Commit Graph

27254 Commits

Author SHA1 Message Date
Maximilian Bosch
8e42949a24
nixos/nixos-generate-config: use networking.useDHCP by default
Currently we're still using scripted networking by default. A problem
with scripted networking is that having `useDHCP` on potentially
non-existing interfaces (e.g. an ethernet interface for USB tethering)
can cause the boot to hang.

Closes #107908
2022-04-30 00:30:47 +02:00
Maximilian Bosch
cff16bc625
nixos/doc: add release-note entry for networking.useDHCP change 2022-04-30 00:30:45 +02:00
Maximilian Bosch
9c18662612
nixos/networkd: allow RouteMetric for IPv6AcceptRA
According to `systemd.network(5)` of systemd v249 this is a valid
option.

Fixes evaluation of the wildcard network definitions.
2022-04-30 00:30:04 +02:00
Maximilian Bosch
b08a06859c
nixos/tests/networking/dhcpDefault: actually use networkd for client 2022-04-30 00:30:04 +02:00
Maximilian Bosch
aa849e1478
nixos/network-interfaces-systemd: actually set catchall-iface if useDHCP = true;
Previously this wasn't done in the `forEach`-expression for
`cfg.interfaces` and thus `networking.useDHCP` didn't have any effect if
no further interface was statically configured.
2022-04-30 00:30:03 +02:00
Maximilian Bosch
161dd27ee1
nixos/tests/networking: test connectivity from both client & router 2022-04-30 00:30:02 +02:00
Linus Heckemann
ba4a615da9
nixos/tests/networking: add test for global useDHCP 2022-04-30 00:30:02 +02:00
Linus Heckemann
d30dbf38b9
nixos/networkd: reimplement useDHCP in a sensible way 2022-04-30 00:30:01 +02:00
Graham Christensen
f00109472a
Merge pull request #164185 from alexshpilkin/calibration
facetimehd: support sensor calibration files
2022-04-29 15:53:30 -04:00
Guillaume Girol
3ff4432670
Merge pull request #170393 from lostnet/couch322
couchdb3: 3.2.1 -> 3.2.2
2022-04-29 19:40:40 +00:00
Sandro
fdc0d007bd
Merge pull request #168804 from jansol/pipewire
pipewire: 0.3.49 -> 0.3.51
2022-04-29 17:08:13 +02:00
github-actions[bot]
8fcc2694d6
Merge master into staging-next 2022-04-29 12:01:18 +00:00
happysalada
a4707b645f grafana-mimir: add initial module 2022-04-29 07:23:03 -04:00
Michele Guerini Rocco
1ad6cada37
Merge pull request #170746 from rnhmjoj/pr-custom-ca
nixos/tests/custom-ca: split
2022-04-29 11:30:41 +02:00
github-actions[bot]
2254d18031
Merge master into staging-next 2022-04-29 06:01:11 +00:00
Jan Solanti
2b71de4a3d pipewire: 0.3.49 -> 0.3.50 2022-04-29 04:29:12 +03:00
Will Fancher
2e96b64e02
Merge pull request #170123 from ElvishJerricco/systemd-shutdown-ramfs-fixup
Systemd shutdown ramfs fixup
2022-04-28 20:17:23 -04:00
Will Fancher
50925651bb zfs: Sync pools on shutdown. 2022-04-28 14:12:16 -04:00
Will Fancher
69d8047516 nixos: Fix up systemd shutdown ramfs 2022-04-28 14:12:14 -04:00
Vladimír Čunát
8caa1418f6
Merge branch 'master' into staging-next-2022-04-23 2022-04-28 18:04:16 +02:00
Florian Brandes
709cc7066b
pgadmin4: pass pythonEnv as variable
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2022-04-28 15:03:31 +02:00
github-actions[bot]
5891152d70
Merge master into staging-next 2022-04-28 12:05:39 +00:00
Artem Leshchev
4d7bc6ccc0 nixos/nvidia: fix /dev/nvidia-uvm-tools device minor 2022-04-28 13:55:53 +03:00
Artem Leshchev
73261bdc59 nixos/nvidia: make nvidia-frontend device major constant
It is assigned by https://www.kernel.org/doc/Documentation/admin-guide/devices.txt
and never changes, so we can skip grep.
2022-04-28 13:55:53 +03:00
Robert Hensing
527457cadc
Merge pull request #156163 from erdnaxe/galene_hardening
nixos/galene: systemd unit hardening
2022-04-28 10:52:00 +02:00
Julien Mourer
55f1c83f5b
hardware: set enableRedistributableFirmware if enableAllFirmware is set (#163014)
If it works with enableRedistributableFirmware, which is a subset of enableAllFirmware, it should also work with enableAllFirmware.
2022-04-28 10:30:04 +02:00
github-actions[bot]
2d5d5db400
Merge master into staging-next 2022-04-28 06:01:45 +00:00
Bobby Rong
f4f969a484
Merge pull request #170360 from bobby285271/pantheon
Pantheon 7 updates 2022-04-25
2022-04-28 12:44:12 +08:00
Artem Leshchev
b01be47c87 nixos/nvidia: fix /dev/nvidia* devices minors
We can't assume that DRI card minor is the same as NVidia GPU device minor,
because some DRI minors could be taken by GPUs of other vendors.

Fixes #87788, #98942.
2022-04-28 01:18:58 +03:00
Vladimír Čunát
51554cbbdb
Merge branch 'master' into staging-next-2022-04-23 2022-04-27 22:50:17 +02:00
rnhmjoj
3d4b962c67
nixos/tests/custom-ca: make more reliable
Midori sometime fails to display the page, even if it's
supposedly fully loaded. Reloading with ctrl-r fixes it.
2022-04-27 20:50:53 +02:00
Scott Worley
3f676b9804
nixos/tests/custom-ca: Split
Run each browser check as a separate NixOS test.

This fixes a problem in which one browser starts up before the previous
browser is finished exiting, exhausting a resource and causing a
spurious test failure.

As a bonus, splitting the test
  * Gives more signal about exactly what's broken in the pass/fail status,
  * Makes it easier to quickly diagnose test failures,
  * Makes development iteration faster,
  * Allows concurrent test execution, which makes the test finish sooner
    when parallel builds are enabled.
  * Would allow each browser's test to be included in its nixpkgs
    passthru.tests, if desired (not done in this commit).

Reviewed-by: rnhmjoj <rnhmjoj@inventati.org>
2022-04-27 20:50:53 +02:00
github-actions[bot]
565df1946d
Merge master into staging-next 2022-04-27 18:01:19 +00:00
Pascal Bach
ee385d8364
Merge pull request #170396 from teto/gitlab-description
services.gitlab-runner: support runner description
2022-04-27 19:30:26 +02:00
Florian Brandes
eef222b8c2 pgadmin4: fix tests
this commit passes the build dependencies to the
pgadmin nixos test for package and regression testing.

Also added changelog and some clarifying comments.

