From 6543c61311c0397775253dd3d7f1f41154fc6189 Mon Sep 17 00:00:00 2001 From: Ryan Mulligan Date: Sat, 8 May 2021 20:22:32 -0700 Subject: nixos/doc: add 21.11 release notes stub --- .../doc/manual/from_md/release-notes/rl-2111.section.xml | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 nixos/doc/manual/from_md/release-notes/rl-2111.section.xml (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml new file mode 100644 index 00000000000..abcf3406aa3 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -0,0 +1,15 @@ +
+ Release 21.11 (<quote>?</quote>, 2021.11/??) + + In addition to numerous new and upgraded packages, this release has + the following highlights: + + + + + Support is planned until the end of April 2022, handing over to + 22.05. + + + +
-- cgit 1.4.1 From 5b42338f4ec43e437e45e777716f8e24d21a60b4 Mon Sep 17 00:00:00 2001 From: Francesco Gazzetta Date: Mon, 24 May 2021 14:17:51 +0200 Subject: docs/release-notes: mention staticjinja --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 11 +++++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 4 ++++ 2 files changed, 15 insertions(+) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index abcf3406aa3..dc5a30d19bc 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -12,4 +12,15 @@ +
+ Backward incompatibilities + + + + The staticjinja package has been upgraded + from 1.0.4 to 2.0.0 + + + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 1499249148f..6bd552c873a 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -3,3 +3,7 @@ In addition to numerous new and upgraded packages, this release has the following highlights: * Support is planned until the end of April 2022, handing over to 22.05. + +## Backward incompatibilities + +* The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 -- cgit 1.4.1 From 0520141db0c60b7ac42f21b401c79b87b78f0c9c Mon Sep 17 00:00:00 2001 From: Jonathan Ringer Date: Wed, 2 Jun 2021 11:52:02 -0700 Subject: nixos/release-notes: Improve 21.11 stub --- .../manual/from_md/release-notes/rl-2111.section.xml | 17 ++++++++++++++++- nixos/doc/manual/release-notes/rl-2111.section.md | 8 +++++++- 2 files changed, 23 insertions(+), 2 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index dc5a30d19bc..e861b4fe7e2 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -12,8 +12,18 @@ +
+ Highlights + + +
+
+ New Services + + +
- Backward incompatibilities + Backward Incompatibilities @@ -23,4 +33,9 @@
+
+ Other Notable Changes + + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 6bd552c873a..9a6da7f22bd 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -4,6 +4,12 @@ In addition to numerous new and upgraded packages, this release has the followin * Support is planned until the end of April 2022, handing over to 22.05. -## Backward incompatibilities +## Highlights + +## New Services + +## Backward Incompatibilities * The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 + +## Other Notable Changes -- cgit 1.4.1 From f5f8341c76ffad22ae52c622be97c94ccbd2a847 Mon Sep 17 00:00:00 2001 From: talyz Date: Wed, 28 Apr 2021 16:56:06 +0200 Subject: nixos/geoipupdate: Replace the old `geoip-updater` module Our old bespoke GeoIP updater doesn't seem to be working anymore. Instead of trying to fix it, replace it with the official updater from MaxMind. --- .../from_md/release-notes/rl-2111.section.xml | 20 +- nixos/doc/manual/release-notes/rl-2111.section.md | 7 + nixos/modules/misc/ids.nix | 2 +- nixos/modules/module-list.nix | 2 +- nixos/modules/services/misc/geoip-updater.nix | 306 --------------------- nixos/modules/services/misc/geoipupdate.nix | 145 ++++++++++ 6 files changed, 171 insertions(+), 311 deletions(-) delete mode 100644 nixos/modules/services/misc/geoip-updater.nix create mode 100644 nixos/modules/services/misc/geoipupdate.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index e861b4fe7e2..e0b52ffa342 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -19,18 +19,32 @@
New Services - - + + + + geoipupdate, + a GeoIP database updater from MaxMind. Available as + services.geoipupdate. + + +
Backward Incompatibilities - + The staticjinja package has been upgraded from 1.0.4 to 2.0.0 + + + services.geoip-updater was broken and has + been replaced by + services.geoipupdate. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 9a6da7f22bd..d4604447f83 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -8,8 +8,15 @@ In addition to numerous new and upgraded packages, this release has the followin ## New Services +* [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP + database updater from MaxMind. Available as + [services.geoipupdate](options.html#opt-services.geoipupdate.enable). + ## Backward Incompatibilities * The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 +* `services.geoip-updater` was broken and has been replaced by + [services.geoipupdate](options.html#opt-services.geoipupdate.enable). + ## Other Notable Changes diff --git a/nixos/modules/misc/ids.nix b/nixos/modules/misc/ids.nix index 05cc5002aaf..7ea2940292b 100644 --- a/nixos/modules/misc/ids.nix +++ b/nixos/modules/misc/ids.nix @@ -300,7 +300,7 @@ in #pdns-recursor = 269; # dynamically allocated as of 2020-20-18 #kresd = 270; # switched to "knot-resolver" with dynamic ID rpc = 271; - geoip = 272; + #geoip = 272; # new module uses DynamicUser fcron = 273; sonarr = 274; radarr = 275; diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index ebafb5ef5aa..42f0471c4cf 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -492,7 +492,7 @@ ./services/misc/freeswitch.nix ./services/misc/fstrim.nix ./services/misc/gammu-smsd.nix - ./services/misc/geoip-updater.nix + ./services/misc/geoipupdate.nix ./services/misc/gitea.nix #./services/misc/gitit.nix ./services/misc/gitlab.nix diff --git a/nixos/modules/services/misc/geoip-updater.nix b/nixos/modules/services/misc/geoip-updater.nix deleted file mode 100644 index baf0a8d73d1..00000000000 --- a/nixos/modules/services/misc/geoip-updater.nix +++ /dev/null @@ -1,306 +0,0 @@ -{ config, lib, pkgs, ... }: - -with lib; - -let - cfg = config.services.geoip-updater; - - dbBaseUrl = "https://geolite.maxmind.com/download/geoip/database"; - - randomizedTimerDelaySec = "3600"; - - # Use writeScriptBin instead of writeScript, so that argv[0] (logged to the - # journal) doesn't include the long nix store path hash. (Prefixing the - # ExecStart= command with '@' doesn't work because we start a shell (new - # process) that creates a new argv[0].) - geoip-updater = pkgs.writeScriptBin "geoip-updater" '' - #!${pkgs.runtimeShell} - skipExisting=0 - debug() - { - echo "<7>$@" - } - info() - { - echo "<6>$@" - } - error() - { - echo "<3>$@" - } - die() - { - error "$@" - exit 1 - } - waitNetworkOnline() - { - ret=1 - for i in $(seq 6); do - curl_out=$("${pkgs.curl.bin}/bin/curl" \ - --silent --fail --show-error --max-time 60 "${dbBaseUrl}" 2>&1) - if [ $? -eq 0 ]; then - debug "Server is reachable (try $i)" - ret=0 - break - else - debug "Server is unreachable (try $i): $curl_out" - sleep 10 - fi - done - return $ret - } - dbFnameTmp() - { - dburl=$1 - echo "${cfg.databaseDir}/.$(basename "$dburl")" - } - dbFnameTmpDecompressed() - { - dburl=$1 - echo "${cfg.databaseDir}/.$(basename "$dburl")" | sed 's/\.\(gz\|xz\)$//' - } - dbFname() - { - dburl=$1 - echo "${cfg.databaseDir}/$(basename "$dburl")" | sed 's/\.\(gz\|xz\)$//' - } - downloadDb() - { - dburl=$1 - curl_out=$("${pkgs.curl.bin}/bin/curl" \ - --silent --fail --show-error --max-time 900 -L -o "$(dbFnameTmp "$dburl")" "$dburl" 2>&1) - if [ $? -ne 0 ]; then - error "Failed to download $dburl: $curl_out" - return 1 - fi - } - decompressDb() - { - fn=$(dbFnameTmp "$1") - ret=0 - case "$fn" in - *.gz) - cmd_out=$("${pkgs.gzip}/bin/gzip" --decompress --force "$fn" 2>&1) - ;; - *.xz) - cmd_out=$("${pkgs.xz.bin}/bin/xz" --decompress --force "$fn" 2>&1) - ;; - *) - cmd_out=$(echo "File \"$fn\" is neither a .gz nor .xz file") - false - ;; - esac - if [ $? -ne 0 ]; then - error "$cmd_out" - ret=1 - fi - } - atomicRename() - { - dburl=$1 - mv "$(dbFnameTmpDecompressed "$dburl")" "$(dbFname "$dburl")" - } - removeIfNotInConfig() - { - # Arg 1 is the full path of an installed DB. - # If the corresponding database is not specified in the NixOS config we - # remove it. - db=$1 - for cdb in ${lib.concatStringsSep " " cfg.databases}; do - confDb=$(echo "$cdb" | sed 's/\.\(gz\|xz\)$//') - if [ "$(basename "$db")" = "$(basename "$confDb")" ]; then - return 0 - fi - done - rm "$db" - if [ $? -eq 0 ]; then - debug "Removed $(basename "$db") (not listed in services.geoip-updater.databases)" - else - error "Failed to remove $db" - fi - } - removeUnspecifiedDbs() - { - for f in "${cfg.databaseDir}/"*; do - test -f "$f" || continue - case "$f" in - *.dat|*.mmdb|*.csv) - removeIfNotInConfig "$f" - ;; - *) - debug "Not removing \"$f\" (unknown file extension)" - ;; - esac - done - } - downloadAndInstall() - { - dburl=$1 - if [ "$skipExisting" -eq 1 -a -f "$(dbFname "$dburl")" ]; then - debug "Skipping existing file: $(dbFname "$dburl")" - return 0 - fi - downloadDb "$dburl" || return 1 - decompressDb "$dburl" || return 1 - atomicRename "$dburl" || return 1 - info "Updated $(basename "$(dbFname "$dburl")")" - } - for arg in "$@"; do - case "$arg" in - --skip-existing) - skipExisting=1 - info "Option --skip-existing is set: not updating existing databases" - ;; - *) - error "Unknown argument: $arg";; - esac - done - waitNetworkOnline || die "Network is down (${dbBaseUrl} is unreachable)" - test -d "${cfg.databaseDir}" || die "Database directory (${cfg.databaseDir}) doesn't exist" - debug "Starting update of GeoIP databases in ${cfg.databaseDir}" - all_ret=0 - for db in ${lib.concatStringsSep " \\\n " cfg.databases}; do - downloadAndInstall "${dbBaseUrl}/$db" || all_ret=1 - done - removeUnspecifiedDbs || all_ret=1 - if [ $all_ret -eq 0 ]; then - info "Completed GeoIP database update in ${cfg.databaseDir}" - else - error "Completed GeoIP database update in ${cfg.databaseDir}, with error(s)" - fi - # Hack to work around systemd journal race: - # https://github.com/systemd/systemd/issues/2913 - sleep 2 - exit $all_ret - ''; - -in - -{ - options = { - services.geoip-updater = { - enable = mkOption { - default = false; - type = types.bool; - description = '' - Whether to enable periodic downloading of GeoIP databases from - maxmind.com. You might want to enable this if you, for instance, use - ntopng or Wireshark. - ''; - }; - - interval = mkOption { - type = types.str; - default = "weekly"; - description = '' - Update the GeoIP databases at this time / interval. - The format is described in - systemd.time - 7. - To prevent load spikes on maxmind.com, the timer interval is - randomized by an additional delay of ${randomizedTimerDelaySec} - seconds. Setting a shorter interval than this is not recommended. - ''; - }; - - databaseDir = mkOption { - type = types.path; - default = "/var/lib/geoip-databases"; - description = '' - Directory that will contain GeoIP databases. - ''; - }; - - databases = mkOption { - type = types.listOf types.str; - default = [ - "GeoLiteCountry/GeoIP.dat.gz" - "GeoIPv6.dat.gz" - "GeoLiteCity.dat.xz" - "GeoLiteCityv6-beta/GeoLiteCityv6.dat.gz" - "asnum/GeoIPASNum.dat.gz" - "asnum/GeoIPASNumv6.dat.gz" - "GeoLite2-Country.mmdb.gz" - "GeoLite2-City.mmdb.gz" - ]; - description = '' - Which GeoIP databases to update. The full URL is ${dbBaseUrl}/ + - the_database. - ''; - }; - - }; - - }; - - config = mkIf cfg.enable { - - assertions = [ - { assertion = (builtins.filter - (x: builtins.match ".*\\.(gz|xz)$" x == null) cfg.databases) == []; - message = '' - services.geoip-updater.databases supports only .gz and .xz databases. - - Current value: - ${toString cfg.databases} - - Offending element(s): - ${toString (builtins.filter (x: builtins.match ".*\\.(gz|xz)$" x == null) cfg.databases)}; - ''; - } - ]; - - users.users.geoip = { - group = "root"; - description = "GeoIP database updater"; - uid = config.ids.uids.geoip; - }; - - systemd.timers.geoip-updater = - { description = "GeoIP Updater Timer"; - partOf = [ "geoip-updater.service" ]; - wantedBy = [ "timers.target" ]; - timerConfig.OnCalendar = cfg.interval; - timerConfig.Persistent = "true"; - timerConfig.RandomizedDelaySec = randomizedTimerDelaySec; - }; - - systemd.services.geoip-updater = { - description = "GeoIP Updater"; - after = [ "network-online.target" "nss-lookup.target" ]; - wants = [ "network-online.target" ]; - preStart = '' - mkdir -p "${cfg.databaseDir}" - chmod 755 "${cfg.databaseDir}" - chown geoip:root "${cfg.databaseDir}" - ''; - serviceConfig = { - ExecStart = "${geoip-updater}/bin/geoip-updater"; - User = "geoip"; - PermissionsStartOnly = true; - }; - }; - - systemd.services.geoip-updater-setup = { - description = "GeoIP Updater Setup"; - after = [ "network-online.target" "nss-lookup.target" ]; - wants = [ "network-online.target" ]; - wantedBy = [ "multi-user.target" ]; - conflicts = [ "geoip-updater.service" ]; - preStart = '' - mkdir -p "${cfg.databaseDir}" - chmod 755 "${cfg.databaseDir}" - chown geoip:root "${cfg.databaseDir}" - ''; - serviceConfig = { - ExecStart = "${geoip-updater}/bin/geoip-updater --skip-existing"; - User = "geoip"; - PermissionsStartOnly = true; - # So it won't be (needlessly) restarted: - RemainAfterExit = true; - }; - }; - - }; -} diff --git a/nixos/modules/services/misc/geoipupdate.nix b/nixos/modules/services/misc/geoipupdate.nix new file mode 100644 index 00000000000..5d87be928d9 --- /dev/null +++ b/nixos/modules/services/misc/geoipupdate.nix @@ -0,0 +1,145 @@ +{ config, lib, pkgs, ... }: + +let + cfg = config.services.geoipupdate; +in +{ + imports = [ + (lib.mkRemovedOptionModule [ "services" "geoip-updater" ] "services.geoip-updater has been removed, use services.geoipupdate instead.") + ]; + + options = { + services.geoipupdate = { + enable = lib.mkEnableOption '' + periodic downloading of GeoIP databases using + geoipupdate. + ''; + + interval = lib.mkOption { + type = lib.types.str; + default = "weekly"; + description = '' + Update the GeoIP databases at this time / interval. + The format is described in + systemd.time + 7. + ''; + }; + + settings = lib.mkOption { + description = '' + geoipupdate configuration + options. See + + for a full list of available options. + ''; + type = lib.types.submodule { + freeformType = + with lib.types; + let + type = oneOf [str int bool]; + in + attrsOf (either type (listOf type)); + + options = { + + AccountID = lib.mkOption { + type = lib.types.int; + description = '' + Your MaxMind account ID. + ''; + }; + + EditionIDs = lib.mkOption { + type = with lib.types; listOf (either str int); + example = [ + "GeoLite2-ASN" + "GeoLite2-City" + "GeoLite2-Country" + ]; + description = '' + List of database edition IDs. This includes new string + IDs like GeoIP2-City and old + numeric IDs like 106. + ''; + }; + + LicenseKey = lib.mkOption { + type = lib.types.path; + description = '' + A file containing the MaxMind + license key. + ''; + }; + + DatabaseDirectory = lib.mkOption { + type = lib.types.path; + default = "/var/lib/GeoIP"; + example = "/run/GeoIP"; + description = '' + The directory to store the database files in. The + directory will be automatically created, the owner + changed to geoip and permissions + set to world readable. This applies if the directory + already exists as well, so don't use a directory with + sensitive contents. + ''; + }; + + }; + }; + }; + }; + + }; + + config = lib.mkIf cfg.enable { + + services.geoipupdate.settings = { + LockFile = "/run/geoipupdate/.lock"; + }; + + systemd.services.geoipupdate = { + description = "GeoIP Updater"; + after = [ "network-online.target" "nss-lookup.target" ]; + wants = [ "network-online.target" ]; + startAt = cfg.interval; + serviceConfig = { + ExecStartPre = + let + geoipupdateKeyValue = lib.generators.toKeyValue { + mkKeyValue = lib.flip lib.generators.mkKeyValueDefault " " rec { + mkValueString = v: with builtins; + if isInt v then toString v + else if isString v then v + else if true == v then "1" + else if false == v then "0" + else if isList v then lib.concatMapStringsSep " " mkValueString v + else throw "unsupported type ${typeOf v}: ${(lib.generators.toPretty {}) v}"; + }; + }; + + geoipupdateConf = pkgs.writeText "discourse.conf" (geoipupdateKeyValue cfg.settings); + + script = '' + mkdir -p "${cfg.settings.DatabaseDirectory}" + chmod 755 "${cfg.settings.DatabaseDirectory}" + chown geoip "${cfg.settings.DatabaseDirectory}" + + cp ${geoipupdateConf} /run/geoipupdate/GeoIP.conf + ${pkgs.replace-secret}/bin/replace-secret '${cfg.settings.LicenseKey}' \ + '${cfg.settings.LicenseKey}' \ + /run/geoipupdate/GeoIP.conf + ''; + in + "+${pkgs.writeShellScript "start-pre-full-privileges" script}"; + ExecStart = "${pkgs.geoipupdate}/bin/geoipupdate -f /run/geoipupdate/GeoIP.conf"; + User = "geoip"; + DynamicUser = true; + ReadWritePaths = cfg.settings.DatabaseDirectory; + RuntimeDirectory = "geoipupdate"; + RuntimeDirectoryMode = 0700; + }; + }; + }; +} -- cgit 1.4.1 From 68eb5305ac93adb1cce777c0ae73fd29eccb6973 Mon Sep 17 00:00:00 2001 From: Elis Hirwing Date: Thu, 3 Jun 2021 15:06:06 +0200 Subject: php: Drop PHP 7.3 support PHP 7.3 won't be supported by upstream for the entire life cycle of the 21.11 release. Also drop the pcre' alias since it isn't needed anymore since we don't need different pcre versions anymore. --- .../from_md/release-notes/rl-2111.section.xml | 15 +++++- nixos/doc/manual/release-notes/rl-2111.section.md | 3 ++ nixos/tests/all-tests.nix | 1 - pkgs/development/interpreters/php/7.3.nix | 20 -------- pkgs/development/interpreters/php/generic.nix | 16 +++--- .../interpreters/php/php73-darwin-isfinite.patch | 60 ---------------------- pkgs/development/php-packages/apcu/default.nix | 4 +- pkgs/development/php-packages/apcu_bc/default.nix | 4 +- pkgs/development/php-packages/imagick/default.nix | 4 +- pkgs/development/php-packages/mongodb/default.nix | 4 +- pkgs/development/php-packages/pcov/default.nix | 4 +- pkgs/development/php-packages/pinba/default.nix | 19 ++----- pkgs/development/php-packages/protobuf/default.nix | 4 +- pkgs/development/php-packages/pthreads/default.nix | 26 +++------- pkgs/development/php-packages/rdkafka/default.nix | 4 +- .../php-packages/snuffleupagus/default.nix | 4 +- pkgs/development/php-packages/swoole/default.nix | 4 +- pkgs/development/tools/misc/drush/default.nix | 4 +- pkgs/servers/http/unit/default.nix | 5 -- pkgs/top-level/aliases.nix | 9 +++- pkgs/top-level/all-packages.nix | 7 --- pkgs/top-level/php-packages.nix | 22 ++++---- 22 files changed, 72 insertions(+), 171 deletions(-) delete mode 100644 pkgs/development/interpreters/php/7.3.nix delete mode 100644 pkgs/development/interpreters/php/php73-darwin-isfinite.patch (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index e0b52ffa342..5f7b1fc811c 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -14,8 +14,13 @@
Highlights - - + + + + PHP now defaults to PHP 8.0, updated from 7.4 + + +
New Services @@ -45,6 +50,12 @@ services.geoipupdate. + + + PHP 7.3 is no longer supported due to upstream not supporting + this version for the entire lifecycle of the 21.11 release. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index d4604447f83..439437f5c09 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -19,4 +19,7 @@ In addition to numerous new and upgraded packages, this release has the followin * `services.geoip-updater` was broken and has been replaced by [services.geoipupdate](options.html#opt-services.geoipupdate.enable). +* PHP 7.3 is no longer supported due to upstream not supporting this + version for the entire lifecycle of the 21.11 release. + ## Other Notable Changes diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix index f062208a3b6..d8fcbde6bc0 100644 --- a/nixos/tests/all-tests.nix +++ b/nixos/tests/all-tests.nix @@ -325,7 +325,6 @@ in pgjwt = handleTest ./pgjwt.nix {}; pgmanage = handleTest ./pgmanage.nix {}; php = handleTest ./php {}; - php73 = handleTest ./php { php = pkgs.php73; }; php74 = handleTest ./php { php = pkgs.php74; }; php80 = handleTest ./php { php = pkgs.php80; }; pinnwand = handleTest ./pinnwand.nix {}; diff --git a/pkgs/development/interpreters/php/7.3.nix b/pkgs/development/interpreters/php/7.3.nix deleted file mode 100644 index 569fb1b5405..00000000000 --- a/pkgs/development/interpreters/php/7.3.nix +++ /dev/null @@ -1,20 +0,0 @@ -{ callPackage, lib, stdenv, nixosTests, ... }@_args: - -let - generic = (import ./generic.nix) _args; - - base = callPackage generic (_args // { - version = "7.3.28"; - sha256 = "0r4r8famg3a8x6ch24y1370nsphkxg4k9zq5x8v88f4l8mj6wqwg"; - - # https://bugs.php.net/bug.php?id=76826 - extraPatches = lib.optional stdenv.isDarwin ./php73-darwin-isfinite.patch; - }); - -in base.withExtensions ({ all, ... }: with all; ([ - bcmath calendar curl ctype dom exif fileinfo filter ftp gd - gettext gmp hash iconv intl json ldap mbstring mysqli mysqlnd - opcache openssl pcntl pdo pdo_mysql pdo_odbc pdo_pgsql pdo_sqlite - pgsql posix readline session simplexml sockets soap sodium sqlite3 - tokenizer xmlreader xmlwriter zip zlib -] ++ lib.optionals (!stdenv.isDarwin) [ imap ])) diff --git a/pkgs/development/interpreters/php/generic.nix b/pkgs/development/interpreters/php/generic.nix index 13fd811c4ea..233e1b7007f 100644 --- a/pkgs/development/interpreters/php/generic.nix +++ b/pkgs/development/interpreters/php/generic.nix @@ -7,7 +7,7 @@ let generic = { callPackage, lib, stdenv, nixosTests, fetchurl, makeWrapper , symlinkJoin, writeText, autoconf, automake, bison, flex, libtool - , pkg-config, re2c, apacheHttpd, libargon2, libxml2, pcre, pcre2 + , pkg-config, re2c, apacheHttpd, libargon2, libxml2, pcre2 , systemd, system-sendmail, valgrind, xcbuild , version @@ -103,7 +103,7 @@ let ${extraConfig} ''; - phpWithExtensions = symlinkJoin rec { + phpWithExtensions = symlinkJoin { name = "php-with-extensions-${version}"; inherit (php) version; nativeBuildInputs = [ makeWrapper ]; @@ -142,8 +142,6 @@ let mkWithExtensions = prevArgs: prevExtensionFunctions: extensions: mkBuildEnv prevArgs prevExtensionFunctions { inherit extensions; }; - - pcre' = if (lib.versionAtLeast version "7.3") then pcre2 else pcre; in stdenv.mkDerivation { pname = "php"; @@ -157,7 +155,7 @@ let buildInputs = # PCRE extension - [ pcre' ] + [ pcre2 ] # Enable sapis ++ lib.optional pearSupport [ libxml2.dev ] @@ -176,10 +174,10 @@ let [ "--disable-all" ] # PCRE - ++ lib.optionals (lib.versionAtLeast version "7.4") [ "--with-external-pcre=${pcre'.dev}" ] - ++ lib.optionals (lib.versions.majorMinor version == "7.3") [ "--with-pcre-regex=${pcre'.dev}" ] - ++ lib.optionals (lib.versionOlder version "7.3") [ "--with-pcre-regex=${pcre'.dev}" ] - ++ [ "PCRE_LIBDIR=${pcre'}" ] + ++ lib.optionals (lib.versionAtLeast version "7.4") [ "--with-external-pcre=${pcre2.dev}" ] + ++ lib.optionals (lib.versions.majorMinor version == "7.3") [ "--with-pcre-regex=${pcre2.dev}" ] + ++ lib.optionals (lib.versionOlder version "7.3") [ "--with-pcre-regex=${pcre2.dev}" ] + ++ [ "PCRE_LIBDIR=${pcre2}" ] # Enable sapis diff --git a/pkgs/development/interpreters/php/php73-darwin-isfinite.patch b/pkgs/development/interpreters/php/php73-darwin-isfinite.patch deleted file mode 100644 index 7f784e0f5a9..00000000000 --- a/pkgs/development/interpreters/php/php73-darwin-isfinite.patch +++ /dev/null @@ -1,60 +0,0 @@ -diff -ru a/configure.ac b/configure.ac ---- a/configure.ac 2018-12-04 19:12:20.000000000 +0300 -+++ b/configure.ac 2018-12-10 12:30:37.798917520 +0300 -@@ -68,7 +68,7 @@ - #include - - #ifndef zend_isnan --#if HAVE_DECL_ISNAN && (!defined(__cplusplus) || __cplusplus < 201103L) -+#if HAVE_DECL_ISNAN && (defined(__APPLE__) || defined(__APPLE_CC__) || !defined(__cplusplus) || __cplusplus < 201103L) - #define zend_isnan(a) isnan(a) - #elif defined(HAVE_FPCLASS) - #define zend_isnan(a) ((fpclass(a) == FP_SNAN) || (fpclass(a) == FP_QNAN)) -@@ -77,7 +77,7 @@ - #endif - #endif - --#if HAVE_DECL_ISINF && (!defined(__cplusplus) || __cplusplus < 201103L) -+#if HAVE_DECL_ISINF && (defined(__APPLE__) || defined(__APPLE_CC__) || !defined(__cplusplus) || __cplusplus < 201103L) - #define zend_isinf(a) isinf(a) - #elif defined(INFINITY) - /* Might not work, but is required by ISO C99 */ -@@ -88,7 +88,7 @@ - #define zend_isinf(a) 0 - #endif - --#if HAVE_DECL_ISFINITE && (!defined(__cplusplus) || __cplusplus < 201103L) -+#if HAVE_DECL_ISFINITE && (defined(__APPLE__) || defined(__APPLE_CC__) || !defined(__cplusplus) || __cplusplus < 201103L) - #define zend_finite(a) isfinite(a) - #elif defined(HAVE_FINITE) - #define zend_finite(a) finite(a) -diff -ru a/Zend/configure.ac b/Zend/configure.ac ---- a/Zend/configure.ac 2018-12-04 19:12:30.000000000 +0300 -+++ b/Zend/configure.ac 2018-12-10 12:28:50.350929699 +0300 -@@ -59,7 +59,7 @@ - #include - - #ifndef zend_isnan --#if HAVE_DECL_ISNAN && (!defined(__cplusplus) || __cplusplus < 201103L) -+#if HAVE_DECL_ISNAN && (defined(__APPLE__) || defined(__APPLE_CC__) || !defined(__cplusplus) || __cplusplus < 201103L) - #define zend_isnan(a) isnan(a) - #elif defined(HAVE_FPCLASS) - #define zend_isnan(a) ((fpclass(a) == FP_SNAN) || (fpclass(a) == FP_QNAN)) -@@ -68,7 +68,7 @@ - #endif - #endif - --#if HAVE_DECL_ISINF && (!defined(__cplusplus) || __cplusplus < 201103L) -+#if HAVE_DECL_ISINF && (defined(__APPLE__) || defined(__APPLE_CC__) || !defined(__cplusplus) || __cplusplus < 201103L) - #define zend_isinf(a) isinf(a) - #elif defined(INFINITY) - /* Might not work, but is required by ISO C99 */ -@@ -79,7 +79,7 @@ - #define zend_isinf(a) 0 - #endif - --#if HAVE_DECL_ISFINITE && (!defined(__cplusplus) || __cplusplus < 201103L) -+#if HAVE_DECL_ISFINITE && (defined(__APPLE__) || defined(__APPLE_CC__) || !defined(__cplusplus) || __cplusplus < 201103L) - #define zend_finite(a) isfinite(a) - #elif defined(HAVE_FINITE) - #define zend_finite(a) finite(a) diff --git a/pkgs/development/php-packages/apcu/default.nix b/pkgs/development/php-packages/apcu/default.nix index 3301d949c22..5aa8b2b4f9b 100644 --- a/pkgs/development/php-packages/apcu/default.nix +++ b/pkgs/development/php-packages/apcu/default.nix @@ -1,4 +1,4 @@ -{ buildPecl, lib, pcre' }: +{ buildPecl, lib, pcre2 }: buildPecl { pname = "apcu"; @@ -6,7 +6,7 @@ buildPecl { version = "5.1.20"; sha256 = "sha256-uZ1A+v7Ab00TL87lPnUm3b/B0EHqbgThc4nfrSj5w5A="; - buildInputs = [ pcre' ]; + buildInputs = [ pcre2 ]; doCheck = true; checkTarget = "test"; checkFlagsArray = [ "REPORT_EXIT_STATUS=1" "NO_INTERACTION=1" ]; diff --git a/pkgs/development/php-packages/apcu_bc/default.nix b/pkgs/development/php-packages/apcu_bc/default.nix index a9c34a8d778..448c25bee64 100644 --- a/pkgs/development/php-packages/apcu_bc/default.nix +++ b/pkgs/development/php-packages/apcu_bc/default.nix @@ -1,4 +1,4 @@ -{ buildPecl, lib, pcre', php }: +{ buildPecl, lib, pcre2, php }: buildPecl { pname = "apcu_bc"; @@ -8,7 +8,7 @@ buildPecl { peclDeps = [ php.extensions.apcu ]; - buildInputs = [ pcre' ]; + buildInputs = [ pcre2 ]; postInstall = '' mv $out/lib/php/extensions/apc.so $out/lib/php/extensions/apcu_bc.so diff --git a/pkgs/development/php-packages/imagick/default.nix b/pkgs/development/php-packages/imagick/default.nix index ebff9b00f02..744ba2302f7 100644 --- a/pkgs/development/php-packages/imagick/default.nix +++ b/pkgs/development/php-packages/imagick/default.nix @@ -1,4 +1,4 @@ -{ buildPecl, fetchpatch, lib, imagemagick, pkg-config, pcre' }: +{ buildPecl, fetchpatch, lib, imagemagick, pkg-config, pcre2 }: buildPecl { pname = "imagick"; @@ -21,7 +21,7 @@ buildPecl { configureFlags = [ "--with-imagick=${imagemagick.dev}" ]; nativeBuildInputs = [ pkg-config ]; - buildInputs = [ pcre' ]; + buildInputs = [ pcre2 ]; meta.maintainers = lib.teams.php.members; } diff --git a/pkgs/development/php-packages/mongodb/default.nix b/pkgs/development/php-packages/mongodb/default.nix index 95e51892f04..d0e5e545f6b 100644 --- a/pkgs/development/php-packages/mongodb/default.nix +++ b/pkgs/development/php-packages/mongodb/default.nix @@ -1,4 +1,4 @@ -{ stdenv, buildPecl, lib, pcre', pkg-config, cyrus_sasl, icu64 +{ stdenv, buildPecl, lib, pcre2, pkg-config, cyrus_sasl, icu64 , openssl, snappy, zlib, darwin }: buildPecl { @@ -14,7 +14,7 @@ buildPecl { openssl snappy zlib - pcre' + pcre2 ] ++ lib.optional stdenv.isDarwin darwin.apple_sdk.frameworks.Security; meta.maintainers = lib.teams.php.members; diff --git a/pkgs/development/php-packages/pcov/default.nix b/pkgs/development/php-packages/pcov/default.nix index 1422e1b176d..0583f776e56 100644 --- a/pkgs/development/php-packages/pcov/default.nix +++ b/pkgs/development/php-packages/pcov/default.nix @@ -1,4 +1,4 @@ -{ buildPecl, lib, pcre' }: +{ buildPecl, lib, pcre2 }: buildPecl { pname = "pcov"; @@ -6,7 +6,7 @@ buildPecl { version = "1.0.8"; sha256 = "sha256-6rbniyxLIHPW/e+eWZN1qS8F1rOB7ld1N8JKUS1geRQ="; - buildInputs = [ pcre' ]; + buildInputs = [ pcre2 ]; meta.maintainers = lib.teams.php.members; } diff --git a/pkgs/development/php-packages/pinba/default.nix b/pkgs/development/php-packages/pinba/default.nix index 0880c2a46e2..4c1b42183ba 100644 --- a/pkgs/development/php-packages/pinba/default.nix +++ b/pkgs/development/php-packages/pinba/default.nix @@ -1,24 +1,15 @@ { buildPecl, lib, fetchFromGitHub, php }: -let - pname = "pinba"; - - isPhp73 = lib.versionAtLeast php.version "7.3"; - version = if isPhp73 then "1.1.2-dev" else "1.1.1"; +buildPecl { + pname = "pinba"; + version = "1.1.2-dev"; - src = fetchFromGitHub ({ + src = fetchFromGitHub { owner = "tony2001"; repo = "pinba_extension"; - } // (if (isPhp73) then { rev = "edbc313f1b4fb8407bf7d5acf63fbb0359c7fb2e"; sha256 = "02sljqm6griw8ccqavl23f7w1hp2zflcv24lpf00k6pyrn9cwx80"; - } else { - rev = "RELEASE_1_1_1"; - sha256 = "1kdp7vav0y315695vhm3xifgsh6h6y6pny70xw3iai461n58khj5"; - })); -in -buildPecl { - inherit pname version src; + }; meta = with lib; { description = "PHP extension for Pinba"; diff --git a/pkgs/development/php-packages/protobuf/default.nix b/pkgs/development/php-packages/protobuf/default.nix index e2ef068120d..2112e84cfff 100644 --- a/pkgs/development/php-packages/protobuf/default.nix +++ b/pkgs/development/php-packages/protobuf/default.nix @@ -1,4 +1,4 @@ -{ buildPecl, lib, pcre', fetchpatch }: +{ buildPecl, lib, pcre2, fetchpatch }: buildPecl { pname = "protobuf"; @@ -6,7 +6,7 @@ buildPecl { version = "3.14.0"; sha256 = "1ldc4s28hq61cfg8l4c06pgicj0ng7k37f28a0dnnbs7xkr7cibd"; - buildInputs = [ pcre' ]; + buildInputs = [ pcre2 ]; patches = [ # TODO: remove with next update diff --git a/pkgs/development/php-packages/pthreads/default.nix b/pkgs/development/php-packages/pthreads/default.nix index 31b32e82967..c1aac8c8424 100644 --- a/pkgs/development/php-packages/pthreads/default.nix +++ b/pkgs/development/php-packages/pthreads/default.nix @@ -1,28 +1,18 @@ -{ buildPecl, lib, fetchFromGitHub, php, pcre' }: -let - pname = "pthreads"; - - isPhp73 = lib.versionAtLeast php.version "7.3"; - isPhp74 = lib.versionAtLeast php.version "7.4"; +{ buildPecl, lib, fetchFromGitHub, php, pcre2 }: - version = if isPhp73 then "3.2.0-dev" else "3.2.0"; +buildPecl { + pname = "pthreads"; + version = "3.2.0-dev"; - src = fetchFromGitHub ({ + src = fetchFromGitHub { owner = "krakjoe"; repo = "pthreads"; - } // (if (isPhp73) then { rev = "4d1c2483ceb459ea4284db4eb06646d5715e7154"; sha256 = "07kdxypy0bgggrfav2h1ccbv67lllbvpa3s3zsaqci0gq4fyi830"; - } else { - rev = "v3.2.0"; - sha256 = "17hypm75d4w7lvz96jb7s0s87018yzmmap0l125d5fd7abnhzfvv"; - })); -in -buildPecl { - inherit pname version src; + }; - buildInputs = [ pcre'.dev ]; + buildInputs = [ pcre2.dev ]; - meta.broken = isPhp74; + meta.broken = lib.versionAtLeast php.version "7.4"; meta.maintainers = lib.teams.php.members; } diff --git a/pkgs/development/php-packages/rdkafka/default.nix b/pkgs/development/php-packages/rdkafka/default.nix index 0e78d3bbc97..c8dea9463d6 100644 --- a/pkgs/development/php-packages/rdkafka/default.nix +++ b/pkgs/development/php-packages/rdkafka/default.nix @@ -1,4 +1,4 @@ -{ buildPecl, lib, rdkafka, pcre' }: +{ buildPecl, lib, rdkafka, pcre2 }: buildPecl { pname = "rdkafka"; @@ -6,7 +6,7 @@ buildPecl { version = "5.0.0"; sha256 = "sha256-Qy+6rkPczhdxFbDhcuzmUTLMPUXYZ0HaheDBhkh4FXs="; - buildInputs = [ rdkafka pcre' ]; + buildInputs = [ rdkafka pcre2 ]; postPhpize = '' substituteInPlace configure \ diff --git a/pkgs/development/php-packages/snuffleupagus/default.nix b/pkgs/development/php-packages/snuffleupagus/default.nix index 222a243606f..4318a49a8aa 100644 --- a/pkgs/development/php-packages/snuffleupagus/default.nix +++ b/pkgs/development/php-packages/snuffleupagus/default.nix @@ -2,7 +2,7 @@ , lib , php , fetchFromGitHub -, pcre' +, pcre2 , fetchpatch }: @@ -17,7 +17,7 @@ buildPecl rec { }; buildInputs = [ - pcre' + pcre2 ]; internalDeps = with php.extensions; [ diff --git a/pkgs/development/php-packages/swoole/default.nix b/pkgs/development/php-packages/swoole/default.nix index b3d43acd1b3..ef228c2ddc3 100644 --- a/pkgs/development/php-packages/swoole/default.nix +++ b/pkgs/development/php-packages/swoole/default.nix @@ -1,4 +1,4 @@ -{ lib, buildPecl, php, valgrind, pcre' }: +{ lib, buildPecl, php, valgrind, pcre2 }: buildPecl { pname = "swoole"; @@ -6,7 +6,7 @@ buildPecl { version = "4.6.4"; sha256 = "0hgndnn27q7fbsb0nw6bfdg0kyy5di9vrmf7g53jc6lsnf73ha31"; - buildInputs = [ valgrind pcre' ]; + buildInputs = [ valgrind pcre2 ]; internalDeps = lib.optionals (lib.versionOlder php.version "7.4") [ php.extensions.hash ]; doCheck = true; diff --git a/pkgs/development/tools/misc/drush/default.nix b/pkgs/development/tools/misc/drush/default.nix index 32d9975e332..70e7f42c5c2 100644 --- a/pkgs/development/tools/misc/drush/default.nix +++ b/pkgs/development/tools/misc/drush/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, php73, which, makeWrapper, bash, coreutils, ncurses }: +{ lib, stdenv, fetchurl, php, which, makeWrapper, bash, coreutils, ncurses }: stdenv.mkDerivation rec { name = "drush-6.1.0"; @@ -32,7 +32,7 @@ stdenv.mkDerivation rec { mkdir -p "$out" cp -r . "$out/src" mkdir "$out/bin" - wrapProgram "$out/src/drush" --prefix PATH : "${lib.makeBinPath [ which php73 bash coreutils ncurses ]}" + wrapProgram "$out/src/drush" --prefix PATH : "${lib.makeBinPath [ which php bash coreutils ncurses ]}" ln -s "$out/src/drush" "$out/bin/drush" ''; } diff --git a/pkgs/servers/http/unit/default.nix b/pkgs/servers/http/unit/default.nix index e8d51f9efff..d8e46231b74 100644 --- a/pkgs/servers/http/unit/default.nix +++ b/pkgs/servers/http/unit/default.nix @@ -2,7 +2,6 @@ , pcre2 , withPython2 ? false, python2 , withPython3 ? true, python3, ncurses -, withPHP73 ? false, php73 , withPHP74 ? true, php74 , withPerl530 ? false, perl530 , withPerl532 ? true, perl532 @@ -26,7 +25,6 @@ let fpmSupport = false; }; - php73-unit = php73.override phpConfig; php74-unit = php74.override phpConfig; in stdenv.mkDerivation rec { @@ -45,7 +43,6 @@ in stdenv.mkDerivation rec { buildInputs = [ pcre2.dev ] ++ optional withPython2 python2 ++ optionals withPython3 [ python3 ncurses ] - ++ optional withPHP73 php73-unit ++ optional withPHP74 php74-unit ++ optional withPerl530 perl530 ++ optional withPerl532 perl532 @@ -64,13 +61,11 @@ in stdenv.mkDerivation rec { ++ optional withDebug "--debug"; # Optionally add the PHP derivations used so they can be addressed in the configs - usedPhp73 = optionals withPHP73 php73-unit; usedPhp74 = optionals withPHP74 php74-unit; postConfigure = '' ${optionalString withPython2 "./configure python --module=python2 --config=python2-config --lib-path=${python2}/lib"} ${optionalString withPython3 "./configure python --module=python3 --config=python3-config --lib-path=${python3}/lib"} - ${optionalString withPHP73 "./configure php --module=php73 --config=${php73-unit.unwrapped.dev}/bin/php-config --lib-path=${php73-unit}/lib"} ${optionalString withPHP74 "./configure php --module=php74 --config=${php74-unit.unwrapped.dev}/bin/php-config --lib-path=${php74-unit}/lib"} ${optionalString withPerl530 "./configure perl --module=perl530 --perl=${perl530}/bin/perl"} ${optionalString withPerl532 "./configure perl --module=perl532 --perl=${perl532}/bin/perl"} diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index 4429742fbe6..cd4ad8b1a7a 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -528,6 +528,11 @@ mapAliases ({ pgp-tools = signing-party; # added 2017-03-26 pg_tmp = ephemeralpg; # added 2018-01-16 + # Obsolete PHP version aliases + php73 = throw "php73 has been dropped due to the lack of maintanence from upstream for future releases."; # added 2021-06-03 + php73Packages = php73; # added 2021-06-03 + php73Extensions = php73; # added 2021-06-03 + php-embed = throw '' php*-embed has been dropped, you can build something similar with the following snippet: @@ -541,8 +546,8 @@ mapAliases ({ similar with the following snippet: (php74.override { embedSupport = true; apxs2Support = false; }).packages ''; # added 2020-04-01 - php74Packages-embed = phpPackages-embed; php73Packages-embed = phpPackages-embed; + php74Packages-embed = phpPackages-embed; php-unit = throw '' php*-unit has been dropped, you can build something similar with @@ -571,8 +576,8 @@ mapAliases ({ fpmSupport = false; }).packages ''; # added 2020-04-01 - php74Packages-unit = phpPackages-unit; php73Packages-unit = phpPackages-unit; + php74Packages-unit = phpPackages-unit; pidgin-with-plugins = pidgin; # added 2016-06 pidginlatex = pidgin-latex; # added 2018-01-08 diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 70bfe841573..8a4661c18e3 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -12306,13 +12306,6 @@ in php74Extensions = recurseIntoAttrs php74.extensions; php74Packages = recurseIntoAttrs php74.packages; - # Import PHP73 interpreter, extensions and packages - php73 = callPackage ../development/interpreters/php/7.3.nix { - stdenv = if stdenv.cc.isClang then llvmPackages_6.stdenv else stdenv; - }; - php73Extensions = recurseIntoAttrs php73.extensions; - php73Packages = recurseIntoAttrs php73.packages; - picoc = callPackage ../development/interpreters/picoc {}; diff --git a/pkgs/top-level/php-packages.nix b/pkgs/top-level/php-packages.nix index f7527d4df2a..e44efb0b952 100644 --- a/pkgs/top-level/php-packages.nix +++ b/pkgs/top-level/php-packages.nix @@ -1,6 +1,6 @@ { stdenv, lib, pkgs, fetchgit, phpPackage, autoconf, pkg-config, re2c , gettext, bzip2, curl, libxml2, openssl, gmp, icu64, oniguruma, libsodium -, html-tidy, libzip, zlib, pcre, pcre2, libxslt, aspell, openldap, cyrus_sasl +, html-tidy, libzip, zlib, pcre2, libxslt, aspell, openldap, cyrus_sasl , uwimap, pam, libiconv, enchant1, libXpm, gd, libwebp, libjpeg, libpng , freetype, libffi, freetds, postgresql, sqlite, net-snmp, unixODBC, libedit , readline, rsync, fetchpatch, valgrind @@ -19,8 +19,6 @@ lib.makeScope pkgs.newScope (self: with self; { pname = "php-${pname}"; }); - pcre' = if (lib.versionAtLeast php.version "7.3") then pcre2 else pcre; - php = phpPackage; # This is a set of interactive tools based on PHP. @@ -297,8 +295,8 @@ lib.makeScope pkgs.newScope (self: with self; { doCheck = false; } { name = "exif"; doCheck = false; } { name = "ffi"; buildInputs = [ libffi ]; enable = lib.versionAtLeast php.version "7.4"; } - { name = "fileinfo"; buildInputs = [ pcre' ]; } - { name = "filter"; buildInputs = [ pcre' ]; } + { name = "fileinfo"; buildInputs = [ pcre2 ]; } + { name = "filter"; buildInputs = [ pcre2 ]; } { name = "ftp"; buildInputs = [ openssl ]; } { name = "gd"; buildInputs = [ zlib gd ]; @@ -350,11 +348,10 @@ lib.makeScope pkgs.newScope (self: with self; { ]; doCheck = false; } { name = "imap"; - buildInputs = [ uwimap openssl pam pcre' ]; + buildInputs = [ uwimap openssl pam pcre2 ]; configureFlags = [ "--with-imap=${uwimap}" "--with-imap-ssl" ]; # uwimap doesn't build on darwin. enable = (!stdenv.isDarwin); } - # interbase (7.3, 7.2) { name = "intl"; buildInputs = [ icu64 ]; patches = lib.optionals (lib.versionOlder php.version "7.4") [ @@ -377,7 +374,7 @@ lib.makeScope pkgs.newScope (self: with self; { ]; doCheck = false; } { name = "mbstring"; buildInputs = [ oniguruma ] ++ lib.optionals (lib.versionAtLeast php.version "8.0") [ - pcre' + pcre2 ]; doCheck = false; } { name = "mysqli"; internalDeps = [ php.extensions.mysqlnd ]; @@ -425,7 +422,7 @@ lib.makeScope pkgs.newScope (self: with self; { # oci8 (7.4, 7.3, 7.2) # odbc (7.4, 7.3, 7.2) { name = "opcache"; - buildInputs = [ pcre' ] ++ lib.optionals (!stdenv.isDarwin && lib.versionAtLeast php.version "8.0") [ + buildInputs = [ pcre2 ] ++ lib.optionals (!stdenv.isDarwin && lib.versionAtLeast php.version "8.0") [ valgrind.dev ]; patches = lib.optionals (lib.versionOlder php.version "7.4") [ @@ -480,7 +477,7 @@ lib.makeScope pkgs.newScope (self: with self; { configureFlags = [ "--with-pdo-sqlite=${sqlite.dev}" ]; doCheck = false; } { name = "pgsql"; - buildInputs = [ pcre' ]; + buildInputs = [ pcre2 ]; configureFlags = [ "--with-pgsql=${postgresql}" ]; doCheck = false; } { name = "posix"; doCheck = false; } @@ -493,11 +490,10 @@ lib.makeScope pkgs.newScope (self: with self; { ''; doCheck = false; } - # recode (7.3, 7.2) { name = "session"; doCheck = !(lib.versionAtLeast php.version "8.0"); } { name = "shmop"; } { name = "simplexml"; - buildInputs = [ libxml2 pcre' ]; + buildInputs = [ libxml2 pcre2 ]; configureFlags = [ "--enable-simplexml" ] # Required to build on darwin. ++ lib.optionals (lib.versionOlder php.version "7.4") [ "--with-libxml-dir=${libxml2.dev}" ]; } @@ -558,7 +554,7 @@ lib.makeScope pkgs.newScope (self: with self; { configureFlags = [ "--with-xsl=${libxslt.dev}" ]; } { name = "zend_test"; } { name = "zip"; - buildInputs = [ libzip pcre' ]; + buildInputs = [ libzip pcre2 ]; configureFlags = [ "--with-zip" ] ++ lib.optionals (lib.versionOlder php.version "7.4") [ "--with-zlib-dir=${zlib.dev}" ] ++ lib.optionals (lib.versionOlder php.version "7.3") [ "--with-libzip" ]; -- cgit 1.4.1 From d0bc04ff70c2849a0e58fb5199dcd04cb72d301b Mon Sep 17 00:00:00 2001 From: Elis Hirwing Date: Thu, 3 Jun 2021 15:35:16 +0200 Subject: php: Upgrade from PHP 7.4 to 8.0 as default PHP --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 2 +- nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ pkgs/applications/misc/rss-bridge-cli/default.nix | 1 - pkgs/development/php-packages/couchbase/default.nix | 2 +- pkgs/development/php-packages/php_excel/default.nix | 3 ++- pkgs/top-level/all-packages.nix | 8 ++++---- 6 files changed, 10 insertions(+), 8 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 5f7b1fc811c..7ac120b693f 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -17,7 +17,7 @@ - PHP now defaults to PHP 8.0, updated from 7.4 + PHP now defaults to PHP 8.0, updated from 7.4. diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 439437f5c09..577d7592935 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -6,6 +6,8 @@ In addition to numerous new and upgraded packages, this release has the followin ## Highlights +* PHP now defaults to PHP 8.0, updated from 7.4. + ## New Services * [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP diff --git a/pkgs/applications/misc/rss-bridge-cli/default.nix b/pkgs/applications/misc/rss-bridge-cli/default.nix index 7550e6bcb95..05d2bca99b1 100644 --- a/pkgs/applications/misc/rss-bridge-cli/default.nix +++ b/pkgs/applications/misc/rss-bridge-cli/default.nix @@ -6,7 +6,6 @@ let curl filter iconv - json mbstring openssl simplexml diff --git a/pkgs/development/php-packages/couchbase/default.nix b/pkgs/development/php-packages/couchbase/default.nix index 24d4e02a328..6d6bdf76e40 100644 --- a/pkgs/development/php-packages/couchbase/default.nix +++ b/pkgs/development/php-packages/couchbase/default.nix @@ -14,7 +14,6 @@ buildPecl { }; configureFlags = [ "--with-couchbase" ]; - broken = lib.versionAtLeast php.version "8.0"; buildInputs = [ libcouchbase zlib ]; internalDeps = lib.optionals (lib.versionOlder php.version "8.0") [ php.extensions.json ]; @@ -45,5 +44,6 @@ buildPecl { '') ]; + meta.broken = lib.versionAtLeast php.version "8.0"; meta.maintainers = lib.teams.php.members; } diff --git a/pkgs/development/php-packages/php_excel/default.nix b/pkgs/development/php-packages/php_excel/default.nix index 8b83f558a53..4effddaed49 100644 --- a/pkgs/development/php-packages/php_excel/default.nix +++ b/pkgs/development/php-packages/php_excel/default.nix @@ -1,4 +1,4 @@ -{ buildPecl, fetchurl, lib, libxl }: +{ buildPecl, fetchurl, lib, libxl, php }: let pname = "php_excel"; phpVersion = "php7"; @@ -20,5 +20,6 @@ buildPecl { "--with-libxl-libdir=${libxl}/lib" ]; + meta.broken = lib.versionAtLeast php.version "8.0"; meta.maintainers = lib.teams.php.members; } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 8a4661c18e3..1adc52577e3 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -1091,7 +1091,7 @@ in }) arangodb_3_3 arangodb_3_4 arangodb_3_5; arangodb = arangodb_3_4; - arcanist = callPackage ../development/tools/misc/arcanist {}; + arcanist = callPackage ../development/tools/misc/arcanist { php = php74; }; arduino = arduino-core.override { withGui = true; }; @@ -12288,7 +12288,7 @@ in # PHP interpreters, packages and extensions. # # Set default PHP interpreter, extensions and packages - php = php74; + php = php80; phpExtensions = php.extensions; phpPackages = php.packages; @@ -19059,7 +19059,7 @@ in dspam = callPackage ../servers/mail/dspam { }; - engelsystem = callPackage ../servers/web-apps/engelsystem { }; + engelsystem = callPackage ../servers/web-apps/engelsystem { php = php74; }; envoy = callPackage ../servers/http/envoy { }; @@ -24940,7 +24940,7 @@ in lrzsz = callPackage ../tools/misc/lrzsz { }; - lsp-plugins = callPackage ../applications/audio/lsp-plugins { }; + lsp-plugins = callPackage ../applications/audio/lsp-plugins { php = php74; }; luminanceHDR = libsForQt5.callPackage ../applications/graphics/luminance-hdr { }; -- cgit 1.4.1 From cfd38a4006163277e2de9cf0810c23ba5d6c7e1d Mon Sep 17 00:00:00 2001 From: Luke Granger-Brown Date: Sun, 6 Jun 2021 21:28:19 +0000 Subject: buildBazelPackage: set fetchConfigured default to true --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 7 +++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 3 +++ pkgs/build-support/build-bazel-package/default.nix | 2 +- 3 files changed, 11 insertions(+), 1 deletion(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 7ac120b693f..adda1025d2f 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -56,6 +56,13 @@ this version for the entire lifecycle of the 21.11 release. + + + Those making use of buildBazelPackage will + need to regenerate the fetch hashes (preferred), or set + fetchConfigured = false;. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 577d7592935..b7a4e13f75e 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -24,4 +24,7 @@ In addition to numerous new and upgraded packages, this release has the followin * PHP 7.3 is no longer supported due to upstream not supporting this version for the entire lifecycle of the 21.11 release. +* Those making use of `buildBazelPackage` will need to regenerate the fetch + hashes (preferred), or set `fetchConfigured = false;`. + ## Other Notable Changes diff --git a/pkgs/build-support/build-bazel-package/default.nix b/pkgs/build-support/build-bazel-package/default.nix index 502be398eaa..198b9c3f617 100644 --- a/pkgs/build-support/build-bazel-package/default.nix +++ b/pkgs/build-support/build-bazel-package/default.nix @@ -35,7 +35,7 @@ args@{ # required for the build as configured, rather than fetching all the dependencies # which may not work in some situations (e.g. Java code which ends up relying on # Debian-specific /usr/share/java paths, but doesn't in the configured build). -, fetchConfigured ? false +, fetchConfigured ? true # Don’t add Bazel --copt and --linkopt from NIX_CFLAGS_COMPILE / # NIX_LDFLAGS. This is necessary when using a custom toolchain which -- cgit 1.4.1 From 9815f9545ee5671f3f6e740ccdd98335d05455ab Mon Sep 17 00:00:00 2001 From: Tom Bereknyei Date: Mon, 7 Jun 2021 11:20:13 -0400 Subject: nixos/doc: add sourcehut to release notes --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 10 +++++++++- nixos/doc/manual/release-notes/rl-2111.section.md | 4 ++++ 2 files changed, 13 insertions(+), 1 deletion(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 7ac120b693f..74bcf3483b2 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -24,7 +24,7 @@
New Services - + geoipupdate, @@ -32,6 +32,14 @@ services.geoipupdate. + + + sourcehut, a + collection of tools useful for software development. Available + as + services.sourcehut. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 577d7592935..451d25a6ed9 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -14,6 +14,10 @@ In addition to numerous new and upgraded packages, this release has the followin database updater from MaxMind. Available as [services.geoipupdate](options.html#opt-services.geoipupdate.enable). +* [sourcehut](https://sr.ht), a collection of tools useful for software + development. Available as + [services.sourcehut](options.html#opt-services.sourcehut.enable). + ## Backward Incompatibilities * The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 -- cgit 1.4.1 From 06c19c70ccfb873fd08ae729ecad4910ca4719be Mon Sep 17 00:00:00 2001 From: Victor Freire Date: Tue, 8 Jun 2021 17:03:10 -0300 Subject: fsharp41: remove --- .../from_md/release-notes/rl-2111.section.xml | 6 + nixos/doc/manual/release-notes/rl-2111.section.md | 2 + pkgs/development/compilers/fsharp41/default.nix | 126 --------------------- ...etFileNameWithoutExtension-type-inference.patch | 13 --- .../fsharp-IsPathRooted-type-inference.patch | 21 ---- .../compilers/fsharp41/fsharp-path-overloads.patch | 22 ---- .../fsharp41/fsharp-string-switchName.patch | 13 --- pkgs/top-level/aliases.nix | 1 + pkgs/top-level/all-packages.nix | 2 - 9 files changed, 9 insertions(+), 197 deletions(-) delete mode 100644 pkgs/development/compilers/fsharp41/default.nix delete mode 100644 pkgs/development/compilers/fsharp41/fsharp-GetFileNameWithoutExtension-type-inference.patch delete mode 100644 pkgs/development/compilers/fsharp41/fsharp-IsPathRooted-type-inference.patch delete mode 100644 pkgs/development/compilers/fsharp41/fsharp-path-overloads.patch delete mode 100644 pkgs/development/compilers/fsharp41/fsharp-string-switchName.patch (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 099fd803ee2..d9a418ffb16 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -71,6 +71,12 @@ fetchConfigured = false;. + + + fsharp41 has been removed in preference to use the latest + dotnet-sdk + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index cd942d2f730..809c17e3f6c 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -31,4 +31,6 @@ In addition to numerous new and upgraded packages, this release has the followin * Those making use of `buildBazelPackage` will need to regenerate the fetch hashes (preferred), or set `fetchConfigured = false;`. +* fsharp41 has been removed in preference to use the latest dotnet-sdk + ## Other Notable Changes diff --git a/pkgs/development/compilers/fsharp41/default.nix b/pkgs/development/compilers/fsharp41/default.nix deleted file mode 100644 index e9f9088df3a..00000000000 --- a/pkgs/development/compilers/fsharp41/default.nix +++ /dev/null @@ -1,126 +0,0 @@ -# Temporaririly avoid dependency on dotnetbuildhelpers to avoid rebuilding many times while working on it - -{ lib, stdenv, fetchurl, pkg-config, autoconf, automake, which, mono, msbuild, dotnetbuildhelpers, dotnetPackages }: - -stdenv.mkDerivation rec { - pname = "fsharp"; - version = "4.1.34"; - - src = fetchurl { - url = "https://github.com/fsharp/fsharp/archive/${version}.tar.gz"; - sha256 = "0cv6p5pin962vhbpsji40nkckkag5c96kq5qihvg60pc1z821p0i"; - }; - - nativeBuildInputs = [ pkg-config ]; - buildInputs = [ - autoconf - automake - which - mono - msbuild - dotnetbuildhelpers - dotnetPackages.FsCheck262 - dotnetPackages.FSharpCompilerTools - dotnetPackages.FSharpCore302 - dotnetPackages.FSharpCore3125 - dotnetPackages.FSharpCore4001 - dotnetPackages.FSharpCore4117 - dotnetPackages.FSharpData225 - dotnetPackages.FsLexYacc706 - dotnetPackages.MicrosoftDiaSymReader - dotnetPackages.MicrosoftDiaSymReaderPortablePdb - dotnetPackages.NUnit350 - dotnetPackages.SystemCollectionsImmutable131 - dotnetPackages.SystemReflectionMetadata - dotnetPackages.SystemValueTuple - ]; - - # https://github.com/mono/mono/tree/fe0f311a848068ab2d17a9b9dd15326e5712d520/packaging/MacSDK/patches - # https://github.com/mono/mono/issues/7805 - patches = [ - ./fsharp-IsPathRooted-type-inference.patch - ./fsharp-string-switchName.patch - ./fsharp-path-overloads.patch - ./fsharp-GetFileNameWithoutExtension-type-inference.patch - ]; - - configurePhase = '' - substituteInPlace ./autogen.sh --replace "/usr/bin/env sh" "${stdenv.shell}" - ./autogen.sh --prefix $out - ''; - - preBuild = '' - substituteInPlace Makefile --replace "MONO_ENV_OPTIONS=\$(monoopts) mono .nuget/NuGet.exe restore packages.config -PackagesDirectory packages -ConfigFile .nuget/NuGet.Config" "true" - substituteInPlace src/fsharp/Fsc-proto/Fsc-proto.fsproj --replace "" "" - substituteInPlace src/fsharp/Fsc-proto/Fsc-proto.fsproj --replace "" "" - substituteInPlace src/fsharp/Fsc-proto/Fsc-proto.fsproj --replace "" "" - substituteInPlace src/fsharp/Fsc-proto/Fsc-proto.fsproj --replace "" "" - - rm -rf packages - mkdir packages - - ln -s ${dotnetPackages.FsCheck262}/lib/dotnet/FsCheck packages/FsCheck.2.6.2 - ln -s ${dotnetPackages.FSharpCompilerTools}/lib/dotnet/FSharp.Compiler.Tools packages/FSharp.Compiler.Tools.4.1.27 - ln -s ${dotnetPackages.FSharpCore302}/lib/dotnet/FSharp.Core/ packages/FSharp.Core.3.0.2 - ln -s ${dotnetPackages.FSharpCore3125}/lib/dotnet/FSharp.Core/ packages/FSharp.Core.3.1.2.5 - ln -s ${dotnetPackages.FSharpCore4001}/lib/dotnet/FSharp.Core/ packages/FSharp.Core.4.0.0.1 - ln -s ${dotnetPackages.FSharpCore4117}/lib/dotnet/FSharp.Core/ packages/FSharp.Core.4.1.17 - ln -s ${dotnetPackages.FSharpData225}/lib/dotnet/FSharp.Data/ packages/FSharp.Data.2.2.5 - ln -s ${dotnetPackages.FsLexYacc706}/lib/dotnet/FsLexYacc/ packages/FsLexYacc.7.0.6 - ln -s ${dotnetPackages.MicrosoftDiaSymReader}/lib/dotnet/Microsoft.DiaSymReader/ packages/Microsoft.DiaSymReader.1.1.0 - ln -s ${dotnetPackages.MicrosoftDiaSymReaderPortablePdb}/lib/dotnet/Microsoft.DiaSymReader.PortablePdb/ packages/Microsoft.DiaSymReader.PortablePdb.1.2.0 - ln -s ${dotnetPackages.NUnit350}/lib/dotnet/NUnit/ packages/NUnit.3.5.0 - ln -s ${dotnetPackages.SystemCollectionsImmutable131}/lib/dotnet/System.Collections.Immutable/ packages/System.Collections.Immutable.1.3.1 - ln -s ${dotnetPackages.SystemReflectionMetadata}/lib/dotnet/System.Reflection.Metadata/ packages/System.Reflection.Metadata.1.4.2 - ln -s ${dotnetPackages.SystemValueTuple}/lib/dotnet/System.ValueTuple/ packages/System.ValueTuple.4.3.1 - ''; - - # Signing /home/jdanek/nix/nixpkgs/build/fss/fsharp-4.1.34/again/fsharp-4.1.34/Release/fsharp30/net40/bin/FSharp.Core.dll with Mono key - # ERROR: Unknown error during processing: System.UnauthorizedAccessException: Access to the path - # "Release/fsharp30/net40/bin/FSharp.Core.dll" is denied. - preInstall = '' - find Release/ -name FSharp.Core.dll -exec chmod u+w {} \; - ''; - - # Set up some symlinks for backwards compatibility. - postInstall = '' - ln -s $out/bin/fsharpc $out/bin/fsc - ln -s $out/bin/fsharpi $out/bin/fsi - for dll in "$out/lib/mono/fsharp"/FSharp*.dll - do - create-pkg-config-for-dll.sh "$out/lib/pkgconfig" "$dll" - done - ''; - - doInstallCheck = true; - installCheckPhase = '' - echo 'printf "int = %i" (6 * 7);;' > script.fsx - $out/bin/fsi --exec script.fsx | grep "int = 42" - $out/bin/fsharpi --exec script.fsx | grep "int = 42" - $out/bin/fsharpiAnyCpu --exec script.fsx | grep "int = 42" - - cat > answer.fs <] -let main argv = - printfn "int = %i" (6 * 7) - 0 -EOF - - $out/bin/fsc answer.fs - ${mono}/bin/mono answer.exe | grep "int = 42" - ''; - - # To fix this error when running: - # The file "/nix/store/path/whatever.exe" is an not a valid CIL image - dontStrip = true; - - meta = { - description = "A functional CLI language"; - homepage = "https://fsharp.org/"; - license = lib.licenses.asl20; - maintainers = with lib.maintainers; [ thoughtpolice raskin ]; - platforms = with lib.platforms; unix; - }; -} diff --git a/pkgs/development/compilers/fsharp41/fsharp-GetFileNameWithoutExtension-type-inference.patch b/pkgs/development/compilers/fsharp41/fsharp-GetFileNameWithoutExtension-type-inference.patch deleted file mode 100644 index 14e9444b1de..00000000000 --- a/pkgs/development/compilers/fsharp41/fsharp-GetFileNameWithoutExtension-type-inference.patch +++ /dev/null @@ -1,13 +0,0 @@ -diff --git a/src/scripts/fssrgen.fsx b/src/scripts/fssrgen.fsx -index 0bee9b79e..e6ceda11e 100644 ---- a/src/scripts/fssrgen.fsx -+++ b/src/scripts/fssrgen.fsx -@@ -329,7 +329,7 @@ let StringBoilerPlate filename = - // END BOILERPLATE - " - --let RunMain(filename, outFilename, outXmlFilenameOpt, projectNameOpt) = -+let RunMain(filename:string, outFilename, outXmlFilenameOpt, projectNameOpt) = - try - let justfilename = System.IO.Path.GetFileNameWithoutExtension(filename) - if justfilename |> Seq.exists (fun c -> not(System.Char.IsLetterOrDigit(c))) then diff --git a/pkgs/development/compilers/fsharp41/fsharp-IsPathRooted-type-inference.patch b/pkgs/development/compilers/fsharp41/fsharp-IsPathRooted-type-inference.patch deleted file mode 100644 index 06dd3e82adc..00000000000 --- a/pkgs/development/compilers/fsharp41/fsharp-IsPathRooted-type-inference.patch +++ /dev/null @@ -1,21 +0,0 @@ -commit c37fce5b3019c7a150203fc3a484885591b194de -Author: Alexis Christoforides -Date: Sun Dec 2 00:10:24 2018 -0500 - - Help Path.IsPathRooted method overload selection. - - .NET Core, and Mono after merging https://github.com/mono/mono/pull/11342, introduce ambiguity with a new overload. - -diff --git a/src/scripts/scriptlib.fsx b/src/scripts/scriptlib.fsx -index cc797e305..699c7bb93 100644 ---- a/src/scripts/scriptlib.fsx -+++ b/src/scripts/scriptlib.fsx -@@ -92,7 +92,7 @@ module Scripting = - - module Process = - -- let processExePath baseDir exe = -+ let processExePath baseDir (exe:string) = - if Path.IsPathRooted(exe) then exe - else - match Path.GetDirectoryName(exe) with diff --git a/pkgs/development/compilers/fsharp41/fsharp-path-overloads.patch b/pkgs/development/compilers/fsharp41/fsharp-path-overloads.patch deleted file mode 100644 index f791317d080..00000000000 --- a/pkgs/development/compilers/fsharp41/fsharp-path-overloads.patch +++ /dev/null @@ -1,22 +0,0 @@ -diff --git a/src/scripts/scriptlib.fsx b/src/scripts/scriptlib.fsx -index cc797e305..ae8a6d3cc 100644 ---- a/src/scripts/scriptlib.fsx -+++ b/src/scripts/scriptlib.fsx -@@ -59,12 +59,12 @@ module Scripting = - - let (++) a b = Path.Combine(a,b) - -- let getBasename a = Path.GetFileNameWithoutExtension a -- let getFullPath a = Path.GetFullPath a -- let getFilename a = Path.GetFileName a -- let getDirectoryName a = Path.GetDirectoryName a -+ let getBasename (path: string) = Path.GetFileNameWithoutExtension path -+ let getFullPath (path: string) = Path.GetFullPath path -+ let getFilename (path: string) = Path.GetFileName path -+ let getDirectoryName (path: string) = Path.GetDirectoryName path - -- let copyFile source dir = -+ let copyFile (source: string) dir = - let dest = - if not (Directory.Exists dir) then Directory.CreateDirectory dir |>ignore - let result = Path.Combine(dir, Path.GetFileName source) diff --git a/pkgs/development/compilers/fsharp41/fsharp-string-switchName.patch b/pkgs/development/compilers/fsharp41/fsharp-string-switchName.patch deleted file mode 100644 index 4b36eaabcaf..00000000000 --- a/pkgs/development/compilers/fsharp41/fsharp-string-switchName.patch +++ /dev/null @@ -1,13 +0,0 @@ -diff --git a/src/scripts/scriptlib.fsx b/src/scripts/scriptlib.fsx -index cc797e305..5a7be7d2b 100644 ---- a/src/scripts/scriptlib.fsx -+++ b/src/scripts/scriptlib.fsx -@@ -36,7 +36,7 @@ module Scripting = - #if INTERACTIVE - let argv = Microsoft.FSharp.Compiler.Interactive.Settings.fsi.CommandLineArgs |> Seq.skip 1 |> Seq.toArray - -- let getCmdLineArgOptional switchName = -+ let getCmdLineArgOptional (switchName: string) = - argv |> Array.filter(fun t -> t.StartsWith(switchName)) |> Array.map(fun t -> t.Remove(0, switchName.Length).Trim()) |> Array.tryHead - - let getCmdLineArg switchName defaultValue = diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index 9415b6e24ae..08d8ed9494f 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -237,6 +237,7 @@ mapAliases ({ ''; font-droid = throw "font-droid has been deprecated by noto-fonts"; # 2019-04-12 foomatic_filters = foomatic-filters; # 2016-08 + fsharp41 = throw "fsharp41 has been removed, please use dotnet-sdk_5 or later"; fuse_exfat = exfat; # 2015-09-11 fuseki = apache-jena-fuseki; # added 2018-04-25 fusesmb = throw "fusesmb is abandoned by upstream"; # added 2019-10-15 diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 453c4758ae4..070b89ce953 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -11103,8 +11103,6 @@ in fsharp = callPackage ../development/compilers/fsharp { }; - fsharp41 = callPackage ../development/compilers/fsharp41 { }; - fstar = callPackage ../development/compilers/fstar { ocamlPackages = ocaml-ng.ocamlPackages_4_07; }; -- cgit 1.4.1 From e52e7335dd0bb1ebd1d6c3da7c9f545e21e34695 Mon Sep 17 00:00:00 2001 From: Victor Freire Date: Wed, 9 Jun 2021 02:23:44 -0300 Subject: nixos/dotnetPackages: remove packages F# packages have been removed for being unmaintaned. --- .../from_md/release-notes/rl-2111.section.xml | 149 +++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 31 ++ pkgs/top-level/dotnet-packages.nix | 480 --------------------- 3 files changed, 180 insertions(+), 480 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index d9a418ffb16..070e7b14293 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -77,6 +77,155 @@ dotnet-sdk + + + The following F#-related packages have been removed for being + unmaintaned. Please use fetchNuGet for + specific packages. + + + + + ExtCore + + + + + Fake + + + + + Fantomas + + + + + FsCheck + + + + + FsCheck262 + + + + + FsCheckNunit + + + + + FSharpAutoComplete + + + + + FSharpCompilerCodeDom + + + + + FSharpCompilerService + + + + + FSharpCompilerTools + + + + + FSharpCore302 + + + + + FSharpCore3125 + + + + + FSharpCore4001 + + + + + FSharpCore4117 + + + + + FSharpData + + + + + FSharpData225 + + + + + FSharpDataSQLProvider + + + + + FSharpFormatting + + + + + FsLexYacc + + + + + FsLexYacc706 + + + + + FsLexYaccRuntime + + + + + FsPickler + + + + + FsUnit + + + + + Projekt + + + + + Suave + + + + + UnionArgParser + + + + + ExcelDnaRegistration + + + + + MathNetNumerics + + + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 809c17e3f6c..c1fde5a032b 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -33,4 +33,35 @@ In addition to numerous new and upgraded packages, this release has the followin * fsharp41 has been removed in preference to use the latest dotnet-sdk +* The following F#-related packages have been removed for being unmaintaned. + Please use `fetchNuGet` for specific packages. + - ExtCore + - Fake + - Fantomas + - FsCheck + - FsCheck262 + - FsCheckNunit + - FSharpAutoComplete + - FSharpCompilerCodeDom + - FSharpCompilerService + - FSharpCompilerTools + - FSharpCore302 + - FSharpCore3125 + - FSharpCore4001 + - FSharpCore4117 + - FSharpData + - FSharpData225 + - FSharpDataSQLProvider + - FSharpFormatting + - FsLexYacc + - FsLexYacc706 + - FsLexYaccRuntime + - FsPickler + - FsUnit + - Projekt + - Suave + - UnionArgParser + - ExcelDnaRegistration + - MathNetNumerics + ## Other Notable Changes diff --git a/pkgs/top-level/dotnet-packages.nix b/pkgs/top-level/dotnet-packages.nix index 55eb5676403..f3310d90b12 100644 --- a/pkgs/top-level/dotnet-packages.nix +++ b/pkgs/top-level/dotnet-packages.nix @@ -8,14 +8,12 @@ , glib , pkg-config , mono -, fsharp , overrides ? {} }: let self = dotnetPackages // overrides; dotnetPackages = with self; { # BINARY PACKAGES - Autofac = fetchNuGet { baseName = "Autofac"; version = "3.5.2"; @@ -23,176 +21,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { outputFiles = [ "lib/portable-net4+sl5+netcore45+wpa81+wp8+MonoAndroid1+MonoTouch1/*" ]; }; - Fake = fetchNuGet { - baseName = "FAKE"; - version = "3.33.0"; - sha256 = "04gllx9d1w8zn9gq9p5k76b79ix07rilk3apdi72dmz6h3yylcdm"; - outputFiles = [ "tools/*" ]; - dllFiles = [ "Fake*.dll" ]; - }; - - Fantomas = fetchNuGet { - baseName = "Fantomas"; - version = "4.4.0"; - sha256 = "cYz0ewJdK9nRlMKmigk3IENfOXvJRhXJfLXshaqgZ6o="; - outputFiles = [ "lib/*" ]; - dllFiles = [ "Fantomas*.dll" ]; - - meta = with lib; { - description = "FSharp source code formatter"; - homepage = "https://github.com/fsprojects/fantomas"; - license = licenses.asl20; - maintainers = [ maintainers.ratsclub ]; - }; - }; - - FSharpCompilerCodeDom = fetchNuGet { - baseName = "FSharp.Compiler.CodeDom"; - version = "0.9.2"; - sha256 = "0cy9gbvmfx2g74m7bgp6x9mr4avb6s560yjii7cyyxb7jlwabfcj"; - outputFiles = [ "lib/net40/*" ]; - }; - - FSharpCore302 = fetchNuGet { - baseName = "FSharp.Core"; - version = "3.0.2"; - sha256 = "1s4pqwbmhrsg5sw8i6dixdri3x0yjyilmkhsf4apfkp80si7d73q"; - outputFiles = [ "*" ]; - }; - - FSharpCore3125 = fetchNuGet { - baseName = "FSharp.Core"; - version = "3.1.2.5"; - sha256 = "0pfvjimrgrffb5rj612gsid044lfpk8g2cxyh9792dc1n8ck5hih"; - outputFiles = [ "*" ]; - }; - - FSharpCore4001 = fetchNuGet { - baseName = "FSharp.Core"; - version = "4.0.0.1"; - sha256 = "0v53iq12ji2d1bkdyg9dn8sz5l93sprrh835amh39dghh8v8vm8k"; - outputFiles = [ "*" ]; - }; - - FSharpCore4117 = fetchNuGet { - baseName = "FSharp.Core"; - version = "4.1.17"; - sha256 = "1yk23ir66fgqm5r6qyf66zf64l0s223l3yd7p9yvbyimyg0hgzb1"; - outputFiles = [ "*" ]; - }; - - FSharpData = fetchNuGet { - baseName = "FSharp.Data"; - version = "4.1.1"; - sha256 = "0ytjiQi8vQQU51JYexnC13Bi7NqVmLRzM75SOZ+hhQU="; - outputFiles = [ "lib/*" ]; - - meta = with lib; { - description = "F# Data: Library for Data Access"; - homepage = "https://fsprojects.github.io/FSharp.Data/"; - license = licenses.asl20; - maintainers = [ maintainers.ratsclub ]; - }; - }; - - FSharpData225 = fetchNuGet { - baseName = "FSharp.Data"; - version = "2.2.5"; - sha256 = "1c9l6bk0d2srccash2980y9phq3kmfm0m76k4wghnysnq94vm724"; - outputFiles = [ "*" ]; - }; - - FSharpDataSQLProvider = fetchNuGet { - baseName = "SQLProvider"; - version = "0.0.9-alpha"; - sha256 = "1wmgr5ca9hh6a7f0s8yc87n6arn7bq6nwc8n4crbbdil4r0bw46w"; - outputFiles = [ "lib/net40/*" ]; - }; - - FsCheck = fetchNuGet { - baseName = "FsCheck"; - version = "1.0.4"; - sha256 = "1q2wk4d4d1q94qzcccgmxb2lh0b8qkmpyz0p7lfphkw2gx6cy5ad"; - outputFiles = [ "lib/net45/*" ]; - }; - - FsCheck262 = fetchNuGet { - baseName = "FsCheck"; - version = "2.6.2"; - sha256 = "0fh9yvsc4i61z31qf00d6gjv6xxd54pv1ykf5bpv95a5crc3qfvl"; - outputFiles = [ "*" ]; - }; - - FsCheckNunit = fetchNuGet { - baseName = "FsCheck.Nunit"; - version = "1.0.4"; - sha256 = "1s62jrsa5hxqy1ginl8r29rjdc8vbkwmz7mb0hglhwccdqfyr5xy"; - outputFiles = [ "lib/net45/*" ]; - }; - - FSharpCompilerTools = fetchNuGet { - baseName = "FSharp.Compiler.Tools"; - version = "4.1.27"; - sha256 = "1m3hl8ja9gp5ajxmjf7bnq24bbkd6kx7yhxf4zb8si27h1n9l6dl"; - outputFiles = [ "*" ]; - }; - - FsLexYacc = fetchNuGet { - baseName = "FsLexYacc"; - version = "6.1.0"; - sha256 = "1v5myn62zqs431i046gscqw2v0c969fc7pdplx7z9cnpy0p2s4rv"; - outputFiles = [ "build/*" ]; - }; - - FsLexYacc706 = fetchNuGet { - baseName = "FsLexYacc"; - version = "7.0.6"; - sha256 = "0xwiq8q5q6ga6zj24w83ch5csbv405xcg6jg2hmnjic0npz0drk2"; - outputFiles = [ "*" ]; - }; - - FsLexYaccRuntime = fetchNuGet { - baseName = "FsLexYacc.Runtime"; - version = "6.1.0"; - sha256 = "18vrx4lxsn4hkfishg4abv0d4q21dsph0bm4mdq5z8afaypp5cr7"; - outputFiles = [ "lib/net40/*" ]; - }; - - FsPickler = fetchNuGet { - baseName = "FsPickler"; - version = "1.2.9"; - sha256 = "12fgcj7pvffsj1s1kaz15j22i1n98dy5mf4z84555xdf7mw7dpm4"; - outputFiles = [ "lib/net45/*" ]; - }; - - FsUnit = fetchNuGet { - baseName = "FsUnit"; - version = "1.3.0.1"; - sha256 = "1k7w8pc81aplsfn7n46617khmzingd2v7hcgdhh7vgsssibwms64"; - outputFiles = [ "Lib/Net40/*" ]; - }; - - FSharpFormatting = fetchNuGet { - baseName = "FSharp.Formatting"; - version = "11.2.0"; - sha256 = "4IMrd+jpRZw+vBXx4X89/B/Fdpiuy2hwtmQNGWQp0wM="; - outputFiles = [ "lib/*" ]; - postUnpack = '' - chmod -R a+r $sourceRoot - ''; - - meta = with lib; { - description = "F# tools for generating documentation (Markdown processor and F# code formatter)"; - homepage = "https://fsprojects.github.io/FSharp.Formatting/"; - longDescription = '' - The FSharp.Formatting package includes libraries and tools for processing F# script files, - markdown and components for documentation generation. - ''; - license = licenses.asl20; - maintainers = [ maintainers.ratsclub ]; - }; - }; - NUnit3 = fetchNuGet { baseName = "NUnit"; version = "3.0.1"; @@ -349,15 +177,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { sha256 = "19fhdgd35yg52gyckhgwrphq07nv7v7r73hcg69ns94xfg1i6r7i"; outputFiles = [ "*" ]; }; - - Suave = fetchNuGet { - baseName = "Suave"; - version = "0.29.0"; - propagatedBuildInputs = [ FsPickler ]; - sha256 = "0rgqy0afwm50gq5ca94w16s565yx5wf961683ghfld6ir0k3dhln"; - outputFiles = [ "lib/net40/*" ]; - }; - # SOURCE PACKAGES Boogie = buildDotnetPackage rec { @@ -518,164 +337,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { }; }; - ExcelDnaRegistration = buildDotnetPackage rec { - baseName = "Excel-DNA.Registration"; - version = "git-" + (builtins.substring 0 10 rev); - rev = "69abb1b3528f40dbcf425e13690aaeab5f707bb6"; - - src = fetchFromGitHub { - inherit rev; - owner = "Excel-DNA"; - repo = "Registration"; - sha256 = "094932h6r2f4x9r5mnw8rm4jzz8vkfv90d95qi3h0i89ws2dnn07"; - }; - - buildInputs = [ - fsharp - dotnetPackages.ExcelDna - ]; - - xBuildFiles = [ "Source/ExcelDna.Registration/ExcelDna.Registration.csproj" "Source/ExcelDna.Registration.FSharp/ExcelDna.Registration.FSharp.fsproj" ]; - outputFiles = [ "Source/ExcelDna.Registration/bin/Release/*" "Source/ExcelDna.Registration.FSharp/bin/Release/*FSharp*" ]; - - meta = { - description = "This library implements helper functions to assist and modify the Excel-DNA function registration"; - homepage = "https://github.com/Excel-DNA/Registration"; - license = lib.licenses.mit; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - }; - }; - - ExtCore = buildDotnetPackage { - baseName = "ExtCore"; - version = "0.8.46"; - - src = fetchFromGitHub { - owner = "jack-pappas"; - repo = "ExtCore"; - rev = "0269b6d3c479f45abd7aa983aaeca08d07473943"; - sha256 = "1kxkiszpvqisffhd6wciha8j3dhkq06w9c540bmq8zixa4xaj83p"; - }; - - buildInputs = [ - fsharp - dotnetPackages.NUnit - dotnetPackages.FsCheck - ]; - - postConfigure = '' - # Fix case - sed -i -e s,nuget.targets,NuGet.targets, ExtCore.Tests/ExtCore.Tests.fsproj - ''; - - xBuildFlags = [ "/p:Configuration=Release (net45)" ]; - outputFiles = [ "ExtCore/bin/net45/Release/*" ]; - - meta = { - description = "ExtCore is an extended core library for F#"; - homepage = "https://github.com/jack-pappas/ExtCore"; - license = lib.licenses.asl20; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - broken = true; - }; - }; - - FSharpAutoComplete = buildDotnetPackage rec { - baseName = "FSharp.AutoComplete"; - version = "0.18.2"; - - src = fetchFromGitHub { - owner = "fsharp"; - repo = "FSharp.AutoComplete"; - rev = version; - sha256 = "1ikl72003xzqq2dc8i6h404hnq3q5g1p1q4rmzz9bdm7282q2jgs"; - }; - - buildInputs = [ - fsharp - glib - dotnetPackages.FSharpCompilerService - dotnetPackages.NewtonsoftJson - dotnetPackages.NDeskOptions - ]; - - outputFiles = [ "FSharp.AutoComplete/bin/Release/*" ]; - - meta = { - description = "An interface to the FSharp.Compiler.Service project"; - longDescription = '' - This project provides a command-line interface to the - FSharp.Compiler.Service project. It is intended to be used as a backend - service for rich editing or 'intellisense' features for editors. - ''; - homepage = "https://github.com/fsharp/FSharp.AutoComplete"; - license = lib.licenses.asl20; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - }; - }; - - FSharpCompilerService = buildDotnetPackage { - baseName = "FSharp.Compiler.Service"; - version = "0.0.90"; - - src = fetchFromGitHub { - owner = "fsharp"; - repo = "FSharp.Compiler.Service"; - rev = "a87939ab3f3c571cad79bc3b5f298aa3e180e6b3"; - sha256 = "0axr38q8m0h11hhbxg5myd1wwfgysadriln8c7bqsv5sf9djihvd"; - }; - - buildInputs = [ - fsharp - dotnetPackages.NUnit - ]; - - outputFiles = [ "bin/v4.5/*" ]; - - meta = { - description = "The F# compiler services package is a component derived from the F# compiler source code that exposes additional functionality for implementing F# language bindings"; - homepage = "https://fsharp.github.io/FSharp.Compiler.Service/"; - license = lib.licenses.asl20; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - }; - }; - - # FSharpxExtras = buildDotnetPackage rec { - # baseName = "FSharpx.Extras"; - # version = "1.8.41"; - # - # src = fetchurl { - # name = "${baseName}-${version}.tar.gz"; - # url = "https://github.com/fsprojects/FSharpx.Extras/archive/${version}.tar.gz"; - # sha256 = "102z5bvk3ffi1crgyp51488vamv41fsf61n8x8pdiznq155zydhl"; - # }; - # - # buildInputs = [ - # fsharp - # dotnetPackages.NUnit - # dotnetPackages.FsCheck - # dotnetPackages.FsCheckNunit - # dotnetPackages.FsUnit - # ]; - # - # patches = [ ./disable_excel.patch ]; - # - # xBuildFiles = [ "FSharpx.WithTypeProviders.sln" ]; - # outputFiles = [ "build/*" ]; - # - # meta = { - # description = "FSharpx.Extras is a collection of libraries and tools for use with F#"; - # homepage = "https://fsprojects.github.io/FSharpx.Extras/"; - # license = lib.licenses.asl20; - # maintainers = with lib.maintainers; [ obadz ]; - # platforms = with lib.platforms; linux; - # }; - # }; - GitVersionTree = buildDotnetPackage { baseName = "GitVersionTree"; version = "2013-10-01"; @@ -724,30 +385,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { }; }; - MathNetNumerics = buildDotnetPackage rec { - baseName = "MathNet.Numerics"; - version = "3.7.0"; - - src = fetchurl { - name = "${baseName}-${version}.tar.gz"; - url = "https://github.com/mathnet/mathnet-numerics/archive/v${version}.tar.gz"; - sha256 = "1yq6aqmc2gwh96z544qn83kby01lv1lsxm158hq0bimv2i9yywc7"; - }; - - buildInputs = [ fsharp ]; - - xBuildFiles = [ "MathNet.Numerics.sln" ]; - outputFiles = [ "out/lib/Net40/*" "src/FSharp/MathNet.Numerics.fsx" "src/FSharp/MathNet.Numerics.IfSharp.fsx" ]; - - meta = { - description = "Math.NET Numerics is an opensource numerical library for .Net, Silverlight and Mono"; - homepage = "https://numerics.mathdotnet.com/"; - license = lib.licenses.mit; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - }; - }; - MonoAddins = buildDotnetPackage rec { baseName = "Mono.Addins"; version = "1.2"; @@ -780,62 +417,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { }; }; - # MonoDevelopFSharpBinding = buildDotnetPackage rec { - # baseName = "MonoDevelop.FSharpBinding"; - # version = "git-a09c8185eb"; - - # broken = true; - - # src = fetchFromGitHub { - # owner = "fsharp"; - # repo = "fsharpbinding"; - # rev = "a09c8185ebf23fe2f7d22b14b4af2e3268d4f011"; - # sha256 = "1zp5gig42s1h681kch0rw5ykbbj0mcsmdvpyz1319wy9s7n2ng91"; - # }; - - # buildInputs = [ - # fsharp - # monodevelop - # pkgs.gtk-sharp - # pkgs.gnome-sharp - # dotnetPackages.ExtCore - # dotnetPackages.FSharpCompilerService - # dotnetPackages.FSharpCompilerCodeDom - # dotnetPackages.FSharpAutoComplete - # dotnetPackages.Fantomas - # ]; - - # patches = [ - # ../development/dotnet-modules/patches/monodevelop-fsharpbinding.references.patch - # ../development/dotnet-modules/patches/monodevelop-fsharpbinding.addin-xml.patch - # ]; - - # preConfigure = '' - # substituteInPlace monodevelop/configure.fsx --replace /usr/lib/monodevelop ${monodevelop}/lib/monodevelop - # substituteInPlace monodevelop/configure.fsx --replace bin/MonoDevelop.exe ../../bin/monodevelop - # (cd monodevelop; fsharpi ./configure.fsx) - # ''; - - # # This will not work as monodevelop probably looks in absolute nix store path rather than path - # # relative to its executable. Need to ln -s /run/current-system/sw/lib/dotnet/MonoDevelop.FSharpBinding - # # ~/.local/share/MonoDevelop-5.0/LocalInstall/Addins/ to install until we have a better way - - # # postInstall = '' - # # mkdir -p "$out/lib/monodevelop/AddIns" - # # ln -sv "$out/lib/dotnet/${baseName}" "$out/lib/monodevelop/AddIns" - # # ''; - - # xBuildFiles = [ "monodevelop/MonoDevelop.FSharpBinding/MonoDevelop.FSharp.mac-linux.fsproj" ]; - # outputFiles = [ "monodevelop/bin/mac-linux/Release/*" ]; - - # meta = { - # description = "F# addin for MonoDevelop 5.9"; - # homepage = "https://github.com/fsharp/fsharpbinding/tree/5.9"; - # license = lib.licenses.asl20; - # maintainers = with lib.maintainers; [ obadz ]; - # platforms = with lib.platforms; linux; - # }; - # }; NDeskOptions = stdenv.mkDerivation rec { pname = "NDesk.Options"; @@ -900,67 +481,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { outputFiles = [ "*" ]; }; - Projekt = buildDotnetPackage rec { - baseName = "projekt"; - version = "git-" + (builtins.substring 0 10 rev); - rev = "715a21e5cd3c86310387562618b04e979d0ec9c4"; - - src = fetchFromGitHub { - inherit rev; - owner = "kjnilsson"; - repo = "projekt"; - sha256 = "1ph3af07wmia6qkiq1qlywaj2xh6zn5drdx19dwb1g3237h5fnz0"; - }; - - buildInputs = [ - fsharp - dotnetPackages.UnionArgParser - dotnetPackages.FsUnit - ]; - - preConfigure = '' - sed -i -e "s/FSharp.Core, Version=\$(TargetFSharpCoreVersion), Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a/FSharp.Core/" src/Projekt/Projekt.fsproj - ''; - - outputFiles = [ "src/Projekt/bin/Release/*" ]; - - meta = { - description = "A command-line tool for manipulating F# project files"; - homepage = "https://github.com/kjnilsson/projekt"; - license = lib.licenses.mit; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - }; - }; - - UnionArgParser = buildDotnetPackage { - baseName = "UnionArgParser"; - version = "0.8.7"; - - src = fetchFromGitHub { - owner = "nessos"; - repo = "UnionArgParser"; - rev = "acaeb946e53cbb0bd9768977c656b3242146070a"; - sha256 = "1yrs7ycf2hg7h8z6vm9lr7i3gr9s30k74fr2maigdydnnls93als"; - }; - - buildInputs = [ - fsharp - dotnetPackages.NUnit - dotnetPackages.FsUnit - ]; - - outputFiles = [ "bin/net40/*" ]; - - meta = { - description = "A declarative CLI argument/XML configuration parser for F# applications"; - homepage = "https://nessos.github.io/UnionArgParser/"; - license = lib.licenses.mit; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - }; - }; - YamlDotNet = fetchNuGet { baseName = "YamlDotNet"; version = "11.1.1"; -- cgit 1.4.1 From b9763370a940d7ed37b12f57e43716eba0a2ad19 Mon Sep 17 00:00:00 2001 From: Maciej Krüger Date: Thu, 10 Jun 2021 07:01:21 +0200 Subject: release-notes: mention x2goserver rename --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 6 ++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ 2 files changed, 8 insertions(+) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 070e7b14293..781734a189a 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -226,6 +226,12 @@ + + + programs.x2goserver is now + services.x2goserver + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index c1fde5a032b..3a29b29f106 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -64,4 +64,6 @@ In addition to numerous new and upgraded packages, this release has the followin - ExcelDnaRegistration - MathNetNumerics +* `programs.x2goserver` is now `services.x2goserver` + ## Other Notable Changes -- cgit 1.4.1 From 0db88d9a1ccadefac276bd839c08fbae9917b35b Mon Sep 17 00:00:00 2001 From: Victor Freire Date: Wed, 9 Jun 2021 04:22:14 -0300 Subject: nixos/dotnetPackages: remove packages --- .../from_md/release-notes/rl-2111.section.xml | 69 +++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 15 ++ pkgs/top-level/dotnet-packages.nix | 171 --------------------- 3 files changed, 84 insertions(+), 171 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 781734a189a..35f8f91a21b 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -232,6 +232,75 @@ services.x2goserver + + + The following dotnet-related packages have been removed for + being unmaintaned. Please use fetchNuGet + for specific packages. + + + + + Autofac + + + + + SystemValueTuple + + + + + MicrosoftDiaSymReader + + + + + MicrosoftDiaSymReaderPortablePdb + + + + + SystemCollectionsImmutable + + + + + SystemCollectionsImmutable131 + + + + + SystemReflectionMetadata + + + + + NUnit350 + + + + + Deedle + + + + + ExcelDna + + + + + GitVersionTree + + + + + NDeskOptions + + + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 3a29b29f106..a199bcfef35 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -66,4 +66,19 @@ In addition to numerous new and upgraded packages, this release has the followin * `programs.x2goserver` is now `services.x2goserver` +* The following dotnet-related packages have been removed for being unmaintaned. + Please use `fetchNuGet` for specific packages. + - Autofac + - SystemValueTuple + - MicrosoftDiaSymReader + - MicrosoftDiaSymReaderPortablePdb + - SystemCollectionsImmutable + - SystemCollectionsImmutable131 + - SystemReflectionMetadata + - NUnit350 + - Deedle + - ExcelDna + - GitVersionTree + - NDeskOptions + ## Other Notable Changes diff --git a/pkgs/top-level/dotnet-packages.nix b/pkgs/top-level/dotnet-packages.nix index 4dc848c08c6..6a189c0005a 100644 --- a/pkgs/top-level/dotnet-packages.nix +++ b/pkgs/top-level/dotnet-packages.nix @@ -14,12 +14,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { # BINARY PACKAGES - Autofac = fetchNuGet { - baseName = "Autofac"; - version = "3.5.2"; - sha256 = "194cs8ybn5xjqnzy643w5i62m0d5s34d3nshwxp2v4fcb94wa4ri"; - outputFiles = [ "lib/portable-net4+sl5+netcore45+wpa81+wp8+MonoAndroid1+MonoTouch1/*" ]; - }; NUnit3 = fetchNuGet { baseName = "NUnit"; @@ -28,13 +22,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { outputFiles = [ "lib/*" ]; }; - NUnit350 = fetchNuGet { - baseName = "NUnit"; - version = "3.5.0"; - sha256 = "19fxq9cf754ygda5c8rn1zqs71pfxi7mb96jwqhlichnqih6i16z"; - outputFiles = [ "*" ]; - }; - NUnit2 = fetchNuGet { baseName = "NUnit"; version = "2.6.4"; @@ -86,13 +73,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { outputFiles = [ "tools/*" ]; }; - SystemValueTuple = fetchNuGet { - baseName = "System.ValueTuple"; - version = "4.3.1"; - sha256 = "0qzq878s66yfkf4n2b9af8lw2bx45s3cg6mi0w8w0bi358fa7q70"; - outputFiles = [ "*" ]; - }; - RestSharp = fetchNuGet { baseName = "RestSharp"; version = "105.2.3"; @@ -135,20 +115,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { outputFiles = [ "lib/*" ]; }; - MicrosoftDiaSymReader = fetchNuGet { - baseName = "Microsoft.DiaSymReader"; - version = "1.1.0"; - sha256 = "04dgwy6nyxksd1nb24k5c5vz8naggg7hryadvwqnm2v3alkh6g88"; - outputFiles = [ "*" ]; - }; - - MicrosoftDiaSymReaderPortablePdb = fetchNuGet { - baseName = "Microsoft.DiaSymReader.PortablePdb"; - version = "1.2.0"; - sha256 = "0qa8sqg0lzz9galkkfyi8rkbkali0nxm3qd5y4dlxp96ngrq5ldz"; - outputFiles = [ "*" ]; - }; - NUnitRunners = fetchNuGet { baseName = "NUnit.Runners"; version = "2.6.4"; @@ -157,26 +123,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { preInstall = "mv -v tools/lib/* tools && rmdir -v tools/lib"; }; - SystemCollectionsImmutable = fetchNuGet { - baseName = "System.Collections.Immutable"; - version = "1.1.36"; - sha256 = "0760kzf5s771pnvnxsgas446kqdh1b71w6g3k75jpzldfmsd3vyq"; - outputFiles = [ "lib/portable-net45+win8+wp8+wpa81/*" ]; - }; - - SystemCollectionsImmutable131 = fetchNuGet { - baseName = "System.Collections.Immutable"; - version = "1.3.1"; - sha256 = "149fcp7k7r9iw24dv5hbaij0c38kcv28dyhzbkggilfh4x2hy8c2"; - outputFiles = [ "*" ]; - }; - - SystemReflectionMetadata = fetchNuGet { - baseName = "System.Reflection.Metadata"; - version = "1.4.2"; - sha256 = "19fhdgd35yg52gyckhgwrphq07nv7v7r73hcg69ns94xfg1i6r7i"; - outputFiles = [ "*" ]; - }; # SOURCE PACKAGES Boogie = buildDotnetPackage rec { @@ -300,91 +246,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { }; }; - Deedle = fetchNuGet { - baseName = "Deedle"; - version = "1.2.5"; - sha256 = "0g19ll6bp97ixprcnpwwvshr1n9jxxf9xjhkxp0r63mg46z48jnw"; - outputFiles = [ "*" ]; - }; - - ExcelDna = buildDotnetPackage { - baseName = "Excel-DNA"; - version = "0.32.0"; - - src = fetchFromGitHub { - owner = "Excel-DNA"; - repo = "ExcelDna"; - rev = "10a163843bcc2fb5517f6f3d499e18a8b64df511"; - sha256 = "1w2ag9na20ly0m2sic3nkgdc4qqyb4x4c9iv588ynpkgd1pjndrk"; - }; - - buildInputs = [ ]; - - preConfigure = '' - rm -vf Distribution/*.dll Distribution/*.exe # Make sure we don't use those - substituteInPlace Source/ExcelDna.Integration/ExcelDna.Integration.csproj --replace LogDisplay.designer.cs LogDisplay.Designer.cs - ''; - - xBuildFiles = [ "Source/ExcelDna.sln" ]; - outputFiles = [ "Source/ExcelDnaPack/bin/Release/*" "Distribution/ExcelDna.xll" "Distribution/ExcelDna64.xll" ]; - - meta = { - description = "Excel-DNA is an independent project to integrate .NET into Excel"; - homepage = "https://excel-dna.net/"; - license = lib.licenses.mit; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - }; - }; - - GitVersionTree = buildDotnetPackage { - baseName = "GitVersionTree"; - version = "2013-10-01"; - - src = fetchFromGitHub { - owner = "crc8"; - repo = "GitVersionTree"; - rev = "58dc39c43cffea44f721ee4425835e56518f7da2"; - sha256 = "0mna5pkpqkdr5jgn8paz004h1pa24ncsvmi2c8s4gp94nfw34x05"; - }; - - buildInputs = with pkgs; [ ed ]; - - postPatch = '' - ed -v -p: -s GitVersionTree/Program.cs << EOF - /Main() - c - static void Main(string[] args) - . - /EnableVisualStyles - i - Reg.Write("GitPath", "${pkgs.gitMinimal}/bin/git"); - Reg.Write("GraphvizPath", "${pkgs.graphviz}/bin/dot"); - if (args.Length > 0) { - Reg.Write("GitRepositoryPath", args[0]); - } - . - w - EOF - - substituteInPlace GitVersionTree/Forms/MainForm.cs \ - --replace 'Directory.GetParent(Application.ExecutablePath)' 'Environment.CurrentDirectory' \ - --replace '\\' '/' \ - --replace '@"\"' '"/"' - ''; - - outputFiles = [ "GitVersionTree/bin/Release/*" ]; - exeFiles = [ "GitVersionTree.exe" ]; - - meta = with lib; { - description = "A tool to help visualize git revisions and branches"; - homepage = "https://github.com/crc8/GitVersionTree"; - license = licenses.gpl2; - maintainers = with maintainers; [ obadz ]; - platforms = platforms.all; - }; - }; - MonoAddins = buildDotnetPackage rec { baseName = "Mono.Addins"; version = "1.2"; @@ -417,38 +278,6 @@ let self = dotnetPackages // overrides; dotnetPackages = with self; { }; }; - - NDeskOptions = stdenv.mkDerivation rec { - pname = "NDesk.Options"; - version = "0.2.1"; - - src = fetchurl { - name = "${pname}-${version}.tar.gz"; - url = "http://www.ndesk.org/archive/ndesk-options/ndesk-options-${version}.tar.gz"; - sha256 = "1y25bfapafwmifakjzyb9c70qqpvza8g5j2jpf08j8wwzkrb6r28"; - }; - - buildInputs = [ - mono - pkg-config - ]; - - postInstall = '' - # Otherwise pkg-config won't find it and the DLL will get duplicated - ln -sv $out/lib/pkgconfig/ndesk-options.pc $out/lib/pkgconfig/NDesk.Options.pc - ''; - - dontStrip = true; - - meta = { - description = "A callback-based program option parser for C#"; - homepage = "http://www.ndesk.org/Options"; - license = lib.licenses.mit; - maintainers = with lib.maintainers; [ obadz ]; - platforms = with lib.platforms; linux; - }; - }; - NewtonsoftJson = fetchNuGet { baseName = "Newtonsoft.Json"; version = "11.0.2"; -- cgit 1.4.1 From 8673a40eda6784a33f8e03521e9132ebe557d94f Mon Sep 17 00:00:00 2001 From: Alvar Penning Date: Sun, 13 Jun 2021 22:00:09 +0200 Subject: nixos/ucarp: init --- .../from_md/release-notes/rl-2111.section.xml | 8 + nixos/doc/manual/release-notes/rl-2111.section.md | 4 + nixos/modules/module-list.nix | 1 + nixos/modules/services/networking/ucarp.nix | 183 +++++++++++++++++++++ 4 files changed, 196 insertions(+) create mode 100644 nixos/modules/services/networking/ucarp.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 781734a189a..72fee8d16d0 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -40,6 +40,14 @@ services.sourcehut. + + + ucarp, + an userspace implementation of the Common Address Redundancy + Protocol (CARP). Available as + networking.ucarp. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 3a29b29f106..1aa22b3a4b6 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -18,6 +18,10 @@ In addition to numerous new and upgraded packages, this release has the followin development. Available as [services.sourcehut](options.html#opt-services.sourcehut.enable). +* [ucarp](https://download.pureftpd.org/pub/ucarp/README), an userspace + implementation of the Common Address Redundancy Protocol (CARP). Available as + [networking.ucarp](options.html#opt-networking.ucarp.enable). + ## Backward Incompatibilities * The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 2938f79fb16..1a4c2fb719d 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -839,6 +839,7 @@ ./services/networking/tox-node.nix ./services/networking/toxvpn.nix ./services/networking/tvheadend.nix + ./services/networking/ucarp.nix ./services/networking/unbound.nix ./services/networking/unifi.nix ./services/networking/v2ray.nix diff --git a/nixos/modules/services/networking/ucarp.nix b/nixos/modules/services/networking/ucarp.nix new file mode 100644 index 00000000000..9b19a19687b --- /dev/null +++ b/nixos/modules/services/networking/ucarp.nix @@ -0,0 +1,183 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.networking.ucarp; + + ucarpExec = concatStringsSep " " ( + [ + "${cfg.package}/bin/ucarp" + "--interface=${cfg.interface}" + "--srcip=${cfg.srcIp}" + "--vhid=${toString cfg.vhId}" + "--passfile=${cfg.passwordFile}" + "--addr=${cfg.addr}" + "--advbase=${toString cfg.advBase}" + "--advskew=${toString cfg.advSkew}" + "--upscript=${cfg.upscript}" + "--downscript=${cfg.downscript}" + "--deadratio=${toString cfg.deadratio}" + ] + ++ (optional cfg.preempt "--preempt") + ++ (optional cfg.neutral "--neutral") + ++ (optional cfg.shutdown "--shutdown") + ++ (optional cfg.ignoreIfState "--ignoreifstate") + ++ (optional cfg.noMcast "--nomcast") + ++ (optional (cfg.extraParam != null) "--xparam=${cfg.extraParam}") + ); +in { + options.networking.ucarp = { + enable = mkEnableOption "ucarp, userspace implementation of CARP"; + + interface = mkOption { + type = types.str; + description = "Network interface to bind to."; + example = "eth0"; + }; + + srcIp = mkOption { + type = types.str; + description = "Source (real) IP address of this host."; + }; + + vhId = mkOption { + type = types.ints.between 1 255; + description = "Virtual IP identifier shared between CARP hosts."; + example = 1; + }; + + passwordFile = mkOption { + type = types.str; + description = "File containing shared password between CARP hosts."; + example = "/run/keys/ucarp-password"; + }; + + preempt = mkOption { + type = types.bool; + description = '' + Enable preemptive failover. + Thus, this host becomes the CARP master as soon as possible. + ''; + default = false; + }; + + neutral = mkOption { + type = types.bool; + description = "Do not run downscript at start if the host is the backup."; + default = false; + }; + + addr = mkOption { + type = types.str; + description = "Virtual shared IP address."; + }; + + advBase = mkOption { + type = types.ints.unsigned; + description = "Advertisement frequency in seconds."; + default = 1; + }; + + advSkew = mkOption { + type = types.ints.unsigned; + description = "Advertisement skew in seconds."; + default = 0; + }; + + upscript = mkOption { + type = types.path; + description = '' + Command to run after become master, the interface name, virtual address + and optional extra parameters are passed as arguments. + ''; + example = '' + pkgs.writeScript "upscript" ''' + #!/bin/sh + $\{pkgs.iproute2\}/bin/ip addr add "$2"/24 dev "$1" + '''; + ''; + }; + + downscript = mkOption { + type = types.path; + description = '' + Command to run after become backup, the interface name, virtual address + and optional extra parameters are passed as arguments. + ''; + example = '' + pkgs.writeScript "downscript" ''' + #!/bin/sh + $\{pkgs.iproute2\}/bin/ip addr del "$2"/24 dev "$1" + '''; + ''; + }; + + deadratio = mkOption { + type = types.ints.unsigned; + description = "Ratio to consider a host as dead."; + default = 3; + }; + + shutdown = mkOption { + type = types.bool; + description = "Call downscript at exit."; + default = false; + }; + + ignoreIfState = mkOption { + type = types.bool; + description = "Ignore interface state, e.g., down or no carrier."; + default = false; + }; + + noMcast = mkOption { + type = types.bool; + description = "Use broadcast instead of multicast advertisements."; + default = false; + }; + + extraParam = mkOption { + type = types.nullOr types.str; + description = "Extra parameter to pass to the up/down scripts."; + default = null; + }; + + package = mkOption { + type = types.package; + description = '' + Package that should be used for ucarp. + + Please note that the default package, pkgs.ucarp, has not received any + upstream updates for a long time and can be considered as unmaintained. + ''; + default = pkgs.ucarp; + defaultText = "pkgs.ucarp"; + }; + }; + + config = mkIf cfg.enable { + systemd.services.ucarp = { + description = "ucarp, userspace implementation of CARP"; + + wantedBy = [ "multi-user.target" ]; + after = [ "network.target" ]; + + serviceConfig = { + Type = "exec"; + ExecStart = ucarpExec; + + ProtectSystem = "strict"; + ProtectHome = true; + PrivateTmp = true; + ProtectClock = true; + ProtectKernelModules = true; + ProtectControlGroups = true; + MemoryDenyWriteExecute = true; + RestrictRealtime = true; + }; + }; + }; + + meta.maintainers = with lib.maintainers; [ oxzi ]; +} -- cgit 1.4.1 From f07dcbef6462c3858c74aabb565892f4608ca06c Mon Sep 17 00:00:00 2001 From: Jan Tojnar Date: Fri, 18 Jun 2021 00:07:00 +0200 Subject: nixos/doc: Synchronize the Markdown generator with Nixpkgs Switch to CommonMark with our extensions. --- doc/Makefile | 5 +++-- .../administration/boot-problems.section.xml | 14 +++++++------- .../from_md/release-notes/rl-2111.section.xml | 12 ++++++------ nixos/doc/manual/md-to-db.sh | 22 ++++++++++++++-------- nixos/doc/manual/release-notes/rl-2111.section.md | 10 +++++----- 5 files changed, 35 insertions(+), 28 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/doc/Makefile b/doc/Makefile index d4f1250c4d7..1d3a0e7ccbd 100644 --- a/doc/Makefile +++ b/doc/Makefile @@ -3,6 +3,7 @@ MD_TARGETS=$(addsuffix .xml, $(basename $(shell find . -type f -regex '.*\.md$$' PANDOC ?= pandoc pandoc_media_dir = media +# NOTE: Keep in sync with NixOS manual (/nixos/doc/manual/md-to-db.sh). # TODO: Remove raw-attribute when we can get rid of DocBook altogether. pandoc_commonmark_enabled_extensions = +attributes+fenced_divs+footnotes+bracketed_spans+definition_lists+pipe_tables+raw_attribute pandoc_flags = --extract-media=$(pandoc_media_dir) \ @@ -101,10 +102,10 @@ functions/library/generated: doc-support/result %.section.xml: %.section.md $(PANDOC) $^ -t docbook \ $(pandoc_flags) \ - | cat > $@ + -o $@ %.chapter.xml: %.chapter.md $(PANDOC) $^ -t docbook \ --top-level-division=chapter \ $(pandoc_flags) \ - | cat > $@ + -o $@ diff --git a/nixos/doc/manual/from_md/administration/boot-problems.section.xml b/nixos/doc/manual/from_md/administration/boot-problems.section.xml index 89871e7aeb6..b484d075818 100644 --- a/nixos/doc/manual/from_md/administration/boot-problems.section.xml +++ b/nixos/doc/manual/from_md/administration/boot-problems.section.xml @@ -3,11 +3,11 @@ If NixOS fails to boot, there are a number of kernel command line parameters that may help you to identify or fix the issue. You can - add these parameters in the GRUB boot menu by pressing - e to modify the selected boot entry and editing the - line starting with linux. The following are some - useful kernel command line parameters that are recognised by the - NixOS boot scripts or by systemd: + add these parameters in the GRUB boot menu by pressing “e” to modify + the selected boot entry and editing the line starting with + linux. The following are some useful kernel + command line parameters that are recognised by the NixOS boot + scripts or by systemd: @@ -44,7 +44,7 @@ Like boot.debug1, but runs stage1 until kernel modules are loaded and device nodes are created. This - may help with e.g. making the keyboard work. + may help with e.g. making the keyboard work. @@ -117,7 +117,7 @@ if you’d chosen ignore the error and continue. - If no login prompts or X11 login screens appear (e.g. due to hanging + If no login prompts or X11 login screens appear (e.g. due to hanging dependencies), you can press Alt+ArrowUp. If you’re lucky, this will start rescue mode (described above). (Also note that since most units have a 90-second timeout before systemd gives up on them, the diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 2b0bcb4b6e5..0908fb13726 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -1,5 +1,5 @@ -
- Release 21.11 (<quote>?</quote>, 2021.11/??) +
+ Release 21.11 (“?”, 2021.11/??) In addition to numerous new and upgraded packages, this release has the following highlights: @@ -12,7 +12,7 @@ -
+
Highlights @@ -22,7 +22,7 @@
-
+
New Services @@ -50,7 +50,7 @@
-
+
Backward Incompatibilities @@ -311,7 +311,7 @@
-
+
Other Notable Changes diff --git a/nixos/doc/manual/md-to-db.sh b/nixos/doc/manual/md-to-db.sh index fc4be7da22b..7949b42e8d8 100755 --- a/nixos/doc/manual/md-to-db.sh +++ b/nixos/doc/manual/md-to-db.sh @@ -8,25 +8,31 @@ DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )" pushd $DIR +# NOTE: Keep in sync with Nixpkgs manual (/doc/Makefile). +# TODO: Remove raw-attribute when we can get rid of DocBook altogether. +pandoc_commonmark_enabled_extensions=+attributes+fenced_divs+footnotes+bracketed_spans+definition_lists+pipe_tables+raw_attribute +pandoc_flags=( + # media extraction and diagram-generator.lua not needed + "--lua-filter=$DIR/../../../doc/labelless-link-is-xref.lua" + -f "commonmark${pandoc_commonmark_enabled_extensions}+smart" + -t docbook +) + OUT="$DIR/from_md" mapfile -t MD_FILES < <(find . -type f -regex '.*\.md$') for mf in ${MD_FILES[*]}; do if [ "${mf: -11}" == ".section.md" ]; then mkdir -p $(dirname "$OUT/$mf") - pandoc "$mf" -t docbook \ - --extract-media=media \ - -f markdown+smart \ - | cat > "$OUT/${mf%".section.md"}.section.xml" + pandoc "$mf" "${pandoc_flags[@]}" \ + -o "$OUT/${mf%".section.md"}.section.xml" fi if [ "${mf: -11}" == ".chapter.md" ]; then mkdir -p $(dirname "$OUT/$mf") - pandoc "$mf" -t docbook \ + pandoc "$mf" "${pandoc_flags[@]}" \ --top-level-division=chapter \ - --extract-media=media \ - -f markdown+smart \ - | cat > "$OUT/${mf%".chapter.md"}.chapter.xml" + -o "$OUT/${mf%".chapter.md"}.chapter.xml" fi done diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 968fdb0f3be..a603f735829 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -1,14 +1,14 @@ -# Release 21.11 (“?”, 2021.11/??) {#release-21.11} +# Release 21.11 (“?”, 2021.11/??) {#sec-release-21.11} In addition to numerous new and upgraded packages, this release has the following highlights: * Support is planned until the end of April 2022, handing over to 22.05. -## Highlights +## Highlights {#sec-release-21.11-highlights} * PHP now defaults to PHP 8.0, updated from 7.4. -## New Services +## New Services {#sec-release-21.11-new-services} * [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP database updater from MaxMind. Available as @@ -22,7 +22,7 @@ In addition to numerous new and upgraded packages, this release has the followin implementation of the Common Address Redundancy Protocol (CARP). Available as [networking.ucarp](options.html#opt-networking.ucarp.enable). -## Backward Incompatibilities +## Backward Incompatibilities {#sec-release-21.11-incompatibilities} * The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 @@ -85,4 +85,4 @@ In addition to numerous new and upgraded packages, this release has the followin - GitVersionTree - NDeskOptions -## Other Notable Changes +## Other Notable Changes {#sec-release-21.11-notable-changes} -- cgit 1.4.1 From b2bf2c610234b8dfa2c3e9db43eb2b4668e5b0e3 Mon Sep 17 00:00:00 2001 From: Olli Helenius Date: Sun, 20 Jun 2021 13:23:37 +0300 Subject: antlr: make 4.8 default --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 6 ++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 3 +++ pkgs/applications/version-management/srcml/default.nix | 4 ++-- pkgs/development/libraries/nco/default.nix | 4 ++-- pkgs/development/python-modules/stringtemplate/default.nix | 4 ++-- pkgs/development/tools/database/sqlitebrowser/default.nix | 4 ++-- pkgs/top-level/all-packages.nix | 4 +++- 7 files changed, 20 insertions(+), 9 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 0908fb13726..2c7935078e3 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -309,6 +309,12 @@ + + + The antlr package now defaults to the 4.x + release instead of the old 2.7.7 version. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index a603f735829..e97aed4ccf2 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -85,4 +85,7 @@ In addition to numerous new and upgraded packages, this release has the followin - GitVersionTree - NDeskOptions +* The `antlr` package now defaults to the 4.x release instead of the + old 2.7.7 version. + ## Other Notable Changes {#sec-release-21.11-notable-changes} diff --git a/pkgs/applications/version-management/srcml/default.nix b/pkgs/applications/version-management/srcml/default.nix index c13a08a711c..11dbfc299a4 100644 --- a/pkgs/applications/version-management/srcml/default.nix +++ b/pkgs/applications/version-management/srcml/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, cmake, libxml2, libxslt, boost, libarchive, python, antlr, +{ lib, stdenv, fetchurl, cmake, libxml2, libxslt, boost, libarchive, python, antlr2, curl }: @@ -22,7 +22,7 @@ stdenv.mkDerivation rec { ./gcc6.patch ]; - nativeBuildInputs = [ cmake antlr ]; + nativeBuildInputs = [ cmake antlr2 ]; buildInputs = [ libxml2 libxslt boost libarchive python curl ]; meta = { diff --git a/pkgs/development/libraries/nco/default.nix b/pkgs/development/libraries/nco/default.nix index 958be905f83..b7df32633b4 100644 --- a/pkgs/development/libraries/nco/default.nix +++ b/pkgs/development/libraries/nco/default.nix @@ -1,10 +1,10 @@ -{ lib, stdenv, fetchzip, netcdf, netcdfcxx4, gsl, udunits, antlr, which, curl, flex, coreutils }: +{ lib, stdenv, fetchzip, netcdf, netcdfcxx4, gsl, udunits, antlr2, which, curl, flex, coreutils }: stdenv.mkDerivation rec { version = "4.9.8"; pname = "nco"; - nativeBuildInputs = [ flex which antlr ]; + nativeBuildInputs = [ flex which antlr2 ]; buildInputs = [ netcdf netcdfcxx4 gsl udunits curl coreutils ]; src = fetchzip { diff --git a/pkgs/development/python-modules/stringtemplate/default.nix b/pkgs/development/python-modules/stringtemplate/default.nix index 8bdb69a3074..336a371c071 100644 --- a/pkgs/development/python-modules/stringtemplate/default.nix +++ b/pkgs/development/python-modules/stringtemplate/default.nix @@ -1,4 +1,4 @@ -{ lib, fetchurl, buildPythonPackage, antlr, isPy3k }: +{ lib, fetchurl, buildPythonPackage, antlr2, isPy3k }: buildPythonPackage rec { pname = "PyStringTemplate"; @@ -9,7 +9,7 @@ buildPythonPackage rec { sha256 = "0lbib0l8c1q7i1j610rwcdagymr1idahrql4dkgnm5rzyg2vk3ml"; }; - propagatedBuildInputs = [ antlr ]; + propagatedBuildInputs = [ antlr2 ]; disabled = isPy3k; diff --git a/pkgs/development/tools/database/sqlitebrowser/default.nix b/pkgs/development/tools/database/sqlitebrowser/default.nix index 40238d0effa..45b5f185880 100644 --- a/pkgs/development/tools/database/sqlitebrowser/default.nix +++ b/pkgs/development/tools/database/sqlitebrowser/default.nix @@ -1,4 +1,4 @@ -{ mkDerivation, lib, fetchFromGitHub, cmake, antlr +{ mkDerivation, lib, fetchFromGitHub, cmake , qtbase, qttools, sqlite }: mkDerivation rec { @@ -16,7 +16,7 @@ mkDerivation rec { # but qscintilla is currently in a bit of a mess as some consumers expect a # -qt4 or -qt5 prefix while others do not. # We *really* should get that cleaned up. - buildInputs = [ antlr qtbase sqlite ]; + buildInputs = [ qtbase sqlite ]; nativeBuildInputs = [ cmake qttools ]; diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 40be91d9a71..84518f6a1f8 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -12787,7 +12787,7 @@ in ansible-lint = with python3.pkgs; toPythonApplication ansible-lint; - antlr = callPackage ../development/tools/parsing/antlr/2.7.7.nix { + antlr2 = callPackage ../development/tools/parsing/antlr/2.7.7.nix { jdk = jdk8; # todo: remove override https://github.com/nixos/nixpkgs/pull/89731 }; @@ -12805,6 +12805,8 @@ in antlr4 = antlr4_8; + antlr = antlr4; + apacheAnt = callPackage ../development/tools/build-managers/apache-ant { }; apacheAnt_1_9 = callPackage ../development/tools/build-managers/apache-ant/1.9.nix { }; ant = apacheAnt; -- cgit 1.4.1 From 1f6969dd5e579a2d4ed8ffd2dc32ba184cc4eda6 Mon Sep 17 00:00:00 2001 From: David Arnold Date: Mon, 21 Jun 2021 19:59:44 -0500 Subject: docs: nixos release notes (w/o 2105 - separate PR) docs: nixos release notes (revise code blocks) docs: nixos release notes (fix opt links outside of code blocks) docs: nixos release notes (fix opt links inside of code blocks) went fishing with: ```console rg -A1 \ --multiline \ --multiline-dotall \ '[^]+' \ | rg linkend ``` docs: nixos release notes (prettier) docs: nixos release notes (fix zonefile codeblocks) docs: nixos release notes (restore admonition from prettier destriction) docs: nixos release notes (recreate xml files) docs: nixos release notes (fix trnslation error md -> xml) admonition with a title seem not to work docs: nixos release notes (fix code block indentation) docs: nixos release notes (diff after converting with https://github.com/NixOS/nixpkgs/pull/127270) docs: nixos release notes (fix remaingin '???') Those where not catched i a previous iteration since they didn't satisfy the then presumed search regex `#opt-.*` doc: nixos release notes make docbook/md conversion consistent --- .../from_md/release-notes/rl-1310.section.xml | 6 + .../from_md/release-notes/rl-1404.section.xml | 189 ++ .../from_md/release-notes/rl-1412.section.xml | 466 +++++ .../from_md/release-notes/rl-1509.section.xml | 776 +++++++ .../from_md/release-notes/rl-1603.section.xml | 695 ++++++ .../from_md/release-notes/rl-1609.section.xml | 273 +++ .../from_md/release-notes/rl-1703.section.xml | 818 ++++++++ .../from_md/release-notes/rl-1709.section.xml | 922 ++++++++ .../from_md/release-notes/rl-1803.section.xml | 871 ++++++++ .../from_md/release-notes/rl-1809.section.xml | 941 +++++++++ .../from_md/release-notes/rl-1903.section.xml | 790 +++++++ .../from_md/release-notes/rl-1909.section.xml | 1197 +++++++++++ .../from_md/release-notes/rl-2003.section.xml | 1497 +++++++++++++ .../from_md/release-notes/rl-2009.section.xml | 2206 ++++++++++++++++++++ .../from_md/release-notes/rl-2111.section.xml | 2 + nixos/doc/manual/release-notes/release-notes.xml | 28 +- nixos/doc/manual/release-notes/rl-1310.section.md | 3 + nixos/doc/manual/release-notes/rl-1310.xml | 11 - nixos/doc/manual/release-notes/rl-1404.section.md | 81 + nixos/doc/manual/release-notes/rl-1404.xml | 179 -- nixos/doc/manual/release-notes/rl-1412.section.md | 171 ++ nixos/doc/manual/release-notes/rl-1412.xml | 467 ----- nixos/doc/manual/release-notes/rl-1509.section.md | 319 +++ nixos/doc/manual/release-notes/rl-1509.xml | 750 ------- nixos/doc/manual/release-notes/rl-1603.section.md | 282 +++ nixos/doc/manual/release-notes/rl-1603.xml | 671 ------ nixos/doc/manual/release-notes/rl-1609.section.md | 73 + nixos/doc/manual/release-notes/rl-1609.xml | 277 --- nixos/doc/manual/release-notes/rl-1703.section.md | 303 +++ nixos/doc/manual/release-notes/rl-1703.xml | 817 -------- nixos/doc/manual/release-notes/rl-1709.section.md | 316 +++ nixos/doc/manual/release-notes/rl-1709.xml | 899 -------- nixos/doc/manual/release-notes/rl-1803.section.md | 284 +++ nixos/doc/manual/release-notes/rl-1803.xml | 855 -------- nixos/doc/manual/release-notes/rl-1809.section.md | 332 +++ nixos/doc/manual/release-notes/rl-1809.xml | 933 --------- nixos/doc/manual/release-notes/rl-1903.section.md | 214 ++ nixos/doc/manual/release-notes/rl-1903.xml | 768 ------- nixos/doc/manual/release-notes/rl-1909.section.md | 313 +++ nixos/doc/manual/release-notes/rl-1909.xml | 902 -------- nixos/doc/manual/release-notes/rl-2003.section.md | 507 +++++ nixos/doc/manual/release-notes/rl-2003.xml | 1252 ----------- nixos/doc/manual/release-notes/rl-2009.section.md | 745 +++++++ nixos/doc/manual/release-notes/rl-2009.xml | 1838 ---------------- nixos/doc/manual/release-notes/rl-2111.section.md | 38 +- 45 files changed, 15620 insertions(+), 10657 deletions(-) create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1310.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1404.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1412.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1509.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1603.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1609.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1703.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1709.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1803.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1809.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1903.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-1909.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-2003.section.xml create mode 100644 nixos/doc/manual/from_md/release-notes/rl-2009.section.xml create mode 100644 nixos/doc/manual/release-notes/rl-1310.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1310.xml create mode 100644 nixos/doc/manual/release-notes/rl-1404.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1404.xml create mode 100644 nixos/doc/manual/release-notes/rl-1412.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1412.xml create mode 100644 nixos/doc/manual/release-notes/rl-1509.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1509.xml create mode 100644 nixos/doc/manual/release-notes/rl-1603.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1603.xml create mode 100644 nixos/doc/manual/release-notes/rl-1609.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1609.xml create mode 100644 nixos/doc/manual/release-notes/rl-1703.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1703.xml create mode 100644 nixos/doc/manual/release-notes/rl-1709.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1709.xml create mode 100644 nixos/doc/manual/release-notes/rl-1803.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1803.xml create mode 100644 nixos/doc/manual/release-notes/rl-1809.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1809.xml create mode 100644 nixos/doc/manual/release-notes/rl-1903.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1903.xml create mode 100644 nixos/doc/manual/release-notes/rl-1909.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-1909.xml create mode 100644 nixos/doc/manual/release-notes/rl-2003.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-2003.xml create mode 100644 nixos/doc/manual/release-notes/rl-2009.section.md delete mode 100644 nixos/doc/manual/release-notes/rl-2009.xml (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-1310.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1310.section.xml new file mode 100644 index 00000000000..b4f3657b4b8 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1310.section.xml @@ -0,0 +1,6 @@ +
