···141142- `libvirt` now supports using `nftables` backend.
1430000000144- `services.ntpd-rs` now performs configuration validation.
145146- `services.postsrsd` now automatically integrates with the local Postfix instance, when enabled. This behavior can disabled using the [services.postsrsd.configurePostfix](#opt-services.postsrsd.configurePostfix) option.
···141142- `libvirt` now supports using `nftables` backend.
143144+- `systemd.extraConfig` and `boot.initrd.systemd.extraConfig` was converted to RFC42-style `systemd.settings.Manager` and `boot.initrd.systemd.settings.Manager` respectively.
145+ - `systemd.watchdog.runtimeTime` was renamed to `systemd.settings.Manager.RuntimeWatchdogSec`
146+ - `systemd.watchdog.device` was renamed to `systemd.settings.Manager.WatchdogDevice`
147+ - `systemd.watchdog.rebootTime` was renamed to `systemd.settings.Manager.RebootWatchdogSec`
148+ - `systemd.watchdog.kexecTime` was renamed to `systemd.settings.Manager.KExecWatchdogSec`
149+ - `systemd.enableCgroupAccounting` was removed. Cgroup accounting now needs to be disabled directly using `systemd.settings.Manager.*Accounting`.
150+151- `services.ntpd-rs` now performs configuration validation.
152153- `services.postsrsd` now automatically integrates with the local Postfix instance, when enabled. This behavior can disabled using the [services.postsrsd.configurePostfix](#opt-services.postsrsd.configurePostfix) option.
+1-1
nixos/modules/security/pam.nix
···1663 must be that described in {manpage}`limits.conf(5)`.
16641665 Note that these limits do not apply to systemd services,
1666- whose limits can be changed via {option}`systemd.extraConfig`
1667 instead.
1668 '';
1669 };
···1663 must be that described in {manpage}`limits.conf(5)`.
16641665 Note that these limits do not apply to systemd services,
1666+ whose limits can be changed via {option}`systemd.settings.Manager`
1667 instead.
1668 '';
1669 };
···24 mountToUnit
25 automountToUnit
26 sliceToUnit
027 ;
2829 upstreamSystemUnits = [
···405 '';
406 };
407408- enableCgroupAccounting = mkOption {
409- default = true;
410- type = types.bool;
411- description = ''
412- Whether to enable cgroup accounting; see {manpage}`cgroups(7)`.
00413 '';
414- };
415-416- extraConfig = mkOption {
417- default = "";
418- type = types.lines;
419- example = "DefaultLimitCORE=infinity";
000420 description = ''
421- Extra config options for systemd. See {manpage}`systemd-system.conf(5)` man page
422 for available options.
423 '';
424 };
···457 by other NixOS modules.
458 '';
459 };
460-461- watchdog.device = mkOption {
462- type = types.nullOr types.path;
463- default = null;
464- example = "/dev/watchdog";
465- description = ''
466- The path to a hardware watchdog device which will be managed by systemd.
467- If not specified, systemd will default to `/dev/watchdog`.
468- '';
469- };
470-471- watchdog.runtimeTime = mkOption {
472- type = types.nullOr types.str;
473- default = null;
474- example = "30s";
475- description = ''
476- The amount of time which can elapse before a watchdog hardware device
477- will automatically reboot the system.
478-479- Valid time units include "ms", "s", "min", "h", "d", and "w";
480- see {manpage}`systemd.time(7)`.
481- '';
482- };
483-484- watchdog.rebootTime = mkOption {
485- type = types.nullOr types.str;
486- default = null;
487- example = "10m";
488- description = ''
489- The amount of time which can elapse after a reboot has been triggered
490- before a watchdog hardware device will automatically reboot the system.
491- If left `null`, systemd will use its default of 10 minutes;
492- see {manpage}`systemd-system.conf(5)`.
493-494- Valid time units include "ms", "s", "min", "h", "d", and "w";
495- see also {manpage}`systemd.time(7)`.