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2022-04-27 19:15:08 +02:00
Florian Brandes
eff62ac196 pgadmin4: make regression test use the same packages
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2022-04-27 19:15:08 +02:00
Sandro
54b1753b2a
Merge pull request #170505 from romildo/upd.enlightenment
nixos/enlightenment: enable libinput
2022-04-27 18:06:40 +02:00
Florian Klink
9b71167ac0
Merge pull request #87268 from adisbladis/nixos-containers-state-directories
nixos-container: Use new configuration & state directories
2022-04-27 15:35:58 +02:00
Artturi
fce438aa02
Merge pull request #170462 from Artturin/hpssali 2022-04-27 16:24:16 +03:00
Sandro
bf0457694b
Merge pull request #169144 from romildo/upd.lxqt
lxqt: 1.0.0 -> 1.1.0
2022-04-27 14:54:54 +02:00
github-actions[bot]
6013ebcc30
Merge master into staging-next 2022-04-27 12:02:07 +00:00
Arnout Engelen
2b85441bb0
Merge pull request #146241 from rgrunbla/wpa_supplicant-fix-writable
wpa_supplicant: prevent writing non-writable configuration
2022-04-27 11:35:49 +02:00
adisbladis
3c49151f15 nixos/nixos-containers: Add warning on unsupported state version combo 2022-04-27 18:35:46 +12:00
adisbladis
01e35db278 release-notes: Add release note about nixos containers directory moves 2022-04-27 18:35:18 +12:00
adisbladis
f535d6f45e nixos-container: Use new configuration & state directories
We need to move NixOS containers somewhere else so these don't clash
with Podman, Skopeo & other container software in the libpod &
cri-o/cri-u/libcontainer ecosystems.

The state directory move is not strictly a requirement but is good for
consistency.
2022-04-27 18:35:08 +12:00
github-actions[bot]
2ac5c4af82
Merge master into staging-next 2022-04-27 06:01:04 +00:00
Bernardo Meurer
80d4480778
sd-image-aarch64: deduplicate cm4 section 2022-04-26 20:23:50 -07:00
Bobby Rong
782683d551
nixos/pantheon: fix outdated wording in docs 2022-04-27 10:18:16 +08:00
Bernardo Meurer
11c1152e0f
sd-image-aarch64: add dtbs for rpi-400 and cm4s 2022-04-26 19:05:24 -07:00
Bernardo Meurer
b30105b7c2
ubootRaspberryCM4_64bit: merge with ubootRaspberryPi4_64bit 2022-04-26 19:05:23 -07:00
github-actions[bot]
8261a7aaba
Merge master into staging-next 2022-04-27 00:02:17 +00:00
Bernardo Meurer
dcfaae6679
nixos/modules/profiles/all-hardware: add nvme to initrd modules 2022-04-26 15:22:37 -07:00
Bernardo Meurer
faf42ffbd0
ubootRaspberryCM4_64bit: init 2022-04-26 15:22:25 -07:00
Bernardo Meurer
d1fef1e7c3
sd-image-aarch64: add support for the RaspberryPi CM4 2022-04-26 15:22:24 -07:00
Arnout Engelen
b779b46dd2
lxd: fix nixos tests on aarch64
Tested on a RPi3 B+ with a 2g swapfile. On that system the test
still sometimes fails, but I suspect this is because it is really
just not powerful enough for this task.

Fixes #170395
2022-04-26 23:20:10 +02:00
José Romildo
0679095c10 nixos/enlightenment: enable libinput 2022-04-26 18:17:46 -03:00
José Romildo
22b2c47866 nixos/mate: enable libinput 2022-04-26 18:08:47 -03:00
Janne Heß
69d1acda00
nixos/xfs: Fix evaluation (#170471) 2022-04-26 21:43:01 +02:00
Artturin
99b1b47f39 nixos/hpsa: add alternative url for hpssacli 2022-04-26 21:39:04 +03:00
Jan Tojnar
6b738bce80 nixos/nscd: Fix lib.literalExample deprecation
The NixOS evaluation would complain:

trace: warning: literalExample is deprecated, use literalExpression instead, or use literalDocBook for a non-Nix description.
2022-04-26 14:06:52 +02:00
Xiami
b43999bea0
nixos/zookeeper: Remove .passthru as suggested 2022-04-26 18:44:37 +08:00
Xiami
3e5e584c1f
nixos/zookeeper: Update doc with suggested description 2022-04-26 18:32:32 +08:00
Matthieu Coudron
c1e318d0c5 services.gitlab-runner: support runner description
The description for the runner in the UI is by default sthg like
"npm_nixos_d0544ed48909" i.e., the name of the attribute.

I wanted to have a more user-friendly description and added a
description to the service.
Seems like gitlab-runner doesn't like having both fields set:
"Cannot use two forms of the same flag: description name"
so I used one or the other.
2022-04-26 11:43:46 +02:00
Will
14fca0ca6f couchdb3: 3.2.1 -> 3.2.2 2022-04-26 09:02:36 +00:00
github-actions[bot]
f8c265f433
Merge master into staging-next 2022-04-26 06:01:08 +00:00
Rick van Schijndel
4586388f85
Merge pull request #170320 from andersk/negated-version
treewide: Simplify negated uses of versionAtLeast, versionOlder
2022-04-26 07:50:15 +02:00
github-actions[bot]
4a997ba4a6
Merge master into staging-next 2022-04-26 00:02:23 +00:00
Bernardo Meurer
e8e87beee7
Merge pull request #169047 from helsinki-systems/feat/systemd-stage-1-filesystems
nixos/systemd-stage-1: Fixup most filesystem tasks
2022-04-25 15:02:29 -07:00
Bernardo Meurer
59aa6e4988
Merge pull request #170099 from helsinki-systems/feat/systemd-stage-1-no-random-seed
nixos/systemd-stage-1: Get rid of random-seed
2022-04-25 14:56:45 -07:00
Bernardo Meurer
9f26ab61e5
Merge pull request #170134 from helsinki-systems/feat/systemd-stage-1-also-storepaths
nixos/stage-1-systemd: Also accept packages as store paths
2022-04-25 14:53:24 -07:00
Anders Kaseorg
6920d8ca42 treewide: Simplify negated uses of versionAtLeast, versionOlder
Signed-off-by: Anders Kaseorg <andersk@mit.edu>
2022-04-25 13:35:24 -07:00
github-actions[bot]
1fe6b64349
Merge master into staging-next 2022-04-25 18:01:12 +00:00
Robert Hensing
ecc66a886e
Merge pull request #168945 from Lassulus/kexec-tests
nixosTests.kexec: better test if we are in a new system
2022-04-25 17:17:32 +02:00
David Anderson
c9a1647ade nixos/tailscale: use systemctl restart during activation.
This avoids the scenario where you activate a new config over Tailscale,
and a long delay between the "stop services" and "start services" phases
of the activation script lead to your terminal freezing for tens of
seconds, until tailscaled finally gets started again and the session
recovers.

