[bot] nixos/*: remove unused arguments in lambdas

volth 2e979e8c 1a6af9f8

Changed files
+419 -424
nixos
lib
maintainers
modules
config
hardware
installer
misc
profiles
programs
security
services
system
tasks
testing
virtualisation
tests
common
hadoop
hitch
hocker-fetchdocker
hydra
initrd-network-ssh
krb5
kubernetes
+1 -1
nixos/lib/build-vms.nix
···
machinesNumbered = zipLists machines (range 1 254);
nodes_ = flip map machinesNumbered (m: nameValuePair m.fst
-
[ ( { config, pkgs, nodes, ... }:
let
interfacesNumbered = zipLists config.virtualisation.vlans (range 1 255);
interfaces = flip map interfacesNumbered ({ fst, snd }:
···
machinesNumbered = zipLists machines (range 1 254);
nodes_ = flip map machinesNumbered (m: nameValuePair m.fst
+
[ ( { config, nodes, ... }:
let
interfacesNumbered = zipLists config.virtualisation.vlans (range 1 255);
interfaces = flip map interfacesNumbered ({ fst, snd }:
-3
nixos/lib/make-disk-image.nix
···
# most likely fails as GRUB will probably refuse to install.
partitionTableType ? "legacy"
-
# Whether to invoke switch-to-configuration boot during image creation
-
, installBootLoader ? true
-
, # The root file system type.
fsType ? "ext4"
···
# most likely fails as GRUB will probably refuse to install.
partitionTableType ? "legacy"
, # The root file system type.
fsType ? "ext4"
+1 -1
nixos/lib/make-iso9660-image.nix
···
-
{ stdenv, perl, closureInfo, xorriso, syslinux
, # The file name of the resulting ISO image.
isoName ? "cd.iso"
···
+
{ stdenv, closureInfo, xorriso, syslinux
, # The file name of the resulting ISO image.
isoName ? "cd.iso"
+1 -1
nixos/lib/testing.nix
···
runInMachineWithX = { require ? [], ... } @ args:
let
client =
-
{ config, pkgs, ... }:
{
inherit require;
virtualisation.memorySize = 1024;
···
runInMachineWithX = { require ? [], ... } @ args:
let
client =
+
{ ... }:
{
inherit require;
virtualisation.memorySize = 1024;
+2 -2
nixos/maintainers/option-usages.nix
···
else testOptions;
checkAll = checkList == [];
in
-
flip filter graph ({option, usedBy}:
(checkAll || elem option checkList)
&& !(elem option excludedTestOptions)
);
···
'';
graphToText = graph:
-
concatMapStrings ({option, usedBy}:
concatMapStrings (user: ''
${user}
'') usedBy
···
else testOptions;
checkAll = checkList == [];
in
+
flip filter graph ({option, ...}:
(checkAll || elem option checkList)
&& !(elem option excludedTestOptions)
);
···
'';
graphToText = graph:
+
concatMapStrings ({usedBy, ...}:
concatMapStrings (user: ''
${user}
'') usedBy
+1 -1
nixos/modules/config/no-x-libs.nix
···
# This module gets rid of all dependencies on X11 client libraries
# (including fontconfig).
-
{ config, lib, pkgs, ... }:
with lib;
···
# This module gets rid of all dependencies on X11 client libraries
# (including fontconfig).
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/config/nsswitch.nix
···
# Configuration for the Name Service Switch (/etc/nsswitch.conf).
-
{ config, lib, pkgs, ... }:
with lib;
···
# Configuration for the Name Service Switch (/etc/nsswitch.conf).
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/config/power-management.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/config/sysctl.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/config/unix-odbc-drivers.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/config/users-groups.nix
···
};
-
groupOpts = { name, config, ... }: {
options = {
···
};
+
groupOpts = { name, ... }: {
options = {
+1 -1
nixos/modules/config/vpnc.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/hardware/network/smc-2632w/default.nix
···
-
{lib, config, ...}:
{
hardware = {
···
+
{lib, ...}:
{
hardware = {
+1 -1
nixos/modules/hardware/network/zydas-zd1211.nix
···
-
{pkgs, config, ...}:
{
hardware.firmware = [ pkgs.zd1211fw ];
···
+
{pkgs, ...}:
{
hardware.firmware = [ pkgs.zd1211fw ];
+1 -1
nixos/modules/hardware/video/ati.nix
···
# This module provides the proprietary ATI X11 / OpenGL drivers.
-
{ config, lib, pkgs, pkgs_i686, ... }:
with lib;
···
# This module provides the proprietary ATI X11 / OpenGL drivers.
+
{ config, lib, pkgs_i686, ... }:
with lib;
+1 -1
nixos/modules/hardware/video/capture/mwprocapture.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -3
nixos/modules/hardware/video/uvcvideo/uvcdynctrl-udev-rules.nix
···
-
{ lib
-
, stdenv
-
, buildEnv
, libwebcam
, makeWrapper
, runCommand
···
+
{ buildEnv
, libwebcam
, makeWrapper
, runCommand
+1 -1
nixos/modules/installer/cd-dvd/installation-cd-graphical-kde-new-kernel.nix
···
-
{ config, pkgs, ... }:
{
imports = [ ./installation-cd-graphical-kde.nix ];
···
+
{ pkgs, ... }:
{
imports = [ ./installation-cd-graphical-kde.nix ];
+1 -1
nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel.nix
···
-
{ config, pkgs, ... }:
{
imports = [ ./installation-cd-minimal.nix ];
···
+
{ pkgs, ... }:
{
imports = [ ./installation-cd-minimal.nix ];
+1 -1
nixos/modules/installer/cd-dvd/installation-cd-minimal.nix
···
# This module defines a small NixOS installation CD. It does not
# contain any graphical stuff.
-
{ config, lib, pkgs, ... }:
{
imports =
···
# This module defines a small NixOS installation CD. It does not
# contain any graphical stuff.
+
{ ... }:
{
imports =
+1 -1
nixos/modules/installer/netboot/netboot-base.nix
···
# This module contains the basic configuration for building netboot
# images
-
{ config, lib, pkgs, ... }:
with lib;
···
# This module contains the basic configuration for building netboot
# images
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/installer/netboot/netboot-minimal.nix
···
# This module defines a small netboot environment.
-
{ config, lib, ... }:
{
imports =
···
# This module defines a small netboot environment.
+
{ ... }:
{
imports =
+1 -1
nixos/modules/installer/scan/detected.nix
···
# List all devices which are detected by nixos-generate-config.
# Common devices are enabled by default.
-
{ config, lib, pkgs, ... }:
with lib;
···
# List all devices which are detected by nixos-generate-config.
# Common devices are enabled by default.
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/installer/tools/tools.nix
···
# This module generates nixos-install, nixos-rebuild,
# nixos-generate-config, etc.
-
{ config, lib, pkgs, modulesPath, ... }:
with lib;
···
# This module generates nixos-install, nixos-rebuild,
# nixos-generate-config, etc.
+
{ config, lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/installer/virtualbox-demo.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/misc/assertions.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/misc/extra-arguments.nix
···
-
{ lib, pkgs, config, ... }:
{
_module.args = {
···
+
{ pkgs, ... }:
{
_module.args = {
+1 -1
nixos/modules/misc/ids.nix
···
# Systemd can also change ownership of service directories using the
# RuntimeDirectory/StateDirectory options.
-
{ config, pkgs, lib, ... }:
{
options = {
···
# Systemd can also change ownership of service directories using the
# RuntimeDirectory/StateDirectory options.
+
{ lib, ... }:
{
options = {
+1 -1
nixos/modules/misc/label.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/misc/lib.nix
···
-
{ config, lib, ... }:
{
options = {
···
+
{ lib, ... }:
{
options = {
+1 -1
nixos/modules/misc/locate.nix
···
-
{ config, options, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/misc/meta.nix
···
-
{ config, lib, ... }:
with lib;
···
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/misc/passthru.nix
···
# This module allows you to export something from configuration
# Use case: export kernel source expression for ease of configuring
-
{ config, lib, ... }:
{
options = {
···
# This module allows you to export something from configuration
# Use case: export kernel source expression for ease of configuring
+
{ lib, ... }:
{
options = {
+1 -1
nixos/modules/profiles/all-hardware.nix
···
# enabled in the initrd. Its primary use is in the NixOS installation
# CDs.
-
{ config, pkgs, ... }:
{
···
# enabled in the initrd. Its primary use is in the NixOS installation
# CDs.
+
{ ... }:
{
+1 -1
nixos/modules/profiles/base.nix
···
# This module defines the software packages included in the "minimal"
# installation CD. It might be useful elsewhere.
-
{ config, lib, pkgs, ... }:
{
# Include some utilities that are useful for installing or repairing
···
# This module defines the software packages included in the "minimal"
# installation CD. It might be useful elsewhere.
+
{ lib, pkgs, ... }:
{
# Include some utilities that are useful for installing or repairing
+1 -1
nixos/modules/profiles/demo.nix
···
-
{ config, pkgs, ... }:
{
imports = [ ./graphical.nix ];
···
+
{ ... }:
{
imports = [ ./graphical.nix ];
+1 -1
nixos/modules/profiles/graphical.nix
···
# This module defines a NixOS configuration with the Plasma 5 desktop.
# It's used by the graphical installation CD.
-
{ config, pkgs, ... }:
{
services.xserver = {
···
# This module defines a NixOS configuration with the Plasma 5 desktop.
# It's used by the graphical installation CD.
+
{ pkgs, ... }:
{
services.xserver = {
+1 -1
nixos/modules/profiles/hardened.nix
···
# A profile with most (vanilla) hardening options enabled by default,
# potentially at the cost of features and performance.
-
{ config, lib, pkgs, ... }:
with lib;
···
# A profile with most (vanilla) hardening options enabled by default,
# potentially at the cost of features and performance.
+
{ lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/profiles/headless.nix
···
# Common configuration for headless machines (e.g., Amazon EC2
# instances).
-
{ config, lib, pkgs, ... }:
with lib;
···
# Common configuration for headless machines (e.g., Amazon EC2
# instances).
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/profiles/minimal.nix
···
# This module defines a small NixOS configuration. It does not
# contain any graphical stuff.
-
{ config, lib, pkgs, ... }:
with lib;
···
# This module defines a small NixOS configuration. It does not
# contain any graphical stuff.
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/profiles/qemu-guest.nix
···
# Common configuration for virtual machines running under QEMU (using
# virtio).
-
{ config, pkgs, ... }:
{
boot.initrd.availableKernelModules = [ "virtio_net" "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_scsi" "9p" "9pnet_virtio" ];
···
# Common configuration for virtual machines running under QEMU (using
# virtio).
+
{ ... }:
{
boot.initrd.availableKernelModules = [ "virtio_net" "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_scsi" "9p" "9pnet_virtio" ];
+1 -1
nixos/modules/programs/atop.nix
···
# Global configuration for atop.
-
{ config, lib, pkgs, ... }:
with lib;
···
# Global configuration for atop.
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/programs/bcc.nix
···
-
{ config, lib, pkgs, ... }:
{
options.programs.bcc.enable = lib.mkEnableOption "bcc";
···
+
{ config, lib, ... }:
{
options.programs.bcc.enable = lib.mkEnableOption "bcc";
+1 -1
nixos/modules/programs/environment.nix
···
# Most of the stuff here should probably be moved elsewhere sometime.
-
{ config, lib, pkgs, ... }:
with lib;
···
# Most of the stuff here should probably be moved elsewhere sometime.
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/programs/shell.nix
···
# This module defines a standard configuration for NixOS shells.
-
{ config, lib, pkgs, ... }:
with lib;
···
# This module defines a standard configuration for NixOS shells.
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/programs/systemtap.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/security/hidepid.nix
···
-
{ config, pkgs, lib, ... }:
with lib;
{
···
+
{ config, lib, ... }:
with lib;
{
+1 -1
nixos/modules/security/oath.nix
···
# This module provides configuration for the OATH PAM modules.
-
{ config, lib, pkgs, ... }:
with lib;
···
# This module provides configuration for the OATH PAM modules.
+
{ lib, ... }:
with lib;
+2 -2
nixos/modules/services/backup/bacula.nix
···
${dir_cfg.extraConfig}
'';
-
directorOptions = {name, config, ...}:
{
options = {
password = mkOption {
···
};
};
-
deviceOptions = {name, config, ...}:
{
options = {
archiveDevice = mkOption {
···
${dir_cfg.extraConfig}
'';
+
directorOptions = {...}:
{
options = {
password = mkOption {
···
};
};
+
deviceOptions = {...}:
{
options = {
archiveDevice = mkOption {
+1 -1
nixos/modules/services/backup/borgbackup.nix
···
'';
default = { };
type = types.attrsOf (types.submodule (
-
{ name, config, ... }: {
options = {
path = mkOption {
···
'';
default = { };
type = types.attrsOf (types.submodule (
+
{ ... }: {
options = {
path = mkOption {
+1 -1
nixos/modules/services/backup/restic.nix
···
description = ''
Periodic backups to create with Restic.
'';
-
type = types.attrsOf (types.submodule ({ name, config, ... }: {
options = {
passwordFile = mkOption {
type = types.str;
···
description = ''
Periodic backups to create with Restic.
