Commit Graph

33247 Commits

Author SHA1 Message Date
ajs124
fbfa1ec989
Merge pull request #231190 from aanderse/nixos/automysqlbackup
nixos/automysqlbackup: add some missing permissions
2023-05-11 12:47:39 +02:00
Maximilian Bosch
501d0a65d4
nixos/tests/systemd-networkd-vrf: clean up
* Removed unused variables
* Deduplicate config for `node{1..3}`
2023-05-11 11:07:54 +02:00
Maximilian Bosch
8ccfd7a659
nixos/tests/systemd-networkd-vrf: fix build
For this round of ZHF: #230712
Failing Hydra build: https://hydra.nixos.org/build/219234565

Not sure why this a problem now and not in the past, but routes to
the corresponding `/24`-subnet are only configured if addresses are
specified with the correct CIDR.
2023-05-11 11:04:56 +02:00
Yaya
439625d5d5 nixosTests.gitlab: Use module system based runner 2023-05-11 07:31:13 +00:00
github-actions[bot]
d16e82bf21
Merge master into staging-next 2023-05-11 06:01:36 +00:00
Martin Weinelt
ec7af23e7e
Merge pull request #231153 from helsinki-systems/drop/trusted-grub
trustedGrub: remove
2023-05-11 02:05:25 +02:00
github-actions[bot]
079dc4c27d
Merge master into staging-next 2023-05-11 00:02:13 +00:00
Aaron Andersen
55b3b7029d nixos/automysqlbackup: rename config option to settings 2023-05-10 20:00:09 -04:00
Aaron Andersen
a73e7383c0 nixos/automysqlbackup: add some missing permissions 2023-05-10 19:57:48 -04:00
Ilan Joselevich
a8eea70935
Merge pull request #231113 from Kranzes/harmonia
nixos/harmonia: adjust module and test to upstream, harmonia: 0.6.3 -> 0.6.4
2023-05-11 00:37:41 +03:00
figsoda
9eff400dd9
Merge pull request #230939 from figsoda/sniffnet-module 2023-05-10 17:24:47 -04:00
ajs124
96fbdcedcd trustedGrub: remove 2023-05-10 22:17:56 +02:00
ajs124
1319323458 nixos/grub: turn definition of version option from an error into a warning
because a lot of configurations (generated by nixos-generate-config) contain it
2023-05-10 21:51:26 +02:00
ajs124
30bea8d82d nixos/*: remove boot.grub.version 2023-05-10 21:51:26 +02:00
ajs124
6db7450827 nixos/installer/grub1: remove 2023-05-10 21:51:26 +02:00
Ilan Joselevich
7ecf20b490
nixos/harmonia: adjust module and test to upstream 2023-05-10 22:28:03 +03:00
Arian van Putten
a33d032939 modules/rosetta: configure nix build sandbox to use rosetta
With this we can do x86_64 builds on aarch64
2023-05-10 14:28:50 -04:00
ajs124
81244087ab nixosTests.mysql-replication: fix deprecation warning 2023-05-10 18:22:41 +02:00
Ryan Lahfa
fe7b996d66
Merge pull request #230857 from s1341/bugfix_pam_sssd
nixos/pam: Allow password changing via sssd
2023-05-10 16:56:47 +02:00
Sandro
84b4373d8c
Merge pull request #230550 from Mic92/harmonia 2023-05-10 16:55:06 +02:00
Sandro
dfc76445d0
Merge pull request #228738 from Luflosi/update/aaaaxy 2023-05-10 16:02:19 +02:00
Robert Hensing
cd358fe24e nixos/all-tests.nix: Set nixpkgs.system 2023-05-10 15:55:09 +02:00
Robert Hensing
e5db80ae48 nixosModules.pkgsReadOnly: init 2023-05-10 15:55:09 +02:00
Robert Hensing
693e2c3287 nixos/eval-config: Remove statically known mkIf
mkIf is unnecessary when the condition is statically known - that is
knowable before entering the module evaluation.

