summary refs log tree commit diff
path: root/nixos/release.nix
Commit message (Collapse)AuthorAge
...
* | | Merge branch 'master' into stagingJan Malakhovski2018-05-26
|\| | | | | | | | | | | | | | | | | Fixed conflicts: - lib/systems/for-meta.nix: in favor of staging - pkgs/os-specific/darwin/xcode/default.nix: in favor of master
| * | nixos/slurm: add slurm test to release.nixMarkus Kowalewski2018-05-24
| | |
* | | Merge remote-tracking branch 'upstream/master' into stagingJohn Ericson2018-05-18
|\| |
| * | nixos/xss-lock: add module (#40619)Maximilian Bosch2018-05-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | `xsslock` (which was originally packaged in 6cb1d1aaaf02a72329bedf9c6960e54fea6f5c6e) is a simple screensaver which connects a given screen locker (e.g. `i3lock`) with `logind`. Whenever `loginctl lock-sessions` is invoked the locker will be used to lock the screen. This works with its power management features (e.g. `lid switch`) as well, so the PC can be locked automatically when the lid is closed. The module can be used like this: ``` { services.xserver.enable = true; programs.xss-lock.enable = true; programs.xss-lock.lockerCommand = "i3lock"; } ```
* | | Merge remote-tracking branch 'upstream/master' into stagingTuomas Tynkkynen2018-05-16
|\| | | | | | | | | | | | | | | | | Conflicts: pkgs/tools/networking/telnet/default.nix pkgs/top-level/aliases.nix
| * | Merge pull request #33371 from jtojnar/flatpakJan Tojnar2018-05-15
| |\ \ | | | | | | | | Flatpak
| | * | nixos/xdg-desktop-portal: add testJan Tojnar2018-05-15
| | | |
| | * | nixos/flatpak: add testJan Tojnar2018-05-15
| | | |
| * | | nexus: fix setup and nixos test (#40522)Maximilian Bosch2018-05-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The original `nexus` derivation required `/run/sonatype-work/nexus3` which explicitly depended on the NixOS path structure. This would break `nexus` for everyone using `nixpkgs` on a non-NixOS system, additionally the module never created `/run/sonatype-work`, so the systemd unit created in `services.nexus` fails as well. The issue wasn't actively known as the `nixos/nexus` test wasn't registered in Hydra (see #40257). This patch contains the following changes: * Adds `tests.nexus` to `release.nix` to run the test on Hydra. * Makes JVM parameters configurable: by default all JVM options were located in `result/bin/nexus.vmoptions` which made it quite hard to patch these parameters. Now it's possible to override all parameters by running `VM_OPTS_FILE=custom-nexus.vmoptions ./result/bin/nexus run` (after patching the `nexus` shell script), additionally it's possible to override these parameters with `services.nexus.vmoptions`. * Bumped Nexus from 3.5.1 to 3.11.0 * Run the `nexus` test on Hydra with `callTest` in `nixos/release.nix`, furthermore the test checks if the UI is available on the specified port. * Added myself as maintainer for the NixOS test and the package to have some more people in case of further breakage. * Added sufficient disk space to the `nexus` test, otherwise the service fails with the following errors: ``` com.orientechnologies.orient.core.exception.ODatabaseException: Cannot create database 'accesslog' com.orientechnologies.orient.core.exception.OLowDiskSpaceException: Error occurred while executing a write operation to database 'accesslog' due to limited free space on the disk (242 MB). The database is now working in read-only mode. Please close the database (or stop OrientDB), make room on your hard drive and then reopen the database. The minimal required space is 256 MB. Required space is now set to 256MB (you can change it by setting parameter storage.diskCache.diskFreeSpaceLimit) . ``` /cc @ironpinguin @xeji
* | | | Merge remote-tracking branch 'upstream/master' into stagingJohn Ericson2018-05-14
|\| | |
| * | | nixos/tests: prevent stateVersion warnings in evalUli Baum2018-05-15
| | | | | | | | | | | | | | | | | | | | ... introduced by 1f0b6922d3c continuation of 88fa50c2f2bbc472fe7169eac8f2a1b2312ef03b
* | | | Merge commit '92b7a814f26ee1d37e989431c18518c67285a332' into stagingJohn Ericson2018-05-13
|\| | |
| * | | nixos/tests/kafka: fix and refactor testsUli Baum2018-05-12
| |/ / | | | | | | | | | | | | | | | - refactor into single file for all versions - improve timing, prevent non-deterministic failures - fix tests for i686-linux
* | | Merge remote-tracking branch 'upstream/master' into stagingMatthew Bauer2018-05-08
|\| |
| * | Merge pull request #39526 (improve dhparams)aszlig2018-05-08
| |\ \ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This introduces an option that allows us to turn off stateful generation of Diffie-Hellman parameters, which in some way is still "stateful" as the generated DH params file is non-deterministic. However what we can avoid with this is to have an increased surface for failures during system startup, because generation of the parameters is done during build-time. Aside from adding a NixOS VM test it also restructures the type of the security.dhparams.params option, so that it's a submodule. A new defaultBitSize option is also there to allow users to set a system-wide default. I added a release notes entry that described what has changed and also included a few notes for module developers using this module, as the first usage already popped up in NixOS/nixpkgs#39507. Thanks to @Ekleog and @abbradar for reviewing.
| | * | nixos/dhparams: Add a VM testaszlig2018-04-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We're going to make changes to the dhparams module so we really want to make sure we don't break it, so having a NixOS VM test is to make sure we don't blow things up and can iterate on it. Signed-off-by: aszlig <aszlig@nix.build> Cc: @Ekleog
| * | | fleet: remove package, module, testUli Baum2018-05-05
| | | | | | | | | | | | | | | | deprecated and unmaintained upstream
| * | | panamax: remove packages, module and testUli Baum2018-05-05
| | | | | | | | | | | | | | | | | | | | was broken and depends on (deprecated) fleet packages: panamax_api, panamax_ui
* | | | Merge branch 'staging' into fix-ncurses-darwin-extensionsMatthew Justin Bauer2018-05-02
|\ \ \ \ | |/ / / |/| | |
| * | | nixos/release.nix: add tests.gdk-pixbufJan Tojnar2018-04-25
| | | |
* | | | hitch: init at 1.4.8 + service + test (#39358)Julien Langlois2018-05-01
| | | | | | | | | | | | | | | | Add the Hitch TLS reverse proxy as an option for TLS termination.
* | | | nixos/osquery: add testMaximilian Bosch2018-04-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Some time ago I fixed the broken package `osquery` (see #39336). I had to test the package manually by starting the daemon locally, however this doesn't ensure that the module is still functional. In order to cover the package *and* the integration with the NixOS module I thought that adding a testcase might be the best idea. The current testcase does the following things: * Starts an `osqueryd` service in a test machine with customized logger path and PID file * Ensures that the `osqueryd.service` unit is running * Checks if the customized flags (`pidfile`, `logger_path`) are applied to `osquery`. * Performs a simple test query against the `etc_hosts` database to check if the basic funcitonality of `osquery` (storing system information into a database) works fine.
* | | | nixos docs: Add a makefile for hacking on the nixos docsGraham Christensen2018-04-28
| |/ / |/| |
* | | Merge pull request #33679 from flokli/deluge-moduleMatthew Justin Bauer2018-04-25
|\ \ \ | |/ / |/| | Deluge: use mkEnableOption, add test
| * | deluge: add testFlorian Klink2018-04-13
| | |
* | | Merge pull request #27958 from LumiGuide/strongswan-swanctlMatthew Justin Bauer2018-04-21
|\ \ \ | | | | | | | | nixos: add the strongswan-swanctl service
| * | | nixos: add the strongswan-swanctl serviceBas van Dijk2018-02-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The strongswan-swanctl systemd service starts charon-systemd. This implements a IKE daemon very similar to charon, but it's specifically designed for use with systemd. It uses the systemd libraries for a native integration. Instead of using starter and an ipsec.conf based configuration, the daemon is directly managed by systemd and configured with the swanctl configuration backend. See: https://wiki.strongswan.org/projects/strongswan/wiki/Charon-systemd Note that the strongswan.conf and swantctl.conf configuration files are automatically generated based on NixOS options under services.strongswan-swanctl.strongswan and services.strongswan-swanctl.swanctl respectively.
* | | | Merge pull request #37786 from woffs/fixing-quaggaMatthew Justin Bauer2018-04-17
|\ \ \ \ | | | | | | | | | | quagga service: fix service and re-enable test
| * | | | quagga service: fix service and re-enable testFrank Doepper2018-03-25
| | |_|/ | |/| | | | | | | | | | | | | | adding quagga to quaggavty reverting 8a18e1f
* | | | nixos/release.nix: Add SD images for ARMv6 + ARMv7Tuomas Tynkkynen2018-04-16
| | | | | | | | | | | | | | | | | | | | | | | | These don't have affect the default Hydra setup (you need to pass the relevant system in the supportedSystem list) but let's add it for completeness and convenience.
