Merge pull request #146804 from Artturin/qemudefaultmem

authored by

Artturi and committed by
GitHub
53edfe1d 8d6a02b0

+1 -82
+1 -1
nixos/modules/virtualisation/qemu-vm.nix
··· 296 virtualisation.memorySize = 297 mkOption { 298 type = types.ints.positive; 299 - default = 384; 300 description = 301 '' 302 The memory size in megabytes of the virtual machine.
··· 296 virtualisation.memorySize = 297 mkOption { 298 type = types.ints.positive; 299 + default = 1024; 300 description = 301 '' 302 The memory size in megabytes of the virtual machine.
-4
nixos/tests/airsonic.nix
··· 11 enable = true; 12 maxMemory = 800; 13 }; 14 - 15 - # Airsonic is a Java application, and unfortunately requires a significant 16 - # amount of memory. 17 - virtualisation.memorySize = 1024; 18 }; 19 20 testScript = ''
··· 11 enable = true; 12 maxMemory = 800; 13 }; 14 }; 15 16 testScript = ''
-1
nixos/tests/cage.nix
··· 17 program = "${pkgs.xterm}/bin/xterm -cm -pc -fa Monospace -fs 24"; 18 }; 19 20 - virtualisation.memorySize = 1024; 21 # Need to switch to a different GPU driver than the default one (-vga std) so that Cage can launch: 22 virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; 23 };
··· 17 program = "${pkgs.xterm}/bin/xterm -cm -pc -fa Monospace -fs 24"; 18 }; 19 20 # Need to switch to a different GPU driver than the default one (-vga std) so that Cage can launch: 21 virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; 22 };
-1
nixos/tests/cagebreak.nix
··· 35 programs.xwayland.enable = true; 36 environment.systemPackages = [ pkgs.cagebreak pkgs.wayland-utils ]; 37 38 - virtualisation.memorySize = 1024; 39 # Need to switch to a different GPU driver than the default one (-vga std) so that Cagebreak can launch: 40 virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; 41 };
··· 35 programs.xwayland.enable = true; 36 environment.systemPackages = [ pkgs.cagebreak pkgs.wayland-utils ]; 37 38 # Need to switch to a different GPU driver than the default one (-vga std) so that Cagebreak can launch: 39 virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; 40 };
-1
nixos/tests/cassandra.nix
··· 41 ]; 42 }; 43 services.cassandra = cassandraCfg ipAddress // extra; 44 - virtualisation.memorySize = 1024; 45 }; 46 in 47 {
··· 41 ]; 42 }; 43 services.cassandra = cassandraCfg ipAddress // extra; 44 }; 45 in 46 {
-1
nixos/tests/ceph-multi-node.nix
··· 37 38 generateHost = { pkgs, cephConfig, networkConfig, ... }: { 39 virtualisation = { 40 - memorySize = 1024; 41 emptyDiskImages = [ 20480 ]; 42 vlans = [ 1 ]; 43 };
··· 37 38 generateHost = { pkgs, cephConfig, networkConfig, ... }: { 39 virtualisation = { 40 emptyDiskImages = [ 20480 ]; 41 vlans = [ 1 ]; 42 };
-1
nixos/tests/ceph-single-node-bluestore.nix
··· 34 35 generateHost = { pkgs, cephConfig, networkConfig, ... }: { 36 virtualisation = { 37 - memorySize = 1024; 38 emptyDiskImages = [ 20480 20480 20480 ]; 39 vlans = [ 1 ]; 40 };
··· 34 35 generateHost = { pkgs, cephConfig, networkConfig, ... }: { 36 virtualisation = { 37 emptyDiskImages = [ 20480 20480 20480 ]; 38 vlans = [ 1 ]; 39 };
-1
nixos/tests/ceph-single-node.nix
··· 34 35 generateHost = { pkgs, cephConfig, networkConfig, ... }: { 36 virtualisation = { 37 - memorySize = 1024; 38 emptyDiskImages = [ 20480 20480 20480 ]; 39 vlans = [ 1 ]; 40 };