Per the documentation of stopIfChanged, this is only safe to do if the
service definition is robust to stopping the old process using the new
service definition. As the maintainer of the upstream systemd unit, I
can confirm that Tailscale is robust to this scenario: it has to be
in order to work right on several other distros that just do
unpack-then-restart, rather than the more complex stop-unpack-start
dance.

Signed-off-by: David Anderson <dave@natulte.net>
2022-04-24 23:31:35 -07:00
github-actions[bot]
b258091866
Merge master into staging-next 2022-04-25 06:01:18 +00:00
Vonfry
2474c8c89a
nixos/fcitx5: add the setting of RIME_DATA_DIR and options for rime-data 2022-04-25 13:39:19 +08:00
Sandro
93da45162d
Merge pull request #166321 from wentasah/usbrelay 2022-04-25 02:23:19 +02:00
github-actions[bot]
6a14b5834e
Merge master into staging-next 2022-04-25 00:02:35 +00:00
Janne Heß
45494fab68
nixos/systemd-stage-1: Get rid of random-seed
This is not used at all since the unit has
ConditionPathExists=!/etc/initrd-release
2022-04-24 21:59:59 +01:00
Linus Heckemann
fc1248c589
Merge pull request #169932 from Ma27/nextcloud-profile-setting
nixos/nextcloud: make `profile.enabled` configurable
2022-04-24 22:50:05 +02:00
Janne Heß
acca3f4b81
nixos/plymouth: Add systemd stage 1 support 2022-04-24 21:47:49 +01:00
Janne Heß
dc4b2812e4
nixos/stage-1-systemd: Also accept packages as store paths 2022-04-24 21:47:34 +01:00
Jack O'Sullivan
568cb2d6ab nixos/systemd/nspawn: Add missing nspawn unit options
A few options have been added to the `systemd.nspawn` unit type are
missing from `systemd.nspawn.*.*Config`. See systemd.nspawn(5).
2022-04-24 21:20:59 +01:00
github-actions[bot]
6f66eac9d1
Merge master into staging-next 2022-04-24 18:01:04 +00:00
Janne Heß
acca69992c
nixos/btrfs: Add systemd stage 1 support 2022-04-24 16:32:54 +02:00
Janne Heß
160fb93fdc
nixos/filesystems: Make most simple filesystems compatible with systemd
This includes disabling some features in the initrd by default, this is
only done when the new initrd is used. Namely, ext and bcache are
disabled by default. bcache gets an own enable option while ext is
detected like any other filesystem.
2022-04-24 16:32:34 +02:00
Robin Gloster
0d8c3cf64b
Merge pull request #164650 from mayflower/jira-home
nixos/jira: set home for jira user
2022-04-24 14:27:33 +02:00
github-actions[bot]
b9e4b22843
Merge master into staging-next 2022-04-24 12:01:14 +00:00
Lassulus
007f9d8103
Merge pull request #164209 from jonringer/fix-step-ca-warnings
tests/step-ca: give name, fix acme usage
2022-04-24 11:22:59 +01:00
Lassulus
33dc00eaaf
Merge pull request #164208 from jonringer/fix-peertube-warnings
tests/peertube: update redis usage
2022-04-24 11:19:58 +01:00
Jacek Galowicz
2656cb99bd
Merge pull request #167838 from tljuniper/test-driver-pipefail-fix
nixos/test-driver: shellopts with execute + timeout
2022-04-24 11:50:13 +02:00
github-actions[bot]
696025ae9c
Merge master into staging-next 2022-04-24 00:02:26 +00:00
Linus Heckemann
c85bc19cdf
Merge pull request #169303 from emccorson/fix/add-copy-system-config
nixos/tools: add copySystemConfiguration to configuration file template
2022-04-24 00:01:00 +02:00
Vladimír Čunát
82ec893b68
Merge branch 'staging' into staging-next 2022-04-23 18:10:57 +02:00
Maximilian Bosch
9931c4a407
nixos/nextcloud: make profile.enabled configurable
I recently learned that Nextcloud 23's new profile feature — basically a
way for users to share personal contact details — has a problematic
default setting, profile data is shared with **everyone** by default.

This means that an unauthenticated user can access personal information
by accessing `nextcloud.tld/u/user.name`.

The announcement of v23 states[1]:

> We go a step further and introduce a profile page. Here you can put a
> description of yourself, show links to, for example, social media, what
> department you are in and information on how to contact you. All these
> are of course entirely optional and you can choose what is visible to who!
> The profile and user status are accessible also from our mobile and desktop clients.

It's not mentioned that by default you share personal information[3] with
everyone and personally I think that's somewhat problematic.

To work around that, I decided to add an option for the recently added[2]
and even set it to `false` by default to make an explicit opt-in for
that feature.

[1] https://nextcloud.com/blog/nextcloud-hub-2-brings-major-overhaul-introducing-nextcloud-office-p2p-backup-and-more/
[2] https://github.com/nextcloud/server/pull/31624/files
[3] By default, this affects the following properties:
    * About
    * Full name
    * Headline
    * Organisation
    * Profile picture
    * Role
    * Twitter
    * Website
    Phone, Address and Email are not affected and only shown to
    authenticated users by default.
2022-04-23 13:31:50 +02:00
Jonas Heinrich
24b53785cc nixos/create_ap: add module 2022-04-23 07:17:44 -04:00
github-actions[bot]
90d2d8da85
Merge staging-next into staging 2022-04-23 00:02:52 +00:00
Bernardo Meurer
900a440492
Merge pull request #169842 from K900/unbreak-tests
nixos/tests/installer: unbreak, optimize
2022-04-22 13:16:33 -07:00
Bernardo Meurer
b23ec41f14
Merge pull request #168554 from helsinki-systems/feat/systemd-stage-1-luks
nixos/systemd-stage-1: Add basic LUKS support
2022-04-22 12:37:25 -07:00
K900
adf3fe6811 nixos/tests/installer: disable vlans for initial VM
This saves 10-15 minutes of waiting for things to time out later.
2022-04-22 22:27:03 +03:00
K900
ed3cc9672a nixos/tests/installer: add missing dependency to image
Unbreaks nixosTests.installer.simple.
2022-04-22 21:03:46 +03:00
ajs124
1f9af33e1f
Merge pull request #166117 from chkno/fix-nar-serve
nixos/tests/nar-serve: Fix after nix version bump
2022-04-22 19:02:54 +01:00
github-actions[bot]
46f11e0147
Merge staging-next into staging 2022-04-22 00:02:43 +00:00
Jan Tojnar
be9e3fdf7d
Merge pull request #169553 from jtojnar/gnome-default-dark-background
nixos/gnome: Add the NixOS background metadata
2022-04-21 21:36:19 +02:00
Bernardo Meurer
b57126a16e
Merge pull request #169477 from drupol/nix/add-2.8.0
nixVersions.stable: 2.7.0 -> 2.8.0
2022-04-21 11:18:25 -07:00
Jan Tojnar
cd2a6cd9cb nixos/gnome: Add the NixOS background metadata
This is needed to have it listed in the Control Center.
2022-04-21 20:16:41 +02:00
github-actions[bot]
cbc56d5cc3
Merge staging-next into staging 2022-04-21 18:02:06 +00:00
Jan Tojnar
818ac0c9ae Revert "nixos/gnome3: install nixos wallpapers"
There is no need to install them when they will not be picked up
by the Appearance panel of GNOME Control Center without
a XML metadata file anyway.

They will be pulled into the closure via overrides
so that is not a concern either.

This reverts commit 7f3bc5b8fa.
This reverts commit fa607bc939.
2022-04-21 20:00:29 +02:00
Artturi
98ff3e401c
Merge pull request #165892 from tpwrules/fix-initrd-dirlinks
make-initrd: fix reproducibility problems
2022-04-21 20:51:35 +03:00
Pol Dellaiera
b555b64346
nixVersions.stable: 2.7.0 -> 2.8.0 2022-04-21 19:43:40 +02:00
Pascal Bach
d9309f43b3
Merge pull request #155424 from tobim/nixos/snapserver-firewall
nixos/snapserver: don't open ports by default
2022-04-21 19:40:20 +02:00
github-actions[bot]
91a1bc431e
Merge staging-next into staging 2022-04-21 12:01:54 +00:00
Sandro
7a89f668fa
Merge pull request #168012 from schmittlauch/pulseaudio-advanced-bluetooth-codecs 2022-04-21 13:12:46 +02:00
Anna Gillert
dbc95f15b8 nixos/test-driver: Avoid shell injection in machine.execute() 2022-04-21 10:54:00 +02:00
tljuniper
ed945aeb6e nixos/manual: Clarify execute exit status
Co-authored-by: Robert Hensing <roberth@users.noreply.github.com>
2022-04-21 10:54:00 +02:00
Anna Gillert
f7e89a59da nixos/test-driver: fix missing shellopts in execute
Without this fix, setting the shellopts in `machine.execute` is
inconsitent.  When no timeout is used, shellopts `set -euo pipefail` are
applied to the command as expected. When a timeout is specified, the
shellopts are not applied to the command itself (which is called inside
a `sh -c` that doesn't inherit the shellopts) but rather to the
`timeout` command, leading to the following full command:

```bash
(set -euo pipefail; timeout 900 sh -c 'cmd') | (base64 --wrap 0; echo)\n
```

With this fix, this is the command we get:

```bash
timeout 900 sh -c 'set -euo pipefail; false | true') | (base64 --wrap 0; echo)\n
```
2022-04-21 10:54:00 +02:00
Anna Gillert
7586158ac9 nixos/manual: Refine doc for execute et al
- Clarify that shellopts are set in every `execute` call (rather than
  only `succeed`).
- Add documentation for the `timeout` parameter and its default values.
2022-04-21 10:54:00 +02:00
Jörg Thalheim
aa446f8d3c
Merge pull request #169437 from Mic92/consul
nixos/consul: allow ipv6-only
2022-04-21 07:22:02 +01:00
Sandro
786f0c486b
Merge pull request #159103 from pacien/nixos-taskserver-firewall-no-port-open
nixos/taskserver: do not open firewall port implicitly, port helper to Python 3
2022-04-21 01:56:36 +02:00
Randy Eckenrode
272876edae
ionide.ionide-fsharp: 5.11.0 -> 6.0.1 (#168874)
* ionide.ionide-fsharp: 5.11.0 -> 6.0.0

* doc/release-notes: document .NET 6 requirement for Ionide

* ionide: 6.0.0 -> 6.0.1
2022-04-21 01:54:39 +02:00
Trolli Schmittlauch
3bf08a7731 doc/release-notes: highlight pulseaudio upgrade with new bluetooth codecs 2022-04-21 00:10:29 +02:00
Tobias Mayer
0d49836dec
nixos/snapserver: don't open ports by default 2022-04-20 23:25:28 +02:00
Lassulus
b424ce3fd2
Merge pull request #161587 from helsinki-systems/feat/bird2-reload-trigger
nixos/bird: reloadIfChanged -> reloadTriggers
2022-04-20 18:24:05 +01:00
Jörg Thalheim
325a525467
nixos/consul: allow ipv6-only 2022-04-20 17:32:06 +02:00
Lassulus
c29e523824
Merge pull request #163030 from newAM/github-runner-harden
nixos/github-runner: systemd service hardening
2022-04-20 16:30:23 +01:00
Linus Heckemann
5e513b4b24
Merge pull request #167324 from alyssais/mailman-postfix
nixos/{postfix,mailman}: fix ordering between services
2022-04-20 16:34:43 +02:00
Alyssa Ross
572131c6a9
nixos/mailman: ensure Postfix is started after Mailman
On first run, Postfix will refuse to start if it's started before
Mailman is up, because it'll try to read the map files generated
Mailman the first time it's started, and they won't exist yet.  To fix
this, make sure Postfix isn't started until after Mailman is up if
they're both activated at the same time.
2022-04-20 13:17:28 +00:00
Janne Heß
4f3a868e59
Merge pull request #169049 from helsinki-systems/feat/systemd-stage-1-amdgpu-pro
nixos/amdgpu-pro: Add support for systemd stage 1
2022-04-20 11:36:53 +02:00
Martin Weinelt
0a0cf3d283
Merge pull request #169323 from n0emis/netbox-v3.2.1 2022-04-20 00:42:43 +02:00
Bernardo Meurer
97315af110
Merge pull request #169206 from nbraud/nixpkgs/kmscon/fonts
nixos/kmscon: Add fonts option
2022-04-19 12:57:26 -07:00
Jonas Heinrich
047473aa32 nixos/nextcloud: Support create database locally 2022-04-19 14:35:59 -04:00
Ember 'n0emis' Keske
896c716d1b
netbox: 3.1.10 -> 3.2.1 2022-04-19 17:52:09 +02:00
Xiami
1637e039d2
nixos/zookeeper: Take the same JRE we build zookeeper with 2022-04-19 18:56:00 +08:00
Eric Corson
0edfd89d6e nixos/tools: add copySystemConfiguration to configuration file template 2022-04-19 10:53:47 +01:00
Vladyslav Burzakovskyy
0c15d80f6b kratos: upgrade 0.8.3-alpha.1.pre.0 -> 0.9.0-alpha.3 2022-04-19 11:16:26 +02:00
ajs124
3fedfb5f8a
Merge pull request #110870 from asymmetric/doc/prom-node-exp
docs: modules/prometheus: finish exporter setup
2022-04-18 22:54:01 +01:00
Lassulus
cae8c76a9b
Merge pull request #163130 from xlambein/master
pipewire-media-session: changed options to take defaults from JSON
2022-04-18 19:55:31 +01:00
lassulus
e097044b92 nixos/kexec-boot: auto-detect the right kernel name to support aarch64 2022-04-18 20:34:18 +02:00
Michal Sojka
6a5b839069 usbrelay: init at 0.9 2022-04-18 19:02:41 +02:00
pennae
529ce4161a
Merge pull request #169176 from scvalex/fix-nbd-section-ordering
nixos/nbd: fix nbd-server config section ordering
2022-04-18 16:55:45 +00:00
Janne Heß
a719f5fb9d
Merge pull request #168965 from helsinki-systems/feat/systemd-stage-1-hostid
nixos/stage-1-init: Set host id for ZFS
2022-04-18 18:31:18 +02:00
Alexandru Scvortov
4646491175 nixos/nbd: fix nbd-server config section ordering
Closes #169103
2022-04-18 17:28:09 +01:00
Shawn8901
7f01ff7822 nixos/prometheus: use pkgs.formats.json.generate to write config file
The old way of writing the file omited qoutes within strings which are needed by some configurations like federations.
The quotes got lost when `echo`ing the content via `echo '${builtins.toJSON x}'`.
The pkgs.formats.json does handle that race condition properly, so this commit switches the writing to that helper.
2022-04-18 18:09:03 +02:00
nicoo
11bbb28f8a nixos/kmscon: Add fonts option 2022-04-18 15:56:34 +02:00
Martin Weinelt
df6fa84709 nixos/nscd: fix manual build 2022-04-18 23:50:46 +10:00
Janne Heß
28c7721aa3
nixos/stage-1-systemd: Add a test for LUKS keyfiles 2022-04-18 11:42:47 +01:00
Janne Heß
1bea49d3bf
nixos/stage-1-systemd: Add LUKS w/ password support 2022-04-18 11:42:45 +01:00
Robert Hensing
33cf95ef36
Merge pull request #168932 from hercules-ci/init-postgresqlTestHook
`postgresqlTestHook`: init
2022-04-18 11:58:34 +02:00
Florian Klink
52e346d6dd
Merge pull request #168774 from helsinki-systems/feat/systemd-shutdown
nixos/systemd: Properly shut down the system
2022-04-18 09:52:07 +02:00
John Ericson
b6f5bf2cf0
Merge pull request #124019 from petabyteboy/feature/unscd2
unscd: init at 0.53
2022-04-17 22:40:53 -04:00
José Romildo
2aa95b9fec lxqt.xdg-desktop-portal-lxqt: init at 0.2.0 2022-04-17 22:08:22 -03:00
Artturi
063155ae92
Merge pull request #169106 from wahjava/fix-headscale-typo
headscale: Fix typo as per systemd.exec(5)
2022-04-18 02:19:15 +03:00
Madoura
b18031c413
treewide/meta: Remove chiiruno and replace with Madouura (#169096)
* maintainers: remove chiiruno

