1
0
Fork 1
mirror of https://github.com/NixOS/nixpkgs.git synced 2024-12-14 08:34:50 +00:00
Commit graph

3915 commits

Author SHA1 Message Date
Maximilian Bosch 80404a23c9
Merge pull request #140775 from Ma27/nextcloud-docs-and-secrets
nixos/nextcloud: manual improvements & pass secrets via the environment to `nextcloud-occ`
2021-10-09 20:01:15 +02:00
Maximilian Bosch f57bed8832
nixos/nextcloud: drop adminpass/dbpass options entirely 2021-10-08 18:30:57 +02:00
Michael Brantley 121cfd1998 nixos/multipath: add multipath module
The multipath-tools package had existed in Nixpkgs for some time but
without a nixos module to configure/drive it. This module provides
attributes to drive the majority of multipath configuration options
and is being successfully used in stage-1 and stage-2 boot to mount
/nix from a multipath-serviced iSCSI volume.

Credit goes to @grahamc for early contributions to the module and
authoring the NixOS module test.
2021-10-08 09:47:38 -04:00
Jacek Galowicz d68f1e43df
Merge pull request #126713 from blaggacao/nixos-test-ref/05-class-ify-test-driver
nixos test ref/05 class ify test driver
2021-10-07 14:37:01 +02:00
John Ericson cc3f2432d0 nixos/nix-daemon: Add enable option
Don't worry, it's is true by default. But I think this is important to
have because NixOS indeed shouldn't need Nix at run time when the
installation is not being modified, and now we can verify that.

NixOS images that cannot "self-modify" are a legitamate
use-case that this supports more minimally. One should be able to e.g. do a
sshfs mount and use `nixos-install` to modify them remotely, or just
discard them and build fresh ones if they are run VMs or something.

The next step would be to make generations optional, allowing just
baking `/etc` and friends rather than using activation scripts. But
that's more involved so I'm leaving it out.
2021-10-06 16:43:48 -04:00
Robert Scott 1d5953184a
Merge pull request #139651 from pborzenkov/calibre-web-0.6.13
calibre-web: 0.6.12 -> 0.6.13
2021-10-06 20:36:08 +01:00
Antoine Eiche 32face8dea nixos.tests.udisks2: state_dir is now of type pathlib.Path 2021-10-05 14:38:48 -05:00
Antoine Eiche af859d1df1 nixos.tests.usbguard: state_dir is now of type pathlib.Path 2021-10-05 14:38:48 -05:00
Maximilian Bosch cdb48d75c0
Merge pull request #140159 from Ma27/nextcloud-misc
nextcloud: misc changes
2021-10-01 21:08:31 +02:00
Maximilian Bosch 10703a8c92
nixos/nextcloud: run tests against each Nextcloud instance 2021-10-01 17:03:32 +02:00
Maximilian Bosch 675e262f5a
nixos/nextcloud: temp fix for MariaDB >=10.6
The MariaDB version 10.6 doesn't seem supported with current Nextcloud
versions and the test fails with the following error[1]:

    nextcloud # [   14.950034] nextcloud-setup-start[1001]: Error while trying to initialise the database: An exception occurred while executing a query: SQLSTATE[HY000]: General error: 4047 InnoDB refuses to write tables with ROW_FORMAT=COMPRESSED or KEY_BLOCK_SIZE.

According to a support-thread in upstream's Discourse[2] this is because
of a missing support so far.

Considering that we haven't received any bugreports so far - even though
the issue already exists on master - and the workaround[3] appears to
work fine, an evaluation warning for administrators should be
sufficient.

[1] https://hydra.nixos.org/build/155015223
[2] https://help.nextcloud.com/t/update-to-next-cloud-21-0-2-has-get-an-error/117028/15
[3] setting `innodb_read_only_compressed=0`
2021-10-01 15:25:31 +02:00
happysalada 8346dc04b3 pict-rs: add initial module 2021-09-30 21:32:25 +09:00
Michele Guerini Rocco 28e1ca8ebf
Merge pull request #139907 from rnhmjoj/test-fixes
nixos/tests: fix for memorySize being an integer
2021-09-29 16:54:32 +02:00
rnhmjoj 58be230026
nixos/tests/custom-ca: falkon -> qutebrowser
Use qutebrowser as the QtWebEngine test case because falkon has been
broken for a while.
2021-09-29 16:35:08 +02:00
rnhmjoj 7960244eb1
nixos/tests: fix for memorySize being an integer 2021-09-29 15:51:06 +02:00
Artturi 759ffe33a0
Merge pull request #139890 from Artturin/bootfixflag 2021-09-29 16:31:06 +03:00
Robert Hensing 286c71a230
Merge pull request #139892 from hercules-ci/dockerTools-test-pullImage
dockerTools: test pullImage
2021-09-29 15:27:49 +02:00
Robert Hensing ae03fb8121
Merge pull request #80068 from jbedo/docker
dockerTools: fix export
2021-09-29 14:55:21 +02:00
Robert Hensing 16a4da9127 dockerTools: Test pullImage fetcher whenever its implementation changes 2021-09-29 14:41:08 +02:00
Artturin c34905f516 nixos/boot: qemu-flags -> qemu-common
and dont use with import ...
2021-09-29 15:37:24 +03:00
Justin Bedo 020e88bf7a
nixos/tests/docker-tools: check explicitly for file in exportImage 2021-09-29 21:40:31 +10:00
Michele Guerini Rocco e68eba2dba
Merge pull request #134618 from rnhmjoj/wpa-safe
nixos/wpa_supplicant: add safe secret handling
2021-09-29 13:35:29 +02:00
Maximilian Bosch 7d890267d1
Merge pull request #139665 from Ma27/drop-linux-5.13
linux_5_13: drop
2021-09-29 13:10:10 +02:00
rnhmjoj 62126f8c15
nixos/tests/wpa_supplicant: init 2021-09-29 09:10:39 +02:00
Justin Bedo 0319228a45
docker-tools: add example for exportImage functionality and test 2021-09-29 15:35:21 +10:00
Timothy DeHerrera 895f3956d2
Merge pull request #127933 from rnhmjoj/qemu-restoration
Qemu restoration
2021-09-28 21:35:23 -06:00
Benjamin Staffin 5c7c38f61d
Merge pull request #139420 from Flakebi/dex
dex-oidc: 2.28.1 -> 2.30.0 and add module
2021-09-28 16:52:35 -04:00
Maximilian Bosch 01eb8ec98a
linux_5_13: drop
5.13.19 was the last 5.13 release and the version is now EOL[1].

[1] https://lwn.net/Articles/869747/
2021-09-27 23:29:53 +02:00
Pavel Borzenkov 80f7656229 calibre-web: 0.6.12 -> 0.6.13
calibre-web no longer starts without proper calibre DB path configured,
so the default testcase (completely unconfigured) is removed.
2021-09-27 20:51:30 +02:00
Jörg Thalheim 59cb7a87d7
Merge pull request #137124 from helsinki-systems/feat/activation-script-restart
nixos/switch-to-configuration: Allow activation scripts to restart units
2021-09-26 15:46:38 +01:00
Aaron Andersen 57f1ee46e4
Merge pull request #136233 from MayNiklas/owncast
nixos/owncast: init at 0.0.8
2021-09-25 15:25:13 -04:00
Flakebi 6ca43a69cc
dex-oidc: add module 2021-09-25 13:12:51 +02:00
MayNiklas 1f934dad30 nixos/owncast: init owncast service 2021-09-23 10:48:29 +02:00
github-actions[bot] 09a7436fcc
Merge master into staging-next 2021-09-22 18:01:01 +00:00
rnhmjoj a8576d4053
nixos/tests/mpv: remove deprecated mpv-with-scripts
It has been replaced by wrapMpv in 2020-05-22.
2021-09-22 15:40:59 +02:00
rnhmjoj cbd515e44c
nixos/tests/atop: remove top-level string
Attributes in the top-level of a test should be derivations,
otherwise they will cause an evaluation failure in hydra.
2021-09-22 15:07:15 +02:00
rnhmjoj 699b8d671d
nixos/tests/wasabibackend: fix bitcoind config
Since c6017d98 services.bitcoind is submodule.
2021-09-22 14:48:14 +02:00
rnhmjoj df49f6565c
nixos/tests/pantheon: fix missing lib 2021-09-22 12:59:09 +02:00
rnhmjoj c744ecb69f
nixos/tests/systemd-networkd-ipv6-prefix-delegation: fix wrapper
The owner,group options are mandatory after #126289.
2021-09-22 12:40:03 +02:00
rnhmjoj 196621010c
nixos/tests/mariadb-galera-rsync: fix nogroup
This fixes the evaluation after for #133166.
2021-09-22 11:49:11 +02:00
rnhmjoj 113cc7b136
nixos/tests/mariadb-galera-mariabackup: fix nogroup
This fixes the evaluation after for #133166.
2021-09-22 11:46:30 +02:00
rnhmjoj 20ad669618
nixos/tests/minio: fix deprecation warning
The `accessKey` and `secretKey` options have been deprecated in favour
of the new `rootCredentialsFile`.
2021-09-22 11:35:22 +02:00
rnhmjoj 87d76b1783
nixos/tests/mysql: fix nogroup
This fixes the evaluation after for #133166.
2021-09-22 11:20:30 +02:00
rnhmjoj 08cd8667ee
nixos: filalex77 -> Br1ght0ne
The maintainers has changed username in 512c3c0a.
2021-09-22 11:20:30 +02:00
rnhmjoj 1f55c7e022
nixos/tests: drop latestKernel.hardened
The latest kernel does not guarantee a hardened version anymore,
see ga5341beb for the motivation.
2021-09-22 11:20:30 +02:00
rnhmjoj 88b3c29cf1
nixos: heimdalFull -> heimdal
The package has been renamed in 2018-05-01.
2021-09-22 11:20:30 +02:00
rnhmjoj 1f826a7164
nixos/tests/ec2: fix conflicting option values 2021-09-22 11:20:30 +02:00
rnhmjoj e2a668224f
nixos/tests/enlightenment: fix renamed options
All program-specific `autoLogin` options have been unified under
`displayManager.autoLogin`.
2021-09-22 11:20:29 +02:00
rnhmjoj 169cd512d4
nixos/tests/cntr: fix evaluation
The maintainer email address is srk@48.io, hence srk, but the attribute
name in the maintainer list is actually sorki.
2021-09-22 09:06:50 +02:00
rnhmjoj 78b0883e2f
nixos/tests/prometheus-exporters: fix nogroup
Add a group after the removal of the nogroup default in #133166.
2021-09-22 09:06:50 +02:00
rnhmjoj 5b4f8afae4
nixos/tests: stdenv.lib -> lib
These must have been reintroduced by mistake after the deprecation.
2021-09-22 09:06:50 +02:00
github-actions[bot] ecf5e75910
Merge master into staging-next 2021-09-20 18:01:12 +00:00
Jonathan Ringer 82ff732055
nixosTests.pantheon: fix evaluation 2021-09-20 09:37:09 -07:00
Michele Guerini Rocco ea1eae5b47
Merge pull request #138516 from rnhmjoj/lock-kernel-fix
nixos/lock-kernel-modules: reorder before/after
2021-09-20 15:13:12 +02:00
github-actions[bot] 9e5021eef4
Merge master into staging-next 2021-09-20 12:01:15 +00:00
Oleksii Filonenko be72fadd54 nixosTests.meilisearch: init
(cherry picked from commit 4cc2d55f6a)
2021-09-20 16:12:29 +09:00
Alyssa Ross e2bb7997c4
Merge remote-tracking branch 'nixpkgs/master' into staging-next
Conflicts:
	nixos/doc/manual/release-notes/rl-2111.section.md
2021-09-19 17:08:00 +00:00
rnhmjoj 1bd7260adb
nixos/lock-kernel-modules: reorder before/after
Moving the service before multi-user.target (so the `hardened` test
continue to work the way it did before) can result in locking the kernel
too early. It's better to lock it a bit later and changing the test to
wait specifically for the disable-kernel-module-loading.service.
2021-09-19 12:06:00 +02:00
davidak dfa2dd95c2
Merge pull request #138434 from bobby285271/pantheon-team
treewide: switch from pantheon.maintainers to lib.teams.pantheon
2021-09-19 02:58:11 +02:00
Bobby Rong 0fd8cc3908
treewide: switch from pantheon.maintainers to lib.teams.pantheon 2021-09-18 23:07:00 +08:00
rnhmjoj b29c2f97c3
nixos/lib/qemu-flags: rename to qemu-common
The current name is misleading: it doesn't contain cli arguments,
but several constants and utility functions related to qemu.
This commit also removes the use of `with import ...` for clarity.
2021-09-18 16:58:16 +02:00
Jonas Heinrich 0dcac759f2 nixos/dokuwiki: Add support for Caddy web server 2021-09-18 23:09:21 +09:00
Raphael Megzari 62468d6ff7
Merge branch 'master' into staging-next 2021-09-18 22:46:18 +09:00
github-actions[bot] 7da057ad4e
Merge master into staging-next 2021-09-18 12:01:25 +00:00
Bobby Rong a66bcfe997
nixos/pantheon: fix test command for wingpanel 2021-09-18 19:33:40 +08:00
Aaron Andersen 4ec195a9c1
Merge pull request #137429 from illustris/spark3
Spark: init module
2021-09-18 07:28:19 -04:00
github-actions[bot] 263bdbdad4
Merge master into staging-next 2021-09-18 06:01:19 +00:00
Artturi e7b6d118f2
Merge pull request #113241 from chkno/user-activation-scripts
Run userActivationScripts at login
2021-09-18 05:25:06 +03:00
github-actions[bot] a21275cdae
Merge master into staging-next 2021-09-17 18:01:14 +00:00
illustris 13839b0022 nixos/spark: add test 2021-09-17 22:40:06 +05:30
Robert Hensing f023c47101
Merge pull request #137484 from i-do-cpp/add-disableInstallerTools-test
installers/tools: add test for system.disableInstallerTools option
2021-09-17 17:09:39 +02:00
Luke Granger-Brown 65b8408ce8 Merge remote-tracking branch 'upstream/staging' into staging-next 2021-09-17 12:18:44 +00:00
Jonas Heinrich 38431cf21c nixos/wordpress: caddy support 2021-09-17 19:12:21 +09:00
github-actions[bot] 2ad7b248e6
Merge staging-next into staging 2021-09-17 00:02:15 +00:00
Robert Hensing 70b9016e94
Merge pull request #137013 from mkenigs/rm-runInMachine
nixos/testing: remove unused function runInMachine
2021-09-16 20:04:35 +02:00
i-do-cpp 92139c2045 installers/tools: add test for system.disableInstallerTools option
This test ensures the installer tools are actually unavailable
with the option set to true.
2021-09-15 09:18:35 +02:00
github-actions[bot] 79a728d821
Merge staging-next into staging 2021-09-14 00:01:57 +00:00
Guillaume Girol 3592034595
Merge pull request #133166 from symphorien/nonogroup
Don't default to nogroup for the primary group of users.
2021-09-13 18:29:21 +00:00
github-actions[bot] 04e48fbe4f
Merge staging-next into staging 2021-09-13 18:01:51 +00:00
talyz d46e78fd76
nixos/parsedmarc: Add test 2021-09-13 13:57:11 +02:00
Florian Klink 8019c95b55
Merge pull request #131618 from andir/systemdv249
systemd v249
2021-09-13 09:39:49 +02:00
Andreas Rammhold 92442b1f99
nixos/tests/prometheus: wait for influxdb exporter before quering
Previously the influxdb exporter test was flaky as even after the
service has started there is still a race before the service is actually
listening and accepting connection on port 9122.