'';
+
type = types.attrsOf (types.submodule ({ name, ... }: {
options = {
passwordFile = mkOption {
type = types.str;
+1 -1
nixos/modules/services/continuous-integration/jenkins/slave.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.jenkinsSlave;
···
+
{ config, lib, ... }:
with lib;
let
cfg = config.services.jenkinsSlave;
+1 -1
nixos/modules/services/hardware/actkbd.nix
···
${cfg.extraConfig}
'';
-
bindingCfg = { config, ... }: {
options = {
keys = mkOption {
···
${cfg.extraConfig}
'';
+
bindingCfg = { ... }: {
options = {
keys = mkOption {
+1 -1
nixos/modules/services/hardware/nvidia-optimus.nix
···
-
{ config, pkgs, lib, ... }:
let kernel = config.boot.kernelPackages; in
···
+
{ config, lib, ... }:
let kernel = config.boot.kernelPackages; in
+1 -1
nixos/modules/services/hardware/sane_extra_backends/brscan4.nix
···
etcFiles = pkgs.callPackage ./brscan4_etc_files.nix { netDevices = netDeviceList; };
-
netDeviceOpts = { name, config, ... }: {
options = {
···
etcFiles = pkgs.callPackage ./brscan4_etc_files.nix { netDevices = netDeviceList; };
+
netDeviceOpts = { name, ... }: {
options = {
+1 -1
nixos/modules/services/logging/journalwatch.nix
···
-
{ config, lib, pkgs, services, ... }:
with lib;
let
···
+
{ config, lib, pkgs, ... }:
with lib;
let
+1 -1
nixos/modules/services/mail/dovecot.nix
···
special_use = \${toString mailbox.specialUse}
'' + "}";
-
mailboxes = { lib, pkgs, ... }: {
options = {
name = mkOption {
type = types.strMatching ''[^"]+'';
···
special_use = \${toString mailbox.specialUse}
'' + "}";
+
mailboxes = { ... }: {
options = {
name = mkOption {
type = types.strMatching ''[^"]+'';
+1 -1
nixos/modules/services/mail/mail.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/services/misc/emby.nix
···
-
{ config, pkgs, lib, mono, ... }:
with lib;
···
+
{ config, pkgs, lib, ... }:
with lib;
+1 -1
nixos/modules/services/misc/jackett.nix
···
-
{ config, pkgs, lib, mono, ... }:
with lib;
···
+
{ config, pkgs, lib, ... }:
with lib;
+1 -1
nixos/modules/services/misc/nix-gc.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/services/misc/nix-optimise.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/services/misc/nix-ssh-serve.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
let cfg = config.nix.sshServe;
···
+
{ config, lib, ... }:
with lib;
let cfg = config.nix.sshServe;
+1 -1
nixos/modules/services/misc/radarr.nix
···
-
{ config, pkgs, lib, mono, ... }:
with lib;
···
+
{ config, pkgs, lib, ... }:
with lib;
+1 -1
nixos/modules/services/misc/sonarr.nix
···
-
{ config, pkgs, lib, mono, ... }:
with lib;
···
+
{ config, pkgs, lib, ... }:
with lib;
+1 -1
nixos/modules/services/misc/taskserver/default.nix
···
in flatten (mapAttrsToList mkSublist attrs);
in all isNull (findPkiDefinitions [] manualPkiOptions);
-
orgOptions = { name, ... }: {
options.users = mkOption {
type = types.uniq (types.listOf types.str);
default = [];
···
in flatten (mapAttrsToList mkSublist attrs);
in all isNull (findPkiDefinitions [] manualPkiOptions);
+
orgOptions = { ... }: {
options.users = mkOption {
type = types.uniq (types.listOf types.str);
default = [];
+1 -1
nixos/modules/services/monitoring/prometheus/exporters.nix
···
};
});
-
mkSubModule = { name, port, extraOpts, serviceOpts }: {
${name} = mkOption {
type = types.submodule {
options = (mkExporterOpts {
···
};
});
+
mkSubModule = { name, port, extraOpts, ... }: {
${name} = mkOption {
type = types.submodule {
options = (mkExporterOpts {
+1 -1
nixos/modules/services/monitoring/smartd.nix
···
"DEVICESCAN ${notifyOpts}${cfg.defaults.autodetected}"}
'';
-
smartdDeviceOpts = { name, ... }: {
options = {
···
"DEVICESCAN ${notifyOpts}${cfg.defaults.autodetected}"}
'';
+
smartdDeviceOpts = { ... }: {
options = {
+1 -1
nixos/modules/services/network-filesystems/beegfs.nix
···
description = ''
BeeGFS configurations. Every mount point requires a separate configuration.
'';
-
type = with types; attrsOf (submodule ({ config, ... } : {
options = {
mgmtdHost = mkOption {
type = types.str;
···
description = ''
BeeGFS configurations. Every mount point requires a separate configuration.
'';
+
type = with types; attrsOf (submodule ({ ... } : {
options = {
mgmtdHost = mkOption {
type = types.str;
+1 -1
nixos/modules/services/network-filesystems/openafs/lib.nix
···
-
{ config, lib, pkgs, ...}:
let
inherit (lib) concatStringsSep getBin mkOption types;
···
+
{ config, lib, ...}:
let
inherit (lib) concatStringsSep getBin mkOption types;
+1 -1
nixos/modules/services/networking/avahi-daemon.nix
···
# Avahi daemon.
-
{ config, lib, utils, pkgs, ... }:
with lib;
···
# Avahi daemon.
+
{ config, lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/services/networking/cjdns.nix
···
cfg = config.services.cjdns;
connectToSubmodule =
-
{ options, ... }:
{ options =
{ password = mkOption {
type = types.str;
···
cfg = config.services.cjdns;
connectToSubmodule =
+
{ ... }:
{ options =
{ password = mkOption {
type = types.str;
+2 -2
nixos/modules/services/networking/i2pd.nix
···
outTunnels = mkOption {
default = {};
type = with types; loaOf (submodule (
-
{ name, config, ... }: {
options = {
destinationPort = mkOption {
type = types.int;
···
inTunnels = mkOption {
default = {};
type = with types; loaOf (submodule (
-
{ name, config, ... }: {
options = {
inPort = mkOption {
type = types.int;
···
outTunnels = mkOption {
default = {};
type = with types; loaOf (submodule (
+
{ name, ... }: {
options = {
destinationPort = mkOption {
type = types.int;
···
inTunnels = mkOption {
default = {};
type = with types; loaOf (submodule (
+
{ name, ... }: {
options = {
inPort = mkOption {
type = types.int;
+1 -1
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
···
-
{ config, lib, ... }:
{ options.services.nghttpx = {
enable = lib.mkEnableOption "nghttpx";
···
+
{ lib, ... }:
{ options.services.nghttpx = {
enable = lib.mkEnableOption "nghttpx";
+1 -1
nixos/modules/services/networking/nylon.nix
···
Deny-IP=${concatStringsSep " " cfg.deniedIPRanges}
'';
-
nylonOpts = { name, config, ... }: {
options = {
···
Deny-IP=${concatStringsSep " " cfg.deniedIPRanges}
'';
+
nylonOpts = { name, ... }: {
options = {
+1 -1
nixos/modules/services/networking/pptpd.nix
···
-
{ config, stdenv, pkgs, lib, ... }:
with lib;
···
+
{ config, pkgs, lib, ... }:
with lib;
+1 -1
nixos/modules/services/networking/shout.nix
···
-
{ pkgs, lib, config, options, ... }:
with lib;
···
+
{ pkgs, lib, config, ... }:
with lib;
+1 -1
nixos/modules/services/networking/ssh/sshd.nix
···
assertions = [{ assertion = if cfg.forwardX11 then cfgc.setXAuthLocation else true;
message = "cannot enable X11 forwarding without setting xauth location";}]
-
++ flip map cfg.listenAddresses ({ addr, port, ... }: {
assertion = addr != null;
message = "addr must be specified in each listenAddresses entry";
});
···
assertions = [{ assertion = if cfg.forwardX11 then cfgc.setXAuthLocation else true;
message = "cannot enable X11 forwarding without setting xauth location";}]
+
++ flip map cfg.listenAddresses ({ addr, ... }: {
assertion = addr != null;
message = "addr must be specified in each listenAddresses entry";
});
+1 -1
nixos/modules/services/networking/toxvpn.nix
···
-
{ config, stdenv, pkgs, lib, ... }:
with lib;
···
+
{ config, pkgs, lib, ... }:
with lib;
+1 -1
nixos/modules/services/networking/tvheadend.nix
···
-
{ config, coreutils, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/services/networking/wireguard.nix
···
# interface options
-
interfaceOpts = { name, ... }: {
options = {
···
# interface options
+
interfaceOpts = { ... }: {
options = {
+1 -1
nixos/modules/services/networking/xl2tpd.nix
···
-
{ config, stdenv, pkgs, lib, ... }:
with lib;
···
+
{ config, pkgs, lib, ... }:
with lib;
+1 -1
nixos/modules/services/networking/zerobin.nix
···
-
{ config, pkgs, lib, nodes, ... }:
with lib;
let
cfg = config.services.zerobin;
···
+
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.services.zerobin;
+1 -1
nixos/modules/services/security/oauth2_proxy_nginx.nix
···
-
{ pkgs, config, lib, ... }:
with lib;
let
cfg = config.services.oauth2_proxy.nginx;
···
+
{ config, lib, ... }:
with lib;
let
cfg = config.services.oauth2_proxy.nginx;
+2 -2
nixos/modules/services/security/tor.nix
···
];
}
'';
-
type = types.loaOf (types.submodule ({name, config, ...}: {
options = {
name = mkOption {
···
authorizeClient = mkOption {
default = null;
description = "If configured, the hidden service is accessible for authorized clients only.";
-
type = types.nullOr (types.submodule ({config, ...}: {
options = {
···
];
}
'';
+
type = types.loaOf (types.submodule ({name, ...}: {
options = {
name = mkOption {
···
authorizeClient = mkOption {
default = null;
description = "If configured, the hidden service is accessible for authorized clients only.";
+
type = types.nullOr (types.submodule ({...}: {
options = {
+1 -1
nixos/modules/services/torrent/flexget.nix
···
-
{ config, lib, pkgs, timezone, ... }:
with lib;
···
+
{ config, lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/services/web-apps/matomo.nix
···
-
{ config, lib, pkgs, services, ... }:
with lib;
let
cfg = config.services.matomo;
···
+
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.matomo;
+1 -1
nixos/modules/services/web-apps/youtrack.nix
···
-
{ config, lib, pkgs, options, ... }:
with lib;
···
+
{ config, lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/services/web-servers/apache-httpd/limesurvey.nix
···
-
{ config, lib, pkgs, serverInfo, php, ... }:
with lib;
···
+
{ config, lib, pkgs, serverInfo, ... }:
with lib;
+1 -1
nixos/modules/services/web-servers/apache-httpd/mercurial.nix
···
-
{ config, pkgs, serverInfo, lib, ... }:
let
inherit (pkgs) mercurial;
···
+
{ config, pkgs, lib, ... }:
let
inherit (pkgs) mercurial;
+1 -1
nixos/modules/services/web-servers/apache-httpd/wordpress.nix
···
-
{ config, lib, pkgs, serverInfo, php, ... }:
# http://codex.wordpress.org/Hardening_WordPress
with lib;
···
+
{ config, lib, pkgs, serverInfo, ... }:
# http://codex.wordpress.org/Hardening_WordPress
with lib;
+1 -1
nixos/modules/services/web-servers/nginx/vhost-options.nix
···
# has additional options that affect the web server as a whole, like
# the user/group to run under.)
-
{ config, lib }:
with lib;
{
···
# has additional options that affect the web server as a whole, like
# the user/group to run under.)
+
{ lib, ... }:
with lib;
{
+1 -1
nixos/modules/services/web-servers/zope2.nix
···
cfg = config.services.zope2;
-
zope2Opts = { name, config, ... }: {
options = {
name = mkOption {
···
cfg = config.services.zope2;
+
zope2Opts = { name, ... }: {
options = {
name = mkOption {
+1 -1
nixos/modules/services/x11/display-managers/auto.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/services/x11/terminal-server.nix
···
# not, a X server (Xvfb) is started for that user. The Xvfb instances
# persist across VNC sessions.
-
{ config, lib, pkgs, ... }:
with lib;
···
# not, a X server (Xvfb) is started for that user. The Xvfb instances
# persist across VNC sessions.
+
{ lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/services/x11/window-managers/default.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/services/x11/window-managers/wmii.nix
···
-
{ config, lib, pkgs, options, modulesPath, ... }:
with lib;
let
···
+
{ config, lib, pkgs, ... }:
with lib;
let
+1 -1
nixos/modules/services/x11/xserver.nix
···
-
{ config, lib, pkgs, pkgs_i686, ... }:
with lib;
···
+
{ config, lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/system/activation/top-level.nix
···
default = [];
example = lib.literalExample "[ ({ original = pkgs.openssl; replacement = pkgs.callPackage /path/to/openssl { }; }) ]";
type = types.listOf (types.submodule (
-
{ options, ... }: {
options.original = mkOption {
type = types.package;
description = "The original package to override.";
···
default = [];
example = lib.literalExample "[ ({ original = pkgs.openssl; replacement = pkgs.callPackage /path/to/openssl { }; }) ]";
type = types.listOf (types.submodule (
+
{ ... }: {
options.original = mkOption {
type = types.package;
description = "The original package to override.";
+1 -1
nixos/modules/system/boot/kexec.nix
···
-
{ config, pkgs, lib, ... }:
{
config = lib.mkIf (pkgs.kexectools.meta.available) {
···
+
{ pkgs, lib, ... }:
{
config = lib.mkIf (pkgs.kexectools.meta.available) {
+1 -1
nixos/modules/system/boot/loader/loader.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/system/boot/networkd.nix
···
};
-
networkConfig = { name, config, ... }: {
config = {
matchConfig = optionalAttrs (config.name != null) {
Name = config.name;
···
};
+
networkConfig = { config, ... }: {
config = {
matchConfig = optionalAttrs (config.name != null) {
Name = config.name;
+1 -1
nixos/modules/system/boot/resolved.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
let
···
+
{ config, lib, ... }:
with lib;
let
+3 -3
nixos/modules/system/boot/systemd.nix
···
x = pkgs.writeTextFile { name = "unit-script"; executable = true; destination = "/bin/${mkScriptName name}"; inherit text; };
in "${x}/bin/${mkScriptName name}";
-
unitConfig = { name, config, ... }: {
config = {
unitConfig =
optionalAttrs (config.requires != [])
···
];
};
-
mountConfig = { name, config, ... }: {
config = {
mountConfig =
{ What = config.what;
···
};
};
-
automountConfig = { name, config, ... }: {
config = {
automountConfig =
{ Where = config.where;
···
x = pkgs.writeTextFile { name = "unit-script"; executable = true; destination = "/bin/${mkScriptName name}"; inherit text; };
in "${x}/bin/${mkScriptName name}";
+
unitConfig = { config, ... }: {
config = {
unitConfig =
optionalAttrs (config.requires != [])
···
];
};
+
mountConfig = { config, ... }: {
config = {
mountConfig =
{ What = config.what;
···
};
};
+
automountConfig = { config, ... }: {
config = {
automountConfig =
{ Where = config.where;
+1 -1
nixos/modules/system/boot/timesyncd.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/tasks/bcache.nix
···
-
{ config, pkgs, ... }:
{
···
+
{ pkgs, ... }:
{
+1 -1
nixos/modules/tasks/filesystems/ext.nix
···
-
{ config, pkgs, ... }:
{
config = {
···
+
{ pkgs, ... }:
{
config = {
+1 -1
nixos/modules/tasks/network-interfaces-systemd.nix
···
-
{ config, lib, pkgs, utils, ... }:
with utils;
with lib;
···
+
{ config, lib, utils, ... }:
with utils;
with lib;
+1 -1
nixos/modules/tasks/network-interfaces.nix
···
-
{ config, options, lib, pkgs, utils, stdenv, ... }:
with lib;
with utils;
···
+
{ config, options, lib, pkgs, utils, ... }:
with lib;
with utils;
+1 -1
nixos/modules/tasks/swraid.nix
···
-
{ config, pkgs, ... }:
{
···
+
{ pkgs, ... }:
{
+1 -1
nixos/modules/tasks/trackpoint.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ config, lib, ... }:
with lib;
+1 -1
nixos/modules/testing/service-runner.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ lib, pkgs, ... }:
with lib;
+1 -1
nixos/modules/virtualisation/amazon-options.nix
···
-
{ config, lib, pkgs, ... }:
{
options = {
ec2 = {
···
+
{ config, lib, ... }:
{
options = {
ec2 = {
+1 -1
nixos/modules/virtualisation/azure-common.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
{
···
+
{ lib, pkgs, ... }:
with lib;
{
+1 -1
nixos/modules/virtualisation/azure-config-user.nix
···
-
{ config, pkgs, modulesPath, ... }:
{
# To build the configuration or use nix-env, you need to run
···
+
{ modulesPath, ... }:
{
# To build the configuration or use nix-env, you need to run
+1 -1
nixos/modules/virtualisation/azure-config.nix
···
-
{ config, pkgs, modulesPath, ... }:
{
imports = [ "${modulesPath}/virtualisation/azure-image.nix" ];
···
+
{ modulesPath, ... }:
{
imports = [ "${modulesPath}/virtualisation/azure-image.nix" ];
+1 -1
nixos/modules/virtualisation/brightbox-config.nix
···
-
{ config, pkgs, modulesPath, ... }:
{
imports = [ "${modulesPath}/virtualisation/brightbox-image.nix" ];
···
+
{ modulesPath, ... }:
{
imports = [ "${modulesPath}/virtualisation/brightbox-image.nix" ];
+2 -2
nixos/modules/virtualisation/containers.nix
···
system = config.nixpkgs.localSystem.system;
-
bindMountOpts = { name, config, ... }: {
options = {
mountPoint = mkOption {
···
};
-
allowedDeviceOpts = { name, config, ... }: {
options = {
node = mkOption {
example = "/dev/net/tun";
···
system = config.nixpkgs.localSystem.system;
+
bindMountOpts = { name, ... }: {
options = {
mountPoint = mkOption {
···
};
+
allowedDeviceOpts = { ... }: {
options = {
node = mkOption {
example = "/dev/net/tun";
+1 -1
nixos/modules/virtualisation/docker-image.nix
···
-
{ config, pkgs, ... }:
{
imports = [
···
+
{ ... }:
{
imports = [
+1 -1
nixos/modules/virtualisation/google-compute-config.nix
···
-
{ config, pkgs, ... }:
{
imports = [ <nixpkgs/nixos/modules/virtualisation/google-compute-image.nix> ];
···
+
{ ... }:
{
imports = [ <nixpkgs/nixos/modules/virtualisation/google-compute-image.nix> ];
+1 -1
nixos/modules/virtualisation/lxc-container.nix
···
-
{ config, pkgs, lib, ... }:
with lib;
···
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/virtualisation/nova-config.nix
···
-
{ config, lib, pkgs, ... }:
with lib;
···
+
{ lib, ... }:
with lib;
