···8484 type = types.package;
8585 default = pkgs.krb5Full;
8686 defaultText = "pkgs.krb5Full";
8787- example = literalExample "pkgs.heimdalFull";
8787+ example = literalExample "pkgs.heimdal";
8888 description = ''
8989 The Kerberos implementation that will be present in
9090 <literal>environment.systemPackages</literal> after enabling this
···99 makeTest {
1010 name = "cntr-${backend}";
11111212- meta = { maintainers = with lib.maintainers; [ srk mic92 ]; };
1212+ meta = { maintainers = with lib.maintainers; [ sorki mic92 ]; };
13131414 nodes = {
1515 ${backend} = { pkgs, ... }: {
+5
nixos/tests/ec2.nix
···2424 ln -s vda1 /dev/xvda1
2525 '';
26262727+ # In a NixOS test the serial console is occupied by the "backdoor"
2828+ # (see testing/test-instrumentation.nix) and is incompatible with
2929+ # the configuration in virtualisation/amazon-image.nix.
3030+ systemd.services."serial-getty@ttyS0".enable = mkForce false;
3131+2732 # Needed by nixos-rebuild due to the lack of network
2833 # access. Determined by trial and error.
2934 system.extraDependencies = with pkgs; ( [
···4242 # DO NOT COPY THIS TO PRODUCTION AS IS. Think about it at least twice.
4343 # Everyone on the "isp" machine will be able to add routes to the kernel.
4444 security.wrappers.add-dhcpd-lease = {
4545+ owner = "root";
4646+ group = "root";
4547 source = pkgs.writeShellScript "add-dhcpd-lease" ''
4648 exec ${pkgs.iproute2}/bin/ip -6 route replace "$1" via "$2"
4749 '';
+1-1
nixos/tests/tigervnc.nix
···66with import ../lib/testing-python.nix { inherit system pkgs; };
77makeTest {
88 name = "tigervnc";
99- meta = with pkgs.stdenv.lib.maintainers; {
99+ meta = with pkgs.lib.maintainers; {
1010 maintainers = [ lheckemann ];
1111 };
1212