Commit Graph

1301 Commits

Author SHA1 Message Date
Sandro
c2ae278eb8
Merge pull request #221851 from Ma27/postgresql-jit-support
postgresql: implement opt-in JIT support
2023-03-29 13:29:30 +02:00
Maximilian Bosch
2282fa73a1
postgresql: implement opt-in JIT support
Closes #150801

Note: I decided against resuming directly on #150801 because the
conflict was too big (and resolving it seemed too error-prone to me).
Also the `this`-refactoring could be done in an easier manner, i.e. by
exposing JIT attributes with the correct configuration. More on that
below.

This patch creates variants of the `postgresql*`-packages with JIT[1]
support. Please note that a lot of the work was derived from previous
patches filed by other contributors, namely dasJ, andir and abbradar,
hence the co-authored-by tags below.

Effectively, the following things have changed:

* For JIT variants an LLVM-backed stdenv with clang is now used as
  suggested by dasJ[2]. We need LLVM and CLang[3] anyways to build the
  JIT-part, so no need to mix this up with GCC's stdenv. Also, using the
  `dev`-output of LLVM and clang's stdenv for building (and adding llvm
  libs as build-inputs) seems more cross friendly to me (which will
  become useful when cross-building for JIT-variants will actually be
  supported).

* Plugins inherit the build flags from the Makefiles in
  `$out/lib/pgxs/src` (e.g. `-Werror=unguarded-availability-new`). Since
  some of the flags are clang-specific (and stem from the use of the
  CLang stdenv) and don't work on gcc, the stdenv of `pkgs.postgresql`
  is passed to the plugins. I.e., plugins for non-JIT variants are built
  with a gcc stdenv on Linux and plugins for JIT variants with a clang
  stdenv.

  Since `plv8` hard-codes `gcc` as `$CC` in its Makefile[4], I marked it
  as broken for JIT-variants of postgresql only.

* Added a test-matrix to confirm that JIT works fine on each
  `pkgs.postgresql_*_jit` (thanks Andi for the original test in
  #124804!).

* For each postgresql version, a new attribute
  `postgresql_<version>_jit` (and a corresponding
  `postgresqlPackages<version>JitPackages`) are now exposed for better
  discoverability and prebuilt artifacts in the binary cache.

* In #150801 the `this`-argument was replaced by an internal recursion.
  I decided against this approach because it'd blow up the diff even
  more which makes the readability way harder and also harder to revert
  this if necessary.

  Instead, it is made sure that `this` always points to the correct
  variant of `postgresql` and re-using that in an additional
  `.override {}`-expression is trivial because the JIT-variant is
  exposed in `all-packages.nix`.

* I think the changes are sufficiently big to actually add myself as
  maintainer here.

* Added `libxcrypt` to `buildInputs` for versions <v13. While
  building things with an LLVM stdenv, these versions complained that
  the extern `crypt()` symbol can't be found. Not sure what this is
  exactly about, but since we want to switch to libxcrypt for `crypt()`
  usage anyways[5] I decided to add it. For >=13 it's not relevant
  anymore anyways[6].

* JIT support doesn't work with cross-compilation. It is attempted to
  build LLVM-bytecode (`%.bc` is the corresponding `make(1)`-rule) for
  each sub-directory in `backend/` for the JIT apparently, but with a
  $(CLANG) that can produce binaries for the build, not the host-platform.

  I managed to get a cross-build with JIT support working with
  `depsBuildBuild = [ llvmPackages.clang ] ++ buildInputs`, but
  considering that the resulting LLVM IR isn't platform-independent this
  doesn't give you much. In fact, I tried to test the result in a VM-test,
  but as soon as JIT was used to optimize a query, postgres would
  coredump with `Illegal instruction`.

A common concern of the original approach - with llvm as build input -
was the massive increase of closure size. With the new approach of using
the LLVM stdenv directly and patching out references to the clang drv in
`$out` the effective closure size changes are:

    $ nix path-info -Sh $(nix-build -A postgresql_14)
    /nix/store/kssxxqycwa3c7kmwmykwxqvspxxa6r1w-postgresql-14.7	306.4M
    $ nix path-info -Sh $(nix-build -A postgresql_14_jit)
    /nix/store/xc7qmgqrn4h5yr4vmdwy56gs4bmja9ym-postgresql-14.7	689.2M

Most of the increase in closure-size stems from the `lib`-output of
LLVM

    $ nix path-info -Sh /nix/store/5r97sbs5j6mw7qnbg8nhnq1gad9973ap-llvm-11.1.0-lib
    /nix/store/5r97sbs5j6mw7qnbg8nhnq1gad9973ap-llvm-11.1.0-lib	349.8M

which is why this shouldn't be enabled by default.