+1 -1
nixos/modules/virtualisation/xen-domU.nix
···
# Common configuration for Xen DomU NixOS virtual machines.
-
{ config, pkgs, ... }:
{
boot.loader.grub.version = 2;
···
# Common configuration for Xen DomU NixOS virtual machines.
+
{ ... }:
{
boot.loader.grub.version = 2;
+15 -15
nixos/release.nix
···
makeIso =
-
{ module, type, maintainers ? ["eelco"], system }:
with import nixpkgs { inherit system; };
···
makeSdImage =
-
{ module, maintainers ? ["dezgeg"], system }:
with import nixpkgs { inherit system; };
···
buildFromConfig = module: sel: forAllSystems (system: hydraJob (sel (import ./lib/eval-config.nix {
inherit system;
modules = [ module versionModule ] ++ singleton
-
({ config, lib, ... }:
{ fileSystems."/".device = mkDefault "/dev/sda1";
boot.loader.grub.device = mkDefault "/dev/sda";
});
···
channel = import lib/make-channel.nix { inherit pkgs nixpkgs version versionSuffix; };
-
manual = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manual);
-
manualEpub = (buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manualEpub));
-
manpages = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manpages);
-
manualGeneratedSources = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.generatedSources);
-
options = (buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.optionsJSON)).x86_64-linux;
# Build the initial ramdisk so Hydra can keep track of its size over time.
-
initialRamdisk = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.initialRamdisk);
netboot = forMatchingSystems [ "x86_64-linux" "aarch64-linux" ] (system: makeNetboot {
inherit system;
···
dummy = forAllSystems (system: pkgs.runCommand "dummy"
{ toplevel = (import lib/eval-config.nix {
inherit system;
-
modules = singleton ({ config, pkgs, ... }:
{ fileSystems."/".device = mkDefault "/dev/sda1";
boot.loader.grub.device = mkDefault "/dev/sda";
system.nixos.stateVersion = mkDefault "18.03";
···
closures = {
-
smallContainer = makeClosure ({ pkgs, ... }:
{ boot.isContainer = true;
services.openssh.enable = true;
});
-
tinyContainer = makeClosure ({ pkgs, ... }:
{ boot.isContainer = true;
imports = [ modules/profiles/minimal.nix ];
});
-
ec2 = makeClosure ({ pkgs, ... }:
{ imports = [ modules/virtualisation/amazon-image.nix ];
});
-
kde = makeClosure ({ pkgs, ... }:
{ services.xserver.enable = true;
services.xserver.displayManager.sddm.enable = true;
services.xserver.desktopManager.plasma5.enable = true;
});
-
xfce = makeClosure ({ pkgs, ... }:
{ services.xserver.enable = true;
services.xserver.desktopManager.xfce.enable = true;
});
···
makeIso =
+
{ module, type, system, ... }:
with import nixpkgs { inherit system; };
···
makeSdImage =
+
{ module, system, ... }:
with import nixpkgs { inherit system; };
···
buildFromConfig = module: sel: forAllSystems (system: hydraJob (sel (import ./lib/eval-config.nix {
inherit system;
modules = [ module versionModule ] ++ singleton
+
({ ... }:
{ fileSystems."/".device = mkDefault "/dev/sda1";
boot.loader.grub.device = mkDefault "/dev/sda";
});
···
channel = import lib/make-channel.nix { inherit pkgs nixpkgs version versionSuffix; };
+
manual = buildFromConfig ({ ... }: { }) (config: config.system.build.manual.manual);
+
manualEpub = (buildFromConfig ({ ... }: { }) (config: config.system.build.manual.manualEpub));
+
manpages = buildFromConfig ({ ... }: { }) (config: config.system.build.manual.manpages);
+
manualGeneratedSources = buildFromConfig ({ ... }: { }) (config: config.system.build.manual.generatedSources);
+
options = (buildFromConfig ({ ... }: { }) (config: config.system.build.manual.optionsJSON)).x86_64-linux;
# Build the initial ramdisk so Hydra can keep track of its size over time.
+
initialRamdisk = buildFromConfig ({ ... }: { }) (config: config.system.build.initialRamdisk);
netboot = forMatchingSystems [ "x86_64-linux" "aarch64-linux" ] (system: makeNetboot {
inherit system;
···
dummy = forAllSystems (system: pkgs.runCommand "dummy"
{ toplevel = (import lib/eval-config.nix {
inherit system;
+
modules = singleton ({ ... }:
{ fileSystems."/".device = mkDefault "/dev/sda1";
boot.loader.grub.device = mkDefault "/dev/sda";
system.nixos.stateVersion = mkDefault "18.03";
···
closures = {
+
smallContainer = makeClosure ({ ... }:
{ boot.isContainer = true;
services.openssh.enable = true;
});
+
tinyContainer = makeClosure ({ ... }:
{ boot.isContainer = true;
imports = [ modules/profiles/minimal.nix ];
});
+
ec2 = makeClosure ({ ... }:
{ imports = [ modules/virtualisation/amazon-image.nix ];
});
+
kde = makeClosure ({ ... }:
{ services.xserver.enable = true;
services.xserver.displayManager.sddm.enable = true;
services.xserver.desktopManager.plasma5.enable = true;
});
+
xfce = makeClosure ({ ... }:
{ services.xserver.enable = true;
services.xserver.desktopManager.xfce.enable = true;
});
+1 -1
nixos/tests/acme.nix
···
let
-
commonConfig = { config, lib, pkgs, nodes, ... }: {
networking.nameservers = [
nodes.letsencrypt.config.networking.primaryIPAddress
];
···
let
+
commonConfig = { lib, nodes, ... }: {
networking.nameservers = [
nodes.letsencrypt.config.networking.primaryIPAddress
];
+1 -1
nixos/tests/ammonite.nix
···
nodes = {
amm =
-
{ config, pkgs, ... }:
{
environment.systemPackages = [ pkgs.ammonite ];
};
···
nodes = {
amm =
+
{ pkgs, ... }:
{
environment.systemPackages = [ pkgs.ammonite ];
};
+2 -2
nixos/tests/atd.nix
···
-
import ./make-test.nix ({ pkgs, lib, ... }:
{
name = "atd";
···
};
machine =
-
{ config, pkgs, ... }:
{ services.atd.enable = true;
users.users.alice = { isNormalUser = true; };
};
···
+
import ./make-test.nix ({ pkgs, ... }:
{
name = "atd";
···
};
machine =
+
{ ... }:
{ services.atd.enable = true;
users.users.alice = { isNormalUser = true; };
};
+1 -1
nixos/tests/avahi.nix
···
};
nodes = let
-
cfg = { config, pkgs, ... }: {
services.avahi = {
enable = true;
nssmdns = true;
···
};
nodes = let
+
cfg = { ... }: {
services.avahi = {
enable = true;
nssmdns = true;
+3 -3
nixos/tests/beegfs.nix
···
-
import ./make-test.nix ({ pkgs, ... } :
let
connAuthFile="beegfs/auth-def.key";
-
client = { config, pkgs, lib, ... } : {
networking.firewall.enable = false;
services.beegfsEnable = true;
services.beegfs.default = {
···
};
-
server = service : { config, pkgs, lib, ... } : {
networking.firewall.enable = false;
boot.initrd.postDeviceCommands = ''
${pkgs.e2fsprogs}/bin/mkfs.ext4 -L data /dev/vdb
···
+
import ./make-test.nix ({ ... } :
let
connAuthFile="beegfs/auth-def.key";
+
client = { pkgs, ... } : {
networking.firewall.enable = false;
services.beegfsEnable = true;
services.beegfs.default = {
···
};
+
server = service : { pkgs, ... } : {
networking.firewall.enable = false;
boot.initrd.postDeviceCommands = ''
${pkgs.e2fsprogs}/bin/mkfs.ext4 -L data /dev/vdb
+4 -4
nixos/tests/bittorrent.nix
···
nodes =
{ tracker =
-
{ config, pkgs, ... }:
{ environment.systemPackages = [ pkgs.transmission pkgs.opentracker ];
# We need Apache on the tracker to serve the torrents.
···
};
router =
-
{ config, pkgs, ... }:
{ environment.systemPackages = [ pkgs.miniupnpd ];
virtualisation.vlans = [ 1 2 ];
networking.nat.enable = true;
···
};
client1 =
-
{ config, pkgs, nodes, ... }:
{ environment.systemPackages = [ pkgs.transmission ];
virtualisation.vlans = [ 2 ];
networking.defaultGateway =
···
};
client2 =
-
{ config, pkgs, ... }:
{ environment.systemPackages = [ pkgs.transmission ];
networking.firewall.enable = false;
};
···
nodes =
{ tracker =
+
{ pkgs, ... }:
{ environment.systemPackages = [ pkgs.transmission pkgs.opentracker ];
# We need Apache on the tracker to serve the torrents.
···
};
router =
+
{ pkgs, ... }:
{ environment.systemPackages = [ pkgs.miniupnpd ];
virtualisation.vlans = [ 1 2 ];
networking.nat.enable = true;
···
};
client1 =
+
{ pkgs, nodes, ... }:
{ environment.systemPackages = [ pkgs.transmission ];
virtualisation.vlans = [ 2 ];
networking.defaultGateway =
···
};
client2 =
+
{ pkgs, ... }:
{ environment.systemPackages = [ pkgs.transmission ];
networking.firewall.enable = false;
};
+2 -2
nixos/tests/borgbackup.nix
···
};
nodes = {
-
client = { config, pkgs, ... }: {
services.borgbackup.jobs = {
local = rec {
···
};
};
-
server = { config, pkgs, ... }: {
services.openssh = {
enable = true;
passwordAuthentication = false;
···
};
nodes = {
+
client = { ... }: {
services.borgbackup.jobs = {
local = rec {
···
};
};
+
server = { ... }: {
services.openssh = {
enable = true;
passwordAuthentication = false;
+3 -3
nixos/tests/buildbot.nix
···
name = "buildbot";
nodes = {
-
bbmaster = { config, pkgs, ... }: {
services.buildbot-master = {
enable = true;
package = pkgs.buildbot-full;
···
environment.systemPackages = with pkgs; [ git buildbot-full ];
};
-
bbworker = { config, pkgs, ... }: {
services.buildbot-worker = {
enable = true;
masterUrl = "bbmaster:9989";
···
environment.systemPackages = with pkgs; [ git buildbot-worker ];
};
-
gitrepo = { config, pkgs, ... }: {
services.openssh.enable = true;
networking.firewall.allowedTCPPorts = [ 22 9418 ];
environment.systemPackages = with pkgs; [ git ];
···
name = "buildbot";
nodes = {
+
bbmaster = { pkgs, ... }: {
services.buildbot-master = {
enable = true;
package = pkgs.buildbot-full;
···
environment.systemPackages = with pkgs; [ git buildbot-full ];
};
+
bbworker = { pkgs, ... }: {
services.buildbot-worker = {
enable = true;
masterUrl = "bbmaster:9989";
···
environment.systemPackages = with pkgs; [ git buildbot-worker ];
};
+
gitrepo = { pkgs, ... }: {
services.openssh.enable = true;
networking.firewall.allowedTCPPorts = [ 22 9418 ];
environment.systemPackages = with pkgs; [ git ];
+2 -2
nixos/tests/cadvisor.nix
···
};
nodes = {
-
machine = { config, pkgs, ... }: {
services.cadvisor.enable = true;
};
-
influxdb = { config, pkgs, lib, ... }: with lib; {
services.cadvisor.enable = true;
services.cadvisor.storageDriver = "influxdb";
services.influxdb.enable = true;
···
};
nodes = {
+
machine = { ... }: {
services.cadvisor.enable = true;
};
+
influxdb = { lib, ... }: with lib; {
services.cadvisor.enable = true;
services.cadvisor.storageDriver = "influxdb";
services.influxdb.enable = true;
+3 -3
nixos/tests/cassandra.nix
···
name = "cassandra-ci";
nodes = {
-
cass0 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.1" {};
-
cass1 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.2" {};
-
cass2 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.3" {
extraParams = [
''JVM_OPTS="$JVM_OPTS -Dcassandra.replace_address=192.168.1.2"''
];
···
name = "cassandra-ci";
nodes = {
+
cass0 = { nodes, ... }: nodeCfg nodes "192.168.1.1" {};
+
cass1 = { nodes, ... }: nodeCfg nodes "192.168.1.2" {};
+
cass2 = { nodes, ... }: nodeCfg nodes "192.168.1.3" {
extraParams = [
''JVM_OPTS="$JVM_OPTS -Dcassandra.replace_address=192.168.1.2"''
];
+2 -2
nixos/tests/ceph.nix
···
};
nodes = {
-
aio = { config, pkgs, ... }: {
virtualisation = {
emptyDiskImages = [ 20480 20480 ];
vlans = [ 1 ];
···
};
};
-
testScript = { nodes, ... }: ''
startAll;
$aio->waitForUnit("network.target");
···
};
nodes = {
+
aio = { pkgs, ... }: {
virtualisation = {
emptyDiskImages = [ 20480 20480 ];
vlans = [ 1 ];
···
};
};
+
testScript = { ... }: ''
startAll;
$aio->waitForUnit("network.target");
+4 -4
nixos/tests/cjdns.nix
···
carolPassword = "678287829ce4c67bc8b227e56d94422ee1b85fa11618157b2f591de6c6322b52";
basicConfig =
-
{ config, pkgs, ... }:
{ services.cjdns.enable = true;
# Turning off DHCP isn't very realistic but makes
···
nodes = rec
{ # Alice finds peers over over ETHInterface.
alice =
-
{ config, ... }:
{ imports = [ basicConfig ];
services.cjdns.ETHInterface.bind = "eth1";
···
# Bob explicitly connects to Carol over UDPInterface.
bob =
-
{ config, lib, nodes, ... }:
{ imports = [ basicConfig ];
···
# Carol listens on ETHInterface and UDPInterface,
# but knows neither Alice or Bob.
carol =
-
{ config, lib, nodes, ... }:
{ imports = [ basicConfig ];
environment.etc."cjdns.keys".text = ''
···
carolPassword = "678287829ce4c67bc8b227e56d94422ee1b85fa11618157b2f591de6c6322b52";
basicConfig =
+
{ ... }:
{ services.cjdns.enable = true;
# Turning off DHCP isn't very realistic but makes
···
nodes = rec
{ # Alice finds peers over over ETHInterface.
alice =
+
{ ... }:
{ imports = [ basicConfig ];
services.cjdns.ETHInterface.bind = "eth1";
···
# Bob explicitly connects to Carol over UDPInterface.
bob =
+
{ ... }:
{ imports = [ basicConfig ];
···
# Carol listens on ETHInterface and UDPInterface,
# but knows neither Alice or Bob.
carol =
+
{ ... }:
{ imports = [ basicConfig ];
environment.etc."cjdns.keys".text = ''
+1 -1
nixos/tests/cloud-init.nix
···
maintainers = [ lewo ];
};
machine =
-
{ config, pkgs, ... }:
{
virtualisation.qemu.options = [ "-cdrom" "${metadataDrive}/metadata.iso" ];
services.cloud-init.enable = true;
···
maintainers = [ lewo ];
};
machine =
+
{ ... }:
{
virtualisation.qemu.options = [ "-cdrom" "${metadataDrive}/metadata.iso" ];
services.cloud-init.enable = true;
+1 -1
nixos/tests/common/user-account.nix
···
-
{ lib, ... }:
{ users.users.alice =
{ isNormalUser = true;
···
+
{ ... }:
{ users.users.alice =
{ isNormalUser = true;
+1 -1
nixos/tests/containers-bridge.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
+1 -1
nixos/tests/containers-extra_veth.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
+1 -1
nixos/tests/containers-hosts.nix
···
};
machine =
-
{ config, pkgs, lib, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [];
···
};
machine =
+
{ lib, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [];
+1 -1
nixos/tests/containers-ipv4.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
+1 -1
nixos/tests/containers-ipv6.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
+2 -2
nixos/tests/containers-macvlans.nix
···
nodes = {
machine1 =
-
{ config, pkgs, lib, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
···
};
machine2 =
-
{ config, pkgs, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
···
nodes = {
machine1 =
+
{ lib, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
···
};
machine2 =
+
{ ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
+4 -4
nixos/tests/containers-physical_interfaces.nix
···
};
nodes = {
-
server = { config, pkgs, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
···
};
};
};
-
bridged = { config, pkgs, ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
···
};
};
-
bonded = { config, pkgs, ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
···
};
};
-
bridgedbond = { config, pkgs, ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
···
};
nodes = {
+
server = { ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
···
};
};
};
+
bridged = { ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
···
};
};
+
bonded = { ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
···
};
};
+
bridgedbond = { ... }: {
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
+1 -1
nixos/tests/containers-portforward.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
+3 -3
nixos/tests/containers-reloadable.nix
···
};
nodes = {
-
client = { lib, pkgs, ... }: {
imports = [ client_base ];
};
-
client_c1 = { lib, pkgs, ... }: {
imports = [ client_base ];
containers.test1.config = {
···
services.httpd.adminAddr = "nixos@example.com";
};
};
-
client_c2 = { lib, pkgs, ... }: {
imports = [ client_base ];
containers.test1.config = {
···
};
nodes = {
+
client = { ... }: {
imports = [ client_base ];
};
+
client_c1 = { lib, ... }: {
imports = [ client_base ];
containers.test1.config = {
···
services.httpd.adminAddr = "nixos@example.com";
};
};
+
client_c2 = { lib, ... }: {
imports = [ client_base ];
containers.test1.config = {
+4 -4
nixos/tests/containers-restart_networking.nix
···
};
};
};
-
in import ./make-test.nix ({ pkgs, lib, ...} :
{
name = "containers-restart_networking";
meta = with pkgs.stdenv.lib.maintainers; {
···
};
nodes = {
-
client = { lib, pkgs, ... }: client_base // {
virtualisation.vlans = [ 1 ];
networking.bridges.br0 = {
···
};
};
-
client_eth1 = { lib, pkgs, ... }: client_base // {
networking.bridges.br0 = {
interfaces = [ "eth1" ];
rstp = false;
···
br0.ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
};
};
-
client_eth1_rstp = { lib, pkgs, ... }: client_base // {
networking.bridges.br0 = {
interfaces = [ "eth1" ];
rstp = true;
···
};
};
};
+
in import ./make-test.nix ({ pkgs, ...} :
{
name = "containers-restart_networking";
meta = with pkgs.stdenv.lib.maintainers; {
···
};
nodes = {
+
client = { lib, ... }: client_base // {
virtualisation.vlans = [ 1 ];
networking.bridges.br0 = {
···
};
};
+
client_eth1 = { lib, ... }: client_base // {
networking.bridges.br0 = {
interfaces = [ "eth1" ];
rstp = false;
···
br0.ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
};
};
+
client_eth1_rstp = { lib, ... }: client_base // {
networking.bridges.br0 = {
interfaces = [ "eth1" ];
rstp = true;
+1 -1
nixos/tests/containers-tmpfs.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
virtualisation.memorySize = 768;
+2 -2
nixos/tests/couchdb.nix
···
nodes = {
couchdb1 =
-
{ pkgs, config, ... }:
{ environment.systemPackages = with pkgs; [ jq ];
services.couchdb.enable = true;
};
couchdb2 =
-
{ pkgs, config, ... }:
{ environment.systemPackages = with pkgs; [ jq ];
services.couchdb.enable = true;
···
nodes = {
couchdb1 =
+
{ pkgs, ... }:
{ environment.systemPackages = with pkgs; [ jq ];
services.couchdb.enable = true;
};
couchdb2 =
+
{ pkgs, ... }:
{ environment.systemPackages = with pkgs; [ jq ];
services.couchdb.enable = true;
+1 -1
nixos/tests/deluge.nix
···
nodes = {
server =
-
{ pkgs, config, ... }:
{ services.deluge = {
enable = true;
···
nodes = {
server =
+
{ ... }:
{ services.deluge = {
enable = true;
+1 -1
nixos/tests/dnscrypt-proxy.nix
···
# A client running the recommended setup: DNSCrypt proxy as a forwarder
# for a caching DNS client.
client =
-
{ config, pkgs, ... }:
let localProxyPort = 43; in
{
security.apparmor.enable = true;
···
# A client running the recommended setup: DNSCrypt proxy as a forwarder
# for a caching DNS client.
client =
+
{ ... }:
let localProxyPort = 43; in
{
security.apparmor.enable = true;
+1 -1
nixos/tests/docker-edge.nix
···
nodes = {
docker =
-
{ config, pkgs, ... }:
{
virtualisation.docker.enable = true;
virtualisation.docker.package = pkgs.docker-edge;
···
nodes = {
docker =
+
{ pkgs, ... }:
{
virtualisation.docker.enable = true;
virtualisation.docker.package = pkgs.docker-edge;
+3 -3
nixos/tests/docker-registry.nix
···
};
nodes = {
-
registry = { config, pkgs, ... }: {
services.dockerRegistry.enable = true;
services.dockerRegistry.enableDelete = true;
services.dockerRegistry.port = 8080;
···
networking.firewall.allowedTCPPorts = [ 8080 ];
};
-
client1 = { config, pkgs, ...}: {
virtualisation.docker.enable = true;
virtualisation.docker.extraOptions = "--insecure-registry registry:8080";
};
-
client2 = { config, pkgs, ...}: {
virtualisation.docker.enable = true;
virtualisation.docker.extraOptions = "--insecure-registry registry:8080";
};
···
};
nodes = {
+
registry = { ... }: {
services.dockerRegistry.enable = true;
services.dockerRegistry.enableDelete = true;
services.dockerRegistry.port = 8080;
···
networking.firewall.allowedTCPPorts = [ 8080 ];
};
+
client1 = { ... }: {
virtualisation.docker.enable = true;
virtualisation.docker.extraOptions = "--insecure-registry registry:8080";
};
+
client2 = { ... }: {
virtualisation.docker.enable = true;
virtualisation.docker.extraOptions = "--insecure-registry registry:8080";
};
+1 -1
nixos/tests/docker-tools-overlay.nix
···
nodes = {
docker =
-
{ config, pkgs, ... }:
{
virtualisation.docker.enable = true;
virtualisation.docker.storageDriver = "overlay"; # defaults to overlay2
···
nodes = {
docker =
+
{ ... }:
{
virtualisation.docker.enable = true;
virtualisation.docker.storageDriver = "overlay"; # defaults to overlay2
+1 -1
nixos/tests/docker-tools.nix
···
nodes = {
docker =
-
{ config, pkgs, ... }: {
virtualisation = {
diskSize = 2048;
docker.enable = true;
···
nodes = {
docker =
+
{ ... }: {
virtualisation = {
diskSize = 2048;
docker.enable = true;
+1 -1
nixos/tests/docker.nix
···
nodes = {
docker =
-
{ config, pkgs, ... }:
{
virtualisation.docker.enable = true;
virtualisation.docker.package = pkgs.docker;
···
nodes = {
docker =
+
{ pkgs, ... }:
{
virtualisation.docker.enable = true;
virtualisation.docker.package = pkgs.docker;
+2 -2
nixos/tests/ecryptfs.nix
···
-
import ./make-test.nix ({ pkgs, ... }:
{
name = "ecryptfs";
-
machine = { config, pkgs, ... }: {
imports = [ ./common/user-account.nix ];
boot.kernelModules = [ "ecryptfs" ];
security.pam.enableEcryptfs = true;
···
+
import ./make-test.nix ({ ... }:
{
name = "ecryptfs";
+
machine = { pkgs, ... }: {
imports = [ ./common/user-account.nix ];
boot.kernelModules = [ "ecryptfs" ];
security.pam.enableEcryptfs = true;
+1 -1
nixos/tests/elk.nix
···
};
nodes = {
one =
-
{ config, pkgs, ... }: {
# Not giving the machine at least 2060MB results in elasticsearch failing with the following error:
#
# OpenJDK 64-Bit Server VM warning:
···
};
nodes = {
one =
+
{ pkgs, ... }: {
# Not giving the machine at least 2060MB results in elasticsearch failing with the following error:
#
# OpenJDK 64-Bit Server VM warning:
+1 -1
nixos/tests/emacs-daemon.nix
···
enableOCR = true;
machine =
-
{ config, pkgs, ... }:
{ imports = [ ./common/x11.nix ];
services.emacs = {
···
enableOCR = true;
machine =
+
{ ... }:
{ imports = [ ./common/x11.nix ];
services.emacs = {
+1 -1
nixos/tests/env.nix
···
maintainers = [ nequissimus ];
};
-
machine = { config, lib, pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages;
environment.etc."plainFile".text = ''
···
maintainers = [ nequissimus ];
};
+
machine = { pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages;
environment.etc."plainFile".text = ''
+3 -3
nixos/tests/etcd-cluster.nix
···
};
nodes = {
-
node1 = { config, pkgs, nodes, ... }: {
require = [nodeConfig];
services.etcd = {
initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380"];
···
};
};
-
node2 = { config, pkgs, ... }: {
require = [nodeConfig];
services.etcd = {
initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380"];
···
};
};
-
node3 = { config, pkgs, ... }: {
require = [nodeConfig];
services.etcd = {
initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380" "node3=https://node3:2380"];
···
};
nodes = {
+
node1 = { ... }: {
require = [nodeConfig];
services.etcd = {
initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380"];
···
};
};
+
node2 = { ... }: {
require = [nodeConfig];
services.etcd = {
initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380"];
···
};
};
+
node3 = { ... }: {
require = [nodeConfig];
services.etcd = {
initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380" "node3=https://node3:2380"];
+1 -1
nixos/tests/etcd.nix
···
};
nodes = {
-
node = { config, pkgs, nodes, ... }: {
services.etcd.enable = true;
};
};
···
};
nodes = {
+
node = { ... }: {
services.etcd.enable = true;
};
};
+2 -2
nixos/tests/ferm.nix
···
nodes =
{ client =
-
{ config, pkgs, ... }:
with pkgs.lib;
{
networking = {
···
};
};
server =
-
{ config, pkgs, ... }:
with pkgs.lib;
{
networking = {
···
nodes =
{ client =
+
{ pkgs, ... }:
with pkgs.lib;
{
networking = {
···
};
};
server =
+
{ pkgs, ... }:
with pkgs.lib;
{
networking = {
+1 -1
nixos/tests/firefox.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ./common/x11.nix ];
environment.systemPackages = [ pkgs.firefox pkgs.xdotool ];
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ./common/x11.nix ];
environment.systemPackages = [ pkgs.firefox pkgs.xdotool ];
+3 -3
nixos/tests/firewall.nix
···
nodes =
{ walled =
-
{ config, pkgs, nodes, ... }:
{ networking.firewall.enable = true;
networking.firewall.logRefusedPackets = true;
services.httpd.enable = true;
···
# original walled configuration so that there is a change in the service
# file.
walled2 =
-
{ config, pkgs, nodes, ... }:
{ networking.firewall.enable = true;
networking.firewall.rejectPackets = true;
};
attacker =
-
{ config, pkgs, ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
networking.firewall.enable = false;
···
nodes =
{ walled =
+
{ ... }:
{ networking.firewall.enable = true;
networking.firewall.logRefusedPackets = true;
services.httpd.enable = true;
···
# original walled configuration so that there is a change in the service
# file.
walled2 =
+
{ ... }:
{ networking.firewall.enable = true;
networking.firewall.rejectPackets = true;
};
attacker =
+
{ ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
networking.firewall.enable = false;
+3 -3
nixos/tests/flannel.nix
···
networking.firewall.allowedUDPPorts = [ 8472 ];
};
in {
-
etcd = { config, pkgs, ... }: {
services = {
etcd = {
enable = true;
···
networking.firewall.allowedTCPPorts = [ 2379 ];
};
-
node1 = { config, ... }: {
require = [flannelConfig];
};
-
node2 = { config, ... }: {
require = [flannelConfig];
};
};
···
networking.firewall.allowedUDPPorts = [ 8472 ];
};
in {
+
etcd = { ... }: {
services = {
etcd = {
enable = true;
···
networking.firewall.allowedTCPPorts = [ 2379 ];
};
+
node1 = { ... }: {
require = [flannelConfig];
};
+
node2 = { ... }: {
require = [flannelConfig];
};
};
+1 -1
nixos/tests/flatpak.nix
···
maintainers = pkgs.flatpak.meta.maintainers;
};
-
machine = { config, pkgs, ... }: {
imports = [ ./common/x11.nix ];
services.xserver.desktopManager.gnome3.enable = true; # TODO: figure out minimal environment where the tests work
environment.gnome3.excludePackages = pkgs.gnome3.optionalPackages;
···
maintainers = pkgs.flatpak.meta.maintainers;
};
+
machine = { pkgs, ... }: {
imports = [ ./common/x11.nix ];
services.xserver.desktopManager.gnome3.enable = true; # TODO: figure out minimal environment where the tests work
environment.gnome3.excludePackages = pkgs.gnome3.optionalPackages;
+1 -1
nixos/tests/fwupd.nix
···
maintainers = pkgs.fwupd.meta.maintainers;
};
-
machine = { config, pkgs, ... }: {
services.fwupd.enable = true;
environment.systemPackages = with pkgs; [ gnome-desktop-testing ];
environment.variables.XDG_DATA_DIRS = [ "${pkgs.fwupd.installedTests}/share" ];
···
maintainers = pkgs.fwupd.meta.maintainers;
};
+
machine = { pkgs, ... }: {
services.fwupd.enable = true;
environment.systemPackages = with pkgs; [ gnome-desktop-testing ];
environment.variables.XDG_DATA_DIRS = [ "${pkgs.fwupd.installedTests}/share" ];
+1 -1
nixos/tests/gitlab.nix
···
};
nodes = {
-
gitlab = { config, pkgs, ... }: {
virtualisation.memorySize = 768;
services.nginx = {
···
};
nodes = {
+
gitlab = { ... }: {
virtualisation.memorySize = 768;
services.nginx = {
+2 -2
nixos/tests/gitolite.nix
···
nodes = {
server =
-
{ config, pkgs, lib, ... }:
{
services.gitolite = {
enable = true;
···
};
client =
-
{ config, pkgs, lib, ... }:
{
environment.systemPackages = [ pkgs.git ];
programs.ssh.extraConfig = ''
···
nodes = {
server =
+
{ ... }:
{
services.gitolite = {
enable = true;
···
};
client =
+
{ pkgs, ... }:
{
environment.systemPackages = [ pkgs.git ];
programs.ssh.extraConfig = ''
+1 -1
nixos/tests/gnome3-gdm.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ./common/user-account.nix ];
···
};
machine =
+
{ ... }:
{ imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/gnome3.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ./common/user-account.nix ];
···
};
machine =
+
{ ... }:
{ imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/gocd-agent.nix
···
nodes = {
gocd_agent =
-
{ config, pkgs, ... }:
{
virtualisation.memorySize = 2046;
services.gocd-agent = {
···
nodes = {
gocd_agent =
+
{ ... }:
{
virtualisation.memorySize = 2046;
services.gocd-agent = {
+1 -1
nixos/tests/gocd-server.nix
···
nodes = {
gocd_server =
-
{ config, pkgs, ... }:
{
virtualisation.memorySize = 2046;
services.gocd-server.enable = true;
···
nodes = {
gocd_server =
+
{ ... }:
{
virtualisation.memorySize = 2046;
services.gocd-server.enable = true;
+1 -1
nixos/tests/grafana.nix
···
maintainers = [ willibutz ];
};
-
machine = { config, pkgs, ... }: {
services.grafana = {
enable = true;
addr = "localhost";
···
maintainers = [ willibutz ];
};
+
machine = { ... }: {
services.grafana = {
enable = true;
addr = "localhost";
+2 -2
nixos/tests/graphite.nix
···
-
import ./make-test.nix ({ pkgs, ...} :
{
name = "graphite";
nodes = {
one =
-
{ config, pkgs, ... }: {
virtualisation.memorySize = 1024;
time.timeZone = "UTC";
services.graphite = {
···
+
import ./make-test.nix ({ ... } :
{
name = "graphite";
nodes = {
one =
+
{ ... }: {
virtualisation.memorySize = 1024;
time.timeZone = "UTC";
services.graphite = {
+3 -3
nixos/tests/hadoop/hdfs.nix
···
-
import ../make-test.nix ({pkgs, ...}: {
nodes = {
-
namenode = {pkgs, config, ...}: {
services.hadoop = {
package = pkgs.hadoop_3_1;
hdfs.namenode.enabled = true;
···
8020 # namenode.rpc-address
];
};
-
datanode = {pkgs, config, ...}: {
services.hadoop = {
package = pkgs.hadoop_3_1;
hdfs.datanode.enabled = true;
···
+
import ../make-test.nix ({...}: {
nodes = {
+
namenode = {pkgs, ...}: {
services.hadoop = {
package = pkgs.hadoop_3_1;
hdfs.namenode.enabled = true;
···
8020 # namenode.rpc-address
];
};
+
datanode = {pkgs, ...}: {
services.hadoop = {
package = pkgs.hadoop_3_1;
hdfs.datanode.enabled = true;
+3 -3
nixos/tests/hadoop/yarn.nix
···
-
import ../make-test.nix ({pkgs, ...}: {
nodes = {
-
resourcemanager = {pkgs, config, ...}: {
services.hadoop.package = pkgs.hadoop_3_1;
services.hadoop.yarn.resourcemanager.enabled = true;
services.hadoop.yarnSite = {
···
8031 # resourcemanager.resource-tracker.address
];
};
-
nodemanager = {pkgs, config, ...}: {
services.hadoop.package = pkgs.hadoop_3_1;
services.hadoop.yarn.nodemanager.enabled = true;
services.hadoop.yarnSite = {
···
+
import ../make-test.nix ({...}: {
nodes = {
+
resourcemanager = {pkgs, ...}: {
services.hadoop.package = pkgs.hadoop_3_1;
services.hadoop.yarn.resourcemanager.enabled = true;
services.hadoop.yarnSite = {
···
8031 # resourcemanager.resource-tracker.address
];
};
+
nodemanager = {pkgs, ...}: {
services.hadoop.package = pkgs.hadoop_3_1;
services.hadoop.yarn.nodemanager.enabled = true;
services.hadoop.yarnSite = {
+1 -1
nixos/tests/haka.nix
···
nodes = {
haka =
-
{ config, pkgs, ... }:
{
services.haka.enable = true;
};
···
nodes = {
haka =
+
{ ... }:
{
services.haka.enable = true;
};
+1 -1
nixos/tests/haproxy.nix
···
import ./make-test.nix ({ pkgs, ...}: {
name = "haproxy";
nodes = {
-
machine = { config, ...}: {
imports = [ ../modules/profiles/minimal.nix ];
services.haproxy = {
enable = true;
···
import ./make-test.nix ({ pkgs, ...}: {
name = "haproxy";
nodes = {
+
machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
services.haproxy = {
enable = true;
+1 -1
nixos/tests/hardened.nix
···
};
machine =
-
{ config, lib, pkgs, ... }:
with lib;
{ users.users.alice = { isNormalUser = true; extraGroups = [ "proc" ]; };
users.users.sybil = { isNormalUser = true; group = "wheel"; };
···
};
machine =
+
{ lib, pkgs, ... }:
with lib;
{ users.users.alice = { isNormalUser = true; extraGroups = [ "proc" ]; };
users.users.sybil = { isNormalUser = true; group = "wheel"; };
+1 -1
nixos/tests/hibernate.nix
···
systemd.services.listener.serviceConfig.ExecStart = "${pkgs.netcat}/bin/nc -l 4444 -k";
};
-
probe = { config, lib, pkgs, ...}: {
environment.systemPackages = [ pkgs.netcat ];
};
};
···
systemd.services.listener.serviceConfig.ExecStart = "${pkgs.netcat}/bin/nc -l 4444 -k";
};
+
probe = { pkgs, ...}: {
environment.systemPackages = [ pkgs.netcat ];
};
};
+1 -1
nixos/tests/hitch/default.nix
···
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ jflanglois ];
};
-
machine = { config, pkgs, ... }: {
environment.systemPackages = [ pkgs.curl ];
services.hitch = {
enable = true;
···
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ jflanglois ];
};
+
machine = { pkgs, ... }: {
environment.systemPackages = [ pkgs.curl ];
services.hitch = {
enable = true;
+1 -1
nixos/tests/hocker-fetchdocker/machine.nix
···
-
{ config, pkgs, ... }:
{ nixpkgs.config.packageOverrides = pkgs': {
hello-world-container = pkgs'.callPackage ./hello-world-container.nix { };
};
···
+
{ pkgs, ... }:
{ nixpkgs.config.packageOverrides = pkgs': {
hello-world-container = pkgs'.callPackage ./hello-world-container.nix { };
};
+1 -1
nixos/tests/home-assistant.nix
···
nodes = {
hass =
-
{ config, pkgs, ... }:
{
environment.systemPackages = with pkgs; [
mosquitto
···
nodes = {
hass =
+
{ pkgs, ... }:
{
environment.systemPackages = with pkgs; [
mosquitto
+1 -1
nixos/tests/hound.nix
···
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ grahamc ];
};
-
machine = { config, pkgs, ... }: {
services.hound = {
enable = true;
config = ''
···
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ grahamc ];
};
+
machine = { pkgs, ... }: {
services.hound = {
enable = true;
config = ''
+1 -1
nixos/tests/hydra/default.nix
···
};
machine =
-
{ config, pkgs, ... }:
{
virtualisation.memorySize = 1024;
···
};
machine =
+
{ pkgs, ... }:
{
virtualisation.memorySize = 1024;
+2 -2
nixos/tests/i3wm.nix
···
maintainers = [ aszlig ];
};
-
machine = { lib, pkgs, ... }: {
imports = [ ./common/x11.nix ./common/user-account.nix ];
services.xserver.displayManager.auto.user = "alice";
services.xserver.windowManager.default = lib.mkForce "i3";
services.xserver.windowManager.i3.enable = true;
};
-
testScript = { nodes, ... }: ''
$machine->waitForX;
$machine->waitForFile("/home/alice/.Xauthority");
$machine->succeed("xauth merge ~alice/.Xauthority");
···
maintainers = [ aszlig ];
};
+
machine = { lib, ... }: {
imports = [ ./common/x11.nix ./common/user-account.nix ];
services.xserver.displayManager.auto.user = "alice";
services.xserver.windowManager.default = lib.mkForce "i3";
services.xserver.windowManager.i3.enable = true;
};
+
testScript = { ... }: ''
$machine->waitForX;
$machine->waitForFile("/home/alice/.Xauthority");
$machine->succeed("xauth merge ~alice/.Xauthority");
+1 -1
nixos/tests/influxdb.nix
···
};
nodes = {
-
one = { config, pkgs, ... }: {
services.influxdb.enable = true;
};
};
···
};
nodes = {
+
one = { ... }: {
services.influxdb.enable = true;
};
};
+3 -3
nixos/tests/initrd-network-ssh/default.nix
···
-
import ../make-test.nix ({ pkgs, lib, ... }:
{
name = "initrd-network-ssh";
···
nodes = with lib; rec {
server =
-
{ config, pkgs, ... }:
{
boot.kernelParams = [
"ip=${config.networking.primaryIPAddress}:::255.255.255.0::eth1:none"
···
};
client =
-
{ config, pkgs, ... }:
{
environment.etc.knownHosts = {
text = concatStrings [
···
+
import ../make-test.nix ({ lib, ... }:
{
name = "initrd-network-ssh";
···
nodes = with lib; rec {
server =
+
{ config, ... }:
{
boot.kernelParams = [
"ip=${config.networking.primaryIPAddress}:::255.255.255.0::eth1:none"
···
};
client =
+
{ config, ... }:
{
environment.etc.knownHosts = {
text = concatStrings [
+1 -1
nixos/tests/initrd-network.nix
···
meta.maintainers = [ pkgs.stdenv.lib.maintainers.eelco ];
-
machine = { config, pkgs, ... }: {
imports = [ ../modules/profiles/minimal.nix ];
boot.initrd.network.enable = true;
boot.initrd.network.postCommands =
···
meta.maintainers = [ pkgs.stdenv.lib.maintainers.eelco ];
+
machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
boot.initrd.network.enable = true;
boot.initrd.network.postCommands =
+1 -1
nixos/tests/installer.nix
···
# The configuration of the machine used to run "nixos-install".
machine =
-
{ config, lib, pkgs, ... }:
{ imports =
[ ../modules/profiles/installation-device.nix
···
# The configuration of the machine used to run "nixos-install".
machine =
+
{ pkgs, ... }:
{ imports =
[ ../modules/profiles/installation-device.nix
+2 -2
nixos/tests/ipfs.nix
···
nodes = {
adder =
-
{ config, pkgs, ... }:
{
services.ipfs = {
enable = true;
···
networking.firewall.allowedTCPPorts = [ 4001 ];
};
getter =
-
{ config, pkgs, ... }:
{
services.ipfs = {
enable = true;
···
nodes = {
adder =
+
{ ... }:
{
services.ipfs = {
enable = true;
···
networking.firewall.allowedTCPPorts = [ 4001 ];
};
getter =
+
{ ... }:
{
services.ipfs = {
enable = true;
+3 -3
nixos/tests/ipv6.nix
···
};
nodes =
-
{ client = { config, pkgs, ... }: { };
server =
-
{ config, pkgs, ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
networking.firewall.allowedTCPPorts = [ 80 ];
};
router =
-
{ config, pkgs, ... }:
{ services.radvd.enable = true;
services.radvd.config =
''
···
};
nodes =
+
{ client = { ... }: { };
server =
+
{ ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
networking.firewall.allowedTCPPorts = [ 80 ];
};
router =
+
{ ... }:
{ services.radvd.enable = true;
services.radvd.config =
''
+2 -2
nixos/tests/jenkins.nix
···
nodes = {
master =
-
{ config, pkgs, ... }:
{ services.jenkins.enable = true;
# should have no effect
···
};
slave =
-
{ config, pkgs, ... }:
{ services.jenkinsSlave.enable = true;
users.users.jenkins.extraGroups = [ "users" ];
···
nodes = {
master =
+
{ ... }:
{ services.jenkins.enable = true;
# should have no effect
···
};
slave =
+
{ ... }:
{ services.jenkinsSlave.enable = true;
users.users.jenkins.extraGroups = [ "users" ];
+2 -2
nixos/tests/kafka.nix
···
};
nodes = {
-
zookeeper1 = { config, ... }: {
services.zookeeper = {
enable = true;
};
···
networking.firewall.allowedTCPPorts = [ 2181 ];
virtualisation.memorySize = 1024;
};
-
kafka = { config, ... }: {
services.apache-kafka = {
enable = true;
extraProperties = ''
···
};
nodes = {
+
zookeeper1 = { ... }: {
services.zookeeper = {
enable = true;
};
···
networking.firewall.allowedTCPPorts = [ 2181 ];
virtualisation.memorySize = 1024;
};
+
kafka = { ... }: {
services.apache-kafka = {
enable = true;
extraProperties = ''
+1 -1
nixos/tests/kernel-copperhead.nix
···
maintainers = [ nequissimus ];
};
-
machine = { config, lib, pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages_copperhead_lts;
};
···
maintainers = [ nequissimus ];
};
+
machine = { pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages_copperhead_lts;
};
+1 -1
nixos/tests/kernel-latest.nix
···
maintainers = [ nequissimus ];
};
-
machine = { config, lib, pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages_latest;
};
···
maintainers = [ nequissimus ];
};
+
machine = { pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages_latest;
};
+1 -1
nixos/tests/kernel-lts.nix
···
maintainers = [ nequissimus ];
};
-
machine = { config, lib, pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages;
};
···
maintainers = [ nequissimus ];
};
+
machine = { pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages;
};
+1 -1
nixos/tests/kexec.nix
···
maintainers = [ eelco chaoflow ];
};
-
machine = { config, pkgs, ... }:
{ virtualisation.vlans = [ ]; };
testScript =
···
maintainers = [ eelco chaoflow ];
};
+
machine = { ... }:
{ virtualisation.vlans = [ ]; };
testScript =
+1 -1
nixos/tests/krb5/deprecated-config.nix
···
};
machine =
-
{ config, pkgs, ... }: {
krb5 = {
enable = true;
defaultRealm = "ATHENA.MIT.EDU";
···
};
machine =
+
{ ... }: {
krb5 = {
enable = true;
defaultRealm = "ATHENA.MIT.EDU";
+1 -1
nixos/tests/krb5/example-config.nix
···
};
machine =
-
{ config, pkgs, ... }: {
krb5 = {
enable = true;
kerberos = pkgs.krb5Full;
···
};
machine =
+
{ pkgs, ... }: {
krb5 = {
enable = true;
kerberos = pkgs.krb5Full;
+2 -2
nixos/tests/kubernetes/certs.nix
···
{
pkgs ? import <nixpkgs> {},
-
internalDomain ? "cloud.yourdomain.net",
externalDomain ? "myawesomecluster.cluster.yourdomain.net",
serviceClusterIp ? "10.0.0.1",
-
kubelets
}:
let
runWithCFSSL = name: cmd:
···
{
pkgs ? import <nixpkgs> {},
externalDomain ? "myawesomecluster.cluster.yourdomain.net",
serviceClusterIp ? "10.0.0.1",
+
kubelets,
+
...
