Commit graph

51134 commits

Author SHA1 Message Date
Will Fancher
26ccfb7a8c nixos/image/repart: Use own assertions / warnings.
It was easy to accidentally trigger infinite recursion if you depended
on `toplevel` in any way before. For instance, if you used
`CopyBlocks` with an image containing `toplevel`. This was because
`toplevel`'s assertion / warning logic has to be evaluated, but that
means evaluating `image.repart`'s assertions / warnings, which
requires evaluating the `repartConfig` attrsets to check for malformed
`Label`s. That causes the module system to type check *all*
`repartConfig` keys, even though most of them aren't used in the
assertions / warnings. So evaluating `system.build.image` evaluates
`repartConfig.CopyBlocks`, which evaluates `toplevel`, which evaluates
assertions / warnings, which evaluates `repartConfig.CopyBlocks` to
type check it. Infinite loop.

Even ignoring this recursion problem, it's still better for the repart
module to have its own assertions / warnings options. You don't have
to use `toplevel` in a repart image, so its assertions / warnings
would have been ignored in that case anyway. This way they're *always*
checked when you build an image.
2025-05-14 01:24:43 -04:00
Will Fancher
4b0d1225f5 lib/asserts: Factor out NixOS's toplevel assertion / warning logic. 2025-05-14 01:21:10 -04:00
Jonas Heinrich
002ebbc4de
oncall: init at 2.1.7; nixos/oncall: init (#388723) 2025-05-13 23:21:54 +02:00
Robert Hensing
4e4fd664d5
nixos/activation: Fix shellcheck test failure (#406500) 2025-05-13 21:34:42 +02:00
jade
0784176a58
darwin.linux-builder: split create-builder script (#406533) 2025-05-13 11:38:51 -07:00
nixpkgs-ci[bot]
9948288aca
Merge master into staging-next 2025-05-13 18:05:27 +00:00
Leona Maroni
53bd700506
release-notes: init for 25.11 (#406777) 2025-05-13 17:54:42 +02:00
Leona Maroni
95cc97659c
release-notes: init for 25.11 2025-05-13 17:50:11 +02:00
OPNA2608
41c8686f60 nixosTests.lomiri-docviewer-app: Fix OCR 2025-05-13 17:49:00 +02:00
OPNA2608
22c53f29b2 nixosTests.lomiri-system-settings: Fix OCR 2025-05-13 17:39:46 +02:00
Arne Keller
2264d87679
cato-client: init at 5.2.1.1, nixos/cato-client: init (#339533) 2025-05-13 17:36:06 +02:00
linsui
bff193eaba readeck: 0.17.1 -> 0.18.2 2025-05-13 23:32:38 +08:00
OPNA2608
ad3c2cb9d1 nixosTests.lomiri-clock-app: Fix OCR 2025-05-13 17:14:50 +02:00
Jörg Thalheim
5adbb5f72a
darling: drop (#405727) 2025-05-13 16:35:40 +02:00
Someone
a59b0f1dfd
nvidia-container-toolkit: minor fixups (#405919) 2025-05-13 13:51:43 +00:00
OPNA2608
6ffec69d67 nixosTests.teleports: Fix OCR 2025-05-13 15:28:43 +02:00
OPNA2608
7de0cd47d7 nixosTests.lomiri-music-app: Fix OCR 2025-05-13 15:28:36 +02:00
OPNA2608
e0c6c758a7 nixosTests.lomiri-mediaplayer-app: Fix OCR 2025-05-13 15:28:31 +02:00
OPNA2608
391862e72c nixosTests.lomiri-gallery-app: Fix OCR 2025-05-13 15:28:21 +02:00
OPNA2608
5e6c4ed8ae nixosTests.lomiri-camera-app: Fix OCR 2025-05-13 15:28:13 +02:00
OPNA2608
0e88d93814 nixosTests.lomiri-calendar-app: Fix OCR 2025-05-13 15:28:06 +02:00
Sandro Jäckel
314cfdddb5
nixos/librenms: seed database in module, not only in test
To properly use librenms and create a user, you need the seeded roles
like admin.
2025-05-13 14:24:27 +02:00
Paul Haerle
d1a07176d3
oxidized: switch to tmpfiles (#402646) 2025-05-13 14:21:16 +02:00
nixpkgs-ci[bot]
f13b927ceb
Merge master into staging-next 2025-05-13 12:07:00 +00:00
Maximilian Bosch
0be521cb0e
Merge: nixos/nextcloud: use LoadCredential to read services.nextcloud.secretFile (#405970) 2025-05-13 13:45:36 +02:00
Pol Dellaiera
38f4c9b583
nixos/doc: Fix required disk size for installing in a VirtualBox guest (#406149) 2025-05-13 10:28:35 +00:00
Jacek Galowicz
cd79d4189d
nixos/test-driver: exit early if /dev/vhost-vsock isn't available (#406455) 2025-05-13 11:59:34 +02:00
Maximilian Bosch
c6978e8a58
nixos/test-driver: exit early if /dev/vhost-vsock isn't available
Right now it wrongly seems as if you can set
`sshBackdoor.enable = true;` for each test and not only for debugging
purposes.

This is wrong however since you'd need to pass /dev/vhost-vsock into the
sandbox for this (which is also a prerequisite for #392117).

To make that clear, two things were changed:

* add a warning to the manual to communicate this.
* exit both interactive and non-interactive driver early if
  /dev/vhost-vsock is missing and the ssh backdoor is enabled.

  If that's the case, we pass a CLI flag to the driver already in the
  interactive case. This change also sets the flag for the
  non-interactive case.

