diff options
author | Matthew Justin Bauer <mjbauer95@gmail.com> | 2018-03-27 18:43:03 -0500 |
---|---|---|
committer | GitHub <noreply@github.com> | 2018-03-27 18:43:03 -0500 |
commit | 75616ceb49d4e51a3c8efbebc17c09553707fb2c (patch) | |
tree | 23c9dfd0b70ce4449be8ebef66919e6239a90f2b /nixos | |
parent | 9c4745fe73d986e894732501a5de078b3d2bbc30 (diff) | |
parent | 49455d7bae2f81c5c984faa6728c9017123fa798 (diff) | |
download | nixpkgs-75616ceb49d4e51a3c8efbebc17c09553707fb2c.tar nixpkgs-75616ceb49d4e51a3c8efbebc17c09553707fb2c.tar.gz nixpkgs-75616ceb49d4e51a3c8efbebc17c09553707fb2c.tar.bz2 nixpkgs-75616ceb49d4e51a3c8efbebc17c09553707fb2c.tar.lz nixpkgs-75616ceb49d4e51a3c8efbebc17c09553707fb2c.tar.xz nixpkgs-75616ceb49d4e51a3c8efbebc17c09553707fb2c.tar.zst nixpkgs-75616ceb49d4e51a3c8efbebc17c09553707fb2c.zip |
Merge pull request #37840 from matthewbauer/unixtools
Cross-platform "unixtools"
Diffstat (limited to 'nixos')
-rw-r--r-- | nixos/modules/security/acme.nix | 10 | ||||
-rw-r--r-- | nixos/modules/services/backup/znapzend.nix | 2 | ||||
-rw-r--r-- | nixos/modules/services/cluster/kubernetes/default.nix | 12 | ||||
-rw-r--r-- | nixos/tests/installer.nix | 5 | ||||
-rw-r--r-- | nixos/tests/misc.nix | 2 |
5 files changed, 12 insertions, 19 deletions
diff --git a/nixos/modules/security/acme.nix b/nixos/modules/security/acme.nix index 0736239ed2c..e9676d9dfb1 100644 --- a/nixos/modules/security/acme.nix +++ b/nixos/modules/security/acme.nix @@ -140,14 +140,6 @@ in ''; }; - tosHash = mkOption { - type = types.string; - default = "cc88d8d9517f490191401e7b54e9ffd12a2b9082ec7a1d4cec6101f9f1647e7b"; - description = '' - SHA256 of the Terms of Services document. This changes once in a while. - ''; - }; - production = mkOption { type = types.bool; default = true; @@ -196,7 +188,7 @@ in let cpath = "${cfg.directory}/${cert}"; rights = if data.allowKeysForGroup then "750" else "700"; - cmdline = [ "-v" "-d" data.domain "--default_root" data.webroot "--valid_min" cfg.validMin "--tos_sha256" cfg.tosHash ] + cmdline = [ "-v" "-d" data.domain "--default_root" data.webroot "--valid_min" cfg.validMin ] ++ optionals (data.email != null) [ "--email" data.email ] ++ concatMap (p: [ "-f" p ]) data.plugins ++ concatLists (mapAttrsToList (name: root: [ "-d" (if root == null then name else "${name}:${root}")]) data.extraDomains) diff --git a/nixos/modules/services/backup/znapzend.nix b/nixos/modules/services/backup/znapzend.nix index 762bb4b3867..3d133f82d20 100644 --- a/nixos/modules/services/backup/znapzend.nix +++ b/nixos/modules/services/backup/znapzend.nix @@ -386,7 +386,7 @@ in echo Resetting znapzend zetups ${pkgs.znapzend}/bin/znapzendzetup list \ | grep -oP '(?<=\*\*\* backup plan: ).*(?= \*\*\*)' \ - | xargs ${pkgs.znapzend}/bin/znapzendzetup delete + | xargs -I{} ${pkgs.znapzend}/bin/znapzendzetup delete "{}" '' + concatStringsSep "\n" (mapAttrsToList (dataset: config: '' echo Importing znapzend zetup ${config} for dataset ${dataset} ${pkgs.znapzend}/bin/znapzendzetup import --write ${dataset} ${config} diff --git a/nixos/modules/services/cluster/kubernetes/default.nix b/nixos/modules/services/cluster/kubernetes/default.nix index 4a2c6f0833e..39c5d78d419 100644 --- a/nixos/modules/services/cluster/kubernetes/default.nix +++ b/nixos/modules/services/cluster/kubernetes/default.nix @@ -279,7 +279,7 @@ in { tokenAuthFile = mkOption { description = '' Kubernetes apiserver token authentication file. See - <link xlink:href="http://kubernetes.io/docs/admin/authentication.html"/> + <link xlink:href="https://kubernetes.io/docs/admin/authentication.html"/> ''; default = null; type = types.nullOr types.path; @@ -288,7 +288,7 @@ in { basicAuthFile = mkOption { description = '' Kubernetes apiserver basic authentication file. See - <link xlink:href="http://kubernetes.io/docs/admin/authentication.html"/> + <link xlink:href="https://kubernetes.io/docs/admin/authentication.html"/> ''; default = pkgs.writeText "users" '' kubernetes,admin,0 @@ -299,7 +299,7 @@ in { authorizationMode = mkOption { description = '' Kubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC/RBAC). See - <link xlink:href="http://kubernetes.io/docs/admin/authorization.html"/> + <link xlink:href="https://kubernetes.io/docs/admin/authorization.html"/> ''; default = ["RBAC" "Node"]; type = types.listOf (types.enum ["AlwaysAllow" "AlwaysDeny" "ABAC" "RBAC" "Node"]); @@ -308,7 +308,7 @@ in { authorizationPolicy = mkOption { description = '' Kubernetes apiserver authorization policy file. See - <link xlink:href="http://kubernetes.io/docs/admin/authorization.html"/> + <link xlink:href="https://kubernetes.io/docs/admin/authorization.html"/> ''; default = []; type = types.listOf types.attrs; @@ -332,7 +332,7 @@ in { runtimeConfig = mkOption { description = '' Api runtime configuration. See - <link xlink:href="http://kubernetes.io/docs/admin/cluster-management.html"/> + <link xlink:href="https://kubernetes.io/docs/admin/cluster-management.html"/> ''; default = "authentication.k8s.io/v1beta1=true"; example = "api/all=false,api/v1=true"; @@ -342,7 +342,7 @@ in { admissionControl = mkOption { description = '' Kubernetes admission control plugins to use. See - <link xlink:href="http://kubernetes.io/docs/admin/admission-controllers/"/> + <link xlink:href="https://kubernetes.io/docs/admin/admission-controllers/"/> ''; default = ["NamespaceLifecycle" "LimitRanger" "ServiceAccount" "ResourceQuota" "DefaultStorageClass" "DefaultTolerationSeconds" "NodeRestriction"]; example = [ diff --git a/nixos/tests/installer.nix b/nixos/tests/installer.nix index f67011b4412..acf248d0a5a 100644 --- a/nixos/tests/installer.nix +++ b/nixos/tests/installer.nix @@ -80,8 +80,9 @@ let + optionalString isEfi (if pkgs.stdenv.isAarch64 then ''bios => "${pkgs.OVMF.fd}/FV/QEMU_EFI.fd", '' else ''bios => "${pkgs.OVMF.fd}/FV/OVMF.fd", ''); - in - '' + in if !isEfi && !(pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) then + throw "Non-EFI boot methods are only supported on i686 / x86_64" + else '' $machine->start; # Make sure that we get a login prompt etc. diff --git a/nixos/tests/misc.nix b/nixos/tests/misc.nix index 4fd9466dc50..179c95e7643 100644 --- a/nixos/tests/misc.nix +++ b/nixos/tests/misc.nix @@ -96,7 +96,7 @@ import ./make-test.nix ({ pkgs, ...} : rec { $machine->succeed("systemctl start systemd-udev-settle.service"); subtest "udev-auto-load", sub { $machine->waitForUnit('systemd-udev-settle.service'); - $machine->succeed('lsmod | grep psmouse'); + $machine->succeed('lsmod | grep mousedev'); }; # Test whether systemd-tmpfiles-clean works. |