Commit Graph

43324 Commits

Author SHA1 Message Date
Franz Pletz
83cd05ff59
Merge pull request #335976 from poscat0x04/nixos-networkd-ipv6ra 2024-08-25 01:51:36 +02:00
Franz Pletz
a266f38ade
Merge pull request #336584 from mweinelt/engelsystem-cache-migration 2024-08-25 01:50:39 +02:00
Franz Pletz
76d7ccecdf
Merge pull request #313105 from bb2020/xserver 2024-08-25 01:47:27 +02:00
Franz Pletz
39c0d9f53d
Merge pull request #336896 from tomodachi94/enhance/nixos/clamav/systemd-slices 2024-08-25 01:45:27 +02:00
Franz Pletz
35b2bfb7ed
Merge pull request #335967 from CajuM/waydroid-svc-stop 2024-08-25 01:40:42 +02:00
Franz Pletz
3969d739d8
Merge pull request #336995 from Ma27/gitea-drop-pam 2024-08-25 01:25:13 +02:00
Franz Pletz
89b019abe9
Merge pull request #337083 from zimward/doc-ssh 2024-08-25 01:15:35 +02:00
OPNA2608
1758314043 nixos/lomiri: Add docviewer app 2024-08-24 23:27:52 +02:00
OPNA2608
531655d3bf tests/lomiri-docviewer-app: init 2024-08-24 23:27:52 +02:00
Felix Buehler
0c91ea6ec1 nixos/services.mailman: remove with lib; 2024-08-24 23:20:06 +02:00
zimward
81a9bf5861
doc: remove mention of key type 2024-08-24 21:59:22 +02:00
Jared Baur
05aefd6f05
nixos/systemd-boot: remove semicolon 2024-08-24 12:50:26 -07:00
Jared Baur
6327b07b25
nixos/systemd-boot: use unique path for devicetree blob
Use the store directory for the devicetree package containing the
desired DTB when installing to the ESP. This allows for more than one
NixOS generation containing differing DTBs to coexist on the same ESP
(similar to how we can have multiple kernels & initrds). This change
removes the assumption that the filepath passed to `copy_from_file` is a
file that lives at the toplevel of a nix output path (which prior to the
systemd-boot DTB support was the case for the kernel and initrd
derivations).
2024-08-24 12:50:24 -07:00
Jörg Thalheim
7211a81060 sysuser: slightly better assertions message 2024-08-24 19:20:28 +02:00
Mihai-Drosi Câju
05313fc5b3 nixos/waydroid: Update service definition according to upstream
* Upstream switched the service's Type to dbus in 1.4.0
* Enable D-Bus activation
* Fixes #334687
2024-08-24 19:48:20 +03:00
Bobby Rong
8e75a28e4e
nixos/pantheon: Increase memorySize
https://logs.ofborg.org/?key=nixos/nixpkgs.336934&attempt_id=24f89861-72eb-417f-94bf-93cea578a1f1
2024-08-24 22:34:55 +08:00
Adam C. Stephens
bd29cb4b30
Merge pull request #336836 from oddlama/feat-update-kanidm-provision
kanidm-provision: 1.1.1 -> 1.1.2
2024-08-24 08:58:35 -04:00
Alyssa Ross
148261d04b
sd-image: optimise sfdisk call for image building
When building an image, rather than operating on a real partition,
there's no need to have sfdisk tell the kernel to reread the partition
table.  This also avoids a call to sync(2), which could be very
expensive depending on what other IO is going on on the system at the time.
2024-08-24 14:36:07 +02:00
Maximilian Bosch
b39569222b
gitea: drop PAM support
Strongly inspired by the forgejo counterpart[1], for the following
reasons:

* The feature is broken with the current module and crashes on
  authentication with the following stacktrace (with a PAM service
  `gitea` added):

