summary refs log tree commit diff
path: root/nixos
Commit message (Collapse)AuthorAge
* s6 experiments sixosAlyssa Ross2019-02-22
|
* Merge pull request #44439 from Ekleog/meta-testsTimo Kaufmann2018-11-07
|\ | | | | [RFC] Use `meta.tests` to link from packages to the tests that test them
| * dovecot, opensmtpd: add link to test in `meta.tests`Léo Gaspard2018-10-30
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Rationale --------- Currently, tests are hard to discover. For instance, someone updating `dovecot` might not notice that the interaction of `dovecot` with `opensmtpd` is handled in the `opensmtpd.nix` test. And even for someone updating `opensmtpd`, it requires manual work to go check in `nixos/tests` whether there is actually a test, especially given not so many packages in `nixpkgs` have tests and this is thus most of the time useless. Finally, for the reviewer, it is much easier to check that the “Tested via one or more NixOS test(s)” has been checked if the file modified already includes the list of relevant tests. Implementation -------------- Currently, this commit only adds the metadata in the package. Each element of the `meta.tests` attribute is a derivation that, when it builds successfully, means the test has passed (ie. following the same convention as NixOS tests). Future Work ----------- In the future, the tools could be made aware of this `meta.tests` attribute, and for instance a `--with-tests` could be added to `nix-build` so that it also builds all the tests. Or a `--without-tests` to build without all the tests. @Profpatsch described in his NixCon talk such systems. Another thing that would help in the future would be the possibility to reasonably easily have cross-derivation nix tests without the whole NixOS VM stack. @7c6f434c already proposed such a system. This RFC currently handles none of these concerns. Only the addition of `meta.tests` as metadata to be used by maintainers to remember to run relevant tests.
* | nixos/jupyter: wait for network.targetsveitser2018-11-06
| |
* | Merge pull request #49792 from griff/rspamd-multifile-enableFranz Pletz2018-11-06
|\ \ | | | | | | nixos/rspamd: Fix enable for locals and overrides
| * | nixos/rspamd: Fix enable for locals and overridesBrian Olsen2018-11-05
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When implementing #49620 I included an enable option for both the locals and overrides options but the code writing the files didn't actually look at enable and so would write the file regardless of its value. I also set the type to loaOf which should have been attrsOf since the code was not written to handle the options being lists. This fixes both of those issues.
* | | nixos: packagekit can no longer use "nix" default back-endPeter Simons2018-11-06
| | | | | | | | | | | | | | | | | | The code in question does not support Nix 2.0 yet. Closes https://github.com/NixOS/nixpkgs/issues/49793.
* | | Merge pull request #49354 from aanderse/fstab-escapingJörg Thalheim2018-11-06
|\ \ \ | | | | | | | | filesystems: escape spaces in fstab with \040
| * | | filesystems: escape spaces in fstab with \040Aaron Andersen2018-10-28
| | | |
* | | | Merge pull request #49516 from johanot/kubedns-to-corednsSarah Brofeldt2018-11-06
|\ \ \ \ | |_|/ / |/| | | nixos/kubernetes: KubeDNS -> CoreDNS
| * | | nixos/kubernetes: Added rl-1903 entry documenting kubedns -> corednsJohan Thomsen2018-10-31
| | | |
| * | | nixos/kubernetes: Replace KubeDNS with CoreDNSJohan Thomsen2018-10-31
| | | |
* | | | Merge pull request #49778 from gebner/rngd-versionGabriel Ebner2018-11-05
|\ \ \ \ | | | | | | | | | | nixos/rngd: do not pass --version flag
| * | | | nixos/rngd: do not pass --version flagGabriel Ebner2018-11-05
| | | | |
* | | | | Revert "NixOS tests: Wait for shell for 10x longer (50m)"Sarah Brofeldt2018-11-05
|/ / / / | | | | | | | | | | | | This reverts commit 9bc10e12916979c5c620be5b521b9218a0077cba.
* | | | Merge pull request #47679 from NixOS/docs-make-channelMatthew Bauer2018-11-04
|\ \ \ \ | | | | | | | | | | Document make-channel.nix
| * | | | Remove incorrect sentence from make-channel commentRobert Hensing2018-11-04
| | | | | | | | | | | | | | | | | | | | | | | | | Besides being incorrect, claims like these tend to stick around after they become incorrect.
| * | | | Document make-channel.nixLinus Heckemann2018-10-02
| | | | |
* | | | | Merge pull request #49670 from matthewbauer/pkgs-i686-removeMatthew Bauer2018-11-04
|\ \ \ \ \ | | | | | | | | | | | | Fix pkgsi686Linux assertion
| * | | | | treewide: remove pkgs_i686Matthew Bauer2018-11-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This was getting evaluated eagerly causing assertion failures in aarch64 systems. We can replace usages of pkgs_i686 with pkgs.pkgsi686Linux.
* | | | | | Merge pull request #44303 from pvgoran/tomcat-clean-basedirMichael Raskin2018-11-04
|\ \ \ \ \ \ | | | | | | | | | | | | | | nixos/tomcat: add purifyOnStart option
| * | | | | | nixos/tomcat: add purifyOnStart optionPavel Goran2018-10-29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With this option enabled, before creating file/directories/symlinks in baseDir according to configuration, old occurences of them are removed. This prevents remainders of an old configuration (libraries, webapps, you name it) from persisting after activating a new configuration.
* | | | | | | nixos/prometheus: check configuration before starting serviceAndreas Rammhold2018-11-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With `promtool` we can check the validity of a configuration before deploying it. This avoids situations where you would end up with a broken monitoring system without noticing it - since the monitoring broke down. :-)
* | | | | | | nixos/prometheus: add `package` optionAndreas Rammhold2018-11-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With a package option we can let the user decide what package to use for prometheus without requiring an overlay.
* | | | | | | Merge pull request #49746 from NixOS/fix-nixos-bash-completion-commentRobert Hensing2018-11-04
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | nixos: programs.bash: Fix comment about completion
| * | | | | | | nixos: programs.bash: Fix comment about completionRobert Hensing2018-11-04
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | `XDG_DATA_DIRS` already includes what is typically the `share` directory. Adding an extra `share` breaks it.
* | | | | | | | Merge pull request #49283 from aanderse/solrAndreas Rammhold2018-11-04
|\ \ \ \ \ \ \ \ | |/ / / / / / / |/| | | | | | | solr: 4.10.3 -> 7.5.0, refactor service to reflect major changes in version bump
| * | | | | | | solr: 4.10.3 -> 7.5.0, refactor service to reflect major changes in version ↵Aaron Andersen2018-11-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | bump, NixOS test included
* | | | | | | | Merge pull request #49687 from gnidorah/swayMichael Weiss2018-11-04
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | sway-beta module: add missing pieces
| * | | | | | | | sway-beta module: add missing piecesgnidorah2018-11-03
| | |_|/ / / / / | |/| | | | | |
* | | | | | | | gitlab module: fix config handlingRobin Gloster2018-11-04
| | | | | | | |
* | | | | | | | Merge pull request #49620 from griff/rspamd-multifileJoachim F2018-11-03
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | nixos/rspamd: Add support for included files
| * | | | | | | | nixos/rspamd: Add support for included filesBrian Olsen2018-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | By default rspamd will look for multiple files in /etc/rspamd/local.d and /etc/rspamd/override.d to be included in subsections of the merged final config for rspamd. Most of the config snippets in the official rspamd documentation are made to these files and so it makes sense for NixOS to support them and this is what this commit does. As part of rspamd 1.8.1 support was added for having custom Lua rules stored in $LOCAL_CONFDIR/rspamd.local.lua which means that it is now possible for NixOS to support such rules and so this commit also adds support for this to the rspamd module.