+ Release 13.10 (<quote>Aardvark</quote>, 2013/10/31) + + This is the first stable release branch of NixOS. + +
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1404.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1404.section.xml new file mode 100644 index 00000000000..8771623b468 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1404.section.xml @@ -0,0 +1,189 @@ +
+ Release 14.04 (<quote>Baboon</quote>, 2014/04/30) + + This is the second stable release branch of NixOS. In addition to + numerous new and upgraded packages and modules, this release has the + following highlights: + + + + + Installation on UEFI systems is now supported. See + for details. + + + + + Systemd has been updated to version 212, which has + numerous + improvements. NixOS now automatically starts systemd user + instances when you log in. You can define global user units + through the systemd.unit.* options. + + + + + NixOS is now based on Glibc 2.19 and GCC 4.8. + + + + + The default Linux kernel has been updated to 3.12. + + + + + KDE has been updated to 4.12. + + + + + GNOME 3.10 experimental support has been added. + + + + + Nix has been updated to 1.7 + (details). + + + + + NixOS now supports fully declarative management of users and + groups. If you set users.mutableUsers to + false, then the contents of + /etc/passwd and /etc/group + will be + congruent + to your NixOS configuration. For instance, if you remove a user + from users.extraUsers and run + nixos-rebuild, the user account will cease to + exist. Also, imperative commands for managing users and groups, + such as useradd, are no longer available. If + users.mutableUsers is true + (the default), then behaviour is unchanged from NixOS 13.10. + + + + + NixOS now has basic container support, meaning you can easily + run a NixOS instance as a container in a NixOS host system. + These containers are suitable for testing and experimentation + but not production use, since they’re not fully isolated from + the host. See for details. + + + + + Systemd units provided by packages can now be overridden from + the NixOS configuration. For instance, if a package + foo provides systemd units, you can say: + + +{ + systemd.packages = [ pkgs.foo ]; +} + + + to enable those units. You can then set or override unit options + in the usual way, e.g. + + +{ + systemd.services.foo.wantedBy = [ "multi-user.target" ]; + systemd.services.foo.serviceConfig.MemoryLimit = "512M"; +} + + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + Nixpkgs no longer exposes unfree packages by default. If your + NixOS configuration requires unfree packages from Nixpkgs, you + need to enable support for them explicitly by setting: + + +{ + nixpkgs.config.allowUnfree = true; +} + + + Otherwise, you get an error message such as: + + + error: package ‘nvidia-x11-331.49-3.12.17’ in ‘…/nvidia-x11/default.nix:56’ + has an unfree license, refusing to evaluate + + + + + The Adobe Flash player is no longer enabled by default in the + Firefox and Chromium wrappers. To enable it, you must set: + + +{ + nixpkgs.config.allowUnfree = true; + nixpkgs.config.firefox.enableAdobeFlash = true; # for Firefox + nixpkgs.config.chromium.enableAdobeFlash = true; # for Chromium +} + + + + + The firewall is now enabled by default. If you don’t want this, + you need to disable it explicitly: + + +{ + networking.firewall.enable = false; +} + + + + + The option boot.loader.grub.memtest86 has + been renamed to + boot.loader.grub.memtest86.enable. + + + + + The mysql55 service has been merged into the + mysql service, which no longer sets a default + for the option services.mysql.package. + + + + + Package variants are now differentiated by suffixing the name, + rather than the version. For instance, + sqlite-3.8.4.3-interactive is now called + sqlite-interactive-3.8.4.3. This ensures that + nix-env -i sqlite is unambiguous, and that + nix-env -u won’t upgrade + sqlite to + sqlite-interactive or vice versa. Notably, + this change affects the Firefox wrapper (which provides + plugins), as it is now called + firefox-wrapper. So when using + nix-env, you should do + nix-env -e firefox; nix-env -i firefox-wrapper + if you want to keep using the wrapper. This change does not + affect declarative package management, since attribute names + like pkgs.firefoxWrapper were already + unambiguous. + + + + + The symlink /etc/ca-bundle.crt is gone. + Programs should instead use the environment variable + OPENSSL_X509_CERT_FILE (which points to + /etc/ssl/certs/ca-bundle.crt). + + + +
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1412.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1412.section.xml new file mode 100644 index 00000000000..3b6af73359d --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1412.section.xml @@ -0,0 +1,466 @@ +
+ Release 14.12 (<quote>Caterpillar</quote>, 2014/12/30) + + In addition to numerous new and upgraded packages, this release has + the following highlights: + + + + + Systemd has been updated to version 217, which has numerous + improvements. + + + + + Nix + has been updated to 1.8. + + + + + NixOS is now based on Glibc 2.20. + + + + + KDE has been updated to 4.14. + + + + + The default Linux kernel has been updated to 3.14. + + + + + If users.mutableUsers is enabled (the + default), changes made to the declaration of a user or group + will be correctly realised when running + nixos-rebuild. For instance, removing a user + specification from configuration.nix will + cause the actual user account to be deleted. If + users.mutableUsers is disabled, it is no + longer necessary to specify UIDs or GIDs; if omitted, they are + allocated dynamically. + + + + + Following new services were added since the last release: + + + + + atftpd + + + + + bosun + + + + + bspwm + + + + + chronos + + + + + collectd + + + + + consul + + + + + cpuminer-cryptonight + + + + + crashplan + + + + + dnscrypt-proxy + + + + + docker-registry + + + + + docker + + + + + etcd + + + + + fail2ban + + + + + fcgiwrap + + + + + fleet + + + + + fluxbox + + + + + gdm + + + + + geoclue2 + + + + + gitlab + + + + + gitolite + + + + + gnome3.gnome-documents + + + + + gnome3.gnome-online-miners + + + + + gnome3.gvfs + + + + + gnome3.seahorse + + + + + hbase + + + + + i2pd + + + + + influxdb + + + + + kubernetes + + + + + liquidsoap + + + + + lxc + + + + + mailpile + + + + + mesos + + + + + mlmmj + + + + + monetdb + + + + + mopidy + + + + + neo4j + + + + + nsd + + + + + openntpd + + + + + opentsdb + + + + + openvswitch + + + + + parallels-guest + + + + + peerflix + + + + + phd + + + + + polipo + + + + + prosody + + + + + radicale + + + + + redmine + + + + + riemann + + + + + scollector + + + + + seeks + + + + + siproxd + + + + + strongswan + + + + + tcsd + + + + + teamspeak3 + + + + + thermald + + + + + torque/mrom + + + + + torque/server + + + + + uhub + + + + + unifi + + + + + znc + + + + + zookeeper + + + + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + The default version of Apache httpd is now 2.4. If you use the + extraConfig option to pass literal Apache + configuration text, you may need to update it — see + Apache’s + documentation for details. If you wish to continue to use + httpd 2.2, add the following line to your NixOS configuration: + + +{ + services.httpd.package = pkgs.apacheHttpd_2_2; +} + + + + + PHP 5.3 has been removed because it is no longer supported by + the PHP project. A + migration + guide is available. + + + + + The host side of a container virtual Ethernet pair is now called + ve-container-name rather than + c-container-name. + + + + + GNOME 3.10 support has been dropped. The default GNOME version + is now 3.12. + + + + + VirtualBox has been upgraded to 4.3.20 release. Users may be + required to run rm -rf /tmp/.vbox*. The line + imports = [ <nixpkgs/nixos/modules/programs/virtualbox.nix> ] + is no longer necessary, use + services.virtualboxHost.enable = true + instead. + + + Also, hardening mode is now enabled by default, which means that + unless you want to use USB support, you no longer need to be a + member of the vboxusers group. + + + + + Chromium has been updated to 39.0.2171.65. + enablePepperPDF is now enabled by default. + chromium*Wrapper packages no longer exist, + because upstream removed NSAPI support. + chromium-stable has been renamed to + chromium. + + + + + Python packaging documentation is now part of nixpkgs manual. To + override the python packages available to a custom python you + now use pkgs.pythonFull.buildEnv.override + instead of pkgs.pythonFull.override. + + + + + boot.resumeDevice = "8:6" is no + longer supported. Most users will want to leave it undefined, + which takes the swap partitions automatically. There is an + evaluation assertion to ensure that the string starts with a + slash. + + + + + The system-wide default timezone for NixOS installations changed + from CET to UTC. To choose + a different timezone for your system, configure + time.timeZone in + configuration.nix. A fairly complete list of + possible values for that setting is available at + https://en.wikipedia.org/wiki/List_of_tz_database_time_zones. + + + + + GNU screen has been updated to 4.2.1, which breaks the ability + to connect to sessions created by older versions of screen. + + + + + The Intel GPU driver was updated to the 3.x prerelease version + (used by most distributions) and supports DRI3 now. + + + +
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1509.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1509.section.xml new file mode 100644 index 00000000000..68d2ab389e8 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1509.section.xml @@ -0,0 +1,776 @@ +
+ Release 15.09 (<quote>Dingo</quote>, 2015/09/30) + + In addition to numerous new and upgraded packages, this release has + the following highlights: + + + + + The Haskell + packages infrastructure has been re-designed from the ground up + ("Haskell NG"). NixOS now distributes the latest + version of every single package registered on + Hackage -- + well in excess of 8,000 Haskell packages. Detailed instructions + on how to use that infrastructure can be found in the + User's + Guide to the Haskell Infrastructure. Users migrating from + an earlier release may find helpful information below, in the + list of backwards-incompatible changes. Furthermore, we + distribute 51(!) additional Haskell package sets that provide + every single LTS + Haskell release since version 0.0 as well as the most + recent Stackage + Nightly snapshot. The announcement + "Full + Stackage Support in Nixpkgs" gives additional + details. + + + + + Nix has been updated to version 1.10, which among other + improvements enables cryptographic signatures on binary caches + for improved security. + + + + + You can now keep your NixOS system up to date automatically by + setting + + + + +{ + system.autoUpgrade.enable = true; +} + + + This will cause the system to periodically check for updates in your + current channel and run nixos-rebuild. + + + + + This release is based on Glibc 2.21, GCC 4.9 and Linux 3.18. + + + + + GNOME has been upgraded to 3.16. + + + + + Xfce has been upgraded to 4.12. + + + + + KDE 5 has been upgraded to KDE Frameworks 5.10, Plasma 5.3.2 and + Applications 15.04.3. KDE 4 has been updated to kdelibs-4.14.10. + + + + + E19 has been upgraded to 0.16.8.15. + + + + + The following new services were added since the last release: + + + + + services/mail/exim.nix + + + + + services/misc/apache-kafka.nix + + + + + services/misc/canto-daemon.nix + + + + + services/misc/confd.nix + + + + + services/misc/devmon.nix + + + + + services/misc/gitit.nix + + + + + services/misc/ihaskell.nix + + + + + services/misc/mbpfan.nix + + + + + services/misc/mediatomb.nix + + + + + services/misc/mwlib.nix + + + + + services/misc/parsoid.nix + + + + + services/misc/plex.nix + + + + + services/misc/ripple-rest.nix + + + + + services/misc/ripple-data-api.nix + + + + + services/misc/subsonic.nix + + + + + services/misc/sundtek.nix + + + + + services/monitoring/cadvisor.nix + + + + + services/monitoring/das_watchdog.nix + + + + + services/monitoring/grafana.nix + + + + + services/monitoring/riemann-tools.nix + + + + + services/monitoring/teamviewer.nix + + + + + services/network-filesystems/u9fs.nix + + + + + services/networking/aiccu.nix + + + + + services/networking/asterisk.nix + + + + + services/networking/bird.nix + + + + + services/networking/charybdis.nix + + + + + services/networking/docker-registry-server.nix + + + + + services/networking/fan.nix + + + + + services/networking/firefox/sync-server.nix + + + + + services/networking/gateone.nix + + + + + services/networking/heyefi.nix + + + + + services/networking/i2p.nix + + + + + services/networking/lambdabot.nix + + + + + services/networking/mstpd.nix + + + + + services/networking/nix-serve.nix + + + + + services/networking/nylon.nix + + + + + services/networking/racoon.nix + + + + + services/networking/skydns.nix + + + + + services/networking/shout.nix + + + + + services/networking/softether.nix + + + + + services/networking/sslh.nix + + + + + services/networking/tinc.nix + + + + + services/networking/tlsdated.nix + + + + + services/networking/tox-bootstrapd.nix + + + + + services/networking/tvheadend.nix + + + + + services/networking/zerotierone.nix + + + + + services/scheduling/marathon.nix + + + + + services/security/fprintd.nix + + + + + services/security/hologram.nix + + + + + services/security/munge.nix + + + + + services/system/cloud-init.nix + + + + + services/web-servers/shellinabox.nix + + + + + services/web-servers/uwsgi.nix + + + + + services/x11/unclutter.nix + + + + + services/x11/display-managers/sddm.nix + + + + + system/boot/coredump.nix + + + + + system/boot/loader/loader.nix + + + + + system/boot/loader/generic-extlinux-compatible + + + + + system/boot/networkd.nix + + + + + system/boot/resolved.nix + + + + + system/boot/timesyncd.nix + + + + + tasks/filesystems/exfat.nix + + + + + tasks/filesystems/ntfs.nix + + + + + tasks/filesystems/vboxsf.nix + + + + + virtualisation/virtualbox-host.nix + + + + + virtualisation/vmware-guest.nix + + + + + virtualisation/xen-dom0.nix + + + + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + sshd no longer supports DSA and ECDSA host + keys by default. If you have existing systems with such host + keys and want to continue to use them, please set + + + + +{ + system.stateVersion = "14.12"; +} + + + The new option system.stateVersion ensures that + certain configuration changes that could break existing systems + (such as the sshd host key setting) will maintain + compatibility with the specified NixOS release. NixOps sets the + state version of existing deployments automatically. + + + + + cron is no longer enabled by default, unless + you have a non-empty + services.cron.systemCronJobs. To force + cron to be enabled, set + services.cron.enable = true. + + + + + Nix now requires binary caches to be cryptographically signed. + If you have unsigned binary caches that you want to continue to + use, you should set + nix.requireSignedBinaryCaches = false. + + + + + Steam now doesn't need root rights to work. Instead of using + *-steam-chrootenv, you should now just run + steam. steamChrootEnv + package was renamed to steam, and old + steam package -- to + steamOriginal. + + + + + CMPlayer has been renamed to bomi upstream. Package + cmplayer was accordingly renamed to + bomi + + + + + Atom Shell has been renamed to Electron upstream. Package + atom-shell was accordingly renamed to + electron + + + + + Elm is not released on Hackage anymore. You should now use + elmPackages.elm which contains the latest Elm + platform. + + + + + The CUPS printing service has been updated to version + 2.0.2. Furthermore its systemd service has + been renamed to cups.service. + + + Local printers are no longer shared or advertised by default. + This behavior can be changed by enabling + services.printing.defaultShared or + services.printing.browsing respectively. + + + + + The VirtualBox host and guest options have been named more + consistently. They can now found in + virtualisation.virtualbox.host.* instead of + services.virtualboxHost.* and + virtualisation.virtualbox.guest.* instead of + services.virtualboxGuest.*. + + + Also, there now is support for the vboxsf + file system using the fileSystems + configuration attribute. An example of how this can be used in a + configuration: + + + + +{ + fileSystems."/shiny" = { + device = "myshinysharedfolder"; + fsType = "vboxsf"; + }; +} + + + + + "nix-env -qa" no longer discovers + Haskell packages by name. The only packages visible in the + global scope are ghc, + cabal-install, and stack, + but all other packages are hidden. The reason for this + inconvenience is the sheer size of the Haskell package set. + Name-based lookups are expensive, and most + nix-env -qa operations would become much + slower if we'd add the entire Hackage database into the top + level attribute set. Instead, the list of Haskell packages can + be displayed by running: + + + + +nix-env -f "<nixpkgs>" -qaP -A haskellPackages + + + Executable programs written in Haskell can be installed with: + + +nix-env -f "<nixpkgs>" -iA haskellPackages.pandoc + + + Installing Haskell libraries this way, however, + is no longer supported. See the next item for more details. + + + + + Previous versions of NixOS came with a feature called + ghc-wrapper, a small script that allowed GHC + to transparently pick up on libraries installed in the user's + profile. This feature has been deprecated; + ghc-wrapper was removed from the + distribution. The proper way to register Haskell libraries with + the compiler now is the + haskellPackages.ghcWithPackages function. The + User's + Guide to the Haskell Infrastructure provides more + information about this subject. + + + + + All Haskell builds that have been generated with version 1.x of + the cabal2nix utility are now invalid and + need to be re-generated with a current version of + cabal2nix to function. The most recent + version of this tool can be installed by running + nix-env -i cabal2nix. + + + + + The haskellPackages set in Nixpkgs used to + have a function attribute called extension + that users could override in their + ~/.nixpkgs/config.nix files to configure + additional attributes, etc. That function still exists, but it's + now called overrides. + + + + + The OpenBLAS library has been updated to version + 0.2.14. Support for the + x86_64-darwin platform was added. Dynamic + architecture detection was enabled; OpenBLAS now selects + microarchitecture-optimized routines at runtime, so optimal + performance is achieved without the need to rebuild OpenBLAS + locally. OpenBLAS has replaced ATLAS in most packages which use + an optimized BLAS or LAPACK implementation. + + + + + The phpfpm is now using the default PHP + version (pkgs.php) instead of PHP 5.4 + (pkgs.php54). + + + + + The locate service no longer indexes the Nix + store by default, preventing packages with potentially numerous + versions from cluttering the output. Indexing the store can be + activated by setting + services.locate.includeStore = true. + + + + + The Nix expression search path (NIX_PATH) no + longer contains /etc/nixos/nixpkgs by + default. You can override NIX_PATH by setting + nix.nixPath. + + + + + Python 2.6 has been marked as broken (as it no longer receives + security updates from upstream). + + + + + Any use of module arguments such as pkgs to + access library functions, or to define + imports attributes will now lead to an + infinite loop at the time of the evaluation. + + + In case of an infinite loop, use the + --show-trace command line argument and read + the line just above the error message. + + +$ nixos-rebuild build --show-trace +… +while evaluating the module argument `pkgs' in "/etc/nixos/my-module.nix": +infinite recursion encountered + + + Any use of pkgs.lib, should be replaced by + lib, after adding it as argument of the + module. The following module + + +{ config, pkgs, ... }: + +with pkgs.lib; + +{ + options = { + foo = mkOption { … }; + }; + config = mkIf config.foo { … }; +} + + + should be modified to look like: + + +{ config, pkgs, lib, ... }: + +with lib; + +{ + options = { + foo = mkOption { option declaration }; + }; + config = mkIf config.foo { option definition }; +} + + + When pkgs is used to download other projects + to import their modules, and only in such cases, it should be + replaced by (import <nixpkgs> {}). The + following module + + +{ config, pkgs, ... }: + +let + myProject = pkgs.fetchurl { + src = url; + sha256 = hash; + }; +in + +{ + imports = [ "${myProject}/module.nix" ]; +} + + + should be modified to look like: + + +{ config, pkgs, ... }: + +let + myProject = (import <nixpkgs> {}).fetchurl { + src = url; + sha256 = hash; + }; +in + +{ + imports = [ "${myProject}/module.nix" ]; +} + + + + + Other notable improvements: + + + + + The nixos and nixpkgs channels were unified, so one + can use + nix-env -iA nixos.bash instead of + nix-env -iA nixos.pkgs.bash. See + the + commit for details. + + + + + Users running an SSH server who worry about the quality of their + /etc/ssh/moduli file with respect to the + vulnerabilities + discovered in the Diffie-Hellman key exchange can now + replace OpenSSH's default version with one they generated + themselves using the new + services.openssh.moduliFile option. + + + + + A newly packaged TeX Live 2015 is provided in + pkgs.texlive, split into 6500 nix packages. + For basic user documentation see + the + source. Beware of + an + issue when installing a too large package set. The plan + is to deprecate and maybe delete the original TeX packages until + the next release. + + + + + buildEnv.env on all Python interpreters is + now available for nix-shell interoperability. + + + +
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1603.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1603.section.xml new file mode 100644 index 00000000000..172b800b599 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1603.section.xml @@ -0,0 +1,695 @@ +