}:
let
runWithCFSSL = name: cmd:
+1 -1
nixos/tests/kubernetes/dns.nix
···
config.Entrypoint = "/bin/tail";
};
-
extraConfiguration = { config, pkgs, lib, nodes, ... }: {
environment.systemPackages = [ pkgs.bind.host ];
# virtualisation.docker.extraOptions = "--dns=${config.services.kubernetes.addons.dns.clusterIp}";
services.dnsmasq.enable = true;
···
config.Entrypoint = "/bin/tail";
};
+
extraConfiguration = { config, pkgs, ... }: {
environment.systemPackages = [ pkgs.bind.host ];
# virtualisation.docker.extraOptions = "--dns=${config.services.kubernetes.addons.dns.clusterIp}";
services.dnsmasq.enable = true;
+2 -2
nixos/tests/ldap.nix
···
memberUid: ${ldapUser}
'';
mkClient = useDaemon:
-
{ config, pkgs, lib, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
···
nodes = {
server =
-
{ config, pkgs, lib, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
···
memberUid: ${ldapUser}
'';
mkClient = useDaemon:
+
{ lib, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
···
nodes = {
server =
+
{ pkgs, ... }:
{
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
+1 -1
nixos/tests/lightdm.nix
···
maintainers = [ aszlig ];
};
-
machine = { lib, ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager.lightdm.enable = true;
···
maintainers = [ aszlig ];
};
+
machine = { ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager.lightdm.enable = true;
+1 -1
nixos/tests/login.nix
···
};
machine =
-
{ config, pkgs, lib, ... }:
{ boot.kernelPackages = lib.mkIf latestKernel pkgs.linuxPackages_latest;
};
···
};
machine =
+
{ pkgs, lib, ... }:
{ boot.kernelPackages = lib.mkIf latestKernel pkgs.linuxPackages_latest;
};
+1 -1
nixos/tests/mathics.nix
···
};
nodes = {
-
machine = { config, pkgs, ... }: {
services.mathics.enable = true;
services.mathics.port = 8888;
};
···
};
nodes = {
+
machine = { ... }: {
services.mathics.enable = true;
services.mathics.port = 8888;
};
+1 -1
nixos/tests/memcached.nix
···
nodes = {
machine =
-
{ config, pkgs, ... }:
{
imports = [ ../modules/profiles/minimal.nix ];
services.memcached.enable = true;
···
nodes = {
machine =
+
{ ... }:
{
imports = [ ../modules/profiles/minimal.nix ];
services.memcached.enable = true;
+2 -2
nixos/tests/mesos.nix
···
};
nodes = {
-
master = { config, pkgs, ... }: {
networking.firewall.enable = false;
services.zookeeper.enable = true;
services.mesos.master = {
···
};
};
-
slave = { config, pkgs, ... }: {
networking.firewall.enable = false;
networking.nat.enable = true;
virtualisation.docker.enable = true;
···
};
nodes = {
+
master = { ... }: {
networking.firewall.enable = false;
services.zookeeper.enable = true;
services.mesos.master = {
···
};
};
+
slave = { ... }: {
networking.firewall.enable = false;
networking.nat.enable = true;
virtualisation.docker.enable = true;
+1 -1
nixos/tests/minio.nix
···
};
nodes = {
-
machine = { config, pkgs, ... }: {
services.minio = {
enable = true;
accessKey = "BKIKJAA5BMMU2RHO6IBB";
···
};
nodes = {
+
machine = { pkgs, ... }: {
services.minio = {
enable = true;
accessKey = "BKIKJAA5BMMU2RHO6IBB";
+1 -1
nixos/tests/misc.nix
···
foo = pkgs.writeText "foo" "Hello World";
machine =
-
{ config, lib, pkgs, ... }:
with lib;
{ swapDevices = mkOverride 0
[ { device = "/root/swapfile"; size = 128; } ];
···
foo = pkgs.writeText "foo" "Hello World";
machine =
+
{ lib, ... }:
with lib;
{ swapDevices = mkOverride 0
[ { device = "/root/swapfile"; size = 128; } ];
+1 -1
nixos/tests/mongodb.nix
···
nodes = {
one =
-
{ config, pkgs, ... }:
{
services = {
mongodb.enable = true;
···
nodes = {
one =
+
{ ... }:
{
services = {
mongodb.enable = true;
+2 -2
nixos/tests/morty.nix
···
nodes =
{ mortyProxyWithKey =
-
{ config, pkgs, ... }:
{ services.morty = {
enable = true;
key = "78a9cd0cfee20c672f78427efb2a2a96036027f0";
···
};
testScript =
-
{ nodes , ... }:
''
$mortyProxyWithKey->waitForUnit("default.target");
···
nodes =
{ mortyProxyWithKey =
+
{ ... }:
{ services.morty = {
enable = true;
key = "78a9cd0cfee20c672f78427efb2a2a96036027f0";
···
};
testScript =
+
{ ... }:
''
$mortyProxyWithKey->waitForUnit("default.target");
+3 -3
nixos/tests/mpd.nix
···
nodes =
{ client =
-
{ config, pkgs, ... }: { };
serverALSA =
-
{ config, pkgs, ... }: (mkServer {
mpd = defaultMpdCfg // {
network.listenAddress = "any";
extraConfig = ''
···
}) // { networking.firewall.allowedTCPPorts = [ 6600 ]; };
serverPulseAudio =
-
{ config, pkgs, ... }: (mkServer {
mpd = defaultMpdCfg // {
extraConfig = ''
audio_output {
···
nodes =
{ client =
+
{ ... }: { };
serverALSA =
+
{ ... }: (mkServer {
mpd = defaultMpdCfg // {
network.listenAddress = "any";
extraConfig = ''
···
}) // { networking.firewall.allowedTCPPorts = [ 6600 ]; };
serverPulseAudio =
+
{ ... }: (mkServer {
mpd = defaultMpdCfg // {
extraConfig = ''
audio_output {
+2 -2
nixos/tests/mumble.nix
···
import ./make-test.nix ({ pkgs, ...} :
let
-
client = { config, pkgs, ... }: {
imports = [ ./common/x11.nix ];
environment.systemPackages = [ pkgs.mumble ];
};
···
};
nodes = {
-
server = { config, pkgs, ... }: {
services.murmur.enable = true;
services.murmur.registerName = "NixOS tests";
networking.firewall.allowedTCPPorts = [ config.services.murmur.port ];
···
import ./make-test.nix ({ pkgs, ...} :
let
+
client = { pkgs, ... }: {
imports = [ ./common/x11.nix ];
environment.systemPackages = [ pkgs.mumble ];
};
···
};
nodes = {
+
server = { config, ... }: {
services.murmur.enable = true;
services.murmur.registerName = "NixOS tests";
networking.firewall.allowedTCPPorts = [ config.services.murmur.port ];
+1 -1
nixos/tests/munin.nix
···
nodes = {
one =
-
{ config, pkgs, ... }:
{
services = {
munin-node.enable = true;
···
nodes = {
one =
+
{ config, ... }:
{
services = {
munin-node.enable = true;
+2 -2
nixos/tests/mutable-users.nix
···
};
nodes = {
-
machine = { config, lib, pkgs, ... }: {
users.mutableUsers = false;
};
-
mutable = { config, lib, pkgs, ... }: {
users.mutableUsers = true;
};
};
···
};
nodes = {
+
machine = { ... }: {
users.mutableUsers = false;
};
+
mutable = { ... }: {
users.mutableUsers = true;
};
};
+1 -1
nixos/tests/mysql-backup.nix
···
};
nodes = {
-
master = { config, pkgs, ... }: {
services.mysql = {
enable = true;
initialDatabases = [ { name = "testdb"; schema = ./testdb.sql; } ];
···
};
nodes = {
+
master = { pkgs, ... }: {
services.mysql = {
enable = true;
initialDatabases = [ { name = "testdb"; schema = ./testdb.sql; } ];
+3 -3
nixos/tests/mysql-replication.nix
···
nodes = {
master =
-
{ pkgs, config, ... }:
{
services.mysql.enable = true;
···
};
slave1 =
-
{ pkgs, config, nodes, ... }:
{
services.mysql.enable = true;
···
};
slave2 =
-
{ pkgs, config, nodes, ... }:
{
services.mysql.enable = true;
···
nodes = {
master =
+
{ pkgs, ... }:
{
services.mysql.enable = true;
···
};
slave1 =
+
{ pkgs, nodes, ... }:
{
services.mysql.enable = true;
···
};
slave2 =
+
{ pkgs, nodes, ... }:
{
services.mysql.enable = true;
+1 -1
nixos/tests/mysql.nix
···
nodes = {
master =
-
{ pkgs, config, ... }:
{
services.mysql.enable = true;
···
nodes = {
master =
+
{ pkgs, ... }:
{
services.mysql.enable = true;
+4 -4
nixos/tests/nat.nix
···
nodes =
{ client =
-
{ config, pkgs, nodes, ... }:
lib.mkMerge [
{ virtualisation.vlans = [ 1 ];
networking.firewall.allowPing = true;
···
];
router =
-
{ config, pkgs, ... }: lib.mkMerge [
routerBase
{ networking.nat.enable = true; }
];
routerDummyNoNat =
-
{ config, pkgs, ... }: lib.mkMerge [
routerBase
{ networking.nat.enable = false; }
];
server =
-
{ config, pkgs, ... }:
{ virtualisation.vlans = [ 2 ];
networking.firewall.enable = false;
services.httpd.enable = true;
···
nodes =
{ client =
+
{ pkgs, nodes, ... }:
lib.mkMerge [
{ virtualisation.vlans = [ 1 ];
networking.firewall.allowPing = true;
···
];
router =
+
{ ... }: lib.mkMerge [
routerBase
{ networking.nat.enable = true; }
];
routerDummyNoNat =
+
{ ... }: lib.mkMerge [
routerBase
{ networking.nat.enable = false; }
];
server =
+
{ ... }:
{ virtualisation.vlans = [ 2 ];
networking.firewall.enable = false;
services.httpd.enable = true;
+1 -1
nixos/tests/netdata.nix
···
nodes = {
netdata =
-
{ config, pkgs, ... }:
{
environment.systemPackages = with pkgs; [ curl jq ];
services.netdata.enable = true;
···
nodes = {
netdata =
+
{ pkgs, ... }:
{
environment.systemPackages = with pkgs; [ curl jq ];
services.netdata.enable = true;
+4 -4
nixos/tests/networking-proxy.nix
···
nodes = {
# no proxy
machine =
-
{ config, pkgs, ... }:
default-config;
# proxy default
machine2 =
-
{ config, pkgs, ... }:
default-config // {
networking.proxy.default = "http://user:pass@host:port";
···
# specific proxy options
machine3 =
-
{ config, pkgs, ... }:
default-config //
{
···
# mix default + proxy options
machine4 =
-
{ config, pkgs, ... }:
default-config // {
networking.proxy = {
···
nodes = {
# no proxy
machine =
+
{ ... }:
default-config;
# proxy default
machine2 =
+
{ ... }:
default-config // {
networking.proxy.default = "http://user:pass@host:port";
···
# specific proxy options
machine3 =
+
{ ... }:
default-config //
{
···
# mix default + proxy options
machine4 =
+
{ ... }:
default-config // {
networking.proxy = {
+20 -20
nixos/tests/networking.nix
···
static = {
name = "Static";
nodes.router = router;
-
nodes.client = { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
];
};
};
-
testScript = { nodes, ... }:
''
startAll;
···
dhcpSimple = {
name = "SimpleDHCP";
nodes.router = router;
-
nodes.client = { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
};
};
};
-
testScript = { nodes, ... }:
''
startAll;
···
dhcpOneIf = {
name = "OneInterfaceDHCP";
nodes.router = router;
-
nodes.client = { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
interfaces.eth2.ipv4.addresses = mkOverride 0 [ ];
};
};
-
testScript = { nodes, ... }:
''
startAll;
···
'';
};
bond = let
-
node = address: { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
name = "Bond";
nodes.client1 = node "192.168.1.1";
nodes.client2 = node "192.168.1.2";
-
testScript = { nodes, ... }:
''
startAll;
···
'';
};
bridge = let
-
node = { address, vlan }: { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ vlan ];
networking = {
useNetworkd = networkd;
···
name = "Bridge";
nodes.client1 = node { address = "192.168.1.2"; vlan = 1; };
nodes.client2 = node { address = "192.168.1.3"; vlan = 2; };
-
nodes.router = { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
[ { address = "192.168.1.1"; prefixLength = 24; } ];
};
};
-
testScript = { nodes, ... }:
''
startAll;
···
macvlan = {
name = "MACVLAN";
nodes.router = router;
-
nodes.client = { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
interfaces.eth1.ipv4.addresses = mkOverride 0 [ ];
};
};
-
testScript = { nodes, ... }:
''
startAll;
···
'';
};
sit = let
-
node = { address4, remote, address6 }: { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
name = "Sit";
nodes.client1 = node { address4 = "192.168.1.1"; remote = "192.168.1.2"; address6 = "fc00::1"; };
nodes.client2 = node { address4 = "192.168.1.2"; remote = "192.168.1.1"; address6 = "fc00::2"; };
-
testScript = { nodes, ... }:
''
startAll;
···
'';
};
vlan = let
-
node = address: { config, pkgs, ... }: with pkgs.lib; {
#virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
name = "vlan";
nodes.client1 = node "192.168.1.1";
nodes.client2 = node "192.168.1.2";
-
testScript = { nodes, ... }:
''
startAll;
···
};
privacy = {
name = "Privacy";
-
nodes.router = { config, pkgs, ... }: {
virtualisation.vlans = [ 1 ];
boot.kernel.sysctl."net.ipv6.conf.all.forwarding" = true;
networking = {
···
'';
};
};
-
nodes.client = { config, pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
};
};
};
-
testScript = { nodes, ... }:
''
startAll;
···
static = {
name = "Static";
nodes.router = router;
+
nodes.client = { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
];
};
};
+
testScript = { ... }:
''
startAll;
···
dhcpSimple = {
name = "SimpleDHCP";
nodes.router = router;
+
nodes.client = { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
};
};
};
+
testScript = { ... }:
''
startAll;
···
dhcpOneIf = {
name = "OneInterfaceDHCP";
nodes.router = router;
+
nodes.client = { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
interfaces.eth2.ipv4.addresses = mkOverride 0 [ ];
};
};
+
testScript = { ... }:
''
startAll;
···
'';
};
bond = let
+
node = address: { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
name = "Bond";
nodes.client1 = node "192.168.1.1";
nodes.client2 = node "192.168.1.2";
+
testScript = { ... }:
''