496- '';
497- };
498-499- watchdog.kexecTime = mkOption {
500- type = types.nullOr types.str;
501- default = null;
502- example = "10m";
503- description = ''
504- The amount of time which can elapse when `kexec` is being executed before
505- a watchdog hardware device will automatically reboot the system. This
506- option should only be enabled if `reloadTime` is also enabled;
507- see {manpage}`kexec(8)`.
508-509- Valid time units include "ms", "s", "min", "h", "d", and "w";
510- see also {manpage}`systemd.time(7)`.
511- '';
512- };
513 };
514515 ###### implementation
···638639 "systemd/system.conf".text = ''
640 [Manager]
641- ManagerEnvironment=${
642- lib.concatStringsSep " " (
643- lib.mapAttrsToList (n: v: "${n}=${lib.escapeShellArg v}") cfg.managerEnvironment
644- )
645- }
646- ${optionalString cfg.enableCgroupAccounting ''
647- DefaultCPUAccounting=yes
648- DefaultIOAccounting=yes
649- DefaultBlockIOAccounting=yes
650- DefaultIPAccounting=yes
651- ''}
652- DefaultLimitCORE=infinity
653- ${optionalString (cfg.watchdog.device != null) ''
654- WatchdogDevice=${cfg.watchdog.device}
655- ''}
656- ${optionalString (cfg.watchdog.runtimeTime != null) ''
657- RuntimeWatchdogSec=${cfg.watchdog.runtimeTime}
658- ''}
659- ${optionalString (cfg.watchdog.rebootTime != null) ''
660- RebootWatchdogSec=${cfg.watchdog.rebootTime}
661- ''}
662- ${optionalString (cfg.watchdog.kexecTime != null) ''
663- KExecWatchdogSec=${cfg.watchdog.kexecTime}
664- ''}
665-666- ${cfg.extraConfig}
667 '';
668669 "systemd/sleep.conf".text = ''
···748 SYSTEMD_UNIT_PATH = lib.mkIf (
749 config.boot.extraSystemdUnitPaths != [ ]
750 ) "${builtins.concatStringsSep ":" config.boot.extraSystemdUnitPaths}:";
0000000751 };
752753 system.requiredKernelConfig = map config.lib.kernelConfig.isEnabled [
···858 To forcibly reenable cgroup v1 support, you can set boot.kernelParams = [ "systemd.unified_cgroup_hierarchy=0" "SYSTEMD_CGROUP_ENABLE_LEGACY_FORCE=1" ].
859 NixOS does not officially support this configuration and might cause your system to be unbootable in future versions. You are on your own.
860 '')
000000000000000000000861 ];
862}
···224 graph
225 model
226 pipeline-audio
0227 pipeline-image
228 pipeline-llm
229 pipeline-text
···289 ++ optional-dependencies.api
290 ++ optional-dependencies.similarity;
291292- enabledTestPaths = [
293- "test/python/test*.py"
294- ];
295-296- # The deselected paths depend on the huggingface hub and should be run as a passthru test
297- # disabledTestPaths won't work as the problem is with the classes containing the tests
298- # (in other words, it fails on __init__)
299- disabledTestPaths = [
300- "test/python/testagent.py"
301- "test/python/testcloud.py"
302- "test/python/testconsole.py"
303- "test/python/testembeddings.py"
304- "test/python/testgraph.py"
305- "test/python/testapi/testapiembeddings.py"
306- "test/python/testapi/testapipipelines.py"
307- "test/python/testapi/testapiworkflow.py"
308- "test/python/testdatabase/testclient.py"
309- "test/python/testdatabase/testduckdb.py"
310- "test/python/testdatabase/testencoder.py"
311- "test/python/testworkflow.py"
312 ];
313314 disabledTests = [
···316 "testInvalidTar"
317 "testInvalidZip"
318 # Downloads from Huggingface
000000319 "testPipeline"
320 "testVectors"
321 # Not finding sqlite-vec despite being supplied