1
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-06-21 00:49:27 +03:00
Commit graph

1662 commits

Author SHA1 Message Date
Vincent Haupert
e8df83d417 nixos/tests/github-runner: init 2023-02-26 15:39:19 +01:00
Jan Tojnar
9bb986284f Merge branch 'staging-next' into staging
# Conflicts:
#	pkgs/development/python-modules/mdp/default.nix
#	pkgs/top-level/python-aliases.nix
2023-02-26 01:13:37 +01:00
IndeedNotJames
1b304e1dbc
forgejo: use existing nixos/tests/gitea as test
forgejo is a soft-fork of gitea and gitea's existing tests work great
with forgejo.
At least for now, as this could change, though somewhat unlikely.
2023-02-24 02:59:30 +01:00
IndeedNotJames
7d05a6a910
nixos/tests/gitea: make gitea package configurable
This allows the same tests to be used for forgejo, a soft-fork of
gitea, which currently does not have any tests.
2023-02-24 02:59:30 +01:00
github-actions[bot]
fc3641aa1e
Merge staging-next into staging 2023-02-21 00:03:04 +00:00
Will Fancher
bb7cd63150
Merge pull request #215381 from lilyinstarlight/fix/make-initrd-ng-wrapped-executables
make-initrd-ng: support wrapped executables
2023-02-20 14:11:48 -05:00
Florian Klink
d7c89bf807
Merge pull request #217254 from hesiod/nixos-test-systemd-credentials-master
nixos/tests/systemd-credentials-tpm2: Add tests for systemd credentials
2023-02-20 20:04:26 +01:00
Tobias Markus
e83babd493 nixos/tests/systemd-credentials-tpm2: Add tests for systemd credentials
Add a test that checks whether systemd can access the TPM in order
access credentials requested via Load/SetCredentialEncrypted.
2023-02-20 13:54:49 +01:00
github-actions[bot]
0a547ad8b7
Merge staging-next into staging 2023-02-20 12:02:08 +00:00
Yureka
ced929a2d0
nixos/tests: add test for luksroot and initrd keymaps (#189725) 2023-02-20 08:19:02 +01:00
Florian Klink
ab566b8656
Merge pull request #208269 from ElvishJerricco/systemd-stage-1-fsck
Systemd stage 1 fsck
2023-02-17 10:06:39 +02:00
talyz
9e9007e45f
nixos/opensearch: Use DynamicUser and StateDirectory by default
...but still allow for setting `dataDir` to a custom path. This gets
rid of the use of the deprecated option PermissionsStartOnly. Also, add
the ability to customize user and group, since that could be useful
with a custom `dataDir`.
2023-02-15 16:38:24 +00:00
Soner Sayakci
4561785dfc
nixos/tests/opensearch: init 2023-02-14 20:00:27 +00:00
Eric Wolf
9dc7a05a85 cargo-pgx/timescaledb_toolkit: add nixos test 2023-02-13 10:58:26 +01:00
Arian van Putten
5b23d0e51c
Merge pull request #214396 from nikstur/systemd-repart
systemd-repart
2023-02-10 20:03:09 +01:00
nikstur
4700198654 nixos/systemd-repart: init 2023-02-10 14:05:44 +01:00
Robert Hensing
1991c40759
Merge pull request #194345 from codedownio/binary-cache
Introduce mkBinaryCache function
2023-02-09 15:25:16 +01:00
Nick Cao
6fa2bfdf4d
Merge pull request #215110 from gador/pgadmin-use-pstgresqltesthook
pgadmin4-desktopmode: init at 6.19, pgadmin4: simplify tests
2023-02-09 16:05:44 +08:00
Florian Brandes
a380674d85
pgadmin4: add option to enable desktop mode
By default, pgadmin4 uses SERVER_MODE = True. This requires
access to system directories (e.g. /var/lib/pgadmin). There is
no easy way to change this mode during runtime. One has to change
or add config files withing pgadmin's directory structure to change it
or add a system-wide config file under `/etc/pgadmin`[1].

This isn't always easy to achive or may not be possible at all. For
those usecases this implements a switch in the pgadmin4 derivation and
adds a new top-level package `pgadmin4-desktopmode`. This builds in
DESKTOP MODE and allows the usage of pgadmin4 without the nixOS module
and without access to system-wide directories.

pgadmin4 module saves the configuration to /etc/pgadmin/config_system.py
pgadmin4-desktopmode tries to read that as well. This normally fails with
a PermissionError, as the config file is owned by the user of the pgadmin module.