startAll;
···
'';
};
bridge = let
+
node = { address, vlan }: { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ vlan ];
networking = {
useNetworkd = networkd;
···
name = "Bridge";
nodes.client1 = node { address = "192.168.1.2"; vlan = 1; };
nodes.client2 = node { address = "192.168.1.3"; vlan = 2; };
+
nodes.router = { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 2 ];
networking = {
useNetworkd = networkd;
···
[ { address = "192.168.1.1"; prefixLength = 24; } ];
};
};
+
testScript = { ... }:
''
startAll;
···
macvlan = {
name = "MACVLAN";
nodes.router = router;
+
nodes.client = { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
interfaces.eth1.ipv4.addresses = mkOverride 0 [ ];
};
};
+
testScript = { ... }:
''
startAll;
···
'';
};
sit = let
+
node = { address4, remote, address6 }: { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
name = "Sit";
nodes.client1 = node { address4 = "192.168.1.1"; remote = "192.168.1.2"; address6 = "fc00::1"; };
nodes.client2 = node { address4 = "192.168.1.2"; remote = "192.168.1.1"; address6 = "fc00::2"; };
+
testScript = { ... }:
''
startAll;
···
'';
};
vlan = let
+
node = address: { pkgs, ... }: with pkgs.lib; {
#virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
name = "vlan";
nodes.client1 = node "192.168.1.1";
nodes.client2 = node "192.168.1.2";
+
testScript = { ... }:
''
startAll;
···
};
privacy = {
name = "Privacy";
+
nodes.router = { ... }: {
virtualisation.vlans = [ 1 ];
boot.kernel.sysctl."net.ipv6.conf.all.forwarding" = true;
networking = {
···
'';
};
};
+
nodes.client = { pkgs, ... }: with pkgs.lib; {
virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
};
};
};
+
testScript = { ... }:
''
startAll;
+1 -1
nixos/tests/nexus.nix
···
nodes = {
server =
-
{ config, pkgs, ... }:
{ virtualisation.memorySize = 2047; # qemu-system-i386 has a 2047M limit
virtualisation.diskSize = 2048;
···
nodes = {
server =
+
{ ... }:
{ virtualisation.memorySize = 2047; # qemu-system-i386 has a 2047M limit
virtualisation.diskSize = 2048;
+2 -2
nixos/tests/nfs.nix
···
let
client =
-
{ config, pkgs, ... }:
{ fileSystems = pkgs.lib.mkVMOverride
[ { mountPoint = "/data";
device = "server:/data";
···
client2 = client;
server =
-
{ config, pkgs, ... }:
{ services.nfs.server.enable = true;
services.nfs.server.exports =
''
···
let
client =
+
{ pkgs, ... }:
{ fileSystems = pkgs.lib.mkVMOverride
[ { mountPoint = "/data";
device = "server:/data";
···
client2 = client;
server =
+
{ ... }:
{ services.nfs.server.enable = true;
services.nfs.server.exports =
''
+1 -1
nixos/tests/nginx.nix
···
nodes = {
webserver =
-
{ config, pkgs, ... }:
{ services.nginx.enable = true;
services.nginx.commonHttpConfig = ''
log_format ceeformat '@cee: {"status":"$status",'
···
nodes = {
webserver =
+
{ ... }:
{ services.nginx.enable = true;
services.nginx.commonHttpConfig = ''
log_format ceeformat '@cee: {"status":"$status",'
+1 -1
nixos/tests/novacomd.nix
···
maintainers = [ dtzWill ];
};
-
machine = { config, pkgs, ... }: {
services.novacomd.enable = true;
};
···
maintainers = [ dtzWill ];
};
+
machine = { ... }: {
services.novacomd.enable = true;
};
+3 -3
nixos/tests/openssh.nix
···
nodes = {
server =
-
{ config, pkgs, ... }:
{
services.openssh.enable = true;
···
};
server_lazy =
-
{ config, pkgs, ... }:
{
services.openssh = { enable = true; startWhenNeeded = true; };
···
};
client =
-
{ config, pkgs, ... }: { };
};
···
nodes = {
server =
+
{ ... }:
{
services.openssh.enable = true;
···
};
server_lazy =
+
{ ... }:
{
services.openssh = { enable = true; startWhenNeeded = true; };
···
};
client =
+
{ ... }: { };
};
+2 -2
nixos/tests/owncloud.nix
···
-
import ./make-test.nix ({ pkgs, ... }:
{
name = "owncloud";
nodes =
{ web =
-
{ config, pkgs, ... }:
{
services.postgresql.enable = true;
services.httpd = {
···
+
import ./make-test.nix ({ ... }:
{
name = "owncloud";
nodes =
{ web =
+
{ ... }:
{
services.postgresql.enable = true;
services.httpd = {
+2 -2
nixos/tests/pam-oath-login.nix
···
-
import ./make-test.nix ({ pkgs, latestKernel ? false, ... }:
let
oathSnakeoilSecret = "cdd4083ef8ff1fa9178c6d46bfb1a3";
···
name = "pam-oath-login";
machine =
-
{ config, pkgs, lib, ... }:
{
security.pam.oath = {
enable = true;
···
+
import ./make-test.nix ({ ... }:
let
oathSnakeoilSecret = "cdd4083ef8ff1fa9178c6d46bfb1a3";
···
name = "pam-oath-login";
machine =
+
{ ... }:
{
security.pam.oath = {
enable = true;
+1 -1
nixos/tests/partition.nix
···
in {
name = "partitiion";
-
machine = { config, pkgs, ... }: {
environment.systemPackages = [
pkgs.pythonPackages.nixpart0
pkgs.file pkgs.btrfs-progs pkgs.xfsprogs pkgs.lvm2
···
in {
name = "partitiion";
+
machine = { pkgs, ... }: {
environment.systemPackages = [
pkgs.pythonPackages.nixpart0
pkgs.file pkgs.btrfs-progs pkgs.xfsprogs pkgs.lvm2
+1 -1
nixos/tests/peerflix.nix
···
nodes = {
peerflix =
-
{ config, pkgs, ... }:
{
services.peerflix.enable = true;
};
···
nodes = {
peerflix =
+
{ ... }:
{
services.peerflix.enable = true;
};
+1 -1
nixos/tests/pgjwt.nix
···
};
nodes = {
-
master = { pkgs, config, ... }:
{
services.postgresql = {
enable = true;
···
};
nodes = {
+
master = { ... }:
{
services.postgresql = {
enable = true;
+3 -3
nixos/tests/phabricator.nix
···
nodes = {
storage =
-
{ config, pkgs, ... }:
{ services.nfs.server.enable = true;
services.nfs.server.exports = ''
/repos 192.168.1.0/255.255.255.0(rw,no_root_squash)
···
};
webserver =
-
{ config, pkgs, ... }:
{ fileSystems = pkgs.lib.mkVMOverride
[ { mountPoint = "/repos";
device = "storage:/repos";
···
};
client =
-
{ config, pkgs, ... }:
{ imports = [ ./common/x11.nix ];
services.xserver.desktopManager.plasma5.enable = true;
};
···
nodes = {
storage =
+
{ ... }:
{ services.nfs.server.enable = true;
services.nfs.server.exports = ''
/repos 192.168.1.0/255.255.255.0(rw,no_root_squash)
···
};
webserver =
+
{ pkgs, ... }:
{ fileSystems = pkgs.lib.mkVMOverride
[ { mountPoint = "/repos";
device = "storage:/repos";
···
};
client =
+
{ ... }:
{ imports = [ ./common/x11.nix ];
services.xserver.desktopManager.plasma5.enable = true;
};
+3 -3
nixos/tests/php-pcre.nix
···
let testString = "can-use-subgroups"; in
-
import ./make-test.nix ({ pkgs, ...}: {
name = "php-httpd-pcre-jit-test";
-
machine = { config, lib, pkgs, ... }: {
time.timeZone = "UTC";
services.httpd = {
enable = true;
···
};
};
};
-
testScript = { nodes, ... }:
''
$machine->waitForUnit('httpd.service');
# Ensure php evaluation by matching on the var_dump syntax
···
let testString = "can-use-subgroups"; in
+
import ./make-test.nix ({ ...}: {
name = "php-httpd-pcre-jit-test";
+
machine = { lib, pkgs, ... }: {
time.timeZone = "UTC";
services.httpd = {
enable = true;
···
};
};
};
+
testScript = { ... }:
''
$machine->waitForUnit('httpd.service');
# Ensure php evaluation by matching on the var_dump syntax
+1 -1
nixos/tests/plasma5.nix
···
maintainers = [ ttuegel ];
};
-
machine = { lib, ... }:
let
sddm_theme = pkgs.stdenv.mkDerivation {
name = "breeze-ocr-theme";
···
maintainers = [ ttuegel ];
};
+
machine = { ... }:
let
sddm_theme = pkgs.stdenv.mkDerivation {
name = "breeze-ocr-theme";
+1 -1
nixos/tests/plotinus.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ./common/x11.nix ];
programs.plotinus.enable = true;
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ./common/x11.nix ];
programs.plotinus.enable = true;
+1 -1
nixos/tests/postgis.nix
···
nodes = {
master =
-
{ pkgs, config, ... }:
{
services.postgresql = let mypg = pkgs.postgresql100; in {
···
nodes = {
master =
+
{ pkgs, ... }:
{
services.postgresql = let mypg = pkgs.postgresql100; in {
+1 -1
nixos/tests/postgresql.nix
···
maintainers = [ zagy ];
};
-
machine = {pkgs, config, ...}:
{
services.postgresql.package=postgresql-package;
services.postgresql.enable = true;
···
maintainers = [ zagy ];
};
+
machine = {...}:
{
services.postgresql.package=postgresql-package;
services.postgresql.enable = true;
+1 -1
nixos/tests/powerdns.nix
···
import ./make-test.nix ({ pkgs, ... }: {
name = "powerdns";
-
nodes.server = { config, pkgs, ... }: {
services.powerdns.enable = true;
};
···
import ./make-test.nix ({ pkgs, ... }: {
name = "powerdns";
+
nodes.server = { ... }: {
services.powerdns.enable = true;
};
+1 -1
nixos/tests/predictable-interface-names.nix
···
name = "${if predictable then "" else "un"}predictableInterfaceNames${if withNetworkd then "-with-networkd" else ""}";
meta = {};
-
machine = { config, lib, ... }: {
networking.usePredictableInterfaceNames = lib.mkForce predictable;
networking.useNetworkd = withNetworkd;
networking.dhcpcd.enable = !withNetworkd;
···
name = "${if predictable then "" else "un"}predictableInterfaceNames${if withNetworkd then "-with-networkd" else ""}";
meta = {};
+
machine = { lib, ... }: {
networking.usePredictableInterfaceNames = lib.mkForce predictable;
networking.useNetworkd = withNetworkd;
networking.dhcpcd.enable = !withNetworkd;
+2 -2
nixos/tests/printing.nix
···
nodes = {
server =
-
{ config, pkgs, ... }:
{ services.printing.enable = true;
services.printing.listenAddresses = [ "*:631" ];
services.printing.defaultShared = true;
···
};
client =
-
{ config, pkgs, nodes, ... }:
{ services.printing.enable = true;
};
···
nodes = {
server =
+
{ ... }:
{ services.printing.enable = true;
services.printing.listenAddresses = [ "*:631" ];
services.printing.defaultShared = true;
···
};
client =
+
{ ... }:
{ services.printing.enable = true;
};
+1 -1
nixos/tests/prometheus.nix
···
name = "prometheus";
nodes = {
-
one = { config, pkgs, ... }: {
services.prometheus = {
enable = true;
scrapeConfigs = [{
···
name = "prometheus";
nodes = {
+
one = { ... }: {
services.prometheus = {
enable = true;
scrapeConfigs = [{
+1 -1
nixos/tests/prosody.nix
···
import ./make-test.nix {
name = "prosody";
-
machine = { config, pkgs, ... }: {
services.prosody = {
enable = true;
# TODO: use a self-signed certificate
···
import ./make-test.nix {
name = "prosody";
+
machine = { pkgs, ... }: {
services.prosody = {
enable = true;
# TODO: use a self-signed certificate
+3 -3
nixos/tests/proxy.nix
···
let
backend =
-
{ config, pkgs, ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
···
nodes =
{ proxy =
-
{ config, pkgs, nodes, ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "bar@example.org";
···
backend1 = backend;
backend2 = backend;
-
client = { config, pkgs, ... }: { };
};
testScript =
···
let
backend =
+
{ pkgs, ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "foo@example.org";
···
nodes =
{ proxy =
+
{ nodes, ... }:
{ services.httpd.enable = true;
services.httpd.adminAddr = "bar@example.org";
···
backend1 = backend;
backend2 = backend;
+
client = { ... }: { };
};
testScript =
+5 -5
nixos/tests/quagga.nix
···
nodes = {
client =
-
{ config, pkgs, nodes, ... }:
{
virtualisation.vlans = [ 1 ];
networking.defaultGateway = ifAddr nodes.router1 "eth1";
};
router1 =
-
{ config, pkgs, nodes, ... }:
{
virtualisation.vlans = [ 1 2 ];
boot.kernel.sysctl."net.ipv4.ip_forward" = "1";
···
};
router2 =
-
{ config, pkgs, nodes, ... }:
{
virtualisation.vlans = [ 3 2 ];
boot.kernel.sysctl."net.ipv4.ip_forward" = "1";
···
};
server =
-
{ config, pkgs, nodes, ... }:
{
virtualisation.vlans = [ 3 ];
networking.defaultGateway = ifAddr nodes.router2 "eth1";
···
};
testScript =
-
{ nodes, ... }:
''
startAll;
···
nodes = {
client =
+
{ nodes, ... }:
{
virtualisation.vlans = [ 1 ];
networking.defaultGateway = ifAddr nodes.router1 "eth1";
};
router1 =
+
{ ... }:
{
virtualisation.vlans = [ 1 2 ];
boot.kernel.sysctl."net.ipv4.ip_forward" = "1";
···
};
router2 =
+
{ ... }:
{
virtualisation.vlans = [ 3 2 ];
boot.kernel.sysctl."net.ipv4.ip_forward" = "1";
···
};
server =
+
{ nodes, ... }:
{
virtualisation.vlans = [ 3 ];
networking.defaultGateway = ifAddr nodes.router2 "eth1";
···
};
testScript =
+
{ ... }:
''
startAll;
+2 -2
nixos/tests/quake3.nix
···
#makeCoverageReport = true;
client =
-
{ config, pkgs, ... }:
{ imports = [ ./common/x11.nix ];
hardware.opengl.driSupport = true;
···
nodes =
{ server =
-
{ config, pkgs, ... }:
{ systemd.services."quake3-server" =
{ wantedBy = [ "multi-user.target" ];
···
#makeCoverageReport = true;
client =
+
{ pkgs, ... }:
{ imports = [ ./common/x11.nix ];
hardware.opengl.driSupport = true;
···
nodes =
{ server =
+
{ pkgs, ... }:
{ systemd.services."quake3-server" =
{ wantedBy = [ "multi-user.target" ];
+1 -1
nixos/tests/rabbitmq.nix
···
};
nodes = {
-
one = { config, pkgs, ... }: {
services.rabbitmq.enable = true;
};
};
···
};
nodes = {
