Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

treewide: machine -> nodes.machine

+261 -261
+1 -1
nixos/tests/aesmd.nix
··· 4 4 maintainers = with lib.maintainers; [ veehaitch ]; 5 5 }; 6 6 7 - machine = { lib, ... }: { 7 + nodes.machine = { lib, ... }: { 8 8 services.aesmd = { 9 9 enable = true; 10 10 settings = {
+1 -1
nixos/tests/agda.nix
··· 15 15 maintainers = [ alexarice turion ]; 16 16 }; 17 17 18 - machine = { pkgs, ... }: { 18 + nodes.machine = { pkgs, ... }: { 19 19 environment.systemPackages = [ 20 20 (pkgs.agda.withPackages { 21 21 pkgs = p: [ p.standard-library ];
+1 -1
nixos/tests/airsonic.nix
··· 4 4 maintainers = [ sumnerevans ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { pkgs, ... }: 9 9 { 10 10 services.airsonic = {
+1 -1
nixos/tests/amazon-init-shell.nix
··· 18 18 meta = with maintainers; { 19 19 maintainers = [ urbas ]; 20 20 }; 21 - machine = { ... }: 21 + nodes.machine = { ... }: 22 22 { 23 23 imports = [ ../modules/profiles/headless.nix ../modules/virtualisation/amazon-init.nix ]; 24 24 services.openssh.enable = true;
+1 -1
nixos/tests/apfs.nix
··· 2 2 name = "apfs"; 3 3 meta.maintainers = with pkgs.lib.maintainers; [ Luflosi ]; 4 4 5 - machine = { pkgs, ... }: { 5 + nodes.machine = { pkgs, ... }: { 6 6 virtualisation.emptyDiskImages = [ 1024 ]; 7 7 8 8 boot.supportedFilesystems = [ "apfs" ];
+1 -1
nixos/tests/apparmor.nix
··· 4 4 maintainers = [ julm ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { lib, pkgs, config, ... }: 9 9 with lib; 10 10 {
+1 -1
nixos/tests/atd.nix
··· 6 6 maintainers = [ bjornfor ]; 7 7 }; 8 8 9 - machine = 9 + nodes.machine = 10 10 { ... }: 11 11 { services.atd.enable = true; 12 12 users.users.alice = { isNormalUser = true; };
+6 -6
nixos/tests/atop.nix
··· 107 107 { 108 108 justThePackage = makeTest { 109 109 name = "atop-justThePackage"; 110 - machine = { 110 + nodes.machine = { 111 111 environment.systemPackages = [ pkgs.atop ]; 112 112 }; 113 113 testScript = with assertions; builtins.concatStringsSep "\n" [ ··· 123 123 }; 124 124 defaults = makeTest { 125 125 name = "atop-defaults"; 126 - machine = { 126 + nodes.machine = { 127 127 programs.atop = { 128 128 enable = true; 129 129 }; ··· 141 141 }; 142 142 minimal = makeTest { 143 143 name = "atop-minimal"; 144 - machine = { 144 + nodes.machine = { 145 145 programs.atop = { 146 146 enable = true; 147 147 atopService.enable = false; ··· 162 162 }; 163 163 netatop = makeTest { 164 164 name = "atop-netatop"; 165 - machine = { 165 + nodes.machine = { 166 166 programs.atop = { 167 167 enable = true; 168 168 netatop.enable = true; ··· 181 181 }; 182 182 atopgpu = makeTest { 183 183 name = "atop-atopgpu"; 184 - machine = { 184 + nodes.machine = { 185 185 nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (getName pkg) [ 186 186 "cudatoolkit" 187 187 ]; ··· 204 204 }; 205 205 everything = makeTest { 206 206 name = "atop-everthing"; 207 - machine = { 207 + nodes.machine = { 208 208 nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (getName pkg) [ 209 209 "cudatoolkit" 210 210 ];
+1 -1
nixos/tests/bcachefs.nix
··· 2 2 name = "bcachefs"; 3 3 meta.maintainers = with pkgs.lib.maintainers; [ chiiruno ]; 4 4 5 - machine = { pkgs, ... }: { 5 + nodes.machine = { pkgs, ... }: { 6 6 virtualisation.emptyDiskImages = [ 4096 ]; 7 7 networking.hostId = "deadbeef"; 8 8 boot.supportedFilesystems = [ "bcachefs" ];
+1 -1
nixos/tests/beanstalkd.nix
··· 28 28 name = "beanstalkd"; 29 29 meta.maintainers = [ lib.maintainers.aanderse ]; 30 30 31 - machine = 31 + nodes.machine = 32 32 { ... }: 33 33 { services.beanstalkd.enable = true; 34 34 };
+1 -1
nixos/tests/bees.nix
··· 2 2 { 3 3 name = "bees"; 4 4 5 - machine = { config, pkgs, ... }: { 5 + nodes.machine = { config, pkgs, ... }: { 6 6 boot.initrd.postDeviceCommands = '' 7 7 ${pkgs.btrfs-progs}/bin/mkfs.btrfs -f -L aux1 /dev/vdb 8 8 ${pkgs.btrfs-progs}/bin/mkfs.btrfs -f -L aux2 /dev/vdc
+1 -1
nixos/tests/bind.nix
··· 1 1 import ./make-test-python.nix { 2 2 name = "bind"; 3 3 4 - machine = { pkgs, lib, ... }: { 4 + nodes.machine = { pkgs, lib, ... }: { 5 5 services.bind.enable = true; 6 6 services.bind.extraOptions = "empty-zones-enable no;"; 7 7 services.bind.zones = lib.singleton {
+1 -1
nixos/tests/bitcoind.nix
··· 4 4 maintainers = with maintainers; [ _1000101 ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 services.bitcoind."mainnet" = { 9 9 enable = true; 10 10 rpc = {
+1 -1
nixos/tests/blockbook-frontend.nix
··· 4 4 maintainers = with maintainers; [ _1000101 ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 services.blockbook-frontend."test" = { 9 9 enable = true; 10 10 };
+1 -1
nixos/tests/boot-stage1.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "boot-stage1"; 3 3 4 - machine = { config, pkgs, lib, ... }: { 4 + nodes.machine = { config, pkgs, lib, ... }: { 5 5 boot.extraModulePackages = let 6 6 compileKernelModule = name: source: pkgs.runCommandCC name rec { 7 7 inherit source;
+3 -3
nixos/tests/boot.nix
··· 42 42 nodes = { }; 43 43 testScript = 44 44 '' 45 - machine = create_machine(${machineConfig}) 45 + nodes.machine = create_machine(${machineConfig}) 46 46 machine.start() 47 47 machine.wait_for_unit("multi-user.target") 48 48 machine.succeed("nix store verify --no-trust -r --option experimental-features nix-command /run/current-system") ··· 83 83 name = "boot-netboot-" + name; 84 84 nodes = { }; 85 85 testScript = '' 86 - machine = create_machine(${machineConfig}) 86 + nodes.machine = create_machine(${machineConfig}) 87 87 machine.start() 88 88 machine.wait_for_unit("multi-user.target") 89 89 machine.shutdown() ··· 138 138 if os.system("qemu-img create -f qcow2 -F raw -b ${sdImage} ${mutableImage}") != 0: 139 139 raise RuntimeError("Could not create mutable linked image") 140 140 141 - machine = create_machine(${machineConfig}) 141 + nodes.machine = create_machine(${machineConfig}) 142 142 machine.start() 143 143 machine.wait_for_unit("multi-user.target") 144 144 machine.succeed("nix store verify -r --no-trust --option experimental-features nix-command /run/current-system")
+1 -1
nixos/tests/bpf.nix
··· 2 2 name = "bpf"; 3 3 meta.maintainers = with pkgs.lib.maintainers; [ martinetd ]; 4 4 5 - machine = { pkgs, ... }: { 5 + nodes.machine = { pkgs, ... }: { 6 6 programs.bcc.enable = true; 7 7 environment.systemPackages = with pkgs; [ bpftrace ]; 8 8 };
+1 -1
nixos/tests/breitbandmessung.nix
··· 2 2 name = "breitbandmessung"; 3 3 meta.maintainers = with lib.maintainers; [ b4dm4n ]; 4 4 5 - machine = { pkgs, ... }: { 5 + nodes.machine = { pkgs, ... }: { 6 6 imports = [ 7 7 ./common/user-account.nix 8 8 ./common/x11.nix
+1 -1
nixos/tests/brscan5.nix
··· 7 7 maintainers = [ mattchrist ]; 8 8 }; 9 9 10 - machine = { pkgs, ... }: 10 + nodes.machine = { pkgs, ... }: 11 11 { 12 12 nixpkgs.config.allowUnfree = true; 13 13 hardware.sane = {
+1 -1
nixos/tests/buildkite-agents.nix
··· 6 6 maintainers = [ flokli ]; 7 7 }; 8 8 9 - machine = { pkgs, ... }: { 9 + nodes.machine = { pkgs, ... }: { 10 10 services.buildkite-agents = { 11 11 one = { 12 12 privateSshKeyPath = (import ./ssh-keys.nix pkgs).snakeOilPrivateKey;
+1 -1
nixos/tests/cage.nix
··· 6 6 maintainers = [ matthewbauer ]; 7 7 }; 8 8 9 - machine = { ... }: 9 + nodes.machine = { ... }: 10 10 11 11 { 12 12 imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/cagebreak.nix
··· 13 13 maintainers = [ berbiche ]; 14 14 }; 15 15 16 - machine = { config, ... }: 16 + nodes.machine = { config, ... }: 17 17 let 18 18 alice = config.users.users.alice; 19 19 in {
+1 -1