By changing this to a precomputed module, we support changing the
defined options to readOnly options.
2023-05-10 15:55:09 +02:00
Robert Hensing
6e594fedb3 nixos/nixpkgs: Use types.pkgs 2023-05-10 15:55:09 +02:00
Robert Hensing
16d594a0e2 lib.types.pkgs: init
A nominal type.
2023-05-10 15:55:08 +02:00
happysalada
47bedc81f8 uptime-kuma: add defaults for simpler initial setup 2023-05-10 09:54:56 -04:00
Jörg Thalheim
76ffeaf06c nixos/harmonia: init service 2023-05-10 14:52:31 +02:00
Luflosi
220a0f4ca3
nixos/tests/aaaaxy: fix test
It got broken by 5c0aa81909.
The fix is to use a real X server instead of xvfb-run.
2023-05-10 14:45:01 +02:00
Sandro
7b22f5b4a2
Merge pull request #215494 from poelzi/webdav-server-rs-debug 2023-05-10 14:29:26 +02:00
github-actions[bot]
71874015ba
Merge master into staging-next 2023-05-10 12:01:10 +00:00
Jörg Thalheim
e758377984
Merge pull request #230926 from bachp/geth-test-zhf
nixos/geth: fix failing test
2023-05-10 07:23:24 +01:00
Pierre Bourdon
ac4abaa9d5
nixos/tests/nginx: fix etag test flakiness 2023-05-10 05:01:50 +02:00
github-actions[bot]
2d07e76d1a
Merge staging-next into staging 2023-05-10 00:03:33 +00:00
figsoda
282e5e03a8 nixos/sniffnet: init 2023-05-09 15:53:34 -04:00
asonix
cb2941db79 pict-rs: 0.3.0-alpha.37 -> 0.3.3 2023-05-09 15:24:54 -04:00
Pascal Bach
7e14b746c0
Merge pull request #230890 from linyinfeng/tocken
nixos/networkd: fix typo of `tokenBucketFilterConfig`
2023-05-09 20:49:37 +02:00
Pascal Bach
301ec4c067 nixos/geth: fix failing test
Run authrpc on different ports for main and testnet to avoid collision.
2023-05-09 20:35:28 +02:00
github-actions[bot]
b5b52a946a
Merge staging-next into staging 2023-05-09 18:02:32 +00:00
Martin Weinelt
42aaea3606
Merge pull request #230889 from mweinelt/shadow-encrypt-method
nixos/shadow: Set default encrypt method
2023-05-09 19:43:06 +02:00
Sandro
8f6cd53206
Merge pull request #229022 from SuperSandro2000/nox-mpv-wayland
nixos/no-x-libs: disable wayland for mpv
2023-05-09 19:07:16 +02:00
Weijia Wang
419d7f9c8d
Merge pull request #230753 from fetsorn/typos
several typos
2023-05-09 19:16:12 +03:00
Atemu
9c946bce87
Merge pull request #230680 from alyssais/netboot-squashfs
nixos/netboot: add squashfsCompression option
2023-05-09 18:13:27 +02:00
Ryan Lahfa
fb250ff2c9
Merge pull request #172340 from 06kellyjac/k3d
k3d: rename kube3d to k3d
2023-05-09 18:02:30 +02:00
s1341
d5fd433208 nixos/test/sssd-ldap: do new login on a different VT 2023-05-09 18:51:47 +03:00
Martin Weinelt
daf7d8861f
Merge pull request #230871 from IndeedNotJames/nixos-tests-2047mb
nixosTests.gitea,nixosTests.forgejo,nixosTests.wiki-js: fix test on `i686-linux`
2023-05-09 17:22:32 +02:00
s1341
73811d22bb nixos/test/sssd-ldap: nixpkgs-fmt 2023-05-09 18:13:09 +03:00
Lin Yinfeng
1e05869917
nixos/networkd: fix typo of tokenBucketFilterConfig 2023-05-09 23:06:47 +08:00
Martin Weinelt
a3c7dcd88d
nixos/shadow: Set default encrypt method
Fixes the default for tools like chpasswd, chgpasswd and gpasswd.

Closes: #230880
2023-05-09 17:05:34 +02:00
Sandro
d199137345
Merge pull request #230560 from legendofmiracles/upddate-nodjs-asf 2023-05-09 16:58:52 +02:00
Alyssa Ross
e5e49df7fd
nixos/netboot: add squashfsCompression option
This is copied from isoImage.squashfsCompression.  It's useful to be
able to customise, as iteration cycles are very slow with xz, and
subjectively systems booted with less efficiently compressed squashfs
stores appear to have faster reads (although I didn't test that
scientificly so there could be other factors).
2023-05-09 14:15:10 +00:00
Alyssa Ross
096cdeeac4
nixos/iso-image: type isoImage.squashfsCompression 2023-05-09 14:15:02 +00:00
fetsorn
5e77899001 nixos/tpm2: fix typo
"acess" -> "access"
2023-05-09 18:02:17 +04:00
fetsorn
1a4e993104 nixos/prometheus: fix typo
"nixpgs" -> "nixpkgs"
2023-05-09 18:02:17 +04:00
fetsorn
f035683f55 nixos/matomo: fix typo
"suported" -> "supported"
2023-05-09 18:02:17 +04:00
fetsorn
d1398dd05c nixos/deluge: fix typo
"secuerly" -> "securely"
2023-05-09 18:02:17 +04:00
fetsorn
ac5f6d9100 nixos/apparmor: fix typo
"usualy" -> "usually"
2023-05-09 18:02:17 +04:00
06kellyjac
6b78c0b80e k3d: add notice of rename in release notes 2023-05-09 14:22:59 +01:00
IndeedNotJames
260ddac146
nixosTests.wiki-js: fix test on i686-linux
Fail pattern:
1. Unsuspecting `qemu-kvm` notice:
```
server # qemu-kvm: at most 2047 MB RAM can be simulated
```

2. Hard fail
```
    self.shell.send(out_command.encode())
BrokenPipeError: [Errno 32] Broken pipe
```

(Took me a while to consider those lines are related)
2023-05-09 15:22:35 +02:00
IndeedNotJames
0cbeb283cf
nixosTests.gitea,nixosTests.forgejo: fix test on i686-linux
Fail pattern:
1. Unsuspecting `qemu-kvm` notice:
```
server # qemu-kvm: at most 2047 MB RAM can be simulated
```

2. Hard fail
```
    self.shell.send(out_command.encode())
BrokenPipeError: [Errno 32] Broken pipe
```

(Took me a while to consider those lines are related)
2023-05-09 15:21:53 +02:00
Martin Weinelt
558b23afe3
Merge pull request #230844 from pennae/mosquitto-test-fix
nixos/mosquitto: use networkd for tests
2023-05-09 14:57:30 +02:00
Martin Weinelt
35a73717df
Merge pull request #218599 from Izorkin/update-peertube
peertube: 5.0.0 -> 5.1.0
2023-05-09 14:37:44 +02:00
ajs124
ae9c464f31
Merge pull request #230822 from helsinki-systems/fix/mariadb-i686-tests
nixos/mariadb: Fix test on i686
2023-05-09 13:16:39 +02:00
Jacek Galowicz
b7dfa5082a
Merge pull request #228220 from R-VdP/test_driver_guest_shell_timeout
nixos-test-driver: include a timeout for the recv call, do not assume sh == bash
2023-05-09 13:05:28 +02:00
s1341
20d707c8c4 nixos/test/sssd-ldap: make tests actually check login, password change 2023-05-09 13:46:17 +03:00
s1341
e2d538fead pam: remove unused try_first_pass 2023-05-09 13:45:15 +03:00
s1341
765ae4d581 nixos/pam: allow changing password using sssd 2023-05-09 13:43:06 +03:00
Florian Klink
6c9bef6b0f
Merge pull request #230777 from nikstur/systemd-repart-definitions-in-initrd
systemd-repart definitions in initrd
2023-05-09 13:24:04 +03:00
Sandro
443a8f398a
Merge pull request #230756 from NixOS/fzf-fix 2023-05-09 11:54:38 +02:00
pennae
5f5b5a76b9 nixos/mosquitto: use networkd for tests
the non-networkd backend does not wait for slaac to finish (ie, ipv6
addresses coming out of tentative state), and that breaks the mosquitto
bind_interface test slightly. if slaac takes too long the test will run
into mosquitto restart limits and fail.
2023-05-09 11:41:17 +02:00
Janne Heß
20e186b7e2
nixos/mariadb: Fix test on i686
RocksDB is not built on that platform and the .so is missing
2023-05-09 09:15:52 +02:00
github-actions[bot]
b872b6b45c
Merge staging-next into staging 2023-05-09 06:01:52 +00:00
lom
ea1cef8c00 ArchiSteamFarm.ui: use buildNpmPackage 2023-05-08 20:34:21 -04:00
Aaron Andersen
cf0327810b
Merge pull request #207093 from ymarkus/alertmanager
nixos/alertmanager: add checkConfig option
2023-05-08 20:15:17 -04:00
github-actions[bot]
5b562cf621
Merge staging-next into staging 2023-05-09 00:02:44 +00:00
nikstur
d85abd2764 nixos/systemd-repart: definition files in initrd
Store the definition files in the initrd instead of reading them from
the Nix store in /sysroot.