··· 34 35 generateHost = { pkgs, cephConfig, networkConfig, ... }: { 36 virtualisation = { 37 emptyDiskImages = [ 20480 20480 20480 ]; 38 vlans = [ 1 ]; 39 };
-1
nixos/tests/common/wayland-cage.nix
··· 8 }; 9 10 virtualisation = { 11 - memorySize = 1024; 12 qemu.options = [ "-vga virtio" ]; 13 }; 14 }
··· 8 }; 9 10 virtualisation = { 11 qemu.options = [ "-vga virtio" ]; 12 }; 13 }
-1
nixos/tests/containers-bridge.nix
··· 15 { pkgs, ... }: 16 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 17 virtualisation.writableStore = true; 18 - virtualisation.memorySize = 768; 19 20 networking.bridges = { 21 br0 = {
··· 15 { pkgs, ... }: 16 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 17 virtualisation.writableStore = true; 18 19 networking.bridges = { 20 br0 = {
-1
nixos/tests/containers-ephemeral.nix
··· 5 }; 6 7 machine = { pkgs, ... }: { 8 - virtualisation.memorySize = 768; 9 virtualisation.writableStore = true; 10 11 containers.webserver = {
··· 5 }; 6 7 machine = { pkgs, ... }: { 8 virtualisation.writableStore = true; 9 10 containers.webserver = {
-1
nixos/tests/containers-extra_veth.nix
··· 8 { pkgs, ... }: 9 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 10 virtualisation.writableStore = true; 11 - virtualisation.memorySize = 768; 12 virtualisation.vlans = []; 13 14 networking.useDHCP = false;
··· 8 { pkgs, ... }: 9 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 10 virtualisation.writableStore = true; 11 virtualisation.vlans = []; 12 13 networking.useDHCP = false;
-1
nixos/tests/containers-hosts.nix
··· 7 machine = 8 { lib, ... }: 9 { 10 - virtualisation.memorySize = 256; 11 virtualisation.vlans = []; 12 13 networking.bridges.br0.interfaces = [];
··· 7 machine = 8 { lib, ... }: 9 { 10 virtualisation.vlans = []; 11 12 networking.bridges.br0.interfaces = [];
-1
nixos/tests/containers-imperative.nix
··· 14 nix.binaryCaches = []; # don't try to access cache.nixos.org 15 16 virtualisation.writableStore = true; 17 - virtualisation.memorySize = 1024; 18 # Make sure we always have all the required dependencies for creating a 19 # container available within the VM, because we don't have network access. 20 virtualisation.additionalPaths = let
··· 14 nix.binaryCaches = []; # don't try to access cache.nixos.org 15 16 virtualisation.writableStore = true; 17 # Make sure we always have all the required dependencies for creating a 18 # container available within the VM, because we don't have network access. 19 virtualisation.additionalPaths = let
-1
nixos/tests/containers-ip.nix
··· 22 imports = [ ../modules/installer/cd-dvd/channel.nix ]; 23 virtualisation = { 24 writableStore = true; 25 - memorySize = 768; 26 }; 27 28 containers.webserver4 = webserverFor "10.231.136.1" "10.231.136.2";
··· 22 imports = [ ../modules/installer/cd-dvd/channel.nix ]; 23 virtualisation = { 24 writableStore = true; 25 }; 26 27 containers.webserver4 = webserverFor "10.231.136.1" "10.231.136.2";
-2
nixos/tests/containers-macvlans.nix
··· 15 machine1 = 16 { lib, ... }: 17 { 18 - virtualisation.memorySize = 256; 19 virtualisation.vlans = [ 1 ]; 20 21 # To be able to ping containers from the host, it is necessary ··· 55 machine2 = 56 { ... }: 57 { 58 - virtualisation.memorySize = 256; 59 virtualisation.vlans = [ 1 ]; 60 }; 61