      server # Stack trace of thread 1008:
      server # #0  0x00007f3116917dfb __nptl_setxid (libc.so.6 + 0x8ddfb)
      server # #1  0x00007f3116980ae6 setuid (libc.so.6 + 0xf6ae6)
      server # #2  0x00007f30cc80f420 _unix_run_helper_binary (pam_unix.so + 0x5420)
      server # #3  0x00007f30cc8108c9 _unix_verify_password (pam_unix.so + 0x68c9)
      server # #4  0x00007f30cc80e1b5 pam_sm_authenticate (pam_unix.so + 0x41b5)
      server # #5  0x00007f3116a84e5b _pam_dispatch (libpam.so.0 + 0x3e5b)
      server # #6  0x00007f3116a846a3 pam_authenticate (libpam.so.0 + 0x36a3)
      server # #7  0x00000000029b1e7a n/a (.gitea-wrapped + 0x25b1e7a)
      server # #8  0x000000000047c7e4 n/a (.gitea-wrapped + 0x7c7e4)
      server # ELF object binary architecture: AMD x86-64
      server #
      server # [   42.420827] gitea[897]: pam_unix(gitea:auth): unix_chkpwd abnormal exit: 159
      server # [   42.423142] gitea[897]: pam_unix(gitea:auth): authentication failure; logname= uid=998 euid=998 tty= ruser= rhost=  user=snenskek

  It only worked after turning off multiple sandbox settings and adding
  `shadow` as supplementary group to `gitea.service`.

  I'm not willing to maintain additional multiple sandbox settings for
  different features, especially given that it was probably not used for
  quite a long time:

  * There was no PR or bugreport about sandboxing issues related to
    PAM.

  * Ever since the module exists, it used the user `gitea`, i.e. it had
    never read-access to `/etc/shadow`.

* Upstream has it disabled by default[2].

If somebody really needs it, it can still be brought back by an overlay
updating `tags` accordingly and modifying the systemd service config.

[1] 07641a91c9
[2] https://docs.gitea.com/usage/authentication#pam-pluggable-authentication-module
2024-08-24 13:40:58 +02:00
Cosima Neidahl
eb76459e90
Merge pull request #334952 from OPNA2608/fix/ayatana-lomiri-indicator-marking
nixos/ayatana-indicators: Split ayatana and lomiri indicators
2024-08-24 11:12:00 +02:00
Bobby Rong
b3784b8153
treewide: Fix switchboard executable name 2024-08-24 14:31:20 +08:00
Bobby Rong
96b1f3bd99
Merge pull request #336790 from bobby285271/upd/pantheon
Pantheon updates 2024-08-23
2024-08-24 11:52:42 +08:00
Gabriella Gonzalez
0b6fa5ee40
virtualisation.oci-containers: Add new imageStream option (#335430)
This adds a new `imageStream` option that can be used in conjunction
with `pkgs.dockerTools.streamLayeredImage` so that the image archive
never needs to be materialized in the `/nix/store`.  This greatly
improves the disk utilization for systems that use container images
built using Nix because they only need to store image layers instead of
the full image.  Additionally, when deploying the new system and only
new layers need to be built/copied.
2024-08-24 04:38:27 +02:00
Tomodachi94
695b1c874d
nixos/clamav: add system-clamav.slice
Tracking: https://github.com/NixOS/nixpkgs/issues/279915
2024-08-23 17:09:11 -07:00
Jan Tojnar
b8f3c78021
Merge pull request #333917 from jtojnar/gnome-top-level
gnome: Move more packages to top-level
2024-08-24 01:43:31 +02:00
Peder Bergebakken Sundt
d38f701636
Merge pull request #334559 from litchipi/ifm_fixup
ifm-web: init at 4.0.2
2024-08-24 01:07:30 +02:00
laalsaas
9e5316a1c5 nixos/varnish: change default stateDir to /run
The stateDir, or as varnish calls it, the workdir should always be a
tmpfs. Otherwise, performance issues may occur. See:

- https://varnish-cache.org/docs/trunk/reference/varnishd.html#opt-n

- https://github.com/varnishcache/varnish-cache/issues/4121
2024-08-23 21:45:43 +02:00
Donovan Glover
d3353b074b
Merge pull request #336286 from oluceps/update-dae
dae: 0.7.0 -> 0.7.1
2024-08-23 19:35:53 +00:00
oddlama
aa6cbcbf09
nixos/kanidm: run nixfmt-rfc-style 2024-08-23 20:55:03 +02:00
oddlama
391d05ce95
nixos/kanidm: update provisioning to allow multiple origin urls 2024-08-23 20:46:53 +02:00
Bobby Rong
dfc226bfb1
nixos/pantheon: Enable switcheroo support
317ae5e482
2024-08-23 22:10:26 +08:00
Bobby Rong
43f8c88e9c
nixos/pantheon: Ship elementary-bluetooth-daemon by default
This is extracted from wingpanel-indicator-bluetooth.
2024-08-23 21:34:44 +08:00
Florian Klink
25f5471de6
Merge pull request #333205 from flokli/buildkite-agent-3.77.0
buildkite-agent: 3.76.2 -> 3.77.0
2024-08-23 14:04:52 +03:00
Sarah Brofeldt
f372ec38b1
Merge pull request #334417 from r-ryantm/auto-update/kubernetes
kubernetes: 1.30.2 -> 1.31.0
2024-08-23 12:24:08 +02:00
Jörg Thalheim
33b5aab88f nixosTest.nix-upgrade: try to garbage collect with old nix 2024-08-23 11:06:48 +02:00
Jörg Thalheim
d01abc5602 nixosTest.nix-upgrade: actually use nix-daemon for build
root by-passes nix-daemon
2024-08-23 11:06:48 +02:00
Tom Bereknyei
c4dffb6513 nixosTest.nix-upgrade: init
Test out both nix upgrade-nix and a NixOS upgrade.