With the check-system-config-dir.patch this will just throw a warning
but will continue and not read the file.

If we run pgadmin4-desktopmode as root
(something one really shouldn't do), it can read the config file and fail,
because of the wrong config for desktopmode.

[1]https://www.pgadmin.org/docs/pgadmin4/latest/config_py.html

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-02-09 08:19:05 +01:00
Florian Brandes
e4488f5efe pgadmin4: move package tests back into the package
We test pgadmin in nixosTests, because it needs a running postgresql instance.
This is now unnecessary since we can do so in the package itself.

This reduces the complexity of pgadmin and removes the need for the extra
nixosTests.

Also setting SERVER_MODE in `pkg/pip/setup_pip.py` does not have any effect
on the final package, so we remove it.
In NixOS, we use the module, which expects SERVER_MODE to be true (which it defaults to).
In non-NixOS installations, we will need the directory /var/lib/pgadmin and /var/log/pgadmin

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-02-09 08:06:52 +01:00
Lily Foster
9b31147be9
nixos/tests/systemd-initrd-vconsole: init new test for console.earlySetup 2023-02-08 15:24:10 -05:00
Will Fancher
14b77582da systemd-stage-1: fsck 2023-02-08 00:43:10 -05:00
Tom McLaughlin
d1a2a16a3a Introduce mkBinaryCache function 2023-02-07 16:16:07 -08:00
Jacek Galowicz
7f88d9c34c
Merge pull request #214910 from rnhmjoj/pr-gnupg-test
nixos/tests/gnupg: init
2023-02-07 09:17:06 +01:00
rnhmjoj
fe34d10e57
nixos/tests/gnupg: init 2023-02-07 08:47:14 +01:00
Anderson Torres
f7e045e149
Merge pull request #209192 from lucasew/cockpit
cockpit: init at 284
2023-02-06 16:02:27 -03:00
Soner Sayakci
56ecab709a
nixos/coder: init module 2023-02-06 13:15:00 +01:00
Doron Behar
42b3a6354f
Merge pull request #206559 from doronbehar/pkg/musescore
musescore: 3.6.2 -> 4.0.1
2023-02-05 12:00:06 +02:00
Anderson Torres
bc0944c06f
Merge pull request #214193 from jnsgruk/add-multipass-pkg
multipass: init at 1.11.0
2023-02-04 09:03:54 -03:00
Doron Behar
3917d02350 musescore: Enable test only on x86_64-linux 2023-02-04 12:16:53 +02:00
Jon Seager
978259361b
nixos/tests/multipass: init 2023-02-04 07:44:04 +00:00
Nick Cao
3ab1fd296f
Merge pull request #212199 from OPNA2608/init/miriway
miriway: init at unstable-2022-12-18
2023-02-04 09:50:17 +08:00
OPNA2608
7ef7d9e268 nixos/miriway: add test 2023-02-04 02:23:14 +01:00
lucasew
1ef7b45ffb nixos/cockpit: add nixos test
Signed-off-by: lucasew <lucas59356@gmail.com>
2023-02-02 14:47:46 -03:00
Nick Cao
338657be21
Merge pull request #210190 from NickCao/zram-generator
zram-generator: init at 1.1.2
2023-02-02 11:04:46 +08:00
Gregor Kleen
b355be2d91 chrony: add nixos test for ptp_kvm 2023-01-31 10:08:32 -06:00
Henri Menke
0cfc7e63a6
nixos/zram-generator: add test 2023-01-31 20:18:18 +08:00
schnusch
218c7795a6 nixos/cgit: init 2023-01-31 12:06:12 +01:00
Michele Guerini Rocco
72c6c848ee
Merge pull request #212685 from rnhmjoj/pr-connman
nixos/wireless: fix failure on missing config file
2023-01-30 13:32:58 +01:00
rnhmjoj
fc211deccf
nixos/tests/connman: init 2023-01-30 07:48:51 +01:00
Florian Brandes
5b3ce4f78f octoprint: add nixosTests
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
Co-authored-by: Nick Cao <nickcao@nichi.co>
2023-01-29 05:40:28 +01:00
Sandro
17631ae82d
Merge pull request #208712 from mattmelling/cloudlog
cloudlog: init at 2.3
2023-01-24 02:52:36 +01:00
Matt Melling
c281dd3e05
nixos/cloudlog: init 2023-01-23 22:41:07 +00:00
Peter Waller
678eed323f nixos/grub: Name initrd-secrets by system, not by initrd
Previously, secrets were named according to the initrd they were
associated with. This created a problem: If secrets were changed whilst
the initrd remained the same, there were two versions of the secrets
with one initrd. The result was that only one version of the secrets would
by recorded into the /boot partition and get used. AFAICT this would
only be the oldest version of the secrets for the given initrd version.