··· 15 machine1 = 16 { lib, ... }: 17 { 18 virtualisation.vlans = [ 1 ]; 19 20 # To be able to ping containers from the host, it is necessary ··· 54 machine2 = 55 { ... }: 56 { 57 virtualisation.vlans = [ 1 ]; 58 }; 59
-4
nixos/tests/containers-physical_interfaces.nix
··· 7 nodes = { 8 server = { ... }: 9 { 10 - virtualisation.memorySize = 256; 11 virtualisation.vlans = [ 1 ]; 12 13 containers.server = { ··· 23 }; 24 }; 25 bridged = { ... }: { 26 - virtualisation.memorySize = 128; 27 virtualisation.vlans = [ 1 ]; 28 29 containers.bridged = { ··· 41 }; 42 43 bonded = { ... }: { 44 - virtualisation.memorySize = 128; 45 virtualisation.vlans = [ 1 ]; 46 47 containers.bonded = { ··· 62 }; 63 64 bridgedbond = { ... }: { 65 - virtualisation.memorySize = 128; 66 virtualisation.vlans = [ 1 ]; 67 68 containers.bridgedbond = {
··· 7 nodes = { 8 server = { ... }: 9 { 10 virtualisation.vlans = [ 1 ]; 11 12 containers.server = { ··· 22 }; 23 }; 24 bridged = { ... }: { 25 virtualisation.vlans = [ 1 ]; 26 27 containers.bridged = { ··· 39 }; 40 41 bonded = { ... }: { 42 virtualisation.vlans = [ 1 ]; 43 44 containers.bonded = { ··· 59 }; 60 61 bridgedbond = { ... }: { 62 virtualisation.vlans = [ 1 ]; 63 64 containers.bridgedbond = {
-1
nixos/tests/containers-portforward.nix
··· 15 { pkgs, ... }: 16 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 17 virtualisation.writableStore = true; 18 - virtualisation.memorySize = 768; 19 20 containers.webserver = 21 { privateNetwork = true;
··· 15 { pkgs, ... }: 16 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 17 virtualisation.writableStore = true; 18 19 containers.webserver = 20 { privateNetwork = true;
-1
nixos/tests/containers-tmpfs.nix
··· 8 { pkgs, ... }: 9 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 10 virtualisation.writableStore = true; 11 - virtualisation.memorySize = 768; 12 13 containers.tmpfs = 14 {
··· 8 { pkgs, ... }: 9 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 10 virtualisation.writableStore = true; 11 12 containers.tmpfs = 13 {
-2
nixos/tests/custom-ca.nix
··· 81 82 # chromium-based browsers refuse to run as root 83 test-support.displayManager.auto.user = "alice"; 84 - # browsers may hang with the default memory 85 - virtualisation.memorySize = 500; 86 87 networking.hosts."127.0.0.1" = [ "good.example.com" "bad.example.com" ]; 88 security.pki.certificateFiles = [ "${example-good-cert}/ca.crt" ];
··· 81 82 # chromium-based browsers refuse to run as root 83 test-support.displayManager.auto.user = "alice"; 84 85 networking.hosts."127.0.0.1" = [ "good.example.com" "bad.example.com" ]; 86 security.pki.certificateFiles = [ "${example-good-cert}/ca.crt" ];
-1
nixos/tests/enlightenment.nix
··· 19 }; 20 }; 21 hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then 22 - virtualisation.memorySize = 1024; 23 environment.systemPackages = [ pkgs.xdotool ]; 24 services.acpid.enable = true; 25 services.connman.enable = true;
··· 19 }; 20 }; 21 hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then 22 environment.systemPackages = [ pkgs.xdotool ]; 23 services.acpid.enable = true; 24 services.connman.enable = true;
-1
nixos/tests/fcitx/default.nix
