Skip to content

Commit

Permalink
Merge branch 'master' into staging
Browse files Browse the repository at this point in the history
... mainly to fixup the go problems.
  • Loading branch information
vcunat committed Dec 30, 2016
2 parents 563c7a0 + 59361a2 commit ee3fb42
Show file tree
Hide file tree
Showing 43 changed files with 1,596 additions and 1,079 deletions.
6 changes: 6 additions & 0 deletions nixos/lib/test-driver/test-driver.pl
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@
use Logger;
use Cwd;
use POSIX qw(_exit dup2);
use Time::HiRes qw(clock_gettime CLOCK_MONOTONIC);

$SIG{PIPE} = 'IGNORE'; # because Unix domain sockets may die unexpectedly

Expand Down Expand Up @@ -179,7 +180,12 @@ END
$log->close();
}

my $now1 = clock_gettime(CLOCK_MONOTONIC);

runTests;

my $now2 = clock_gettime(CLOCK_MONOTONIC);

printf STDERR "test script finished in %.2fs\n", $now2 - $now1;

exit ($nrSucceeded < $nrTests ? 1 : 0);
2 changes: 1 addition & 1 deletion nixos/modules/installer/cd-dvd/iso-image.nix
Original file line number Diff line number Diff line change
Expand Up @@ -178,7 +178,7 @@ in
image. It significantly increases image size. Use that when
you want to be able to keep all the sources needed to build your
system or when you are going to install the system on a computer
with slow on non-existent network connection.
with slow or non-existent network connection.
'';
};

Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/i2pd.nix
Original file line number Diff line number Diff line change
Expand Up @@ -147,7 +147,7 @@ let
host = ${tun.address}
port = ${tun.port}
inport = ${tun.inPort}
accesslist = ${concatStringSep "," tun.accessList}
accesslist = ${builtins.concatStringsSep "," tun.accessList}
'')
}
'';
Expand Down
5 changes: 1 addition & 4 deletions nixos/modules/services/networking/ssh/sshd.nix
Original file line number Diff line number Diff line change
Expand Up @@ -264,8 +264,7 @@ in
StandardInput = "socket";
} else {
Restart = "always";
Type = "forking";
PIDFile = "/run/sshd.pid";
Type = "simple";
});
};

Expand Down Expand Up @@ -322,8 +321,6 @@ in

services.openssh.extraConfig = mkOrder 0
''
PidFile /run/sshd.pid
Protocol 2
UsePAM yes
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/virtualisation/qemu-vm.nix
Original file line number Diff line number Diff line change
Expand Up @@ -440,13 +440,13 @@ in
${if cfg.writableStore then "/nix/.ro-store" else "/nix/store"} =
{ device = "store";
fsType = "9p";
options = [ "trans=virtio" "version=9p2000.L" "cache=loose" ];
options = [ "trans=virtio" "version=9p2000.L" "veryloose" ];
neededForBoot = true;
};
"/tmp/xchg" =
{ device = "xchg";
fsType = "9p";
options = [ "trans=virtio" "version=9p2000.L" "cache=loose" ];
options = [ "trans=virtio" "version=9p2000.L" "veryloose" ];
neededForBoot = true;
};
"/tmp/shared" =
Expand Down
2 changes: 1 addition & 1 deletion nixos/tests/gnome3.nix
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ import ./make-test.nix ({ pkgs, ...} : {
$machine->succeed("su - alice -c 'DISPLAY=:0.0 gnome-terminal &'");
$machine->succeed("xauth merge ~alice/.Xauthority");
$machine->waitForWindow(qr/Terminal/);
$machine->mustSucceed("timeout 900 bash -c 'journalctl -f|grep -m 1 \"GNOME Shell started\"'");
$machine->succeed("timeout 900 bash -c 'while read msg; do if [[ \$msg =~ \"GNOME Shell started\" ]]; then break; fi; done < <(journalctl -f)'");
$machine->sleep(10);
$machine->screenshot("screen");
'';
Expand Down
23 changes: 23 additions & 0 deletions nixos/tests/openssh.nix
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,18 @@ in {
];
};

server_lazy =
{ config, pkgs, ... }:

{
services.openssh = { enable = true; startWhenNeeded = true; };
security.pam.services.sshd.limits =
[ { domain = "*"; item = "memlock"; type = "-"; value = 1024; } ];
users.extraUsers.root.openssh.authorizedKeys.keys = [
snakeOilPublicKey
];
};

client =
{ config, pkgs, ... }: { };

