0m
[2mmachine # [ 6.781519] nscd[925]: 925 monitoring file `/etc/passwd` (1)[0m
[2mmachine # [ 6.844105] systemd[1]: Reached target Network is Online.[0m
[2mmachine # [ 6.848860] privoxy[814]: 2022-04-14 09:41:01.805 7fa995c39640 Actions: +block{Fake ads} ...
[2mmachine # [ 6.856068] nscd[925]: 925 monitoring file `/etc/nsswitch.conf` (8)[0m
[2mmachine # [ 6.858229] systemd[1]: Reached target Multi-User System.[0m
[2mmachine # [ 6.858934] nscd[925]: 925 monitoring directory `/etc` (2)[0m
[2mmachine # [ 6.861315] systemd[1]: Startup finished in 2.374s (kernel) + 4.451s (userspace) = 6.826s.[0m
[2mmachine # Hot Nixpkgs PRs in your area. Click here![0m
[2mmachine # [ 6.873055] nscd[925]: 925 monitoring directory `/etc` (2)[0m
[2mmachine # [ 6.874489] nscd[925]: 925 monitoring file `/etc/nsswitch.conf` (8)[0m
[2mmachine # [ 6.875599] nscd[925]: 925 monitoring directory `/etc` (2)[0m
(finished: must succeed: curl -f https://example.com/PRIVOXY-FORCE/ads 1>&2, in 0.12 seconds)
(finished: subtest: Blocks are working, in 0.22 seconds)
[1m[32msubtest: Temporary certificates are cleaned[0m
machine: [1m[32mmust succeed: test $(ls /run/privoxy/certs | wc -l) -gt 0[0m
(finished: must succeed: test $(ls /run/privoxy/certs | wc -l) -gt 0, in 0.02 seconds)
machine: [1m[32mmust succeed: date -s "$(date --date '12 days')"[0m
(finished: must succeed: date -s "$(date --date '12 days')", in 0.02 seconds)
[2mmachine # [ 6.959589] systemd[1]: Started Logrotate Service.[0m
[2mmachine # [ 6.966685] systemd[1]: Starting Cleanup of Temporary Directories...[0m
[2mmachine # [ 6.974783] systemd[1]: logrotate.service: Deactivated successfully.[0m
[2mmachine # [ 7.004493] systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully.[0m
[2mmachine # [ 7.005457] systemd[1]: Finished Cleanup of Temporary Directories.[0m
machine: [1m[32mmust succeed: test $(ls /run/privoxy/certs | wc -l) -eq 0[0m
(finished: must succeed: test $(ls /run/privoxy/certs | wc -l) -eq 0, in 0.01 seconds)
(finished: subtest: Temporary certificates are cleaned, in 0.15 seconds)
(finished: run the VM test script, in 7.44 seconds)
test script finished in 7.48s
[1m[32mcleanup[0m
kill machine (pid 8)
2022-04-14 11:54:21 +02:00
Janne Heß
6d6c1c341c
nixos/stage-1-systemd: Add keymap support
...
Makes my life a lot easier with my non-american keyboard layout
2022-04-14 10:25:04 +01:00
Lassulus
7392416a53
Merge pull request #168302 from helsinki-systems/feat/systemd-stage-1-lvm
...
nixos/stage-1-systemd: Add LVM2 support (+ test)
2022-04-14 09:52:24 +01:00
Janne Heß
cb1624c130
Merge pull request #168477 from helsinki-systems/feat/systemd-stage-1-hibernation
...
nixos/stage-1-systemd: Implement and test hibernation
2022-04-14 10:15:28 +02:00
Pascal Bach
1a70fa8acb
Merge pull request #137939 from kfiz/update-mongodb-44/50
...
Update mongodb to 4.4/5.0
2022-04-14 09:25:20 +02:00
Jan Tojnar
5db9253633
nixos/desktop-managers: Fix eval
...
nixos/lib/utils.nix is actually passed as `utils` argument to modules
so https://github.com/NixOS/nixpkgs/pull/168194 broke the eval.
Fixes: https://github.com/NixOS/nixpkgs/issues/168569
2022-04-14 06:53:08 +02:00
Janne Heß
aeb75b3b69
nixos/stage-1-systemd: Implement hibernation + test
2022-04-13 23:02:13 +01:00
Janne Heß
ffb320378b
nixos/stage-1-systemd: Fix booting grub tests
2022-04-13 23:02:10 +01:00
Janne Heß
2633e82e1a
nixos/stage-1-systemd: Add LVM2 support
2022-04-13 23:00:19 +01:00
Jan Tojnar
7eb14b532a
nixos/gnome: set default wallpaper for dark mode as well
...
GNOME 42 needs two wallpaper pictures – for the default (light)
colour scheme and for the dark one. Because we are clearing out
the paths in `gsettings-desktop-schemas` to prevent closure
from bloating, we need to set them in the NixOS module.
Since the wallpaper for the default colour scheme is dark,
will relegate it to the dark colour scheme and switch
to a light blue variant for the default colour scheme.
That one has inverted roundel for the NixOS logo but
it is the only light-ish background that has the logo
of the same size and placing as the dark wallpaper.
2022-04-13 21:29:51 +02:00
Thiago Kenji Okada
3a570f57a1
Merge pull request #167775 from otavio/topic/improve-shellhub-module
...
nixos: shellhub-agent: support more options
2022-04-13 19:56:14 +01:00
Thiago Kenji Okada
f1d21bed4d
Merge pull request #168196 from lucasew/fix/xfce-screensaver
...
nixos/xfce4: option to disable xfce4-screensaver
2022-04-13 14:35:49 +01:00
lucasew
e76aa74c28
nixos/xfce: option to disable xfce4-screensaver
...