This way, the initrd has to be re-generated every time the definition
files change. When the path to the defintion files instead of the
definition files themselves are embedded in the initrd, however, the
initrd also has to be re-generated every time. In this regard, this
change does not improve the status quo.

However, now systemd-repart also works reliable when the Nix store is
mounted separately from the root partition.

This change also enables new use-cases like creating partitions
necessary to boot the system. However, by default, the root partition
cannot be created on first boot because the systemd-repart service
requires a /sysroot to be mounted. Otherwise, systemd-repart cannot
determine the device to operate on.
2023-05-09 00:11:21 +02:00
nikstur
5c2a7490cf nixos/systemd-repart: fix
Since v253, systemd-repart tries to create temporary directories in
/var/tmp. However, this directory doesn't exist in the initrd. This
commit adds an enviroment variable to re-use the existing /tmp directory
instead of /var/tmp.
2023-05-08 23:12:59 +02:00
Izorkin
1afcb4c6ef
nixos/peertube: update nginx configuration 2023-05-08 23:49:03 +03:00
Izorkin
8d76c0b6fb
peertube: 5.0.0 -> 5.1.0 2023-05-08 23:48:32 +03:00
Ryan Lahfa
43a413de73
Merge pull request #230731 from NixOS/bump/netdata
netdata: 1.38.1 -> 1.39.0
2023-05-08 21:59:56 +02:00
Sandro Jäckel
edf57fef9b
nixos/fzf: fix evaluation if ohMyZsh is enabled 2023-05-08 21:10:28 +02:00
github-actions[bot]
54295bf976
Merge staging-next into staging 2023-05-08 18:02:09 +00:00
Raito Bezarius
16658f7634 nixos/netdata: introduce deadlineBeforeStopSec
Previously, we hardcoded a 60 second timer to stop netdata if we didn't have any answer back.
This is wrong and can cause data loss because the SIGTERM sent by systemd can sometimes be not honored.
Which in turn becomes a SIGKILL, causing potential data loss / corruption.

Offer a flag to users and bump the deadline to 2 minutes.
2023-05-08 19:29:13 +02:00
Ryan Lahfa
98167d573d
Merge pull request #229313 from mped-oticon/mped_proxmox_assert
nixos/proxmox-image: Disable O_DIRECT to fix assert when writing to tmpfs
2023-05-08 16:11:40 +02:00
Atemu
cb0f64e45d
Merge pull request #230665 from alyssais/iso-image-targetPlatform
nixos/iso-image: targetPlatform -> hostPlatform
2023-05-08 15:06:48 +02:00
Alyssa Ross
ecc1ec2c72 llvmPackages_latest: move to aliases.nix
Because llvmPackages_latest is used in Nixpkgs, by quite a few
packages, it's difficult to keep it up to date, because updating it
requires some level of confidence that every package that uses it is
going to keep working after the update.  The result of this is that
llvmPackages_latest is not updated, and so we end up in the situation
that "latest" is two versions older than the latest version we
actually provide.  This is confusing and unexpected.

"But won't this end up fragmenting our LLVM versions, if every package
previously using _latest is separately pinned to LLVM 14?", I hear you
ask.  No.  That fragmentation is already happening, even with an
llvmPackages_latest, because packages that actually require the
_latest_ version of LLVM (15/16), have already been decoupled from
llvmPackages_latest since it hasn't been upgraded.  So like it or not,
we can't escape packages depending on specific recent LLVMs.  The only
real fix is to get better at keeping the default LLVM up to
date (which I'm reasonably confident we're getting into a better
position to be feasibly better able to do).