··· 11 ... 12 }: 13 { 14 - virtualisation.memorySize = 1024; 15 16 imports = [ 17 ../common/user-account.nix
··· 11 ... 12 }: 13 { 14 15 imports = [ 16 ../common/user-account.nix
-1
nixos/tests/fenics.nix
··· 38 gcc 39 (python3.withPackages (ps: with ps; [ fenics ])) 40 ]; 41 - virtualisation.memorySize = 512; 42 }; 43 }; 44 testScript =
··· 38 gcc 39 (python3.withPackages (ps: with ps; [ fenics ])) 40 ]; 41 }; 42 }; 43 testScript =
-3
nixos/tests/firefox.nix
··· 13 pkgs.xdotool 14 ]; 15 16 - # Need some more memory to record audio. 17 - virtualisation.memorySize = 500; 18 - 19 # Create a virtual sound device, with mixing 20 # and all, for recording audio. 21 boot.kernelModules = [ "snd-aloop" ];
··· 13 pkgs.xdotool 14 ]; 15 16 # Create a virtual sound device, with mixing 17 # and all, for recording audio. 18 boot.kernelModules = [ "snd-aloop" ];
-1
nixos/tests/gerrit.nix
··· 18 { config, pkgs, ... }: { 19 networking.firewall.allowedTCPPorts = [ 80 2222 ]; 20 21 - virtualisation.memorySize = 1024; 22 23 services.gerrit = { 24 enable = true;
··· 18 { config, pkgs, ... }: { 19 networking.firewall.allowedTCPPorts = [ 80 2222 ]; 20 21 22 services.gerrit = { 23 enable = true;
-1
nixos/tests/gnome-xorg.nix
··· 40 }; 41 }; 42 43 - virtualisation.memorySize = 1024; 44 }; 45 46 testScript = { nodes, ... }: let
··· 40 }; 41 }; 42 43 }; 44 45 testScript = { nodes, ... }: let
-1
nixos/tests/gnome.nix
··· 45 }; 46 }; 47 48 - virtualisation.memorySize = 1024; 49 }; 50 51 testScript = { nodes, ... }: let
··· 45 }; 46 }; 47 48 }; 49 50 testScript = { nodes, ... }: let
-1
nixos/tests/graphite.nix
··· 4 nodes = { 5 one = 6 { ... }: { 7 - virtualisation.memorySize = 1024; 8 time.timeZone = "UTC"; 9 services.graphite = { 10 web = {
··· 4 nodes = { 5 one = 6 { ... }: { 7 time.timeZone = "UTC"; 8 services.graphite = { 9 web = {
-2
nixos/tests/hadoop/hadoop.nix
··· 95 96 # YARN cluster 97 rm1 = {pkgs, options, ...}: { 98 - virtualisation.memorySize = 1024; 99 services.hadoop = { 100 inherit package coreSite hdfsSite; 101 yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA; ··· 103 }; 104 }; 105 rm2 = {pkgs, options, ...}: { 106 - virtualisation.memorySize = 1024; 107 services.hadoop = { 108 inherit package coreSite hdfsSite; 109 yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA;
··· 95 96 # YARN cluster 97 rm1 = {pkgs, options, ...}: { 98 services.hadoop = { 99 inherit package coreSite hdfsSite; 100 yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA; ··· 102 }; 103 }; 104 rm2 = {pkgs, options, ...}: { 105 services.hadoop = { 106 inherit package coreSite hdfsSite; 107 yarnSite = options.services.hadoop.yarnSite.default // yarnSiteHA;
-1
nixos/tests/hadoop/hdfs.nix
··· 2 import ../make-test-python.nix ({...}: { 3 nodes = { 4 namenode = {pkgs, ...}: { 5 - virtualisation.memorySize = 1024; 6 services.hadoop = { 7 package = pkgs.hadoop; 8 hdfs = {
··· 2 import ../make-test-python.nix ({...}: { 3 nodes = { 4 namenode = {pkgs, ...}: { 5 services.hadoop = { 6 package = pkgs.hadoop; 7 hdfs = {
-1
nixos/tests/installed-tests/fwupd.nix
··· 7 services.fwupd.enable = true; 8 services.fwupd.disabledPlugins = lib.mkForce []; # don't disable test plugin 9 services.fwupd.enableTestRemote = true; 10 - virtualisation.memorySize = 768; 11 }; 12 }
··· 7 services.fwupd.enable = true; 8 services.fwupd.disabledPlugins = lib.mkForce []; # don't disable test plugin 9 services.fwupd.enableTestRemote = true; 10 }; 11 }
-1
nixos/tests/jitsi-meet.nix
··· 8 client = { nodes, pkgs, ... }: { 9 }; 10 server = { config, pkgs, ... }: { 11 - virtualisation.memorySize = 512; 12 services.jitsi-meet = { 13 enable = true; 14 hostName = "server";
··· 8 client = { nodes, pkgs, ... }: { 9 }; 10 server = { config, pkgs, ... }: { 11 services.jitsi-meet = { 12 enable = true; 13 hostName = "server";
-1
nixos/tests/kafka.nix
··· 19 }; 20 21 networking.firewall.allowedTCPPorts = [ 2181 ]; 22 - virtualisation.memorySize = 1024; 23 }; 24 kafka = { ... }: { 25 services.apache-kafka = {
··· 19 }; 20 21 networking.firewall.allowedTCPPorts = [ 2181 ]; 22 }; 23 kafka = { ... }: { 24 services.apache-kafka = {
-1
nixos/tests/keycloak.nix
··· 17 18 nodes = { 19 keycloak = { ... }: { 20 - virtualisation.memorySize = 1024; 21 22 security.pki.certificateFiles = [ 23 certs.ca.cert
··· 17 18 nodes = { 19 keycloak = { ... }: { 20 21 security.pki.certificateFiles = [ 22 certs.ca.cert
-2
nixos/tests/lxd-image.nix
··· 46 47 machine = { lib, ... }: { 48 virtualisation = { 49 - # OOMs otherwise 50 - memorySize = 1024; 51 # disk full otherwise 52 diskSize = 2048; 53
··· 46 47 machine = { lib, ... }: { 48 virtualisation = { 49 # disk full otherwise 50 diskSize = 2048; 51
-1
nixos/tests/metabase.nix
··· 7 nodes = { 8 machine = { ... }: { 9 services.metabase.enable = true; 10 - virtualisation.memorySize = 1024; 11 }; 12 }; 13
··· 7 nodes = { 8 machine = { ... }: { 9 services.metabase.enable = true; 10 }; 11 }; 12
-4
nixos/tests/mysql/mysql.nix
··· 64 { 65 imports = [ users ]; 66 67 - # prevent oom: 68 - # Kernel panic - not syncing: Out of memory: compulsory panic_on_oom is enabled 69 - virtualisation.memorySize = 1024; 70 - 71 services.mysql.enable = true; 72 services.mysql.initialDatabases = [ 73 { name = "testdb3"; schema = ./testdb.sql; }
··· 64 { 65 imports = [ users ]; 66 67 services.mysql.enable = true; 68 services.mysql.initialDatabases = [ 69 { name = "testdb3"; schema = ./testdb.sql; }
-1
nixos/tests/networking-proxy.nix
··· 8 9 services.xserver.enable = false; 10 11 - virtualisation.memorySize = 128; 12 }; 13 in import ./make-test-python.nix ({ pkgs, ...} : { 14 name = "networking-proxy";
··· 8 9 services.xserver.enable = false; 10 11 }; 12 in import ./make-test-python.nix ({ pkgs, ...} : { 13 name = "networking-proxy";
-1
nixos/tests/nginx-etag.nix
··· 37 }; 38 39 client = { pkgs, lib, ... }: { 40 - virtualisation.memorySize = 512; 41 environment.systemPackages = let 42 testRunner = pkgs.writers.writePython3Bin "test-runner" { 43 libraries = [ pkgs.python3Packages.selenium ];
··· 37 }; 38 39 client = { pkgs, lib, ... }: { 40 environment.systemPackages = let 41 testRunner = pkgs.writers.writePython3Bin "test-runner" { 42 libraries = [ pkgs.python3Packages.selenium ];
-1
nixos/tests/nixops/default.nix
··· 26 nix.binaryCaches = lib.mkForce [ ]; 27 users.users.person.isNormalUser = true; 28 virtualisation.writableStore = true; 29 - virtualisation.memorySize = 1024 /*MiB*/; 30 virtualisation.additionalPaths = [ 31 pkgs.hello 32 pkgs.figlet