nixos/tests/cfssl.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "cfssl"; 3 3 4 - machine = { config, lib, pkgs, ... }: 4 + nodes.machine = { config, lib, pkgs, ... }: 5 5 { 6 6 networking.firewall.allowedTCPPorts = [ config.services.cfssl.port ]; 7 7
+1 -1
nixos/tests/clickhouse.nix
··· 2 2 name = "clickhouse"; 3 3 meta.maintainers = with pkgs.lib.maintainers; [ ma27 ]; 4 4 5 - machine = { 5 + nodes.machine = { 6 6 services.clickhouse.enable = true; 7 7 virtualisation.memorySize = 4096; 8 8 };
+1 -1
nixos/tests/cloud-init.nix
··· 61 61 meta = with pkgs.lib.maintainers; { 62 62 maintainers = [ lewo ]; 63 63 }; 64 - machine = { ... }: 64 + nodes.machine = { ... }: 65 65 { 66 66 virtualisation.qemu.options = [ "-cdrom" "${metadataDrive}/metadata.iso" ]; 67 67 services.cloud-init = {
+1 -1
nixos/tests/cntr.nix
··· 46 46 47 47 meta = with pkgs.lib.maintainers; { maintainers = [ sorki mic92 ]; }; 48 48 49 - machine = { lib, ... }: { 49 + nodes.machine = { lib, ... }: { 50 50 environment.systemPackages = [ pkgs.cntr ]; 51 51 containers.test = { 52 52 autoStart = true;
+1 -1
nixos/tests/collectd.nix
··· 2 2 name = "collectd"; 3 3 meta = { }; 4 4 5 - machine = 5 + nodes.machine = 6 6 { pkgs, ... }: 7 7 8 8 {
+1 -1
nixos/tests/containers-bridge.nix
··· 11 11 maintainers = with lib.maintainers; [ aristid aszlig eelco kampfschlaefer ]; 12 12 }; 13 13 14 - machine = 14 + nodes.machine = 15 15 { pkgs, ... }: 16 16 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 17 17 virtualisation.writableStore = true;
+1 -1
nixos/tests/containers-custom-pkgs.nix
··· 12 12 maintainers = with lib.maintainers; [ adisbladis earvstedt ]; 13 13 }; 14 14 15 - machine = { config, ... }: { 15 + nodes.machine = { config, ... }: { 16 16 assertions = let 17 17 helloName = (builtins.head config.containers.test.config.system.extraDependencies).name; 18 18 in [ {
+1 -1
nixos/tests/containers-ephemeral.nix
··· 4 4 maintainers = with lib.maintainers; [ patryk27 ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 virtualisation.writableStore = true; 9 9 10 10 containers.webserver = {
+1 -1
nixos/tests/containers-extra_veth.nix
··· 4 4 maintainers = with lib.maintainers; [ kampfschlaefer ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { pkgs, ... }: 9 9 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 10 10 virtualisation.writableStore = true;
+1 -1
nixos/tests/containers-hosts.nix
··· 4 4 maintainers = with lib.maintainers; [ montag451 ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { lib, ... }: 9 9 { 10 10 virtualisation.vlans = [];
+1 -1
nixos/tests/containers-imperative.nix
··· 4 4 maintainers = with lib.maintainers; [ aristid aszlig eelco kampfschlaefer ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { config, pkgs, lib, ... }: 9 9 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 10 10
+1 -1
nixos/tests/containers-ip.nix
··· 17 17 maintainers = with lib.maintainers; [ aristid aszlig eelco kampfschlaefer ]; 18 18 }; 19 19 20 - machine = 20 + nodes.machine = 21 21 { pkgs, ... }: { 22 22 imports = [ ../modules/installer/cd-dvd/channel.nix ]; 23 23 virtualisation = {
+1 -1
nixos/tests/containers-names.nix
··· 4 4 maintainers = with lib.maintainers; [ patryk27 ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 # We're using the newest kernel, so that we can test containers with long names. 9 9 # Please see https://github.com/NixOS/nixpkgs/issues/38509 for details. 10 10 boot.kernelPackages = pkgs.linuxPackages_latest;
+1 -1
nixos/tests/containers-nested.nix
··· 5 5 6 6 meta = with pkgs.lib.maintainers; { maintainers = [ sorki ]; }; 7 7 8 - machine = { lib, ... }: 8 + nodes.machine = { lib, ... }: 9 9 let 10 10 makeNested = subConf: { 11 11 containers.nested = {
+1 -1
nixos/tests/containers-portforward.nix
··· 11 11 maintainers = with lib.maintainers; [ aristid aszlig eelco kampfschlaefer ianwookim ]; 12 12 }; 13 13 14 - machine = 14 + nodes.machine = 15 15 { pkgs, ... }: 16 16 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 17 17 virtualisation.writableStore = true;
+1 -1
nixos/tests/containers-tmpfs.nix
··· 4 4 maintainers = with lib.maintainers; [ patryk27 ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { pkgs, ... }: 9 9 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 10 10 virtualisation.writableStore = true;
+1 -1
nixos/tests/custom-ca.nix
··· 76 76 77 77 enableOCR = true; 78 78 79 - machine = { pkgs, ... }: 79 + nodes.machine = { pkgs, ... }: 80 80 { imports = [ ./common/user-account.nix ./common/x11.nix ]; 81 81 82 82 # chromium-based browsers refuse to run as root
+1 -1
nixos/tests/disable-installer-tools.nix
··· 3 3 { 4 4 name = "disable-installer-tools"; 5 5 6 - machine = 6 + nodes.machine = 7 7 { pkgs, lib, ... }: 8 8 { 9 9 system.disableInstallerTools = true;
+1 -1
nixos/tests/dnsdist.nix
··· 5 5 maintainers = with maintainers; [ jojosch ]; 6 6 }; 7 7 8 - machine = { pkgs, lib, ... }: { 8 + nodes.machine = { pkgs, lib, ... }: { 9 9 services.bind = { 10 10 enable = true; 11 11 extraOptions = "empty-zones-enable no;";
+1 -1
nixos/tests/doas.nix
··· 6 6 maintainers = [ cole-h ]; 7 7 }; 8 8 9 - machine = 9 + nodes.machine = 10 10 { ... }: 11 11 { 12 12 users.groups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; };
+1 -1
nixos/tests/documize.nix
··· 4 4 maintainers = [ ma27 ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 environment.systemPackages = [ pkgs.jq ]; 9 9 10 10 services.documize = {
+1 -1
nixos/tests/domination.nix
··· 4 4 maintainers = [ fgaz ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 imports = [ 9 9 ./common/x11.nix 10 10 ];
+1 -1
nixos/tests/dovecot.nix
··· 1 1 import ./make-test-python.nix { 2 2 name = "dovecot"; 3 3 4 - machine = { pkgs, ... }: { 4 + nodes.machine = { pkgs, ... }: { 5 5 imports = [ common/user-account.nix ]; 6 6 services.postfix.enable = true; 7 7 services.dovecot2 = {
+1 -1
nixos/tests/ecryptfs.nix
··· 2 2 { 3 3 name = "ecryptfs"; 4 4 5 - machine = { pkgs, ... }: { 5 + nodes.machine = { pkgs, ... }: { 6 6 imports = [ ./common/user-account.nix ]; 7 7 boot.kernelModules = [ "ecryptfs" ]; 8 8 security.pam.enableEcryptfs = true;
+1 -1
nixos/tests/emacs-daemon.nix
··· 6 6 7 7 enableOCR = true; 8 8 9 - machine = 9 + nodes.machine = 10 10 { ... }: 11 11 12 12 { imports = [ ./common/x11.nix ];
+1 -1
nixos/tests/enlightenment.nix
··· 6 6 maintainers = [ romildo ]; 7 7 }; 8 8 9 - machine = { ... }: 9 + nodes.machine = { ... }: 10 10 { 11 11 imports = [ ./common/user-account.nix ]; 12 12 services.xserver.enable = true;
+1 -1
nixos/tests/env.nix
··· 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: 7 + nodes.machine = { pkgs, ... }: 8 8 { 9 9 boot.kernelPackages = pkgs.linuxPackages; 10 10 environment.etc.plainFile.text = ''
+1 -1
nixos/tests/etebase-server.nix
··· 9 9 maintainers = [ felschr ]; 10 10 }; 11 11 12 - machine = { pkgs, ... }: 12 + nodes.machine = { pkgs, ... }: 13 13 { 14 14 services.etebase-server = { 15 15 inherit dataDir;
+1 -1
nixos/tests/etesync-dav.nix
··· 5 5 maintainers = [ _3699n ]; 6 6 }; 7 7 8 - machine = { config, pkgs, ... }: { 8 + nodes.machine = { config, pkgs, ... }: { 9 9 environment.systemPackages = [ pkgs.curl pkgs.etesync-dav ]; 10 10 }; 11 11
+1 -1
nixos/tests/fancontrol.nix
··· 4 4 maintainers = [ evils ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 hardware.fancontrol.enable = true; 10 10 hardware.fancontrol.config = ''
+1 -1
nixos/tests/fcitx/default.nix
··· 5 5 # copy_from_host works only for store paths 6 6 rec { 7 7 name = "fcitx"; 8 - machine = 8 + nodes.machine = 9 9 { 10 10 pkgs, 11 11 ...