While this is quite much because of LLVM, it's still a massive
improvement over the simple approach of adding llvm/clang as
build-inputs and building with `--with-llvm`:

    $ nix path-info -Sh $(nix-build -E '
	with import ./. {};
	postgresql.overrideAttrs ({ configureFlags ? [], buildInputs ? [], ... }: {
	  configureFlags = configureFlags ++ [ "--with-llvm" ];
	  buildInputs = buildInputs ++ [ llvm clang ];
	})' -j0)
    /nix/store/i3bd2r21c6c3428xb4gavjnplfqxn27p-postgresql-14.7	  1.6G

Co-authored-by: Andreas Rammhold <andreas@rammhold.de>
Co-authored-by: Janne Heß <janne@hess.ooo>
Co-authored-by: Nikolay Amiantov <ab@fmap.me>

[1] https://www.postgresql.org/docs/current/jit-reason.html
[2] https://github.com/NixOS/nixpkgs/pull/124804#issuecomment-864616931
    & https://github.com/NixOS/nixpkgs/pull/150801#issuecomment-1467868321
[3] This fails with the following error otherwise:
    ```
    configure: error: clang not found, but required when compiling --with-llvm, specify with CLANG=
    ```
[4] https://github.com/plv8/plv8/blob/v3.1.5/Makefile#L14
[5] https://github.com/NixOS/nixpkgs/pull/181764
[6] c45643d618
2023-03-29 08:39:46 +02:00
Nick Cao
851cd65a21
Merge pull request #220776 from Vonfry/deprecated/fcitx4
fcitx: remove version 4
2023-03-25 10:23:06 +08:00
06kellyjac
818e73fc43 nixos/authelia: init tests 2023-03-24 21:23:41 -03:00
Martin Weinelt
adb0c3560b
nixos/tests/ceph*: Enable on aarch64-linux 2023-03-24 23:50:45 +01:00
Martin Weinelt
e56ea3c325
Merge pull request #222701 from jopejoe1/firefox
firefox-{beta,devedition}-unwrapped: init at 112.0b6
2023-03-24 21:34:31 +01:00
jopejoe1
8a5a08373f firefox-beta-unwrapped: init at 112.0b6 2023-03-24 14:18:26 +01:00
jopejoe1
80168addbe firefox-devedition-unwrapped: init at 112.0b6 2023-03-24 14:16:22 +01:00
Will Fancher
5a9b9e620d
Merge pull request #176828 from therishidesai/luks-multi-key-files
nixos/luksroot: add tryEmptyPassphrase option
2023-03-24 03:02:20 -04:00
Nick Cao
72a8c49415
Merge pull request #222311 from NickCao/qt6-vf
qt6.qtbase: add patch to fix handling of variable fonts
2023-03-23 13:33:22 +08:00
Rishi Desai
cccc3f8a8e nixos/luksroot: add tryEmptyPassphrase option 2023-03-22 09:17:23 -05:00
woojiq
296e7f92cd keyd: add keyd service and test
The keyd package already exists, but without a systemd service.

Keyd requires write access to /var/run to create its socket. Currently
the directory it uses can be changed with an environment variable, but
the keyd repo state suggests that this may turn into a compile-time
option. with that set, and some supplementary groups added, we can run
the service under DynamicUser.

