Skip to content
This repository was archived by the owner on Apr 12, 2021. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 39b92f6e4553
Choose a base ref
...
head repository: NixOS/nixpkgs-channels
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 91fce0fb2f4b
Choose a head ref

Commits on May 10, 2020

  1. yabai: 3.0.0 -> 3.0.1

    cmacrae committed May 10, 2020
    Copy the full SHA
    89be001 View commit details

Commits on May 11, 2020

  1. nixos/sssd: add to system.nssDatabases.group too

    nixos/modules/config/nsswitch.nix uses `passwdArray` for both `passwd`
    and `group`, but when moving this into the sss module in
    edddc7c, it didn't get split
    appropriately.
    flokli committed May 11, 2020
    Copy the full SHA
    ecf327d View commit details
  2. nixos/google-oslogin: add to system.nssDatabases.group too

    nixos/modules/config/nsswitch.nix uses `passwdArray` for both `passwd`
    and `group`, but when moving this into the google-oslogin module in
    4b71b6f, it didn't get split
    appropriately.
    flokli committed May 11, 2020
    Copy the full SHA
    2297508 View commit details
  3. nixos/systemd: add to system.nssDatabases.group too

    nixos/modules/config/nsswitch.nix uses `passwdArray` for both `passwd`
    and `group`, but when moving this into the systemd module in
    c0995d2, it didn't get split
    appropriately.
    flokli committed May 11, 2020
    Copy the full SHA
    36b6e26 View commit details
  4. nixos/ldap: move nss database configuration into ldap module

    now that passwdArray and shadowArray aren't used anymore, these can be
    folded.
    flokli committed May 11, 2020
    Copy the full SHA
    4f9c8ef View commit details
  5. Copy the full SHA
    fd21793 View commit details
  6. Copy the full SHA
    1fb6c37 View commit details
  7. nixos/sssd: drop assertion

    This is now already triggered by the nsswitch module, as we set
    system.nssModules.
    flokli committed May 11, 2020
    Copy the full SHA
    0f6f544 View commit details
  8. Copy the full SHA
    1df38e2 View commit details
  9. nixos/systemd: enable systemd-provided nss modules unconditionally

    A disabled nscd breaks nss module loading on NixOS, and systemd without
    its nss modules doesn't really work either - instead of silently
    disabling its nss modules if nscd is disabled, let the assertion in
    nsswitch handle this.
    flokli committed May 11, 2020
    Copy the full SHA
    4a69bf2 View commit details
  10. nixos/sssd remove redundant condition

    This is all inside a global cfg.enable conditional, so we don't need to
    check here again.
    flokli committed May 11, 2020
    Copy the full SHA
    90bc3ec View commit details
  11. nixos/nsswitch: improve error message

    Show the config option triggering the assertion, so people don't
    necessary lookup the nixpkgs source code.
    flokli committed May 11, 2020
    Copy the full SHA
    23ba506 View commit details

Commits on May 12, 2020

  1. Copy the full SHA
    d8fa222 View commit details

Commits on May 13, 2020

  1. Copy the full SHA
    89448e9 View commit details
  2. Copy the full SHA
    4eb3829 View commit details
  3. Copy the full SHA
    c8d1573 View commit details
  4. cypress: 4.4.1 -> 4.5.0

    DamienCassou committed May 13, 2020
    Copy the full SHA
    9678bf5 View commit details
  5. Copy the full SHA
    5629e60 View commit details
  6. mu: 1.4.3 -> 1.4.5

    ysengrimm committed May 13, 2020
    Copy the full SHA
    6fc7c5b View commit details

Commits on May 14, 2020

  1. mu: fix on darwin

    veprbl committed May 14, 2020
    Copy the full SHA
    150a18f View commit details
  2. cri-o: switch to buildGoModule

    This is just a cleanup to switch from buildGoPackage to buildGoModule.
    