Inject a fake fallback-paths.nix assuming a stable -> latest upgrade.

The NixOS upgrade does not use nixos-rebuild switch due to the
cost+annoyance of the instantiation needing
system.includeBuildDependencies.
2024-08-23 11:06:47 +02:00
Bjørn Forsman
1edbc4fa0d nixos/ups: change upsmon option type from str to enum
According to `man upsd.users`, the option is 'either set to "primary" or
"secondary"'.
2024-08-22 21:25:47 +02:00
Someone Serge
f72b7b56fb tests/nvidia-container-toolkit: mv shared config to defaults 2024-08-22 17:51:54 +00:00
Martin Weinelt
760b2b5562
nixos/engelsystem: refactor option setup 2024-08-22 19:50:17 +02:00
Someone Serge
d970b4d6cd tests/nvidia-container-toolkit: hardware.opengl -> graphics 2024-08-22 17:37:26 +00:00
Someone Serge
0780a3ebc8 tests/nvidia-container-toolkit: strip {no,one}-nvidia prefix as obvious from the context 2024-08-22 17:34:48 +00:00
Someone Serge
1e571aeab4 tests/nvidia-container-toolkit: less nesting 2024-08-22 17:25:49 +00:00
Martin Weinelt
fe0d323af5
nixos/engelsystem: prune template cache on version changes
After upgrading to 3.5.0 we noticed, that registering would redirect to
the login page and not work at all. At the same time the admin user was
unable to access its user settings.

This issue could be tracked back to the template cache, that must be
invalidated between release upgrades.
2024-08-22 19:16:28 +02:00
Someone Serge
1b7f2fe883 tests/nvidia-container-toolkit: more getExe 2024-08-22 17:09:56 +00:00
Someone
2d7db58c2f
Merge pull request #313225 from ereslibre/nvidia-consistent-casing
docs: fix Nvidia casing to be consistent across different places
2024-08-22 16:51:41 +00:00
Martin Weinelt
d9cf6ea6f8
Merge pull request #336445 from adamcstephens/kanidm/1.3.3
kanidm: 1.3.2 -> 1.3.3
2024-08-22 18:41:30 +02:00
Someone
4c930c0635
Merge pull request #331071 from ereslibre/fix-nvidia-container-toolkit-docker-contamination
Fix nvidia container toolkit docker contamination
2024-08-22 16:40:06 +00:00
Adam Stephens
b93f6e4acd
nixos/tests/kanidm: bind certs path to fix ofborg tests
provision # [    8.223448] (kanidmd)[819]: kanidm.service: Failed to set up mount namespacing: /ofborg/checkout/repo/38dca4e3aa6bca43ea96d2fcc04e8229/builder/ofborg-evaluator-1/nixos/tests/common/acme/server:
No such file or directory
2024-08-22 10:59:48 -04:00
Emily
a565cfeac3 antennas: drop 2024-08-22 15:51:27 +01:00
Emily
6fa5767e07 tvheadend: drop
Closes: #332259
2024-08-22 15:51:27 +01:00
Christina Sørensen
31321be124
kubernetes: 1.30.2 -> 1.31.0
Updates feature gate tests to feature gates introduces in 1.31, assuming
they'll be around for a while.
2024-08-22 16:26:38 +02:00
Emily
01a749e0bf
Merge pull request #336077 from emilazy/push-yoykzrxwpykp
pict-rs_0_3: drop
2024-08-22 14:58:04 +01:00
Sandro
180f9e2195
Merge pull request #334629 from OPNA2608/init/lomiri/lomiri-gallery-app 2024-08-22 15:44:21 +02:00
Sandro
18fb834638
Merge pull request #322730 from bbenno/update-wp-httpd-htaccess 2024-08-22 14:33:17 +02:00
Alexander Linder
06855f1cd8
nixos/mautrix-whatsapp: automatic appservice registration option, pull login_shared_secret_map setting from env file (#311681)
Co-authored-by: Sandro <sandro.jaeckel@gmail.com>
2024-08-22 14:14:51 +02:00
nikstur
e7b7271ffc
Merge pull request #336513 from nikstur/etc-overlay-fixes
etc.overlay fixes
2024-08-22 13:57:04 +02:00
nikstur
7845b89e24 nixos/etc: unmount old /etc hierarchy lazily
This should fix errors where /etc is reported to be busy and thus cannot
be unmounted.