  That way we also get a better error if somebody tries to enable this
  on a system that doesn't support that.
2025-05-13 11:14:13 +02:00
nixpkgs-ci[bot]
d665ddf4a8
Merge master into staging-next 2025-05-13 06:05:56 +00:00
Martin Weinelt
5cea3235bd
nixos/frigate: create model cache dir (#405416) 2025-05-13 04:36:43 +02:00
nixpkgs-ci[bot]
86051b5e95
Merge master into staging-next 2025-05-13 00:16:56 +00:00
Martin Weinelt
8fc7c1593d
nixos/music-assistant: wait for network-online.target
This is required because the server fails to start when it cannot find
a route to send out mDNS packets.
2025-05-13 00:55:12 +02:00
Rebecca Turner
2263f723c1
darwin.linux-builder: split create-builder script
The current workflow for starting the `linux-builder` on macOS is to run
`nix run nixpkgs#darwin.linux-builder`, which adds keys to the store and
then starts the builder.

Adding the keys requires user input (due to `sudo`) but the actual
builder should just stay running in the background somewhere.

I'd like to automate this process, but it's currently rather complex:
the first part of the script needs user input for `sudo`, and then
there's no signal when the process has finished starting up. The user
will need to see stdout/stderr during the first part, which makes it
challenging to capture it for the second part to determine when startup
has finished.

To fix this, I've split the `create-builder` script into an `add-keys`
script (interactive) and a `run-builder` script (background). These new
scripts are exposed in the `passthru` attributes for external users. The
`create-builder` script is now a simple call of `add-keys` and then
`run-builder`.

See: https://nixos.org/manual/nixpkgs/unstable/#sec-darwin-builder
2025-05-12 12:18:33 -07:00
Christoph Heiss
0a8bcd4699
nvidia-container-toolkit: add myself as maintainer
Signed-off-by: Christoph Heiss <christoph@c8h4.io>
2025-05-12 20:41:31 +02:00
nixpkgs-ci[bot]
3578961ffe
Merge master into staging-next 2025-05-12 18:06:01 +00:00
Arian van Putten
fb4135b611
image/repart: repart.imageFile(BaseName) -> image.baseName, image.extension (#401872) 2025-05-12 19:03:54 +02:00
Berk D. Demir
e4bf5ce70d nixos/activation: Fix shellcheck test failure
lib/test.nix relies on `fileset.toSource` which creates a source dir
with the files of interest. `testers.shellcheck` passes all the files in
the source dir to shellcheck. The issue is related to relative path
sourcing, i.e. `source ./lib.sh` where shellcheck cannot make any
assumptions about the working directory.

Options were:
1) Disable this warning with a directive
   Prior disabling in the tree:
    - pkgs/tools/nix/info/info.sh
    - nixos/modules/testing/test-instrumentation.nix

2) Set source-path to SCRIPTDIR with a directive
   https://github.com/koalaman/shellcheck/wiki/Directive#source-path

   Even though we don't enable external script following for shellcheck
   with `-x` flag given every file in the source dir is passed, this
   directive seems to capture the intent to help shellcheck a bit
   better.

Went with option 2.
2025-05-12 09:58:28 -07:00
Sandro
19bbee4694
nixos/networkd-dispatcher: use writeShellScript to ease use (#370347) 2025-05-12 18:09:18 +02:00
Sandro
95afdf2b49
nixos/gancio: properly quote
Co-authored-by: Wroclaw <wroclaw223@outlook.com>
2025-05-12 17:55:46 +02:00
Maciej Krüger
2812ff41ee
netdata: 2.4.0 -> 2.5.1 (#404786) 2025-05-12 17:31:40 +02:00
Sandro
49d1eedf46
nixos/postsrsd: expose socketPath via module option (#406386) 2025-05-12 15:17:13 +02:00
nixpkgs-ci[bot]
c5997abf8e
Merge master into staging-next 2025-05-12 12:07:01 +00:00
K900
5b99c79903
nixos/udev: verify udev rules with udevadm (#406284) 2025-05-12 12:35:34 +03:00
Vladimír Čunát
de872c968f
tests/playwright-python: fix text to look for (#405196) 2025-05-12 10:47:31 +02:00
Oliver Schmidt
5a316930c8 doc: merge Amnezia VPN-related release note entries 2025-05-12 10:34:06 +02:00
Oliver Schmidt
047a804449 nixos/postsrsd: expose socketPath via module option
Services utilising postsrsd need to connect to it via a Unix socket.
While the path to that socket is static as of now, the discoverability
of that path suffers from the lack of module documentation and a
scattered definition of the individual path components over at least
three lines, even when reading the module source.

By exposing the socket path as a readOnly NixOS option, that value shows
up in the options overview and can be re-used in other parts of NixOS
config.
2025-05-12 09:51:17 +02:00
Oliver Schmidt
eebaa71e11 doc: add release about for AmneziaWG support
add release notes for #341663. Especially noteworthy is the minor
backwards incompatibility introduced there.
2025-05-12 09:29:59 +02:00
Wolfgang Walther
9d78475ae9
nixos/pgbackrest: prevent storing secrets in store
While we're not (fully) supporting the related features, yet, we already
prevent accidental storage of secrets in the store. This will also avoid
breaking changes in the future, when those features are properly
supported.
2025-05-12 09:14:39 +02:00
Wolfgang Walther
82e519947f
nixos/pgbackrest: add SFTP support 2025-05-12 09:14:38 +02:00
Wolfgang Walther
d5ddb6116f
nixos/pgbackrest: init module 2025-05-12 09:14:37 +02:00