    Signed-off-by: Sascha Grunert <sgrunert@suse.com>
    saschagrunert committed May 14, 2020
    Copy the full SHA
    006e6b0 View commit details
  3. vscodium: Fix .desktop file

    turion committed May 14, 2020
    Copy the full SHA
    91f58ec View commit details
  4. Copy the full SHA
    7a64288 View commit details
  5. Merge pull request #87779 from marsam/update-gopass

    gopass: 1.9.1 -> 1.9.2
    andir authored May 14, 2020
    Copy the full SHA
    dc3440f View commit details
  6. tracker: remove unnecessary dependency

    upower handling was moved to tracker miners a while ago.
    jtojnar committed May 14, 2020
    Copy the full SHA
    3116788 View commit details
  7. Remove unused files

    edolstra committed May 14, 2020
    Copy the full SHA
    0ffc85d View commit details
  8. Merge pull request #87016 from flokli/nsswitch-cleanup

    nixos/nsswitch cleanup nss modules
    flokli authored May 14, 2020
    Copy the full SHA
    4a85559 View commit details
  9. Merge pull request #86378 from saschagrunert/crio-buildgomodule

    cri-o: switch to buildGoModule
    marsam authored May 14, 2020
    Copy the full SHA
    2c83124 View commit details
  10. Merge pull request #87745 from zaninime/sane-update

    sane-airscan: 0.9.17 -> 0.99.0
    marsam authored May 14, 2020
    Copy the full SHA
    c8010f6 View commit details
  11. Merge pull request #87733 from taku0/flashplayer-32.0.0.371

    flashplayer: 32.0.0.363 -> 32.0.0.371
    marsam authored May 14, 2020
    Copy the full SHA
    b51a829 View commit details
  12. Merge pull request #87719 from oxalica/bump/sarasa-gothic

    sarasa-gothic: 0.8.0 -> 0.12.6
    marsam authored May 14, 2020
    Copy the full SHA
    5a0b071 View commit details
  13. nixosTests.kubernetes: port tests to python

    Nikolaj Hey Hinnerskov committed May 14, 2020
    Copy the full SHA
    496bd1c View commit details
  14. Merge pull request #87542 from cmacrae/upgrade/yabai/3.0.1

    yabai: 3.0.0 -> 3.0.1
    marsam authored May 14, 2020
    Copy the full SHA
    9917caa View commit details
  15. Copy the full SHA
    e9dbf2e View commit details
  16. linux: 5.4.40 -> 5.4.41

    NeQuissimus committed May 14, 2020
    Copy the full SHA
    e3ba43b View commit details
  17. linux: 5.6.12 -> 5.6.13

    NeQuissimus committed May 14, 2020
    Copy the full SHA
    7ef8639 View commit details
  18. Copy the full SHA
    a40a811 View commit details
  19. mariadb: 10.3.22 -> 10.4.12

    Izorkin committed May 14, 2020
    Copy the full SHA
    6ac9a9f View commit details
  20. Copy the full SHA
    b8c8e81 View commit details
  21. Copy the full SHA
    a4c7e0f View commit details
  22. nixos/tests/mariadb-galera-mariabackup: fix test script

    MariaDB 10.4 introduces a number of changes to the authentication
    process, intended to make things easier and more intuitive.
    Izorkin committed May 14, 2020
    Copy the full SHA
    963259d View commit details
  23. nixos/tests/mariadb-galera-rsync: fix test script

    MariaDB 10.4 introduces a number of changes to the authentication
    process, intended to make things easier and more intuitive.
    Izorkin committed May 14, 2020
    Copy the full SHA
    90f3003 View commit details
  24. nixos/tests/mysql-replication: fix test script

    MariaDB 10.4 introduces a number of changes to the authentication
    process, intended to make things easier and more intuitive.
    Izorkin committed May 14, 2020
    Copy the full SHA
    f52700f View commit details
  25. Copy the full SHA
    da08b22 View commit details
  26. mysql57, mysql80: build with protobuf 3.7

    They fail to build with protobuf 3.8:
    
    In file included from /build/mysql-5.7.27/rapid/plugin/x/ngs/include/ngs/protocol/message.h:24,
                     from /build/mysql-5.7.27/rapid/plugin/x/ngs/include/ngs/protocol_encoder.h:23,
                     from /build/mysql-5.7.27/rapid/plugin/x/ngs/include/ngs/client_session.h:24,
                     from /build/mysql-5.7.27/rapid/plugin/x/src/xpl_session.h:25,
                     from /build/mysql-5.7.27/rapid/plugin/x/src/xpl_plugin.cc:23:
    /build/mysql-5.7.27/rapid/plugin/x/ngs/include/ngs_common/protocol_protobuf.h:32:10: fatal error: google/protobuf/wire_format_lite_inl.h: No such file or directory
       32 | #include <google/protobuf/wire_format_lite_inl.h>
          |          ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    compilation terminated.
    make[2]: *** [rapid/plugin/x/CMakeFiles/mysqlx.dir/build.make:203: rapid/plugin/x/CMakeFiles/mysqlx.dir/src/xpl_plugin.cc.o] Error 1
    make[2]: *** Waiting for unfinished jobs....
    Izorkin committed May 14, 2020
    Copy the full SHA
    dde9810 View commit details
  27. Merge pull request #87728 from DamienCassou/damien/cypress-4.5.0

    cypress: 4.4.1 -> 4.5.0
    DamienCassou authored May 14, 2020
    Copy the full SHA
    a84ba0d View commit details
  28. Merge pull request #87754 from ysengrimm/mu4e-update

    mu: 1.4.3 -> 1.4.5
    veprbl authored May 14, 2020
    Copy the full SHA
    cbdbafd View commit details
  29. Merge pull request #86900 from Izorkin/mariadb-update

    mariadb: 10.3.22 -> 10.4.12
    flokli authored May 14, 2020
    Copy the full SHA
    3d60859 View commit details
  30. nixos/manual: document use of systemd to mount filesystems (#87684)

    * nixos/manual: document use of systemd to mount filesystems
    glasserc authored May 14, 2020
    Copy the full SHA
    b59b741 View commit details
  31. ocamlPackages.tyxml: 4.3.0 → 4.4.0

    ocamlPackages.eliom: 6.10.1 → 6.12.0
    vbgl committed May 14, 2020
    Copy the full SHA
    9ec8205 View commit details
Showing with 342 additions and 309 deletions.
  1. +11 −0 nixos/doc/manual/configuration/file-systems.xml
  2. +24 −3 nixos/doc/manual/release-notes/rl-2009.xml
  3. +1 −5 nixos/lib/testing-python.nix
  4. +1 −5 nixos/lib/testing.nix
  5. +0 −24 nixos/lib/testing/jquery-ui.nix
  6. +0 −36 nixos/lib/testing/jquery.nix
  7. +4 −0 nixos/modules/config/ldap.nix
  8. +13 −35 nixos/modules/config/nsswitch.nix
  9. +1 −0 nixos/modules/security/google_oslogin.nix
  10. +4 −3 nixos/modules/services/databases/mysql.nix
  11. +3 −7 nixos/modules/services/misc/sssd.nix
  12. +1 −0 nixos/modules/services/network-filesystems/samba.nix
  13. +4 −0 nixos/modules/services/networking/avahi-daemon.nix
  14. +6 −10 nixos/modules/system/boot/systemd.nix
  15. +3 −5 nixos/tests/kubernetes/base.nix
  16. +49 −25 nixos/tests/kubernetes/dns.nix
  17. +55 −31 nixos/tests/kubernetes/rbac.nix
  18. +16 −16 nixos/tests/mysql/mariadb-galera-mariabackup.nix
  19. +16 −16 nixos/tests/mysql/mariadb-galera-rsync.nix
  20. +7 −5 nixos/tests/mysql/mysql-replication.nix
  21. +1 −1 pkgs/applications/editors/vscode/vscodium.nix
  22. +4 −4 pkgs/applications/graphics/sane/backends/airscan/default.nix
  23. +2 −2 pkgs/applications/networking/browsers/chromium/plugins.nix
  24. +5 −5 pkgs/applications/networking/browsers/mozilla-plugins/flashplayer/default.nix
  25. +3 −3 pkgs/applications/networking/browsers/mozilla-plugins/flashplayer/standalone.nix
  26. +3 −8 pkgs/applications/virtualization/cri-o/default.nix
  27. +5 −4 pkgs/data/fonts/sarasa-gothic/default.nix
  28. +3 −2 pkgs/development/libraries/kde-frameworks/default.nix
  29. +15 −0 pkgs/development/libraries/kde-frameworks/qqc2-desktop-style.nix
  30. +19 −1 pkgs/development/libraries/science/math/mkl/default.nix
  31. +0 −2 pkgs/development/libraries/tracker/default.nix
  32. +2 −2 pkgs/development/ocaml-modules/eliom/default.nix
  33. +2 −2 pkgs/development/ocaml-modules/tyxml/default.nix
  34. +2 −2 pkgs/development/python-modules/dash-core-components/default.nix
  35. +2 −2 pkgs/development/python-modules/dash-renderer/default.nix
  36. +2 −2 pkgs/development/python-modules/dash-table/default.nix
  37. +2 −2 pkgs/development/python-modules/dash/default.nix
  38. +2 −2 pkgs/development/web/cypress/default.nix
  39. +2 −2 pkgs/os-specific/darwin/yabai/default.nix
  40. +2 −2 pkgs/os-specific/linux/kernel/linux-4.19.nix
  41. +2 −2 pkgs/os-specific/linux/kernel/linux-5.4.nix
  42. +2 −2 pkgs/os-specific/linux/kernel/linux-5.6.nix
  43. +12 −0 pkgs/servers/sql/mariadb/cmake-disable-auth-pam-testing.patch
  44. +7 −5 pkgs/servers/sql/mariadb/default.nix
  45. +0 −6 pkgs/servers/sql/mariadb/galera/25.nix
  46. +5 −7 pkgs/servers/sql/mariadb/galera/default.nix
  47. +4 −2 pkgs/tools/misc/jdupes/default.nix
  48. +7 −4 pkgs/tools/networking/mu/default.nix
  49. +2 −2 pkgs/tools/security/gopass/default.nix
  50. +4 −3 pkgs/top-level/all-packages.nix
11 changes: 11 additions & 0 deletions nixos/doc/manual/configuration/file-systems.xml
Original file line number Diff line number Diff line change
@@ -16,6 +16,17 @@
fsType = "ext4";
};
</programlisting>
This will create an entry in <filename>/etc/fstab</filename>, which will
generate a corresponding
<link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd.mount.html">systemd.mount</link>
unit via
<link xlink:href="https://www.freedesktop.org/software/systemd/man/systemd-fstab-generator.html">systemd-fstab-generator</link>.
The filesystem will be mounted automatically unless
<literal>"noauto"</literal> is present in <link
linkend="opt-fileSystems._name__.options">options</link>.
<literal>"noauto"</literal> filesystems can be mounted explicitly using
<command>systemctl</command> e.g. <command>systemctl start
data.mount</command>.
Mount points are created automatically if they don’t already exist. For
<option><link linkend="opt-fileSystems._name__.device">device</link></option>,
it’s best to use the topology-independent device aliases in
27 changes: 24 additions & 3 deletions nixos/doc/manual/release-notes/rl-2009.xml
Original file line number Diff line number Diff line change
@@ -61,6 +61,28 @@
This is to make it possible to use <literal>podman</literal> instead of <literal>docker</literal>.
</para>
</listitem>
<listitem>
<para>
MariaDB has been updated to 10.4, MariaDB Galera to 26.4.
Before you upgrade, it would be best to take a backup of your database.
For MariaDB Galera Cluster, see <link xlink:href="https://mariadb.com/kb/en/upgrading-from-mariadb-103-to-mariadb-104-with-galera-cluster/">Upgrading
from MariaDB 10.3 to MariaDB 10.4 with Galera Cluster</link> instead.
Before doing the upgrade read <link xlink:href="https://mariadb.com/kb/en/upgrading-from-mariadb-103-to-mariadb-104/#incompatible-changes-between-103-and-104">Incompatible
Changes Between 10.3 and 10.4</link>.
After the upgrade you will need to run <literal>mysql_upgrade</literal>.
MariaDB 10.4 introduces a number of changes to the authentication process, intended to make things easier and more
intuitive. See <link xlink:href="https://mariadb.com/kb/en/authentication-from-mariadb-104/">Authentication from MariaDB 10.4</link>.
unix_socket auth plugin does not use a password, and uses the connecting user's UID instead. When a new MariaDB data directory is initialized, two MariaDB users are
created and can be used with new unix_socket auth plugin, as well as traditional mysql_native_password plugin: root@localhost and mysql@localhost. To actually use
the traditional mysql_native_password plugin method, one must run the following:
<programlisting>
services.mysql.initialScript = pkgs.writeText "mariadb-init.sql" ''
ALTER USER root@localhost IDENTIFIED VIA mysql_native_password USING PASSWORD("verysecret");
'';
</programlisting>
When MariaDB data directory is just upgraded (not initialized), the users are not created or modified.
</para>
</listitem>
</itemizedlist>
</section>

@@ -102,7 +124,6 @@
<para>
The go-modules builder now uses vendorSha256 instead of modSha256 to pin
fetched version data. This is currently a warning, but will be removed in the next release.
</programlisting>
</para>
</listitem>
<listitem>
@@ -196,13 +217,13 @@ environment.systemPackages = [
customizable to your liking by using
<literal>php.withExtensions</literal> or
<literal>php.buildEnv</literal> instead of writing config files
or changing configure flags.
or changing configure flags.
</para>
</listitem>
<listitem>
<para>
The remaining configuration flags can now be set directly on
the <literal>php</literal> attribute. For example, instead of
the <literal>php</literal> attribute. For example, instead of

<programlisting>
php.override {
6 changes: 1 addition & 5 deletions nixos/lib/testing-python.nix
Original file line number Diff line number Diff line change
@@ -10,11 +10,7 @@
with import ./build-vms.nix { inherit system pkgs minimal extraConfigurations; };
with pkgs;

let
jquery-ui = callPackage ./testing/jquery-ui.nix { };
jquery = callPackage ./testing/jquery.nix { };

in rec {
rec {

inherit pkgs;

6 changes: 1 addition & 5 deletions nixos/lib/testing.nix
Original file line number Diff line number Diff line change
@@ -10,11 +10,7 @@
with import ./build-vms.nix { inherit system pkgs minimal extraConfigurations; };
with pkgs;

let
jquery-ui = callPackage ./testing/jquery-ui.nix { };
jquery = callPackage ./testing/jquery.nix { };

in rec {
rec {

inherit pkgs;

24 changes: 0 additions & 24 deletions nixos/lib/testing/jquery-ui.nix

This file was deleted.

36 changes: 0 additions & 36 deletions nixos/lib/testing/jquery.nix

This file was deleted.

4 changes: 4 additions & 0 deletions nixos/modules/config/ldap.nix
Original file line number Diff line number Diff line change
@@ -244,6 +244,10 @@ in
if cfg.daemon.enable then nss_pam_ldapd else nss_ldap
);

system.nssDatabases.group = optional cfg.nsswitch "ldap";
system.nssDatabases.passwd = optional cfg.nsswitch "ldap";
system.nssDatabases.shadow = optional cfg.nsswitch "ldap";

users = mkIf cfg.daemon.enable {
groups.nslcd = {
gid = config.ids.gids.nslcd;
48 changes: 13 additions & 35 deletions nixos/modules/config/nsswitch.nix
Original file line number Diff line number Diff line change
@@ -4,34 +4,7 @@

with lib;

let

# only with nscd up and running we can load NSS modules that are not integrated in NSS
canLoadExternalModules = config.services.nscd.enable;
# XXX Move these to their respective modules
nssmdns = canLoadExternalModules && config.services.avahi.nssmdns;
nsswins = canLoadExternalModules && config.services.samba.nsswins;
ldap = canLoadExternalModules && (config.users.ldap.enable && config.users.ldap.nsswitch);

hostArray = mkMerge [
(mkBefore [ "files" ])
(mkIf nssmdns [ "mdns_minimal [NOTFOUND=return]" ])
(mkIf nsswins [ "wins" ])
(mkAfter [ "dns" ])
(mkIf nssmdns (mkOrder 1501 [ "mdns" ])) # 1501 to ensure it's after dns
];

passwdArray = mkMerge [
(mkBefore [ "files" ])
(mkIf ldap [ "ldap" ])
];

shadowArray = mkMerge [
(mkBefore [ "files" ])
(mkIf ldap [ "ldap" ])
];

in {
{
options = {

# NSS modules. Hacky!
@@ -122,9 +95,11 @@ in {
config = {
assertions = [
{
# generic catch if the NixOS module adding to nssModules does not prevent it with specific message.
assertion = config.system.nssModules.path != "" -> canLoadExternalModules;
message = "Loading NSS modules from path ${config.system.nssModules.path} requires nscd being enabled.";
# Prevent users from disabling nscd, with nssModules being set.
# If disabling nscd is really necessary, it's still possible to opt out
# by forcing config.system.nssModules to [].
assertion = config.system.nssModules.path != "" -> config.services.nscd.enable;
message = "Loading NSS modules from system.nssModules (${config.system.nssModules.path}), requires services.nscd.enable being set to true.";
}
];

@@ -145,10 +120,13 @@ in {
'';

system.nssDatabases = {
passwd = passwdArray;
group = passwdArray;
shadow = shadowArray;
hosts = hostArray;
passwd = mkBefore [ "files" ];
group = mkBefore [ "files" ];
shadow = mkBefore [ "files" ];
hosts = mkMerge [
(mkBefore [ "files" ])
(mkAfter [ "dns" ])
];
services = mkBefore [ "files" ];
};
};
1 change: 1 addition & 0 deletions nixos/modules/security/google_oslogin.nix
Original file line number Diff line number Diff line change
@@ -50,6 +50,7 @@ in
# enable the nss module, so user lookups etc. work
system.nssModules = [ package ];
system.nssDatabases.passwd = [ "cache_oslogin" "oslogin" ];
system.nssDatabases.group = [ "cache_oslogin" "oslogin" ];

# Ugly: sshd refuses to start if a store path is given because /nix/store is group-writable.
# So indirect by a symlink.
7 changes: 4 additions & 3 deletions nixos/modules/services/databases/mysql.nix
Original file line number Diff line number Diff line change
@@ -87,7 +87,6 @@ in
datadir = /var/lib/mysql
bind-address = 127.0.0.1
port = 3336
plugin-load-add = auth_socket.so
!includedir /etc/mysql/conf.d/
''';
@@ -315,13 +314,16 @@ in
datadir = cfg.dataDir;
bind-address = mkIf (cfg.bind != null) cfg.bind;
port = cfg.port;
plugin-load-add = optional (cfg.ensureUsers != []) "auth_socket.so";
}
(mkIf (cfg.replication.role == "master" || cfg.replication.role == "slave") {
log-bin = "mysql-bin-${toString cfg.replication.serverId}";
log-bin-index = "mysql-bin-${toString cfg.replication.serverId}.index";
relay-log = "mysql-relay-bin";
server-id = cfg.replication.serverId;
binlog-ignore-db = [ "information_schema" "performance_schema" "mysql" ];
})
(mkIf (!isMariaDB) {
plugin-load-add = optional (cfg.ensureUsers != []) "auth_socket.so";
})
];