+
one = { ... }: {
services.rabbitmq.enable = true;
};
};
+1 -1
nixos/tests/radicale.nix
···
in
-
import ./make-test.nix ({ pkgs, lib, ... }@args: {
name = "radicale";
meta.maintainers = with lib.maintainers; [ aneeshusa infinisil ];
···
in
+
import ./make-test.nix ({ lib, ... }@args: {
name = "radicale";
meta.maintainers = with lib.maintainers; [ aneeshusa infinisil ];
+1 -1
nixos/tests/riak.nix
···
nodes = {
master =
-
{ pkgs, config, ... }:
{
services.riak.enable = true;
···
nodes = {
master =
+
{ pkgs, ... }:
{
services.riak.enable = true;
+1 -1
nixos/tests/run-in-machine.nix
···
let
output = runInMachine {
drv = pkgs.hello;
-
machine = { config, pkgs, ... }: { /* services.sshd.enable = true; */ };
};
in pkgs.runCommand "verify-output" { inherit output; } ''
if [ ! -e "$output/bin/hello" ]; then
···
let
output = runInMachine {
drv = pkgs.hello;
+
machine = { ... }: { /* services.sshd.enable = true; */ };
};
in pkgs.runCommand "verify-output" { inherit output; } ''
if [ ! -e "$output/bin/hello" ]; then
+2 -2
nixos/tests/rxe.nix
···
-
import ./make-test.nix ({ pkgs, ... } :
let
-
node = { config, pkgs, lib, ... } : {
networking = {
firewall = {
allowedUDPPorts = [ 4791 ]; # open RoCE port
···
+
import ./make-test.nix ({ ... } :
let
+
node = { pkgs, ... } : {
networking = {
firewall = {
allowedUDPPorts = [ 4791 ]; # open RoCE port
+2 -2
nixos/tests/samba.nix
···
nodes =
{ client =
-
{ config, pkgs, ... }:
{ fileSystems = pkgs.lib.mkVMOverride
{ "/public" = {
fsType = "cifs";
···
};
server =
-
{ config, pkgs, ... }:
{ services.samba.enable = true;
services.samba.shares.public =
{ path = "/public";
···
nodes =
{ client =
+
{ pkgs, ... }:
{ fileSystems = pkgs.lib.mkVMOverride
{ "/public" = {
fsType = "cifs";
···
};
server =
+
{ ... }:
{ services.samba.enable = true;
services.samba.shares.public =
{ path = "/public";
+3 -3
nixos/tests/sddm.nix
···
default = {
name = "sddm";
-
machine = { lib, ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager.sddm.enable = true;
···
maintainers = [ ttuegel ];
};
-
machine = { lib, ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager.sddm = {
···
services.xserver.desktopManager.default = "none";
};
-
testScript = { nodes, ... }: ''
startAll;
$machine->waitForFile("/home/alice/.Xauthority");
$machine->succeed("xauth merge ~alice/.Xauthority");
···
default = {
name = "sddm";
+
machine = { ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager.sddm.enable = true;
···
maintainers = [ ttuegel ];
};
+
machine = { ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager.sddm = {
···
services.xserver.desktopManager.default = "none";
};
+
testScript = { ... }: ''
startAll;
$machine->waitForFile("/home/alice/.Xauthority");
$machine->succeed("xauth merge ~alice/.Xauthority");
+1 -1
nixos/tests/simple.nix
···
maintainers = [ eelco ];
};
-
machine = { config, pkgs, ... }: {
imports = [ ../modules/profiles/minimal.nix ];
};
···
maintainers = [ eelco ];
};
+
machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
};
+1 -1
nixos/tests/slim.nix
···
maintainers = [ aszlig ];
};
-
machine = { pkgs, lib, ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.windowManager.default = "icewm";
···
maintainers = [ aszlig ];
};
+
machine = { pkgs, ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.windowManager.default = "icewm";
+4 -4
nixos/tests/slurm.nix
···
-
import ./make-test.nix ({ pkgs, ... }:
let mungekey = "mungeverryweakkeybuteasytointegratoinatest";
slurmconfig = {
controlMachine = "control";
···
nodes =
let
computeNode =
-
{ config, pkgs, ...}:
{
# TODO slrumd port and slurmctld port should be configurations and
# automatically allowed by the firewall.
···
in {
control =
-
{ config, pkgs, ...}:
{
networking.firewall.enable = false;
services.slurm = {
···
};
submit =
-
{ config, pkgs, ...}:
{
networking.firewall.enable = false;
services.slurm = {
···
+
import ./make-test.nix ({ ... }:
let mungekey = "mungeverryweakkeybuteasytointegratoinatest";
slurmconfig = {
controlMachine = "control";
···
nodes =
let
computeNode =
+
{ ...}:
{
# TODO slrumd port and slurmctld port should be configurations and
# automatically allowed by the firewall.
···
in {
control =
+
{ ...}:
{
networking.firewall.enable = false;
services.slurm = {
···
};
submit =
+
{ ...}:
{
networking.firewall.enable = false;
services.slurm = {
+1 -1
nixos/tests/smokeping.nix
···
nodes = {
sm =
-
{ pkgs, config, ... }:
{
services.smokeping = {
enable = true;
···
nodes = {
sm =
+
{ ... }:
{
services.smokeping = {
enable = true;
+3 -3
nixos/tests/strongswan-swanctl.nix
···
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ basvandijk ];
nodes = {
-
alice = { nodes, ... } : {
virtualisation.vlans = [ 0 ];
networking = {
dhcpcd.enable = false;
···
};
};
-
moon = {pkgs, config, nodes, ...} :
let strongswan = config.services.strongswan-swanctl.package;
in {
virtualisation.vlans = [ 0 1 ];
···
};
};
-
carol = {pkgs, config, nodes, ...} :
let strongswan = config.services.strongswan-swanctl.package;
in {
virtualisation.vlans = [ 1 ];
···
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ basvandijk ];
nodes = {
+
alice = { ... } : {
virtualisation.vlans = [ 0 ];
networking = {
dhcpcd.enable = false;
···
};
};
+
moon = { config, ...} :
let strongswan = config.services.strongswan-swanctl.package;
in {
virtualisation.vlans = [ 0 1 ];
···
};
};
+
carol = { config, ...} :
let strongswan = config.services.strongswan-swanctl.package;
in {
virtualisation.vlans = [ 1 ];
+2 -2
nixos/tests/subversion.nix
···
nodes =
{ webserver =
-
{ config, pkgs, ... }:
{
services.httpd.enable = true;
···
};
client =
-
{ config, pkgs, ... }:
{
environment.systemPackages = [ pkgs.subversion ];
···
nodes =
{ webserver =
+
{ ... }:
{
services.httpd.enable = true;
···
};
client =
+
{ pkgs, ... }:
{
environment.systemPackages = [ pkgs.subversion ];
+1 -1
nixos/tests/sudo.nix
···
};
machine =
-
{ config, lib, pkgs, ... }:
with lib;
{
users.groups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; };
···
};
machine =
+
{ lib, ... }:
with lib;
{
users.groups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; };
+2 -2
nixos/tests/switch-test.nix
···
};
nodes = {
-
machine = { config, lib, pkgs, ... }: {
users.mutableUsers = false;
};
-
other = { config, lib, pkgs, ... }: {
users.mutableUsers = true;
};
};
···
};
nodes = {
+
machine = { ... }: {
users.mutableUsers = false;
};
+
other = { ... }: {
users.mutableUsers = true;
};
};
+1 -1
nixos/tests/tomcat.nix
···
nodes = {
server =
-
{ pkgs, config, ... }:
{ services.tomcat.enable = true;
services.httpd.enable = true;
···
nodes = {
server =
+
{ ... }:
{ services.tomcat.enable = true;
services.httpd.enable = true;
+2 -2
nixos/tests/tor.nix
···
meta.maintainers = with maintainers; [ joachifm ];
common =
-
{ config, ... }:
{ boot.kernelParams = [ "audit=0" "apparmor=0" "quiet" ];
networking.firewall.enable = false;
networking.useDHCP = false;
};
nodes.client =
-
{ config, pkgs, ... }:
{ imports = [ common ];
environment.systemPackages = with pkgs; [ netcat ];
services.tor.enable = true;
···
meta.maintainers = with maintainers; [ joachifm ];
common =
+
{ ... }:
{ boot.kernelParams = [ "audit=0" "apparmor=0" "quiet" ];
networking.firewall.enable = false;
networking.useDHCP = false;
};
nodes.client =
+
{ pkgs, ... }:
{ imports = [ common ];
environment.systemPackages = with pkgs; [ netcat ];
services.tor.enable = true;
+4 -4
nixos/tests/trac.nix
···
nodes = {
storage =
-
{ config, pkgs, ... }:
{ services.nfs.server.enable = true;
services.nfs.server.exports = ''
/repos 192.168.1.0/255.255.255.0(rw,no_root_squash)
···
};
postgresql =
-
{ config, pkgs, ... }:
{ services.postgresql.enable = true;
services.postgresql.package = pkgs.postgresql;
services.postgresql.enableTCPIP = true;
···
};
webserver =
-
{ config, pkgs, ... }:
{ fileSystems = pkgs.lib.mkVMOverride
[ { mountPoint = "/repos";
device = "storage:/repos";
···
};
client =
-
{ config, pkgs, ... }:
{ imports = [ ./common/x11.nix ];
services.xserver.desktopManager.plasma5.enable = true;
};
···
nodes = {
storage =
+
{ ... }:
{ services.nfs.server.enable = true;
services.nfs.server.exports = ''
/repos 192.168.1.0/255.255.255.0(rw,no_root_squash)
···
};
postgresql =
+
{ pkgs, ... }:
{ services.postgresql.enable = true;
services.postgresql.package = pkgs.postgresql;
services.postgresql.enableTCPIP = true;
···
};
webserver =
+
{ pkgs, ... }:
{ fileSystems = pkgs.lib.mkVMOverride
[ { mountPoint = "/repos";
device = "storage:/repos";
···
};
client =
+
{ ... }:
{ imports = [ ./common/x11.nix ];
services.xserver.desktopManager.plasma5.enable = true;
};
+1 -1
nixos/tests/transmission.nix
···
maintainers = [ coconnor ];
};
-
machine = { config, pkgs, ... }: {
imports = [ ../modules/profiles/minimal.nix ];
networking.firewall.allowedTCPPorts = [ 9091 ];
···
maintainers = [ coconnor ];
};
+
machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
networking.firewall.allowedTCPPorts = [ 9091 ];
+1 -1
nixos/tests/udisks2.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ services.udisks2.enable = true;
imports = [ ./common/user-account.nix ];
···
};
machine =
+
{ ... }:
{ services.udisks2.enable = true;
imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/vault.nix
···
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ lnl7 ];
};
-
machine = { config, pkgs, ... }: {
environment.systemPackages = [ pkgs.vault ];
environment.variables.VAULT_ADDR = "http://127.0.0.1:8200";
services.vault.enable = true;
···
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ lnl7 ];
};
+
machine = { pkgs, ... }: {
environment.systemPackages = [ pkgs.vault ];
environment.variables.VAULT_ADDR = "http://127.0.0.1:8200";
services.vault.enable = true;
+2 -2
nixos/tests/wordpress.nix
···
nodes =
{ web =
-
{ config, pkgs, ... }:
{
services.mysql = {
enable = true;
···
};
testScript =
-
{ nodes, ... }:
''
startAll;
···
nodes =
{ web =
+
{ pkgs, ... }:
{
services.mysql = {
enable = true;
···
};
testScript =
+
{ ... }:
''
startAll;
+1 -1
nixos/tests/xdg-desktop-portal.nix
···
maintainers = pkgs.xdg-desktop-portal.meta.maintainers;
};
-
machine = { config, pkgs, ... }: {
environment.systemPackages = with pkgs; [ gnome-desktop-testing ];
};
···
maintainers = pkgs.xdg-desktop-portal.meta.maintainers;
};
+
machine = { pkgs, ... }: {
environment.systemPackages = with pkgs; [ gnome-desktop-testing ];
};
+1 -1
nixos/tests/xfce.nix
···
};
machine =
-
{ config, pkgs, ... }:
{ imports = [ ./common/user-account.nix ];
···
};
machine =
+
{ pkgs, ... }:
{ imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/xmonad.nix
···
};
};
-
testScript = { nodes, ... }: ''
$machine->waitForX;
$machine->waitForFile("/home/alice/.Xauthority");
$machine->succeed("xauth merge ~alice/.Xauthority");
···
};
};
+
testScript = { ... }: ''
$machine->waitForX;
$machine->waitForFile("/home/alice/.Xauthority");
$machine->succeed("xauth merge ~alice/.Xauthority");
+3 -3
nixos/tests/xrdp.nix
···
};
nodes = {
-
server = { lib, pkgs, ... }: {
imports = [ ./common/user-account.nix ];
services.xrdp.enable = true;
services.xrdp.defaultWindowManager = "${pkgs.xterm}/bin/xterm";
networking.firewall.allowedTCPPorts = [ 3389 ];
};
-
client = { lib, pkgs, ... }: {
imports = [ ./common/x11.nix ./common/user-account.nix ];
services.xserver.displayManager.auto.user = "alice";
environment.systemPackages = [ pkgs.freerdp ];
···
};
};
-
testScript = { nodes, ... }: ''
startAll;
$client->waitForX;
···
};
nodes = {
+
server = { pkgs, ... }: {
imports = [ ./common/user-account.nix ];
services.xrdp.enable = true;
services.xrdp.defaultWindowManager = "${pkgs.xterm}/bin/xterm";
networking.firewall.allowedTCPPorts = [ 3389 ];
};
+
client = { pkgs, ... }: {
imports = [ ./common/x11.nix ./common/user-account.nix ];
services.xserver.displayManager.auto.user = "alice";
environment.systemPackages = [ pkgs.freerdp ];
···
};
};
+
testScript = { ... }: ''
startAll;
$client->waitForX;
+1 -1
nixos/tests/zfs.nix
···
maintainers = [ adisbladis ];
};
-
machine = { config, lib, pkgs, ... }:
{
virtualisation.emptyDiskImages = [ 4096 ];
networking.hostId = "deadbeef";
···
maintainers = [ adisbladis ];
};
+
machine = { pkgs, ... }:
{
virtualisation.emptyDiskImages = [ 4096 ];
networking.hostId = "deadbeef";
+1 -1
nixos/tests/zookeeper.nix
···
};
nodes = {
-
server = { pkgs, config, ... }: {
services.zookeeper = {
enable = true;
};
···
};
nodes = {
+
server = { ... }: {
services.zookeeper = {
enable = true;
};