Merge pull request #146804 from Artturin/qemudefaultmem

Artturi 53edfe1d 8d6a02b0

+1 -1
nixos/modules/virtualisation/qemu-vm.nix
···
virtualisation.memorySize =
mkOption {
type = types.ints.positive;
-
default = 384;
+
default = 1024;
description =
''
The memory size in megabytes of the virtual machine.
-4
nixos/tests/airsonic.nix
···
enable = true;
maxMemory = 800;
};
-
-
# Airsonic is a Java application, and unfortunately requires a significant
-
# amount of memory.
-
virtualisation.memorySize = 1024;
};
testScript = ''
-1
nixos/tests/cage.nix
···
program = "${pkgs.xterm}/bin/xterm -cm -pc -fa Monospace -fs 24";
};
-
virtualisation.memorySize = 1024;
# Need to switch to a different GPU driver than the default one (-vga std) so that Cage can launch:
virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ];
};
-1
nixos/tests/cagebreak.nix
···
programs.xwayland.enable = true;
environment.systemPackages = [ pkgs.cagebreak pkgs.wayland-utils ];
-
virtualisation.memorySize = 1024;
# Need to switch to a different GPU driver than the default one (-vga std) so that Cagebreak can launch:
virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ];
};
-1
nixos/tests/cassandra.nix
···
];
};
services.cassandra = cassandraCfg ipAddress // extra;
-
virtualisation.memorySize = 1024;
};
in
{
-1
nixos/tests/ceph-multi-node.nix
···
generateHost = { pkgs, cephConfig, networkConfig, ... }: {
virtualisation = {
-
memorySize = 1024;
emptyDiskImages = [ 20480 ];
vlans = [ 1 ];
};
-1
nixos/tests/ceph-single-node-bluestore.nix
···
generateHost = { pkgs, cephConfig, networkConfig, ... }: {
virtualisation = {
-
memorySize = 1024;
emptyDiskImages = [ 20480 20480 20480 ];
vlans = [ 1 ];
};
-1
nixos/tests/ceph-single-node.nix
···
generateHost = { pkgs, cephConfig, networkConfig, ... }: {
virtualisation = {
-
memorySize = 1024;
emptyDiskImages = [ 20480 20480 20480 ];
vlans = [ 1 ];
};
-1
nixos/tests/common/wayland-cage.nix
···
};
virtualisation = {
-
memorySize = 1024;
qemu.options = [ "-vga virtio" ];
};
}
-1
nixos/tests/containers-bridge.nix
···
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
-
virtualisation.memorySize = 768;
networking.bridges = {
br0 = {
-1
nixos/tests/containers-ephemeral.nix
···
};
machine = { pkgs, ... }: {
-
virtualisation.memorySize = 768;
virtualisation.writableStore = true;
containers.webserver = {
-1
nixos/tests/containers-extra_veth.nix
···
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
-
virtualisation.memorySize = 768;
virtualisation.vlans = [];
networking.useDHCP = false;
-1
nixos/tests/containers-hosts.nix
···
machine =
{ lib, ... }:
{
-
virtualisation.memorySize = 256;
virtualisation.vlans = [];
networking.bridges.br0.interfaces = [];
-1
nixos/tests/containers-imperative.nix
···
nix.binaryCaches = []; # don't try to access cache.nixos.org
virtualisation.writableStore = true;
-
virtualisation.memorySize = 1024;