* nixos/zeronet.nix: replace chiiruno with Madouura

* nixos/hydron: replace chiiruno with Madouura

* nixos/tests/bcachefs: replace chiiruno with Madouura

* lutris: replace chiiruno with Madouura

* qtchan: replace chiiruno with Madouura

* tinygo: replace chiiruno with Madouura

* vlang: replace chiiruno with Madouura

* merkletools: replace chiiruno with Madouura

* easyjson: replace chiiruno with Madouura

* quicktemplate: replace chiiruno with Madouura

* statik: replace chiiruno with Madouura

* dumb: replace chiiruno with Madouura

* sndio: replace chiiruno with Madouura

* hydron: replace chiiruno with Madouura

* edid-decode-unstable: replace chiiruno with Madouura

* tewisay: replace chiiruno with Madouura

* svt-av1: replace chiiruno with Madouura
2022-04-18 02:13:36 +03:00
Thiago Kenji Okada
353ba1b6e1
Merge pull request #127367 from oxalica/fix/dm-only-autostart
nixos/desktop-manager/none: add option to run XDG autostart files
2022-04-17 23:42:22 +01:00
Sandro
7c4f591673
Merge pull request #166135 from illustris/hadoop
hbase: 0.98.24 -> 2.4.11, spark & hadoop: improve interoperability
2022-04-18 00:38:17 +02:00
Will Fancher
f3f2e55e59 nixos: Fix channel copying in installer tests with systemd stage 1 2022-04-17 18:31:35 -04:00
Will Fancher
9ee5d61a16 nixos: Installer tests for systemd stage 1 2022-04-17 18:31:35 -04:00
Will Fancher
9e8b463cce nixos: Handle panic_on_fail in systemd stage 1 2022-04-17 18:31:35 -04:00
Thiago Kenji Okada
d67d4ee6a1 nixos/doc: fix typos 2022-04-17 23:18:54 +01:00
illustris
a671ffdf9a hbase: add release notes 2022-04-18 02:02:43 +05:30
illustris
2b0c299990 hbase: 0.98.24 -> 2.4.11 2022-04-18 02:02:43 +05:30
Ashish SHUKLA
4a973081b3
headscale: Fix typo as per systemd.exec(5) 2022-04-18 02:00:29 +05:30
pennae
04b5d464ba
Merge pull request #169029 from LeSuisse/nixos-tailscale-cert-uid
nixos/tailscale: allow to set `TS_PERMIT_CERT_UID` env variable
2022-04-17 19:51:31 +00:00
Janne Heß
69c18b0eab
Merge pull request #167051 from pacien/ssmtp-removal
ssmtp: drop unmaintained program and module
2022-04-17 21:09:14 +02:00
pacien
4572069a3a doc/release-notes: add ssmtp removal notice and alternative
GitHub: closes https://github.com/NixOS/nixpkgs/issues/105710
2022-04-17 20:42:44 +02:00
github-actions[bot]
f6bedc13d1
Merge master into staging-next 2022-04-17 18:01:03 +00:00
oxalica
3855e83c49 nixos/fcitx5: remove systemd service via XDG autostart files 2022-04-18 01:14:00 +08:00
oxalica
45ba086ea5 nixos/desktop-manager/none: add option to run XDG autostart files
`fcitx5` and `service.earlyoom` rely on use XDG autostart files to start.
But for X session with only window manager and no desktop manager
(`none` is used), no one can start them.