With this commit the test will wait for the port to be open before
proceeding.
2021-09-12 23:45:55 +02:00
Andreas Rammhold 72197a5c79
nixos/tests/herbstluftwm: fix timeout that was given in seconds
Hydra accepts timeouts as value of seconds after which the test is
terminated / considered failed. Using the value 30 here has the effect
that the test was terminate after 30 seconds. That time might be
sufficient for the test execution itself but it has another downside:

Jobs on hydra inherit the timeout of their parent. In this case all the
builds that are a dependency of the herbstluftwm test *must* finish
(each) within 30s. And since not all of the dependencies are cached in
the binary cache this could lead to an issue with pacakges that take
longer than 30s to build at the time when the herbstluftwm test is built
by hydra.

It is best to not set the timeout here and let hydra deal with it.  Our
default timeout for builds is two hours which is more than sufficient
for most builds and tests. If the test fails we will spent ~2h doing
something or nothing at worst but at least we wont kill the build just
because a dependency wasn't fullfilled already.
2021-09-12 23:45:55 +02:00
Andreas Rammhold 64556974b6
systemd: 247.6 -> 249.4
This updates systemd to version v249.4 from version v247.6.

Besides the many new features that can be found in the upstream
repository they also introduced a bunch of cleanup which ended up
requiring a few more patches on our side.

a) 0022-core-Handle-lookup-paths-being-symlinks.patch:
  The way symlinked units were handled was changed in such that the last
  name of a unit file within one of the unit directories
  (/run/systemd/system, /etc/systemd/system, ...) is used as the name
  for the unit. Unfortunately that code didn't take into account that
  the unit directories themselves could already be symlinks and thus
  caused all our units to be recognized slightly different.

  There is an upstream PR for this new patch:
    https://github.com/systemd/systemd/pull/20479

b) The way the APIVFS is setup has been changed in such a way that we
   now always have /run. This required a few changes to the
   confinement tests which did assert that they didn't exist. Instead of
   adding another patch we can just adopt the upstream behavior. An
   empty /run doesn't seem harmful.

   As part of this work I refactored the confinement test just a little
   bit to allow better debugging of test failures. Previously it would
   just fail at some point and it wasn't obvious which of the many
   commands failed or what the unexpected string was. This should now be
   more obvious.

c) Again related to the confinement tests the way a file was tested for
   being accessible was optimized. Previously systemd would in some
   situations open a file twice during that check. This was reduced to
   one operation but required the procfs to be mounted in a units
   namespace.

   An upstream bug was filed and fixed. We are now carrying the
   essential patch to fix that issue until it is backported to a new
   release (likely only version 250). The good part about this story is
   that upstream systemd now has a test case that looks very similar to
   one of our confinement tests. Hopefully that will lead to less
   friction in the long run.

   https://github.com/systemd/systemd/issues/20514
   https://github.com/systemd/systemd/pull/20515

d) Previously we could grep for dlopen( somewhat reliably but now
   upstream started using a wrapper around dlopen that is most of the
   time used with linebreaks. This makes using grep not ergonomic
   anymore.

   With this bump we are grepping for anything that looks like a
   dynamic library name (in contrast to a dlopen(3) call) and replace
   those instead. That seems more robust. Time will tell if this holds.

   I tried using coccinelle to patch all those call sites using its
   tooling but unfornately it does stumble upon the _cleanup_
   annotations that are very common in the systemd code.

e) We now have some machinery for libbpf support in our systemd build.
   That being said it doesn't actually work as generating some skeletons
   doesn't work just yet. It fails with the below error message and is
   disabled by default (in both minimal and the regular build).

   > FAILED: src/core/bpf/socket_bind/socket-bind.skel.h
   > /build/source/tools/build-bpf-skel.py --clang_exec /nix/store/x1bi2mkapk1m0zq2g02nr018qyjkdn7a-clang-wrapper-12.0.1/bin/clang --llvm_strip_exec /nix/store/zm0kqan9qc77x219yihmmisi9g3sg8ns-llvm-12.0.1/bin/llvm-strip --bpftool_exec /nix/store/l6dg8jlbh8qnqa58mshh3d8r6999dk0p-bpftools-5.13.11/bin/bpftool --arch x86_64 ../src/core/bpf/socket_bind/socket-bind.bpf.c src/core/bpf/socket_bind/socket-bind.skel.h
   > libbpf: elf: socket_bind_bpf is not a valid eBPF object file
   > Error: failed to open BPF object file: BPF object format invalid
   > Traceback (most recent call last):
   >   File "/build/source/tools/build-bpf-skel.py", line 128, in <module>
   >     bpf_build(args)
   >   File "/build/source/tools/build-bpf-skel.py", line 92, in bpf_build
   >     gen_bpf_skeleton(bpftool_exec=args.bpftool_exec,
   >   File "/build/source/tools/build-bpf-skel.py", line 63, in gen_bpf_skeleton
   >     skel = subprocess.check_output(bpftool_args, universal_newlines=True)
   >   File "/nix/store/81lwy2hfqj4c1943b1x8a0qsivjhdhw9-python3-3.9.6/lib/python3.9/subprocess.py", line 424, in check_output
   >     return run(*popenargs, stdout=PIPE, timeout=timeout, check=True,
   >   File "/nix/store/81lwy2hfqj4c1943b1x8a0qsivjhdhw9-python3-3.9.6/lib/python3.9/subprocess.py", line 528, in run
   >     raise CalledProcessError(retcode, process.args,
   > subprocess.CalledProcessError: Command '['/nix/store/l6dg8jlbh8qnqa58mshh3d8r6999dk0p-bpftools-5.13.11/bin/bpftool', 'g', 's', '../src/core/bpf/socket_bind/socket-bind.bpf.o']' returned non-zero exit status 255.
   > [102/1457] Compiling C object src/journal/libjournal-core.a.p/journald-server.c.oapture output)put)ut)
   > ninja: build stopped: subcommand failed.

  f) We do now have support for TPM2 based disk encryption in our
     systemd build. The actual bits and pieces to make use of that are
     missing but there are various ongoing efforts in that direction.
     There is also the story about systemd in our initrd to enable this
     being used for root volumes. None of this will yet work out of the
     box but we can start improving on that front.

  g) FIDO2 support was added systemd and consequently we can now use
     that. Just with TPM2 there hasn't been any integration work with
     NixOS and instead this just adds that capability to work on that.

Co-Authored-By: Jörg Thalheim <joerg@thalheim.io>
2021-09-12 23:45:49 +02:00
Maximilian Bosch 2444c11431
nixos/kernel: add 5.14 to kernel test-suite
I guess that this was just forgotten in #136150 and I realized while
running these tests for the latest kernel updates.
2021-09-12 22:43:46 +02:00
Daniël de Kok 6f2ce2a65e treewide: remove danieldk as maintainer from a set of packages
I currently do not have much time to work on nixpkgs. Remove
myself as a maintainer from a bunch of packages to avoid that
people are waiting on me for a review.
2021-09-12 14:42:12 +00:00
Guillaume Girol 27f0f8965b nixos/tests/caddy.nix: fix eval 2021-09-12 14:59:30 +02:00
Guillaume Girol bc3bca822a nixos: define the primary group of users where needed 2021-09-12 14:59:30 +02:00
Janne Heß e8388f8574
nixos/switch-to-configuration: Allow activation scripts to restart units
The primary use case is tools like sops-nix and agenix to restart units
when secrets change. There's probably other reasons to restart units as
well and a nice thing to have in general.
2021-09-09 13:11:52 +02:00
Pavol Rusnak 9ceefd7e37
Merge pull request #137088 from bricewge/master
maintainers: remove bricewge
2021-09-08 20:15:52 +02:00
Matthew Kenigsberg b00d2a8f3e
nixos/testing: remove unused function runInMachine
runInMachine and runInMachineWithX are not used for any tests and can be
removed
2021-09-08 06:25:20 -05:00
Brice Waegeneire a49177e0ce maintainers: remove bricewge
So long, and thanks for all the fish!
2021-09-08 11:56:00 +02:00
Janne Heß a851b4d20e
nixos/users-groups: Add dry mode 2021-09-07 10:30:42 +02:00
Michele Guerini Rocco 052009bf2b
Merge pull request #135315 from johnjameswhitman/johnjameswhitman/fix-wlan-sub-interfaces
nixos/tasks/network-interfaces: Assign mac to new wlan interface instead of underlying one
2021-09-02 09:37:04 +02:00
John Whitman 8d3527aa88 nixos/network-interfaces: Fix wlan interface mac 2021-09-01 21:46:26 -04:00
Nick Cao 83b48cc589
caddy: build with default go and fix tests 2021-09-01 15:15:50 +08:00
happysalada f091420c1d rabbitmq: add option to enable management plugin 2021-08-30 18:43:09 +09:00
Aaron Andersen 515ad99467
Merge pull request #132722 from aanderse/nixos/nzbget
nixos/nzbget: add settings option
2021-08-29 12:25:37 -04:00
Maximilian Bosch 6f8cfa08fe
Merge pull request #135946 from Ma27/nextcloud-tableprefix
nixos/nextcloud: remove invalid `--database-table-prefix` option
2021-08-29 00:00:25 +02:00
Andreas Rammhold 137147c826
Merge pull request #135442 from em0lar/paperless-ng-fix-web-file-upload
nixos/paperless-ng: fix web file upload
2021-08-28 12:50:34 +02:00