Another solution we can consider if this doesn't work out as we expect
is to forcefully unmount /etc.
2024-08-22 12:17:20 +02:00
nikstur
d820fe987e nixos/etc: wantedBy -> requiredBy for mounting overlay etc
I've observed that sometimes the overlay mount unit does not get started
when using wantedBy. requiredBy makes this relationship stricter and if
necessary will restart the initrd-fs.target and thus ensure that when
this target is reached /etc has alredy been mounted. This is in line
with the description of initrd-fs.target in systemd.special:

> Thus, once this target is reached the /sysroot/ hierarchy is fully set up
2024-08-22 12:12:18 +02:00
Sandro
a45dc99ba3
Merge pull request #287565 from RatCornu/pingvin-share 2024-08-22 11:59:03 +02:00
nikstur
483c13b835
Merge pull request #335929 from jmbaur/erofs-utils-1.8
Re-upgrade erofs-utils to 1.8
2024-08-22 11:52:25 +02:00
nikstur
0b6c394f3a
Merge pull request #328513 from isabelroses/docs/perlless
nixos/perlless: correct documented warning
2024-08-22 11:50:08 +02:00
Sandro
b6890ecb57
Merge pull request #334549 from Yarny0/foomatic-db-update 2024-08-22 11:46:35 +02:00
oluceps
6c22d08406
nixos/test/dae: disable waiting network 2024-08-22 17:09:31 +08:00
Sandro
11b26f016e
Merge pull request #336141 from emilazy/push-uztymzmukyyk
opencv{2,3}: drop
2024-08-22 09:14:40 +02:00
José Romildo Malaquias
56b912ba3f
Merge pull request #336161 from ghpzin/nixosTests.enlightenment/mark-broken
nixos/tests/enlightenment: mark broken
2024-08-21 22:28:08 -03:00
Emily
afdee7e458 pict-rs_0_3: drop
This was broken by the Rust 1.80 upgrade, and is an old version that
we’d have to patch to keep working.

We have already done the 0.4 → 0.5 update without keeping around
the old version or adding in any additional `stateVersion` logic
in <https://github.com/NixOS/nixpkgs/pull/280221>. As a result,
migration for 0.3 users is going to be a little awkward. I’ve done
my best to provide comprehensive instructions for anyone who hasn’t
already bumped to 0.4.

It is probably a footgun to add `stateVersion` logic for any
package that makes backwards‐incompatible schema changes and only
supports migration from the immediately previous version. Users
won’t get migrated by default and we have to either package and
maintain an endlessly growing list of old versions or add complicated
instructions like this. It’s not really practical for us to support
a significantly better migration story than upstream does.
2024-08-22 01:54:09 +01:00
Philip Taron
c849780855
Merge pull request #336404 from Stunkymonkey/security-pam-remove-with-lib 2024-08-21 17:01:28 -07:00
Felix Buehler
e32ec19edf nixos/security.pam: remove with lib; 2024-08-22 00:19:00 +02:00
Emily
1a35d0ccb5 nixos/pict-rs: fix environment variable name
Thanks to @marius851000 for reporting this issue. I assume it probably
changed in 0.5 or something.
2024-08-21 23:09:55 +01:00
Yt
133fb94cd4
Merge pull request #328976 from marius851000/fix_lemmy_ui
lemmy-ui: fix execution
2024-08-21 21:52:11 +00:00
marius david
8f73423ca0 tests/lemmy: Fix Lemmy’s test 2024-08-21 22:13:35 +02:00
Felix Stupp
4b998d179f
nixos/systemd.network: add support for UseDomains= in [Network] sections
Those options were also added with systemd 256, but sadly were missed out in #307068.

