Commit Graph

7090 Commits

Author SHA1 Message Date
Bobby Rong
585164f759
nixosTests.pantheon: Extend the tests
This help me discover issues when I do manual testing.
2023-10-09 00:14:30 +08:00
github-actions[bot]
0b4a97a07f
Merge master into staging-next 2023-10-08 12:01:23 +00:00
Doron Behar
50a077328a
Merge pull request #259259 from Lassulus/syncthing_stale
nixos/syncthing: match stale ids by subtracting in jq
2023-10-08 12:53:34 +03:00
Fabián Heredia Montiel
7f16b623fc Merge remote-tracking branch 'origin/master' into staging-next 2023-10-08 00:18:22 -06:00
Sarah Brofeldt
9b73af9b27
Merge pull request #259498 from TLATER/tlater/gitea-metrics
gitea: Add option to supply the metrics token via file
2023-10-08 07:53:33 +02:00
natsukium
abd8c26137
python311Packages.factory-boy: rename from factory_boy 2023-10-08 12:32:12 +09:00
Majiir Paktu
c3e90f5667 nixos/network-interfaces-systemd: require defaultGateway.interface
The logic for configuring a gateway without an interface specified adds
a route with Gateway= to *every interface* configured by NixOS for
networkd. This leads to nonsensical configurations like the following:

    [Network]
    DHCP=no
    Address=192.168.0.1/24

    [Route]
    Gateway=10.0.0.1
    GatewayOnLink=false

We remove this logic and make defaultGateway.interface required to
configure a default gateway when using networkd.

We can ignore the removal of GatewayOnLink because systemd defaults it
to "no" anyway.
2023-10-07 16:09:11 -04:00
Tristan Daniël Maat
b59e5a34e7
nixos/gitea: Add option to supply the metrics token via file 2023-10-07 21:53:02 +02:00
Lin Jian
021da9bf62
Merge pull request #259549 from woojiq/keyd
nixos/keyd: add `extraConfig` option
2023-10-07 23:18:51 +08:00
Maximilian Bosch
efc5c80e18
nextcloud25: remove
EOL of Nextcloud v25 is scheduled by the end of this month.
2023-10-07 16:16:42 +02:00
Bobby Rong
383b753bba
Merge pull request #259363 from bobby285271/fix/gnome-flashback
gnome.gnome-flashback: Fix x-d-p-gnome launch
2023-10-07 20:56:26 +08:00
github-actions[bot]
7520bf436a
Merge master into staging-next 2023-10-07 12:00:58 +00:00
Mario Rodas
5103716b44
Merge pull request #252800 from 1000101/prometheus-pgbouncer-exporter
prometheus-pgbouncer-exporter: init at 0.7.0
2023-10-07 06:37:06 -05:00
Doron Behar
34888cd1d1 nixos/tests/syncthing-init: Remove unused testName attribute 2023-10-07 14:04:43 +03:00
1000101
3b094812b1 prometheus-pgbouncer-exporter: init at 0.7.0 2023-10-07 11:44:40 +02:00
woojiq
fee1832e84 nixos/keyd: add extraConfig option 2023-10-07 11:50:04 +03:00
github-actions[bot]
e2801b1fcf
Merge master into staging-next 2023-10-07 06:00:59 +00:00
K900
b7a3aaae38
Merge pull request #259460 from K900/test-eval-fixes
treewide: test eval fixes
2023-10-07 07:36:46 +03:00
github-actions[bot]
b7d8867fd1
Merge master into staging-next 2023-10-07 00:02:14 +00:00
Ryan Lahfa
ae7d5d59b8
Merge pull request #258569 from alyssais/linux-6.4-drop 2023-10-07 00:35:08 +02:00
Jan Tojnar
76a7aa445a Merge branch 'master' into staging-next
Conflicts:
- pkgs/development/python-modules/xdot/default.nix
  between 2f244e3647 and 1a9a257cf7
2023-10-06 23:18:00 +02:00
K900
320fcb409c nixos/tests/tracee: fix eval
Test still doesn't pass.
2023-10-07 00:17:54 +03:00
K900
b854f27f47 nixos/tests/sftpgo: fix eval 2023-10-07 00:10:50 +03:00
K900
29535e40ef nixos/tests/lxd-image-server: fix eval 2023-10-07 00:07:50 +03:00
K900
93d52c5609 nixos/tests/mongodb: remove non-existent maintainer 2023-10-07 00:07:40 +03:00
K900
3626143f19 nixos/tests/litestream: fix eval
Test still doesn't pass.
2023-10-07 00:07:11 +03:00
K900
a4e7f5011d nixos/tests: remove reference to non-existent test 2023-10-06 23:55:21 +03:00
K900
969a309b9e nixos/tests/sftpgo: fix eval 2023-10-06 23:55:20 +03:00
K900
a101216526 nixos/tests/osquery: fix eval 2023-10-06 23:55:20 +03:00
K900
16753291fa nixos/tests/legit: fix eval 2023-10-06 23:55:20 +03:00
K900
a3323f68a7 nixos/tests/hardened: fix eval 2023-10-06 23:54:57 +03:00
K900
1bc5af0f6a nixos/tests/dconf: fix config format
This was changed in the module, but not in the test
2023-10-06 23:52:52 +03:00
Lin Jian
272dba1e31
Merge pull request #257415 from ehmry/yggdrasil
nixos/yggdrasil: add extraArgs option
2023-10-07 02:05:36 +08:00
Emery Hemingway
3fc4ecafeb nixos/yggdrasil: add extraArgs option 2023-10-06 17:59:14 +01:00
Ryan Lahfa
c22f1c1cfa
Merge pull request #257828 from mbey-mw/nginx-tmpfiles-rules 2023-10-06 15:28:36 +02:00
Marek Beyer
040cf48d28
nixos/tests: add test for nginx temp directories removal
The default temp directories for nginx must not be removed by
systemd-tmpfiles-clean.service. This test lowers the age parameter for /tmp and
triggers a cleanup that would normally only occur after 10 days of nginx
inactivity. After that, the functionality of nginx that requires a temporary
directory is tested again.
2023-10-06 14:26:37 +02:00
Alyssa Ross
e8f0afa7b0
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
	pkgs/development/python-modules/qcelemental/default.nix
2023-10-06 12:11:15 +00:00
Bobby Rong
3db8e68328
nixos/tests/gnome-flashback: Restore wait_for_x test
Should be passing now.
2023-10-06 18:39:10 +08:00
Tom Fitzhenry
736884108d sgt-puzzles: rename all "sgtpuzzles" -> "sgt-puzzles"
nixpkgs currently mixes sgtpuzzles/sgt-puzzles across filenames,
packages, tests.

This inconsistency is frequently annoying.

Let's unify on "sgt-puzzles", on the basis that:
* "sgt-puzzles" is the package filename.
* Alpine/FreeBSD/Debian use "sgt-puzzles". No other distro uses
"sgtpuzzles". https://repology.org/project/sgt-puzzles/versions
2023-10-06 21:36:48 +11:00
Bobby Rong
49dda70dbc
Merge pull request #259222 from bobby285271/fix/gnome-flashback-eval
nixosTests.gnome-flashback: Fix eval
2023-10-06 17:31:44 +08:00
Will Fancher
524714f7ea systemd 254: ZFS /usr fix with systemd-stage-1 2023-10-06 04:25:25 -04:00
Bobby Rong
190a819ecb
nixosTests.gnome-flashback: Ensure gnome-flashback-media-keys starts 2023-10-06 16:04:24 +08:00
Leona Maroni
65209cbc21
nixosTests.paperless: add additional test using postgresql as db
With that test we also test, that paperless can connect to the outside
postgresql socket.

Co-Authored-By: Erik Arvstedt <erik.arvstedt@gmail.com>
2023-10-05 12:58:09 +02:00
github-actions[bot]
77b60239ac
Merge master into staging-next 2023-10-05 00:02:28 +00:00
Jörg Thalheim
07c70a41ab nixos/mediawiki: add nginx option
mediawiki: configure uploadsDir
2023-10-04 22:21:55 +01:00
Tobias Stenzel
1261914a96 percona-server_8_0: init at 8.0.34 2023-10-04 20:58:50 +02:00
github-actions[bot]
c7a3c2d71b
Merge master into staging-next 2023-10-04 12:01:01 +00:00
Doron Behar
34585a2b76
Merge pull request #256866 from kirillrdy/transmission
transmission, transmission_4: set mainProgram and restore nixosTests
2023-10-04 13:20:46 +03:00
Alyssa Ross
ae3682cb17
linux_6_4: drop (EOL)
It's still in kernels-org.json, because even if I remove it the update
script will keep putting it back, but nothing references it, and it'll
be removed from that file when kernels are next updated after it's
been delisted from kernel.org.

linux_testing_bcachefs still needs to be updated for >6.4, so for now
I've just inlined the Linux 6.4 definition in linux_testing_bcachefs's
definition.
2023-10-02 17:27:32 +00:00
Weijia Wang
ccdb43a66a Merge branch 'master' into staging-next 2023-10-02 14:49:01 +02:00
Ryan Lahfa
06f013e0cd
Merge pull request #238847 from nikstur/qemu-vm-external-disk-image 2023-10-02 13:27:03 +02:00
Linus Heckemann
313d0245a8
Merge pull request #256666 from lheckemann/bcachefs-keyring
bcachefs tests: unlock directly to the right keyring
2023-10-02 11:35:16 +02:00
nikstur
62e95d095d nixos/qemu-vm: optionally disable overriding fileSystems
Allow the user to disable overriding the fileSystems option with
virtualisation.fileSystems by setting
`virtualisation.fileSystems = lib.mkForce { };`.

With this change you can use the qemu-vm module to boot from an external
image that was not produced by the qemu-vm module itself. The user can
now re-use the modularly set fileSystems option instead of having to
reproduce it in virtualisation.fileSystems.
2023-10-02 11:13:26 +02:00
github-actions[bot]
708561b6ea
Merge master into staging-next 2023-10-01 18:01:08 +00:00
Ryan Lahfa
8bc4e1927c
Merge pull request #255321 from p-h/ulogd-multiple-logging-stacks 2023-10-01 17:53:19 +02:00
github-actions[bot]
6b41a98c6c
Merge master into staging-next 2023-09-30 00:01:53 +00:00
Wietse de Vries
86dbce6d07 audiobookshelf: init module 2023-09-29 22:01:45 +02:00
Ryan Lahfa
2ab7fc113d Merge pull request #252766 from Ma27/systemctl-edit-runtime-suggest 2023-09-28 16:28:48 +02:00
Maximilian Bosch
e515dce892 nixos/sshd: fix sshd.conf validity check
When using e.g. `{ addr = "[::]"; port = 22; }` at `listenAddresses`,
the check fails because of an escaping issue[1] with

    last 1 log lines:
    > Invalid test mode specification -f
    For full logs, run 'nix log /nix/store/c6pbpw5hjkjgipmarwyic9zyqr1xaix5-check-sshd-config.drv'

Using `lib.escapeShellArg` appears to solve the problem.

[1] https://github.com/NixOS/nixpkgs/pull/256090#issuecomment-1738063528
2023-09-28 00:11:31 +00:00
Ryan Lahfa
e909050efd
Merge pull request #257047 from minijackson/netbox-3.6.2 2023-09-27 18:50:54 +02:00
Minijackson
541d1eef67
netbox_3_3: remove
should be, by now, unused by everyone

Co-authored-by: Raito Bezarius <masterancpp@gmail.com>
2023-09-26 22:51:48 +02:00
Minijackson
3cc7cbce03
netbox_3_6: init, mark 3_5 as EOL
use it for the upgrade test
increase tests memory, otherwise NetBox gets OOM killed

Co-authored-by: Raito Bezarius <masterancpp@gmail.com>
2023-09-26 22:42:49 +02:00
Alexander Bantyev
299e0b9560
Merge pull request #255033 from AleXoundOS/castopod
castopod: init at 1.6.4
2023-09-26 16:42:26 +04:00
Ryan Lahfa
4242ecd871
Merge pull request #248372 from yaxitech/amd-sev-guest 2023-09-25 13:10:42 +02:00
Alyssa Ross
c5c30274a3 nixosTests.tinywl: fix by adding Mesa drivers
Required since upstream commit 49738406 ("render: don't fall back to
Pixman if we have a render node").
2023-09-25 13:04:20 +02:00
WilliButz
2d30a37d9f
Merge pull request #248925 from FugiMuffi/prometheus-sabnzbd-exporter
prometheus-sabnzbd-exporter: init at 0.1.70
2023-09-25 12:09:36 +02:00
Will Fancher
4bd4976b87
Merge pull request #251290 from Majiir/systemd-initrd-networking-features
nixos/network-interfaces-systemd: support `vlans`, `bridges` in systemd-initrd
2023-09-25 05:07:23 -04:00
misuzu
c220d280b0 nixosTests.castopod: init 2023-09-25 10:17:44 +04:00
Maximilian Bosch
9bd9e20e9a
Merge pull request #256090 from CRTified/sshd-validation-fix
nixos/sshd: Specify connection parameters for configuration validation
2023-09-24 14:12:46 +02:00
Minijackson
6c7e768420
netbox_3_5: introduce alias
clears up ambiguity
use that alias in tests

Co-authored-by: Raito Bezarius <masterancpp@gmail.com>
2023-09-24 10:13:05 +02:00
Martin Weinelt
1ff350f7b8
Merge pull request #81460 from vcunat/p/knot-nixConfig
nixos/knot: allow full configuration by nix values
2023-09-23 20:55:54 +02:00
Janne Heß
cc55ef9d55
Merge pull request #254993 from helsinki-systems/feat/stc-mount-improvements
nixos/switch-to-configuration: Mount improvements and a lot more test cases
2023-09-23 17:03:13 +02:00
Kirill Radzikhovskyy
ea9254a5a5 nixosTests.tranmission_4: init 2023-09-23 21:38:47 +10:00
Martin Weinelt
45e71a7a99
nixosTests.kea: use knot.settings for configuration 2023-09-23 10:04:02 +02:00
Martin Weinelt
8e93f353cc
nixosTests.knot: use settings format 2023-09-23 10:04:02 +02:00
Maciej Krüger
04e64fa716
nixosTests.sudo-rs: use sudo-rs
As the module was renamed, we need to use the new one
2023-09-22 15:14:14 +02:00
illustris
1cd3c804bf
hadoop, nixos/hadoop: remove untarDir 2023-09-22 16:34:07 +05:30
Linus Heckemann
f6f5f60879 bcachefs tests: unlock directly to the right keyring 2023-09-22 12:58:04 +02:00
Janne Heß
358347e8b6
nixos/switchTest: Also test swap devices 2023-09-22 10:26:11 +02:00
Janne Heß
85c1c30fd9
nixos/switch-to-configuration: Never unmount / or /nix
Also adds a huge test for fstab handling
2023-09-22 10:26:10 +02:00
Lin Jian
759ec1113d
nixos/network-interfaces: stop wrapping ping with cap_net_raw
From systemd 243 release note[1]:

This release enables unprivileged programs (i.e. requiring neither
setuid nor file capabilities) to send ICMP Echo (i.e. ping) requests
by turning on the "net.ipv4.ping_group_range" sysctl of the Linux
kernel for the whole UNIX group range, i.e. all processes.

So this wrapper is not needed any more.

See also [2] and [3].

This patch also removes:
- apparmor profiles in NixOS for ping itself and the wrapped one
- other references for the wrapped ping

[1]: 8e2d9d40b3/NEWS (L6457-L6464)
[2]: https://github.com/systemd/systemd/pull/13141
[3]: https://fedoraproject.org/wiki/Changes/EnableSysctlPingGroupRange
2023-09-21 16:52:16 +08:00
Nikolay Korotkiy
09846eacb2
Merge pull request #252001 from imincik/qgis-nixos-test
qgis: add nixos tests
2023-09-20 23:46:57 +04:00
Robert Schütz
728bae020d
Merge pull request #253687 from dotlambda/plausible-2.0.0
plausible: 1.4.4 -> 2.0.0
2023-09-20 19:28:09 +00:00
Robert Schütz
c4574a95c5 plausible: also install tracker 2023-09-20 09:07:28 -07:00
Maciej Krüger
61536e7a1f
nixosTests.sudo-rs: fix syntax 2023-09-20 13:58:08 +02:00
Maciej Krüger
922926cfbc
Merge pull request #253876 from nbraud/nixos/sudo-rs 2023-09-20 13:55:33 +02:00
Weijia Wang
0425ad73b3
Merge pull request #255549 from wegank/wordpress-bump
wordpress: 6.2.2 -> 6.3.1
2023-09-20 00:41:56 +02:00
Carl Richard Theodor Schneider
cd2dead42c nixos/tests/openssh: add Match config for validation test 2023-09-19 18:13:44 +02:00
Fabián Heredia Montiel
90040cd36a linux/hardened/patches/6.5: init at 6.5.3-hardened1 2023-09-19 07:09:14 +00:00
nicoo
7b5b3f5124 nixos/sudo: Add tests for sudo-rs too
Duplicated sudo's testsuite for now, as its maintainer does not with
to collaborate on testing effors; see #253876.

Environment-related tests were removed, as sudo-rs does not support
`(NO)SETENV` yet; see memorysafety/sudo-rs#760
2023-09-18 18:03:58 +00:00
Maximilian Bosch
e4f0f0977e
Merge pull request #241973 from 999eagle/feat/synapse-workers
nixos/synapse: add support for workers, cleanup
2023-09-18 19:54:20 +02:00
Sophie Tauchert
ca1ffe5869
nixos/synapse: move services.matrix-synapse.workers.config to services.matrix-synapse.workers 2023-09-18 08:24:37 +02:00
Sophie Tauchert
2edea7611b
nixos/synapse: document options better
Co-authored-by: Daniel Olsen <daniel.olsen99@gmail.com>
2023-09-18 08:24:36 +02:00
Sophie Tauchert
b20cbb12cd
nixos/synapse: add test for running synapse with workers
Co-authored-by: Daniel Olsen <daniel.olsen99@gmail.com>
2023-09-18 08:24:36 +02:00
Philippe Hürlimann
7ae1eab886 ulogd: add support for multiple logging stacks
fixes #244469
2023-09-18 00:16:54 +02:00
Robert Scott
0834c95bd6 nixosTests.docker-tools: bump diskSize from 2048 -> 3072 2023-09-17 12:18:42 +01:00
zaldnoay
b53e5a6479 nixos/frp: add test and link to package 2023-09-17 14:37:19 +08:00
Jörg Thalheim
fd264ba8a2 nixos/zfs: fix tests on zfsUnstable 2023-09-17 05:58:38 +02:00
Weijia Wang
b4521212e4 wordpress: 6.2.2 -> 6.3.1 2023-09-17 00:02:26 +02:00
Vincent Haupert
f13bf0c0d4 nixos/amd.sev: add test 2023-09-15 15:38:49 +02:00
Pol Dellaiera
d30fde0977
Merge pull request #250735 from TheNeikos/fix/discourse
discourse: update 3.1.0.beta4 -> 3.1.0
2023-09-14 16:03:28 +02:00
Michele Guerini Rocco
607cb89351
Merge pull request #254512 from rnhmjoj/pr-anbox
anbox: always use postmarket OS images
2023-09-14 12:57:39 +02:00
Janne Heß
c3e6412260
nixos/switchTest: Also test restarting from aborted switches 2023-09-13 17:11:32 +02:00
Janne Heß
e0717ce857
nixos/switchTest: Also test systemd restarts 2023-09-13 17:04:54 +02:00
rnhmjoj
7d6ee8ce1e
nixos/tests/shadow: test hashedPasswordFile 2023-09-13 17:00:05 +02:00
Janne Heß
211e2d738b
nixos/switchTest: Also test init interface version 2023-09-13 16:56:01 +02:00
Janne Heß
d1c1335908
nixos/switch-to-configuration: Test more action things 2023-09-13 16:42:19 +02:00
Marcel Müller
52f22574ea nixosTests.discourse: Do not use deprecated field 2023-09-13 14:48:17 +02:00
Fabián Heredia Montiel
cc1fdc5376
Merge pull request #254181 from StillerHarpo/adguardhome
nixos/adguardhome: Fix openFirewall
2023-09-12 16:23:16 -05:00
Herwig Hochleitner
30bcc6c39d
Merge pull request #248310 from emilylange/nixos/gitea-forgejo-split
nixos/forgejo: fork from nixos/gitea (split)

close https://github.com/NixOS/nixpkgs/issues/244866
2023-09-12 22:10:01 +02:00
nicoo
c7423cd734 noto-fonts-emoji → noto-fonts-color-emoji
Clarify that the monochrome font is not included, per #221181.

The new name is also coherent with the name of the font,
according to `fontconfig`: Noto Color Emoji.
2023-09-12 12:38:07 +00:00
Mario Rodas
23e69f92c8
Merge pull request #254324 from marsam/update-postgis
postgresqlPackages.postgis: 3.3.3 -> 3.4.0
2023-09-12 00:15:32 -05:00
datafoo
ade414b6c7 nixos/acme: rename option credentialsFile to environmentFile 2023-09-11 16:34:20 +00:00
oluceps
bc07451d4f
nixos/dae: fix override existed config issue 2023-09-12 00:29:56 +08:00
rnhmjoj
705b998b83
anbox: always use postmarket OS images 2023-09-11 08:09:37 +02:00
Christian Theune
0e1a8027d1 nixos/swraid: fix regression for old initrd and add test coverage 2023-09-10 17:16:33 +02:00
Christian Theune
7f341bb450 nixos/swraid: fix monitor service 2023-09-10 15:34:11 +02:00
Pierre Bourdon
bfdf28becf
Merge pull request #251770 from robryk/suidwrapapparm
nixos/security/wrappers: simplifications and a fix for #98863 (respin of #199599)
2023-09-10 09:51:36 +02:00
Oliver Schmidt
e362fe9c6d security/acme: limit concurrent certificate generations
fixes #232505

Implements the new option `security.acme.maxConcurrentRenewals` to limit
the number of certificate generation (or renewal) jobs that can run in
parallel. This avoids overloading the system resources with many
certificates or running into acme registry rate limits and network
timeouts.

Architecture considerations:
- simplicity, lightweight: Concerns have been voiced about making this
  already rather complex module even more convoluted. Additionally,
  locking solutions shall not significantly increase performance and
  footprint of individual job runs.
  To accomodate these concerns, this solution is implemented purely in
  Nix, bash, and using the light-weight `flock` util. To reduce
  complexity, jobs are already assigned their lockfile slot at system
  build time instead of dynamic locking and retrying. This comes at the
  cost of not always maxing out the permitted concurrency at runtime.
- no stale locks: Limiting concurrency via locking mechanism is usually
  approached with semaphores. Unfortunately, both SysV as well as
  POSIX-Semaphores are *not* released when the process currently locking
  them is SIGKILLed. This poses the danger of stale locks staying around
  and certificate renewal being blocked from running altogether.
  `flock` locks though are released when the process holding the file
  descriptor of the lock file is KILLed or terminated.
- lockfile generation: Lock files could either be created at build time
  in the Nix store or at script runtime in a idempotent manner.
  While the latter would be simpler to achieve, we might exceed the number
  of permitted concurrent runs during a system switch: Already running
  jobs are still locked on the existing lock files, while jobs started
  after the system switch will acquire locks on freshly created files,
  not being blocked by the still running services.
  For this reason, locks are generated and managed at runtime in the
  shared state directory `/var/lib/locks/`.

nixos/security/acme: move locks to /run

also, move over permission and directory management to systemd-tmpfiles

nixos/security/acme: fix some linter remarks in my code

there are some remarks left for existing code, not touching that

nixos/security/acme: redesign script locking flow

- get rid of subshell
- provide function for wrapping scripts in a locked environment

nixos/acme: improve visibility of blocking on locks

nixos/acme: add smoke test for concurrency limitation

heavily inspired by m1cr0man

nixos/acme: release notes entry on new concurrency limits

nixos/acme: cleanup, clarifications
2023-09-09 20:13:18 +02:00
ajs124
0a3aa06b53
Merge pull request #253739 from mweinelt/firefox-102-removal
firefox-esr-102-unwrapped: remove
2023-09-09 19:25:42 +02:00
Janik
eda85eb31d
Merge pull request #251062 from ajs124/restic-wrapper-script 2023-09-09 19:11:33 +02:00
Florian Engel
20acd199f4
nixos/adguardhome: Fix openFirewall
When not setting `settings` and setting `openFirewall = true`
evaluation would fail because it tries to access `settings.bind_port`
while `settings == null`
2023-09-09 08:19:22 +02:00
Pierre Bourdon
69defb96b5
nixosTests.sudo: use same maintainers as the package 2023-09-08 14:47:13 +02:00
Mario Rodas
dfde9c83bc postgresqlPackages.postgis: 3.3.3 -> 3.4.0
Changelog: https://git.osgeo.org/gitea/postgis/postgis/raw/tag/3.4.0/NEWS
2023-09-08 04:20:00 +00:00
Kerstin Humm
36ff7d5d5d mobilizon: init at 3.1.3
Co-Authored-By: Minijackson <minijackson@riseup.net>
Co-Authored-By: summersamara <summersamara@proton.me>
2023-09-07 08:59:40 +00:00
Martin Weinelt
ba881ef613
firefox-esr-102-unwrapped: remove
The Firefox ESR 102.0 series has reached its end of life.

Removes package and test and references to them.
2023-09-07 01:17:27 +02:00
Weijia Wang
67160d51fe
Merge pull request #251987 from illdefined/akkoma
akkoma: 3.9.3 → 3.10.4
2023-09-06 16:03:52 +02:00
Weijia Wang
cfb61436d7
Merge pull request #252978 from oluceps/dae-upup
dae,nixos/dae: 0.2.4 -> 0.3.0
2023-09-05 23:57:14 +02:00
Michele Guerini Rocco
704c791a90
Merge pull request #253146 from rnhmjoj/pr-anbox
anbox: unbreak
2023-09-05 23:46:54 +02:00
Adam Stephens
c811cf643f nixos/tests/lxd: disable virtual-machine test on aarch64 2023-09-05 15:28:00 +00:00
Adam Stephens
a90385c62b nixos/lxd: add preseed option 2023-09-05 15:28:00 +00:00
Mikael Voss
b56f8149b2 nixos/tests/akkoma: Disable retrieving timeline 2023-09-05 12:26:33 +02:00
Matt Votava
b3bb611ce6
nixos/tests/anbox: init 2023-09-05 10:09:45 +02:00
rnhmjoj
640c86c256
nixos/tests/jool: update for module changes 2023-09-04 18:38:25 +02:00
Martin Weinelt
390d535562
Merge pull request #253259 from mweinelt/custom-ca-firefox-memlimit
nixosTests.custom-ca: resolve out of memory situations
2023-09-04 15:05:54 +02:00
Martin Weinelt
311ce2ad11
nixosTests.custom-ca: resolve out of memory situations
They are easily observable on hydra. E.g. on the latest eval

https://hydra.nixos.org/build/233893887
https://hydra.nixos.org/build/233900101
2023-09-04 14:34:21 +02:00
Mario Rodas
4f2c276497
Merge pull request #244093 from adamcstephens/lxd/vm
lxd: Add VM image and server support for QEMU VMs
2023-09-03 22:02:54 -05:00
pacien
c6808723b0 nixos/stalwart-mail: add vm test 2023-09-03 22:18:50 -04:00
Adam Stephens
efd1605be6
nixos/lxd: add virtual-machine support, image and module 2023-09-03 20:06:44 -04:00
oluceps
17e386205b
nixos/dae: add basic test 2023-09-03 03:06:52 +08:00
Ivan Mincik
54444b5892 qgis: add nixos tests
Add NixOS test for QGIS and QGIS-LTR. This test creates QGIS vector
memory layer containing Nix snowflake. This proves that application can
successfully start and Python bindings are working.

By default, Python script is executed in non-interactive mode and QGIS
is closed after script is finished. This script can be also executed
interactively by running following command:

```
 nix-build -A qgis
 QGIS_TEST_INTERACTIVE=True ./result/bin/qgis  --code pkgs/applications/gis/qgis/test.py
```

In this case, QGIS is not automatically closed.
2023-09-02 17:15:56 +02:00
Florian Klink
90204f058c
Merge pull request #251684 from jmbaur/user-activation-tmpfiles
nixos/systemd-user: call systemd-tmpfiles during activation
2023-09-01 21:52:19 +03:00
Martin Weinelt
d17a82f986
Merge pull request #252041 from mweinelt/unbound-exporter
prometheus-unbound-exporter: replace at 0.4.4
2023-08-29 21:26:42 +02:00
Jared Baur
e39c9f13bc
nixos/systemd-user: call systemd-tmpfiles during activation
Just like with system-wide tmpfiles, call `systemd-tmpfiles --create
--remove` for users during activation. This fixes an issue where new
entries in a user's tmpfiles are not reflected after activation, only at
boot when the user service systemd-tmpfiles-setup.service runs or only
after running systemd-tmpfiles manually.
2023-08-29 10:46:44 -07:00
Martin Weinelt
73c5a5a778
nixos/prometheus/unbound-exporter: update for new package
The command line interface changed slightly, but still supports the TCP
as well as the UDS control interface.
2023-08-28 23:21:52 +02:00
Jan Tojnar
434d160d7c
Merge pull request #234615 from linsui/dconf
nixos/dconf: support generating from attrs
2023-08-28 18:31:52 +02:00
ajs124
dbb69f82c6 nixos/restic: add wrapper scripts that set parameters for backup
and use in test
2023-08-28 15:17:37 +02:00
Pol Dellaiera
df24943cc0
Merge pull request #249765 from NixOS/nixos/modules/honk-init
nixos/honk: init
2023-08-28 10:40:23 +02:00
Janne Heß
fd454fe4b6
Merge pull request #250316 from helsinki-systems/feat/stc-improve-mount-units
nixos/switch-to-configuration: Improve mount unit handling
2023-08-28 09:18:44 +02:00
Maciej Krüger
311d2fa994
*: migrate to using nftables.tables instead of ruleset directly 2023-08-28 00:30:29 +02:00
Pol Dellaiera
48de649336
nixos/modules/honk: init 2023-08-27 23:43:40 +02:00
Theodore Ni
c68a6a21ca
Merge pull request #247909 from Sigmanificient/ragnarwm
ragnarwm: init at 1.3.1
2023-08-27 13:41:04 -07:00
Robert Obryk
13d3b0c733 nixos/security/wrappers: add one regression test for #98863
Note that this regression test checks only s[gu]id wrappers. The issue
for capability wrappers is not fixed yet.
2023-08-27 14:10:38 +02:00
Robert Obryk
1bdbc0b0fe nixos/security/wrappers: stop using .real files
Before this change it was crucial that nonprivileged users are unable to
create hardlinks to SUID wrappers, lest they be able to provide a
different `.real` file alongside. That was ensured by not providing a
location writable to them in the /run/wrappers tmpfs, (unless
disabled) by the fs.protected_hardlinks=1 sysctl, and by the explicit
own-path check in the wrapper. After this change, ensuring
that property is no longer important, and the check is most likely
redundant.

The simplification of expectations of the wrapper will make it
easier to remove some of the assertions in the wrapper (which currently
cause the wrapper to fail in no_new_privs environments, instead of
executing the target with non-elevated privileges).

Note that wrappers had to be copied (not symlinked) into /run/wrappers
due to the SUID/capability bits, and they couldn't be hard/softlinks of
each other due to those bits potentially differing. Thus, this change
doesn't increase the amount of memory used by /run/wrappers.

This change removes part of the test that is obsoleted by the removal of
`.real` files.
2023-08-27 14:10:36 +02:00
Maciej Krüger
c3ed95307e
Merge pull request #251413 from karolinschlegel/init-odoo-v15
odoo15: init at 15.0-20230720
2023-08-27 14:10:04 +02:00
Robert Obryk
c0e607da61 nixos/tests/wrappers: test apparmor configuration
Wrappers generate pieces of apparmor policies for inclusion, which are
used only in a single place in nixpkgs, for `ping`. They are built only
if apparmor is enabled.

This change causes the test to test:
 - that the apparmor includes can be generated,
 - that `ping` works with apparmor enabled (as the only policy that
   references these includes).

Ideally there would be some other NixOS test that verifies that `ping`
specifically works. Sadly, there isn't one.
2023-08-27 14:09:57 +02:00
Karolin Schlegel
4eee509d25 odoo15: init at 15.0-20230720
This contribution adds `odoo15` as a fixed version. To allow reusing the
existing test for Odoo, I made the package attribute configurable. To
reference the test for `odoo15` in `passthru` I added it to
`all-tests.nix`.
2023-08-27 09:52:43 +02:00
Ryan Lahfa
72494b65bc
Merge pull request #219873 from r-ryantm/auto-update/dolibarr 2023-08-26 16:23:13 +02:00
Mario Rodas
913c460a8c
Merge pull request #251431 from adamcstephens/lxd/5.17
lxd: 5.16 -> 5.17
2023-08-26 09:19:53 -05:00
Adam Stephens
6175a329d2
lxd: fix passthru test building 2023-08-26 08:51:13 -04:00
Raito Bezarius
7207b25099 nixos/tests/dolibarr: use -X GET instead -X POST to test for redirection
Previously, we were POST-ing the homepage to test for redirection, this is wrong.

We are supposed to GET-ing it.

This is fixed.
2023-08-26 13:44:19 +02:00
Franz Pletz
da37904672
Merge pull request #246772 from R-VdP/nixos-user-expiry
nixos/update-users-groups: add support for account expiry
2023-08-26 02:41:34 +02:00
Franz Pletz
fe907aa37e
Merge pull request #242365 from h7x4/add-mysqld-exporter
services/prometheus/exporters: add mysqld
2023-08-25 23:56:22 +02:00
Majiir Paktu
a3211ceb47 nixos/tests/systemd-initrd-bridge: init 2023-08-25 13:11:20 -04:00
Majiir Paktu
1f845ebc34 nixos/tests/systemd-initrd-vlan: init 2023-08-25 10:32:10 -04:00
Ryan Lahfa
4fb9aeae23
Merge pull request #250843 from RaitoBezarius/listmonk 2023-08-24 10:59:58 +02:00
Pierre Bourdon
4428f3a79a
Revert "nixos/security/wrappers: simplifications and a fix for #98863" 2023-08-24 08:35:11 +02:00
Mario Rodas
8720d96225
Merge pull request #248395 from adamcstephens/lxd/tests
nixos/tests/lxd: move into subdir, use minimal init, remove sleeps
2023-08-24 00:37:04 -05:00
Nick Cao
8d524e610b
Merge pull request #249502 from oddlama/feat-influxdb-provision-full
nixos/influxdb2: add provisioning and nixos tests
2023-08-24 08:55:38 +08:00
Pierre Bourdon
0930308453
Merge pull request #199599 from robryk/suidwrapnoreal
nixos/security/wrappers: simplifications and a fix for #98863
2023-08-24 01:09:36 +02:00
Felix Bühler
fb6665f4de
Merge pull request #250970 from alyssais/virtualbox-test-eval
nixosTests.virtualbox: fix eval
2023-08-23 22:02:34 +02:00
Emily
73a060e7ca
Merge pull request #244626 from Sohalt/caddy-rfc42
nixos/caddy: Add rfc42 settings option
2023-08-23 20:36:46 +02:00
Benjamin Staffin
5b198578db
Merge pull request #239801 from benley/hddfancontrol
hddfancontrol: init at 1.5.1 (plus nixos module)
2023-08-23 13:32:37 -04:00
Benjamin Staffin
12b3178bd2 nixos/hddfancontrol: initial module & test 2023-08-23 13:25:29 -04:00
Raito Bezarius
ffdeabbadf listmonk: perform tests only linux supported platforms
Otherwise, Darwin will try to run them and fail.
2023-08-23 17:50:28 +02:00
Alyssa Ross
42f1b5c6db
nixosTests.os-prober: add bintools to the VM
machine # warning: error: unable to download 'https://ftpmirror.gnu.org/bash/bash-5.2.tar.gz': Couldn't resolve host name (6); retrying in 329 ms
machine # warning: error: unable to download 'https://ftpmirror.gnu.org/bash/bash-5.2.tar.gz': Couldn't resolve host name (6); retrying in 530 ms
machine # warning: error: unable to download 'https://ftpmirror.gnu.org/bash/bash-5.2.tar.gz': Couldn't resolve host name (6); retrying in 1066 ms
machine # warning: error: unable to download 'https://ftpmirror.gnu.org/bash/bash-5.2.tar.gz': Couldn't resolve host name (6); retrying in 2544 ms
machine # [ 1283.199545] GUEST-test1[1465]: [  414.478221] stage-1-init: [Wed Aug 23 13:26:29 UTC 2023] + loadkmap
machine # error:
machine #        … writing file '/nix/store/v28dv6l0qk3j382kp40bksa1v6h7dx9p-bash-5.2.tar.gz'
machine #
machine #        error: unable to download 'https://ftpmirror.gnu.org/bash/bash-5.2.tar.gz': Couldn't resolve host name (6)
machine # error: builder for '/nix/store/5jrd75v747s76s16zxk59384xfcjqn58-bash-5.2.tar.gz.drv' failed with exit code 1
machine # error: 1 dependencies of derivation '/nix/store/0cgj4m2h51hjhmz5h4440pd73kv5lm5v-bash-5.2-p15.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/d2x66i0dfv9w81gl1w3nbkn0nz7mawaz-bash-5.2-p15.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/lcz1v3h1nsbyz2fp7xkp113jvyjqq0sx-bash-5.2-p15.drv' failed to build
machine # building '/nix/store/20d5pi1a5i9jj041i0gvr9zcs7bjbw46-binutils-2.40.tar.bz2.drv'...
machine # error: 1 dependencies of derivation '/nix/store/zb0ykvcllgc8l9ki38fdv9n8xp3rnphb-gcc-12.3.0.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/7kxjnzmc79sickp7hiyp8v169idyw8f2-gettext-0.21.1.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/wp7hpglhgwljl3fsfyx8caaakh4a1r72-xgcc-12.3.0.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/f7glbcn7n59k22b911bx1vyy13g4bdxh-binutils-2.40.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/q7yvprjmnqprx743ikkcz4kqx2mjdas4-binutils-wrapper-2.40.drv' failed to build
machine # building '/nix/store/vks3aqqal1rjvrsbj61nl1yh7r5shhdh-builder.pl.drv'...
machine # error: 1 dependencies of derivation '/nix/store/qmdff14r0l31mzx8al7h1kp9h5pck5wr-extra-utils.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/rdlk4188b2jp4ac38w94qazdaxk6sga9-stage-1-init.sh.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/rq15acvd6hcr52a5dlmk1p7mlyzjack0-initrd-linux-6.1.46.drv' failed to build
machine # error: 1 dependencies of derivation '/nix/store/h1rch2zqjacijnn0szq2hgwmd6v1r1ld-nixos-system-nixos-23.11pre-git.drv' failed to build
2023-08-23 13:50:44 +00:00
oddlama
8b5b7def91
nixos/influxdb2: add org, bucket, users and auth provisioning 2023-08-23 14:46:52 +02:00
Alyssa Ross
2d66a9db22
nixosTests.virtualbox: fix eval
There's no "lib" in scope here.  The test uses "with pkgs.lib;", so
this failed to evaluate.

Fixes: 6672dde558 ("treewide: use optionalAttrs instead of 'else {}'")
2023-08-23 12:25:34 +00:00
Raito Bezarius
b4658cada3 listmonk: revamp the tests
Previously, the transactional template was in id=2.
It is now id=3.

I moved a bit the code to improve the ability to load templates and subscribers properly.
I am planning to upstream `type` for templates API request so we can easily filter out
and select the accordingly template.
2023-08-23 00:25:47 +02:00
sohalt
c01874615b nixos/caddy: Add rfc42 settings option 2023-08-22 20:14:35 +02:00
Benjamin Staffin
63e9b2f8c0
Merge pull request #246354 from minijackson/netbox-fixes
netbox: 3.5.6 -> 3.5.7 + migration fixes + upgrade NixOS test
2023-08-21 16:22:38 -04:00
Janne Heß
eb831f759b
nixos/stc: Improve mount unit handling
We should sometimes restart the units rather than reloading them so the
changes are actually applied. / and /nix are explicitly excluded because
there was some very old issue where these were unmounted. I don't think
this will affect many people since most people use fstab mounts instead
but I plan to adapt this behavior for fstab mounts as well in the future
(once I wrote a test for the fstab thingies).
2023-08-21 09:07:14 +02:00
Sigmanificient
0482394fe0 ragnarwm: init at 1.3.1 2023-08-20 18:20:39 +02:00
Martin Weinelt
7c75694db9
Merge pull request #240982 from rnhmjoj/pr-jool
nixos/jool: add service for setting up SIIT/NAT64
2023-08-19 23:32:05 +02:00
Adam Stephens
f1c0589e4c
nixos/tests/lxd: move into subdir, use minimal init, remove sleeps 2023-08-17 21:02:08 -04:00
Manuel Bärenz
bad4b37c7e Remove turion (myself) as maintainer from some packages
I have removed myself as maintainer from those packages that:

* Have at least one other maintainer
* Are outside of my actual expertise,
  i.e. I wouldn't really know how to fix them if they broke
2023-08-17 17:20:18 +02:00
Arnout Engelen
46d051737d
Merge pull request #248011 from onny/opensnitch-test
nixos/opensnitch: add test
2023-08-17 12:43:42 +02:00
Bobby Rong
888d0bb9fa
Merge pull request #249561 from bobby285271/fix/fail-test-when-coredump
nixosTests.pantheon, nixosTests.budgie: Fail the test when coredump happens
2023-08-17 15:33:25 +08:00
Bobby Rong
ba96b6bdaa
nixosTests.budgie: Re-add checks for budgie-wm
This is the shell of the desktop, it is still a good idea to do something with it.
2023-08-16 23:33:52 +08:00
Bobby Rong
d86dc7c016
nixosTests.pantheon: Ensure the test fails when gala coredumps
It can be possible that pgrep failed to catch this. See the GNOME 45 PR.
2023-08-16 23:20:38 +08:00
Maciej Krüger
56700d64b1
Merge pull request #226821 from enc0urage/memtest 2023-08-16 15:31:32 +02:00
Nick Cao
2dadab4889
Merge pull request #249211 from oddlama/feat-influxdb-provision
nixos/influxdb2: automatic initial setup and nixos tests
2023-08-16 21:29:16 +08:00
oddlama
b4d718f14a
nixos/influxdb2: add initial setup automation and nixos tests 2023-08-16 14:31:49 +02:00
Janne Heß
bc9b484db8
Merge pull request #232230 from oddlama/fix-activation-template-unit-specializations
Fix detection of changed template unit specializations in switch-to-configuration.pl
2023-08-16 13:46:45 +02:00
Robert Obryk
46c9aed62b nixos/security/wrappers: add one regression test for #98863
Note that this regression test checks only s[gu]id wrappers. The issue
for capability wrappers is not fixed yet.
2023-08-16 11:33:22 +02:00
WilliButz
da5c3bde30
Merge pull request #248405 from fpletz/pkgs/mediamtx-1.0.0
mediamtx: 0.23.8 -> 1.0.0, refactor module, add test
2023-08-16 11:30:18 +02:00
Robert Obryk
77bc27ccdb nixos/backups/restic: handle cases when both dynamicFileFrom and paths are set
Also, add a test to verify that it works.

This change also removes the part of custom package test that verifies
that the correct paths are provided. This is already tested by restore
tests.

Before this change, setting both paths and dynamicFileFrom would cause
paths to be silently ignored. Making that actually apply the obvious
interpretation seems to me to be strictly better than prohibiting the
two from being set at the same time.
2023-08-16 11:25:15 +02:00
Nikolay Korotkiy
6f46c37d92
nixosTests.agate: switch to using gemget 2023-08-16 01:26:54 +04:00
Maximilian Bosch
2b42b842ed
nixos/prometheus-exporters: fix smartctl test 2023-08-15 15:44:45 +02:00
linsui
038d78d4ce nixos/dconf: add locks support 2023-08-15 19:20:39 +08:00
Nick Cao
fecb8c7752
nixosTests.fcitx5: make use of the newly added settings option 2023-08-15 08:36:07 +08:00
Maximilian Bosch
a471325eaf
Merge pull request #221318 from mweinelt/synapse-extras
nixos/matrix-synapse: Allow passing extras, discover extras from config
2023-08-14 18:43:05 +02:00
Robert Hensing
8fe5918d06
Merge pull request #248138 from hercules-ci/update-nixops_unstable
nixops_unstable: update
2023-08-14 11:00:44 +02:00
enc0urage
00d7065913 nixos/systemd-boot: Replace proprietary memtest86 with free memtest86+ in UEFI 2023-08-14 03:05:24 +00:00
h7x4
66de20bc45
tests/prometheus-exporters: add test for mysqld exporter 2023-08-13 19:47:19 +02:00
Jonas Heinrich
5e6e949e84 nixos/opensnitch: add test 2023-08-13 17:49:19 +02:00
Fugi
5e75b36302
nixos/prometheus-sabnzbd-exporter: init 2023-08-13 16:31:52 +02:00
Janne Heß
7937c5816d
nixos/switchTest: Also check for base unit modifications 2023-08-13 14:25:24 +02:00
Franz Pletz
4fc07e7b48
nixos/tests/mediamtx: init 2023-08-10 20:43:26 +02:00
Ryan Lahfa
ec409e6f79
Merge pull request #231673 from symphorien/suid_wrappers_userns 2023-08-10 11:52:59 +02:00
Franz Pletz
6574d90239
Merge pull request #248154 from onny/nextcloud-tests-fix
nixos/tests/nextcloud: Fix deprecation warning
2023-08-10 04:18:27 +02:00
Franz Pletz
50e7a02e67
nixos/chrony: add simple test 2023-08-10 03:04:04 +02:00
Franz Pletz
8e372c19d1
Merge pull request #245286 from codec/add-prometheus-idrac-exporter
prometheus-idrac-exporter: init at unstable-2023-06-29
2023-08-10 00:58:03 +02:00
Jonas Heinrich
14f7b1161d nixos/tests/nextcloud: Fix deprecation warning 2023-08-09 16:57:57 +02:00
Robert Hensing
4b51c5360f nixops_unstable: Fix tests attribute
The .overrideAttrs part is ok now, but a "passthru' workaround is
necessary now. See https://github.com/NixOS/nixpkgs/pull/247520
2023-08-09 15:47:13 +02:00
Franz Pletz
dcafb07ed8
Merge pull request #232250 from YBeaugnon/libvirt-hooks
nixos/libvirtd: hooks support
2023-08-09 15:07:52 +02:00
Guillaume Girol
0e4b8a05b2 nixos/wrappers: allow setuid and setgid wrappers to run in user namespaces
In user namespaces where an unprivileged user is mapped as root and root
is unmapped, setuid bits have no effect. However setuid root
executables like mount are still usable *in the namespace* as the user
already has the required privileges. This commit detects the situation
where the wrapper gained no privileges that the parent process did not
already have and in this case does less sanity checking. In short there
is no need to be picky since the parent already can execute the foo.real
executable themselves.

Details:
man 7 user_namespaces:
   Set-user-ID and set-group-ID programs
       When a process inside a user namespace executes a set-user-ID
       (set-group-ID) program, the process's effective user (group) ID
       inside the namespace is changed to whatever value is mapped for
       the user (group) ID of the file.  However, if either the user or
       the group ID of the file has no mapping inside the namespace, the
       set-user-ID (set-group-ID) bit is silently ignored: the new
       program is executed, but the process's effective user (group) ID
       is left unchanged.  (This mirrors the semantics of executing a
       set-user-ID or set-group-ID program that resides on a filesystem
       that was mounted with the MS_NOSUID flag, as described in
       mount(2).)

The effect of the setuid bit is that the real user id is preserved and
the effective and set user ids are changed to the owner of the wrapper.
We detect that no privilege was gained by checking that euid == suid
== ruid. In this case we stop checking that euid == owner of the
wrapper file.

As a reminder here are the values of euid, ruid, suid, stat.st_uid and
stat.st_mode & S_ISUID in various cases when running a setuid 42 executable as user 1000:

Normal case:
ruid=1000 euid=42 suid=42
setuid=2048, st_uid=42

nosuid mount:
ruid=1000 euid=1000 suid=1000
setuid=2048, st_uid=42

inside unshare -rm:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534

inside unshare -rm, on a suid mount:
ruid=0 euid=0 suid=0
setuid=2048, st_uid=65534
2023-08-09 12:00:00 +00:00
Robert Hensing
bc9d2d6a7c
Merge pull request #247520 from Atemu/fix/kernel-passthru.tests
kernel: fix passthru.tests
2023-08-08 21:29:19 +02:00
Michele Guerini Rocco
ccc33bd3d7
Merge pull request #245852 from rnhmjoj/pr-fix-dnscrypt
dnscrypt-wrapper fixes
2023-08-08 10:34:27 +02:00
Franz Pletz
9640eb3970
Merge pull request #246029 from ehmry/eris-go 2023-08-08 06:18:03 +02:00
Franz Pletz
7fdf825d82
Merge pull request #247823 from emilylange/caddy 2023-08-08 05:57:37 +02:00
emilylange
efdcf6b96c
nixosTests.caddy: remove etag subtest
Caddy 2.7.x does no longer return etags for files with unix modtimes of
0 and 1.
Files in /nix/store have a modtime of 1.

This is something that has been specifically implemented for nix.

For now, we decided to remove the test.
But I might reimplement a similar etag subtest some time in the future.
2023-08-07 23:47:07 +02:00
Wout Mertens
ea07a9a98e
Merge pull request #247319 from DDoSolitary/patch-netdata-ipc
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
2023-08-07 08:27:29 +02:00
emilylange
02601e17a5
nixosTests.forgejo: fork from nixosTests.gitea 2023-08-06 18:41:37 +02:00
Atemu
a0dcabb690 kernel: fix passthru.tests
https://github.com/NixOS/nixpkgs/pull/191540 indirectly broke kernel
passthru.tests; calling the testsForLinuxPackages and testsForKernel functions
with some args intended for some other exposed test-internal function.

Organise the passed-through functions under `passthru` to prevent this from
happening.
2023-08-06 15:47:54 +02:00
Atemu
6229f0bc8f all-tests: exclude passthru attributes from test discovery
discoverTests tries to discover some sort of internal function and tries to call
it with the arguments for that internal function. This poses an issue when you
want to expose some other functions (i.e. a parameterisation for a test) in
nixosTests.

This commit allows a test to pass through arbitrary values via `.passthru`
without them having discovery applied to them; including functions.
2023-08-06 15:40:10 +02:00
Gregor Godbersen
540a20546a nixos/paperless: add test for plaintext document 2023-08-05 22:06:27 +02:00
DDoSolitary
060a47e1e4
netdata: set NETDATA_PIPENAME to /run/netdata/ipc
Netdata creates its control socket at /tmp/netdata-ipc by default, which
is insecure and actually inaccessible with systemd's PrivateTmp enabled.

Originally we patched its source code to move the socket to
/run/netdata/ipc. However, it was removed due to incompatibility when
upgrading to v1.41.0: 1d2a2dc7d0

Fortunately, this new version of netdata adds support for setting the
location of the control socket via the environment variable
NETDATA_PIPENAME. So let's set it for the netdata service and the
command line utility so that they can communicate properly.
2023-08-05 18:19:08 +08:00
Martin Weinelt
3d36620b0e
Merge pull request #247109 from helsinki-systems/fix/networking-test
nixos/tests/networking: dhcpd -> kea
2023-08-04 16:48:45 +02:00
ajs124
1690adc424 nixos/tests/networking/caseSensitiveRenaming: fix bash syntax
was introduced broken in 93502aa3b1
2023-08-04 14:38:08 +02:00
ajs124
799a69971e nixos/tests/networking: dhcpd -> kea
forgotten in 413d9d3864
2023-08-04 14:23:09 +02:00
ajs124
bf4d2e6c1e
Merge pull request #242538 from tnias/fix/apparmor
apparmor: add some policies and improve abstractions and utils
2023-08-04 13:05:52 +02:00
codec
47db2bfffb prometheus-idrac-exporter: init at unstable-2023-06-29 2023-08-04 00:57:19 +02:00
Bobby Rong
58a421640c
Merge pull request #246743 from bobby285271/fix/wait-for-x
nixos/tests/{budgie,gnome-flashback}: unbreak
2023-08-03 10:37:45 +08:00
Bobby Rong
0c3697f511
nixos/tests/gnome-flashback: skip graphical-session.target check
https://hydra.nixos.org/build/230009507/log

Also silence warning: Module argument `nodes.machine.config` is deprecated. Use `nodes.machine` instead.
2023-08-03 09:52:12 +08:00
Bobby Rong
0ec48ee059
nixos/tests/budgie: skip graphical-session.target check
https://hydra.nixos.org/build/230010129/log
2023-08-03 09:52:11 +08:00
Martin Weinelt
a98ba7fdae
Merge pull request #246564 from erictapen/kanidm
kanidm: 1.1.0-alpha.12 -> 1.1.0-beta.13
2023-08-02 22:51:18 +02:00
r-vdp
127e2ed645
nixos/update-users-groups: add nixos test for the expires option 2023-08-02 13:51:06 +02:00
Nick Cao
c1e1fe0068
Merge pull request #246533 from wineee/terminal-emulators
deepin-terminal: enable nixosTests.terminal-emulators
2023-08-01 18:27:28 -06:00
Nick Cao
33b6f8b63d
Merge pull request #246493 from NickCao/singbox
sing-box: 1.3.4 -> 1.3.5
2023-08-01 18:22:25 -06:00
Maximilian Bosch
1b623f27b0
Merge pull request #245357 from onny/nextcloud-fix-test
nixos/tests/nextcloud: Fix tests, fix broken webdav url
2023-08-01 18:14:13 +02:00
Martin Weinelt
184d15cc06
kanidm: 1.1.0-alpha.12 -> 1.1.0-beta.13
https://github.com/kanidm/kanidm/releases/tag/v1.1.0-beta.13

The kanidmd process now creates a unix socket, over which admin tasks
can be done, without having to shut kanidm down first.

The kanidm_unixd process now wants access to /etc/shadow and /etc/group,
so it can rule out collisions with the host system.
2023-08-01 17:13:58 +02:00
Minijackson
de8086be4f
nixos/tests/netbox-upgrade: init
Test that the upgrade from NetBox 3.3 to NetBox 3.5 runs fine
2023-08-01 14:45:01 +02:00
h7x4
fd01b3f59c nixos/atuin: fix database.createLocally behaviour
Co-authored-by: Andrew Marshall <andrew@johnandrewmarshall.com>
2023-08-01 18:17:37 +08:00
Anderson Torres
871bf7c875 nixos/tests/systemd-initrd-networkd-ssh.nix: remove overuses of with 2023-08-01 10:12:12 +00:00
Anderson Torres
2dd9923c8a nixos/tests/sftpgo.nix: remove overuses of with 2023-08-01 10:12:12 +00:00
Anderson Torres
c5ffb694d9 nixos/tests/osquery.nix: remove overuses of with 2023-08-01 10:12:12 +00:00
Anderson Torres
62f6f01085 nixos/tests/initrd-network-ssh/default.nix: remove overuses of with 2023-08-01 10:12:12 +00:00
Anderson Torres
c532a4f227 nixos/tests/deepin.nix: remove overuses of with 2023-08-01 10:12:12 +00:00
Anderson Torres
eb03402e28 nixos/tests/buildkite-agents.nix: remove overuses of with 2023-08-01 10:12:12 +00:00