+1 -1
nixos/tests/firefox.nix
··· 4 4 maintainers = [ eelco shlevy ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { pkgs, ... }: 9 9 10 10 { imports = [ ./common/x11.nix ];
+1 -1
nixos/tests/fish.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "fish"; 3 3 4 - machine = 4 + nodes.machine = 5 5 { pkgs, ... }: 6 6 7 7 {
+1 -1
nixos/tests/fluentd.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, lib, ... }: { 2 2 name = "fluentd"; 3 3 4 - machine = { pkgs, ... }: { 4 + nodes.machine = { pkgs, ... }: { 5 5 services.fluentd = { 6 6 enable = true; 7 7 config = ''
+1 -1
nixos/tests/fontconfig-default-fonts.nix
··· 6 6 jtojnar 7 7 ]; 8 8 9 - machine = { config, pkgs, ... }: { 9 + nodes.machine = { config, pkgs, ... }: { 10 10 fonts.enableDefaultFonts = true; # Background fonts 11 11 fonts.fonts = with pkgs; [ 12 12 noto-fonts-emoji
+1 -1
nixos/tests/fsck.nix
··· 1 1 import ./make-test-python.nix { 2 2 name = "fsck"; 3 3 4 - machine = { lib, ... }: { 4 + nodes.machine = { lib, ... }: { 5 5 virtualisation.emptyDiskImages = [ 1 ]; 6 6 7 7 virtualisation.fileSystems = {
+1 -1
nixos/tests/ft2-clone.nix
··· 4 4 maintainers = [ fgaz ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 imports = [ 9 9 ./common/x11.nix 10 10 ];
+1 -1
nixos/tests/geth.nix
··· 4 4 maintainers = with maintainers; [bachp ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 services.geth."mainnet" = { 9 9 enable = true; 10 10 http = {
+1 -1
nixos/tests/gnome-xorg.nix
··· 4 4 maintainers = teams.gnome.members; 5 5 }; 6 6 7 - machine = { nodes, ... }: let 7 + nodes.machine = { nodes, ... }: let 8 8 user = nodes.machine.config.users.users.alice; 9 9 in 10 10
+1 -1
nixos/tests/gnome.nix
··· 4 4 maintainers = teams.gnome.members; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { ... }: 9 9 10 10 { imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/gotify-server.nix
··· 4 4 maintainers = [ ma27 ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 environment.systemPackages = [ pkgs.jq ]; 9 9 10 10 services.gotify = {
+1 -1
nixos/tests/graylog.nix
··· 2 2 name = "graylog"; 3 3 meta.maintainers = with lib.maintainers; [ ]; 4 4 5 - machine = { pkgs, ... }: { 5 + nodes.machine = { pkgs, ... }: { 6 6 virtualisation.memorySize = 4096; 7 7 virtualisation.diskSize = 4096; 8 8
+1 -1
nixos/tests/grocy.nix
··· 4 4 maintainers = [ ma27 ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 services.grocy = { 9 9 enable = true; 10 10 hostName = "localhost";
+1 -1
nixos/tests/grub.nix
··· 5 5 maintainers = [ rnhmjoj ]; 6 6 }; 7 7 8 - machine = { ... }: { 8 + nodes.machine = { ... }: { 9 9 virtualisation.useBootLoader = true; 10 10 11 11 boot.loader.timeout = null;
+1 -1
nixos/tests/hardened.nix
··· 4 4 maintainers = [ joachifm ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { lib, pkgs, config, ... }: 9 9 with lib; 10 10 { users.users.alice = { isNormalUser = true; extraGroups = [ "proc" ]; };
+1 -1
nixos/tests/herbstluftwm.nix
··· 5 5 maintainers = with lib.maintainers; [ thibautmarty ]; 6 6 }; 7 7 8 - machine = { pkgs, lib, ... }: { 8 + nodes.machine = { pkgs, lib, ... }: { 9 9 imports = [ ./common/x11.nix ./common/user-account.nix ]; 10 10 test-support.displayManager.auto.user = "alice"; 11 11 services.xserver.displayManager.defaultSession = lib.mkForce "none+herbstluftwm";
+1 -1
nixos/tests/hibernate.nix
··· 39 39 40 40 nodes = { 41 41 # System configuration used for installing the installedConfig from above. 42 - machine = { config, lib, pkgs, ... }: with lib; { 42 + nodes.machine = { config, lib, pkgs, ... }: with lib; { 43 43 imports = [ 44 44 ../modules/profiles/installation-device.nix 45 45 ../modules/profiles/base.nix
+1 -1
nixos/tests/hitch/default.nix
··· 4 4 meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ jflanglois ]; 6 6 }; 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 environment.systemPackages = [ pkgs.curl ]; 9 9 services.hitch = { 10 10 enable = true;
+1 -1
nixos/tests/hocker-fetchdocker/default.nix
··· 5 5 broken = true; # tries to download from registry-1.docker.io - how did this ever work? 6 6 }; 7 7 8 - machine = import ./machine.nix; 8 + nodes.machine = import ./machine.nix; 9 9 10 10 testScript = '' 11 11 start_all()
+1 -1
nixos/tests/hockeypuck.nix
··· 24 24 name = "hockeypuck"; 25 25 meta.maintainers = with lib.maintainers; [ etu ]; 26 26 27 - machine = { ... }: { 27 + nodes.machine = { ... }: { 28 28 # Used for test 29 29 environment.systemPackages = [ pkgs.gnupg ]; 30 30
+1 -1
nixos/tests/hostname.nix
··· 20 20 maintainers = [ primeos blitz ]; 21 21 }; 22 22 23 - machine = { lib, ... }: { 23 + nodes.machine = { lib, ... }: { 24 24 networking.hostName = hostName; 25 25 networking.domain = domain; 26 26
+1 -1
nixos/tests/hound.nix
··· 4 4 meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ grahamc ]; 6 6 }; 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 services.hound = { 9 9 enable = true; 10 10 config = ''
+1 -1
nixos/tests/hydra/default.nix
··· 20 20 maintainers = [ lewo ma27 ]; 21 21 }; 22 22 23 - machine = { pkgs, lib, ... }: { 23 + nodes.machine = { pkgs, lib, ... }: { 24 24 imports = [ baseConfig ]; 25 25 services.hydra = { inherit package; }; 26 26 };
+1 -1
nixos/tests/i3wm.nix
··· 4 4 maintainers = [ aszlig ]; 5 5 }; 6 6 7 - machine = { lib, ... }: { 7 + nodes.machine = { lib, ... }: { 8 8 imports = [ ./common/x11.nix ./common/user-account.nix ]; 9 9 test-support.displayManager.auto.user = "alice"; 10 10 services.xserver.displayManager.defaultSession = lib.mkForce "none+i3";
+1 -1
nixos/tests/ihatemoney/default.nix
··· 7 7 inherit (import ../../lib/testing-python.nix { inherit system pkgs; }) makeTest; 8 8 f = backend: makeTest { 9 9 name = "ihatemoney-${backend}"; 10 - machine = { nodes, lib, ... }: { 10 + nodes.machine = { nodes, lib, ... }: { 11 11 services.ihatemoney = { 12 12 enable = true; 13 13 enablePublicProjectCreation = true;
+1 -1
nixos/tests/incron.nix
··· 4 4 name = "incron"; 5 5 meta.maintainers = [ lib.maintainers.aanderse ]; 6 6 7 - machine = 7 + nodes.machine = 8 8 { ... }: 9 9 { services.incron.enable = true; 10 10 services.incron.extraPackages = [ pkgs.coreutils ];
+1 -1
nixos/tests/initrd-network.nix
··· 3 3 4 4 meta.maintainers = [ pkgs.lib.maintainers.eelco ]; 5 5 6 - machine = { ... }: { 6 + nodes.machine = { ... }: { 7 7 imports = [ ../modules/profiles/minimal.nix ]; 8 8 boot.initrd.network.enable = true; 9 9 boot.initrd.network.postCommands =
+1 -1
nixos/tests/initrd-secrets.nix
··· 11 11 12 12 meta.maintainers = [ lib.maintainers.lheckemann ]; 13 13 14 - machine = { ... }: { 14 + nodes.machine = { ... }: { 15 15 virtualisation.useBootLoader = true; 16 16 boot.initrd.secrets = { 17 17 "/test" = secretInStore;
+1 -1
nixos/tests/input-remapper.nix
··· 6 6 maintainers = with pkgs.lib.maintainers; [ LunNova ]; 7 7 }; 8 8 9 - machine = { config, ... }: 9 + nodes.machine = { config, ... }: 10 10 let user = config.users.users.sybil; in 11 11 { 12 12 imports = [
+1 -1
nixos/tests/installed-tests/default.nix
··· 43 43 maintainers = tested.meta.maintainers; 44 44 }; 45 45 46 - machine = { ... }: { 46 + nodes.machine = { ... }: { 47 47 imports = [ 48 48 testConfig 49 49 ] ++ optional withX11 ../common/x11.nix;
+1 -1
nixos/tests/invidious.nix
··· 5 5 maintainers = [ sbruder ]; 6 6 }; 7 7 8 - machine = { config, lib, pkgs, ... }: { 8 + nodes.machine = { config, lib, pkgs, ... }: { 9 9 services.invidious = { 10 10 enable = true; 11 11 };
+1 -1
nixos/tests/isso.nix
··· 4 4 maintainers = [ asbachb ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 services.isso = { 9 9 enable = true; 10 10 settings = {
+1 -1
nixos/tests/jellyfin.nix
··· 4 4 name = "jellyfin"; 5 5 meta.maintainers = with lib.maintainers; [ minijackson ]; 6 6 7 - machine = 7 + nodes.machine = 8 8 { ... }: 9 9 { 10 10 services.jellyfin.enable = true;
+1 -1
nixos/tests/jibri.nix
··· 4 4 maintainers = teams.jitsi.members; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 virtualisation.memorySize = 5120; 9 9 10 10 services.jitsi-meet = {
+1 -1
nixos/tests/k3s-single-node-docker.nix
··· 38 38 maintainers = [ euank ]; 39 39 }; 40 40 41 - machine = { pkgs, ... }: { 41 + nodes.machine = { pkgs, ... }: { 42 42 environment.systemPackages = with pkgs; [ k3s gzip ]; 43 43 44 44 # k3s uses enough resources the default vm fails.
+1 -1
nixos/tests/k3s-single-node.nix
··· 38 38 maintainers = [ euank ]; 39 39 }; 40 40 41 - machine = { pkgs, ... }: { 41 + nodes.machine = { pkgs, ... }: { 42 42 environment.systemPackages = with pkgs; [ k3s gzip ]; 43 43 44 44 # k3s uses enough resources the default vm fails.
