treewide: machine -> nodes.machine

Changed files
+261 -261
nixos
tests
fcitx
hitch
hocker-fetchdocker
hydra
ihatemoney
installed-tests
kerberos
krb5
lorri
matrix
mysql
pam
php
web-servers
+1 -1
nixos/tests/aesmd.nix
···
maintainers = with lib.maintainers; [ veehaitch ];
};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
services.aesmd = {
enable = true;
settings = {
+1 -1
nixos/tests/agda.nix
···
maintainers = [ alexarice turion ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = [
(pkgs.agda.withPackages {
pkgs = p: [ p.standard-library ];
+1 -1
nixos/tests/airsonic.nix
···
maintainers = [ sumnerevans ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{
services.airsonic = {
+1 -1
nixos/tests/amazon-init-shell.nix
···
meta = with maintainers; {
maintainers = [ urbas ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [ ../modules/profiles/headless.nix ../modules/virtualisation/amazon-init.nix ];
services.openssh.enable = true;
+1 -1
nixos/tests/apfs.nix
···
name = "apfs";
meta.maintainers = with pkgs.lib.maintainers; [ Luflosi ];
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
virtualisation.emptyDiskImages = [ 1024 ];
boot.supportedFilesystems = [ "apfs" ];
+1 -1
nixos/tests/apparmor.nix
···
maintainers = [ julm ];
};
-
machine =
+
nodes.machine =
{ lib, pkgs, config, ... }:
with lib;
{
+1 -1
nixos/tests/atd.nix
···
maintainers = [ bjornfor ];
};
-
machine =
+
nodes.machine =
{ ... }:
{ services.atd.enable = true;
users.users.alice = { isNormalUser = true; };
+6 -6
nixos/tests/atop.nix
···
{
justThePackage = makeTest {
name = "atop-justThePackage";
-
machine = {
+
nodes.machine = {
environment.systemPackages = [ pkgs.atop ];
};
testScript = with assertions; builtins.concatStringsSep "\n" [
···
};
defaults = makeTest {
name = "atop-defaults";
-
machine = {
+
nodes.machine = {
programs.atop = {
enable = true;
};
···
};
minimal = makeTest {
name = "atop-minimal";
-
machine = {
+
nodes.machine = {
programs.atop = {
enable = true;
atopService.enable = false;
···
};
netatop = makeTest {
name = "atop-netatop";
-
machine = {
+
nodes.machine = {
programs.atop = {
enable = true;
netatop.enable = true;
···
};
atopgpu = makeTest {
name = "atop-atopgpu";
-
machine = {
+
nodes.machine = {
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (getName pkg) [
"cudatoolkit"
];
···
};
everything = makeTest {
name = "atop-everthing";
-
machine = {
+
nodes.machine = {
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (getName pkg) [
"cudatoolkit"
];
+1 -1
nixos/tests/bcachefs.nix
···
name = "bcachefs";
meta.maintainers = with pkgs.lib.maintainers; [ chiiruno ];
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
virtualisation.emptyDiskImages = [ 4096 ];
networking.hostId = "deadbeef";
boot.supportedFilesystems = [ "bcachefs" ];
+1 -1
nixos/tests/beanstalkd.nix
···
name = "beanstalkd";
meta.maintainers = [ lib.maintainers.aanderse ];
-
machine =
+
nodes.machine =
{ ... }:
{ services.beanstalkd.enable = true;
};
+1 -1
nixos/tests/bees.nix
···
{
name = "bees";
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
boot.initrd.postDeviceCommands = ''
${pkgs.btrfs-progs}/bin/mkfs.btrfs -f -L aux1 /dev/vdb
${pkgs.btrfs-progs}/bin/mkfs.btrfs -f -L aux2 /dev/vdc
+1 -1
nixos/tests/bind.nix
···
import ./make-test-python.nix {
name = "bind";
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
services.bind.enable = true;
services.bind.extraOptions = "empty-zones-enable no;";
services.bind.zones = lib.singleton {
+1 -1
nixos/tests/bitcoind.nix
···
maintainers = with maintainers; [ _1000101 ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.bitcoind."mainnet" = {
enable = true;
rpc = {
+1 -1
nixos/tests/blockbook-frontend.nix
···
maintainers = with maintainers; [ _1000101 ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.blockbook-frontend."test" = {
enable = true;
};
+1 -1
nixos/tests/boot-stage1.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "boot-stage1";
-
machine = { config, pkgs, lib, ... }: {
+
nodes.machine = { config, pkgs, lib, ... }: {
boot.extraModulePackages = let
compileKernelModule = name: source: pkgs.runCommandCC name rec {
inherit source;
+3 -3
nixos/tests/boot.nix
···
nodes = { };
testScript =
''
-
machine = create_machine(${machineConfig})
+
nodes.machine = create_machine(${machineConfig})
machine.start()
machine.wait_for_unit("multi-user.target")
machine.succeed("nix store verify --no-trust -r --option experimental-features nix-command /run/current-system")
···
name = "boot-netboot-" + name;
nodes = { };
testScript = ''
-
machine = create_machine(${machineConfig})
+
nodes.machine = create_machine(${machineConfig})
machine.start()
machine.wait_for_unit("multi-user.target")
machine.shutdown()
···
if os.system("qemu-img create -f qcow2 -F raw -b ${sdImage} ${mutableImage}") != 0:
raise RuntimeError("Could not create mutable linked image")
-
machine = create_machine(${machineConfig})
+
nodes.machine = create_machine(${machineConfig})
machine.start()
machine.wait_for_unit("multi-user.target")
machine.succeed("nix store verify -r --no-trust --option experimental-features nix-command /run/current-system")
+1 -1
nixos/tests/bpf.nix
···
name = "bpf";
meta.maintainers = with pkgs.lib.maintainers; [ martinetd ];
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
programs.bcc.enable = true;
environment.systemPackages = with pkgs; [ bpftrace ];
};
+1 -1
nixos/tests/breitbandmessung.nix
···
name = "breitbandmessung";
meta.maintainers = with lib.maintainers; [ b4dm4n ];
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [
./common/user-account.nix
./common/x11.nix
+1 -1
nixos/tests/brscan5.nix
···
maintainers = [ mattchrist ];
};
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{
nixpkgs.config.allowUnfree = true;
hardware.sane = {
+1 -1
nixos/tests/buildkite-agents.nix
···
maintainers = [ flokli ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.buildkite-agents = {
one = {
privateSshKeyPath = (import ./ssh-keys.nix pkgs).snakeOilPrivateKey;
+1 -1
nixos/tests/cage.nix
···
maintainers = [ matthewbauer ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/cagebreak.nix
···
maintainers = [ berbiche ];
};
-
machine = { config, ... }:
+