··· 26 nix.binaryCaches = lib.mkForce [ ]; 27 users.users.person.isNormalUser = true; 28 virtualisation.writableStore = true; 29 virtualisation.additionalPaths = [ 30 pkgs.hello 31 pkgs.figlet
-1
nixos/tests/opensmtpd-rspamd.nix
··· 39 40 smtp2 = { pkgs, ... }: { 41 imports = [ common/user-account.nix ]; 42 - virtualisation.memorySize = 512; 43 networking = { 44 firewall.allowedTCPPorts = [ 25 143 ]; 45 useDHCP = false;
··· 39 40 smtp2 = { pkgs, ... }: { 41 imports = [ common/user-account.nix ]; 42 networking = { 43 firewall.allowedTCPPorts = [ 25 143 ]; 44 useDHCP = false;
-1
nixos/tests/pantheon.nix
··· 15 services.xserver.enable = true; 16 services.xserver.desktopManager.pantheon.enable = true; 17 18 - virtualisation.memorySize = 1024; 19 }; 20 21 enableOCR = true;
··· 15 services.xserver.enable = true; 16 services.xserver.desktopManager.pantheon.enable = true; 17 18 }; 19 20 enableOCR = true;
-1
nixos/tests/paperless-ng.nix
··· 8 enable = true; 9 passwordFile = builtins.toFile "password" "admin"; 10 }; 11 - virtualisation.memorySize = 1024; 12 }; 13 14 testScript = ''
··· 8 enable = true; 9 passwordFile = builtins.toFile "password" "admin"; 10 }; 11 }; 12 13 testScript = ''
-1
nixos/tests/plasma5-systemd-start.nix
··· 21 user = "alice"; 22 }; 23 }; 24 - virtualisation.memorySize = 1024; 25 }; 26 27 testScript = { nodes, ... }: let
··· 21 user = "alice"; 22 }; 23 }; 24 }; 25 26 testScript = { nodes, ... }: let
-1
nixos/tests/plasma5.nix
··· 19 user = "alice"; 20 }; 21 hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then 22 - virtualisation.memorySize = 1024; 23 }; 24 25 testScript = { nodes, ... }: let
··· 19 user = "alice"; 20 }; 21 hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then 22 }; 23 24 testScript = { nodes, ... }: let
-1
nixos/tests/pleroma.nix
··· 202 security.pki.certificateFiles = [ "${tls-cert}/cert.pem" ]; 203 networking.extraHosts = hosts nodes; 204 networking.firewall.enable = false; 205 - virtualisation.memorySize = 512; 206 environment.systemPackages = with pkgs; [ 207 provision-db 208 provision-secrets
··· 202 security.pki.certificateFiles = [ "${tls-cert}/cert.pem" ]; 203 networking.extraHosts = hosts nodes; 204 networking.firewall.enable = false; 205 environment.systemPackages = with pkgs; [ 206 provision-db 207 provision-secrets
-1
nixos/tests/privacyidea.nix
··· 8 9 machine = { ... }: { 10 virtualisation.cores = 2; 11 - virtualisation.memorySize = 512; 12 13 services.privacyidea = { 14 enable = true;
··· 8 9 machine = { ... }: { 10 virtualisation.cores = 2; 11 12 services.privacyidea = { 13 enable = true;
-2
nixos/tests/prometheus-exporters.nix
··· 464 extraFlags = [ "--lnd.network=regtest" ]; 465 }; 466 metricProvider = { 467 - virtualisation.memorySize = 1024; 468 systemd.services.prometheus-lnd-exporter.serviceConfig.RestartSec = 15; 469 systemd.services.prometheus-lnd-exporter.after = [ "lnd.service" ]; 470 services.bitcoind.regtest = { ··· 953 }; 954 metricProvider = { 955 services.rspamd.enable = true; 956 - virtualisation.memorySize = 1024; 957 }; 958 exporterTest = '' 959 wait_for_unit("rspamd.service")