These options are documented in:
- [systemd 256 changelog](https://github.com/systemd/systemd/releases/tag/v256) (search for `UseDomains=`)
- [networkd.conf(5)](https://www.freedesktop.org/software/systemd/man/256/networkd.conf.html#UseDomains=)
- [systemd.network(5)](https://www.freedesktop.org/software/systemd/man/256/systemd.network.html#UseDomains=)
2024-08-21 19:48:29 +00:00
isabel
750663add9
nixos/perlless: correct documented warning 2024-08-21 20:11:48 +01:00
OPNA2608
1b4795b3e2 tests/lomiri: Optimise further
- Split desktop into desktop-basics (basic keybind & app launching) and
  desktop-appinteractions (one applications triggering something in another) due to timeouts
- Wrap machine.wait_for_text to wait 10 seconds before starting

The 10 second delay improves runtime dramatically on weaker hardware. In desktop-ayatana-indicators
on my aarch64 laptop, runtime was cut down by 818,41 seconds (~ 14 minutes).
Hopefully helps abit with timeout issues on ARM :(
2024-08-21 21:09:49 +02:00
s1341
5c1ed3ad5a kasmweb: 1.12.0 -> 1.15.0 2024-08-21 15:06:02 +03:00
John Titor
93343775bd
nixos/uwsm: init
[UWSM](https://github.com/Vladimir-csp/uwsm) is a session manager that wraps a wayland
window compositor with useful systemd units like `graphical-session-pre.target`,
`graphical-session.target`, `xdg-desktop-autostart.target`.

This is useful for Wayland Compositors that do not start
these units on these own.

Example for Hyprland:
```nix
programs.hyprland.enable = true;
programs.uwsm.enable = true;
programs.uwsm.waylandCompositors = {
  hyprland = {
    compositorPrettyName = "Hyprland";
    compositorComment = "Hyprland compositor managed by UWSM";
    compositorBinPath = "/run/current-system/sw/bin/Hyprland";
  };
};
```

Co-authored-by: Kai Norman Clasen <k.clasen@protonmail.com>
2024-08-21 16:09:54 +05:30
r-vdp
6cac9e409c
wstunnel: reformat with nixfmt 2024-08-21 10:46:04 +02:00
poscat
712e039585
nixos/networkd: add IPv6SendRA options added in systemd 255 2024-08-21 15:59:33 +08:00
Jörg Thalheim
c43e67f69b
Merge pull request #335344 from Mic92/harmonia
nixos/harmonia: switch to non-deprecated SIGN_KEY_PATHS
2024-08-21 07:01:22 +02:00
Peder Bergebakken Sundt
d6da32fe45
Merge pull request #316208 from Sigmanificient/qtile-nixosvm-tests-add-extra-packages
nixos/tests/qtile: test extraPackages and qtile-extras
2024-08-20 23:02:22 +02:00
ghpzin
11a05813b6
nixos/tests/enlightenment: mark broken 2024-08-20 23:43:31 +03:00
Bjørn Forsman
dc7379e04f nixos/ups: restart upsdrv.service on config changes
Or else new configuration won't take effect until the next boot (or if
the user manually restarts the service).
2024-08-20 22:08:01 +02:00
Emily
87c5a230ec opencv{2,3}: drop 2024-08-20 20:16:13 +01:00
Emily
25bdc22ac8
Merge pull request #334495 from Sigmanificient/liboop
{liboop,lsh}: drop
2024-08-20 19:02:29 +01:00
damhiya
5a3fe0fa46 coqPackages.MenhirLib: init at 20240715 2024-08-20 14:58:36 +02:00
Sigmanificient
e959525e15 lsh: drop 2024-08-20 12:02:12 +02:00
Litchi Pi
ef03964b92 ifm-web: init at 4.0.2
Signed-off-by: Litchi Pi <litchi.pi@proton.me>
2024-08-20 10:42:02 +02:00
Sigmanificient
78b1309ad4 nixos/tests/qtile: test extraPackages and qtile-extras 2024-08-20 02:27:03 +02:00
Jared Baur
cd998f9de9
nixos/qemu-vm: suppress mkfs.erofs output
The mkfs.erofs utility has a lot of output by default that slows down
running tests. We don't need to capture any of the output from
mkfs.erofs, so we can suppress it.
2024-08-19 14:55:55 -07:00
Kerstin
f0ceb9f402
Merge pull request #335768 from erictapen/mastodon
nixos/mastodon: remove pin for postgresql version
2024-08-19 23:11:53 +02:00
Rafael Fernández López
d665ca4fb2 nvidia-container-toolkit: add initial set of tests to check closures 2024-08-19 19:40:28 +02:00
Rafael Fernández López
2b883410d4 nvidia-container-toolkit: only mount existing paths in the host 2024-08-19 19:34:34 +02:00
isabel
f3c2be2a80
nixos/wakapi: init module 2024-08-19 17:16:01 +01:00
Pol Dellaiera
8d18fe9184
Merge pull request #335151 from drupol/nixos/chromadb/init
nixos/chromadb: init
2024-08-19 17:29:57 +02:00
nicoo
2a5454490e
nixosTests.systemd-boot.memtest86: only run when memtest86plus is available (#335825)
The blocks the `nixos-unstable` channel due to an [evaluation error] for `aarch64-linux`.