Co-authored-by: pennae <82953136+pennae@users.noreply.github.com>
2023-03-22 15:12:29 +01:00
oxalica
f4385d6010
nixosTests.noto-fonts-cjk-qt-default-weight: init 2023-03-22 16:26:30 +08:00
Francesco Gazzetta
0995aea49b
Merge pull request #202995 from tomfitzhenry/sgtpuzzles-test
nixos/tests/sgtpuzzles: init
2023-03-19 14:11:29 +00:00
Atemu
bd7309c5a3
Merge pull request #221469 from wegank/solr-drop
solr: drop
2023-03-18 10:17:43 +01:00
Aidan Gauland
7fb4aae81f
nixos/peroxide: add module for peroxide service 2023-03-18 07:43:59 +13:00
Weijia Wang
c24a8ccc98 solr: drop 2023-03-16 16:17:04 +02:00
Vonfry
f95c20d77d
nixos/fcitx5: init tests 2023-03-13 18:50:05 +08:00
Vonfry
051b74fe7d
nixos/fcitx: deprecated, and suggestions to use fcitx5 instead 2023-03-13 18:47:05 +08:00
Vladimír Čunát
2d51a0e8ad
Merge branch 'master' into staging-next 2023-03-13 08:25:10 +01:00
Elis Hirwing
ce76a6838c
Merge pull request #203487 from jocelynthode/init-readarr
readarr: init at 0.1.4.1596
2023-03-13 06:56:35 +01:00
Lassulus
47233b27c9
Merge pull request #167319 from schnusch/cgit 2023-03-13 09:51:08 +07:00
Martin Weinelt
d03d74aa67
Merge remote-tracking branch 'origin/master' into staging-next
Conflicts:
- pkgs/development/python-modules/aiopulse/default.nix
- pkgs/development/python-modules/identify/default.nix
- pkgs/development/python-modules/spur/default.nix
2023-03-12 23:28:23 +01:00
Jocelyn Thode
e7f54823b1
readarr: init at 0.1.4.1596 2023-03-12 20:54:23 +01:00
Guillaume Girol
db901673ea
Merge pull request #209156 from pwaller/issue-114594
nixos/grub: Name initrd-secrets by system, not by initrd
2023-03-12 18:50:33 +00:00
github-actions[bot]
feb117e32c
Merge master into staging-next 2023-03-11 18:01:19 +00:00
Jonas Heinrich
161a1ca129
Merge pull request #191974 from tu-maurice/btrbk-doas
btrbk: Use sudo or doas based on configuration
2023-03-11 16:10:50 +01:00
github-actions[bot]
140a35879a
Merge master into staging-next 2023-03-11 12:01:11 +00:00
Mario Rodas
dae678ad8f
Merge pull request #186276 from typetetris/feature/add-timescaledb-toolkit
timescaledb_toolkit: init at 1.14.0
2023-03-11 06:50:54 -05:00
Martin Weinelt
ef91384e6f Merge remote-tracking branch 'origin/master' into staging-next 2023-03-10 13:09:25 +01:00
Stanisław Pitucha
5496585eb8
Merge pull request #186076 from viraptor/gemstash-service
nixos/gemstash: init module
2023-03-10 14:21:53 +11:00
github-actions[bot]
39f6788067
Merge master into staging-next 2023-03-09 12:01:27 +00:00
Domen Kožar
6a231a6eb7
Merge pull request #197613 from shyim/add-coder
coder: fix web frontend building
2023-03-09 12:04:16 +04:00
Stanisław Pitucha
70073985ae nixos/gemstash: init module 2023-03-07 15:56:56 +11:00
Martin Weinelt
86eedea2fe Merge remote-tracking branch 'origin/master' into staging-next 2023-03-06 17:38:35 +00:00
Ilan Joselevich
edff57cff4
Merge pull request #218455 from veehaitch/gh-runner-builddotnet
github-runner: switch to `buildDotnetModule`
2023-03-06 19:11:06 +02:00
Frederik Rietdijk
8cf8d77121 Merge master into staging-next 2023-03-04 09:38:25 +01:00
K900
84f3520c8f nixos/tests/nat: remove conntrack helpers test
Removed upstream
2023-03-04 10:53:48 +03:00
Tom Fitzhenry
f86e1e9a79 nixos/tests/sgtpuzzles: init 2023-03-04 00:52:21 +11:00
Vincent Haupert
e8df83d417 nixos/tests/github-runner: init 2023-02-26 15:39:19 +01:00
Jan Tojnar
9bb986284f Merge branch 'staging-next' into staging
# Conflicts:
#	pkgs/development/python-modules/mdp/default.nix
#	pkgs/top-level/python-aliases.nix
2023-02-26 01:13:37 +01:00
IndeedNotJames
1b304e1dbc
forgejo: use existing nixos/tests/gitea as test
forgejo is a soft-fork of gitea and gitea's existing tests work great
with forgejo.
At least for now, as this could change, though somewhat unlikely.
2023-02-24 02:59:30 +01:00
IndeedNotJames
7d05a6a910
nixos/tests/gitea: make gitea package configurable
This allows the same tests to be used for forgejo, a soft-fork of
gitea, which currently does not have any tests.
2023-02-24 02:59:30 +01:00
github-actions[bot]
fc3641aa1e
Merge staging-next into staging 2023-02-21 00:03:04 +00:00
Will Fancher
bb7cd63150
Merge pull request #215381 from lilyinstarlight/fix/make-initrd-ng-wrapped-executables
make-initrd-ng: support wrapped executables
2023-02-20 14:11:48 -05:00
Florian Klink
d7c89bf807
Merge pull request #217254 from hesiod/nixos-test-systemd-credentials-master
nixos/tests/systemd-credentials-tpm2: Add tests for systemd credentials
2023-02-20 20:04:26 +01:00
Tobias Markus
e83babd493 nixos/tests/systemd-credentials-tpm2: Add tests for systemd credentials
Add a test that checks whether systemd can access the TPM in order
access credentials requested via Load/SetCredentialEncrypted.
2023-02-20 13:54:49 +01:00
github-actions[bot]
0a547ad8b7
Merge staging-next into staging 2023-02-20 12:02:08 +00:00
Yureka
ced929a2d0
nixos/tests: add test for luksroot and initrd keymaps (#189725) 2023-02-20 08:19:02 +01:00
Florian Klink
ab566b8656
Merge pull request #208269 from ElvishJerricco/systemd-stage-1-fsck
Systemd stage 1 fsck
2023-02-17 10:06:39 +02:00
talyz
9e9007e45f
nixos/opensearch: Use DynamicUser and StateDirectory by default
...but still allow for setting `dataDir` to a custom path. This gets
rid of the use of the deprecated option PermissionsStartOnly. Also, add
the ability to customize user and group, since that could be useful
with a custom `dataDir`.
2023-02-15 16:38:24 +00:00
Soner Sayakci
4561785dfc
nixos/tests/opensearch: init 2023-02-14 20:00:27 +00:00
Eric Wolf
9dc7a05a85 cargo-pgx/timescaledb_toolkit: add nixos test 2023-02-13 10:58:26 +01:00
Arian van Putten
5b23d0e51c
Merge pull request #214396 from nikstur/systemd-repart
systemd-repart
2023-02-10 20:03:09 +01:00
nikstur
4700198654 nixos/systemd-repart: init 2023-02-10 14:05:44 +01:00
Robert Hensing
1991c40759
Merge pull request #194345 from codedownio/binary-cache
Introduce mkBinaryCache function
2023-02-09 15:25:16 +01:00
Nick Cao
6fa2bfdf4d
Merge pull request #215110 from gador/pgadmin-use-pstgresqltesthook
pgadmin4-desktopmode: init at 6.19, pgadmin4: simplify tests
2023-02-09 16:05:44 +08:00
Florian Brandes
a380674d85
pgadmin4: add option to enable desktop mode
By default, pgadmin4 uses SERVER_MODE = True. This requires
access to system directories (e.g. /var/lib/pgadmin). There is
no easy way to change this mode during runtime. One has to change
or add config files withing pgadmin's directory structure to change it
or add a system-wide config file under `/etc/pgadmin`[1].