+ Release 16.03 (<quote>Emu</quote>, 2016/03/31) + + In addition to numerous new and upgraded packages, this release has + the following highlights: + + + + + Systemd 229, bringing + numerous + improvements over 217. + + + + + Linux 4.4 (was 3.18). + + + + + GCC 5.3 (was 4.9). Note that GCC 5 + changes + the C++ ABI in an incompatible way; this may cause + problems if you try to link objects compiled with different + versions of GCC. + + + + + Glibc 2.23 (was 2.21). + + + + + Binutils 2.26 (was 2.23.1). See #909 + + + + + Improved support for ensuring + bitwise + reproducible builds. For example, + stdenv now sets the environment variable + SOURCE_DATE_EPOCH to a deterministic value, + and Nix has + gained + an option to repeat a build a number of times to test + determinism. An ongoing project, the goal of exact + reproducibility is to allow binaries to be verified + independently (e.g., a user might only trust binaries that + appear in three independent binary caches). + + + + + Perl 5.22. + + + + + The following new services were added since the last release: + + + + + services/monitoring/longview.nix + + + + + hardware/video/webcam/facetimehd.nix + + + + + i18n/input-method/default.nix + + + + + i18n/input-method/fcitx.nix + + + + + i18n/input-method/ibus.nix + + + + + i18n/input-method/nabi.nix + + + + + i18n/input-method/uim.nix + + + + + programs/fish.nix + + + + + security/acme.nix + + + + + security/audit.nix + + + + + security/oath.nix + + + + + services/hardware/irqbalance.nix + + + + + services/mail/dspam.nix + + + + + services/mail/opendkim.nix + + + + + services/mail/postsrsd.nix + + + + + services/mail/rspamd.nix + + + + + services/mail/rmilter.nix + + + + + services/misc/autofs.nix + + + + + services/misc/bepasty.nix + + + + + services/misc/calibre-server.nix + + + + + services/misc/cfdyndns.nix + + + + + services/misc/gammu-smsd.nix + + + + + services/misc/mathics.nix + + + + + services/misc/matrix-synapse.nix + + + + + services/misc/octoprint.nix + + + + + services/monitoring/hdaps.nix + + + + + services/monitoring/heapster.nix + + + + + services/monitoring/longview.nix + + + + + services/network-filesystems/netatalk.nix + + + + + services/network-filesystems/xtreemfs.nix + + + + + services/networking/autossh.nix + + + + + services/networking/dnschain.nix + + + + + services/networking/gale.nix + + + + + services/networking/miniupnpd.nix + + + + + services/networking/namecoind.nix + + + + + services/networking/ostinato.nix + + + + + services/networking/pdnsd.nix + + + + + services/networking/shairport-sync.nix + + + + + services/networking/supplicant.nix + + + + + services/search/kibana.nix + + + + + services/security/haka.nix + + + + + services/security/physlock.nix + + + + + services/web-apps/pump.io.nix + + + + + services/x11/hardware/libinput.nix + + + + + services/x11/window-managers/windowlab.nix + + + + + system/boot/initrd-network.nix + + + + + system/boot/initrd-ssh.nix + + + + + system/boot/loader/loader.nix + + + + + system/boot/networkd.nix + + + + + system/boot/resolved.nix + + + + + virtualisation/lxd.nix + + + + + virtualisation/rkt.nix + + + + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + We no longer produce graphical ISO images and VirtualBox images + for i686-linux. A minimal ISO image is still + provided. + + + + + Firefox and similar browsers are now wrapped by + default. The package and attribute names are plain + firefox or midori, etc. + Backward-compatibility attributes were set up, but note that + nix-env -u will not + update your current firefox-with-plugins; you + have to uninstall it and install firefox + instead. + + + + + wmiiSnap has been replaced with + wmii_hg, but + services.xserver.windowManager.wmii.enable + has been updated respectively so this only affects you if you + have explicitly installed wmiiSnap. + + + + + jobs NixOS option has been removed. It served + as compatibility layer between Upstart jobs and SystemD + services. All services have been rewritten to use + systemd.services + + + + + wmiimenu is removed, as it has been removed + by the developers upstream. Use wimenu from + the wmii-hg package. + + + + + Gitit is no longer automatically added to the module list in + NixOS and as such there will not be any manual entries for it. + You will need to add an import statement to your NixOS + configuration in order to use it, e.g. + + +{ + imports = [ <nixpkgs/nixos/modules/services/misc/gitit.nix> ]; +} + + + will include the Gitit service configuration options. + + + + + nginx does not accept flags for enabling and + disabling modules anymore. Instead it accepts + modules argument, which is a list of modules + to be built in. All modules now reside in + nginxModules set. Example configuration: + + +nginx.override { + modules = [ nginxModules.rtmp nginxModules.dav nginxModules.moreheaders ]; +} + + + + + s3sync is removed, as it hasn't been + developed by upstream for 4 years and only runs with ruby 1.8. + For an actively-developer alternative look at + tarsnap and others. + + + + + ruby_1_8 has been removed as it's not + supported from upstream anymore and probably contains security + issues. + + + + + tidy-html5 package is removed. Upstream only + provided (lib)tidy5 during development, and + now they went back to (lib)tidy to work as a + drop-in replacement of the original package that has been + unmaintained for years. You can (still) use the + html-tidy package, which got updated to a + stable release from this new upstream. + + + + + extraDeviceOptions argument is removed from + bumblebee package. Instead there are now two + separate arguments: extraNvidiaDeviceOptions + and extraNouveauDeviceOptions for setting + extra X11 options for nvidia and nouveau drivers, respectively. + + + + + The Ctrl+Alt+Backspace key combination no + longer kills the X server by default. There's a new option + services.xserver.enableCtrlAltBackspace + allowing to enable the combination again. + + + + + emacsPackagesNg now contains all packages + from the ELPA, MELPA, and MELPA Stable repositories. + + + + + Data directory for Postfix MTA server is moved from + /var/postfix to + /var/lib/postfix. Old configurations are + migrated automatically. service.postfix + module has also received many improvements, such as correct + directories' access rights, new aliasFiles + and mapFiles options and more. + + + + + Filesystem options should now be configured as a list of + strings, not a comma-separated string. The old style will + continue to work, but print a warning, until the 16.09 release. + An example of the new style: + + +{ + fileSystems."/example" = { + device = "/dev/sdc"; + fsType = "btrfs"; + options = [ "noatime" "compress=lzo" "space_cache" "autodefrag" ]; + }; +} + + + + + CUPS, installed by services.printing module, + now has its data directory in /var/lib/cups. + Old configurations from /etc/cups are moved + there automatically, but there might be problems. Also + configuration options + services.printing.cupsdConf and + services.printing.cupsdFilesConf were removed + because they had been allowing one to override configuration + variables required for CUPS to work at all on NixOS. For most + use cases, services.printing.extraConf and + new option services.printing.extraFilesConf + should be enough; if you encounter a situation when they are + not, please file a bug. + + + There are also Gutenprint improvements; in particular, a new + option services.printing.gutenprint is added + to enable automatic updating of Gutenprint PPMs; it's greatly + recommended to enable it instead of adding + gutenprint to the drivers + list. + + + + + services.xserver.vaapiDrivers has been + removed. Use + hardware.opengl.extraPackages{,32} instead. + You can also specify VDPAU drivers there. + + + + + programs.ibus moved to + i18n.inputMethod.ibus. The option + programs.ibus.plugins changed to + i18n.inputMethod.ibus.engines and the option + to enable ibus changed from + programs.ibus.enable to + i18n.inputMethod.enabled. + i18n.inputMethod.enabled should be set to the + used input method name, "ibus" for + ibus. An example of the new style: + + +{ + i18n.inputMethod.enabled = "ibus"; + i18n.inputMethod.ibus.engines = with pkgs.ibus-engines; [ anthy mozc ]; +} + + + That is equivalent to the old version: + + +{ + programs.ibus.enable = true; + programs.ibus.plugins = with pkgs; [ ibus-anthy mozc ]; +} + + + + + services.udev.extraRules option now writes + rules to 99-local.rules instead of + 10-local.rules. This makes all the user rules + apply after others, so their results wouldn't be overriden by + anything else. + + + + + Large parts of the services.gitlab module has + been been rewritten. There are new configuration options + available. The stateDir option was renamned + to statePath and the + satellitesDir option was removed. Please + review the currently available options. + + + + + The option + services.nsd.zones.<name>.data no + longer interpret the dollar sign ($) as a shell variable, as + such it should not be escaped anymore. Thus the following zone + data: + + +$ORIGIN example.com. +$TTL 1800 +@ IN SOA ns1.vpn.nbp.name. admin.example.com. ( + + + Should modified to look like the actual file expected by nsd: + + +$ORIGIN example.com. +$TTL 1800 +@ IN SOA ns1.vpn.nbp.name. admin.example.com. ( + + + + + service.syncthing.dataDir options now has to + point to exact folder where syncthing is writing to. Example + configuration should look something like: + + +{ + services.syncthing = { + enable = true; + dataDir = "/home/somebody/.syncthing"; + user = "somebody"; + }; +} + + + + + networking.firewall.allowPing is now enabled + by default. Users are encouraged to configure an appropriate + rate limit for their machines using the Kernel interface at + /proc/sys/net/ipv4/icmp_ratelimit and + /proc/sys/net/ipv6/icmp/ratelimit or using + the firewall itself, i.e. by setting the NixOS option + networking.firewall.pingLimit. + + + + + Systems with some broadcom cards used to result into a generated + config that is no longer accepted. If you get errors like + + +error: path ‘/nix/store/*-broadcom-sta-*’ does not exist and cannot be created + + + you should either re-run + nixos-generate-config or manually replace + "${config.boot.kernelPackages.broadcom_sta}" + by config.boot.kernelPackages.broadcom_sta in + your /etc/nixos/hardware-configuration.nix. + More discussion is on + + the github issue. + + + + + The services.xserver.startGnuPGAgent option + has been removed. GnuPG 2.1.x changed the way the gpg-agent + works, and that new approach no longer requires (or even + supports) the "start everything as a child of the + agent" scheme we've implemented in NixOS for older + versions. To configure the gpg-agent for your X session, add the + following code to ~/.bashrc or some file + that’s sourced when your shell is started: + + +GPG_TTY=$(tty) +export GPG_TTY + + + If you want to use gpg-agent for SSH, too, add the following to + your session initialization (e.g. + displayManager.sessionCommands) + + + gpg-connect-agent /bye + unset SSH_AGENT_PID + export SSH_AUTH_SOCK="''${HOME}/.gnupg/S.gpg-agent.ssh" + + + and make sure that + + + enable-ssh-support + + + is included in your ~/.gnupg/gpg-agent.conf. + You will need to use ssh-add to re-add your + ssh keys. If gpg’s automatic transformation of the private keys + to the new format fails, you will need to re-import your private + keyring as well: + + + gpg --import ~/.gnupg/secring.gpg + + + The gpg-agent(1) man page has more details + about this subject, i.e. in the "EXAMPLES" section. + + + + + Other notable improvements: + + + + + ejabberd module is brought back and now works + on NixOS. + + + + + Input method support was improved. New NixOS modules (fcitx, + nabi and uim), fcitx engines (chewing, hangul, m17n, mozc and + table-other) and ibus engines (hangul and m17n) have been added. + + + +
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1609.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1609.section.xml new file mode 100644 index 00000000000..0fba40a0e78 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1609.section.xml @@ -0,0 +1,273 @@ +
+ Release 16.09 (<quote>Flounder</quote>, 2016/09/30) + + In addition to numerous new and upgraded packages, this release has + the following highlights: + + + + + Many NixOS configurations and Nix packages now use significantly + less disk space, thanks to the + extensive + work on closure size reduction. For example, the closure + size of a minimal NixOS container went down from ~424 MiB in + 16.03 to ~212 MiB in 16.09, while the closure size of Firefox + went from ~651 MiB to ~259 MiB. + + + + + To improve security, packages are now + built + using various hardening features. See the Nixpkgs manual + for more information. + + + + + Support for PXE netboot. See + for documentation. + + + + + X.org server 1.18. If you use the ati_unfree + driver, 1.17 is still used due to an ABI incompatibility. + + + + + This release is based on Glibc 2.24, GCC 5.4.0 and systemd 231. + The default Linux kernel remains 4.4. + + + + + The following new services were added since the last release: + + + + + (this will get automatically generated at release time) + + + + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + A large number of packages have been converted to use the + multiple outputs feature of Nix to greatly reduce the amount of + required disk space, as mentioned above. This may require + changes to any custom packages to make them build again; see the + relevant chapter in the Nixpkgs manual for more information. + (Additional caveat to packagers: some packaging conventions + related to multiple-output packages + were + changed late (August 2016) in the release cycle and + differ from the initial introduction of multiple outputs.) + + + + + Previous versions of Nixpkgs had support for all versions of the + LTS Haskell package set. That support has been dropped. The + previously provided haskell.packages.lts-x_y + package sets still exist in name to aviod breaking user code, + but these package sets don't actually contain the versions + mandated by the corresponding LTS release. Instead, our package + set it loosely based on the latest available LTS release, i.e. + LTS 7.x at the time of this writing. New releases of NixOS and + Nixpkgs will drop those old names entirely. + The + motivation for this change has been discussed at length + on the nix-dev mailing list and in + Github + issue #14897. Development strategies for Haskell hackers + who want to rely on Nix and NixOS have been described in + another + nix-dev article. + + + + + Shell aliases for systemd sub-commands + were + dropped: start, + stop, restart, + status. + + + + + Redis now binds to 127.0.0.1 only instead of listening to all + network interfaces. This is the default behavior of Redis 3.2 + + + + + /var/empty is now immutable. Activation + script runs chattr +i to forbid any + modifications inside the folder. See + + the pull request for what bugs this caused. + + + + + Gitlab's maintainance script gitlab-runner + was removed and split up into the more clearer + gitlab-run and gitlab-rake + scripts, because gitlab-runner is a component + of Gitlab CI. + + + + + services.xserver.libinput.accelProfile + default changed from flat to + adaptive, as per + + official documentation. + + + + + fonts.fontconfig.ultimate.rendering was + removed because our presets were obsolete for some time. New + presets are hardcoded into FreeType; you can select a preset via + fonts.fontconfig.ultimate.preset. You can + customize those presets via ordinary environment variables, + using environment.variables. + + + + + The audit service is no longer enabled by + default. Use security.audit.enable = true to + explicitly enable it. + + + + + pkgs.linuxPackages.virtualbox now contains + only the kernel modules instead of the VirtualBox user space + binaries. If you want to reference the user space binaries, you + have to use the new pkgs.virtualbox instead. + + + + + goPackages was replaced with separated Go + applications in appropriate nixpkgs + categories. Each Go package uses its own dependency set. There's + also a new go2nix tool introduced to generate + a Go package definition from its Go source automatically. + + + + + services.mongodb.extraConfig configuration + format was changed to YAML. + + + + + PHP has been upgraded to 7.0 + + + + + Other notable improvements: + + + + + Revamped grsecurity/PaX support. There is now only a single + general-purpose distribution kernel and the configuration + interface has been streamlined. Desktop users should be able to + simply set + + +{ + security.grsecurity.enable = true; +} + + + to get a reasonably secure system without having to sacrifice + too much functionality. + + + + + Special filesystems, like /proc, + /run and others, now have the same mount + options as recommended by systemd and are unified across + different places in NixOS. Mount options are updated during + nixos-rebuild switch if possible. One benefit + from this is improved security — most such filesystems are now + mounted with noexec, nodev + and/or nosuid options. + + + + + The reverse path filter was interfering with DHCPv4 server + operation in the past. An exception for DHCPv4 and a new option + to log packets that were dropped due to the reverse path filter + was added + (networking.firewall.logReversePathDrops) for + easier debugging. + + + + + Containers configuration within + containers.<name>.config is + now + properly typed and checked. In particular, partial + configurations are merged correctly. + + + + + The directory container setuid wrapper programs, + /var/setuid-wrappers, + is + now updated atomically to prevent failures if the switch to a + new configuration is interrupted. + + + + + services.xserver.startGnuPGAgent has been + removed due to GnuPG 2.1.x bump. See + + how to achieve similar behavior. You might need to + pkill gpg-agent after the upgrade to prevent + a stale agent being in the way. + + + + + + Declarative users could share the uid due to the bug in the + script handling conflict resolution. + + + + + Gummi boot has been replaced using systemd-boot. + + + + + Hydra package and NixOS module were added for convenience. + + + +
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1703.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1703.section.xml new file mode 100644 index 00000000000..1119ec53dfc --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1703.section.xml @@ -0,0 +1,818 @@ +
+ Release 17.03 (<quote>Gorilla</quote>, 2017/03/31) +
+ Highlights + + In addition to numerous new and upgraded packages, this release + has the following highlights: + + + + + Nixpkgs is now extensible through overlays. See the + Nixpkgs + manual for more information. + + + + + This release is based on Glibc 2.25, GCC 5.4.0 and systemd + 232. The default Linux kernel is 4.9 and Nix is at 1.11.8. + + + + + The default desktop environment now is KDE's Plasma 5. KDE 4 + has been removed + + + + + The setuid wrapper functionality now supports setting + capabilities. + + + + + X.org server uses branch 1.19. Due to ABI incompatibilities, + ati_unfree keeps forcing 1.17 and + amdgpu-pro starts forcing 1.18. + + + + + Cross compilation has been rewritten. See the nixpkgs manual + for details. The most obvious breaking change is that in + derivations there is no .nativeDrv nor + .crossDrv are now cross by default, not + native. + + + + + The overridePackages function has been + rewritten to be replaced by + + overlays + + + + + Packages in nixpkgs can be marked as insecure through listed + vulnerabilities. See the + Nixpkgs + manual for more information. + + + + + PHP now defaults to PHP 7.1 + + + +
+
+ New Services + + The following new services were added since the last release: + + + + + hardware/ckb.nix + + + + + hardware/mcelog.nix + + + + + hardware/usb-wwan.nix + + + + + hardware/video/capture/mwprocapture.nix + + + + + programs/adb.nix + + + + + programs/chromium.nix + + + + + programs/gphoto2.nix + + + + + programs/java.nix + + + + + programs/mtr.nix + + + + + programs/oblogout.nix + + + + + programs/vim.nix + + + + + programs/wireshark.nix + + + + + security/dhparams.nix + + + + + services/audio/ympd.nix + + + + + services/computing/boinc/client.nix + + + + + services/continuous-integration/buildbot/master.nix + + + + + services/continuous-integration/buildbot/worker.nix + + + + + services/continuous-integration/gitlab-runner.nix + + + + + services/databases/riak-cs.nix + + + + + services/databases/stanchion.nix + + + + + services/desktops/gnome3/gnome-terminal-server.nix + + + + + services/editors/infinoted.nix + + + + + services/hardware/illum.nix + + + + + services/hardware/trezord.nix + + + + + services/logging/journalbeat.nix + + + + + services/mail/offlineimap.nix + + + + + services/mail/postgrey.nix + + + + + services/misc/couchpotato.nix + + + + + services/misc/docker-registry.nix + + + + + services/misc/errbot.nix + + + + + services/misc/geoip-updater.nix + + + + + services/misc/gogs.nix + + + + + services/misc/leaps.nix + + + + + services/misc/nix-optimise.nix + + + + + services/misc/ssm-agent.nix + + + + + services/misc/sssd.nix + + + + + services/monitoring/arbtt.nix + + + + + services/monitoring/netdata.nix + + + + + services/monitoring/prometheus/default.nix + + + + + services/monitoring/prometheus/alertmanager.nix + + + + + services/monitoring/prometheus/blackbox-exporter.nix + + + + + services/monitoring/prometheus/json-exporter.nix + + + + + services/monitoring/prometheus/nginx-exporter.nix + + + + + services/monitoring/prometheus/node-exporter.nix + + + + + services/monitoring/prometheus/snmp-exporter.nix + + + + + services/monitoring/prometheus/unifi-exporter.nix + + + + + services/monitoring/prometheus/varnish-exporter.nix + + + + + services/monitoring/sysstat.nix + + + + + services/monitoring/telegraf.nix + + + + + services/monitoring/vnstat.nix + + + + + services/network-filesystems/cachefilesd.nix + + + + + services/network-filesystems/glusterfs.nix + + + + + services/network-filesystems/ipfs.nix + + + + + services/networking/dante.nix + + + + + services/networking/dnscrypt-wrapper.nix + + + + + services/networking/fakeroute.nix + + + + + services/networking/flannel.nix + + + + + services/networking/htpdate.nix + + + + + services/networking/miredo.nix + + + + + services/networking/nftables.nix + + + + + services/networking/powerdns.nix + + + + + services/networking/pdns-recursor.nix + + + + + services/networking/quagga.nix + + + + + services/networking/redsocks.nix + + + + + services/networking/wireguard.nix + + + + + services/system/cgmanager.nix + + + + + services/torrent/opentracker.nix + + + + + services/web-apps/atlassian/confluence.nix + + + + + services/web-apps/atlassian/crowd.nix + + + + + services/web-apps/atlassian/jira.nix + + + + + services/web-apps/frab.nix + + + + + services/web-apps/nixbot.nix + + + + + services/web-apps/selfoss.nix + + + + + services/web-apps/quassel-webserver.nix + + + + + services/x11/unclutter-xfixes.nix + + + + + services/x11/urxvtd.nix + + + + + system/boot/systemd-nspawn.nix + + + + + virtualisation/ecs-agent.nix + + + + + virtualisation/lxcfs.nix + + + + + virtualisation/openstack/keystone.nix + + + + + virtualisation/openstack/glance.nix + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + Derivations have no .nativeDrv nor + .crossDrv and are now cross by default, not + native. + + + + + stdenv.overrides is now expected to take + self and super + arguments. See lib.trivial.extends for what + those parameters represent. + + + + + ansible now defaults to ansible version 2 + as version 1 has been removed due to a serious + + vulnerability unpatched by upstream. + + + + + gnome alias has been removed along with + gtk, gtkmm and several + others. Now you need to use versioned attributes, like + gnome3. + + + + + The attribute name of the Radicale daemon has been changed + from pythonPackages.radicale to + radicale. + + + + + The stripHash bash function in + stdenv changed according to its + documentation; it now outputs the stripped name to + stdout instead of putting it in the + variable strippedName. + + + + + PHP now scans for extra configuration .ini files in /etc/php.d + instead of /etc. This prevents accidentally loading non-PHP + .ini files that may be in /etc. + + + + + Two lone top-level dict dbs moved into + dictdDBs. This affects: + dictdWordnet which is now at + dictdDBs.wordnet and + dictdWiktionary which is now at + dictdDBs.wiktionary + + + + + Parsoid service now uses YAML configuration format. + service.parsoid.interwikis is now called + service.parsoid.wikis and is a list of + either API URLs or attribute sets as specified in parsoid's + documentation. + + + + + Ntpd was replaced by + systemd-timesyncd as the default service to + synchronize system time with a remote NTP server. The old + behavior can be restored by setting + services.ntp.enable to + true. Upstream time servers for all NTP + implementations are now configured using + networking.timeServers. + + + + + service.nylon is now declared using named + instances. As an example: + + +{ + services.nylon = { + enable = true; + acceptInterface = "br0"; + bindInterface = "tun1"; + port = 5912; + }; +} + + + should be replaced with: + + +{ + services.nylon.myvpn = { + enable = true; + acceptInterface = "br0"; + bindInterface = "tun1"; + port = 5912; + }; +} + + + this enables you to declare a SOCKS proxy for each uplink. + + + + + overridePackages function no longer exists. + It is replaced by + + overlays. For example, the following code: + + +let + pkgs = import <nixpkgs> {}; +in + pkgs.overridePackages (self: super: ...) + + + should be replaced by: + + +let + pkgs = import <nixpkgs> {}; +in + import pkgs.path { overlays = [(self: super: ...)]; } + + + + + Autoloading connection tracking helpers is now disabled by + default. This default was also changed in the Linux kernel and + is considered insecure if not configured properly in your + firewall. If you need connection tracking helpers (i.e. for + active FTP) please enable + networking.firewall.autoLoadConntrackHelpers + and tune + networking.firewall.connectionTrackingModules + to suit your needs. + + + + + local_recipient_maps is not set to empty + value by Postfix service. It's an insecure default as stated + by Postfix documentation. Those who want to retain this + setting need to set it via + services.postfix.extraConfig. + + + + + Iputils no longer provide ping6 and traceroute6. The + functionality of these tools has been integrated into ping and + traceroute respectively. To enforce an address family the new + flags -4 and -6 have + been added. One notable incompatibility is that specifying an + interface (for link-local IPv6 for instance) is no longer done + with the -I flag, but by encoding the + interface into the address + (ping fe80::1%eth0). + + + + + The socket handling of the services.rmilter + module has been fixed and refactored. As rmilter doesn't + support binding to more than one socket, the options + bindUnixSockets and + bindInetSockets have been replaced by + services.rmilter.bindSocket.*. The default + is still a unix socket in + /run/rmilter/rmilter.sock. Refer to the + options documentation for more information. + + + + + The fetch* functions no longer support md5, + please use sha256 instead. + + + + + The dnscrypt-proxy module interface has been streamlined + around the extraArgs option. Where + possible, legacy option declarations are mapped to + extraArgs but will emit warnings. The + resolverList has been outright removed: to + use an unlisted resolver, use the + customResolver option. + + + + + torbrowser now stores local state under + ~/.local/share/tor-browser by default. Any + browser profile data from the old location, + ~/.torbrowser4, must be migrated manually. + + + + + The ihaskell, monetdb, offlineimap and sitecopy services have + been removed. + + + +
+
+ Other Notable Changes + + + + Module type system have a new extensible option types feature + that allow to extend certain types, such as enum, through + multiple option declarations of the same option across + multiple modules. + + + + + jre now defaults to GTK UI by default. This + improves visual consistency and makes Java follow system font + style, improving the situation on HighDPI displays. This has a + cost of increased closure size; for server and other headless + workloads it's recommended to use + jre_headless. + + + + + Python 2.6 interpreter and package set have been removed. + + + + + The Python 2.7 interpreter does not use modules anymore. + Instead, all CPython interpreters now include the whole + standard library except for `tkinter`, which is available in + the Python package set. + + + + + Python 2.7, 3.5 and 3.6 are now built deterministically and + 3.4 mostly. Minor modifications had to be made to the + interpreters in order to generate deterministic bytecode. This + has security implications and is relevant for those using + Python in a nix-shell. See the Nixpkgs + manual for details. + + + + + The Python package sets now use a fixed-point combinator and + the sets are available as attributes of the interpreters. + + + + + The Python function buildPythonPackage has + been improved and can be used to build from Setuptools source, + Flit source, and precompiled Wheels. + + + + + When adding new or updating current Python libraries, the + expressions should be put in separate files in + pkgs/development/python-modules and called + from python-packages.nix. + + + + + The dnscrypt-proxy service supports synchronizing the list of + public resolvers without working DNS resolution. This fixes + issues caused by the resolver list becoming outdated. It also + improves the viability of DNSCrypt only configurations. + + + + + Containers using bridged networking no longer lose their + connection after changes to the host networking. + + + + + ZFS supports pool auto scrubbing. + + + + + The bind DNS utilities (e.g. dig) have been split into their + own output and are now also available in + pkgs.dnsutils and it is no longer necessary + to pull in all of bind to use them. + + + + + Per-user configuration was moved from + ~/.nixpkgs to + ~/.config/nixpkgs. The former is still + valid for config.nix for backwards + compatibility. + + + +
