about summary refs log tree commit diff
path: root/nixos/tests
Commit message (Collapse)AuthorAge
* Merge pull request #85781 from blitz/spike-testJacek Galowicz2020-04-25
|\ | | | | Add spike integration test to nixosTests
| * spike: add test to nixosTestsJulian Stecklina2020-04-22
| |
* | Revert "ibus: fix dconf db installation"worldofpeace2020-04-24
| |
* | Merge pull request #85892 from symphorien/ibus-dbworldofpeace2020-04-24
|\ \ | | | | | | ibus: fix dconf db installation
| * | nixos/tests/ibus: fix testSymphorien Gibol2020-04-24
| | |
* | | nixos/podman: Add rootless containers to testadisbladis2020-04-24
| | |
* | | installer test: Fix grub extraConfig syntaxBenjamin Staffin2020-04-22
| | | | | | | | | | | | | | | | | | | | | | | | | | | It looks like `terminal_output.serial` is incorrect, according to the grub documentation: https://www.gnu.org/software/grub/manual/grub/html_node/Serial-terminal.html Related PR: #79406
* | | Merge pull request #80103 from tfc/port-systemd-confinement-testFlorian Klink2020-04-23
|\ \ \ | |_|/ |/| | nixosTests.systemd-confinement: Port to Python
| * | nixosTests.systemd-confinement: Port to PythonJacek Galowicz2020-02-27
| | |
* | | nixosTests.redmine: Port to pythonJacek Galowicz2020-04-22
| | |
* | | Merge pull request #85402 from jtojnar/httpd-phpJan Tojnar2020-04-22
|\ \ \
| * | | nixosTests.php.fpm: Clean up to match httpd testJan Tojnar2020-04-17
| | | |
| * | | nixosTests.php.pcre: Clean upJan Tojnar2020-04-17
| | | | | | | | | | | | | | | | And add assertion messages
| * | | nixosTests.php.httpd: initJan Tojnar2020-04-17
| | | |
* | | | Merge pull request #85604 from adisbladis/podman-moduleadisbladis2020-04-21
|\ \ \ \ | | | | | | | | | | nixos/virtualisation.podman: Init module
| * | | | nixos/podman: Add maintainer team & add myself to podman teamadisbladis2020-04-21
| | | | |
| * | | | nixos/virtualisation.podman: Init moduleadisbladis2020-04-21
| | |_|/ | |/| |
* / | | systemd-networkd: add DHCPServer testTom Fitzhenry2020-04-22
|/ / /
* | | Merge pull request #83769 from dadada/nixos/dokuwiki-multi-serverMarek Mahut2020-04-20
|\ \ \ | | | | | | | | nixos/dokuwiki: add support for multi-site, additional plugins and templates
| * | | nixos/dokuwiki: change default of aclFile and usersFiledadada2020-04-18
| | | | | | | | | | | | | | | | | | | | `aclFile` and `usersFile` will be set to a default value if `aclUse` is specified and aclFile is not overriden by `acl`.
| * | | nixos/dokuwiki: add plugins and templates optionsdadada2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Adds support for additional plugins and templates similarly to how wordpress.nix does it. Plugins and templates need to be packaged as in the example.
| * | | nixos/dokuwiki: add <name?> optiondadada2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Enables multi-site configurations. This break compatibility with prior configurations that expect options for a single dokuwiki instance in `services.dokuwiki`.
* | | | nixos-containers: Add support for custom nixpkgs argumentadisbladis2020-04-20
| | | |
* | | | Merge pull request #85503 from emilazy/acme-test-cleanupsFlorian Klink2020-04-19
|\ \ \ \ | | | | | | | | | | ACME test cleanups
| * | | | nixos/tests/common/acme: don't set nameservers for clientEmily2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | The resolver is mainly useful for the ACME server, and acme.nix uses its own DNS server to test DNS-01 challenges.
| * | | | nixos/tests/common/acme: enable Pebble strict modeEmily2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This lets us get early warning about any bugs or backwards-compatibility hazards in lego. Pebble will default to this in the future, but doesn't currently; see https://github.com/letsencrypt/pebble/blob/v2.3.0/README.md#strict-mode.
| * | | | nixos/tests/acme: use CAP_NET_BIND_SERVICEEmily2020-04-18
| | | | |
| * | | | nixos/tests/acme: use *.test domainsEmily2020-04-18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Shimming out the Let's Encrypt domain name to reuse client configuration doesn't work properly (Pebble uses different endpoint URL formats), is recommended against by upstream,[1] and is unnecessary now that the ACME module supports specifying an ACME server. This commit changes the tests to use the domain name acme.test instead, and renames the letsencrypt node to acme to reflect that it has nothing to do with the ACME server that Let's Encrypt runs. The imports are renamed for clarity: * nixos/tests/common/{letsencrypt => acme}/{common.nix => client} * nixos/tests/common/{letsencrypt => acme}/{default.nix => server} The test's other domain names are also adjusted to use *.test for consistency (and to avoid misuse of non-reserved domain names such as standalone.com). [1] https://github.com/letsencrypt/pebble/issues/283#issuecomment-545123242 Co-authored-by: Yegor Timoshenko <yegortimoshenko@riseup.net>
| * | | | nixos/tests/acme: don't restrict to x86_64Emily2020-04-18
| | |/ / | |/| | | | | | | | | | | | | | | | | | This was added in aade4e577bbb27f044217c51a006ab6ba544ebb5, but the implementation of the ACME module has been entirely rewritten since then, and the test seems to run fine on AArch64.