Signed-off-by: lucasew <lucas59356@gmail.com>
2022-04-13 09:13:03 -03:00
Silvan Mosberger
398973f7eb
Merge pull request #168292 from whentze/cockroach-module-improvements
...
nixos/cockroachdb: add `extraArgs` and properly escape systemd exec args
2022-04-13 13:48:17 +02:00
Florian Klink
8ea2f75b72
nixos/kexec-boot: use dirname of script to resolve bzImage and initrd.gz
...
This will allow invoking the `kexec-boot` script without `cd`-ing into
its folder first.
2022-04-13 13:26:04 +02:00
Florian Klink
f0178e45eb
nixosTests.kexec: extend with kexecBoot attribute
...
Add a node2, which imports the kexec-boot.nix profile.
Ensure node2 successfully boots up, then invoke the kexec-boot script
from it on node1.
2022-04-13 13:26:02 +02:00
Florian Klink
366c8be2ad
nixos/installer: add kexec-boot
...
This module exposes a config.system.build.kexecBoot attribute,
which returns a directory with kernel, initrd and a shell script
running the necessary kexec commands.
It's meant to be scp'ed to a machine with working ssh and kexec binary
installed.
This is useful for (cloud) providers where you can't boot a custom image, but
get some Debian or Ubuntu installation.
2022-04-13 13:25:22 +02:00
Sandro
a39694b41f
Merge pull request #168194 from SuperSandro2000/xserver-excludePackages
...
Xserver exclude packages
2022-04-13 11:37:32 +02:00
Sandro
d8cec85ca6
Merge pull request #140607 from jkarlson/terminfo
2022-04-13 11:15:23 +02:00
Emil Karlson
a03b332b81
nixos/terminfo: add enableAllTerminfo option
...
Add an option to install all .terminfo packages, normally this should
add no runtime bloat, if caches are used.
2022-04-13 10:04:31 +03:00
Martin Weinelt
2731137d12
Merge pull request #168288 from erikarvstedt/paperless-ngx
2022-04-12 22:10:52 +02:00
Lassulus
65cc198539
Merge pull request #167349 from helsinki-systems/feat/udev-systemd-stage-1
...
nixos/udev: Add systemd stage 1 support
2022-04-12 21:02:52 +01:00
Linus Heckemann
0acfc5ed6e
Merge pull request #167323 from alyssais/mailman-ext_dir
...
nixos/mailman: remove obsolete setting
2022-04-12 21:27:27 +02:00
Janne Heß
7024b4e5e3
nixos/udev: Put all initrd options into a namespace
2022-04-12 20:06:13 +01:00
Erik Arvstedt
0977227b86
nixos/paperless-ng: rename to paperless
, use paperless-ngx
package
...
Use this opportunity to rename `paperless-(ng)-server` to `paperless-scheduler`.
This follows the naming scheme in the paperless repo and docs.
2022-04-12 18:15:44 +02:00
Erik Arvstedt
46c3331384
nixos/paperless-ng: simplify redis logic
...
- Rename `hasCustomRedis` -> `enableRedis`
- Extract var `redisServer`
2022-04-12 18:06:34 +02:00
Kim Lindberger
9d12de1ab7
Merge pull request #165481 from talyz/discourse-2.9.0.beta3
...
discourse: 2.9.0.beta1 -> 2.9.0.beta3
2022-04-12 10:38:16 +02:00
Wanja Hentze
dccd5a44d1
nixos/cockroachdb: use escapeSystemdExecArgs
for ExecStart args
...
Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>
2022-04-12 10:34:56 +02:00
Wanja Hentze
d215163ff9
nixos/cockroachdb: add extraArgs
option
...
There are a bunch of args to `cockroach start` that simply can not be set
given the current set of options, so this escape hatch enables them.
2022-04-12 10:34:55 +02:00
Lassulus
807b226542
Merge pull request #162777 from amarshall/prom-deprecated-opt
...
nixos/prometheus: Remove upstream-deprecated alertManagerTimeout
2022-04-12 09:07:51 +01:00
Andrew Marshall
3bbfc7849e
nixos/prometheus: Remove upstream-deprecated alertManagerTimeout
...
When started, Prometheus prints:
> The flag --alertmanager.timeout has no effect and will be removed in
> the future.
See also
2316062d4e
2022-04-11 23:37:33 -04:00
Lassulus
c0139fe5c3
Merge pull request #167168 from helsinki-systems/feat/systemd-stage-1-proper-handover
...
nixos/stage-1-systemd: Handover between the systemds directly
2022-04-11 22:26:11 +01:00
K900
b261dee857
tests/nix-ld: fix invocation
2022-04-12 00:03:53 +03:00
Erik Arvstedt
69319ee4a6
nixos/paperless-ng: fix /proc access for service
...
This allows django-q to set the number of workers according to the CPU
core count and to show memory stats via `manage.py qmonitor`.
This also fixes a non-critical psutil error in paperless-ng-server.
2022-04-11 22:46:44 +02:00
Erik Arvstedt
308c4bf0f7
nixos/paperless-ng: minor improvments
...
Service:
- Fix misleading comment:
We could in fact implement password copying as a preStart script by
amending BindReadOnlyPaths, but adding an extra service is simpler.
Test:
- Add more detailed subtest names
- Simplify date check
2022-04-11 22:46:43 +02:00
Izorkin
e87240e216
nixos/nginx: add extraParameters to http3 protocol
2022-04-11 22:33:12 +02:00