+
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1709.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1709.section.xml new file mode 100644 index 00000000000..8f0efe816e5 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1709.section.xml @@ -0,0 +1,922 @@ +
+ Release 17.09 (<quote>Hummingbird</quote>, 2017/09/??) +
+ Highlights + + In addition to numerous new and upgraded packages, this release + has the following highlights: + + + + + The GNOME version is now 3.24. KDE Plasma was upgraded to + 5.10, KDE Applications to 17.08.1 and KDE Frameworks to 5.37. + + + + + The user handling now keeps track of deallocated UIDs/GIDs. + When a user or group is revived, this allows it to be + allocated the UID/GID it had before. A consequence is that + UIDs and GIDs are no longer reused. + + + + + The module option + services.xserver.xrandrHeads now causes the + first head specified in this list to be set as the primary + head. Apart from that, it's now possible to also set + additional options by using an attribute set, for example: + + +{ services.xserver.xrandrHeads = [ + "HDMI-0" + { + output = "DVI-0"; + primary = true; + monitorConfig = '' + Option "Rotate" "right" + ''; + } + ]; +} + + + This will set the DVI-0 output to be the + primary head, even though HDMI-0 is the + first head in the list. + + + + + The handling of SSL in the services.nginx + module has been cleaned up, renaming the misnamed + enableSSL to onlySSL + which reflects its original intention. This is not to be used + with the already existing forceSSL which + creates a second non-SSL virtual host redirecting to the SSL + virtual host. This by chance had worked earlier due to + specific implementation details. In case you had specified + both please remove the enableSSL option to + keep the previous behaviour. + + + Another addSSL option has been introduced + to configure both a non-SSL virtual host and an SSL virtual + host with the same configuration. + + + Options to configure resolver options and + upstream blocks have been introduced. See + their information for further details. + + + The port option has been replaced by a more + generic listen option which makes it + possible to specify multiple addresses, ports and SSL configs + dependant on the new SSL handling mentioned above. + + + +
+
+ New Services + + The following new services were added since the last release: + + + + + config/fonts/fontconfig-penultimate.nix + + + + + config/fonts/fontconfig-ultimate.nix + + + + + config/terminfo.nix + + + + + hardware/sensor/iio.nix + + + + + hardware/nitrokey.nix + + + + + hardware/raid/hpsa.nix + + + + + programs/browserpass.nix + + + + + programs/gnupg.nix + + + + + programs/qt5ct.nix + + + + + programs/slock.nix + + + + + programs/thefuck.nix + + + + + security/auditd.nix + + + + + security/lock-kernel-modules.nix + + + + + service-managers/docker.nix + + + + + service-managers/trivial.nix + + + + + services/admin/salt/master.nix + + + + + services/admin/salt/minion.nix + + + + + services/audio/slimserver.nix + + + + + services/cluster/kubernetes/default.nix + + + + + services/cluster/kubernetes/dns.nix + + + + + services/cluster/kubernetes/dashboard.nix + + + + + services/continuous-integration/hail.nix + + + + + services/databases/clickhouse.nix + + + + + services/databases/postage.nix + + + + + services/desktops/gnome3/gnome-disks.nix + + + + + services/desktops/gnome3/gpaste.nix + + + + + services/logging/SystemdJournal2Gelf.nix + + + + + services/logging/heartbeat.nix + + + + + services/logging/journalwatch.nix + + + + + services/logging/syslogd.nix + + + + + services/mail/mailhog.nix + + + + + services/mail/nullmailer.nix + + + + + services/misc/airsonic.nix + + + + + services/misc/autorandr.nix + + + + + services/misc/exhibitor.nix + + + + + services/misc/fstrim.nix + + + + + services/misc/gollum.nix + + + + + services/misc/irkerd.nix + + + + + services/misc/jackett.nix + + + + + services/misc/radarr.nix + + + + + services/misc/snapper.nix + + + + + services/monitoring/osquery.nix + + + + + services/monitoring/prometheus/collectd-exporter.nix + + + + + services/monitoring/prometheus/fritzbox-exporter.nix + + + + + services/network-filesystems/kbfs.nix + + + + + services/networking/dnscache.nix + + + + + services/networking/fireqos.nix + + + + + services/networking/iwd.nix + + + + + services/networking/keepalived/default.nix + + + + + services/networking/keybase.nix + + + + + services/networking/lldpd.nix + + + + + services/networking/matterbridge.nix + + + + + services/networking/squid.nix + + + + + services/networking/tinydns.nix + + + + + services/networking/xrdp.nix + + + + + services/security/shibboleth-sp.nix + + + + + services/security/sks.nix + + + + + services/security/sshguard.nix + + + + + services/security/torify.nix + + + + + services/security/usbguard.nix + + + + + services/security/vault.nix + + + + + services/system/earlyoom.nix + + + + + services/system/saslauthd.nix + + + + + services/web-apps/nexus.nix + + + + + services/web-apps/pgpkeyserver-lite.nix + + + + + services/web-apps/piwik.nix + + + + + services/web-servers/lighttpd/collectd.nix + + + + + services/web-servers/minio.nix + + + + + services/x11/display-managers/xpra.nix + + + + + services/x11/xautolock.nix + + + + + tasks/filesystems/bcachefs.nix + + + + + tasks/powertop.nix + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + In an Qemu-based virtualization + environment, the network interface names changed from i.e. + enp0s3 to + ens3. + + + This is due to a kernel configuration change. The new naming + is consistent with those of other Linux distributions with + systemd. See + #29197 + for more information. + + + A machine is affected if the virt-what tool + either returns qemu or + kvm and has interface + names used in any part of its NixOS configuration, in + particular if a static network configuration with + networking.interfaces is used. + + + Before rebooting affected machines, please ensure: + + + + + Change the interface names in your NixOS configuration. + The first interface will be called + ens3, the second one + ens8 and starting from there + incremented by 1. + + + + + After changing the interface names, rebuild your system + with nixos-rebuild boot to activate the + new configuration after a reboot. If you switch to the new + configuration right away you might lose network + connectivity! If using nixops, deploy + with nixops deploy --force-reboot. + + + + + + + The following changes apply if the + stateVersion is changed to 17.09 or higher. + For stateVersion = "17.03" or + lower the old behavior is preserved. + + + + + The postgres default version was + changed from 9.5 to 9.6. + + + + + The postgres superuser name has changed + from root to + postgres to more closely follow what + other Linux distributions are doing. + + + + + The postgres default + dataDir has changed from + /var/db/postgres to + /var/lib/postgresql/$psqlSchema where + $psqlSchema is 9.6 for example. + + + + + The mysql default + dataDir has changed from + /var/mysql to + /var/lib/mysql. + + + + + Radicale's default package has changed from 1.x to 2.x. + Instructions to migrate can be found + here + . It is also possible to use the newer version by + setting the package to + radicale2, which is done automatically + when stateVersion is 17.09 or higher. + The extraArgs option has been added to + allow passing the data migration arguments specified in + the instructions; see the radicale.nix + NixOS test for an example migration. + + + + + + + The aiccu package was removed. This is due + to SixXS + sunsetting its IPv6 tunnel. + + + + + The fanctl package and + fan module have been removed due to the + developers not upstreaming their iproute2 patches and lagging + with compatibility to recent iproute2 versions. + + + + + Top-level idea package collection was + renamed. All JetBrains IDEs are now at + jetbrains. + + + + + flexget's state database cannot be upgraded + to its new internal format, requiring removal of any existing + db-config.sqlite which will be + automatically recreated. + + + + + The ipfs service now doesn't ignore the + dataDir option anymore. If you've ever set + this option to anything other than the default you'll have to + either unset it (so the default gets used) or migrate the old + data manually with + + +dataDir=<valueOfDataDir> +mv /var/lib/ipfs/.ipfs/* $dataDir +rmdir /var/lib/ipfs/.ipfs + + + + + The caddy service was previously using an + extra .caddy directory in the data + directory specified with the dataDir + option. The contents of the .caddy + directory are now expected to be in the + dataDir. + + + + + The ssh-agent user service is not started + by default anymore. Use + programs.ssh.startAgent to enable it if + needed. There is also a new + programs.gnupg.agent module that creates a + gpg-agent user service. It can also serve + as a SSH agent if enableSSHSupport is set. + + + + + The + services.tinc.networks.<name>.listenAddress + option had a misleading name that did not correspond to its + behavior. It now correctly defines the ip to listen for + incoming connections on. To keep the previous behaviour, use + services.tinc.networks.<name>.bindToAddress + instead. Refer to the description of the options for more + details. + + + + + tlsdate package and module were removed. + This is due to the project being dead and not building with + openssl 1.1. + + + + + wvdial package and module were removed. + This is due to the project being dead and not building with + openssl 1.1. + + + + + cc-wrapper's setup-hook now exports a + number of environment variables corresponding to binutils + binaries, (e.g. LD, + STRIP, RANLIB, etc). + This is done to prevent packages' build systems guessing, + which is harder to predict, especially when cross-compiling. + However, some packages have broken due to this—their build + systems either not supporting, or claiming to support without + adequate testing, taking such environment variables as + parameters. + + + + + services.firefox.syncserver now runs by + default as a non-root user. To accomodate this change, the + default sqlite database location has also been changed. + Migration should work automatically. Refer to the description + of the options for more details. + + + + + The compiz window manager and package was + removed. The system support had been broken for several years. + + + + + Touchpad support should now be enabled through + libinput as synaptics is + now deprecated. See the option + services.xserver.libinput.enable. + + + + + grsecurity/PaX support has been dropped, following upstream's + decision to cease free support. See + + upstream's announcement for more information. No + complete replacement for grsecurity/PaX is available + presently. + + + + + services.mysql now has declarative + configuration of databases and users with the + ensureDatabases and + ensureUsers options. + + + These options will never delete existing databases and users, + especially not when the value of the options are changed. + + + The MySQL users will be identified using + + Unix socket authentication. This authenticates the Unix + user with the same name only, and that without the need for a + password. + + + If you have previously created a MySQL root + user with a password, you will need to + add root user for unix socket + authentication before using the new options. This can be done + by running the following SQL script: + + +CREATE USER 'root'@'%' IDENTIFIED BY ''; +GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' WITH GRANT OPTION; +FLUSH PRIVILEGES; + +-- Optionally, delete the password-authenticated user: +-- DROP USER 'root'@'localhost'; + + + + + services.mysqlBackup now works by default + without any user setup, including for users other than + mysql. + + + By default, the mysql user is no longer the + user which performs the backup. Instead a system account + mysqlbackup is used. + + + The mysqlBackup service is also now using + systemd timers instead of cron. + + + Therefore, the services.mysqlBackup.period + option no longer exists, and has been replaced with + services.mysqlBackup.calendar, which is in + the format of + systemd.time(7). + + + If you expect to be sent an e-mail when the backup fails, + consider using a script which monitors the systemd journal for + errors. Regretfully, at present there is no built-in + functionality for this. + + + You can check that backups still work by running + systemctl start mysql-backup then + systemctl status mysql-backup. + + + + + Templated systemd services e.g + container@name are now handled currectly + when switching to a new configuration, resulting in them being + reloaded. + + + + + Steam: the newStdcpp parameter was removed + and should not be needed anymore. + + + + + Redis has been updated to version 4 which mandates a cluster + mass-restart, due to changes in the network handling, in order + to ensure compatibility with networks NATing traffic. + + + +
+
+ Other Notable Changes + + + + Modules can now be disabled by using + + disabledModules, allowing another to take it's place. + This can be used to import a set of modules from another + channel while keeping the rest of the system on a stable + release. + + + + + Updated to FreeType 2.7.1, including a new TrueType engine. + The new engine replaces the Infinality engine which was the + default in NixOS. The default font rendering settings are now + provided by fontconfig-penultimate, replacing + fontconfig-ultimate; the new defaults are less invasive and + provide rendering that is more consistent with other systems + and hopefully with each font designer's intent. Some + system-wide configuration has been removed from the Fontconfig + NixOS module where user Fontconfig settings are available. + + + + + ZFS/SPL have been updated to 0.7.0, + zfsUnstable, splUnstable have therefore + been removed. + + + + + The time.timeZone option now allows the + value null in addition to timezone strings. + This value allows changing the timezone of a system + imperatively using + timedatectl set-timezone. The default + timezone is still UTC. + + + + + Nixpkgs overlays may now be specified with a file as well as a + directory. The value of + <nixpkgs-overlays> may be a file, and + ~/.config/nixpkgs/overlays.nix can be used + instead of the ~/.config/nixpkgs/overlays + directory. + + + See the overlays chapter of the Nixpkgs manual for more + details. + + + + + Definitions for /etc/hosts can now be + specified declaratively with + networking.hosts. + + + + + Two new options have been added to the installer loader, in + addition to the default having changed. The kernel log + verbosity has been lowered to the upstream default for the + default options, in order to not spam the console when e.g. + joining a network. + + + This therefore leads to adding a new debug + option to set the log level to the previous verbose mode, to + make debugging easier, but still accessible easily. + + + Additionally a copytoram option has been + added, which makes it possible to remove the install medium + after booting. This allows tethering from your phone after + booting from it. + + + + + services.gitlab-runner.configOptions has + been added to specify the configuration of gitlab-runners + declaratively. + + + + + services.jenkins.plugins has been added to + install plugins easily, this can be generated with + jenkinsPlugins2nix. + + + + + services.postfix.config has been added to + specify the main.cf with NixOS options. Additionally other + options have been added to the postfix module and has been + improved further. + + + + + The GitLab package and module have been updated to the latest + 10.0 release. + + + + + The systemd-boot boot loader now lists the + NixOS version, kernel version and build date of all bootable + generations. + + + + + The dnscrypt-proxy service now defaults to using a random + upstream resolver, selected from the list of public + non-logging resolvers with DNSSEC support. Existing + configurations can be migrated to this mode of operation by + omitting the + services.dnscrypt-proxy.resolverName option + or setting it to "random". + + + +
+
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1803.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1803.section.xml new file mode 100644 index 00000000000..f54f6129e0d --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1803.section.xml @@ -0,0 +1,871 @@ +
+ Release 18.03 (<quote>Impala</quote>, 2018/04/04) +
+ Highlights + + In addition to numerous new and upgraded packages, this release + has the following highlights: + + + + + End of support is planned for end of October 2018, handing + over to 18.09. + + + + + Platform support: x86_64-linux and x86_64-darwin since release + time (the latter isn't NixOS, really). Binaries for + aarch64-linux are available, but no channel exists yet, as + it's waiting for some test fixes, etc. + + + + + Nix now defaults to 2.0; see its + release + notes. + + + + + Core version changes: linux: 4.9 -> 4.14, glibc: 2.25 -> + 2.26, gcc: 6 -> 7, systemd: 234 -> 237. + + + + + Desktop version changes: gnome: 3.24 -> 3.26, (KDE) + plasma-desktop: 5.10 -> 5.12. + + + + + MariaDB 10.2, updated from 10.1, is now the default MySQL + implementation. While upgrading a few changes have been made + to the infrastructure involved: + + + + + libmysql has been deprecated, please + use mysql.connector-c instead, a + compatibility passthru has been added to the MySQL + packages. + + + + + The mysql57 package has a new + static output containing the static + libraries including libmysqld.a + + + + + + + PHP now defaults to PHP 7.2, updated from 7.1. + + + +
+
+ New Services + + The following new services were added since the last release: + + + + + ./config/krb5/default.nix + + + + + ./hardware/digitalbitbox.nix + + + + + ./misc/label.nix + + + + + ./programs/ccache.nix + + + + + ./programs/criu.nix + + + + + ./programs/digitalbitbox/default.nix + + + + + ./programs/less.nix + + + + + ./programs/npm.nix + + + + + ./programs/plotinus.nix + + + + + ./programs/rootston.nix + + + + + ./programs/systemtap.nix + + + + + ./programs/sway.nix + + + + + ./programs/udevil.nix + + + + + ./programs/way-cooler.nix + + + + + ./programs/yabar.nix + + + + + ./programs/zsh/zsh-autoenv.nix + + + + + ./services/backup/borgbackup.nix + + + + + ./services/backup/crashplan-small-business.nix + + + + + ./services/desktops/dleyna-renderer.nix + + + + + ./services/desktops/dleyna-server.nix + + + + + ./services/desktops/pipewire.nix + + + + + ./services/desktops/gnome3/chrome-gnome-shell.nix + + + + + ./services/desktops/gnome3/tracker-miners.nix + + + + + ./services/hardware/fwupd.nix + + + + + ./services/hardware/interception-tools.nix + + + + + ./services/hardware/u2f.nix + + + + + ./services/hardware/usbmuxd.nix + + + + + ./services/mail/clamsmtp.nix + + + + + ./services/mail/dkimproxy-out.nix + + + + + ./services/mail/pfix-srsd.nix + + + + + ./services/misc/gitea.nix + + + + + ./services/misc/home-assistant.nix + + + + + ./services/misc/ihaskell.nix + + + + + ./services/misc/logkeys.nix + + + + + ./services/misc/novacomd.nix + + + + + ./services/misc/osrm.nix + + + + + ./services/misc/plexpy.nix + + + + + ./services/misc/pykms.nix + + + + + ./services/misc/tzupdate.nix + + + + + ./services/monitoring/fusion-inventory.nix + + + + + ./services/monitoring/prometheus/exporters.nix + + + + + ./services/network-filesystems/beegfs.nix + + + + + ./services/network-filesystems/davfs2.nix + + + + + ./services/network-filesystems/openafs/client.nix + + + + + ./services/network-filesystems/openafs/server.nix + + + + + ./services/network-filesystems/ceph.nix + + + + + ./services/networking/aria2.nix + + + + + ./services/networking/monero.nix + + + + + ./services/networking/nghttpx/default.nix + + + + + ./services/networking/nixops-dns.nix + + + + + ./services/networking/rxe.nix + + + + + ./services/networking/stunnel.nix + + + + + ./services/web-apps/matomo.nix + + + + + ./services/web-apps/restya-board.nix + + + + + ./services/web-servers/mighttpd2.nix + + + + + ./services/x11/fractalart.nix + + + + + ./system/boot/binfmt.nix + + + + + ./system/boot/grow-partition.nix + + + + + ./tasks/filesystems/ecryptfs.nix + + + + + ./virtualisation/hyperv-guest.nix + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + sound.enable now defaults to false. + + + + + Dollar signs in options under + services.postfix are passed verbatim to + Postfix, which will interpret them as the beginning of a + parameter expression. This was already true for string-valued + options in the previous release, but not for list-valued + options. If you need to pass literal dollar signs through + Postfix, double them. + + + + + The postage package (for web-based + PostgreSQL administration) has been renamed to + pgmanage. The corresponding module has also + been renamed. To migrate please rename all + services.postage options to + services.pgmanage. + + + + + Package attributes starting with a digit have been prefixed + with an underscore sign. This is to avoid quoting in the + configuration and other issues with command-line tools like + nix-env. The change affects the following + packages: + + + + + 2048-in-terminal → + _2048-in-terminal + + + + + 90secondportraits → + _90secondportraits + + + + + 2bwm_2bwm + + + + + 389-ds-base → + _389-ds-base + + + + + + + The OpenSSH service no longer enables + support for DSA keys by default, which could cause a system + lock out. Update your keys or, unfavorably, re-enable DSA + support manually. + + + DSA support was + deprecated + in OpenSSH 7.0, due to it being too weak. To re-enable + support, add + PubkeyAcceptedKeyTypes +ssh-dss to the end + of your services.openssh.extraConfig. + + + After updating the keys to be stronger, anyone still on a + pre-17.03 version is safe to jump to 17.03, as vetted + here. + + + + + The openssh package now includes Kerberos + support by default; the + openssh_with_kerberos package is now a + deprecated alias. If you do not want Kerberos support, you can + do + openssh.override { withKerberos = false; }. + Note, this also applies to the openssh_hpn + package. + + + + + cc-wrapper has been split in two; there is + now also a bintools-wrapper. The most + commonly used files in nix-support are now + split between the two wrappers. Some commonly used ones, like + nix-support/dynamic-linker, are duplicated + for backwards compatability, even though they rightly belong + only in bintools-wrapper. Other more + obscure ones are just moved. + + + + + The propagation logic has been changed. The new logic, along + with new types of dependencies that go with, is thoroughly + documented in the "Specifying dependencies" section + of the "Standard Environment" chapter of the nixpkgs + manual. The old logic isn't but is easy to describe: + dependencies were propagated as the same type of dependency no + matter what. In practice, that means that many + propagatedNativeBuildInputs should instead + be propagatedBuildInputs. Thankfully, that + was and is the least used type of dependency. Also, it means + that some propagatedBuildInputs should + instead be depsTargetTargetPropagated. + Other types dependencies should be unaffected. + + + + + lib.addPassthru drv passthru is removed. + Use lib.extendDerivation true passthru drv + instead. + + + + + The memcached service no longer accept + dynamic socket paths via + services.memcached.socket. Unix sockets can + be still enabled by + services.memcached.enableUnixSocket and + will be accessible at + /run/memcached/memcached.sock. + + + + + The hardware.amdHybridGraphics.disable + option was removed for lack of a maintainer. If you still need + this module, you may wish to include a copy of it from an + older version of nixos in your imports. + + + + + The merging of config options for + services.postfix.config was buggy. + Previously, if other options in the Postfix module like + services.postfix.useSrs were set and the + user set config options that were also set by such options, + the resulting config wouldn't include all options that were + needed. They are now merged correctly. If config options need + to be overridden, lib.mkForce or + lib.mkOverride can be used. + + + + + The following changes apply if the + stateVersion is changed to 18.03 or higher. + For stateVersion = "17.09" or + lower the old behavior is preserved. + + + + + matrix-synapse uses postgresql by + default instead of sqlite. Migration instructions can be + found + + here . + + + + + + + The jid package has been removed, due to + maintenance overhead of a go package having non-versioned + dependencies. + + + + + When using services.xserver.libinput + (enabled by default in GNOME), it now handles all input + devices, not just touchpads. As a result, you might need to + re-evaluate any custom Xorg configuration. In particular, + Option "XkbRules" "base" + may result in broken keyboard layout. + + + + + The attic package was removed. A maintained + fork called + Borg + should be used instead. Migration instructions can be found + here. + + + + + The Piwik analytics software was renamed to Matomo: + + + + + The package pkgs.piwik was renamed to + pkgs.matomo. + + + + + The service services.piwik was renamed + to services.matomo. + + + + + The data directory /var/lib/piwik was + renamed to /var/lib/matomo. All files + will be moved automatically on first startup, but you + might need to adjust your backup scripts. + + + + + The default serverName for the nginx + configuration changed from + piwik.${config.networking.hostName} to + matomo.${config.networking.hostName}.${config.networking.domain} + if config.networking.domain is set, + matomo.${config.networking.hostName} if + it is not set. If you change your + serverName, remember you'll need to + update the trustedHosts[] array in + /var/lib/matomo/config/config.ini.php + as well. + + + + + The piwik user was renamed to + matomo. The service will adjust + ownership automatically for files in the data directory. + If you use unix socket authentication, remember to give + the new matomo user access to the + database and to change the username to + matomo in the + [database] section of + /var/lib/matomo/config/config.ini.php. + + + + + If you named your database `piwik`, you might want to + rename it to `matomo` to keep things clean, but this is + neither enforced nor required. + + + + + + + nodejs-4_x is end-of-life. + nodejs-4_x, + nodejs-slim-4_x and + nodePackages_4_x are removed. + + + + + The pump.io NixOS module was removed. It is + now maintained as an + external + module. + + + + + The Prosody XMPP server has received a major update. The + following modules were renamed: + + + + + services.prosody.modules.httpserver is + now services.prosody.modules.http_files + + + + + services.prosody.modules.console is now + services.prosody.modules.admin_telnet + + + + + Many new modules are now core modules, most notably + services.prosody.modules.carbons and + services.prosody.modules.mam. + + + The better-performing libevent backend is + now enabled by default. + + + withCommunityModules now passes through the + modules to services.prosody.extraModules. + Use withOnlyInstalledCommunityModules for + modules that should not be enabled directly, e.g + lib_ldap. + + + + + All prometheus exporter modules are now defined as submodules. + The exporters are configured using + services.prometheus.exporters. + + + +