@@ -444,7 +446,6 @@ in
( echo "stop slave;"
echo "change master to master_host='${cfg.replication.masterHost}', master_user='${cfg.replication.masterUser}', master_password='${cfg.replication.masterPassword}';"
echo "set global slave_exec_mode='IDEMPOTENT';"
echo "start slave;"
) | ${mysql}/bin/mysql -u root -N
''}
10 changes: 3 additions & 7 deletions nixos/modules/services/misc/sssd.nix
Original file line number Diff line number Diff line change
@@ -42,11 +42,6 @@ in {
};
config = mkMerge [
(mkIf cfg.enable {
assertions = singleton {
assertion = nscd.enable;
message = "nscd must be enabled through `services.nscd.enable` for SSSD to work.";
};

systemd.services.sssd = {
description = "System Security Services Daemon";
wantedBy = [ "multi-user.target" ];
@@ -74,11 +69,12 @@ in {
mode = "0400";
};

system.nssModules = optional cfg.enable pkgs.sssd;
system.nssModules = pkgs.sssd;
system.nssDatabases = {
group = [ "sss" ];
passwd = [ "sss" ];
shadow = [ "sss" ];
services = [ "sss" ];
shadow = [ "sss" ];
};
services.dbus.packages = [ pkgs.sssd ];
})
1 change: 1 addition & 0 deletions nixos/modules/services/network-filesystems/samba.nix
Original file line number Diff line number Diff line change
@@ -224,6 +224,7 @@ in
(mkIf cfg.enable {

system.nssModules = optional cfg.nsswins samba;
system.nssDatabases.hosts = optional cfg.nsswins "wins";

systemd = {
targets.samba = {
4 changes: 4 additions & 0 deletions nixos/modules/services/networking/avahi-daemon.nix
Original file line number Diff line number Diff line change
@@ -238,6 +238,10 @@ in
users.groups.avahi = {};

system.nssModules = optional cfg.nssmdns pkgs.nssmdns;
system.nssDatabases.hosts = optionals cfg.nssmdns (mkMerge [
[ "mdns_minimal [NOTFOUND=return]" ]
(mkOrder 1501 [ "mdns" ]) # 1501 to ensure it's after dns
]);

environment.systemPackages = [ pkgs.avahi ];

16 changes: 6 additions & 10 deletions nixos/modules/system/boot/systemd.nix
Original file line number Diff line number Diff line change
@@ -832,16 +832,8 @@ in

system.build.units = cfg.units;

# Systemd provides various NSS modules to look up dynamic users, locally
# configured IP adresses and local container hostnames.
# On NixOS, these can only be passed to the NSS system via nscd (and its
# LD_LIBRARY_PATH), which is why it's usually a very good idea to have nscd
# enabled (also see the config.nscd.enable description).
# While there is already an assertion in place complaining loudly about
# having nssModules configured and nscd disabled, for some reason we still
# check for nscd being enabled before adding to nssModules.
system.nssModules = optional config.services.nscd.enable systemd.out;
system.nssDatabases = mkIf config.services.nscd.enable {
system.nssModules = [ systemd.out ];
system.nssDatabases = {
hosts = (mkMerge [
[ "mymachines" ]
(mkOrder 1600 [ "myhostname" ] # 1600 to ensure it's always the last
@@ -851,6 +843,10 @@ in
[ "mymachines" ]
(mkAfter [ "systemd" ])
]);
group = (mkMerge [
[ "mymachines" ]
(mkAfter [ "systemd" ])
]);
};

environment.systemPackages = [ systemd ];
8 changes: 3 additions & 5 deletions nixos/tests/kubernetes/base.nix
Original file line number Diff line number Diff line change
@@ -3,7 +3,7 @@
pkgs ? import ../../.. { inherit system config; }
}:

with import ../../lib/testing.nix { inherit system pkgs; };
with import ../../lib/testing-python.nix { inherit system pkgs; };
with pkgs.lib;

let
@@ -75,10 +75,8 @@ let
) machines;

testScript = ''
startAll;
${test}
'';
start_all()
'' + test;
};

mkKubernetesMultiNodeTest = attrs: mkKubernetesBaseTest ({
Loading