This manifests as #114594, which I found frustrating while trying to use
initrd secrets for the first time. While developing the secrets I found
I could not get new versions of the secrets to take effect.
Additionally, it's a nasty issue to run into if you had cause to change
the initrd secrets for credential rotation, etc, if you change them and
discover you cannot, or alternatively that you can't roll back as you
would expect.

Additional changes in this patch.

* Add a regression test that switching to another grub configuration
  with the alternate secrets works. This test relies on the fact that it
  is not changing the initrd. I have checked that the test fails if I
  undo my change.

* Persist the useBootLoader disk state, similarly to other boot state.
  * I had to do this, otherwise I could not find a route to testing the
    alternate boot configuration. I did attempt a few different ways of
    testing this, including directly running install-grub.pl, but what
    I've settled on is most like what a user would do and avoids
    depending on lots of internal details.
  * Making tests that test the boot are a bit tricky (see hibernate.nix
    and installer.nix for inspiration), I found that in addition to
    having to copy quite a bit of code I still couldn't get things to
    work as desired since the bootloader state was being clobbered.

My change to persist the useBootLoader state could break things,
conceptually. I need some help here discovering if that is the case,
possibly by letting this run through a staging CI if there is one.

Fix #114594.

cc potential reviewers:

@lopsided98 (original implementer) @joachifm (original reviewer),
@wkennington (numerous fixes to grub-install.pl), @lheckemann (wrote
original secrets test).
2023-01-21 17:19:26 +00:00
Florian Klink
24b4189619
Merge pull request #207468 from schnusch/systemd-user-tmpfiles-rules
nixos: systemd: add systemd.user.tmpfiles.rules, systemd.user.tmpfiles.users.<name>.rules
2023-01-17 14:39:44 +01:00
schnusch
34ad8447c3 nixos: systemd: add systemd.user.tmpfiles 2023-01-17 12:19:40 +01:00
oxalica
eecb6c2bd8 nixos/tests/swap-file-btrfs: init 2023-01-17 06:56:55 +08:00
Nick Cao
a90e324332
Merge pull request #210785 from fgaz/mindustry/nixos-test
nixosTests.mindustry: init; mindustry: use SRI hashes
2023-01-16 16:21:06 +08:00
Ryan Lahfa
e2ac17f781
Merge pull request #207466 from Patryk27/fix/174065
nixos: add --specialisation to nixos-rebuild
2023-01-15 18:52:09 +01:00
Patryk Wychowaniec
2c55eba8f4
nixos: add --specialisation to nixos-rebuild
This commit fixes a papercut in nixos-rebuild where people wanting to
switch to a specialisation (or test one) were forced to manually figure
out the specialisation's path and run its activation script - since now,
there's a dedicated option to do just that.

This is a backwards-compatible change which doesn't affect the existing
behavior, which - to be fair - might still be considered sus by some
people, the painful scenario here being:

- you boot into specialisation `foo`,
- you run `nixos-rebuild switch`,
- whoops, you're no longer at specialisation `foo`, but you're rather
  brought back to the base system.

(it's especially painful for cases where specialisation is used to load
extra drivers, e.g. Nvidia, since then launching `nixos-rebuild switch`,
while forgetting that you're inside a specialisation, can cause some
parts of your system to get accidentally unloaded.)

I've tried to mitigate that by improving specialisations so that they
create a dedicated file somewhere in `/run/current-system` containing
the specialisation's name (which `nixos-rebuild` could then use as the
default value for `--specialisation`), but I haven't been able to come
up with anything working (plus it would be a breaking change then).

Closes https://github.com/NixOS/nixpkgs/issues/174065
2023-01-15 18:16:49 +01:00