nodes.machine = { config, ... }:
let
alice = config.users.users.alice;
in {
+1 -1
nixos/tests/cfssl.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "cfssl";
-
machine = { config, lib, pkgs, ... }:
+
nodes.machine = { config, lib, pkgs, ... }:
{
networking.firewall.allowedTCPPorts = [ config.services.cfssl.port ];
+1 -1
nixos/tests/clickhouse.nix
···
name = "clickhouse";
meta.maintainers = with pkgs.lib.maintainers; [ ma27 ];
-
machine = {
+
nodes.machine = {
services.clickhouse.enable = true;
virtualisation.memorySize = 4096;
};
+1 -1
nixos/tests/cloud-init.nix
···
meta = with pkgs.lib.maintainers; {
maintainers = [ lewo ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
virtualisation.qemu.options = [ "-cdrom" "${metadataDrive}/metadata.iso" ];
services.cloud-init = {
+1 -1
nixos/tests/cntr.nix
···
meta = with pkgs.lib.maintainers; { maintainers = [ sorki mic92 ]; };
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
environment.systemPackages = [ pkgs.cntr ];
containers.test = {
autoStart = true;
+1 -1
nixos/tests/collectd.nix
···
name = "collectd";
meta = { };
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{
+1 -1
nixos/tests/containers-bridge.nix
···
maintainers = with lib.maintainers; [ aristid aszlig eelco kampfschlaefer ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
+1 -1
nixos/tests/containers-custom-pkgs.nix
···
maintainers = with lib.maintainers; [ adisbladis earvstedt ];
};
-
machine = { config, ... }: {
+
nodes.machine = { config, ... }: {
assertions = let
helloName = (builtins.head config.containers.test.config.system.extraDependencies).name;
in [ {
+1 -1
nixos/tests/containers-ephemeral.nix
···
maintainers = with lib.maintainers; [ patryk27 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
virtualisation.writableStore = true;
containers.webserver = {
+1 -1
nixos/tests/containers-extra_veth.nix
···
maintainers = with lib.maintainers; [ kampfschlaefer ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
+1 -1
nixos/tests/containers-hosts.nix
···
maintainers = with lib.maintainers; [ montag451 ];
};
-
machine =
+
nodes.machine =
{ lib, ... }:
{
virtualisation.vlans = [];
+1 -1
nixos/tests/containers-imperative.nix
···
maintainers = with lib.maintainers; [ aristid aszlig eelco kampfschlaefer ];
};
-
machine =
+
nodes.machine =
{ config, pkgs, lib, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
+1 -1
nixos/tests/containers-ip.nix
···
maintainers = with lib.maintainers; [ aristid aszlig eelco kampfschlaefer ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }: {
imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation = {
+1 -1
nixos/tests/containers-names.nix
···
maintainers = with lib.maintainers; [ patryk27 ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
# We're using the newest kernel, so that we can test containers with long names.
# Please see https://github.com/NixOS/nixpkgs/issues/38509 for details.
boot.kernelPackages = pkgs.linuxPackages_latest;
+1 -1
nixos/tests/containers-nested.nix
···
meta = with pkgs.lib.maintainers; { maintainers = [ sorki ]; };
-
machine = { lib, ... }:
+
nodes.machine = { lib, ... }:
let
makeNested = subConf: {
containers.nested = {
+1 -1
nixos/tests/containers-portforward.nix
···
maintainers = with lib.maintainers; [ aristid aszlig eelco kampfschlaefer ianwookim ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
+1 -1
nixos/tests/containers-tmpfs.nix
···
maintainers = with lib.maintainers; [ patryk27 ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{ imports = [ ../modules/installer/cd-dvd/channel.nix ];
virtualisation.writableStore = true;
+1 -1
nixos/tests/custom-ca.nix
···
enableOCR = true;
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{ imports = [ ./common/user-account.nix ./common/x11.nix ];
# chromium-based browsers refuse to run as root
+1 -1
nixos/tests/disable-installer-tools.nix
···
{
name = "disable-installer-tools";
-
machine =
+
nodes.machine =
{ pkgs, lib, ... }:
{
system.disableInstallerTools = true;
+1 -1
nixos/tests/dnsdist.nix
···
maintainers = with maintainers; [ jojosch ];
};
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
services.bind = {
enable = true;
extraOptions = "empty-zones-enable no;";
+1 -1
nixos/tests/doas.nix
···
maintainers = [ cole-h ];
};
-
machine =
+
nodes.machine =
{ ... }:
{
users.groups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; };
+1 -1
nixos/tests/documize.nix
···
maintainers = [ ma27 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = [ pkgs.jq ];
services.documize = {
+1 -1
nixos/tests/domination.nix
···
maintainers = [ fgaz ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
imports = [
./common/x11.nix
];
+1 -1
nixos/tests/dovecot.nix
···
import ./make-test-python.nix {
name = "dovecot";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ common/user-account.nix ];
services.postfix.enable = true;
services.dovecot2 = {
+1 -1
nixos/tests/ecryptfs.nix
···
{
name = "ecryptfs";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ ./common/user-account.nix ];
boot.kernelModules = [ "ecryptfs" ];
security.pam.enableEcryptfs = true;
+1 -1
nixos/tests/emacs-daemon.nix
···
enableOCR = true;
-
machine =
+
nodes.machine =
{ ... }:
{ imports = [ ./common/x11.nix ];
+1 -1
nixos/tests/enlightenment.nix
···
maintainers = [ romildo ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
+1 -1
nixos/tests/env.nix
···
maintainers = [ nequissimus ];
};
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages;
environment.etc.plainFile.text = ''
+1 -1
nixos/tests/etebase-server.nix
···
maintainers = [ felschr ];
};
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{
services.etebase-server = {
inherit dataDir;
+1 -1
nixos/tests/etesync-dav.nix
···
maintainers = [ _3699n ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
environment.systemPackages = [ pkgs.curl pkgs.etesync-dav ];
};
+1 -1
nixos/tests/fancontrol.nix
···
maintainers = [ evils ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
hardware.fancontrol.enable = true;
hardware.fancontrol.config = ''
+1 -1
nixos/tests/fcitx/default.nix
···
# copy_from_host works only for store paths
rec {
name = "fcitx";
-
machine =
+
nodes.machine =
{
pkgs,
...
+1 -1
nixos/tests/firefox.nix
···
maintainers = [ eelco shlevy ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{ imports = [ ./common/x11.nix ];
+1 -1
nixos/tests/fish.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "fish";
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{
+1 -1
nixos/tests/fluentd.nix
···
import ./make-test-python.nix ({ pkgs, lib, ... }: {
name = "fluentd";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.fluentd = {
enable = true;
config = ''
+1 -1
nixos/tests/fontconfig-default-fonts.nix
···
jtojnar
];
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
fonts.enableDefaultFonts = true; # Background fonts
fonts.fonts = with pkgs; [
noto-fonts-emoji
+1 -1
nixos/tests/fsck.nix
···
import ./make-test-python.nix {
name = "fsck";
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
virtualisation.emptyDiskImages = [ 1 ];
virtualisation.fileSystems = {
+1 -1
nixos/tests/ft2-clone.nix
···
maintainers = [ fgaz ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
imports = [
./common/x11.nix
];
+1 -1
nixos/tests/geth.nix
···
maintainers = with maintainers; [bachp ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.geth."mainnet" = {
enable = true;
http = {
+1 -1
nixos/tests/gnome-xorg.nix
···
maintainers = teams.gnome.members;
};
-
machine = { nodes, ... }: let
+
nodes.machine = { nodes, ... }: let
user = nodes.machine.config.users.users.alice;
in
+1 -1
nixos/tests/gnome.nix
···
maintainers = teams.gnome.members;
};
-
machine =
+
nodes.machine =
{ ... }:
{ imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/gotify-server.nix
···
maintainers = [ ma27 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = [ pkgs.jq ];
services.gotify = {
+1 -1
nixos/tests/graylog.nix
···
name = "graylog";
meta.maintainers = with lib.maintainers; [ ];
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
virtualisation.memorySize = 4096;
virtualisation.diskSize = 4096;
+1 -1
nixos/tests/grocy.nix
···
maintainers = [ ma27 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.grocy = {
enable = true;
hostName = "localhost";
+1 -1
nixos/tests/grub.nix
···
maintainers = [ rnhmjoj ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
virtualisation.useBootLoader = true;
boot.loader.timeout = null;
+1 -1
nixos/tests/hardened.nix
···
maintainers = [ joachifm ];
};
-
machine =
+
nodes.machine =
{ lib, pkgs, config, ... }:
with lib;
{ users.users.alice = { isNormalUser = true; extraGroups = [ "proc" ]; };
+1 -1
nixos/tests/herbstluftwm.nix
···
maintainers = with lib.maintainers; [ thibautmarty ];
};
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ ./common/x11.nix ./common/user-account.nix ];
test-support.displayManager.auto.user = "alice";
services.xserver.displayManager.defaultSession = lib.mkForce "none+herbstluftwm";
+1 -1
nixos/tests/hibernate.nix
···
nodes = {
# System configuration used for installing the installedConfig from above.
-
machine = { config, lib, pkgs, ... }: with lib; {
+
nodes.machine = { config, lib, pkgs, ... }: with lib; {
imports = [
../modules/profiles/installation-device.nix
../modules/profiles/base.nix
+1 -1
nixos/tests/hitch/default.nix
···
meta = with pkgs.lib.maintainers; {
maintainers = [ jflanglois ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = [ pkgs.curl ];
services.hitch = {
enable = true;
+1 -1
nixos/tests/hocker-fetchdocker/default.nix
···
broken = true; # tries to download from registry-1.docker.io - how did this ever work?
};
-
machine = import ./machine.nix;
+
nodes.machine = import ./machine.nix;
testScript = ''
start_all()
+1 -1
nixos/tests/hockeypuck.nix
···
name = "hockeypuck";
meta.maintainers = with lib.maintainers; [ etu ];
-
machine = { ... }: {
+
nodes.machine = { ... }: {
# Used for test
environment.systemPackages = [ pkgs.gnupg ];
+1 -1
nixos/tests/hostname.nix
···
maintainers = [ primeos blitz ];
};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
networking.hostName = hostName;
networking.domain = domain;
+1 -1
nixos/tests/hound.nix
···
meta = with pkgs.lib.maintainers; {
maintainers = [ grahamc ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.hound = {
enable = true;
config = ''
+1 -1
nixos/tests/hydra/default.nix
···
maintainers = [ lewo ma27 ];
};
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ baseConfig ];
services.hydra = { inherit package; };
};
+1 -1
nixos/tests/i3wm.nix
···
maintainers = [ aszlig ];
};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
imports = [ ./common/x11.nix ./common/user-account.nix ];
test-support.displayManager.auto.user = "alice";
services.xserver.displayManager.defaultSession = lib.mkForce "none+i3";
+1 -1
nixos/tests/ihatemoney/default.nix
···
inherit (import ../../lib/testing-python.nix { inherit system pkgs; }) makeTest;
f = backend: makeTest {
name = "ihatemoney-${backend}";
-
machine = { nodes, lib, ... }: {
+
nodes.machine = { nodes, lib, ... }: {
services.ihatemoney = {
enable = true;
enablePublicProjectCreation = true;
+1 -1
nixos/tests/incron.nix
···
name = "incron";
meta.maintainers = [ lib.maintainers.aanderse ];
-
machine =
+
nodes.machine =
{ ... }:
{ services.incron.enable = true;
services.incron.extraPackages = [ pkgs.coreutils ];
+1 -1
nixos/tests/initrd-network.nix
···
meta.maintainers = [ pkgs.lib.maintainers.eelco ];
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
boot.initrd.network.enable = true;
boot.initrd.network.postCommands =
+1 -1
nixos/tests/initrd-secrets.nix
···
meta.maintainers = [ lib.maintainers.lheckemann ];
-
machine = { ... }: {
+
nodes.machine = { ... }: {
virtualisation.useBootLoader = true;
boot.initrd.secrets = {
"/test" = secretInStore;
+1 -1
nixos/tests/input-remapper.nix
···
maintainers = with pkgs.lib.maintainers; [ LunNova ];
};
-
machine = { config, ... }:
+
nodes.machine = { config, ... }:
let user = config.users.users.sybil; in
{
imports = [
+1 -1
nixos/tests/installed-tests/default.nix
···
maintainers = tested.meta.maintainers;
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [
testConfig
] ++ optional withX11 ../common/x11.nix;
+1 -1
nixos/tests/invidious.nix
···
maintainers = [ sbruder ];
};
-
machine = { config, lib, pkgs, ... }: {
+
nodes.machine = { config, lib, pkgs, ... }: {
services.invidious = {
enable = true;
};
+1 -1
nixos/tests/isso.nix
···
maintainers = [ asbachb ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
services.isso = {
enable = true;
settings = {
+1 -1
nixos/tests/jellyfin.nix
···
name = "jellyfin";
meta.maintainers = with lib.maintainers; [ minijackson ];
-
machine =
+
nodes.machine =
{ ... }:
{
services.jellyfin.enable = true;
+1 -1
nixos/tests/jibri.nix
···
maintainers = teams.jitsi.members;
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
virtualisation.memorySize = 5120;
services.jitsi-meet = {
+1 -1
nixos/tests/k3s-single-node-docker.nix
···
maintainers = [ euank ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = with pkgs; [ k3s gzip ];
# k3s uses enough resources the default vm fails.
+1 -1
nixos/tests/k3s-single-node.nix
···
maintainers = [ euank ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = with pkgs; [ k3s gzip ];
# k3s uses enough resources the default vm fails.
+1 -1
nixos/tests/kbd-setfont-decompress.nix
···
meta.maintainers = with lib.maintainers; [ oxalica ];
-
machine = { ... }: {};
+
nodes.machine = { ... }: {};
testScript = ''
machine.succeed("gzip -cd ${pkgs.terminus_font}/share/consolefonts/ter-v16b.psf.gz >font.psf")
+1 -1
nixos/tests/kbd-update-search-paths-patch.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "kbd-update-search-paths-patch";
-
machine = { pkgs, options, ... }: {
+
nodes.machine = { pkgs, options, ... }: {
console = {
packages = options.console.packages.default ++ [ pkgs.terminus_font ];
};
+1 -1
nixos/tests/keepassxc.nix
···
maintainers = [ turion ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [
+1 -1
nixos/tests/kerberos/heimdal.nix
···
import ../make-test-python.nix ({pkgs, ...}: {
name = "kerberos_server-heimdal";
-
machine = { config, libs, pkgs, ...}:
+
nodes.machine = { config, libs, pkgs, ...}:
{ services.kerberos_server =
{ enable = true;
realms = {
+1 -1
nixos/tests/kerberos/mit.nix
···
import ../make-test-python.nix ({pkgs, ...}: {
name = "kerberos_server-mit";
-
machine = { config, libs, pkgs, ...}:
+
nodes.machine = { config, libs, pkgs, ...}:
{ services.kerberos_server =
{ enable = true;
realms = {
+1 -1
nixos/tests/kernel-generic.nix
···
maintainers = [ nequissimus atemu ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
boot.kernelPackages = linuxPackages;
};
+1 -1
nixos/tests/kernel-latest-ath-user-regd.nix
···
maintainers = [ veehaitch ];
};
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages_latest;
networking.wireless.athUserRegulatoryDomain = true;
+1 -1
nixos/tests/kexec.nix
···
maintainers = [ eelco ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{ virtualisation.vlans = [ ]; };
testScript =
+1 -1
nixos/tests/krb5/deprecated-config.nix
···
maintainers = [ eqyiel ];
};
-
machine =
+
nodes.machine =
{ ... }: {
krb5 = {
enable = true;
+1 -1
nixos/tests/krb5/example-config.nix
···
maintainers = [ eqyiel ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }: {
krb5 = {
enable = true;
+1 -1
nixos/tests/ksm.nix
···
maintainers = [ rnhmjoj ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
hardware.ksm.enable = true;
+1 -1
nixos/tests/libinput.nix
···
{
name = "libinput";
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [
./common/x11.nix
+1 -1
nixos/tests/libresprite.nix
···
maintainers = [ fgaz ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
imports = [
./common/x11.nix
];
+1 -1
nixos/tests/lightdm.nix
···
maintainers = [ aszlig ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager.lightdm.enable = true;
+1 -1
nixos/tests/limesurvey.nix
···
name = "limesurvey";
meta.maintainers = [ pkgs.lib.maintainers.aanderse ];
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.limesurvey = {
enable = true;
virtualHost = {
+1 -1
nixos/tests/litestream.nix
···
maintainers = [ jwygoda ];
};
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{ services.litestream = {
enable = true;
+1 -1
nixos/tests/login.nix
···
maintainers = [ eelco ];
};
-
machine =
+
nodes.machine =
{ pkgs, lib, ... }:
{ boot.kernelPackages = lib.mkIf latestKernel pkgs.linuxPackages_latest;
sound.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
+1 -1
nixos/tests/logrotate.nix
···
};
# default machine
-
machine = { ... }: {
+
nodes.machine = { ... }: {
};
testScript =
+1 -1
nixos/tests/loki.nix
···
maintainers = [ willibutz ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.loki = {
enable = true;
configFile = "${pkgs.grafana-loki.src}/cmd/loki/loki-local-config.yaml";
+1 -1
nixos/tests/lorri/default.nix
···
import ../make-test-python.nix {
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ ../../modules/profiles/minimal.nix ];
environment.systemPackages = [ pkgs.lorri ];
};
+1 -1
nixos/tests/lxd-image-server.nix
···
maintainers = [ mkg20001 ];
};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
virtualisation = {
cores = 2;
+1 -1
nixos/tests/lxd-image.nix
···
maintainers = [ mkg20001 ];
};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
virtualisation = {
# disk full otherwise
diskSize = 2048;
+1 -1
nixos/tests/lxd-nftables.nix
···
maintainers = [ patryk27 ];
};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
virtualisation = {
lxd.enable = true;
};
+1 -1
nixos/tests/lxd.nix
···
maintainers = [ patryk27 ];
};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
virtualisation = {
# Since we're testing `limits.cpu`, we've gotta have a known number of
# cores to lean on
+1 -1
nixos/tests/magnetico.nix
···
maintainers = [ rnhmjoj ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
networking.firewall.allowedTCPPorts = [ 9000 ];
+1 -1
nixos/tests/mailcatcher.nix
···
name = "mailcatcher";
meta.maintainers = [ lib.maintainers.aanderse ];
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{
services.mailcatcher.enable = true;
+1 -1
nixos/tests/mailhog.nix
···
name = "mailhog";
meta.maintainers = with lib.maintainers; [ jojosch ];
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.mailhog.enable = true;
environment.systemPackages = with pkgs; [ swaks ];
+1 -1
nixos/tests/matomo.nix
···
let
matomoTest = package:
makeTest {
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
services.matomo = {
package = package;
enable = true;
+1 -1
nixos/tests/matrix/pantalaimon.nix
···
maintainers = teams.matrix.members;
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.pantalaimon-headless.instances.${pantalaimonInstanceName} = {
homeserver = "https://localhost:8448";
listenAddress = "0.0.0.0";
+1 -1
nixos/tests/mediawiki.nix
···
name = "mediawiki";
meta.maintainers = [ lib.maintainers.aanderse ];
-
machine =
+
nodes.machine =
{ ... }:
{ services.mediawiki.enable = true;
services.mediawiki.virtualHost.hostName = "localhost";
+1 -1
nixos/tests/meilisearch.nix
···
name = "meilisearch";
meta.maintainers = with lib.maintainers; [ Br1ght0ne ];
-
machine = { ... }: {
+
nodes.machine = { ... }: {
environment.systemPackages = with pkgs; [ curl jq ];
services.meilisearch = {
enable = true;
+1 -1
nixos/tests/memcached.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "memcached";
-
machine = {
+
nodes.machine = {
imports = [ ../modules/profiles/minimal.nix ];
services.memcached.enable = true;
};
+1 -1
nixos/tests/misc.nix
···
maintainers = [ eelco ];
};
-
machine =
+
nodes.machine =
{ lib, ... }:
with lib;
{ swapDevices = mkOverride 0
+1 -1
nixos/tests/mod_perl.nix
···
maintainers = [ sgo ];
};
-
machine = { config, lib, pkgs, ... }: {
+
nodes.machine = { config, lib, pkgs, ... }: {
services.httpd = {
enable = true;
adminAddr = "admin@localhost";
+1 -1
nixos/tests/moodle.nix
···
name = "moodle";
meta.maintainers = [ lib.maintainers.aanderse ];
-
machine =
+
nodes.machine =
{ ... }:
{ services.moodle.enable = true;
services.moodle.virtualHost.hostName = "localhost";
+1 -1
nixos/tests/musescore.nix
···
maintainers = [ turion ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [
+1 -1
nixos/tests/mysql/mysql-autobackup.nix
···
name = "${name}-automysqlbackup";
meta.maintainers = [ lib.maintainers.aanderse ];
-
machine = {
+
nodes.machine = {
services.mysql = {
inherit package;
enable = true;
+1 -1
nixos/tests/nagios.nix
···
maintainers = [ symphorien ];
};
-
machine = { lib, ... }: let
+
nodes.machine = { lib, ... }: let
writer = pkgs.writeShellScript "write" ''
set -x
echo "$@" >> /tmp/notifications
+1 -1
nixos/tests/navidrome.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "navidrome";
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.navidrome.enable = true;
};
+4 -4
nixos/tests/networking.nix
···
};
virtual = {
name = "Virtual";
-
machine = {
+
nodes.machine = {
networking.useNetworkd = networkd;
networking.useDHCP = false;
networking.interfaces.tap0 = {
···
};
routes = {
name = "routes";
-
machine = {
+
nodes.machine = {
networking.useNetworkd = networkd;
networking.useDHCP = false;
networking.interfaces.eth0 = {
···
};
rename = {
name = "RenameInterface";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
virtualisation.vlans = [ 1 ];
networking = {
useNetworkd = networkd;
···
testMac = "06:00:00:00:02:00";
in {
name = "WlanInterface";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
boot.kernelModules = [ "mac80211_hwsim" ];
networking.wlanInterfaces = {
wlan0 = { device = "wlan0"; };
+1 -1
nixos/tests/nginx-modsecurity.nix
···
import ./make-test-python.nix ({ pkgs, lib, ... }: {
name = "nginx-modsecurity";
-
machine = { config, lib, pkgs, ... }: {
+
nodes.machine = { config, lib, pkgs, ... }: {
services.nginx = {
enable = true;
additionalModules = [ pkgs.nginxModules.modsecurity-nginx ];
+1 -1
nixos/tests/nginx-pubhtml.nix
···
import ./make-test-python.nix {
name = "nginx-pubhtml";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
systemd.services.nginx.serviceConfig.ProtectHome = "read-only";
services.nginx.enable = true;
services.nginx.virtualHosts.localhost = {
+1 -1
nixos/tests/nginx-sandbox.nix
···
# This test checks the creation and reading of a file in sandbox mode. Used simple lua script.
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
nixpkgs.overlays = [
(self: super: {
nginx-lua = super.nginx.override {
+1 -1
nixos/tests/nginx-sso.nix
···
maintainers = with pkgs.lib.maintainers; [ delroth ];
};
-
machine = {
+
nodes.machine = {
services.nginx.sso = {
enable = true;
configuration = {
+1 -1
nixos/tests/nginx-variants.nix
···
value = makeTest {
name = "nginx-variant-${nginxName}";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.nginx = {
enable = true;
virtualHosts.localhost.locations."/".return = "200 'foo'";
+1 -1
nixos/tests/nix-serve.nix
···
import ./make-test-python.nix ({ pkgs, ... }:
{
name = "nix-serve";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.nix-serve.enable = true;
environment.systemPackages = [
pkgs.hello
+1 -1
nixos/tests/nixos-generate-config.nix
···
import ./make-test-python.nix ({ lib, ... } : {
name = "nixos-generate-config";
meta.maintainers = with lib.maintainers; [ basvandijk ];
-
machine = {
+
nodes.machine = {
system.nixos-generate-config.configuration = ''
# OVERRIDDEN
{ config, pkgs, ... }: {
+1 -1
nixos/tests/noto-fonts.nix
···
maintainers = with lib.maintainers; [ nickcao midchildan ];
};
-
machine = {
+
nodes.machine = {
imports = [ ./common/x11.nix ];
environment.systemPackages = [ pkgs.gnome.gedit ];
fonts = {
+1 -1
nixos/tests/novacomd.nix
···
maintainers = [ dtzWill ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.novacomd.enable = true;
};
+1 -1
nixos/tests/oh-my-zsh.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "oh-my-zsh";
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{
programs.zsh = {
+3 -3
nixos/tests/openldap.nix
···
inherit testScript;
name = "openldap";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.etc."openldap/root_password".text = "notapassword";
services.openldap = {
enable = true;
···
inherit testScript;
name = "openldap";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.openldap = {
enable = true;
logLevel = "stats acl";
···
manualConfigDir = import ./make-test-python.nix ({ pkgs, ... }: {
name = "openldap";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.openldap = {
enable = true;
configDir = "/var/db/slapd.d";
+1 -1
nixos/tests/opentabletdriver.nix
···
maintainers = with pkgs.lib.maintainers; [ thiagokokada ];
};
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{
imports = [
./common/user-account.nix
+1 -1
nixos/tests/os-prober.nix
···
in {
name = "os-prober";
-
machine = { config, pkgs, ... }: (simpleConfig // {
+
nodes.machine = { config, pkgs, ... }: (simpleConfig // {
imports = [ ../modules/profiles/installation-device.nix
../modules/profiles/base.nix ];
virtualisation.memorySize = 1300;
+1 -1
nixos/tests/osrm-backend.nix
···
name = "osrm-backend";
meta.maintainers = [ lib.maintainers.erictapen ];
-
machine = { config, pkgs, ... }:{
+
nodes.machine = { config, pkgs, ... }:{
services.osrm = {
enable = true;
+1 -1
nixos/tests/overlayfs.nix
···
name = "overlayfs";
meta.maintainers = with pkgs.lib.maintainers; [ bachp ];
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
virtualisation.emptyDiskImages = [ 512 ];
networking.hostId = "deadbeef";
environment.systemPackages = with pkgs; [ parted ];
+1 -1
nixos/tests/packagekit.nix
···
maintainers = [ peterhoeg ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
environment.systemPackages = with pkgs; [ dbus ];
services.packagekit = {
enable = true;
+1 -1
nixos/tests/pam/pam-oath-login.nix
···
{
name = "pam-oath-login";
-
machine =
+
nodes.machine =
{ ... }:
{
security.pam.oath = {
+1 -1
nixos/tests/pam/pam-u2f.nix
···
{
name = "pam-u2f";
-
machine =
+
nodes.machine =
{ ... }:
{
security.pam.u2f = {
+1 -1
nixos/tests/pantheon.nix
···
maintainers = teams.pantheon.members;
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/php/fpm.nix
···
name = "php-${php.version}-fpm-nginx-test";
meta.maintainers = lib.teams.php.members;
-
machine = { config, lib, pkgs, ... }: {
+
nodes.machine = { config, lib, pkgs, ... }: {
environment.systemPackages = [ php ];
services.nginx = {
+1 -1
nixos/tests/php/httpd.nix
···
name = "php-${php.version}-httpd-test";
meta.maintainers = lib.teams.php.members;
-
machine = { config, lib, pkgs, ... }: {
+
nodes.machine = { config, lib, pkgs, ... }: {
services.httpd = {
enable = true;
adminAddr = "admin@phpfpm";
+1 -1
nixos/tests/php/pcre.nix
···
name = "php-${php.version}-httpd-pcre-jit-test";
meta.maintainers = lib.teams.php.members;
-
machine = { lib, pkgs, ... }: {
+
nodes.machine = { lib, pkgs, ... }: {
time.timeZone = "UTC";
services.httpd = {
enable = true;
+1 -1
nixos/tests/pict-rs.nix
···
name = "pict-rs";
meta.maintainers = with lib.maintainers; [ happysalada ];
-
machine = { ... }: {
+
nodes.machine = { ... }: {
environment.systemPackages = with pkgs; [ curl jq ];
services.pict-rs.enable = true;
};
+1 -1
nixos/tests/plasma5-systemd-start.nix
···
maintainers = [ oxalica ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/plasma5.nix
···
maintainers = [ ttuegel ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/plausible.nix
···
maintainers = [ ma27 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
virtualisation.memorySize = 4096;
services.plausible = {
enable = true;
+1 -1
nixos/tests/plikd.nix
···
maintainers = [ freezeboy ];
};
-
machine = { pkgs, ... }: let
+
nodes.machine = { pkgs, ... }: let
in {
services.plikd.enable = true;
environment.systemPackages = [ pkgs.plik ];
+1 -1
nixos/tests/plotinus.nix
···
maintainers = pkgs.plotinus.meta.maintainers;
};
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{ imports = [ ./common/x11.nix ];
+1 -1
nixos/tests/postfix-raise-smtpd-tls-security-level.nix
···
import ./make-test-python.nix {
name = "postfix";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ common/user-account.nix ];
services.postfix = {
enable = true;
+1 -1
nixos/tests/postfix.nix
···
import ./make-test-python.nix {
name = "postfix";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ common/user-account.nix ];
services.postfix = {
enable = true;
+1 -1
nixos/tests/postgresql-wal-receiver.nix
···
name = "postgresql-wal-receiver-${postgresqlPackage}";
meta.maintainers = with lib.maintainers; [ pacien ];
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.postgresql = {
package = pkg;
enable = true;
+1 -1
nixos/tests/postgresql.nix
···
maintainers = [ zagy ];
};
-
machine = {...}:
+
nodes.machine = {...}:
{
services.postgresql = {
enable = true;
+1 -1
nixos/tests/power-profiles-daemon.nix
···
meta = with pkgs.lib.maintainers; {
maintainers = [ mvnetbiz ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.power-profiles-daemon.enable = true;
environment.systemPackages = [ pkgs.glib ];
};
+1 -1
nixos/tests/predictable-interface-names.nix
···
name = "${if predictable then "" else "un"}predictableInterfaceNames${if withNetworkd then "-with-networkd" else ""}";
meta = {};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
networking.usePredictableInterfaceNames = lib.mkForce predictable;
networking.useNetworkd = withNetworkd;
networking.dhcpcd.enable = !withNetworkd;
+1 -1
nixos/tests/privacyidea.nix
···
maintainers = [ fpletz ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
virtualisation.cores = 2;
services.privacyidea = {
+1 -1
nixos/tests/privoxy.nix
···
maintainers = [ rnhmjoj ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.nginx.enable = true;
services.nginx.virtualHosts."example.com" = {
addSSL = true;
+1 -1
nixos/tests/pt2-clone.nix
···
maintainers = [ fgaz ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
imports = [
./common/x11.nix
];
+1 -1
nixos/tests/pulseaudio.nix
···
maintainers = [ synthetica ] ++ pkgs.pulseaudio.meta.maintainers;
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [ ./common/wayland-cage.nix ];
+1 -1
nixos/tests/qboot.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "qboot";
-
machine = { ... }: {
+
nodes.machine = { ... }: {
virtualisation.bios = pkgs.qboot;
};
+1 -1
nixos/tests/rabbitmq.nix
···
maintainers = [ eelco offline ];
};
-
machine = {
+
nodes.machine = {
services.rabbitmq = {
enable = true;
managementPlugin.enable = true;
+1 -1
nixos/tests/radicale.nix
···
name = "radicale3";
meta.maintainers = with lib.maintainers; [ dotlambda ];
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.radicale = {
enable = true;
settings = {
+1 -1
nixos/tests/rasdaemon.nix
···
maintainers = [ evils ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ ../modules/profiles/minimal.nix ];
hardware.rasdaemon = {
enable = true;
+1 -1
nixos/tests/redmine.nix
···
let
redmineTest = { name, type }: makeTest {
name = "redmine-${name}";
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
services.redmine = {
enable = true;
package = pkgs.redmine;
+1 -1
nixos/tests/restart-by-activation-script.nix
···
maintainers = [ das_j ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ ../modules/profiles/minimal.nix ];
systemd.services.restart-me = {
+1 -1
nixos/tests/retroarch.nix
···
name = "retroarch";
meta = with pkgs.lib.maintainers; { maintainers = [ j0hax ]; };
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/riak.nix
···
maintainers = [ Br1ght0ne ];
};
-
machine = {
+
nodes.machine = {
services.riak.enable = true;
services.riak.package = pkgs.riak;
};
+5 -5
nixos/tests/rspamd.nix
···
'';
simple = name: enableIPv6: makeTest {
name = "rspamd-${name}";
-
machine = {
+
nodes.machine = {
services.rspamd.enable = true;
networking.enableIPv6 = enableIPv6;
};
···
ipv4only = simple "ipv4only" false;
deprecated = makeTest {
name = "rspamd-deprecated";
-
machine = {
+
nodes.machine = {
services.rspamd = {
enable = true;
workers.normal.bindSockets = [{
···
bindports = makeTest {
name = "rspamd-bindports";
-
machine = {
+
nodes.machine = {
services.rspamd = {
enable = true;
workers.normal.bindSockets = [{
···
};
customLuaRules = makeTest {
name = "rspamd-custom-lua-rules";
-
machine = {
+
nodes.machine = {
environment.etc."tests/no-muh.eml".text = ''
From: Sheep1<bah@example.com>
To: Sheep2<mah@example.com>
···
};
postfixIntegration = makeTest {
name = "rspamd-postfix-integration";
-
machine = {
+
nodes.machine = {
environment.systemPackages = with pkgs; [ msmtp ];
environment.etc."tests/gtube.eml".text = ''
From: Sheep1<bah@example.com>
+2 -2
nixos/tests/rsyslogd.nix
···
name = "rsyslogd-test1";
meta.maintainers = [ pkgs.lib.maintainers.aanderse ];
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
services.rsyslogd.enable = true;
services.journald.forwardToSyslog = false;
};
···
name = "rsyslogd-test2";
meta.maintainers = [ pkgs.lib.maintainers.aanderse ];
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
services.rsyslogd.enable = true;
};
+1 -1
nixos/tests/sabnzbd.nix
···
maintainers = with maintainers; [ jojosch ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.sabnzbd = {
enable = true;
};
+2 -2
nixos/tests/sddm.nix
···
default = {
name = "sddm";
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager.sddm.enable = true;
···
maintainers = [ ttuegel ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ./common/user-account.nix ];
services.xserver.enable = true;
services.xserver.displayManager = {
+1 -1
nixos/tests/shattered-pixel-dungeon.nix
···
maintainers = [ fgaz ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
imports = [
./common/x11.nix
];
+1 -1
nixos/tests/shiori.nix
···
name = "shiori";
meta.maintainers = with lib.maintainers; [ minijackson ];
-
machine =
+
nodes.machine =
{ ... }:
{ services.shiori.enable = true; };
+1 -1
nixos/tests/signal-desktop.nix
···
maintainers = [ flokli primeos ];
};
-
machine = { ... }:
+
nodes.machine = { ... }:
{
imports = [
+1 -1
nixos/tests/simple.nix
···
maintainers = [ eelco ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
};
+1 -1
nixos/tests/snapper.nix
···
{
name = "snapper";
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
boot.initrd.postDeviceCommands = ''
${pkgs.btrfs-progs}/bin/mkfs.btrfs -f -L aux /dev/vdb
'';
+1 -1
nixos/tests/soapui.nix
···
maintainers = [ asbachb ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
imports = [
./common/x11.nix
];
+1 -1
nixos/tests/solr.nix
···
name = "solr";
meta.maintainers = [ pkgs.lib.maintainers.aanderse ];
-
machine =
+
nodes.machine =
{ config, pkgs, ... }:
{
# Ensure the virtual machine has enough memory for Solr to avoid the following error:
+1 -1
nixos/tests/sourcehut.nix
···
meta.maintainers = [ pkgs.lib.maintainers.tomberek ];
-
machine = { config, pkgs, nodes, ... }: {
+
nodes.machine = { config, pkgs, nodes, ... }: {
# buildsrht needs space
virtualisation.diskSize = 4 * 1024;
virtualisation.memorySize = 2 * 1024;
+1 -1
nixos/tests/sssd-ldap.nix
···
maintainers = [ bbigras ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.openldap = {
enable = true;
settings = {
+1 -1
nixos/tests/sssd.nix
···
meta = with pkgs.lib.maintainers; {
maintainers = [ bbigras ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.sssd.enable = true;
};
+1 -1
nixos/tests/starship.nix
···
name = "starship";
meta.maintainers = pkgs.starship.meta.maintainers;
-
machine = {
+
nodes.machine = {
programs = {
fish.enable = true;
zsh.enable = true;
+1 -1
nixos/tests/sway.nix
···
maintainers = with lib.maintainers; [ primeos synthetica ];
};
-
machine = { config, ... }: {
+
nodes.machine = { config, ... }: {
# Automatically login on tty1 as a normal user:
imports = [ ./common/user-account.nix ];
services.getty.autologinUser = "alice";
+1 -1
nixos/tests/sympa.nix
···
name = "sympa";
meta.maintainers = with lib.maintainers; [ mmilata ];
-
machine =
+
nodes.machine =
{ ... }:
{
+1 -1
nixos/tests/syncthing-init.nix
···
name = "syncthing-init";
meta.maintainers = with pkgs.lib.maintainers; [ lassulus ];
-
machine = {
+
nodes.machine = {
services.syncthing = {
enable = true;
devices.testDevice = {
+1 -1
nixos/tests/syncthing-relay.nix
···
name = "syncthing-relay";
meta.maintainers = with pkgs.lib.maintainers; [ delroth ];
-
machine = {
+
nodes.machine = {
environment.systemPackages = [ pkgs.jq ];
services.syncthing.relay = {
enable = true;
+1 -1
nixos/tests/systemd-analyze.nix
···
maintainers = [ raskin ];
};
-
machine =
+
nodes.machine =
{ pkgs, lib, ... }:
{ boot.kernelPackages = lib.mkIf latestKernel pkgs.linuxPackages_latest;
sound.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
+3 -3
nixos/tests/systemd-binfmt.nix
···
in {
basic = makeTest {
name = "systemd-binfmt";
-
machine = {
+
nodes.machine = {
boot.binfmt.emulatedSystems = [
"armv7l-linux"
"aarch64-linux"
···
preserveArgvZero = makeTest {
name = "systemd-binfmt-preserve-argv0";
-
machine = {
+
nodes.machine = {
boot.binfmt.emulatedSystems = [
"aarch64-linux"
];
···
ldPreload = makeTest {
name = "systemd-binfmt-ld-preload";
-
machine = {
+
nodes.machine = {
boot.binfmt.emulatedSystems = [
"aarch64-linux"
];
+9 -9
nixos/tests/systemd-boot.nix
···
name = "systemd-boot";
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
-
machine = common;
+
nodes.machine = common;
testScript = ''
machine.start()
···
name = "systemd-boot-specialisation";
meta.maintainers = with pkgs.lib.maintainers; [ lukegb ];
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
specialisation.something.configuration = {};
};
···
name = "systemd-boot-fallback";
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
boot.loader.efi.canTouchEfiVariables = mkForce false;
};
···
name = "systemd-boot-update";
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
-
machine = common;
+
nodes.machine = common;
testScript = ''
machine.succeed("mount -o remount,rw /boot")
···
name = "systemd-boot-memtest86";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
boot.loader.systemd-boot.memtest86.enable = true;
nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [
···
name = "systemd-boot-netbootxyz";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
boot.loader.systemd-boot.netbootxyz.enable = true;
};
···
name = "systemd-boot-entry-filename";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
boot.loader.systemd-boot.memtest86.enable = true;
boot.loader.systemd-boot.memtest86.entryFilename = "apple.conf";
···
name = "systemd-boot-extra-entries";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
boot.loader.systemd-boot.extraEntries = {
"banana.conf" = ''
···
name = "systemd-boot-extra-files";
meta.maintainers = with pkgs.lib.maintainers; [ Enzime ];
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
imports = [ common ];
boot.loader.systemd-boot.extraFiles = {
"efi/fruits/tomato.efi" = pkgs.netbootxyz-efi;
+1 -1
nixos/tests/systemd-confinement.nix
···
import ./make-test-python.nix {
name = "systemd-confinement";
-
machine = { pkgs, lib, ... }: let
+
nodes.machine = { pkgs, lib, ... }: let
testServer = pkgs.writeScript "testserver.sh" ''
#!${pkgs.runtimeShell}
export PATH=${lib.escapeShellArg "${pkgs.coreutils}/bin"}
+1 -1
nixos/tests/systemd-cryptenroll.nix
···
maintainers = [ ymatsiuk ];
};
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
environment.systemPackages = [ pkgs.cryptsetup ];
virtualisation = {
emptyDiskImages = [ 512 ];
+1 -1
nixos/tests/systemd-escaping.nix
···
{
name = "systemd-escaping";
-
machine = { pkgs, lib, utils, ... }: {
+
nodes.machine = { pkgs, lib, utils, ... }: {
systemd.services.echo =
assert !(builtins.tryEval (utils.escapeSystemdExecArgs [ [] ])).success;
assert !(builtins.tryEval (utils.escapeSystemdExecArgs [ {} ])).success;
+1 -1
nixos/tests/systemd-journal.nix
···
maintainers = [ lewo ];
};
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
services.journald.enableHttpGateway = true;
};
+1 -1
nixos/tests/systemd-machinectl.nix
···
{
name = "systemd-machinectl";
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
# use networkd to obtain systemd network setup
networking.useNetworkd = true;
networking.useDHCP = false;
+1 -1
nixos/tests/systemd-misc.nix
···
{
name = "systemd-misc";
-
machine = { pkgs, lib, ... }: {
+
nodes.machine = { pkgs, lib, ... }: {
boot.extraSystemdUnitPaths = [ "/etc/systemd-rw/system" ];
users.users.limited = {
+1 -1
nixos/tests/systemd.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "systemd";
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
imports = [ common/user-account.nix common/x11.nix ];
virtualisation.emptyDiskImages = [ 512 512 ];
+1 -1
nixos/tests/telegraf.nix
···
maintainers = [ mic92 ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
services.telegraf.enable = true;
services.telegraf.environmentFiles = [(pkgs.writeText "secrets" ''
SECRET=example
+1 -1
nixos/tests/tinywl.nix
···
maintainers = with lib.maintainers; [ primeos ];
};
-
machine = { config, ... }: {
+
nodes.machine = { config, ... }: {
# Automatically login on tty1 as a normal user:
imports = [ ./common/user-account.nix ];
services.getty.autologinUser = "alice";
+1 -1
nixos/tests/tomcat.nix
···
{
name = "tomcat";
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
services.tomcat.enable = true;
};
+1 -1
nixos/tests/transmission.nix
···
maintainers = [ coconnor ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
networking.firewall.allowedTCPPorts = [ 9091 ];
+1 -1
nixos/tests/tsm-client-gui.nix
···
enableOCR = true;
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ ./common/x11.nix ];
programs.tsmClient = {
enable = true;
+1 -1
nixos/tests/tuptime.nix
···
maintainers = [ evils ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ ../modules/profiles/minimal.nix ];
services.tuptime.enable = true;
};
+1 -1
nixos/tests/turbovnc-headless-server.nix
···
maintainers = with lib.maintainers; [ nh2 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = with pkgs; [
glxinfo
+1 -1
nixos/tests/tuxguitar.nix
···
maintainers = [ asbachb ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
imports = [
./common/x11.nix
];
+1 -1
nixos/tests/udisks2.nix
···
maintainers = [ eelco ];
};
-
machine =
+
nodes.machine =
{ ... }:
{ services.udisks2.enable = true;
imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/usbguard.nix
···
maintainers = [ tnias ];
};
-
machine =
+
nodes.machine =
{ ... }:
{
services.usbguard = {
+1 -1
nixos/tests/user-activation-scripts.nix
···
name = "user-activation-scripts";
meta = with lib.maintainers; { maintainers = [ chkno ]; };
-
machine = {
+
nodes.machine = {
system.userActivationScripts.foo = "mktemp ~/user-activation-ran.XXXXXX";
users.users.alice = {
initialPassword = "pass1";
+1 -1
nixos/tests/uwsgi.nix
···
maintainers = [ lnl7 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
users.users.hello =
{ isSystemUser = true;
group = "hello";
+1 -1
nixos/tests/v2ray.nix
···
meta = with lib.maintainers; {
maintainers = [ servalcatty ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = [ pkgs.curl ];
services.v2ray = {
enable = true;
+1 -1
nixos/tests/vault-postgresql.nix
···
meta = with pkgs.lib.maintainers; {
maintainers = [ lnl7 roberth ];
};
-
machine = { lib, pkgs, ... }: {
+
nodes.machine = { lib, pkgs, ... }: {
environment.systemPackages = [ pkgs.vault ];
environment.variables.VAULT_ADDR = "http://127.0.0.1:8200";
services.vault.enable = true;
+1 -1
nixos/tests/vault.nix
···
meta = with pkgs.lib.maintainers; {
maintainers = [ lnl7 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = [ pkgs.vault ];
environment.variables.VAULT_ADDR = "http://127.0.0.1:8200";
services.vault.enable = true;
+1 -1
nixos/tests/vector.nix
···
name = "vector-test1";
meta.maintainers = [ pkgs.lib.maintainers.happysalada ];
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
services.vector = {
enable = true;
journaldAccess = true;
+1 -1
nixos/tests/vengi-tools.nix
···
maintainers = [ fgaz ];
};
-
machine = { config, pkgs, ... }: {
+
nodes.machine = { config, pkgs, ... }: {
imports = [
./common/x11.nix
];
+1 -1
nixos/tests/virtualbox.nix
···
mkVBoxTest = useExtensionPack: vms: name: testScript: makeTest {
name = "virtualbox-${name}";
-
machine = { lib, config, ... }: {
+
nodes.machine = { lib, config, ... }: {
imports = let
mkVMConf = name: val: val.machine // { key = "${name}-config"; };
vmConfigs = mapAttrsToList mkVMConf vms;
+1 -1
nixos/tests/web-servers/unit-php.nix
···
name = "unit-php-test";
meta.maintainers = with pkgs.lib.maintainers; [ izorkin ];
-
machine = { config, lib, pkgs, ... }: {
+
nodes.machine = { config, lib, pkgs, ... }: {
services.unit = {
enable = true;
config = pkgs.lib.strings.toJSON {
+1 -1
nixos/tests/wiki-js.nix
···
maintainers = [ ma27 ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
virtualisation.memorySize = 2048;
services.wiki-js = {
enable = true;
+1 -1
nixos/tests/wine.nix
···
inherit name;
meta = with pkgs.lib.maintainers; { maintainers = [ chkno ]; };
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
environment.systemPackages = [ pkgs."${packageSet}"."${variant}" ];
virtualisation.diskSize = 800;
};
+1 -1
nixos/tests/wmderland.nix
···
maintainers = [ takagiy ];
};
-
machine = { lib, ... }: {
+
nodes.machine = { lib, ... }: {
imports = [ ./common/x11.nix ./common/user-account.nix ];
test-support.displayManager.auto.user = "alice";
services.xserver.displayManager.defaultSession = lib.mkForce "none+wmderland";
+1 -1
nixos/tests/wpa_supplicant.nix
···
maintainers = [ rnhmjoj ];
};
-
machine = { ... }: {
+
nodes.machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
# add a virtual wlan interface
+1 -1
nixos/tests/xfce.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "xfce";
-
machine =
+
nodes.machine =
{ pkgs, ... }:
{
+1 -1
nixos/tests/xmonad.nix
···
maintainers = [ nequissimus ivanbrennan ];
};
-
machine = { pkgs, ... }: {
+
nodes.machine = { pkgs, ... }: {
imports = [ ./common/x11.nix ./common/user-account.nix ];
test-support.displayManager.auto.user = "alice";
services.xserver.displayManager.defaultSession = "none+xmonad";
+1 -1
nixos/tests/xterm.nix
···
maintainers = [ nequissimus ];
};
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{
imports = [ ./common/x11.nix ];
services.xserver.desktopManager.xterm.enable = false;
+1 -1
nixos/tests/yabar.nix
···
maintainers = [ ];
};
-
machine = {
+
nodes.machine = {
imports = [ ./common/x11.nix ./common/user-account.nix ];
test-support.displayManager.auto.user = "bob";
+1 -1
nixos/tests/zfs.nix
···
maintainers = [ adisbladis ];
};
-
machine = { pkgs, lib, ... }:
+
nodes.machine = { pkgs, lib, ... }:
let
usersharePath = "/var/lib/samba/usershares";
in {
+1 -1
nixos/tests/zigbee2mqtt.nix
···
import ./make-test-python.nix ({ pkgs, lib, ... }:
{
-
machine = { pkgs, ... }:
+
nodes.machine = { pkgs, ... }:
{
services.zigbee2mqtt = {
enable = true;
+1 -1
nixos/tests/zoneminder.nix
···
name = "zoneminder";
meta.maintainers = with lib.maintainers; [ danielfullmer ];
-
machine = { ... }:
+
nodes.machine = { ... }:
{
services.zoneminder = {
enable = true;