# Make sure we always have all the required dependencies for creating a
# container available within the VM, because we don't have network access.
virtualisation.additionalPaths = let
-1
nixos/tests/containers-ip.nix
···
imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation = {
writableStore = true;
-
memorySize = 768;
};
containers.webserver4 = webserverFor "10.231.136.1" "10.231.136.2";
-2
nixos/tests/containers-macvlans.nix
···
machine1 =
{ lib, ... }:
{
-
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
# To be able to ping containers from the host, it is necessary
···
machine2 =
{ ... }:
{
-
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
};
-4
nixos/tests/containers-physical_interfaces.nix
···
nodes = {
server = { ... }:
{
-
virtualisation.memorySize = 256;
virtualisation.vlans = [ 1 ];
containers.server = {
···
};
};
bridged = { ... }: {
-
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
containers.bridged = {
···
};
bonded = { ... }: {
-
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
containers.bonded = {
···
};
bridgedbond = { ... }: {
-
virtualisation.memorySize = 128;
virtualisation.vlans = [ 1 ];
containers.bridgedbond = {
-1
nixos/tests/containers-portforward.nix
···
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
-
virtualisation.memorySize = 768;
containers.webserver =
{ privateNetwork = true;
-1
nixos/tests/containers-tmpfs.nix
···
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
-
virtualisation.memorySize = 768;
containers.tmpfs =
{
-2
nixos/tests/custom-ca.nix
···
# chromium-based browsers refuse to run as root
test-support.displayManager.auto.user = "alice";
-
# browsers may hang with the default memory
-
virtualisation.memorySize = 500;
networking.hosts."127.0.0.1" = [ "good.example.com" "bad.example.com" ];
security.pki.certificateFiles = [ "${example-good-cert}/ca.crt" ];
-1
nixos/tests/enlightenment.nix
···
};
};
hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
-
virtualisation.memorySize = 1024;
environment.systemPackages = [ pkgs.xdotool ];
services.acpid.enable = true;
services.connman.enable = true;
-1
nixos/tests/fcitx/default.nix
···
...
}:
{
-
virtualisation.memorySize = 1024;
imports = [
../common/user-account.nix
-1
nixos/tests/fenics.nix
···
gcc
(python3.withPackages (ps: with ps; [ fenics ]))
];
-
virtualisation.memorySize = 512;
};
};
testScript =
-3
nixos/tests/firefox.nix
···
pkgs.xdotool
];
-
# Need some more memory to record audio.
-
virtualisation.memorySize = 500;
-
# Create a virtual sound device, with mixing
# and all, for recording audio.
boot.kernelModules = [ "snd-aloop" ];
-1
nixos/tests/gerrit.nix
···
{ config, pkgs, ... }: {
networking.firewall.allowedTCPPorts = [ 80 2222 ];
-
virtualisation.memorySize = 1024;
services.gerrit = {
enable = true;
-1
nixos/tests/gnome-xorg.nix
···
};
};
-
virtualisation.memorySize = 1024;
};
testScript = { nodes, ... }: let
-1
nixos/tests/gnome.nix
···
};
};
-
virtualisation.memorySize = 1024;
};
testScript = { nodes, ... }: let
-1
nixos/tests/graphite.nix
···
nodes = {
one =
{ ... }: {
-
virtualisation.memorySize = 1024;
time.timeZone = "UTC";
services.graphite = {
web = {
-2
nixos/tests/hadoop/hadoop.nix
···
# YARN cluster
rm1 = {pkgs, options, ...}: {
-
virtualisation.memorySize = 1024;
services.hadoop = {
inherit package coreSite hdfsSite;
yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA;
···
};
};
rm2 = {pkgs, options, ...}: {
-
virtualisation.memorySize = 1024;
services.hadoop = {
inherit package coreSite hdfsSite;
yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA;
-1
nixos/tests/hadoop/hdfs.nix
···
import ../make-test-python.nix ({...}: {
nodes = {
namenode = {pkgs, ...}: {
-
virtualisation.memorySize = 1024;
services.hadoop = {
package = pkgs.hadoop;
hdfs = {
-1