+1 -1
nixos/tests/kbd-setfont-decompress.nix
··· 4 4 5 5 meta.maintainers = with lib.maintainers; [ oxalica ]; 6 6 7 - machine = { ... }: {}; 7 + nodes.machine = { ... }: {}; 8 8 9 9 testScript = '' 10 10 machine.succeed("gzip -cd ${pkgs.terminus_font}/share/consolefonts/ter-v16b.psf.gz >font.psf")
+1 -1
nixos/tests/kbd-update-search-paths-patch.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "kbd-update-search-paths-patch"; 3 3 4 - machine = { pkgs, options, ... }: { 4 + nodes.machine = { pkgs, options, ... }: { 5 5 console = { 6 6 packages = options.console.packages.default ++ [ pkgs.terminus_font ]; 7 7 };
+1 -1
nixos/tests/keepassxc.nix
··· 6 6 maintainers = [ turion ]; 7 7 }; 8 8 9 - machine = { ... }: 9 + nodes.machine = { ... }: 10 10 11 11 { 12 12 imports = [
+1 -1
nixos/tests/kerberos/heimdal.nix
··· 1 1 import ../make-test-python.nix ({pkgs, ...}: { 2 2 name = "kerberos_server-heimdal"; 3 - machine = { config, libs, pkgs, ...}: 3 + nodes.machine = { config, libs, pkgs, ...}: 4 4 { services.kerberos_server = 5 5 { enable = true; 6 6 realms = {
+1 -1
nixos/tests/kerberos/mit.nix
··· 1 1 import ../make-test-python.nix ({pkgs, ...}: { 2 2 name = "kerberos_server-mit"; 3 - machine = { config, libs, pkgs, ...}: 3 + nodes.machine = { config, libs, pkgs, ...}: 4 4 { services.kerberos_server = 5 5 { enable = true; 6 6 realms = {
+1 -1
nixos/tests/kernel-generic.nix
··· 12 12 maintainers = [ nequissimus atemu ]; 13 13 }; 14 14 15 - machine = { ... }: 15 + nodes.machine = { ... }: 16 16 { 17 17 boot.kernelPackages = linuxPackages; 18 18 };
+1 -1
nixos/tests/kernel-latest-ath-user-regd.nix
··· 4 4 maintainers = [ veehaitch ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: 7 + nodes.machine = { pkgs, ... }: 8 8 { 9 9 boot.kernelPackages = pkgs.linuxPackages_latest; 10 10 networking.wireless.athUserRegulatoryDomain = true;
+1 -1
nixos/tests/kexec.nix
··· 6 6 maintainers = [ eelco ]; 7 7 }; 8 8 9 - machine = { ... }: 9 + nodes.machine = { ... }: 10 10 { virtualisation.vlans = [ ]; }; 11 11 12 12 testScript =
+1 -1
nixos/tests/krb5/deprecated-config.nix
··· 7 7 maintainers = [ eqyiel ]; 8 8 }; 9 9 10 - machine = 10 + nodes.machine = 11 11 { ... }: { 12 12 krb5 = { 13 13 enable = true;
+1 -1
nixos/tests/krb5/example-config.nix
··· 7 7 maintainers = [ eqyiel ]; 8 8 }; 9 9 10 - machine = 10 + nodes.machine = 11 11 { pkgs, ... }: { 12 12 krb5 = { 13 13 enable = true;
+1 -1
nixos/tests/ksm.nix
··· 6 6 maintainers = [ rnhmjoj ]; 7 7 }; 8 8 9 - machine = { ... }: { 9 + nodes.machine = { ... }: { 10 10 imports = [ ../modules/profiles/minimal.nix ]; 11 11 12 12 hardware.ksm.enable = true;
+1 -1
nixos/tests/libinput.nix
··· 3 3 { 4 4 name = "libinput"; 5 5 6 - machine = { ... }: 6 + nodes.machine = { ... }: 7 7 { 8 8 imports = [ 9 9 ./common/x11.nix
+1 -1
nixos/tests/libresprite.nix
··· 4 4 maintainers = [ fgaz ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 imports = [ 9 9 ./common/x11.nix 10 10 ];
+1 -1
nixos/tests/lightdm.nix
··· 4 4 maintainers = [ aszlig ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 imports = [ ./common/user-account.nix ]; 9 9 services.xserver.enable = true; 10 10 services.xserver.displayManager.lightdm.enable = true;
+1 -1
nixos/tests/limesurvey.nix
··· 2 2 name = "limesurvey"; 3 3 meta.maintainers = [ pkgs.lib.maintainers.aanderse ]; 4 4 5 - machine = { ... }: { 5 + nodes.machine = { ... }: { 6 6 services.limesurvey = { 7 7 enable = true; 8 8 virtualHost = {
+1 -1
nixos/tests/litestream.nix
··· 4 4 maintainers = [ jwygoda ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { pkgs, ... }: 9 9 { services.litestream = { 10 10 enable = true;
+1 -1
nixos/tests/login.nix
··· 6 6 maintainers = [ eelco ]; 7 7 }; 8 8 9 - machine = 9 + nodes.machine = 10 10 { pkgs, lib, ... }: 11 11 { boot.kernelPackages = lib.mkIf latestKernel pkgs.linuxPackages_latest; 12 12 sound.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
+1 -1
nixos/tests/logrotate.nix
··· 7 7 }; 8 8 9 9 # default machine 10 - machine = { ... }: { 10 + nodes.machine = { ... }: { 11 11 }; 12 12 13 13 testScript =
+1 -1
nixos/tests/loki.nix
··· 7 7 maintainers = [ willibutz ]; 8 8 }; 9 9 10 - machine = { ... }: { 10 + nodes.machine = { ... }: { 11 11 services.loki = { 12 12 enable = true; 13 13 configFile = "${pkgs.grafana-loki.src}/cmd/loki/loki-local-config.yaml";
+1 -1
nixos/tests/lorri/default.nix
··· 1 1 import ../make-test-python.nix { 2 - machine = { pkgs, ... }: { 2 + nodes.machine = { pkgs, ... }: { 3 3 imports = [ ../../modules/profiles/minimal.nix ]; 4 4 environment.systemPackages = [ pkgs.lorri ]; 5 5 };
+1 -1
nixos/tests/lxd-image-server.nix
··· 51 51 maintainers = [ mkg20001 ]; 52 52 }; 53 53 54 - machine = { lib, ... }: { 54 + nodes.machine = { lib, ... }: { 55 55 virtualisation = { 56 56 cores = 2; 57 57
+1 -1
nixos/tests/lxd-image.nix
··· 44 44 maintainers = [ mkg20001 ]; 45 45 }; 46 46 47 - machine = { lib, ... }: { 47 + nodes.machine = { lib, ... }: { 48 48 virtualisation = { 49 49 # disk full otherwise 50 50 diskSize = 2048;
+1 -1
nixos/tests/lxd-nftables.nix
··· 12 12 maintainers = [ patryk27 ]; 13 13 }; 14 14 15 - machine = { lib, ... }: { 15 + nodes.machine = { lib, ... }: { 16 16 virtualisation = { 17 17 lxd.enable = true; 18 18 };
+1 -1
nixos/tests/lxd.nix
··· 51 51 maintainers = [ patryk27 ]; 52 52 }; 53 53 54 - machine = { lib, ... }: { 54 + nodes.machine = { lib, ... }: { 55 55 virtualisation = { 56 56 # Since we're testing `limits.cpu`, we've gotta have a known number of 57 57 # cores to lean on
+1 -1
nixos/tests/magnetico.nix
··· 9 9 maintainers = [ rnhmjoj ]; 10 10 }; 11 11 12 - machine = { ... }: { 12 + nodes.machine = { ... }: { 13 13 imports = [ ../modules/profiles/minimal.nix ]; 14 14 15 15 networking.firewall.allowedTCPPorts = [ 9000 ];
+1 -1
nixos/tests/mailcatcher.nix
··· 4 4 name = "mailcatcher"; 5 5 meta.maintainers = [ lib.maintainers.aanderse ]; 6 6 7 - machine = 7 + nodes.machine = 8 8 { pkgs, ... }: 9 9 { 10 10 services.mailcatcher.enable = true;
+1 -1
nixos/tests/mailhog.nix
··· 2 2 name = "mailhog"; 3 3 meta.maintainers = with lib.maintainers; [ jojosch ]; 4 4 5 - machine = { pkgs, ... }: { 5 + nodes.machine = { pkgs, ... }: { 6 6 services.mailhog.enable = true; 7 7 8 8 environment.systemPackages = with pkgs; [ swaks ];
+1 -1
nixos/tests/matomo.nix
··· 7 7 let 8 8 matomoTest = package: 9 9 makeTest { 10 - machine = { config, pkgs, ... }: { 10 + nodes.machine = { config, pkgs, ... }: { 11 11 services.matomo = { 12 12 package = package; 13 13 enable = true;
+1 -1
nixos/tests/matrix/pantalaimon.nix
··· 36 36 maintainers = teams.matrix.members; 37 37 }; 38 38 39 - machine = { pkgs, ... }: { 39 + nodes.machine = { pkgs, ... }: { 40 40 services.pantalaimon-headless.instances.${pantalaimonInstanceName} = { 41 41 homeserver = "https://localhost:8448"; 42 42 listenAddress = "0.0.0.0";
+1 -1
nixos/tests/mediawiki.nix
··· 2 2 name = "mediawiki"; 3 3 meta.maintainers = [ lib.maintainers.aanderse ]; 4 4 5 - machine = 5 + nodes.machine = 6 6 { ... }: 7 7 { services.mediawiki.enable = true; 8 8 services.mediawiki.virtualHost.hostName = "localhost";
+1 -1
nixos/tests/meilisearch.nix
··· 12 12 name = "meilisearch"; 13 13 meta.maintainers = with lib.maintainers; [ Br1ght0ne ]; 14 14 15 - machine = { ... }: { 15 + nodes.machine = { ... }: { 16 16 environment.systemPackages = with pkgs; [ curl jq ]; 17 17 services.meilisearch = { 18 18 enable = true;
+1 -1
nixos/tests/memcached.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "memcached"; 3 3 4 - machine = { 4 + nodes.machine = { 5 5 imports = [ ../modules/profiles/minimal.nix ]; 6 6 services.memcached.enable = true; 7 7 };
+1 -1
nixos/tests/misc.nix
··· 8 8 maintainers = [ eelco ]; 9 9 }; 10 10 11 - machine = 11 + nodes.machine = 12 12 { lib, ... }: 13 13 with lib; 14 14 { swapDevices = mkOverride 0
+1 -1
nixos/tests/mod_perl.nix
··· 5 5 maintainers = [ sgo ]; 6 6 }; 7 7 8 - machine = { config, lib, pkgs, ... }: { 8 + nodes.machine = { config, lib, pkgs, ... }: { 9 9 services.httpd = { 10 10 enable = true; 11 11 adminAddr = "admin@localhost";
+1 -1
nixos/tests/moodle.nix
··· 2 2 name = "moodle"; 3 3 meta.maintainers = [ lib.maintainers.aanderse ]; 4 4 5 - machine = 5 + nodes.machine = 6 6 { ... }: 7 7 { services.moodle.enable = true; 8 8 services.moodle.virtualHost.hostName = "localhost";
