0
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-07-13 21:50:33 +03:00
Commit graph

11071 commits

Author SHA1 Message Date
Aleksana
2318789c41
midori: drop (#408869) 2025-05-21 20:15:30 +08:00
r-vdp
6035e60b1c
brscan5: use udevCheckHook and fix permissions of udev rules file 2025-05-21 11:19:58 +02:00
Yt
3858071643
vector: 0.46.1 → 0.47.0 (#409169) 2025-05-20 18:48:37 -04:00
Ramses
a9746f1f33
brscan5: remove deprecated SYSFS udev rule (#332311) 2025-05-21 00:13:29 +02:00
Marius Kleidl
eb394bfc0a
tusd: embed version in binary (#409019)
* nixosTests.tusd: Fix network race condition

Fixes error:

    client # curl: (7) Failed to connect to server port 1080 after 8 ms: Could not connect to server
    client # [    5.621267] network-addresses-eth1-start[795]: adding address 192.168.1.1/24... done

* tusd: embed version in binary

Currently, tusd reports 'n/a' when its version is queried using `tusd -version`.
This change embeds the current version during the build process, so it correctly
reports the value.

See 8e66333a01/scripts/build_funcs.sh (L20)

---------

Co-authored-by: Niklas Hambüchen <mail@nh2.me>
2025-05-20 22:40:16 +02:00
Jonathan Davies
f243ea59d9
nixos/vector: Update dnstap test to start network service 2025-05-20 20:33:18 +00:00
Fabián Heredia Montiel
2cbe2498c7
Linux kernels 2025-05-19 (#408709) 2025-05-20 09:03:30 -06:00
Arian van Putten
4df0b7d8ca
nixos/systemd: unconditional systemd-journald-audit.socket (#408085) 2025-05-20 15:29:53 +02:00
Casey Link
23d344b9da nixos/davis: fix several outstanding bugs
As reported in #317303, this fixes:

- nginx config is now actually optional
- mail dsn options are now optional
- broken stdout logging has been replaced with default file logging in
  state dir

fixes #317303
2025-05-20 15:19:19 +02:00
Doron Behar
a4e8e74c36
i18n: Add charset related settings (#408307) 2025-05-20 15:17:19 +03:00
Jörg Thalheim
b6a5eebd30
k3s: use patched util-linuxMinimal (#407810) 2025-05-20 08:51:57 +02:00
Shogo Takata
d04bf86381
nixos.tests.pam-file-contents: fix build failure
This fixes the test for pam file contents.
The pam file started using fully-qualified paths in the following
commit.
7306423158
2025-05-20 15:14:55 +09:00
Alyssa Ross
28ea08fde9 linux/hardened/patches/6.14: init at v6.14.6-hardened1
Co-authored-by: Fabián Heredia Montiel <fabianhjr@protonmail.com>
2025-05-19 21:50:37 -06:00
Thomas Gerbet
f492075c53 midori: drop
Package is broken for a while and upstream project
seems to have been re-oriented to a Firefox fork.
See https://github.com/midori-browser/core/issues/468