* | | | Merge pull request #83301 from evils/tuptimeFlorian Klink2020-04-19
|\ \ \ \ | | | | | | | | | | Tuptime: Init Package, Module and Test
| * | | | nixosTests.tuptime: init testEvils2020-04-03
| | | | |
* | | | | Merge pull request #73934 from flokli/nixos-test-port-cockroachdbworldofpeace2020-04-19
|\ \ \ \ \ | | | | | | | | | | | | nixosTests.cockroachdb: port to python
| * | | | | nixosTests.cockroachdb: set ConditionPathExists=/dev/ptp0 to chronydFlorian Klink2020-04-03
| | | | | |
| * | | | | nixosTests.cockroachdb: bump memoryFlorian Klink2020-04-03
| | | | | | | | | | | | | | | | | | | | | | | | cockroachdb complained about not enough memory available.
| * | | | | nixosTests.cockroachdb: port to pythonFlorian Klink2020-04-03
| | | | | |
| * | | | | nixosTests.cockroachdb: add to all-tests.nixFlorian Klink2020-04-03
| |/ / / /
* | | | | Merge pull request #84522 from emilazy/add-linux-hardened-patchesYegor Timoshenko2020-04-19
|\ \ \ \ \ | |_|_|/ / |/| | | | linux_*_hardened: use linux-hardened patch set
| * | | | nixos/tests/hardened: add latestKernel argumentEmily2020-04-17
| | | | |
| * | | | nixos/hardened: enable user namespaces for rootEmily2020-04-17
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | linux-hardened sets kernel.unprivileged_userns_clone=0 by default; see anthraxx/linux-hardened@104f44058f058a395502192c4939645df6f52ecb. This allows the Nix sandbox to function while reducing the attack surface posed by user namespaces, which allow unprivileged code to exercise lots of root-only code paths and have lead to privilege escalation vulnerabilities in the past. We can safely leave user namespaces on for privileged users, as root already has root privileges, but if you're not running builds on your machine and really want to minimize the kernel attack surface then you can set security.allowUserNamespaces to false. Note that Chrome's sandbox requires either unprivileged CLONE_NEWUSER or setuid, and Firefox's silently reduces the security level if it isn't allowed (see about:support), so desktop users may want to set: boot.kernel.sysctl."kernel.unprivileged_userns_clone" = true;
* | | | | Merge #84442: staging-next branchVladimír Čunát2020-04-18
|\ \ \ \ \
| * \ \ \ \ Merge branch 'master' into staging-nextVladimír Čunát2020-04-18
| |\ \ \ \ \ | | | | | | | | | | | | | | | | | | | | | Hydra nixpkgs: ?compare=1582510
| * \ \ \ \ \ Merge branch 'master' into staging-nextJan Tojnar2020-04-16
| |\ \ \ \ \ \ | | | |_|_|/ / | | |/| | | |
| * | | | | | Merge branch 'master' into staging-nextJan Tojnar2020-04-13
| |\ \ \ \ \ \
| * \ \ \ \ \ \ Merge branch 'master' into staging-nextJan Tojnar2020-04-10
| |\ \ \ \ \ \ \
| * \ \ \ \ \ \ \ Merge staging into staging-nextFrederik Rietdijk2020-04-06
| |\ \ \ \ \ \ \ \
| | * \ \ \ \ \ \ \ Merge staging-next into stagingFrederik Rietdijk2020-04-03
| | |\ \ \ \ \ \ \ \
| | * | | | | | | | | tree-wide: Switch from gnome3.maintainers to lib.teams.gnomeJan Tojnar2020-04-01
| | | | | | | | | | |
* | | | | | | | | | | Merge pull request #83755 from jtojnar/jcat-0.1Jan Tojnar2020-04-18
|\ \ \ \ \ \ \ \ \ \ \ | |_|_|_|_|_|_|/ / / / |/| | | | | | | | | |
| * | | | | | | | | | libjcat: init at 0.1.1Jan Tojnar2020-04-15
| | | | | | | | | | |
* | | | | | | | | | | nixos/deluge: support 2.xMilan Pässler2020-04-18
| |_|_|_|_|_|_|/ / / |/| | | | | | | | |