This isn't always easy to achive or may not be possible at all. For
those usecases this implements a switch in the pgadmin4 derivation and
adds a new top-level package `pgadmin4-desktopmode`. This builds in
DESKTOP MODE and allows the usage of pgadmin4 without the nixOS module
and without access to system-wide directories.

pgadmin4 module saves the configuration to /etc/pgadmin/config_system.py
pgadmin4-desktopmode tries to read that as well. This normally fails with
a PermissionError, as the config file is owned by the user of the pgadmin module.

With the check-system-config-dir.patch this will just throw a warning
but will continue and not read the file.

If we run pgadmin4-desktopmode as root
(something one really shouldn't do), it can read the config file and fail,
because of the wrong config for desktopmode.

[1]https://www.pgadmin.org/docs/pgadmin4/latest/config_py.html

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-02-09 08:19:05 +01:00
Florian Brandes
e4488f5efe pgadmin4: move package tests back into the package
We test pgadmin in nixosTests, because it needs a running postgresql instance.
This is now unnecessary since we can do so in the package itself.

This reduces the complexity of pgadmin and removes the need for the extra
nixosTests.

Also setting SERVER_MODE in `pkg/pip/setup_pip.py` does not have any effect
on the final package, so we remove it.
In NixOS, we use the module, which expects SERVER_MODE to be true (which it defaults to).
In non-NixOS installations, we will need the directory /var/lib/pgadmin and /var/log/pgadmin

Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
2023-02-09 08:06:52 +01:00
Lily Foster
9b31147be9
nixos/tests/systemd-initrd-vconsole: init new test for console.earlySetup 2023-02-08 15:24:10 -05:00
Will Fancher
14b77582da systemd-stage-1: fsck 2023-02-08 00:43:10 -05:00
Tom McLaughlin
d1a2a16a3a Introduce mkBinaryCache function 2023-02-07 16:16:07 -08:00
Jacek Galowicz
7f88d9c34c
Merge pull request #214910 from rnhmjoj/pr-gnupg-test
nixos/tests/gnupg: init
2023-02-07 09:17:06 +01:00
rnhmjoj
fe34d10e57
nixos/tests/gnupg: init 2023-02-07 08:47:14 +01:00
Anderson Torres
f7e045e149
Merge pull request #209192 from lucasew/cockpit
cockpit: init at 284
2023-02-06 16:02:27 -03:00
Soner Sayakci
56ecab709a
nixos/coder: init module 2023-02-06 13:15:00 +01:00
Doron Behar
42b3a6354f
Merge pull request #206559 from doronbehar/pkg/musescore
musescore: 3.6.2 -> 4.0.1
2023-02-05 12:00:06 +02:00
Anderson Torres
bc0944c06f
Merge pull request #214193 from jnsgruk/add-multipass-pkg
multipass: init at 1.11.0
2023-02-04 09:03:54 -03:00
Doron Behar
3917d02350 musescore: Enable test only on x86_64-linux 2023-02-04 12:16:53 +02:00
Jon Seager
978259361b
nixos/tests/multipass: init 2023-02-04 07:44:04 +00:00
Nick Cao
3ab1fd296f
Merge pull request #212199 from OPNA2608/init/miriway
miriway: init at unstable-2022-12-18
2023-02-04 09:50:17 +08:00
OPNA2608
7ef7d9e268 nixos/miriway: add test 2023-02-04 02:23:14 +01:00
lucasew
1ef7b45ffb nixos/cockpit: add nixos test
Signed-off-by: lucasew <lucas59356@gmail.com>
2023-02-02 14:47:46 -03:00
Nick Cao
338657be21
Merge pull request #210190 from NickCao/zram-generator
zram-generator: init at 1.1.2
2023-02-02 11:04:46 +08:00
Gregor Kleen
b355be2d91 chrony: add nixos test for ptp_kvm 2023-01-31 10:08:32 -06:00
Henri Menke
0cfc7e63a6
nixos/zram-generator: add test 2023-01-31 20:18:18 +08:00
schnusch
218c7795a6 nixos/cgit: init 2023-01-31 12:06:12 +01:00
Michele Guerini Rocco
72c6c848ee
Merge pull request #212685 from rnhmjoj/pr-connman
nixos/wireless: fix failure on missing config file
2023-01-30 13:32:58 +01:00
rnhmjoj
fc211deccf
nixos/tests/connman: init 2023-01-30 07:48:51 +01:00
Florian Brandes
5b3ce4f78f octoprint: add nixosTests
Signed-off-by: Florian Brandes <florian.brandes@posteo.de>
Co-authored-by: Nick Cao <nickcao@nichi.co>
2023-01-29 05:40:28 +01:00
Sandro
17631ae82d
Merge pull request #208712 from mattmelling/cloudlog
cloudlog: init at 2.3
2023-01-24 02:52:36 +01:00
Matt Melling
c281dd3e05
nixos/cloudlog: init 2023-01-23 22:41:07 +00:00
Peter Waller
678eed323f nixos/grub: Name initrd-secrets by system, not by initrd
Previously, secrets were named according to the initrd they were
associated with. This created a problem: If secrets were changed whilst
the initrd remained the same, there were two versions of the secrets
with one initrd. The result was that only one version of the secrets would
by recorded into the /boot partition and get used. AFAICT this would
only be the oldest version of the secrets for the given initrd version.

This manifests as #114594, which I found frustrating while trying to use
initrd secrets for the first time. While developing the secrets I found
I could not get new versions of the secrets to take effect.
Additionally, it's a nasty issue to run into if you had cause to change
the initrd secrets for credential rotation, etc, if you change them and
discover you cannot, or alternatively that you can't roll back as you
would expect.

Additional changes in this patch.

* Add a regression test that switching to another grub configuration
  with the alternate secrets works. This test relies on the fact that it
  is not changing the initrd. I have checked that the test fails if I
  undo my change.

* Persist the useBootLoader disk state, similarly to other boot state.
  * I had to do this, otherwise I could not find a route to testing the
    alternate boot configuration. I did attempt a few different ways of
    testing this, including directly running install-grub.pl, but what
    I've settled on is most like what a user would do and avoids
    depending on lots of internal details.
  * Making tests that test the boot are a bit tricky (see hibernate.nix
    and installer.nix for inspiration), I found that in addition to
    having to copy quite a bit of code I still couldn't get things to
    work as desired since the bootloader state was being clobbered.

My change to persist the useBootLoader state could break things,
conceptually. I need some help here discovering if that is the case,
possibly by letting this run through a staging CI if there is one.

Fix #114594.

cc potential reviewers:

@lopsided98 (original implementer) @joachifm (original reviewer),
@wkennington (numerous fixes to grub-install.pl), @lheckemann (wrote
original secrets test).
2023-01-21 17:19:26 +00:00
Florian Klink
24b4189619
Merge pull request #207468 from schnusch/systemd-user-tmpfiles-rules
nixos: systemd: add systemd.user.tmpfiles.rules, systemd.user.tmpfiles.users.<name>.rules
2023-01-17 14:39:44 +01:00
schnusch
34ad8447c3 nixos: systemd: add systemd.user.tmpfiles 2023-01-17 12:19:40 +01:00
oxalica
eecb6c2bd8 nixos/tests/swap-file-btrfs: init 2023-01-17 06:56:55 +08:00
Nick Cao
a90e324332
Merge pull request #210785 from fgaz/mindustry/nixos-test
nixosTests.mindustry: init; mindustry: use SRI hashes
2023-01-16 16:21:06 +08:00
Ryan Lahfa
e2ac17f781
Merge pull request #207466 from Patryk27/fix/174065
nixos: add --specialisation to nixos-rebuild
2023-01-15 18:52:09 +01:00
Patryk Wychowaniec
2c55eba8f4
nixos: add --specialisation to nixos-rebuild
This commit fixes a papercut in nixos-rebuild where people wanting to
switch to a specialisation (or test one) were forced to manually figure
out the specialisation's path and run its activation script - since now,
there's a dedicated option to do just that.

This is a backwards-compatible change which doesn't affect the existing
behavior, which - to be fair - might still be considered sus by some
people, the painful scenario here being:

- you boot into specialisation `foo`,
- you run `nixos-rebuild switch`,
- whoops, you're no longer at specialisation `foo`, but you're rather
  brought back to the base system.

(it's especially painful for cases where specialisation is used to load
extra drivers, e.g. Nvidia, since then launching `nixos-rebuild switch`,
while forgetting that you're inside a specialisation, can cause some
parts of your system to get accidentally unloaded.)

I've tried to mitigate that by improving specialisations so that they
create a dedicated file somewhere in `/run/current-system` containing
the specialisation's name (which `nixos-rebuild` could then use as the
default value for `--specialisation`), but I haven't been able to come
up with anything working (plus it would be a breaking change then).

Closes https://github.com/NixOS/nixpkgs/issues/174065
2023-01-15 18:16:49 +01:00
Felix Buehler
0214f02419 nixos/photoprism: add test 2023-01-15 18:02:46 +01:00
Francesco Gazzetta
cbe58afca0 nixosTests.mindustry: init 2023-01-15 13:11:37 +01:00
github-actions[bot]
4712ed9439
Merge master into staging-next 2023-01-14 00:02:26 +00:00
Robert Hensing
e973da60cd
Merge pull request #200225 from pacien/nixos-qemu-vm-restrictnetwork
nixos/qemu-vm: add option "restrictNetwork"
2023-01-13 21:47:21 +01:00
pacien
b25e0e8ebc nixos/tests: add qemu-vm-restrictnetwork test 2023-01-12 19:50:27 +01:00
github-actions[bot]
99dd0da8dc
Merge master into staging-next 2023-01-09 06:01:08 +00:00
Bobby Rong
21b9c3cee5
Merge pull request #209709 from bobby285271/init/nixosTests.mate
nixos/tests/mate: init
2023-01-09 12:38:19 +08:00
Bobby Rong
76c0fad164
nixos/tests/mate: init 2023-01-08 23:57:34 +08:00
github-actions[bot]
4bf238a8fb
Merge master into staging-next 2023-01-08 00:02:31 +00:00
Felix Buehler
0e2787884e nixos/freshrss: fix permissions and add database test 2023-01-06 21:16:50 +01:00
github-actions[bot]
0c98bf3e85
Merge staging-next into staging 2023-01-05 00:02:56 +00:00
Bjørn Forsman
1b80fc4204 nixos/tests/apcupsd.nix: init
This verifies that https://github.com/NixOS/nixpkgs/issues/208204
("apcupsd: apcaccess does not respect config from services.apcupsd") is
fixed.
2023-01-04 21:45:58 +01:00
github-actions[bot]
47507cf77a
Merge staging-next into staging 2023-01-04 06:01:44 +00:00
zowoq
469aec905b nixos/podman, podman: switch to netavark network stack 2023-01-04 14:25:14 +10:00
Jan Tojnar
5810109b42 Merge branch 'staging-next' into staging
- readline6 attribute removed from all-packages.nix in d879125d61
- readline attribute was bumped to readline82 in 50adabdd60
2023-01-02 03:04:32 +01:00
Ryan Lahfa
06542b21a0
Merge pull request #205636 from LoveIsGrief/webhook-module
nixos/webhook: add support for a webhook service option
2022-12-31 22:31:38 +01:00
Raito Bezarius
1db2175e7a nixos/garage: provide multiple versions to provide an upgrade path when using NixOS service
- Add mention to release notes 23.05
- Introduce Garage v0.8
- Protect against unexpected upgrade with stateVersion
- Test matrix over 0.7 × 0.8
2022-12-30 15:12:44 +01:00
Ryan Lahfa
30307eba48
Merge pull request #207453 from p-h/ulogd
ulogd: init at 2.0.8
2022-12-30 14:13:53 +01:00
Bobby Rong
de07c59526
Merge pull request #208060 from chpatrick/fix-gnome-flashback-systemd
gnome.gnome-flashback: fix crash on start due to not finding .desktops
2022-12-30 20:12:51 +08:00
Lucas Franceschino
e8e932bc80
nixos/webhook: init 2022-12-29 01:24:46 +01:00
Patrick Chilton
933b978fb9 gnome.gnome-flashback: add VM test 2022-12-29 00:35:21 +01:00
github-actions[bot]
aaaeebad7a
Merge staging-next into staging 2022-12-28 18:01:50 +00:00
Jörg Thalheim
741a0f5a7f envfs: init at 1.0.0 2022-12-28 16:03:49 +01:00
Sergei Trofimovich
092d57c076 Merge remote-tracking branch 'origin/staging-next' into staging
Conflicts:
    pkgs/development/tools/language-servers/ansible-language-server/default.nix
2022-12-28 09:35:37 +00:00
Ryan Lahfa
861c7b189c
Merge pull request #182360 from Yarny0/cups-pdf
cups-pdf(-to-pdf): init
2022-12-28 09:08:49 +01:00
Philippe Hürlimann
bcbedfeefc nixos/ulogd: init
Heavily based on original work by xvuko

Co-authored-by: xvuko <nix@vuko.pl>
2022-12-28 00:17:28 +01:00
Mikael Voss
a6f1bae946
nixos/tests/akkoma: init
This test is based in part on nixos/tests/pleroma.
2022-12-27 14:37:01 +01:00
Maciej Krüger
94373a589b
Merge pull request #203011 from duament/firewall-nftables 2022-12-26 00:57:24 +01:00
Jan Tojnar
72c37eddec Merge branch 'staging-next' into staging 2022-12-25 01:30:47 +01:00
Sandro
c8c8ac5cc6
Merge pull request #203449 from yaxitech/azure-quote-provider 2022-12-24 16:19:39 +01:00
Kristoffer Dalby
571780384a
headscale: Update to 0.17.1, conform module to RFC0042
This commit upgrades headscale to the newest version, 0.17.0 and updates
the module with the current breaking config changes.

In addition, the module is rewritten to conform with RFC0042 to try to
prevent some drift between the module and the upstream.

A new maintainer, Misterio77, is added as maintainer.

Signed-off-by: Kristoffer Dalby <kristoffer@tailscale.com>
Co-authored-by: Gabriel Fontes <hi@m7.rs>
Co-authored-by: Geoffrey Huntley <ghuntley@ghuntley.com>
2022-12-23 15:47:53 +01:00
Florian Klink
6b1a896570
Merge pull request #205121 from alaviss/homed
nixos: systemd-homed support
2022-12-23 13:09:17 +01:00
Rvfg
a43c7b2a70
nixos/{firewall, nat}: add a nftables based implementation 2022-12-23 00:49:24 +08:00
Cole Helbling
0598d95719 nixos/tests: expose bootspec test
On x86_64-linux only because bootspec is for NixOS (for the moment?),
and NixOS is really only a Linux concept (for the moment?).

Not on aarch64-linux because it fails for whatever reason 🤷
2022-12-22 07:56:09 -08:00
Michele Guerini Rocco
5dff7733aa
Merge pull request #203454 from rnhmjoj/pr-cups-socket
nixos/hardware/printers: stop cupsd when unneeded
2022-12-21 23:06:00 +01:00
Vincent Bernat
fc39b5ecc8 nginx: make global redirect vhost option accept exceptions
By moving the return into a location directive, one can provide
exceptions by adding locations. This is similar to what the forceSSL
option does.
2022-12-18 12:21:27 +01:00
Sandro
c338bf3244
Merge pull request #205712 from devusb/atuin-server 2022-12-16 22:38:35 +01:00
Izorkin
883a56c0cc
nixos/tests/mastodon: add test with external services 2022-12-16 16:19:41 +03:00
Morgan Helton
a935888d45 nixos/atuin: init module 2022-12-15 21:07:15 -06:00
Yarny0
85aeeac28d cups-pdf: add vm test 2022-12-09 22:20:09 +01:00
Leorize
05420f34cf nixos: add systemd-homed support
As a start, it's not very configurable, but works pretty well.
2022-12-09 12:10:51 -06:00
Artturi
8ffe22e286
Merge pull request #203956 from Artturin/addforbiddendependenciesregex
nixos/top-level.nix: add forbiddenDependenciesRegex option
2022-12-09 07:54:00 +02:00
Leorize
0cc87ab901 nixos/systemd/userdbd: add method to enable service
This is recommended to enable in conjunction with systemd-homed.
2022-12-08 10:28:41 -06:00
rnhmjoj
4f67365482
nixos/tests/printing: split into service/socket
This splits the tests into two: one where cups.socket is started
normally, the order with socket activation.

Why? It's almost impossible to follow the test with 4 different
machines printing at the same time. It should also be more efficient
because only two VMs at a time were needed anyway.
2022-12-07 15:57:45 +01:00
Yureka
a0e889791f nixos/tests/peering-manager: init 2022-12-07 12:54:55 +01:00
Robert Hensing
ab823e3a11 cassandra_4: init 2022-12-06 14:09:38 +01:00
Andreas Stührk
da0dc8339c nixos/aesmd: add option to configure quote provider library
Changes sgx-psw to append `aesm` to `LD_LIBRARY_PATH`:
- Append instead of prepend to allow for overriding in service config
- As we already add a wrapper to add `aesm` to `LD_LIBRARY_PATH` it is
  not necessary to also set in `LD_LIBRARY_PATH` of the systemd service.

Co-authored-by: Vincent Haupert <mail@vincent-haupert.de>
2022-12-04 20:12:50 +01:00
Artturin
a34d7b67fd nixos/top-level.nix: add forbiddenDependenciesRegex option
useful for making sure that there's no dev outputs in the system
2022-12-02 21:15:24 +02:00
Georg Haas
8d47058b32
nixos/tests/tayga: init 2022-12-01 11:17:39 +01:00
Daniel Nagy
807c2f1fc0
nixosTests.freenet: init 2022-11-30 12:15:00 +01:00
Sandro
9185121c22
Merge pull request #201060 from gador/sqlite3-to-mysql-init 2022-11-28 00:55:45 +01:00
Francesco Gazzetta
cc0182e2d1 nixosTests.warzone2100: init 2022-11-24 20:48:42 +01:00
Paul-Henri Froidmont
b8ffc572d2
nixos/patroni: only run tests on x86_64-linux
etcd doesn't support other architectures and refuses to start
2022-11-23 21:54:19 +01:00
Martin Weinelt
005233baa2
nixos/tests/evcc: init 2022-11-21 22:40:15 +01:00
Elis Hirwing
14cc62d7e6
Merge pull request #201000 from drupol/php/8.2.0
php82: init at 8.2.0rc6
2022-11-20 16:01:00 +01:00
tu-maurice
3144b00d24 btrbk: add doas variant of module test 2022-11-19 23:16:57 +01:00
Martin Weinelt
218e2f5e14
Merge pull request #193740 from illustris/hbase
hbase: remove 1.7, 2.4.11 -> 2.4.15, init 2.5.1, 3.0.0-alpha-2 -> alpha-3
2022-11-19 14:28:11 +01:00
Zhaofeng Li
3d185562b5 nixos/tests/phosh: init 2022-11-19 06:55:25 +01:00
Henri Menke
aeb5a692c3
nixos/alps: add hardening, extensible options, test 2022-11-17 17:12:54 +01:00
Pol Dellaiera
1812d1540e
php82: init at 8.2.0rc6 2022-11-16 18:57:26 +01:00
Franz Pletz
69f8e94c46
Merge pull request #199587 from lorenz/fscrypt
nixos/pam: support fscrypt login protectors
2022-11-14 09:42:35 +01:00