Closes #374354
2025-05-19 23:21:07 +02:00
Jonas Heinrich
5f501619c0
nixos/tests/oncall: Fix LDAP mapping (#408503) 2025-05-19 18:29:03 +02:00
Doron Behar
cbbd59e14e nixosTests.i18n: init 2025-05-19 18:09:27 +03:00
K900
c87615a319 nixos/tests/installer: fix eval 2025-05-19 11:47:03 +03:00
Michele Guerini Rocco
eebd349fdd
nixos/pdns-recursor: deprecate settings, add yaml-settings (#406534) 2025-05-19 10:30:07 +02:00
K900
bf0aa25e4b nixos/tests/kanidm: pin to v1.6
These should really be made versioned, but this gets us _something_
quickly, at least.
2025-05-19 11:14:40 +03:00
Winter
f3db57edfa nixos/tests/installer: include x86_64-darwin in platforms for uefi tests
Also makes it so that we only set `meta.platforms` in cases where we need
to restrict it; otherwise, we go with the default.
2025-05-19 03:03:25 -04:00
Winter
2680e0beca nixos/tests: don't explicitly set meta.platforms
This prevents the tests from running on Darwin for no real reason.
2025-05-19 03:03:25 -04:00
Jonas Heinrich
8a9cd899ac nixos/tests/oncall: Fix LDAP mapping 2025-05-18 23:16:50 +02:00
benaryorg
e434130d0b
nixos/systemd: unconditional systemd-journald-audit.socket
Containers did not have *systemd-journald-audit.socket* in *additionalUpstreamSystemUnits*, which meant that the unit was not provided.
However the *wantedBy* was added without any additional check, therefore creating an empty unit with just the *WantedBy* on *boot.isContainer* machines.
This caused `systemd-analyze verify` to fail:

```text
systemd-journald-audit.socket: Unit has no Listen setting (ListenStream=, ListenDatagram=, ListenFIFO=, ...). Refusing.
systemd-journald-audit.socket: Cannot add dependency job, ignoring: Unit systemd-journald-audit.socket has a bad unit file setting.
systemd-journald-audit.socket: Cannot add dependency job, ignoring: Unit systemd-journald-audit.socket has a bad unit file setting.
```

The upstream unit already contains the following, which should make it safe to include regardless:

```ini
[Unit]
ConditionSecurity=audit
ConditionCapability=CAP_AUDIT_READ
```

For reference, this popped up in the context of #[360426](https://redirect.github.com/NixOS/nixpkgs/issues/360426) as well as #[407696](https://redirect.github.com/NixOS/nixpkgs/pull/407696).

Co-authored-by: Bruce Toll <4109762+tollb@users.noreply.github.com>
Signed-off-by: benaryorg <binary@benary.org>
2025-05-18 19:58:59 +00:00
Bruce Toll
22d51e08cf
nixos/tests/systemd-journal: Fix failing tests
Fix regression from https://github.com/NixOS/nixpkgs/pull/379629.
The systemd-journal test has been failing on hydra since 2025-02-10.
See, for instance: https://hydra.nixos.org/build/290855155.

This commit enables auditing, as expected by the tests. It also
addresses an issue where audit messages were getting dropped due to
rate limits.
2025-05-18 19:58:59 +00:00
Cosima Neidahl
3fc0629638
nixos/tests/common/x11.nix: Fix IceWM theme (#406765) 2025-05-18 19:08:43 +02:00
OPNA2608
f66c4ad65f nixos/tests/common/x11.nix: Fix IceWM theme 2025-05-18 10:58:52 +02:00
Atemu
593fa724e2
nixos/tests/vaultwarden: fix UI testing (#408026) 2025-05-17 20:50:26 +02:00
Atemu
daba7cfe73
nixosTests.curl-impersonate: skip failing test (#408000) 2025-05-17 20:39:27 +02:00
networkException
94e7e3f350
nixos/tests/vaultwarden: fix UI testing
This patch fixes a failure in the Selenium UI testing
script by waiting for an element to be clickable.
This allows the Angular to render properly.
2025-05-17 19:03:26 +02:00
Emily
507de69321
sourcehut.*: update (#404203) 2025-05-17 17:33:43 +02:00
emilylange
9266b72424
nixosTests.curl-impersonate: skip failing test
We use a NixOS VM test to execute the upstream tests of curl-impersonate
because they require networking which cannot be mocked easily in the
sandbox.

Of those upstream tests, test_http2_headers spawns nghttpd2, makes
request against it and then tries to parse the logs it emits.
The last step, the parsing of the logs, it extremely fragile and version
dependent. The version of nghttp2 that we carry in nixpkgs is newer than
the one curl-impersonate expects and happens to emit a different log
format.