+1 -1
nixos/tests/musescore.nix
··· 17 17 maintainers = [ turion ]; 18 18 }; 19 19 20 - machine = { ... }: 20 + nodes.machine = { ... }: 21 21 22 22 { 23 23 imports = [
+1 -1
nixos/tests/mysql/mysql-autobackup.nix
··· 17 17 name = "${name}-automysqlbackup"; 18 18 meta.maintainers = [ lib.maintainers.aanderse ]; 19 19 20 - machine = { 20 + nodes.machine = { 21 21 services.mysql = { 22 22 inherit package; 23 23 enable = true;
+1 -1
nixos/tests/nagios.nix
··· 5 5 maintainers = [ symphorien ]; 6 6 }; 7 7 8 - machine = { lib, ... }: let 8 + nodes.machine = { lib, ... }: let 9 9 writer = pkgs.writeShellScript "write" '' 10 10 set -x 11 11 echo "$@" >> /tmp/notifications
+1 -1
nixos/tests/navidrome.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "navidrome"; 3 3 4 - machine = { ... }: { 4 + nodes.machine = { ... }: { 5 5 services.navidrome.enable = true; 6 6 }; 7 7
+4 -4
nixos/tests/networking.nix
··· 640 640 }; 641 641 virtual = { 642 642 name = "Virtual"; 643 - machine = { 643 + nodes.machine = { 644 644 networking.useNetworkd = networkd; 645 645 networking.useDHCP = false; 646 646 networking.interfaces.tap0 = { ··· 784 784 }; 785 785 routes = { 786 786 name = "routes"; 787 - machine = { 787 + nodes.machine = { 788 788 networking.useNetworkd = networkd; 789 789 networking.useDHCP = false; 790 790 networking.interfaces.eth0 = { ··· 865 865 }; 866 866 rename = { 867 867 name = "RenameInterface"; 868 - machine = { pkgs, ... }: { 868 + nodes.machine = { pkgs, ... }: { 869 869 virtualisation.vlans = [ 1 ]; 870 870 networking = { 871 871 useNetworkd = networkd; ··· 916 916 testMac = "06:00:00:00:02:00"; 917 917 in { 918 918 name = "WlanInterface"; 919 - machine = { pkgs, ... }: { 919 + nodes.machine = { pkgs, ... }: { 920 920 boot.kernelModules = [ "mac80211_hwsim" ]; 921 921 networking.wlanInterfaces = { 922 922 wlan0 = { device = "wlan0"; };
+1 -1
nixos/tests/nginx-modsecurity.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, lib, ... }: { 2 2 name = "nginx-modsecurity"; 3 3 4 - machine = { config, lib, pkgs, ... }: { 4 + nodes.machine = { config, lib, pkgs, ... }: { 5 5 services.nginx = { 6 6 enable = true; 7 7 additionalModules = [ pkgs.nginxModules.modsecurity-nginx ];
+1 -1
nixos/tests/nginx-pubhtml.nix
··· 1 1 import ./make-test-python.nix { 2 2 name = "nginx-pubhtml"; 3 3 4 - machine = { pkgs, ... }: { 4 + nodes.machine = { pkgs, ... }: { 5 5 systemd.services.nginx.serviceConfig.ProtectHome = "read-only"; 6 6 services.nginx.enable = true; 7 7 services.nginx.virtualHosts.localhost = {
+1 -1
nixos/tests/nginx-sandbox.nix
··· 6 6 7 7 # This test checks the creation and reading of a file in sandbox mode. Used simple lua script. 8 8 9 - machine = { pkgs, ... }: { 9 + nodes.machine = { pkgs, ... }: { 10 10 nixpkgs.overlays = [ 11 11 (self: super: { 12 12 nginx-lua = super.nginx.override {
+1 -1
nixos/tests/nginx-sso.nix
··· 4 4 maintainers = with pkgs.lib.maintainers; [ delroth ]; 5 5 }; 6 6 7 - machine = { 7 + nodes.machine = { 8 8 services.nginx.sso = { 9 9 enable = true; 10 10 configuration = {
+1 -1
nixos/tests/nginx-variants.nix
··· 13 13 value = makeTest { 14 14 name = "nginx-variant-${nginxName}"; 15 15 16 - machine = { pkgs, ... }: { 16 + nodes.machine = { pkgs, ... }: { 17 17 services.nginx = { 18 18 enable = true; 19 19 virtualHosts.localhost.locations."/".return = "200 'foo'";
+1 -1
nixos/tests/nix-serve.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: 2 2 { 3 3 name = "nix-serve"; 4 - machine = { pkgs, ... }: { 4 + nodes.machine = { pkgs, ... }: { 5 5 services.nix-serve.enable = true; 6 6 environment.systemPackages = [ 7 7 pkgs.hello
+1 -1
nixos/tests/nixos-generate-config.nix
··· 1 1 import ./make-test-python.nix ({ lib, ... } : { 2 2 name = "nixos-generate-config"; 3 3 meta.maintainers = with lib.maintainers; [ basvandijk ]; 4 - machine = { 4 + nodes.machine = { 5 5 system.nixos-generate-config.configuration = '' 6 6 # OVERRIDDEN 7 7 { config, pkgs, ... }: {
+1 -1
nixos/tests/noto-fonts.nix
··· 4 4 maintainers = with lib.maintainers; [ nickcao midchildan ]; 5 5 }; 6 6 7 - machine = { 7 + nodes.machine = { 8 8 imports = [ ./common/x11.nix ]; 9 9 environment.systemPackages = [ pkgs.gnome.gedit ]; 10 10 fonts = {
+1 -1
nixos/tests/novacomd.nix
··· 4 4 maintainers = [ dtzWill ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 services.novacomd.enable = true; 9 9 }; 10 10
+1 -1
nixos/tests/oh-my-zsh.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "oh-my-zsh"; 3 3 4 - machine = { pkgs, ... }: 4 + nodes.machine = { pkgs, ... }: 5 5 6 6 { 7 7 programs.zsh = {
+3 -3
nixos/tests/openldap.nix
··· 25 25 inherit testScript; 26 26 name = "openldap"; 27 27 28 - machine = { pkgs, ... }: { 28 + nodes.machine = { pkgs, ... }: { 29 29 environment.etc."openldap/root_password".text = "notapassword"; 30 30 services.openldap = { 31 31 enable = true; ··· 65 65 inherit testScript; 66 66 name = "openldap"; 67 67 68 - machine = { pkgs, ... }: { 68 + nodes.machine = { pkgs, ... }: { 69 69 services.openldap = { 70 70 enable = true; 71 71 logLevel = "stats acl"; ··· 83 83 manualConfigDir = import ./make-test-python.nix ({ pkgs, ... }: { 84 84 name = "openldap"; 85 85 86 - machine = { pkgs, ... }: { 86 + nodes.machine = { pkgs, ... }: { 87 87 services.openldap = { 88 88 enable = true; 89 89 configDir = "/var/db/slapd.d";
+1 -1
nixos/tests/opentabletdriver.nix
··· 6 6 maintainers = with pkgs.lib.maintainers; [ thiagokokada ]; 7 7 }; 8 8 9 - machine = { pkgs, ... }: 9 + nodes.machine = { pkgs, ... }: 10 10 { 11 11 imports = [ 12 12 ./common/user-account.nix
+1 -1
nixos/tests/os-prober.nix
··· 65 65 in { 66 66 name = "os-prober"; 67 67 68 - machine = { config, pkgs, ... }: (simpleConfig // { 68 + nodes.machine = { config, pkgs, ... }: (simpleConfig // { 69 69 imports = [ ../modules/profiles/installation-device.nix 70 70 ../modules/profiles/base.nix ]; 71 71 virtualisation.memorySize = 1300;
+1 -1
nixos/tests/osrm-backend.nix
··· 5 5 name = "osrm-backend"; 6 6 meta.maintainers = [ lib.maintainers.erictapen ]; 7 7 8 - machine = { config, pkgs, ... }:{ 8 + nodes.machine = { config, pkgs, ... }:{ 9 9 10 10 services.osrm = { 11 11 enable = true;
+1 -1
nixos/tests/overlayfs.nix
··· 2 2 name = "overlayfs"; 3 3 meta.maintainers = with pkgs.lib.maintainers; [ bachp ]; 4 4 5 - machine = { pkgs, ... }: { 5 + nodes.machine = { pkgs, ... }: { 6 6 virtualisation.emptyDiskImages = [ 512 ]; 7 7 networking.hostId = "deadbeef"; 8 8 environment.systemPackages = with pkgs; [ parted ];
+1 -1
nixos/tests/packagekit.nix
··· 4 4 maintainers = [ peterhoeg ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 environment.systemPackages = with pkgs; [ dbus ]; 9 9 services.packagekit = { 10 10 enable = true;
+1 -1
nixos/tests/pam/pam-oath-login.nix
··· 21 21 { 22 22 name = "pam-oath-login"; 23 23 24 - machine = 24 + nodes.machine = 25 25 { ... }: 26 26 { 27 27 security.pam.oath = {
+1 -1
nixos/tests/pam/pam-u2f.nix
··· 3 3 { 4 4 name = "pam-u2f"; 5 5 6 - machine = 6 + nodes.machine = 7 7 { ... }: 8 8 { 9 9 security.pam.u2f = {
+1 -1
nixos/tests/pantheon.nix
··· 7 7 maintainers = teams.pantheon.members; 8 8 }; 9 9 10 - machine = { ... }: 10 + nodes.machine = { ... }: 11 11 12 12 { 13 13 imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/php/fpm.nix
··· 2 2 name = "php-${php.version}-fpm-nginx-test"; 3 3 meta.maintainers = lib.teams.php.members; 4 4 5 - machine = { config, lib, pkgs, ... }: { 5 + nodes.machine = { config, lib, pkgs, ... }: { 6 6 environment.systemPackages = [ php ]; 7 7 8 8 services.nginx = {
+1 -1
nixos/tests/php/httpd.nix
··· 2 2 name = "php-${php.version}-httpd-test"; 3 3 meta.maintainers = lib.teams.php.members; 4 4 5 - machine = { config, lib, pkgs, ... }: { 5 + nodes.machine = { config, lib, pkgs, ... }: { 6 6 services.httpd = { 7 7 enable = true; 8 8 adminAddr = "admin@phpfpm";
+1 -1
nixos/tests/php/pcre.nix
··· 5 5 name = "php-${php.version}-httpd-pcre-jit-test"; 6 6 meta.maintainers = lib.teams.php.members; 7 7 8 - machine = { lib, pkgs, ... }: { 8 + nodes.machine = { lib, pkgs, ... }: { 9 9 time.timeZone = "UTC"; 10 10 services.httpd = { 11 11 enable = true;
+1 -1
nixos/tests/pict-rs.nix
··· 3 3 name = "pict-rs"; 4 4 meta.maintainers = with lib.maintainers; [ happysalada ]; 5 5 6 - machine = { ... }: { 6 + nodes.machine = { ... }: { 7 7 environment.systemPackages = with pkgs; [ curl jq ]; 8 8 services.pict-rs.enable = true; 9 9 };
+1 -1
nixos/tests/plasma5-systemd-start.nix
··· 6 6 maintainers = [ oxalica ]; 7 7 }; 8 8 9 - machine = { ... }: 9 + nodes.machine = { ... }: 10 10 11 11 { 12 12 imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/plasma5.nix
··· 6 6 maintainers = [ ttuegel ]; 7 7 }; 8 8 9 - machine = { ... }: 9 + nodes.machine = { ... }: 10 10 11 11 { 12 12 imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/plausible.nix
··· 4 4 maintainers = [ ma27 ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 virtualisation.memorySize = 4096; 9 9 services.plausible = { 10 10 enable = true;
+1 -1
nixos/tests/plikd.nix
··· 4 4 maintainers = [ freezeboy ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: let 7 + nodes.machine = { pkgs, ... }: let 8 8 in { 9 9 services.plikd.enable = true; 10 10 environment.systemPackages = [ pkgs.plik ];
+1 -1
nixos/tests/plotinus.nix
··· 4 4 maintainers = pkgs.plotinus.meta.maintainers; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { pkgs, ... }: 9 9 10 10 { imports = [ ./common/x11.nix ];
+1 -1
nixos/tests/postfix-raise-smtpd-tls-security-level.nix
··· 1 1 import ./make-test-python.nix { 2 2 name = "postfix"; 3 3 4 - machine = { pkgs, ... }: { 4 + nodes.machine = { pkgs, ... }: { 5 5 imports = [ common/user-account.nix ]; 6 6 services.postfix = { 7 7 enable = true;
+1 -1
nixos/tests/postfix.nix
··· 5 5 import ./make-test-python.nix { 6 6 name = "postfix"; 7 7 8 - machine = { pkgs, ... }: { 8 + nodes.machine = { pkgs, ... }: { 9 9 imports = [ common/user-account.nix ]; 10 10 services.postfix = { 11 11 enable = true;
+1 -1
nixos/tests/postgresql-wal-receiver.nix
··· 31 31 name = "postgresql-wal-receiver-${postgresqlPackage}"; 32 32 meta.maintainers = with lib.maintainers; [ pacien ]; 33 33 34 - machine = { ... }: { 34 + nodes.machine = { ... }: { 35 35 services.postgresql = { 36 36 package = pkg; 37 37 enable = true;
+1 -1
nixos/tests/postgresql.nix
··· 27 27 maintainers = [ zagy ]; 28 28 }; 29 29 30 - machine = {...}: 30 + nodes.machine = {...}: 31 31 { 32 32 services.postgresql = { 33 33 enable = true;
+1 -1
nixos/tests/power-profiles-daemon.nix
··· 5 5 meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ mvnetbiz ]; 7 7 }; 8 - machine = { pkgs, ... }: { 8 + nodes.machine = { pkgs, ... }: { 9 9 services.power-profiles-daemon.enable = true; 10 10 environment.systemPackages = [ pkgs.glib ]; 11 11 };
+1 -1
nixos/tests/predictable-interface-names.nix
··· 16 16 name = "${if predictable then "" else "un"}predictableInterfaceNames${if withNetworkd then "-with-networkd" else ""}"; 17 17 meta = {}; 18 18 19 - machine = { lib, ... }: { 19 + nodes.machine = { lib, ... }: { 20 20 networking.usePredictableInterfaceNames = lib.mkForce predictable; 21 21 networking.useNetworkd = withNetworkd; 22 22 networking.dhcpcd.enable = !withNetworkd;
+1 -1
nixos/tests/privacyidea.nix
··· 6 6 maintainers = [ fpletz ]; 7 7 }; 8 8 9 - machine = { ... }: { 9 + nodes.machine = { ... }: { 10 10 virtualisation.cores = 2; 11 11 12 12 services.privacyidea = {
+1 -1
nixos/tests/privoxy.nix
··· 33 33 maintainers = [ rnhmjoj ]; 34 34 }; 35 35 36 - machine = { ... }: { 36 + nodes.machine = { ... }: { 37 37 services.nginx.enable = true; 38 38 services.nginx.virtualHosts."example.com" = { 39 39 addSSL = true;
+1 -1
nixos/tests/pt2-clone.nix
··· 4 4 maintainers = [ fgaz ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 imports = [ 9 9 ./common/x11.nix 10 10 ];
+1 -1
nixos/tests/pulseaudio.nix
··· 27 27 maintainers = [ synthetica ] ++ pkgs.pulseaudio.meta.maintainers; 28 28 }; 29 29 30 - machine = { ... }: 30 + nodes.machine = { ... }: 31 31 32 32 { 33 33 imports = [ ./common/wayland-cage.nix ];
+1 -1
nixos/tests/qboot.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "qboot"; 3 3 4 - machine = { ... }: { 4 + nodes.machine = { ... }: { 5 5 virtualisation.bios = pkgs.qboot; 6 6 }; 7 7
+1 -1
nixos/tests/rabbitmq.nix
··· 6 6 maintainers = [ eelco offline ]; 7 7 }; 8 8 9 - machine = { 9 + nodes.machine = { 10 10 services.rabbitmq = { 11 11 enable = true; 12 12 managementPlugin.enable = true;
+1 -1
nixos/tests/radicale.nix
··· 11 11 name = "radicale3"; 12 12 meta.maintainers = with lib.maintainers; [ dotlambda ]; 13 13 14 - machine = { pkgs, ... }: { 14 + nodes.machine = { pkgs, ... }: { 15 15 services.radicale = { 16 16 enable = true; 17 17 settings = {
+1 -1
nixos/tests/rasdaemon.nix
··· 4 4 maintainers = [ evils ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 hardware.rasdaemon = { 10 10 enable = true;
+1 -1
nixos/tests/redmine.nix
··· 9 9 let 10 10 redmineTest = { name, type }: makeTest { 11 11 name = "redmine-${name}"; 12 - machine = { config, pkgs, ... }: { 12 + nodes.machine = { config, pkgs, ... }: { 13 13 services.redmine = { 14 14 enable = true; 15 15 package = pkgs.redmine;
+1 -1
nixos/tests/restart-by-activation-script.nix
··· 4 4 maintainers = [ das_j ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 10 10 systemd.services.restart-me = {
+1 -1
nixos/tests/retroarch.nix
··· 4 4 name = "retroarch"; 5 5 meta = with pkgs.lib.maintainers; { maintainers = [ j0hax ]; }; 6 6 7 - machine = { ... }: 7 + nodes.machine = { ... }: 8 8 9 9 { 10 10 imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/riak.nix
··· 4 4 maintainers = [ Br1ght0ne ]; 5 5 }; 6 6 7 - machine = { 7 + nodes.machine = { 8 8 services.riak.enable = true; 9 9 services.riak.package = pkgs.riak; 10 10 };
+5 -5
nixos/tests/rspamd.nix
··· 22 22 ''; 23 23 simple = name: enableIPv6: makeTest { 24 24 name = "rspamd-${name}"; 25 - machine = { 25 + nodes.machine = { 26 26 services.rspamd.enable = true; 27 27 networking.enableIPv6 = enableIPv6; 28 28 }; ··· 52 52 ipv4only = simple "ipv4only" false; 53 53 deprecated = makeTest { 54 54 name = "rspamd-deprecated"; 55 - machine = { 55 + nodes.machine = { 56 56 services.rspamd = { 57 57 enable = true; 58 58 workers.normal.bindSockets = [{ ··· 91 91 92 92 bindports = makeTest { 93 93 name = "rspamd-bindports"; 94 - machine = { 94 + nodes.machine = { 95 95 services.rspamd = { 96 96 enable = true; 97 97 workers.normal.bindSockets = [{ ··· 152 152 }; 153 153 customLuaRules = makeTest { 154 154 name = "rspamd-custom-lua-rules"; 155 - machine = { 155 + nodes.machine = { 156 156 environment.etc."tests/no-muh.eml".text = '' 157 157 From: Sheep1<bah@example.com> 158 158 To: Sheep2<mah@example.com> ··· 256 256 }; 257 257 postfixIntegration = makeTest { 258 258 name = "rspamd-postfix-integration"; 259 - machine = { 259 + nodes.machine = { 260 260 environment.systemPackages = with pkgs; [ msmtp ]; 261 261 environment.etc."tests/gtube.eml".text = '' 262 262 From: Sheep1<bah@example.com>
+2 -2
nixos/tests/rsyslogd.nix
··· 11 11 name = "rsyslogd-test1"; 12 12 meta.maintainers = [ pkgs.lib.maintainers.aanderse ]; 13 13 14 - machine = { config, pkgs, ... }: { 14 + nodes.machine = { config, pkgs, ... }: { 15 15 services.rsyslogd.enable = true; 16 16 services.journald.forwardToSyslog = false; 17 17 }; ··· 27 27 name = "rsyslogd-test2"; 28 28 meta.maintainers = [ pkgs.lib.maintainers.aanderse ]; 29 29 30 - machine = { config, pkgs, ... }: { 30 + nodes.machine = { config, pkgs, ... }: { 31 31 services.rsyslogd.enable = true; 32 32 }; 33 33
+1 -1
nixos/tests/sabnzbd.nix
··· 4 4 maintainers = with maintainers; [ jojosch ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 services.sabnzbd = { 9 9 enable = true; 10 10 };
+2 -2
nixos/tests/sddm.nix
··· 12 12 default = { 13 13 name = "sddm"; 14 14 15 - machine = { ... }: { 15 + nodes.machine = { ... }: { 16 16 imports = [ ./common/user-account.nix ]; 17 17 services.xserver.enable = true; 18 18 services.xserver.displayManager.sddm.enable = true; ··· 41 41 maintainers = [ ttuegel ]; 42 42 }; 43 43 44 - machine = { ... }: { 44 + nodes.machine = { ... }: { 45 45 imports = [ ./common/user-account.nix ]; 46 46 services.xserver.enable = true; 47 47 services.xserver.displayManager = {
+1 -1
nixos/tests/shattered-pixel-dungeon.nix
··· 4 4 maintainers = [ fgaz ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 imports = [ 9 9 ./common/x11.nix 10 10 ];
+1 -1
nixos/tests/shiori.nix