[evaluation error]: https://gist.github.com/nbraud/8820dda48156922f998bba987eb229c6
2024-08-19 14:51:18 +00:00
Kerstin Humm
f5bb4b807c weblate: 5.6.2 -> 5.7
Changelog: https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.7

Also had to rework django-compressor settings and aligned them more
closely with the official docs:
https://cheat.readthedocs.io/en/latest/django/compressor.html
2024-08-19 16:10:40 +02:00
Florian Klink
cce9aef6fd
Merge pull request #334337 from eduarrrd/eaccess-null
nixos/systemd/initrd: Fix emergencyAccess to work with `null`.
2024-08-19 14:44:25 +03:00
nikstur
0a810476ad
Merge pull request #307528 from WilliButz/systemd-initrd/tmpfiles-settings
nixos/systemd-tmpfiles: add initrd support
2024-08-19 11:54:42 +02:00
Kerstin Humm
1592790b03
nixos/mastodon: use correct postgresql package 2024-08-19 11:06:57 +02:00
Kerstin Humm
14fbed4b70
nixos/mastodon: don't pin postgresql version for test 2024-08-19 11:06:57 +02:00
schnusch
d8c7f81279 nixos/cgit: test list settings type 2024-08-19 08:13:49 +02:00
euxane
1768115589 nixos/cgit: handle list setting type
The cgitrc file allows list of values to be set for some keys as
multiple definition lines.

This allows setting multiple "css" files to include or multiple
"readme" branch and file lookup paths to be set.
2024-08-19 08:13:49 +02:00
Will Fancher
f84991dc2b
Merge pull request #334288 from ElvishJerricco/systemd-initrd-fully-merge-sbin
Systemd initrd fully merge sbin
2024-08-18 22:41:53 -04:00
Gabriella Gonzalez
79e5dbb262 Restore check for container not defining nixpkgs.hostPlatform option 2024-08-18 17:00:16 -07:00
Gabriella Gonzalez
0600255046 Use host.pkgs.stdenv.hostPlatform 2024-08-18 16:49:57 -07:00
Gabriella Gonzalez
de83fcb2df containers.*.config: reuse host nixpkgs.pkgs if defined
The minimum reproduction for the problem I'm trying to solve is that
the following NixOS test with a trivial NixOS container:

```
{ inputs = {
    nixpkgs.url = "github:NixOS/nixpkgs/24.05";

    flake-utils.url = "github:numtide/flake-utils/v1.0.0";
  };

  outputs = { flake-utils, nixpkgs, self, ... }:
    flake-utils.lib.eachDefaultSystem (system: {
      checks.default = nixpkgs.legacyPackages."${system}".nixosTest {
        name = "test";

        nodes.machine.containers.tutorial.config = { };

        testScript = "";
      };
    });
}
```

… fails with the following error message:

```
error: Neither nodes.machine.nixpkgs.hostPlatform nor the legacy option nodes.machine.nixpkgs.system has been set.
You can set nodes.machine.nixpkgs.hostPlatform in hardware-configuration.nix by re-running
a recent version of nixos-generate-config.
The option nodes.machine.nixpkgs.system is still fully supported for NixOS 22.05 interoperability,
but will be deprecated in the future, so we recommend to set nodes.machine.nixpkgs.hostPlatform.
```

The root of the problem appears to be that in
`nixos/modules/virtualisation/nixos-containers.nix` there is support
for deriving the guest's `nixpkgs.hostPlatform` or
`nixpkgs.localSystem` from the corresponding host's values, but this
doesn't work if the host sets `nixpkgs.pkgs` instead of one of those
values.  In fact, this is what happens when using `pkgs.nixosTest`
(which sets `nixpkgs.pkgs` in
`pkgs/build-support/testers/default.nix`).

The solution I went with was to forward the `nixpkgs.pkgs` setting from
the host to the guest, but only if it is defined (matching the same
treatment as `nixpkgs.hostPlatform` and `nixpkgs.localSystem`.
2024-08-18 11:32:46 -07:00
Sandro
69701a3807
Merge pull request #320060 from PatrickDaG/homebox
homebox: init at 0.13.0; nixos/homebox: init
2024-08-18 16:32:43 +02:00
Sandro
c67dbda54f
Merge pull request #308700 from tie/pgbouncer-settings
nixos/pgbouncer: add services.pgbouncer.settings option
2024-08-18 16:30:17 +02:00
Masum Reza
94c30e543d
Merge pull request #335115 from SuperSandro2000/graphical-desktop
nixos/graphical-desktop: add enable option, nixos/wayland-session: use graphical-desktop option and remove implicit defaults
2024-08-18 17:20:55 +05:30
Masum Reza
3f08237ceb
Merge pull request #296607 from Yusuf-Duran/add-iio-hyprland
iio-hyprland: init at 0-unstable-2024-07-24; nixos/iio-hyprland: init module
2024-08-18 17:19:20 +05:30
Sandro
c2d5ecc504
nixos/displayManager: mention how to get a list of currently available desktop sessions (#335208) 2024-08-18 17:17:01 +05:30
Adam C. Stephens
526d11e357
Merge pull request #335366 from adamcstephens/incus/publish-squashfs
incus: publish squashfs image to hydra
2024-08-17 19:06:02 -04:00
Linus Karl
d2367c3f7e indi-full: refactor 3rdparty drivers
This splits the 3rdparty drivers into seperate
packages as recommended by upstream. This also
allows to build a indi-full equivalent with only
the needed drivers. Also add indi-full-nonfree
with all the nonfree drivers. And remove them
from indi-full.
2024-08-18 01:05:52 +02:00
Peder Bergebakken Sundt
e471916645
treewide: passthru nixos test (#334491) 2024-08-18 00:29:43 +02:00
Adam C. Stephens
062b5b645d
Merge pull request #335441 from emilylange/nixos-forgejo-pam
forgejo,forgejo-lts: remove PAM support
2024-08-17 17:15:34 -04:00
Sandro Jäckel
4f34325b2b
nixos/wayland-session: use graphical-desktop option and remove implicit defaults 2024-08-17 23:11:37 +02:00
Sandro Jäckel
57507a521a
nixos/graphical-desktop: add enable option 2024-08-17 23:11:37 +02:00
Yusuf
228660743a
nixos/iio-hyprland: init module 2024-08-18 01:18:23 +05:30
emilylange
07641a91c9
forgejo,forgejo-lts: remove PAM support
https://forgejo.org/docs/latest/user/authentication/#pam-pluggable-authentication-module

PAM support has to be enabled at compile time and upstream considers it
opt-in.

Official upstream binaries have it disabled.

We enabled it by default because we simply inherited most of it from
Gitea when the split in nixpkgs happened.

Reasons why it had been enabled in nixpkgs for Gitea are unknown.

See 9406f240a7.

There is reason to believe not a single Forgejo instance running on
NixOS uses this feature because it literally segfaults due to our
sandboxing.
2024-08-17 21:07:23 +02:00
Sigmanificient
422d853079 liboop: drop
fix