+
+ Other Notable Changes + + + + ZNC option services.znc.mutable now + defaults to true. That means that old + configuration is not overwritten by default when update to the + znc options are made. + + + + + The option + networking.wireless.networks.<name>.auth + has been added for wireless networks with WPA-Enterprise + authentication. There is also a new + extraConfig option to directly configure + wpa_supplicant and + hidden to connect to hidden networks. + + + + + In the module + networking.interfaces.<name> the + following options have been removed: + + + + + ipAddress + + + + + ipv6Address + + + + + prefixLength + + + + + ipv6PrefixLength + + + + + subnetMask + + + + + To assign static addresses to an interface the options + ipv4.addresses and + ipv6.addresses should be used instead. The + options ip4 and ip6 have + been renamed to ipv4.addresses + ipv6.addresses respectively. The new + options ipv4.routes and + ipv6.routes have been added to set up + static routing. + + + + + The option services.logstash.listenAddress + is now 127.0.0.1 by default. Previously the + default behaviour was to listen on all interfaces. + + + + + services.btrfs.autoScrub has been added, to + periodically check btrfs filesystems for data corruption. If + there's a correct copy available, it will automatically repair + corrupted blocks. + + + + + displayManager.lightdm.greeters.gtk.clock-format. + has been added, the clock format string (as expected by + strftime, e.g. %H:%M) to use with the + lightdm gtk greeter panel. + + + If set to null the default clock format is used. + + + + + displayManager.lightdm.greeters.gtk.indicators + has been added, a list of allowed indicator modules to use + with the lightdm gtk greeter panel. + + + Built-in indicators include ~a11y, + ~language, ~session, + ~power, ~clock, + ~host, ~spacer. Unity + indicators can be represented by short name (e.g. + sound, power), service + file name, or absolute path. + + + If set to null the default indicators are + used. + + + In order to have the previous default configuration add + + +{ + services.xserver.displayManager.lightdm.greeters.gtk.indicators = [ + "~host" "~spacer" + "~clock" "~spacer" + "~session" + "~language" + "~a11y" + "~power" + ]; +} + + + to your configuration.nix. + + + + + The NixOS test driver supports user services declared by + systemd.user.services. The methods + waitForUnit, + getUnitInfo, startJob + and stopJob provide an optional + $user argument for that purpose. + + + + + Enabling bash completion on NixOS, + programs.bash.enableCompletion, will now + also enable completion for the Nix command line tools by + installing the + nix-bash-completions + package. + + + +
+
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1809.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1809.section.xml new file mode 100644 index 00000000000..aa4637a99b6 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1809.section.xml @@ -0,0 +1,941 @@ +
+ Release 18.09 (<quote>Jellyfish</quote>, 2018/10/05) +
+ Highlights + + In addition to numerous new and upgraded packages, this release + has the following notable updates: + + + + + End of support is planned for end of April 2019, handing over + to 19.03. + + + + + Platform support: x86_64-linux and x86_64-darwin as always. + Support for aarch64-linux is as with the previous releases, + not equivalent to the x86-64-linux release, but with efforts + to reach parity. + + + + + Nix has been updated to 2.1; see its + release + notes. + + + + + Core versions: linux: 4.14 LTS (unchanged), glibc: 2.26 → + 2.27, gcc: 7 (unchanged), systemd: 237 → 239. + + + + + Desktop version changes: gnome: 3.26 → 3.28, (KDE) + plasma-desktop: 5.12 → 5.13. + + + + + Notable changes and additions for 18.09 include: + + + + + Support for wrapping binaries using + firejail has been added through + programs.firejail.wrappedBinaries. + + + For example + + +{ + programs.firejail = { + enable = true; + wrappedBinaries = { + firefox = "${lib.getBin pkgs.firefox}/bin/firefox"; + mpv = "${lib.getBin pkgs.mpv}/bin/mpv"; + }; + }; +} + + + This will place firefox and + mpv binaries in the global path wrapped by + firejail. + + + + + User channels are now in the default + NIX_PATH, allowing users to use their + personal nix-channel defined channels in + nix-build and nix-shell + commands, as well as in imports like + import <mychannel>. + + + For example + + +$ nix-channel --add https://nixos.org/channels/nixpkgs-unstable nixpkgsunstable +$ nix-channel --update +$ nix-build '<nixpkgsunstable>' -A gitFull +$ nix run -f '<nixpkgsunstable>' gitFull +$ nix-instantiate -E '(import <nixpkgsunstable> {}).gitFull' + + + +
+
+ New Services + + A curated selection of new services that were added since the last + release: + + + + + The services.cassandra module has been + reworked and was rewritten from scratch. The service has + succeeding tests for the versions 2.1, 2.2, 3.0 and 3.11 of + Apache + Cassandra. + + + + + There is a new services.foundationdb module + for deploying + FoundationDB + clusters. + + + + + When enabled the iproute2 will copy the + files expected by ip route (e.g., + rt_tables) in + /etc/iproute2. This allows to write aliases + for routing tables for instance. + + + + + services.strongswan-swanctl is a modern + replacement for services.strongswan. You + can use either one of them to setup IPsec VPNs but not both at + the same time. + + + services.strongswan-swanctl uses the + swanctl + command which uses the modern + vici + Versatile IKE Configuration Interface. + The deprecated ipsec command used in + services.strongswan is using the legacy + stroke + configuration interface. + + + + + The new services.elasticsearch-curator + service periodically curates or manages, your Elasticsearch + indices and snapshots. + + + + + Every new services: + + + + + ./config/xdg/autostart.nix + + + + + ./config/xdg/icons.nix + + + + + ./config/xdg/menus.nix + + + + + ./config/xdg/mime.nix + + + + + ./hardware/brightnessctl.nix + + + + + ./hardware/onlykey.nix + + + + + ./hardware/video/uvcvideo/default.nix + + + + + ./misc/documentation.nix + + + + + ./programs/firejail.nix + + + + + ./programs/iftop.nix + + + + + ./programs/sedutil.nix + + + + + ./programs/singularity.nix + + + + + ./programs/xss-lock.nix + + + + + ./programs/zsh/zsh-autosuggestions.nix + + + + + ./services/admin/oxidized.nix + + + + + ./services/backup/duplicati.nix + + + + + ./services/backup/restic.nix + + + + + ./services/backup/restic-rest-server.nix + + + + + ./services/cluster/hadoop/default.nix + + + + + ./services/databases/aerospike.nix + + + + + ./services/databases/monetdb.nix + + + + + ./services/desktops/bamf.nix + + + + + ./services/desktops/flatpak.nix + + + + + ./services/desktops/zeitgeist.nix + + + + + ./services/development/bloop.nix + + + + + ./services/development/jupyter/default.nix + + + + + ./services/hardware/lcd.nix + + + + + ./services/hardware/undervolt.nix + + + + + ./services/misc/clipmenu.nix + + + + + ./services/misc/gitweb.nix + + + + + ./services/misc/serviio.nix + + + + + ./services/misc/safeeyes.nix + + + + + ./services/misc/sysprof.nix + + + + + ./services/misc/weechat.nix + + + + + ./services/monitoring/datadog-agent.nix + + + + + ./services/monitoring/incron.nix + + + + + ./services/networking/dnsdist.nix + + + + + ./services/networking/freeradius.nix + + + + + ./services/networking/hans.nix + + + + + ./services/networking/morty.nix + + + + + ./services/networking/ndppd.nix + + + + + ./services/networking/ocserv.nix + + + + + ./services/networking/owamp.nix + + + + + ./services/networking/quagga.nix + + + + + ./services/networking/shadowsocks.nix + + + + + ./services/networking/stubby.nix + + + + + ./services/networking/zeronet.nix + + + + + ./services/security/certmgr.nix + + + + + ./services/security/cfssl.nix + + + + + ./services/security/oauth2_proxy_nginx.nix + + + + + ./services/web-apps/virtlyst.nix + + + + + ./services/web-apps/youtrack.nix + + + + + ./services/web-servers/hitch/default.nix + + + + + ./services/web-servers/hydron.nix + + + + + ./services/web-servers/meguca.nix + + + + + ./services/web-servers/nginx/gitweb.nix + + + + + ./virtualisation/kvmgt.nix + + + + + ./virtualisation/qemu-guest-agent.nix + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + Some licenses that were incorrectly not marked as unfree now + are. This is the case for: + + + + + cc-by-nc-sa-20: Creative Commons Attribution Non + Commercial Share Alike 2.0 + + + + + cc-by-nc-sa-25: Creative Commons Attribution Non + Commercial Share Alike 2.5 + + + + + cc-by-nc-sa-30: Creative Commons Attribution Non + Commercial Share Alike 3.0 + + + + + cc-by-nc-sa-40: Creative Commons Attribution Non + Commercial Share Alike 4.0 + + + + + cc-by-nd-30: Creative Commons Attribution-No Derivative + Works v3.00 + + + + + msrla: Microsoft Research License Agreement + + + + + + + The deprecated services.cassandra module + has seen a complete rewrite. (See above.) + + + + + lib.strict is removed. Use + builtins.seq instead. + + + + + The clementine package points now to the + free derivation. clementineFree is removed + now and clementineUnfree points to the + package which is bundled with the unfree + libspotify package. + + + + + The netcat package is now taken directly + from OpenBSD's libressl, instead of relying + on Debian's fork. The new version should be very close to the + old version, but there are some minor differences. + Importantly, flags like -b, -q, -C, and -Z are no longer + accepted by the nc command. + + + + + The services.docker-registry.extraConfig + object doesn't contain environment variables anymore. Instead + it needs to provide an object structure that can be mapped + onto the YAML configuration defined in + the + docker/distribution docs. + + + + + gnucash has changed from version 2.4 to + 3.x. If you've been using gnucash (version + 2.4) instead of gnucash26 (version 2.6) you + must open your Gnucash data file(s) with + gnucash26 and then save them to upgrade the + file format. Then you may use your data file(s) with Gnucash + 3.x. See the upgrade + documentation. + Gnucash 2.4 is still available under the attribute + gnucash24. + + + + + services.munge now runs as user (and group) + munge instead of root. Make sure the key + file is accessible to the daemon. + + + + + dockerTools.buildImage now uses + null as default value for + tag, which indicates that the nix output + hash will be used as tag. + + + + + The ELK stack: elasticsearch, + logstash and kibana has + been upgraded from 2.* to 6.3.*. The 2.* versions have been + unsupported + since last year so they have been removed. You can + still use the 5.* versions under the names + elasticsearch5, + logstash5 and kibana5. + + + The elastic beats: filebeat, + heartbeat, metricbeat + and packetbeat have had the same treatment: + they now target 6.3.* as well. The 5.* versions are available + under the names: filebeat5, + heartbeat5, metricbeat5 + and packetbeat5 + + + The ELK-6.3 stack now comes with + X-Pack + by default. Since X-Pack is licensed under the + Elastic + License the ELK packages now have an unfree license. To + use them you need to specify + allowUnfree = true; in your nixpkgs + configuration. + + + Fortunately there is also a free variant of the ELK stack + without X-Pack. The packages are available under the names: + elasticsearch-oss, + logstash-oss and + kibana-oss. + + + + + Options + boot.initrd.luks.devices.name.yubikey.ramfsMountPoint + boot.initrd.luks.devices.name.yubikey.storage.mountPoint + were removed. luksroot.nix module never + supported more than one YubiKey at a time anyway, hence those + options never had any effect. You should be able to remove + them from your config without any issues. + + + + + stdenv.system and system + in nixpkgs now refer to the host platform instead of the build + platform. For native builds this is not change, let alone a + breaking one. For cross builds, it is a breaking change, and + stdenv.buildPlatform.system can be used + instead for the old behavior. They should be using that + anyways for clarity. + + + + + Groups kvm and render + are introduced now, as systemd requires them. + + + +
+
+ Other Notable Changes + + + + dockerTools.pullImage relies on image + digest instead of image tag to download the image. The + sha256 of a pulled image has to be updated. + + + + + lib.attrNamesToStr has been deprecated. Use + more specific concatenation + (lib.concat(Map)StringsSep) instead. + + + + + lib.addErrorContextToAttrs has been + deprecated. Use builtins.addErrorContext + directly. + + + + + lib.showVal has been deprecated. Use + lib.traceSeqN instead. + + + + + lib.traceXMLVal has been deprecated. Use + lib.traceValFn builtins.toXml instead. + + + + + lib.traceXMLValMarked has been deprecated. + Use + lib.traceValFn (x: str + builtins.toXML x) + instead. + + + + + The pkgs argument to NixOS modules can now + be set directly using nixpkgs.pkgs. + Previously, only the system, + config and overlays + arguments could be used to influence pkgs. + + + + + A NixOS system can now be constructed more easily based on a + preexisting invocation of Nixpkgs. For example: + + +{ + inherit (pkgs.nixos { + boot.loader.grub.enable = false; + fileSystems."/".device = "/dev/xvda1"; + }) toplevel kernel initialRamdisk manual; +} + + + This benefits evaluation performance, lets you write Nixpkgs + packages that depend on NixOS images and is consistent with a + deployment architecture that would be centered around Nixpkgs + overlays. + + + + + lib.traceValIfNot has been deprecated. Use + if/then/else and + lib.traceValSeq instead. + + + + + lib.traceCallXml has been deprecated. + Please complain if you use the function regularly. + + + + + The attribute lib.nixpkgsVersion has been + deprecated in favor of lib.version. Please + refer to the discussion in + NixOS/nixpkgs#39416 + for further reference. + + + + + lib.recursiveUpdateUntil was not acting + according to its specification. It has been fixed to act + according to the docstring, and a test has been added. + + + + + The module for security.dhparams has two + new options now: + + + + + security.dhparams.stateless + + + + Puts the generated Diffie-Hellman parameters into the + Nix store instead of managing them in a stateful manner + in /var/lib/dhparams. + + + + + + security.dhparams.defaultBitSize + + + + The default bit size to use for the generated + Diffie-Hellman parameters. + + + + + + + The path to the actual generated parameter files should now + be queried using + config.security.dhparams.params.name.path + because it might be either in the Nix store or in a + directory configured by + security.dhparams.path. + + + + + For developers: + + + Module implementers should not set a specific bit size in + order to let users configure it by themselves if they want + to have a different bit size than the default (2048). + + + An example usage of this would be: + + +{ config, ... }: + +{ + security.dhparams.params.myservice = {}; + environment.etc."myservice.conf".text = '' + dhparams = ${config.security.dhparams.params.myservice.path} + ''; +} + + + + + + networking.networkmanager.useDnsmasq has + been deprecated. Use + networking.networkmanager.dns instead. + + + + + The Kubernetes package has been bumped to major version 1.11. + Please consult the + release + notes for details on new features and api changes. + + + + + The option + services.kubernetes.apiserver.admissionControl + was renamed to + services.kubernetes.apiserver.enableAdmissionPlugins. + + + + + Recommended way to access the Kubernetes Dashboard is via + HTTPS (TLS) Therefore; public service port for the dashboard + has changed to 443 (container port 8443) and scheme to https. + + + + + The option + services.kubernetes.apiserver.address was + renamed to + services.kubernetes.apiserver.bindAddress. + Note that the default value has changed from 127.0.0.1 to + 0.0.0.0. + + + + + The option + services.kubernetes.apiserver.publicAddress + was not used and thus has been removed. + + + + + The option + services.kubernetes.addons.dashboard.enableRBAC + was renamed to + services.kubernetes.addons.dashboard.rbac.enable. + + + + + The Kubernetes Dashboard now has only minimal RBAC permissions + by default. If dashboard cluster-admin rights are desired, set + services.kubernetes.addons.dashboard.rbac.clusterAdmin + to true. On existing clusters, in order for the revocation of + privileges to take effect, the current ClusterRoleBinding for + kubernetes-dashboard must be manually removed: + kubectl delete clusterrolebinding kubernetes-dashboard + + + + + The programs.screen module provides allows + to configure /etc/screenrc, however the + module behaved fairly counterintuitive as the config exists, + but the package wasn't available. Since 18.09 + pkgs.screen will be added to + environment.systemPackages. + + + + + The module services.networking.hostapd now + uses WPA2 by default. + + + + + s6Dns, s6Networking, + s6LinuxUtils and + s6PortableUtils renamed to + s6-dns, s6-networking, + s6-linux-utils and + s6-portable-utils respectively. + + + + + The module option nix.useSandbox is now + defaulted to true. + + + + + The config activation script of + nixos-rebuild now + reloads + all user units for each authenticated user. + + + + + The default display manager is now LightDM. To use SLiM set + services.xserver.displayManager.slim.enable + to true. + + + + + NixOS option descriptions are now automatically broken up into + individual paragraphs if the text contains two consecutive + newlines, so it's no longer necessary to use + </para><para> to start a new + paragraph. + + + + + Top-level buildPlatform, + hostPlatform, and + targetPlatform in Nixpkgs are deprecated. + Please use their equivalents in stdenv + instead: stdenv.buildPlatform, + stdenv.hostPlatform, and + stdenv.targetPlatform. + + + +
+
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1903.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1903.section.xml new file mode 100644 index 00000000000..f26e68e1320 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1903.section.xml @@ -0,0 +1,790 @@ +
+ Release 19.03 (<quote>Koi</quote>, 2019/04/11) +
+ Highlights + + In addition to numerous new and upgraded packages, this release + has the following highlights: + + + + + End of support is planned for end of October 2019, handing + over to 19.09. + + + + + The default Python 3 interpreter is now CPython 3.7 instead of + CPython 3.6. + + + + + Added the Pantheon desktop environment. It can be enabled + through + services.xserver.desktopManager.pantheon.enable. + + + + By default, + services.xserver.desktopManager.pantheon + enables LightDM as a display manager, as pantheon's screen + locking implementation relies on it. Because of that it is + recommended to leave LightDM enabled. If you'd like to + disable it anyway, set + services.xserver.displayManager.lightdm.enable + to false and enable your preferred + display manager. + + + + Also note that Pantheon's LightDM greeter is not enabled by + default, because it has numerous issues in NixOS and isn't + optimal for use here yet. + + + + + A major refactoring of the Kubernetes module has been + completed. Refactorings primarily focus on decoupling + components and enhancing security. Two-way TLS and RBAC has + been enabled by default for all components, which slightly + changes the way the module is configured. See: + for details. + + + + + There is now a set of confinement options + for systemd.services, which allows to + restrict services into a chroot 2 ed environment that only + contains the store paths from the runtime closure of the + service. + + + +
+
+ New Services + + The following new services were added since the last release: + + + + + ./programs/nm-applet.nix + + + + + There is a new security.googleOsLogin + module for using + OS + Login to manage SSH access to Google Compute Engine + instances, which supersedes the imperative and broken + google-accounts-daemon used in + nixos/modules/virtualisation/google-compute-config.nix. + + + + + ./services/misc/beanstalkd.nix + + + + + There is a new services.cockroachdb module + for running CockroachDB databases. NixOS now ships with + CockroachDB 2.1.x as well, available on + x86_64-linux and + aarch64-linux. + + + + + ./security/duosec.nix + + + + + The PAM module + for Duo Security has been enabled for use. One can + configure it using the security.duosec + options along with the corresponding PAM option in + security.pam.services.<name?>.duoSecurity.enable. + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + The minimum version of Nix required to evaluate Nixpkgs is now + 2.0. + + + + + For users of NixOS 18.03 and 19.03, NixOS defaults to Nix + 2.0, but supports using Nix 1.11 by setting + nix.package = pkgs.nix1;. If this + option is set to a Nix 1.11 package, you will need to + either unset the option or upgrade it to Nix 2.0. + + + + + For users of NixOS 17.09, you will first need to upgrade + Nix by setting + nix.package = pkgs.nixStable2; and run + nixos-rebuild switch as the + root user. + + + + + For users of a daemon-less Nix installation on Linux or + macOS, you can upgrade Nix by running + curl -L https://nixos.org/nix/install | sh, + or prior to doing a channel update, running + nix-env -iA nix. If you have already + run a channel update and Nix is no longer able to evaluate + Nixpkgs, the error message printed should provide adequate + directions for upgrading Nix. + + + + + For users of the Nix daemon on macOS, you can upgrade Nix + by running + sudo -i sh -c 'nix-channel --update && nix-env -iA nixpkgs.nix'; sudo launchctl stop org.nixos.nix-daemon; sudo launchctl start org.nixos.nix-daemon. + + + + + + + The buildPythonPackage function now sets + strictDeps = true to help distinguish + between native and non-native dependencies in order to improve + cross-compilation compatibility. Note however that this may + break user expressions. + + + + + The buildPythonPackage function now sets + LANG = C.UTF-8 to enable Unicode support. + The glibcLocales package is no longer + needed as a build input. + + + + + The Syncthing state and configuration data has been moved from + services.syncthing.dataDir to the newly + defined services.syncthing.configDir, which + default to + /var/lib/syncthing/.config/syncthing. This + change makes possible to share synced directories using ACLs + without Syncthing resetting the permission on every start. + + + + + The ntp module now has sane default + restrictions. If you're relying on the previous defaults, + which permitted all queries and commands from all + firewall-permitted sources, you can set + services.ntp.restrictDefault and + services.ntp.restrictSource to + []. + + + + + Package rabbitmq_server is renamed to + rabbitmq-server. + + + + + The light module no longer uses setuid + binaries, but udev rules. As a consequence users of that + module have to belong to the video group in + order to use the executable (i.e. + users.users.yourusername.extraGroups = ["video"];). + + + + + Buildbot now supports Python 3 and its packages have been + moved to pythonPackages. The options + services.buildbot-master.package and + services.buildbot-worker.package can be + used to select the Python 2 or 3 version of the package. + + + + + Options + services.znc.confOptions.networks.name.userName + and + services.znc.confOptions.networks.name.modulePackages + were removed. They were never used for anything and can + therefore safely be removed. + + + + + Package wasm has been renamed + proglodyte-wasm. The package + wasm will be pointed to + ocamlPackages.wasm in 19.09, so make sure + to update your configuration if you want to keep + proglodyte-wasm + + + + + When the nixpkgs.pkgs option is set, NixOS + will no longer ignore the nixpkgs.overlays + option. The old behavior can be recovered by setting + nixpkgs.overlays = lib.mkForce [];. + + + + + OpenSMTPD has been upgraded to version 6.4.0p1. This release + makes backwards-incompatible changes to the configuration file + format. See man smtpd.conf for more + information on the new file format. + + + + + The versioned postgresql have been renamed + to use underscore number seperators. For example, + postgresql96 has been renamed to + postgresql_9_6. + + + + + Package consul-ui and passthrough + consul.ui have been removed. The package + consul now uses upstream releases that + vendor the UI into the binary. See + #48714 + for details. + + + + + Slurm introduces the new option + services.slurm.stateSaveLocation, which is + now set to /var/spool/slurm by default + (instead of /var/spool). Make sure to move + all files to the new directory or to set the option + accordingly. + + + The slurmctld now runs as user slurm + instead of root. If you want to keep + slurmctld running as root, set + services.slurm.user = root. + + + The options services.slurm.nodeName and + services.slurm.partitionName are now sets + of strings to correctly reflect that fact that each of these + options can occour more than once in the configuration. + + + + + The solr package has been upgraded from + 4.10.3 to 7.5.0 and has undergone some major changes. The + services.solr module has been updated to + reflect these changes. Please review + http://lucene.apache.org/solr/ carefully before upgrading. + + + + + Package ckb is renamed to + ckb-next, and options + hardware.ckb.* are renamed to + hardware.ckb-next.*. + + + + + The option + services.xserver.displayManager.job.logToFile + which was previously set to true when using + the display managers lightdm, + sddm or xpra has been + reset to the default value (false). + + + + + Network interface indiscriminate NixOS firewall options + (networking.firewall.allow*) are now + preserved when also setting interface specific rules such as + networking.firewall.interfaces.en0.allow*. + These rules continue to use the pseudo device + "default" + (networking.firewall.interfaces.default.*), + and assigning to this pseudo device will override the + (networking.firewall.allow*) options. + + + + + The nscd service now disables all caching + of passwd and group + databases by default. This was interferring with the correct + functioning of the libnss_systemd.so module + which is used by systemd to manage uids and + usernames in the presence of DynamicUser= + in systemd services. This was already the default behaviour in + presence of services.sssd.enable = true + because nscd caching would interfere with + sssd in unpredictable ways as well. