about summary refs log tree commit diff
path: root/nixos/tests
Commit message (Collapse)AuthorAge
* nixos/network-interfaces: stop wrapping ping with cap_net_rawLin Jian2023-09-21
| | | | | | | | | | | | | | | | | | | | | From systemd 243 release note[1]: This release enables unprivileged programs (i.e. requiring neither setuid nor file capabilities) to send ICMP Echo (i.e. ping) requests by turning on the "net.ipv4.ping_group_range" sysctl of the Linux kernel for the whole UNIX group range, i.e. all processes. So this wrapper is not needed any more. See also [2] and [3]. This patch also removes: - apparmor profiles in NixOS for ping itself and the wrapped one - other references for the wrapped ping [1]: https://github.com/systemd/systemd/blob/8e2d9d40b33bc8e8f5d3479fb075d3fab32a4184/NEWS#L6457-L6464 [2]: https://github.com/systemd/systemd/pull/13141 [3]: https://fedoraproject.org/wiki/Changes/EnableSysctlPingGroupRange
* linux/hardened/patches/6.5: init at 6.5.3-hardened1Fabián Heredia Montiel2023-09-19
|
* Merge pull request #241973 from 999eagle/feat/synapse-workersMaximilian Bosch2023-09-18
|\ | | | | nixos/synapse: add support for workers, cleanup
| * nixos/synapse: move services.matrix-synapse.workers.config to ↵Sophie Tauchert2023-09-18
| | | | | | | | services.matrix-synapse.workers
| * nixos/synapse: document options betterSophie Tauchert2023-09-18
| | | | | | | | Co-authored-by: Daniel Olsen <daniel.olsen99@gmail.com>
| * nixos/synapse: add test for running synapse with workersSophie Tauchert2023-09-18
| | | | | | | | Co-authored-by: Daniel Olsen <daniel.olsen99@gmail.com>
* | nixosTests.docker-tools: bump diskSize from 2048 -> 3072Robert Scott2023-09-17
|/
* nixos/frp: add test and link to packagezaldnoay2023-09-17
|
* nixos/zfs: fix tests on zfsUnstableJörg Thalheim2023-09-17
|
* Merge pull request #250735 from TheNeikos/fix/discoursePol Dellaiera2023-09-14
|\ | | | | discourse: update 3.1.0.beta4 -> 3.1.0
| * nixosTests.discourse: Do not use deprecated fieldMarcel Müller2023-09-13
| |
* | Merge pull request #254512 from rnhmjoj/pr-anboxMichele Guerini Rocco2023-09-14
|\ \ | | | | | | anbox: always use postmarket OS images
| * | anbox: always use postmarket OS imagesrnhmjoj2023-09-11
| | |
* | | nixos/tests/shadow: test hashedPasswordFilernhmjoj2023-09-13
| | |
* | | Merge pull request #254181 from StillerHarpo/adguardhomeFabián Heredia Montiel2023-09-12
|\ \ \ | | | | | | | | nixos/adguardhome: Fix openFirewall
| * | | nixos/adguardhome: Fix openFirewallFlorian Engel2023-09-09
| | | | | | | | | | | | | | | | | | | | | | | | When not setting `settings` and setting `openFirewall = true` evaluation would fail because it tries to access `settings.bind_port` while `settings == null`
* | | | Merge pull request #248310 from emilylange/nixos/gitea-forgejo-splitHerwig Hochleitner2023-09-12
|\ \ \ \ | | | | | | | | | | | | | | | | | | | | nixos/forgejo: fork from nixos/gitea (split) close https://github.com/NixOS/nixpkgs/issues/244866
| * | | | nixosTests.forgejo: fork from nixosTests.giteaemilylange2023-08-06
| | | | |
* | | | | noto-fonts-emoji → noto-fonts-color-emojinicoo2023-09-12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Clarify that the monochrome font is not included, per #221181. The new name is also coherent with the name of the font, according to `fontconfig`: Noto Color Emoji.