liboop: drop
2024-08-17 21:06:45 +02:00
Masum Reza
e6db763dde
Merge pull request #335398 from JohnRTitor/hypridle-service
nixos/hypridle: switch to package provided user service file
2024-08-17 23:11:27 +05:30
John Titor
077938f18b
nixos/hypridle: switch to package provided user service file
format with nixfmt-rfc-style
2024-08-17 20:51:36 +05:30
Adam Stephens
659308a8c1
nixos/incusContainer: create hydra build product 2024-08-17 09:01:17 -04:00
Adam Stephens
9277993de4
make-squashfs: add support for generating hydra build products
left default to write the image directly to the store, but enabling hydraBuildProduct
will create $out as a directory
2024-08-17 09:00:43 -04:00
Jörg Thalheim
aa994dd296 harmonia: switch to non-deprecated SIGN_KEY_PATHS 2024-08-17 13:11:06 +02:00
Jörg Thalheim
5d500e3d51
Merge pull request #335283 from Enzime/fix/regreet
regreet: fix theming options not under GTK header
2024-08-17 12:26:35 +02:00
Michael Hoang
3ffc982bfa regreet: don't allow settings to be a path 2024-08-17 14:32:49 +10:00
Michael Hoang
5ee778d424 regreet: fix theming options not under GTK header
Fixes #335082
2024-08-17 14:29:45 +10:00
Emily
00f9b25737
Merge pull request #325813 from SamLukeYes/xonsh
xonsh: fix wrapper, 0.17.0 -> 0.18.2
2024-08-16 22:53:01 +01:00
Morgan Jones
99714ac2fc
nixos/nebula: add missing with maintainers 2024-08-16 12:13:40 -07:00
Fabián Heredia Montiel
2c94341824
Merge pull request #328532 from LeSuisse/openstack-config-no-default-root-password
openstack-config: remove hardcoded default password for the root account
2024-08-16 12:30:12 -06:00
Pol Dellaiera
835b2f8822
nixos/chromadb: init 2024-08-16 18:23:12 +02:00
Rafael Fernández López
058e8f5ef1
nvidia-podman: remove nvidia wrapper
Since version 4.1.0, podman has support for CDI, and is the
recommended way to expose GPU's for containers for podman.

More information: https://web.archive.org/web/20240729183805/https://docs.nvidia.com/datacenter/cloud-native/container-toolkit/latest/install-guide.html#configuring-podman
2024-08-16 18:16:23 +02:00
abysssol
5f17f87a7f nixos/ollama: move loadModels script into a separate service
Due to the large size of models, the script can run for a long time,
which can cause timeouts, since the startup phase has a time limit.
2024-08-16 11:36:35 -04:00
Adam C. Stephens
c49d0387e0
Merge pull request #251598 from oddlama/feat-kanidm-provision
nixos/kanidm: add basic provisioning
2024-08-16 10:15:22 -04:00
Rafael Fernández López
f7b4d57421
virtualisation/docker: fix nvidia wrapper
Although CDI should be used in order to not require container runtime
wrappers anymore, fix the nvidia-container-runtime integration with
Docker for cases when Docker < 25.
2024-08-16 15:49:35 +02:00
K900
0d331a43ff
Merge pull request #335066 from K900/pipewire-limits
nixos/pipewire: install the default limits config, make group always exist
2024-08-16 16:38:20 +03:00
Franz Pletz
4bd91be1ad
Merge pull request #333462 from Luflosi/nixos-iperf3-package-option 2024-08-16 14:46:53 +02:00
oddlama
558fa6abc6
nixos/kanidm: add provisioning of groups, persons and oauth2 systems 2024-08-16 14:12:35 +02:00
superherointj
d634a501b1
Merge pull request #334630 from rorosen/k3s-1.28.12
k3s_1_28: 1.28.11+k3s2 -> 1.28.12+k3s1
2024-08-16 08:06:15 -03:00
K900
333e6672e1 nixos/pipewire: install the default limits config, make group always exist 2024-08-16 12:00:08 +03:00
Jörg Thalheim
d9e8fc4b72
Merge pull request #323785 from Mic92/zerotier
nixos/zerotierone: clean up local.conf symlinks unconditionally
2024-08-16 09:35:35 +02:00
Robert Rose
d506595e43 nixos/k3s: use jq instead of JSONpath to process test data
Although kubectl has builtin JSONpath support, it is only supported
partially and the support varies between different versions. While using
JSONpath in tests worked for some versions, it failed for others. This
contribution replaces the problematic JSONpath usages with the jq JSON
processor.
2024-08-16 08:37:15 +02:00
Peder Bergebakken Sundt
db16f389ab
Merge pull request #334508 from pbsds/fix-taskserver-1723599512
nixos/taskserver: fix test eval
2024-08-16 00:44:26 +02:00
OPNA2608
95461ff6c6 tests/ayatana-indicators: Finalise for differences in ayatana vs lomiri indicators 2024-08-15 22:10:56 +02:00
OPNA2608
712439f971 tests/ayatana-indicators: Prepare for differences in ayatana vs lomiri indicators 2024-08-15 22:10:25 +02:00
OPNA2608
cc01673c23 tests/ayatana-indicators: nixfmt, modernise 2024-08-15 22:06:15 +02:00
OPNA2608
4403f7f6c3 nixos/ayatana-indicators: Support new passthru.ayatana-indicators format 2024-08-15 20:52:04 +02:00
Jonathan Davies
a289e52ce1
apacheKafka: init 3.8.0 2024-08-15 17:28:12 +01:00