* | | | docker-tools: add a test for permissions issues with AUFS/overlayDaiderd Jordan2018-04-14
| |_|/ |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | docker# [ 11.054736] d24d6cdd57c9[763]: /bin/bash: error while loading shared libraries: libreadline.so.7: cannot open shared object file: Permission denied docker# /bin/bash: error while loading shared libraries: libreadline.so.7: cannot open shared object file: Permission denied docker: exit status 127 docker: output: error: command `docker run --rm -u 1000:1000 bash /bin/bash --version' did not succeed (exit code 127) command `docker run --rm -u 1000:1000 bash /bin/bash --version' did not succeed (exit code 127)
* | | nixos/iftop: add moduleMaximilian Bosch2018-04-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This patch is heavily inspired by bd0d8ed807d29faa3deee96bafcbbd76c8fa4060 which added a setcap wrapper for `mtr` in order to allow running `mtr` without `sudo`. The need for the capability `cap_net_raw` that can be registered using `setcap` has been documented in the Arch Wiki: https://wiki.archlinux.org/index.php/Capabilities#iftop A simple testcase has been added which starts two machines, one with a setcap wrapper for `iftop`, one without. Both testcases monitor the bandwidth usage of the machine using the options `-t -s 1` once, the machine with setcap wrapper is expected to succeed, the `iftop` on the machine without setcap wrapper is expected to return a non-zero exit code.
* | | nixos/transmission: add basic nixos testCorey O'Connor2018-04-05
| | |
* | | Merge pull request #37218 from cstrahan/kube-test-fixCharles Strahan2018-04-04
|\ \ \ | | | | | | | | nixos: kubernetes fixes
| * | | nixos: kubernetes fixesCharles Strahan2018-03-30
| |/ / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Fix reference CNI plugins * The plugins were split out of the upstream cni repo around version 0.6.0 * Fix RBAC and DNS tests * Fix broken apiVersion fields * Change plugin linking to look in ${package}/bin rather than ${package.plugins} * Initial work towards a working e2e test * Test still fails, but at least the expression evaluates now Continues @srhb's work in #37199 Fixes #37199
* / / nixos/release.nix: Add Hydra job for AArch64 SD imageTuomas Tynkkynen2018-04-02
|/ / | | | | | | Based on how ISO images are added to the release.
* | Merge pull request #32960 from florianjacob/prosody-0.10Robin Gloster2018-03-22
|\ \ | | | | | | Prosody 0.10.0
| * | prosody: add test to release.nixRobin Gloster2018-03-22
| | |
* | | Merge remote-tracking branch 'upstream/master' into fix-cross-jobsJohn Ericson2018-03-19
|\ \ \
| * | | xautolock: implement basic test to confirm functionalityMaximilian Bosch2018-03-13
| |/ /
| * | nixos release: more evaluation fixesVladimír Čunát2018-03-07
| | | | | | | | | | | | ... if missing x86 in supportedSystems
| * | 18.03 -> 18.09Vladimír Čunát2018-03-05
| | | | | | | | | | | | I don't have a name ready :-( so I have to fill it later.
* | | release-lib: Filter supportedSystems with `meta.platforms`-style patternsJohn Ericson2018-03-19
|/ / | | | | | | | | | | | | | | | | | | | | | | | | Instead of intersecting system strings, we filter with the sort of patterns used in `meta.platforms`. Indicating this change `forTheseSystems` has been renamed to `forMatchingSystems`, since the given list is now patterns to match, and not the systems themselves. [Just as with `meta.platforms`, systems strings are also supported for backwards compatibility.] This is more flexible, and makes the `forMatchingSystems` and packagePlatforms` cases more analogous.
* | Merge pull request #32248 from awakesecurity/parnell/fetchdockerFranz Pletz2018-03-04
|\ \ | | | | | | Support fetching docker images from V2 registries
| * \ Merge remote-tracking branch 'upstream/master' into parnell/fetchdockerParnell Springmeyer2018-02-13
| |\ \
| * \ \ Merge remote-tracking branch 'upstream/master' into parnell/fetchdockerParnell Springmeyer2018-01-10
| |\ \ \
| | * | | Revert "nixos/dnscrypt-proxy: remove"rnhmjoj2018-01-08
| | | | | | | | | | | | | | | | | | | | | | | | | This reverts commit 5dc2853981b6e9287668dd17477375adfeb60ebf. The project has a new maintainer.
| | * | | nixos/dnscrypt-proxy: removeJoachim Fasting2018-01-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The upstream project ceased. See https://github.com/NixOS/nixpkgs/issues/33540
| * | | | fetchdocker: Integration test exercising hocker and fetchdockerParnell Springmeyer2017-12-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This change adds a simple integration test exercising the fetchdocker Nix code and hocker utilities for the simple `hello-world` docker container. We exercise: - Fetching the docker image configuration json - Fetching the docker image layers - Building a compositor script - Loading the `hello-world` docker image into docker using the compositor script and `docker load` - Running that loaded container
* | | | | Merge #35454: nixos/pump.io: removeVladimír Čunát2018-03-04
|\ \ \ \ \