So to fix the remaining test suite of curl-impersonate, we simply skip
test_http2_headers.
2025-05-17 16:38:55 +02:00
Martin Weinelt
f462e2564d
acme: Add csr option (#376334) 2025-05-17 11:24:08 +02:00
Morgan Jones
727809f534
nixos/k3s: get tests working again
Some of the attributes fetched throw, so tryEval them. Recurse into the
attribute set to pick up all the tests.
2025-05-16 21:34:22 -07:00
Aleksana
d56a9d0b9b
matrix-continuwuity: init at 0.5.0-rc.5; nixos/matrix-continuwuity: init (#400637) 2025-05-17 11:14:53 +08:00
Alois Wohlschlager
9685bc5a05 lixPackageSets.*.lix: test the correct Lix in passthru.tests
Previously always the top-level lix package would be used, which is obviously
not what we want.
2025-05-16 17:55:05 +02:00
Lucas Savva
eeaa42f670
nixos/tests/acme: Add CSR test 2025-05-16 13:09:03 +02:00
lassulus
84049bd248
nixos/syncthing: define and handle encryptionPassword option (#383442) 2025-05-15 19:44:22 +02:00
Jenny
26c6a14a9a
nixos/librenms: seed database in module, not only in test (#406546) 2025-05-15 19:17:41 +02:00
Maximilian Bosch
26126c75df
Merge: Use cacert in Nextcloud (#406252) 2025-05-15 18:50:53 +02:00
Maximilian Bosch
e9f70c9462
nixos/nextcloud: verify that Nextcloud is using the system-wide CA
Nextcloud manages the CA bundle on its own by default, but we patch this
out and replace it with the system-wide bundle.

Since this was originally designed for the objectstore feature, this
test ensures that an S3 behind a reverse proxy with TLS and its own CA
works fine.
2025-05-15 18:19:58 +02:00
Rémi NICOLE
859e55c0e0
NetBox: 4.2.7 -> 4.2.9 + cleanup (#401110) 2025-05-15 11:33:11 +00:00
Leona Maroni
2c3bb1389e
varnish76: drop
will be EOL within 25.05 support window
2025-05-15 09:56:55 +02:00
Matt Christ
ff62fe4136 brscan5: remove deprecated SYSFS udev rule
This patch resolves an issue where systemd-udevd outputs events like:

/nix/store/jm9paymkapbi6pzwbjgmi634vaf2y5va-udev-rules/49-brother-mfp-brscan5-1.0.2-2.rules:17 Invalid key 'SYSFS'.
2025-05-14 18:00:59 -05:00
Yohann Boniface
090d4dfb3a
libxmlb: fix installedTest (#405623) 2025-05-14 23:43:20 +02:00
OPNA2608
66301f51a3 nixosTests.lomiri-filemanager-app: Fix OCR 2025-05-14 23:38:38 +02:00
Cosima Neidahl
527595ee43
nixosTests.{lomiri-*,teleports}: Fix OCR (#406759) 2025-05-14 22:12:56 +02:00
Bobby Rong
3f2e482b29
nixosTests.vscodium: Relax OCR tests again
As long as *some text* displays on the screen everything is fine.

https://hydra.nixos.org/build/297031399/nixlog/9
2025-05-14 20:43:03 +08:00
Minijackson
e152cef13d
nixos/tests/netbox-upgrade: don't require NIXPKGS_ALLOW_INSECURE
Before this change, this NetBox test required NIXPKGS_ALLOW_INSECURE=1,
because of its use of the end-of-line NetBox version.
This meant that the GitHub CI failed to evaluate the tests,
and so didn't run them.
2025-05-14 09:45:09 +02:00
Minijackson
7c727f9f73
nixos/tests/netbox-upgrade: test the 4.1 -> 4.2 upgrade 2025-05-14 09:45:06 +02:00
Jonas Heinrich
002ebbc4de
oncall: init at 2.1.7; nixos/oncall: init (#388723) 2025-05-13 23:21:54 +02:00