* | | | | | | | | nixos manual: Add changelog for consulNiklas Hambüchen2018-11-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Niklas Hambüchen <mail@nh2.me>
* | | | | | | | | consul: 0.9.3 -> 1.3.0.Niklas Hambüchen2018-11-03
| |_|/ / / / / / |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Removes the old UI build tooling; it is no longer necessary because as of 1.2.0 it's bundled into the server binary. It doesn't even need to have JS built, because it's bundled into the release commit's source tree (see #48714). The UI is enabled by default, so the NixOS service is updated to directly use `ui = webUi;` now. Fixes #48714. Fixes #44192. Fixes #41243. Fixes #35602. Signed-off-by: Niklas Hambüchen <mail@nh2.me>
* | | | | | | | nixos/google-network-daemon: systemd job type simple instead of oneshot (#49692)Sarah Brofeldt2018-11-03
| | | | | | | |
* | | | | | | | Merge pull request #49650 from srghma/srghma-patch-1Florian Klink2018-11-03
|\ \ \ \ \ \ \ \ | |_|/ / / / / / |/| | | | | | | amazon-image: fix typo in comment
| * | | | | | | fix typoSergei Khoma2018-06-03
| | | | | | | | | | | | | | | | | | | | | | | | based on https://www.ec2instances.info/
* | | | | | | | Merge pull request #49658 from mayflower/gitlab-refactorFlorian Klink2018-11-03
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | gitlab: refactor and fix test
| * | | | | | | | gitlab: refactor and fix testRobin Gloster2018-11-02
| | | | | | | | |
* | | | | | | | | nixos/dockerPreloader: preload docker images (#49379)lewo2018-11-03
|/ / / / / / / / | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This module permits to preload Docker image in a VM in order to reduce OIs on file copies. This module has to be only used in testing environments, when the test requires several Docker images such as in Kubernetes tests. In this case, `virtualisation.dockerPreloader.images` can replace the `services.kubernetes.kubelet.seedDockerImages` options. The idea is to populate the /var/lib/docker directory by mounting qcow files (we uses qcow file to avoid permission issues) that contain images. For each image specified in config.virtualisation.dockerPreloader.images: 1. The image is loaded by Docker in a VM 2. The resulting /var/lib/docker is written to a QCOW file This set of QCOW files can then be used to populate the /var/lib/docker: 1. Each QCOW is mounted in the VM 2. Symlink are created from these mount points to /var/lib/docker 3. A /var/lib/docker/image/overlay2/repositories.json file is generated 4. The docker daemon is started.
* | | | | | | | nixos/postgresql: add myself as maintainerAustin Seipp2018-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | | | | | | | nixos: fix #48917 by setting SYSTEMD_TIMEDATED_NTP_SERVICESAustin Seipp2018-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Setting this variable in the environment of systemd-timedated allows 'timedatectl' to tell if an NTP service is running. Closes #48917. Signed-off-by: Austin Seipp <aseipp@pobox.com>
* | | | | | | | Merge pull request #47526 from rnhmjoj/syncthingJoachim F2018-11-02
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | nixos/syncthing: move configuration to condigDir
| * | | | | | | | nixos/syncthing: move configuration to condigDirrnhmjoj2018-10-15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | fixes #47513 following the upstream recommended settings: https://github.com/syncthing/syncthing/issues/3434#issuecomment-235401876
* | | | | | | | | nixos/tests/chromium: Fix sandbox info matchingaszlig2018-11-02
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | As reported by @andir, the regular expressions that match the sandbox output are no longer matching in the recent Chromium bump as of bb03fbc2c8b97ef5a4f4205eee51029155164b8a. Instead of a boolean field that determines whether namespace sandboxes are on, the namespace sandbox is now an enum within "Layer 1 Sandbox". I've modified the regular expressions accordingly and also ran the test for the stable branch, which now succeeds. Signed-off-by: aszlig <aszlig@nix.build> Issue: https://github.com/NixOS/nixpkgs/issues/49442 Cc: @bendlas, @andir
* | | | | | | | | Merge pull request #49513 from dtzWill/fix/activation-nscd-pathWill Dietz2018-11-02
|\ \ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | | | activation-script: add libc to path to provide nscd when needed
| * | | | | | | | | activation-script: add libc to path to provide nscd when neededWill Dietz2018-10-31
| | |_|_|_|_|/ / / | |/| | | | | | |
* | | | | | | | | nixos/zerotier: binds to network-online.target to avoid the 1m30s timeout ↵obadz2018-11-01
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | before kill on shutdown
* | | | | | | | | nixos/kapacitor: new serviceSander van der Burg2018-11-01
| | | | | | | | |