nixos/tests/installed-tests/fwupd.nix
···
services.fwupd.enable = true;
services.fwupd.disabledPlugins = lib.mkForce []; # don't disable test plugin
services.fwupd.enableTestRemote = true;
-
virtualisation.memorySize = 768;
};
}
-1
nixos/tests/jitsi-meet.nix
···
client = { nodes, pkgs, ... }: {
};
server = { config, pkgs, ... }: {
-
virtualisation.memorySize = 512;
services.jitsi-meet = {
enable = true;
hostName = "server";
-1
nixos/tests/kafka.nix
···
};
networking.firewall.allowedTCPPorts = [ 2181 ];
-
virtualisation.memorySize = 1024;
};
kafka = { ... }: {
services.apache-kafka = {
-1
nixos/tests/keycloak.nix
···
nodes = {
keycloak = { ... }: {
-
virtualisation.memorySize = 1024;
security.pki.certificateFiles = [
certs.ca.cert
-2
nixos/tests/lxd-image.nix
···
machine = { lib, ... }: {
virtualisation = {
-
# OOMs otherwise
-
memorySize = 1024;
# disk full otherwise
diskSize = 2048;
-1
nixos/tests/metabase.nix
···
nodes = {
machine = { ... }: {
services.metabase.enable = true;
-
virtualisation.memorySize = 1024;
};
};
-4
nixos/tests/mysql/mysql.nix
···
{
imports = [ users ];
-
# prevent oom:
-
# Kernel panic - not syncing: Out of memory: compulsory panic_on_oom is enabled
-
virtualisation.memorySize = 1024;
-
services.mysql.enable = true;
services.mysql.initialDatabases = [
{ name = "testdb3"; schema = ./testdb.sql; }
-1
nixos/tests/networking-proxy.nix
···
services.xserver.enable = false;
-
virtualisation.memorySize = 128;
};
in import ./make-test-python.nix ({ pkgs, ...} : {
name = "networking-proxy";
-1
nixos/tests/nginx-etag.nix
···
};
client = { pkgs, lib, ... }: {
-
virtualisation.memorySize = 512;
environment.systemPackages = let
testRunner = pkgs.writers.writePython3Bin "test-runner" {
libraries = [ pkgs.python3Packages.selenium ];
-1
nixos/tests/nixops/default.nix
···
nix.binaryCaches = lib.mkForce [ ];
users.users.person.isNormalUser = true;
virtualisation.writableStore = true;
-
virtualisation.memorySize = 1024 /*MiB*/;
virtualisation.additionalPaths = [
pkgs.hello
pkgs.figlet
-1
nixos/tests/opensmtpd-rspamd.nix
···
smtp2 = { pkgs, ... }: {
imports = [ common/user-account.nix ];
-
virtualisation.memorySize = 512;
networking = {
firewall.allowedTCPPorts = [ 25 143 ];
useDHCP = false;
-1
nixos/tests/pantheon.nix
···
services.xserver.enable = true;
services.xserver.desktopManager.pantheon.enable = true;
-
virtualisation.memorySize = 1024;
};
enableOCR = true;
-1
nixos/tests/paperless-ng.nix
···
enable = true;
passwordFile = builtins.toFile "password" "admin";
};
-
virtualisation.memorySize = 1024;
};
testScript = ''
-1
nixos/tests/plasma5-systemd-start.nix
···
user = "alice";
};
};
-
virtualisation.memorySize = 1024;
};
testScript = { nodes, ... }: let
-1
nixos/tests/plasma5.nix
···
user = "alice";
};
hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
-
virtualisation.memorySize = 1024;
};
testScript = { nodes, ... }: let
-1
nixos/tests/pleroma.nix
···
security.pki.certificateFiles = [ "${tls-cert}/cert.pem" ];
networking.extraHosts = hosts nodes;
networking.firewall.enable = false;
-
virtualisation.memorySize = 512;
environment.systemPackages = with pkgs; [
provision-db
provision-secrets
-1
nixos/tests/privacyidea.nix
···
machine = { ... }: {
virtualisation.cores = 2;
-
virtualisation.memorySize = 512;
services.privacyidea = {
enable = true;
-2
nixos/tests/prometheus-exporters.nix
···
extraFlags = [ "--lnd.network=regtest" ];
};
metricProvider = {
-
virtualisation.memorySize = 1024;
systemd.services.prometheus-lnd-exporter.serviceConfig.RestartSec = 15;
systemd.services.prometheus-lnd-exporter.after = [ "lnd.service" ];
services.bitcoind.regtest = {
···
};
metricProvider = {
services.rspamd.enable = true;
-
virtualisation.memorySize = 1024;
};
exporterTest = ''
wait_for_unit("rspamd.service")
-1
nixos/tests/prometheus.nix
···
# Minio requires at least 1GiB of free disk space to run.
virtualisation = {
diskSize = 2 * 1024;
-
memorySize = 1024;
};
networking.firewall.allowedTCPPorts = [ minioPort ];
-5
nixos/tests/rspamd.nix
···
machine = {
services.rspamd.enable = true;
networking.enableIPv6 = enableIPv6;
-
virtualisation.memorySize = 1024;
};
testScript = ''
start_all()
···
group = "rspamd";
}];
};
-
virtualisation.memorySize = 1024;
};
testScript = ''
···
'';
};
};
-
virtualisation.memorySize = 1024;
};
testScript = ''
···
rspamd_logger.infox(rspamd_config, 'Work dammit!!!')
'';
};
-
virtualisation.memorySize = 1024;
};
testScript = ''
${initMachine}
···
postfix.enable = true;
workers.rspamd_proxy.type = "rspamd_proxy";
};
-
virtualisation.memorySize = 1024;
};
testScript = ''
${initMachine}
-2
nixos/tests/seafile.nix
···
import ./make-test-python.nix ({ pkgs, ... }:
let
client = { config, pkgs, ... }: {
-
virtualisation.memorySize = 256;
environment.systemPackages = [ pkgs.seafile-shared pkgs.curl ];
};
in {
···
nodes = {
server = { config, pkgs, ... }: {
-
virtualisation.memorySize = 512;
services.seafile = {
enable = true;
ccnetSettings.General.SERVICE_URL = "http://server";
-1
nixos/tests/signal-desktop.nix
···
environment.systemPackages = with pkgs; [
signal-desktop file sqlite sqlcipher-signal
];
-
virtualisation.memorySize = 1024;
};
enableOCR = true;
-1
nixos/tests/spark/default.nix
···
nodes = {
worker = { nodes, pkgs, ... }: {
-
virtualisation.memorySize = 1024;
services.spark.worker = {
enable = true;
master = "master:7077";
-1
nixos/tests/sway.nix
···
# To test pinentry via gpg-agent:
programs.gnupg.agent.enable = true;
-
virtualisation.memorySize = 1024;
# Need to switch to a different GPU driver than the default one (-vga std) so that Sway can launch:
virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ];
};
-1
nixos/tests/sympa.nix
···
machine =
{ ... }:
{
-
virtualisation.memorySize = 1024;
services.sympa = {
enable = true;
-1
nixos/tests/systemd-cryptenroll.nix
···
environment.systemPackages = [ pkgs.cryptsetup ];
virtualisation = {
emptyDiskImages = [ 512 ];
-
memorySize = 1024;
qemu.options = [
"-chardev socket,id=chrtpm,path=/tmp/swtpm-sock"
"-tpmdev emulator,id=tpm0,chardev=chrtpm"
-1
nixos/tests/systemd.nix
···
imports = [ common/user-account.nix common/x11.nix ];
virtualisation.emptyDiskImages = [ 512 512 ];
-
virtualisation.memorySize = 1024;
environment.systemPackages = [ pkgs.cryptsetup ];
-1
nixos/tests/vault-postgresql.nix
···
maintainers = [ lnl7 roberth ];
};
machine = { lib, pkgs, ... }: {
-
virtualisation.memorySize = 512;
environment.systemPackages = [ pkgs.vault ];
environment.variables.VAULT_ADDR = "http://127.0.0.1:8200";
services.vault.enable = true;
-1
nixos/tests/vault.nix
···
environment.systemPackages = [ pkgs.vault ];
environment.variables.VAULT_ADDR = "http://127.0.0.1:8200";
services.vault.enable = true;
-
virtualisation.memorySize = 512;
};
testScript =
-1
nixos/tests/vaultwarden.nix
···
in
[ pkgs.firefox-unwrapped pkgs.geckodriver testRunner ];
-
virtualisation.memorySize = 768;
}
];
-1
nixos/tests/xfce.nix
···
hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
-
virtualisation.memorySize = 1024;
};
testScript = { nodes, ... }: let