Expand All @@ -50,6 +62,8 @@ in {
subtest "manual-authkey", sub {
$server->succeed("mkdir -m 700 /root/.ssh");
$server->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
$server_lazy->succeed("mkdir -m 700 /root/.ssh");
$server_lazy->copyFileFromHost("key.pub", "/root/.ssh/authorized_keys");
$client->succeed("mkdir -m 700 /root/.ssh");
$client->copyFileFromHost("key", "/root/.ssh/id_ed25519");
Expand All @@ -58,6 +72,10 @@ in {
$client->waitForUnit("network.target");
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'echo hello world' >&2");
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server 'ulimit -l' | grep 1024");
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'echo hello world' >&2");
$client->succeed("ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no server_lazy 'ulimit -l' | grep 1024");
};
subtest "configured-authkey", sub {
Expand All @@ -66,6 +84,11 @@ in {
$client->succeed("ssh -o UserKnownHostsFile=/dev/null" .
" -o StrictHostKeyChecking=no -i privkey.snakeoil" .
" server true");
$client->succeed("ssh -o UserKnownHostsFile=/dev/null" .
" -o StrictHostKeyChecking=no -i privkey.snakeoil" .
" server_lazy true");
};
'';
})
30 changes: 15 additions & 15 deletions pkgs/applications/editors/emacs-modes/elpa-generated.nix
Original file line number Diff line number Diff line change
Expand Up @@ -175,10 +175,10 @@
}) {};
auctex = callPackage ({ elpaBuild, fetchurl, lib }: elpaBuild {
pname = "auctex";
version = "11.89.7";
version = "11.89.8";
src = fetchurl {
url = "https://elpa.gnu.org/packages/auctex-11.89.7.tar";
sha256 = "03sxdh6dv4m98yq09hxcph2lgidai8ky22i9acjcp6vfjlsb9mlf";
url = "https://elpa.gnu.org/packages/auctex-11.89.8.tar";
sha256 = "0rilldzb7sm7k22vfifdsnxz1an94jnn1bn8gfmqkac4g9cskl46";
};
packageRequires = [];
meta = {
Expand Down Expand Up @@ -377,10 +377,10 @@
context-coloring = callPackage ({ elpaBuild, emacs, fetchurl, lib }:
elpaBuild {
pname = "context-coloring";
version = "8.0.1";
version = "8.1.0";
src = fetchurl {
url = "https://elpa.gnu.org/packages/context-coloring-8.0.1.tar";
sha256 = "0c7sb8dzx6f40hz2l6zicc0shpxj3vzsmvdxzx65c4vgvr462js2";
url = "https://elpa.gnu.org/packages/context-coloring-8.1.0.tar";
sha256 = "01wm36qgxsg7lgdxkn7avzfmxcpilsmvfwz3s7y04i0sdrsjvzp4";
};
packageRequires = [ emacs ];
meta = {
Expand Down Expand Up @@ -619,10 +619,10 @@
el-search = callPackage ({ elpaBuild, emacs, fetchurl, lib, stream }:
elpaBuild {
pname = "el-search";
version = "1.2";
version = "1.2.1";
src = fetchurl {
url = "https://elpa.gnu.org/packages/el-search-1.2.tar";
sha256 = "0sz78kn9nx390aq5wqz174p8ppw987rzsh892ly166qz4ikwys5a";
url = "https://elpa.gnu.org/packages/el-search-1.2.1.tar";
sha256 = "1a5gqcl9v0ppizz0c61rcpahym3vr52f8azp2pjvrxvkmx4sj8c1";
};
packageRequires = [ emacs stream ];
meta = {
Expand Down Expand Up @@ -1087,10 +1087,10 @@
loccur = callPackage ({ cl-lib ? null, elpaBuild, fetchurl, lib }:
elpaBuild {
pname = "loccur";
version = "1.2.2";
version = "1.2.3";
src = fetchurl {
url = "https://elpa.gnu.org/packages/loccur-1.2.2.el";
sha256 = "0ij5wzxysaikiccw7mjbw1sfylvih0n6b6yyp55vn8w1z2dba0xk";
url = "https://elpa.gnu.org/packages/loccur-1.2.3.el";
sha256 = "09pxp03g4pg95cpqiadyv9dz6qrwd9igrkwrhm4s38cscmqm7dzq";
};
packageRequires = [ cl-lib ];
meta = {
Expand Down Expand Up @@ -1364,10 +1364,10 @@
}) {};
org = callPackage ({ elpaBuild, fetchurl, lib }: elpaBuild {
pname = "org";
version = "20161214";
version = "20161224";
src = fetchurl {
url = "https://elpa.gnu.org/packages/org-20161214.tar";
sha256 = "0pa9d0l6axif5wlzi7lvxl0fpjwwvc79cy9d37z7md4hxyjdvwzm";
url = "https://elpa.gnu.org/packages/org-20161224.tar";
sha256 = "0b10bjypn0w5ja776f8sxl1qpvb61iyz1n3c74jx6fqwypv7dmgi";
};
packageRequires = [];
meta = {
Expand Down

0 comments on commit ee3fb42

Please sign in to comment.