This options is added to run these autostart files for sessions without
desktop manager to make other services just work.
2022-04-18 01:13:59 +08:00
Silvan Mosberger
4de6cbc904
Merge pull request #168551 from infinisil/syncplay-no-gui
syncplay: Allow disabling GUI
2022-04-17 19:05:29 +02:00
Guillaume Girol
f66a86b3a0
Merge pull request #169052 from symphorien/nvidia_empty_default
nixos/nvidia: fix type of bus ID option to accept empty string
2022-04-17 14:32:59 +00:00
Martin Weinelt
5bd659fb4d
Merge pull request #167866 from NickCao/dendrite-limit 2022-04-17 16:01:34 +02:00
Janne Heß
0a60a12fae
nixos/amdgpu-pro: Add support for systemd stage 1 2022-04-17 14:00:02 +01:00
github-actions[bot]
0b8575626a
Merge master into staging-next 2022-04-17 12:01:11 +00:00
Guillaume Girol
5f95bff481 nixos/nvidia: fix type of bus ID option to accept empty string 2022-04-17 12:00:00 +00:00
Guillaume Girol
d5438d2b95
Merge pull request #140539 from polykernel/bus-id-constraints
hardware/nvidia: stricter constraints on PCI bus-id.
2022-04-17 11:10:39 +00:00
Thomas Gerbet
f89894e2e3 nixos/tailscale: allow to set TS_PERMIT_CERT_UID env variable
This setting was introduced with Tailscale 1.22.0, see
https://github.com/tailscale/tailscale/releases/tag/v1.22.0

Co-authored-by: pennae <github@quasiparticle.net>
2022-04-17 12:13:24 +02:00
pennae
6a289abddd
Merge pull request #169006 from SuperSandro2000/specialisation
nixos/specialisation: fix curly brackets
2022-04-17 08:02:12 +00:00
github-actions[bot]
deb60260a7
Merge master into staging-next 2022-04-17 06:01:07 +00:00
Sandro
b4e7303ddf
nixos/specialisation: fix curly brackets 2022-04-17 05:48:33 +02:00
Ryan Lahfa
b94a4c2270
nixos/mininet: telnet → inetutils
This fixes the usage of mininet on NixOS due to the replacement of the telnet package by inetutils.
2022-04-17 02:46:33 +02:00
github-actions[bot]
18ee7a21b1
Merge master into staging-next 2022-04-17 00:02:19 +00:00
Graham Christensen
d65eff4fb6
Merge pull request #167902 from DeterminateSystems/openstack-zfs-cleanup
openstack-image: init, make-single-disk-zfs-image: init
2022-04-16 19:44:53 -04:00
pacien
68128e7b7e nixos/nagios: replace ssmtp package use with msmtp
The ssmtp program is not maintained and is being removed.

GitHub: see https://github.com/NixOS/nixpkgs/issues/105710
2022-04-17 00:44:50 +02:00
pacien
cfc763bf36 nixos/ssmtp: drop module
The ssmtp program is not maintained and is being removed.

GitHub: see https://github.com/NixOS/nixpkgs/issues/105710
2022-04-17 00:44:50 +02:00
pacien
788bd96c1c nixosTests.mailcatcher: replace ssmtp module use with msmtp
The ssmtp program is not maintained and is being removed.

GitHub: see https://github.com/NixOS/nixpkgs/issues/105710
2022-04-17 00:44:50 +02:00
Thiago Kenji Okada
99b20f5580
Merge pull request #107957 from tex/nixos/auto-upgrade
nixos/auto-upgrade: add persistent option
2022-04-16 23:06:17 +01:00
Martin Weinelt
fa1bb283d8 Merge remote-tracking branch 'origin/master' into staging-next 2022-04-16 23:14:55 +02:00
Sandro
6df0dae4f9
Merge pull request #118387 from raboof/document-how-to-disable-nss
Improved error message on disabling NSS modules when disabling nscd
2022-04-16 22:55:40 +02:00
Janne Heß
3396c96e4b
nixos/stage-1-init: Set host id for ZFS 2022-04-16 21:32:18 +01:00
Janne Heß
30a00c29c4
nixos/systemd: Properly shut down the system 2022-04-16 21:17:36 +01:00
Janne Heß
031b95e587
Merge pull request #168814 from helsinki-systems/feat/systemd-stage-1-pass-vars
nixos/systemd-stage-1: Pass more vars to the builder
2022-04-16 22:02:26 +02:00
Janne Heß
b9bf28fd70
nixos/stage-1-init: Pass all parameters to the builder
This is for compatiblity with the old builder to get compat with uboot
support and to prepend microcode updates to the initrd
2022-04-16 20:36:18 +01:00
Janne Heß
9c70501b37
Merge pull request #168793 from helsinki-systems/feat/systemd-stage-1-mdraid-merge
nixos/stage-1-init: Merge mdraid module into swraid
2022-04-16 21:34:38 +02:00
polykernel
614b54d9b0 hardware/nvidia: stricter constraints on PCI bus-id.
The current type for the busId options are too relaxed, a stricter
constraint should be imposed to guard against typos which result
in Xorg unable to start.

This commit restricts the type to adhere to the B/D/F notation[1] for
addressing devices as expected by the module option.

[1] - https://wiki.osdev.org/PCI#Configuration_Space_Access_Mechanism_.231
2022-04-16 15:25:37 -04:00
Milan Pässler
517c17420f nixos/nscd: add package option 2022-04-16 14:47:47 -04:00
github-actions[bot]
6b9c75bed5
Merge master into staging-next 2022-04-16 18:01:07 +00:00
lassulus
78a6caa5f8 nixosTests.kexec: better test if we are in a new system 2022-04-16 19:51:28 +02:00
Milan Svoboda
a5fb565bf5 nixos/auto-upgrade: add persistent option 2022-04-16 19:27:21 +02:00
Robert Hensing
ebf1ce1923 nixos/doc/rl-2205: Add postgresqlTestHook 2022-04-16 17:33:47 +02:00
Florian Klink
b2f5308400 nixos/doc: move "Building NixOS" into "Installation", not "Development"
This section mostly describes how to build various installer images, so
it fits better in that chapter.

Proposed in https://github.com/NixOS/nixpkgs/pull/168306#discussion_r848329534
2022-04-16 15:19:03 +02:00
Florian Klink
b2383b6329
Merge pull request #168306 from flokli/nixos-doc-installer-drivers
nixos/doc: add notes on additional drivers or firmware
2022-04-16 15:03:24 +02:00
github-actions[bot]
6be56bfc2e
Merge master into staging-next 2022-04-16 12:01:10 +00:00
Luflosi
faad370edc nixos/ipfs: fix the services.ipfs.autoMigrate option
Apparently this was never properly tested and never worked. When the IPFS repo needs upgrading, the first call to ipfs, which is run before running the migration, fails with the error message "Error: ipfs repo needs migration".
To fix this, simply run the migration before any `ipfs config` calls but don't run it when `dataDir` is empty and we need to call `ipfs init`.
Writing a NixOS test for this would require keeping at least two versions of IPFS in Nixpkgs, which we don't currently do.
2022-04-16 07:38:13 -04:00
Luflosi
8a5e51525d nixos/ipfs: add Luflosi as maintainer 2022-04-16 07:38:13 -04:00
Luflosi
6b2eca8d56 nixos/ipfs: remove unused code
This code became obsolete with 4044d81d5c, just a couple days after it was introduced.
2022-04-16 07:38:13 -04:00
Franz Pletz
fc4e939cef
Merge pull request #162550 from fortuneteller2k/polybar 2022-04-16 12:47:18 +02:00
Thiago Kenji Okada
113a29b107
Merge pull request #168816 from thiagokokada/graalvm-cleanup
graalvmXX-ee: remove; graalvmXX-ce: remove Ruby/Python/WASM support
2022-04-16 11:36:41 +01:00
fortuneteller2k
3016d0aeb8 polybar: 3.5.7 -> 3.6.2
Co-authored-by: Alexander Foremny <aforemny@posteo.de>
2022-04-16 08:26:44 +00:00
Nick Cao
70d0e24568 nixos/logrotate: use packages from buildPackages in configuration checkPhase, fixing cross compilation 2022-04-16 10:22:39 +02:00
github-actions[bot]
c58a108aaa
Merge master into staging-next 2022-04-16 06:01:08 +00:00
Azat Bahawi
67565c3af8 tests/emacs-daemon: fix failure for unset $DISPLAY
axelf4 figured[1] out a workaround for fixing a failure due to an unset
$DISPLAY variable.

[1] https://github.com/NixOS/nixpkgs/pull/168076#issuecomment-1098083299
2022-04-16 16:53:45 +12:00
Mario Rodas
9bad452131
Merge pull request #129304 from yisraeldov/patch-1
programs.chromium: fix policies for brave
2022-04-15 22:08:43 -05:00
Nick Cao
b79e0a0e06
nixos/dendrite: set LimitNOFILE to 65535 2022-04-16 10:49:01 +08:00
Martin Weinelt
2bd8fc9378 Merge remote-tracking branch 'origin/master' into staging-next 2022-04-16 00:52:15 +02:00
Luflosi
17a406f28a
nixos/matrix-synapse: fix typo in mkRemovedOptionModule replacementInstructions
The correct capitalisation is lower-case here.
2022-04-15 22:52:29 +02:00
Lassulus
2bd0053d94
Merge pull request #162509 from mkg20001/haste
haste-server: init at 3dcc43578b99dbafac35dece9d774ff2af39e8d0
2022-04-15 21:08:27 +01:00
Kim Lindberger
ce2895263d
Merge pull request #167378 from talyz/keycloak-quarkus
keycloak: Switch to the new Quarkus version of Keycloak
2022-04-15 22:02:42 +02:00
Thiago Kenji Okada
4f8562f682 nixos/doc: add note about the recent graalvmXX-ce changes 2022-04-15 20:34:09 +01:00
Janne Heß
01bc138a8e
nixos/stage-1-init: Merge mdraid module into swraid 2022-04-15 19:57:16 +01:00
github-actions[bot]
40f288fa90
Merge master into staging-next 2022-04-15 18:01:30 +00:00
Michele Guerini Rocco
68a102a2e4
Merge pull request #168764 from rnhmjoj/pr-pdns-ncdns
nixos/ncdns: listen on IPv6 by default
2022-04-15 17:34:57 +02:00
Martin Weinelt
a7fc5aaa76 Merge remote-tracking branch 'origin/master' into staging-next 2022-04-15 13:30:48 +02:00
Michele Guerini Rocco
09f816e976
Merge pull request #156401 from TLATER/tlater/gitea-hide-secrets
nixos/gitea: Prevent secrets from being exposed at ExecStart time
2022-04-15 10:26:12 +02:00
github-actions[bot]
eef7dee538
Merge master into staging-next 2022-04-15 06:01:16 +00:00
Will Dietz
dde5b0ca7a
python3Packages.fenics: fix build, pin to older boost (#166728)
* python3Packages.fenics: fix build, pin to older boost

Looking at upstream, there are various issues with newer boost.
(At least some of them have been since fixed)

For now, fix the build by using a version of boost that works
with the current version.

Error here was complaining about `std::min_element`,
which is no longer available, apparently, due to newer boost
no longer (transitively) including <algorithm>.

This was added in C++17, so I'm not sure the cmake flag
specifying dolfin built with C++11 makes sense or is used.
Leaving for now :).

* nixos/tests/fenics: fix name of machine/node in script

Still fails for now.

* python3Packages.fenics: fix accidentally changed strings in subst

Looks like in migration to pkg-config this was erroneously
changed from `pkgconfig` (python package, and source string)
to `pkg-config` (nix package name, tool name).
(see 9bb3fccb5b)

Fixes the NixOS test.
2022-04-14 19:37:20 -05:00
Thomas Watson
7fd6cea253 make-initrd: fix reproducibility problems
cpio includes the number of directory hard links in archives it creates.
Some filesystems, like btrfs, do not count directory hard links the same
way as more common filesystems like ext4 or tmpfs, so archives built
when /tmp is on such a filesystem do not reproduce. This patch replaces
cpio with bsdtar, which does not have this issue. The specific
invocation is from this page:
https://reproducible-builds.org/docs/archives/
2022-04-14 19:06:30 -05:00
github-actions[bot]
1c0229dbfd
Merge staging-next into staging 2022-04-15 00:03:21 +00:00
Janne Heß
0efb6720a4
nixos/console: Fix attribute path to fix eval 2022-04-14 22:07:41 +01:00
Lassulus
15b5c29a41
Merge pull request #168600 from helsinki-systems/feat/systemd-stage-1-keymap
nixos/stage-1-systemd: Add keymap support
2022-04-14 21:50:52 +01:00
rnhmjoj
3bb46db14e
nixos/release-notes: document ncdns incompatible changes 2022-04-14 21:30:00 +02:00
rnhmjoj
a1cb6e5a88
nixos/tests/ncdns: fix test
1. Add another wait_for_unit("pdns-recursor")
   (this is needed when DNSSEC is disabled)

2. Make everything IPv6
2022-04-14 21:07:15 +02:00
rnhmjoj
d39a10daa8
nixos/ncdns: listen on IPv6 by default 2022-04-14 21:07:15 +02:00
github-actions[bot]
795332a20e
Merge staging-next into staging 2022-04-14 18:01:48 +00:00
Michele Guerini Rocco
e674ea6956
Merge pull request #168535 from rnhmjoj/pr-pdns-nixos
nixos/pdns-recursor: update default values
2022-04-14 18:02:29 +02:00
Janne Heß
289f38a65b
Merge pull request #168301 from helsinki-systems/feat/systemd-stage-1-mdadm
nixos/stage-1-systemd: Add mdraid support (+ test)
2022-04-14 17:56:36 +02:00
rnhmjoj
bad701b1d3
doc/release-notes: mention pdns-recursor options changes 2022-04-14 17:32:57 +02:00
rnhmjoj
fe27976534
nixos/tests/pdns-recursor: test a DNS query 2022-04-14 17:31:27 +02:00
rnhmjoj
fd480f55df
nixos/pdns-recursor: update default values
1. Update the default values of several addresses-related settings
   that have been changed by upstream.

2. Make `dns.address` take multiple addresses. This is needed
   for dual stack, now working by default.
2022-04-14 17:31:16 +02:00
José Romildo
8773488cc8 enlightenment: add maintainers team 2022-04-14 11:28:21 -03:00
Florian Klink
e97fc37e55
Merge pull request #161253 from flokli/kexec-boot
nixos/installer: add kexec-boot
2022-04-14 15:30:30 +02:00
José Romildo
e132736d0d lumina: add maintainers team 2022-04-14 10:27:47 -03:00
Florian Klink
6ceedff331 nixosTests.kexec: fix tests with kexecBoot format 2022-04-14 15:15:33 +02:00
Alyssa Ross
b825f6db56 nixos/doc/md-to-db.sh: consistent pandoc version
Until now, this script has used the version of pandoc from unstable.
This means that running the script on the same version of Nixpkgs
could produce different results, and meant that when Pandoc's output
was changed, random PRs were changing the whole manual when they ran
the script to regenerate docs[1][2].

Here I've changed the manual to use a consistent version of pandoc —
the one from the latest release tag, which will avoid this problem in
future.  This will avoid this problem in future.  The only time we'll
need to worry about pandoc output changes is when we bump the version
used in this script.

I also considered using the version from the current Nixpkgs branch,
but decided against it as it's unlikely that e.g. the person bumping
Pandoc will remember to regenerate the manual.

[1]: https://github.com/NixOS/nixpkgs/pull/162550
[2]: https://github.com/NixOS/nixpkgs/pull/168535
2022-04-14 12:57:51 +00:00
github-actions[bot]
999a16ca63
Merge staging-next into staging 2022-04-14 12:02:14 +00:00
Jacek Galowicz
6b414c5b66
Merge pull request #168609 from rnhmjoj/pr-test-driver
nixos/test-driver: highlight driver log lines
2022-04-14 13:09:36 +02:00
pennae
3e9855f8ac
Merge pull request #168328 from K900/fix-nix-ld-test
tests/nix-ld: fix invocation
2022-04-14 10:41:26 +00:00
Janne Heß
dda7e9e3ee
nixos/stage-1-systemd: Add mdraid support (+ test) 2022-04-14 11:39:57 +01:00
Janne Heß
0581d31bf9
Merge pull request #167393 from iblech/patch-docs-cc
nixos-rebuild, switch-to-configuration: document and protect against cross compilation subtlety
2022-04-14 12:30:39 +02:00
rnhmjoj
ca1b1f6dc0
nixos/test-driver: highlight driver log lines
There is a whole lot of noise in a NixOS test log due to journal,
commands, and test driver messages all being mixing together.
With this commit the test driver messages are highlighted so you don't
have to squint too much to see where a subtest starts and ends or what
was the last command being run.

Here's an excerpt from a highlighted log:

    machine # [    6.647826] dhcpcd[668]: eth0: adding default route via 10.0.2.2
    machine # I've had a great day!
    (finished: must succeed: curl -sfL https://example.com/how-are-you? | tee /dev/stderr, in 0.19 seconds)
    (finished: subtest: Privoxy can filter https requests, in 0.22 seconds)
    subtest: Blocks are working
    machine: waiting for TCP port 443
    machine # Connection to localhost (::1) 443 port [tcp/https] succeeded!
    (finished: waiting for TCP port 443, in 0.03 seconds)
    machine: must fail: curl -f https://example.com/ads 1>&2
    machine # [    6.730608] nscd[742]: 742 monitored file `/etc/resolv.conf` was written to
    machine # [    6.733071] privoxy[814]: 2022-04-14 09:41:01.695 7fa995c39640 Actions: +block{Fake ads} ...
    machine # curl: (22) The requested URL returned error: 403
    machine # [    6.753098] systemd[1]: Stopping Name Service Cache Daemon...
    machine # [    6.755632] systemd[1]: nscd.service: Deactivated successfully.
    machine # [    6.757069] systemd[1]: Stopped Name Service Cache Daemon.
    (finished: must fail: curl -f https://example.com/ads 1>&2, in 0.07 seconds)
    machine: must succeed: curl -f https://example.com/PRIVOXY-FORCE/ads 1>&2
    machine # [    6.765099] systemd[1]: Starting Name Service Cache Daemon...
    machine # [    6.781519] nscd[925]: 925 monitoring file `/etc/passwd` (1)
    machine # [    6.844105] systemd[1]: Reached target Network is Online.
    machine # [    6.848860] privoxy[814]: 2022-04-14 09:41:01.805 7fa995c39640 Actions: +block{Fake ads} ...
    machine # [    6.856068] nscd[925]: 925 monitoring file `/etc/nsswitch.conf` (8)
    machine # [    6.858229] systemd[1]: Reached target Multi-User System.
    machine # [    6.858934] nscd[925]: 925 monitoring directory `/etc` (2)
    machine # [    6.861315] systemd[1]: Startup finished in 2.374s (kernel) + 4.451s (userspace) = 6.826s.
    machine # Hot Nixpkgs PRs in your area. Click here!
    machine # [    6.873055] nscd[925]: 925 monitoring directory `/etc` (2)
    machine # [    6.874489] nscd[925]: 925 monitoring file `/etc/nsswitch.conf` (8)
    machine # [    6.875599] nscd[925]: 925 monitoring directory `/etc` (2)
    (finished: must succeed: curl -f https://example.com/PRIVOXY-FORCE/ads 1>&2, in 0.12 seconds)
    (finished: subtest: Blocks are working, in 0.22 seconds)
    subtest: Temporary certificates are cleaned
    machine: must succeed: test $(ls /run/privoxy/certs | wc -l) -gt 0
    (finished: must succeed: test $(ls /run/privoxy/certs | wc -l) -gt 0, in 0.02 seconds)
    machine: must succeed: date -s "$(date --date '12 days')"
    (finished: must succeed: date -s "$(date --date '12 days')", in 0.02 seconds)
    machine # [    6.959589] systemd[1]: Started Logrotate Service.
    machine # [    6.966685] systemd[1]: Starting Cleanup of Temporary Directories...
    machine # [    6.974783] systemd[1]: logrotate.service: Deactivated successfully.
    machine # [    7.004493] systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully.
    machine # [    7.005457] systemd[1]: Finished Cleanup of Temporary Directories.
    machine: must succeed: test $(ls /run/privoxy/certs | wc -l) -eq 0
    (finished: must succeed: test $(ls /run/privoxy/certs | wc -l) -eq 0, in 0.01 seconds)
    (finished: subtest: Temporary certificates are cleaned, in 0.15 seconds)
    (finished: run the VM test script, in 7.44 seconds)
    test script finished in 7.48s
    cleanup
    kill machine (pid 8)
2022-04-14 11:54:21 +02:00
Janne Heß
6d6c1c341c
nixos/stage-1-systemd: Add keymap support
Makes my life a lot easier with my non-american keyboard layout
2022-04-14 10:25:04 +01:00