··· 464 extraFlags = [ "--lnd.network=regtest" ]; 465 }; 466 metricProvider = { 467 systemd.services.prometheus-lnd-exporter.serviceConfig.RestartSec = 15; 468 systemd.services.prometheus-lnd-exporter.after = [ "lnd.service" ]; 469 services.bitcoind.regtest = { ··· 952 }; 953 metricProvider = { 954 services.rspamd.enable = true; 955 }; 956 exporterTest = '' 957 wait_for_unit("rspamd.service")
-1
nixos/tests/prometheus.nix
··· 188 # Minio requires at least 1GiB of free disk space to run. 189 virtualisation = { 190 diskSize = 2 * 1024; 191 - memorySize = 1024; 192 }; 193 networking.firewall.allowedTCPPorts = [ minioPort ]; 194
··· 188 # Minio requires at least 1GiB of free disk space to run. 189 virtualisation = { 190 diskSize = 2 * 1024; 191 }; 192 networking.firewall.allowedTCPPorts = [ minioPort ]; 193
-5
nixos/tests/rspamd.nix
··· 25 machine = { 26 services.rspamd.enable = true; 27 networking.enableIPv6 = enableIPv6; 28 - virtualisation.memorySize = 1024; 29 }; 30 testScript = '' 31 start_all() ··· 69 group = "rspamd"; 70 }]; 71 }; 72 - virtualisation.memorySize = 1024; 73 }; 74 75 testScript = '' ··· 118 ''; 119 }; 120 }; 121 - virtualisation.memorySize = 1024; 122 }; 123 124 testScript = '' ··· 224 rspamd_logger.infox(rspamd_config, 'Work dammit!!!') 225 ''; 226 }; 227 - virtualisation.memorySize = 1024; 228 }; 229 testScript = '' 230 ${initMachine} ··· 291 postfix.enable = true; 292 workers.rspamd_proxy.type = "rspamd_proxy"; 293 }; 294 - virtualisation.memorySize = 1024; 295 }; 296 testScript = '' 297 ${initMachine}
··· 25 machine = { 26 services.rspamd.enable = true; 27 networking.enableIPv6 = enableIPv6; 28 }; 29 testScript = '' 30 start_all() ··· 68 group = "rspamd"; 69 }]; 70 }; 71 }; 72 73 testScript = '' ··· 116 ''; 117 }; 118 }; 119 }; 120 121 testScript = '' ··· 221 rspamd_logger.infox(rspamd_config, 'Work dammit!!!') 222 ''; 223 }; 224 }; 225 testScript = '' 226 ${initMachine} ··· 287 postfix.enable = true; 288 workers.rspamd_proxy.type = "rspamd_proxy"; 289 }; 290 }; 291 testScript = '' 292 ${initMachine}
-2
nixos/tests/seafile.nix
··· 1 import ./make-test-python.nix ({ pkgs, ... }: 2 let 3 client = { config, pkgs, ... }: { 4 - virtualisation.memorySize = 256; 5 environment.systemPackages = [ pkgs.seafile-shared pkgs.curl ]; 6 }; 7 in { ··· 12 13 nodes = { 14 server = { config, pkgs, ... }: { 15 - virtualisation.memorySize = 512; 16 services.seafile = { 17 enable = true; 18 ccnetSettings.General.SERVICE_URL = "http://server";
··· 1 import ./make-test-python.nix ({ pkgs, ... }: 2 let 3 client = { config, pkgs, ... }: { 4 environment.systemPackages = [ pkgs.seafile-shared pkgs.curl ]; 5 }; 6 in { ··· 11 12 nodes = { 13 server = { config, pkgs, ... }: { 14 services.seafile = { 15 enable = true; 16 ccnetSettings.General.SERVICE_URL = "http://server";
-1
nixos/tests/signal-desktop.nix
··· 29 environment.systemPackages = with pkgs; [ 30 signal-desktop file sqlite sqlcipher-signal 31 ]; 32 - virtualisation.memorySize = 1024; 33 }; 34 35 enableOCR = true;
··· 29 environment.systemPackages = with pkgs; [ 30 signal-desktop file sqlite sqlcipher-signal 31 ]; 32 }; 33 34 enableOCR = true;
-1
nixos/tests/spark/default.nix
··· 3 4 nodes = { 5 worker = { nodes, pkgs, ... }: { 6 - virtualisation.memorySize = 1024; 7 services.spark.worker = { 8 enable = true; 9 master = "master:7077";
··· 3 4 nodes = { 5 worker = { nodes, pkgs, ... }: { 6 services.spark.worker = { 7 enable = true; 8 master = "master:7077";