··· 4 4 name = "shiori"; 5 5 meta.maintainers = with lib.maintainers; [ minijackson ]; 6 6 7 - machine = 7 + nodes.machine = 8 8 { ... }: 9 9 { services.shiori.enable = true; }; 10 10
+1 -1
nixos/tests/signal-desktop.nix
··· 16 16 maintainers = [ flokli primeos ]; 17 17 }; 18 18 19 - machine = { ... }: 19 + nodes.machine = { ... }: 20 20 21 21 { 22 22 imports = [
+1 -1
nixos/tests/simple.nix
··· 4 4 maintainers = [ eelco ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 }; 10 10
+1 -1
nixos/tests/snapper.nix
··· 2 2 { 3 3 name = "snapper"; 4 4 5 - machine = { pkgs, lib, ... }: { 5 + nodes.machine = { pkgs, lib, ... }: { 6 6 boot.initrd.postDeviceCommands = '' 7 7 ${pkgs.btrfs-progs}/bin/mkfs.btrfs -f -L aux /dev/vdb 8 8 '';
+1 -1
nixos/tests/soapui.nix
··· 4 4 maintainers = [ asbachb ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 imports = [ 9 9 ./common/x11.nix 10 10 ];
+1 -1
nixos/tests/solr.nix
··· 4 4 name = "solr"; 5 5 meta.maintainers = [ pkgs.lib.maintainers.aanderse ]; 6 6 7 - machine = 7 + nodes.machine = 8 8 { config, pkgs, ... }: 9 9 { 10 10 # Ensure the virtual machine has enough memory for Solr to avoid the following error:
+1 -1
nixos/tests/sourcehut.nix
··· 119 119 120 120 meta.maintainers = [ pkgs.lib.maintainers.tomberek ]; 121 121 122 - machine = { config, pkgs, nodes, ... }: { 122 + nodes.machine = { config, pkgs, nodes, ... }: { 123 123 # buildsrht needs space 124 124 virtualisation.diskSize = 4 * 1024; 125 125 virtualisation.memorySize = 2 * 1024;
+1 -1
nixos/tests/sssd-ldap.nix
··· 13 13 maintainers = [ bbigras ]; 14 14 }; 15 15 16 - machine = { pkgs, ... }: { 16 + nodes.machine = { pkgs, ... }: { 17 17 services.openldap = { 18 18 enable = true; 19 19 settings = {
+1 -1
nixos/tests/sssd.nix
··· 5 5 meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ bbigras ]; 7 7 }; 8 - machine = { pkgs, ... }: { 8 + nodes.machine = { pkgs, ... }: { 9 9 services.sssd.enable = true; 10 10 }; 11 11
+1 -1
nixos/tests/starship.nix
··· 2 2 name = "starship"; 3 3 meta.maintainers = pkgs.starship.meta.maintainers; 4 4 5 - machine = { 5 + nodes.machine = { 6 6 programs = { 7 7 fish.enable = true; 8 8 zsh.enable = true;
+1 -1
nixos/tests/sway.nix
··· 4 4 maintainers = with lib.maintainers; [ primeos synthetica ]; 5 5 }; 6 6 7 - machine = { config, ... }: { 7 + nodes.machine = { config, ... }: { 8 8 # Automatically login on tty1 as a normal user: 9 9 imports = [ ./common/user-account.nix ]; 10 10 services.getty.autologinUser = "alice";
+1 -1
nixos/tests/sympa.nix
··· 2 2 name = "sympa"; 3 3 meta.maintainers = with lib.maintainers; [ mmilata ]; 4 4 5 - machine = 5 + nodes.machine = 6 6 { ... }: 7 7 { 8 8
+1 -1
nixos/tests/syncthing-init.nix
··· 6 6 name = "syncthing-init"; 7 7 meta.maintainers = with pkgs.lib.maintainers; [ lassulus ]; 8 8 9 - machine = { 9 + nodes.machine = { 10 10 services.syncthing = { 11 11 enable = true; 12 12 devices.testDevice = {
+1 -1
nixos/tests/syncthing-relay.nix
··· 2 2 name = "syncthing-relay"; 3 3 meta.maintainers = with pkgs.lib.maintainers; [ delroth ]; 4 4 5 - machine = { 5 + nodes.machine = { 6 6 environment.systemPackages = [ pkgs.jq ]; 7 7 services.syncthing.relay = { 8 8 enable = true;
+1 -1
nixos/tests/systemd-analyze.nix
··· 6 6 maintainers = [ raskin ]; 7 7 }; 8 8 9 - machine = 9 + nodes.machine = 10 10 { pkgs, lib, ... }: 11 11 { boot.kernelPackages = lib.mkIf latestKernel pkgs.linuxPackages_latest; 12 12 sound.enable = true; # needed for the factl test, /dev/snd/* exists without them but udev doesn't care then
+3 -3
nixos/tests/systemd-binfmt.nix
··· 31 31 in { 32 32 basic = makeTest { 33 33 name = "systemd-binfmt"; 34 - machine = { 34 + nodes.machine = { 35 35 boot.binfmt.emulatedSystems = [ 36 36 "armv7l-linux" 37 37 "aarch64-linux" ··· 56 56 57 57 preserveArgvZero = makeTest { 58 58 name = "systemd-binfmt-preserve-argv0"; 59 - machine = { 59 + nodes.machine = { 60 60 boot.binfmt.emulatedSystems = [ 61 61 "aarch64-linux" 62 62 ]; ··· 71 71 72 72 ldPreload = makeTest { 73 73 name = "systemd-binfmt-ld-preload"; 74 - machine = { 74 + nodes.machine = { 75 75 boot.binfmt.emulatedSystems = [ 76 76 "aarch64-linux" 77 77 ];
+9 -9
nixos/tests/systemd-boot.nix
··· 20 20 name = "systemd-boot"; 21 21 meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ]; 22 22 23 - machine = common; 23 + nodes.machine = common; 24 24 25 25 testScript = '' 26 26 machine.start() ··· 44 44 name = "systemd-boot-specialisation"; 45 45 meta.maintainers = with pkgs.lib.maintainers; [ lukegb ]; 46 46 47 - machine = { pkgs, lib, ... }: { 47 + nodes.machine = { pkgs, lib, ... }: { 48 48 imports = [ common ]; 49 49 specialisation.something.configuration = {}; 50 50 }; ··· 67 67 name = "systemd-boot-fallback"; 68 68 meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ]; 69 69 70 - machine = { pkgs, lib, ... }: { 70 + nodes.machine = { pkgs, lib, ... }: { 71 71 imports = [ common ]; 72 72 boot.loader.efi.canTouchEfiVariables = mkForce false; 73 73 }; ··· 93 93 name = "systemd-boot-update"; 94 94 meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ]; 95 95 96 - machine = common; 96 + nodes.machine = common; 97 97 98 98 testScript = '' 99 99 machine.succeed("mount -o remount,rw /boot") ··· 115 115 name = "systemd-boot-memtest86"; 116 116 meta.maintainers = with pkgs.lib.maintainers; [ Enzime ]; 117 117 118 - machine = { pkgs, lib, ... }: { 118 + nodes.machine = { pkgs, lib, ... }: { 119 119 imports = [ common ]; 120 120 boot.loader.systemd-boot.memtest86.enable = true; 121 121 nixpkgs.config.allowUnfreePredicate = pkg: builtins.elem (lib.getName pkg) [ ··· 133 133 name = "systemd-boot-netbootxyz"; 134 134 meta.maintainers = with pkgs.lib.maintainers; [ Enzime ]; 135 135 136 - machine = { pkgs, lib, ... }: { 136 + nodes.machine = { pkgs, lib, ... }: { 137 137 imports = [ common ]; 138 138 boot.loader.systemd-boot.netbootxyz.enable = true; 139 139 }; ··· 148 148 name = "systemd-boot-entry-filename"; 149 149 meta.maintainers = with pkgs.lib.maintainers; [ Enzime ]; 150 150 151 - machine = { pkgs, lib, ... }: { 151 + nodes.machine = { pkgs, lib, ... }: { 152 152 imports = [ common ]; 153 153 boot.loader.systemd-boot.memtest86.enable = true; 154 154 boot.loader.systemd-boot.memtest86.entryFilename = "apple.conf"; ··· 168 168 name = "systemd-boot-extra-entries"; 169 169 meta.maintainers = with pkgs.lib.maintainers; [ Enzime ]; 170 170 171 - machine = { pkgs, lib, ... }: { 171 + nodes.machine = { pkgs, lib, ... }: { 172 172 imports = [ common ]; 173 173 boot.loader.systemd-boot.extraEntries = { 174 174 "banana.conf" = '' ··· 187 187 name = "systemd-boot-extra-files"; 188 188 meta.maintainers = with pkgs.lib.maintainers; [ Enzime ]; 189 189 190 - machine = { pkgs, lib, ... }: { 190 + nodes.machine = { pkgs, lib, ... }: { 191 191 imports = [ common ]; 192 192 boot.loader.systemd-boot.extraFiles = { 193 193 "efi/fruits/tomato.efi" = pkgs.netbootxyz-efi;
+1 -1
nixos/tests/systemd-confinement.nix
··· 1 1 import ./make-test-python.nix { 2 2 name = "systemd-confinement"; 3 3 4 - machine = { pkgs, lib, ... }: let 4 + nodes.machine = { pkgs, lib, ... }: let 5 5 testServer = pkgs.writeScript "testserver.sh" '' 6 6 #!${pkgs.runtimeShell} 7 7 export PATH=${lib.escapeShellArg "${pkgs.coreutils}/bin"}
+1 -1
nixos/tests/systemd-cryptenroll.nix
··· 4 4 maintainers = [ ymatsiuk ]; 5 5 }; 6 6 7 - machine = { pkgs, lib, ... }: { 7 + nodes.machine = { pkgs, lib, ... }: { 8 8 environment.systemPackages = [ pkgs.cryptsetup ]; 9 9 virtualisation = { 10 10 emptyDiskImages = [ 512 ];
+1 -1
nixos/tests/systemd-escaping.nix
··· 14 14 { 15 15 name = "systemd-escaping"; 16 16 17 - machine = { pkgs, lib, utils, ... }: { 17 + nodes.machine = { pkgs, lib, utils, ... }: { 18 18 systemd.services.echo = 19 19 assert !(builtins.tryEval (utils.escapeSystemdExecArgs [ [] ])).success; 20 20 assert !(builtins.tryEval (utils.escapeSystemdExecArgs [ {} ])).success;
+1 -1
nixos/tests/systemd-journal.nix
··· 6 6 maintainers = [ lewo ]; 7 7 }; 8 8 9 - machine = { pkgs, lib, ... }: { 9 + nodes.machine = { pkgs, lib, ... }: { 10 10 services.journald.enableHttpGateway = true; 11 11 }; 12 12
+1 -1
nixos/tests/systemd-machinectl.nix
··· 28 28 { 29 29 name = "systemd-machinectl"; 30 30 31 - machine = { lib, ... }: { 31 + nodes.machine = { lib, ... }: { 32 32 # use networkd to obtain systemd network setup 33 33 networking.useNetworkd = true; 34 34 networking.useDHCP = false;