So, unless we want to double down on providing a confusingly named
"llvmPackages_latest" attribute that refers to some arbitrary LLVM
version that's probably not the latest one (or even the latest one
available in Nixpkgs), we only have two options here: either we don't
provide such an attribute at all, or we don't use it in Nixpkgs so we
don't become scared to bump it as soon as we have a new LLVM available.
2023-05-08 13:05:33 +00:00
Weijia Wang
6a139314d8
Merge pull request #230653 from wineee/nixos/release.nix
nixos/release: add deepin closure
2023-05-08 15:47:47 +03:00
Nick Cao
aa7197b091
Merge pull request #230539 from OPNA2608/update/miriway
miriway: unstable-2023-03-17 -> unstable-2023-04-25
2023-05-08 20:27:47 +08:00
Alyssa Ross
bf7de549b9
nixos/iso-image: targetPlatform -> hostPlatform
This is not a compiler, and therefore does not need to care about the
target platform.
2023-05-08 11:50:06 +00:00
Mark Ruvald Pedersen
66fb2f539a nixos/proxmox-image: Disable O_DIRECT to fix assert
Context summary:
'vma create' can't otherwise write to tmpfs such as /dev/shm.
This is important when used from non-nixos machines which may
have /build as tmpfs.

VMA is Proxmox's virtual machine image format that wraps QEMU images,
augmenting these with proxmox-specific configuration file.
proxmox-image.nix uses the VMA tool to create vma image files.
The VMA tool exists as a patchset ontop of QEMU.

VMA writes its output with open() and O_DIRECT flag.
O_DIRECT does not work on Linux tmpfs [1]. Thus:
$ vma create ~/output.vma ...  # works, assuming home isn't tmpfs.
$ vma create /dev/shm/output.vma ...  # fails since /dev/shm is tmpfs
Failure results in assert(*errp == NULL).

O_DIRECT is a cache performance hint.
But it currently blocks our usage of nixos-generate -f proxmox from
Non-NixOS hosts and Docker.

The patch here simply removes O_DIRECT:
vma-writer.c later performs memalign due to O_DIRECT, but this is
safe to do with or without O_DIRECT.
Ideally, this should be fixed in upstream Proxmox: Perhaps by falling
back to open without O_DIRECT.

Another attempt to fix this SIGABRT is [2], which writes the vma file
directory to $out/ folder -- however that may still be tmpfs mounted
which it is in our case.

[1] https://lore.kernel.org/lkml/45A29EC2.8020502@tmr.com/t/
[2] https://github.com/NixOS/nixpkgs/pull/224282
2023-05-08 12:33:41 +02:00
rewine
82c778627d
nixos/release: add deepin closure 2023-05-08 18:25:41 +08:00
Jörg Thalheim
3288479636 nixos/envfs: make mounts non-critical
We usually don't want to bring the whole machine into emergency mode
just because we couldn't mount envfs. It's usually not on the critical
path.
2023-05-08 11:24:18 +02:00
github-actions[bot]
4532c723ec
Merge staging-next into staging 2023-05-08 00:02:49 +00:00
Sandro
6197953fb6
Merge pull request #207106 from autrimpo/gonic-module
nixos/gonic: init
2023-05-08 01:28:24 +02:00
Michal Koutenský
8118e3de43 nixos/gonic: init 2023-05-07 22:43:23 +02:00
Ilan Joselevich
6a751fe806
Merge pull request #227765 from zhaofengli/darling
darling: init at unstable-2023-05-02
2023-05-07 22:29:02 +03:00
github-actions[bot]
048e91e57b
Merge staging-next into staging 2023-05-07 18:01:53 +00:00
Bernardo Meurer
3cf3f4395a
Merge pull request #230449 from lovesegfault/mainsail-module 2023-05-07 11:49:59 -04:00
OPNA2608
fc3c5947a9 nixos/miriway: Adjust default and example config
The keybinds for the WM's internal commands have been made configurable.
2023-05-07 17:32:20 +02:00
github-actions[bot]
7b8084a6b9
Merge staging-next into staging 2023-05-07 12:02:13 +00:00