-1
nixos/tests/sway.nix
··· 44 # To test pinentry via gpg-agent: 45 programs.gnupg.agent.enable = true; 46 47 - virtualisation.memorySize = 1024; 48 # Need to switch to a different GPU driver than the default one (-vga std) so that Sway can launch: 49 virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; 50 };
··· 44 # To test pinentry via gpg-agent: 45 programs.gnupg.agent.enable = true; 46 47 # Need to switch to a different GPU driver than the default one (-vga std) so that Sway can launch: 48 virtualisation.qemu.options = [ "-vga none -device virtio-gpu-pci" ]; 49 };
-1
nixos/tests/sympa.nix
··· 5 machine = 6 { ... }: 7 { 8 - virtualisation.memorySize = 1024; 9 10 services.sympa = { 11 enable = true;
··· 5 machine = 6 { ... }: 7 { 8 9 services.sympa = { 10 enable = true;
-1
nixos/tests/systemd-cryptenroll.nix
··· 8 environment.systemPackages = [ pkgs.cryptsetup ]; 9 virtualisation = { 10 emptyDiskImages = [ 512 ]; 11 - memorySize = 1024; 12 qemu.options = [ 13 "-chardev socket,id=chrtpm,path=/tmp/swtpm-sock" 14 "-tpmdev emulator,id=tpm0,chardev=chrtpm"
··· 8 environment.systemPackages = [ pkgs.cryptsetup ]; 9 virtualisation = { 10 emptyDiskImages = [ 512 ]; 11 qemu.options = [ 12 "-chardev socket,id=chrtpm,path=/tmp/swtpm-sock" 13 "-tpmdev emulator,id=tpm0,chardev=chrtpm"
-1
nixos/tests/systemd.nix
··· 5 imports = [ common/user-account.nix common/x11.nix ]; 6 7 virtualisation.emptyDiskImages = [ 512 512 ]; 8 - virtualisation.memorySize = 1024; 9 10 environment.systemPackages = [ pkgs.cryptsetup ]; 11
··· 5 imports = [ common/user-account.nix common/x11.nix ]; 6 7 virtualisation.emptyDiskImages = [ 512 512 ]; 8 9 environment.systemPackages = [ pkgs.cryptsetup ]; 10
-1
nixos/tests/vault-postgresql.nix
··· 12 maintainers = [ lnl7 roberth ]; 13 }; 14 machine = { lib, pkgs, ... }: { 15 - virtualisation.memorySize = 512; 16 environment.systemPackages = [ pkgs.vault ]; 17 environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; 18 services.vault.enable = true;
··· 12 maintainers = [ lnl7 roberth ]; 13 }; 14 machine = { lib, pkgs, ... }: { 15 environment.systemPackages = [ pkgs.vault ]; 16 environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; 17 services.vault.enable = true;
-1
nixos/tests/vault.nix
··· 8 environment.systemPackages = [ pkgs.vault ]; 9 environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; 10 services.vault.enable = true; 11 - virtualisation.memorySize = 512; 12 }; 13 14 testScript =
··· 8 environment.systemPackages = [ pkgs.vault ]; 9 environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; 10 services.vault.enable = true; 11 }; 12 13 testScript =
-1
nixos/tests/vaultwarden.nix
··· 140 in 141 [ pkgs.firefox-unwrapped pkgs.geckodriver testRunner ]; 142 143 - virtualisation.memorySize = 768; 144 } 145 ]; 146
··· 140 in 141 [ pkgs.firefox-unwrapped pkgs.geckodriver testRunner ]; 142 143 } 144 ]; 145
-1
nixos/tests/xfce.nix
··· 23 24 hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then 25 26 - virtualisation.memorySize = 1024; 27 }; 28 29 testScript = { nodes, ... }: let
··· 23 24 hardware.pulseaudio.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then 25 26 }; 27 28 testScript = { nodes, ... }: let