* | | | | Merge pull request #254324 from marsam/update-postgisMario Rodas2023-09-12
|\ \ \ \ \ | | | | | | | | | | | | postgresqlPackages.postgis: 3.3.3 -> 3.4.0
| * | | | | postgresqlPackages.postgis: 3.3.3 -> 3.4.0Mario Rodas2023-09-08
| | | | | | | | | | | | | | | | | | | | | | | | Changelog: https://git.osgeo.org/gitea/postgis/postgis/raw/tag/3.4.0/NEWS
* | | | | | nixos/acme: rename option credentialsFile to environmentFiledatafoo2023-09-11
| | | | | |
* | | | | | nixos/swraid: fix regression for old initrd and add test coverageChristian Theune2023-09-10
| | | | | |
* | | | | | nixos/swraid: fix monitor serviceChristian Theune2023-09-10
| |_|_|/ / |/| | | |
* | | | | Merge pull request #251770 from robryk/suidwrapapparmPierre Bourdon2023-09-10
|\ \ \ \ \ | |/ / / / |/| | | | nixos/security/wrappers: simplifications and a fix for #98863 (respin of #199599)
| * | | | nixos/security/wrappers: add one regression test for #98863Robert Obryk2023-08-27
| | | | | | | | | | | | | | | | | | | | | | | | | Note that this regression test checks only s[gu]id wrappers. The issue for capability wrappers is not fixed yet.
| * | | | nixos/security/wrappers: stop using `.real` filesRobert Obryk2023-08-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Before this change it was crucial that nonprivileged users are unable to create hardlinks to SUID wrappers, lest they be able to provide a different `.real` file alongside. That was ensured by not providing a location writable to them in the /run/wrappers tmpfs, (unless disabled) by the fs.protected_hardlinks=1 sysctl, and by the explicit own-path check in the wrapper. After this change, ensuring that property is no longer important, and the check is most likely redundant. The simplification of expectations of the wrapper will make it easier to remove some of the assertions in the wrapper (which currently cause the wrapper to fail in no_new_privs environments, instead of executing the target with non-elevated privileges). Note that wrappers had to be copied (not symlinked) into /run/wrappers due to the SUID/capability bits, and they couldn't be hard/softlinks of each other due to those bits potentially differing. Thus, this change doesn't increase the amount of memory used by /run/wrappers. This change removes part of the test that is obsoleted by the removal of `.real` files.
| * | | | nixos/tests/wrappers: test apparmor configurationRobert Obryk2023-08-27
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Wrappers generate pieces of apparmor policies for inclusion, which are used only in a single place in nixpkgs, for `ping`. They are built only if apparmor is enabled. This change causes the test to test: - that the apparmor includes can be generated, - that `ping` works with apparmor enabled (as the only policy that references these includes). Ideally there would be some other NixOS test that verifies that `ping` specifically works. Sadly, there isn't one.
* | | | | security/acme: limit concurrent certificate generationsOliver Schmidt2023-09-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fixes #232505 Implements the new option `security.acme.maxConcurrentRenewals` to limit the number of certificate generation (or renewal) jobs that can run in parallel. This avoids overloading the system resources with many certificates or running into acme registry rate limits and network timeouts. Architecture considerations: - simplicity, lightweight: Concerns have been voiced about making this already rather complex module even more convoluted. Additionally, locking solutions shall not significantly increase performance and footprint of individual job runs. To accomodate these concerns, this solution is implemented purely in Nix, bash, and using the light-weight `flock` util. To reduce complexity, jobs are already assigned their lockfile slot at system build time instead of dynamic locking and retrying. This comes at the cost of not always maxing out the permitted concurrency at runtime. - no stale locks: Limiting concurrency via locking mechanism is usually approached with semaphores. Unfortunately, both SysV as well as POSIX-Semaphores are *not* released when the process currently locking them is SIGKILLed. This poses the danger of stale locks staying around and certificate renewal being blocked from running altogether. `flock` locks though are released when the process holding the file descriptor of the lock file is KILLed or terminated. - lockfile generation: Lock files could either be created at build time in the Nix store or at script runtime in a idempotent manner. While the latter would be simpler to achieve, we might exceed the number of permitted concurrent runs during a system switch: Already running jobs are still locked on the existing lock files, while jobs started after the system switch will acquire locks on freshly created files, not being blocked by the still running services. For this reason, locks are generated and managed at runtime in the shared state directory `/var/lib/locks/`. nixos/security/acme: move locks to /run also, move over permission and directory management to systemd-tmpfiles nixos/security/acme: fix some linter remarks in my code there are some remarks left for existing code, not touching that nixos/security/acme: redesign script locking flow - get rid of subshell - provide function for wrapping scripts in a locked environment nixos/acme: improve visibility of blocking on locks nixos/acme: add smoke test for concurrency limitation heavily inspired by m1cr0man nixos/acme: release notes entry on new concurrency limits nixos/acme: cleanup, clarifications
* | | | | Merge pull request #253739 from mweinelt/firefox-102-removalajs1242023-09-09
|\ \ \ \ \ | | | | | | | | | | | | firefox-esr-102-unwrapped: remove
| * | | | | firefox-esr-102-unwrapped: removeMartin Weinelt2023-09-07
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The Firefox ESR 102.0 series has reached its end of life. Removes package and test and references to them.