+1 -1
nixos/tests/systemd-misc.nix
··· 31 31 { 32 32 name = "systemd-misc"; 33 33 34 - machine = { pkgs, lib, ... }: { 34 + nodes.machine = { pkgs, lib, ... }: { 35 35 boot.extraSystemdUnitPaths = [ "/etc/systemd-rw/system" ]; 36 36 37 37 users.users.limited = {
+1 -1
nixos/tests/systemd.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "systemd"; 3 3 4 - machine = { lib, ... }: { 4 + nodes.machine = { lib, ... }: { 5 5 imports = [ common/user-account.nix common/x11.nix ]; 6 6 7 7 virtualisation.emptyDiskImages = [ 512 512 ];
+1 -1
nixos/tests/telegraf.nix
··· 4 4 maintainers = [ mic92 ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 services.telegraf.enable = true; 9 9 services.telegraf.environmentFiles = [(pkgs.writeText "secrets" '' 10 10 SECRET=example
+1 -1
nixos/tests/tinywl.nix
··· 6 6 maintainers = with lib.maintainers; [ primeos ]; 7 7 }; 8 8 9 - machine = { config, ... }: { 9 + nodes.machine = { config, ... }: { 10 10 # Automatically login on tty1 as a normal user: 11 11 imports = [ ./common/user-account.nix ]; 12 12 services.getty.autologinUser = "alice";
+1 -1
nixos/tests/tomcat.nix
··· 3 3 { 4 4 name = "tomcat"; 5 5 6 - machine = { pkgs, ... }: { 6 + nodes.machine = { pkgs, ... }: { 7 7 services.tomcat.enable = true; 8 8 }; 9 9
+1 -1
nixos/tests/transmission.nix
··· 4 4 maintainers = [ coconnor ]; 5 5 }; 6 6 7 - machine = { ... }: { 7 + nodes.machine = { ... }: { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 10 10 networking.firewall.allowedTCPPorts = [ 9091 ];
+1 -1
nixos/tests/tsm-client-gui.nix
··· 10 10 11 11 enableOCR = true; 12 12 13 - machine = { pkgs, ... }: { 13 + nodes.machine = { pkgs, ... }: { 14 14 imports = [ ./common/x11.nix ]; 15 15 programs.tsmClient = { 16 16 enable = true;
+1 -1
nixos/tests/tuptime.nix
··· 4 4 maintainers = [ evils ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 services.tuptime.enable = true; 10 10 };
+1 -1
nixos/tests/turbovnc-headless-server.nix
··· 4 4 maintainers = with lib.maintainers; [ nh2 ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 9 9 environment.systemPackages = with pkgs; [ 10 10 glxinfo
+1 -1
nixos/tests/tuxguitar.nix
··· 4 4 maintainers = [ asbachb ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 imports = [ 9 9 ./common/x11.nix 10 10 ];
+1 -1
nixos/tests/udisks2.nix
··· 15 15 maintainers = [ eelco ]; 16 16 }; 17 17 18 - machine = 18 + nodes.machine = 19 19 { ... }: 20 20 { services.udisks2.enable = true; 21 21 imports = [ ./common/user-account.nix ];
+1 -1
nixos/tests/usbguard.nix
··· 4 4 maintainers = [ tnias ]; 5 5 }; 6 6 7 - machine = 7 + nodes.machine = 8 8 { ... }: 9 9 { 10 10 services.usbguard = {
+1 -1
nixos/tests/user-activation-scripts.nix
··· 2 2 name = "user-activation-scripts"; 3 3 meta = with lib.maintainers; { maintainers = [ chkno ]; }; 4 4 5 - machine = { 5 + nodes.machine = { 6 6 system.userActivationScripts.foo = "mktemp ~/user-activation-ran.XXXXXX"; 7 7 users.users.alice = { 8 8 initialPassword = "pass1";
+1 -1
nixos/tests/uwsgi.nix
··· 5 5 maintainers = [ lnl7 ]; 6 6 }; 7 7 8 - machine = { pkgs, ... }: { 8 + nodes.machine = { pkgs, ... }: { 9 9 users.users.hello = 10 10 { isSystemUser = true; 11 11 group = "hello";
+1 -1
nixos/tests/v2ray.nix
··· 57 57 meta = with lib.maintainers; { 58 58 maintainers = [ servalcatty ]; 59 59 }; 60 - machine = { pkgs, ... }: { 60 + nodes.machine = { pkgs, ... }: { 61 61 environment.systemPackages = [ pkgs.curl ]; 62 62 services.v2ray = { 63 63 enable = true;
+1 -1
nixos/tests/vault-postgresql.nix
··· 11 11 meta = with pkgs.lib.maintainers; { 12 12 maintainers = [ lnl7 roberth ]; 13 13 }; 14 - machine = { lib, pkgs, ... }: { 14 + nodes.machine = { lib, pkgs, ... }: { 15 15 environment.systemPackages = [ pkgs.vault ]; 16 16 environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; 17 17 services.vault.enable = true;
+1 -1
nixos/tests/vault.nix
··· 4 4 meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ lnl7 ]; 6 6 }; 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 environment.systemPackages = [ pkgs.vault ]; 9 9 environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; 10 10 services.vault.enable = true;
+1 -1
nixos/tests/vector.nix
··· 9 9 name = "vector-test1"; 10 10 meta.maintainers = [ pkgs.lib.maintainers.happysalada ]; 11 11 12 - machine = { config, pkgs, ... }: { 12 + nodes.machine = { config, pkgs, ... }: { 13 13 services.vector = { 14 14 enable = true; 15 15 journaldAccess = true;
+1 -1
nixos/tests/vengi-tools.nix
··· 4 4 maintainers = [ fgaz ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + nodes.machine = { config, pkgs, ... }: { 8 8 imports = [ 9 9 ./common/x11.nix 10 10 ];
+1 -1
nixos/tests/virtualbox.nix
··· 353 353 mkVBoxTest = useExtensionPack: vms: name: testScript: makeTest { 354 354 name = "virtualbox-${name}"; 355 355 356 - machine = { lib, config, ... }: { 356 + nodes.machine = { lib, config, ... }: { 357 357 imports = let 358 358 mkVMConf = name: val: val.machine // { key = "${name}-config"; }; 359 359 vmConfigs = mapAttrsToList mkVMConf vms;
+1 -1
nixos/tests/web-servers/unit-php.nix
··· 6 6 name = "unit-php-test"; 7 7 meta.maintainers = with pkgs.lib.maintainers; [ izorkin ]; 8 8 9 - machine = { config, lib, pkgs, ... }: { 9 + nodes.machine = { config, lib, pkgs, ... }: { 10 10 services.unit = { 11 11 enable = true; 12 12 config = pkgs.lib.strings.toJSON {
+1 -1
nixos/tests/wiki-js.nix
··· 4 4 maintainers = [ ma27 ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: { 7 + nodes.machine = { pkgs, ... }: { 8 8 virtualisation.memorySize = 2048; 9 9 services.wiki-js = { 10 10 enable = true;
+1 -1
nixos/tests/wine.nix
··· 15 15 inherit name; 16 16 meta = with pkgs.lib.maintainers; { maintainers = [ chkno ]; }; 17 17 18 - machine = { pkgs, ... }: { 18 + nodes.machine = { pkgs, ... }: { 19 19 environment.systemPackages = [ pkgs."${packageSet}"."${variant}" ]; 20 20 virtualisation.diskSize = 800; 21 21 };
+1 -1
nixos/tests/wmderland.nix
··· 4 4 maintainers = [ takagiy ]; 5 5 }; 6 6 7 - machine = { lib, ... }: { 7 + nodes.machine = { lib, ... }: { 8 8 imports = [ ./common/x11.nix ./common/user-account.nix ]; 9 9 test-support.displayManager.auto.user = "alice"; 10 10 services.xserver.displayManager.defaultSession = lib.mkForce "none+wmderland";
+1 -1
nixos/tests/wpa_supplicant.nix
··· 5 5 maintainers = [ rnhmjoj ]; 6 6 }; 7 7 8 - machine = { ... }: { 8 + nodes.machine = { ... }: { 9 9 imports = [ ../modules/profiles/minimal.nix ]; 10 10 11 11 # add a virtual wlan interface
+1 -1
nixos/tests/xfce.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "xfce"; 3 3 4 - machine = 4 + nodes.machine = 5 5 { pkgs, ... }: 6 6 7 7 {
+1 -1
nixos/tests/xmonad.nix
··· 55 55 maintainers = [ nequissimus ivanbrennan ]; 56 56 }; 57 57 58 - machine = { pkgs, ... }: { 58 + nodes.machine = { pkgs, ... }: { 59 59 imports = [ ./common/x11.nix ./common/user-account.nix ]; 60 60 test-support.displayManager.auto.user = "alice"; 61 61 services.xserver.displayManager.defaultSession = "none+xmonad";
+1 -1
nixos/tests/xterm.nix
··· 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6 7 - machine = { pkgs, ... }: 7 + nodes.machine = { pkgs, ... }: 8 8 { 9 9 imports = [ ./common/x11.nix ]; 10 10 services.xserver.desktopManager.xterm.enable = false;
+1 -1
nixos/tests/yabar.nix
··· 8 8 maintainers = [ ]; 9 9 }; 10 10 11 - machine = { 11 + nodes.machine = { 12 12 imports = [ ./common/x11.nix ./common/user-account.nix ]; 13 13 14 14 test-support.displayManager.auto.user = "bob";
+1 -1
nixos/tests/zfs.nix
··· 18 18 maintainers = [ adisbladis ]; 19 19 }; 20 20 21 - machine = { pkgs, lib, ... }: 21 + nodes.machine = { pkgs, lib, ... }: 22 22 let 23 23 usersharePath = "/var/lib/samba/usershares"; 24 24 in {
+1 -1
nixos/tests/zigbee2mqtt.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, lib, ... }: 2 2 3 3 { 4 - machine = { pkgs, ... }: 4 + nodes.machine = { pkgs, ... }: 5 5 { 6 6 services.zigbee2mqtt = { 7 7 enable = true;
+1 -1
nixos/tests/zoneminder.nix
··· 4 4 name = "zoneminder"; 5 5 meta.maintainers = with lib.maintainers; [ danielfullmer ]; 6 6 7 - machine = { ... }: 7 + nodes.machine = { ... }: 8 8 { 9 9 services.zoneminder = { 10 10 enable = true;