* | | | | | Merge pull request #251062 from ajs124/restic-wrapper-scriptJanik2023-09-09
|\ \ \ \ \ \
| * | | | | | nixos/restic: add wrapper scripts that set parameters for backupajs1242023-08-28
| | | | | | | | | | | | | | | | | | | | | | | | | | | | and use in test
* | | | | | | nixosTests.sudo: use same maintainers as the packagePierre Bourdon2023-09-08
| |_|_|_|/ / |/| | | | |
* | | | | | mobilizon: init at 3.1.3Kerstin Humm2023-09-07
| |/ / / / |/| | | | | | | | | | | | | | | | | | | Co-Authored-By: Minijackson <minijackson@riseup.net> Co-Authored-By: summersamara <summersamara@proton.me>
* | | | | Merge pull request #251987 from illdefined/akkomaWeijia Wang2023-09-06
|\ \ \ \ \ | | | | | | | | | | | | akkoma: 3.9.3 → 3.10.4
| * | | | | nixos/tests/akkoma: Disable retrieving timelineMikael Voss2023-09-05
| | |_|_|/ | |/| | |
* | | | | Merge pull request #252978 from oluceps/dae-upupWeijia Wang2023-09-05
|\ \ \ \ \ | | | | | | | | | | | | dae,nixos/dae: 0.2.4 -> 0.3.0
| * | | | | nixos/dae: add basic testoluceps2023-09-03
| | | | | |
* | | | | | Merge pull request #253146 from rnhmjoj/pr-anboxMichele Guerini Rocco2023-09-05
|\ \ \ \ \ \ | | | | | | | | | | | | | | anbox: unbreak
| * | | | | | nixos/tests/anbox: initMatt Votava2023-09-05
| |/ / / / /
* | | | | | nixos/tests/lxd: disable virtual-machine test on aarch64Adam Stephens2023-09-05
| | | | | |
* | | | | | nixos/lxd: add preseed optionAdam Stephens2023-09-05
| |/ / / / |/| | | |
* | | | | nixos/tests/jool: update for module changesrnhmjoj2023-09-04
| | | | |
* | | | | Merge pull request #253259 from mweinelt/custom-ca-firefox-memlimitMartin Weinelt2023-09-04
|\ \ \ \ \ | | | | | | | | | | | | nixosTests.custom-ca: resolve out of memory situations
| * | | | | nixosTests.custom-ca: resolve out of memory situationsMartin Weinelt2023-09-04
| |/ / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | They are easily observable on hydra. E.g. on the latest eval https://hydra.nixos.org/build/233893887 https://hydra.nixos.org/build/233900101
* | | | | Merge pull request #244093 from adamcstephens/lxd/vmMario Rodas2023-09-03
|\ \ \ \ \ | | | | | | | | | | | | lxd: Add VM image and server support for QEMU VMs
| * | | | | nixos/lxd: add virtual-machine support, image and moduleAdam Stephens2023-09-03
| | |_|/ / | |/| | |
* | | | | nixos/stalwart-mail: add vm testpacien2023-09-03
| |/ / / |/| | |
* | | | Merge pull request #251684 from jmbaur/user-activation-tmpfilesFlorian Klink2023-09-01
|\ \ \ \ | | | | | | | | | | nixos/systemd-user: call systemd-tmpfiles during activation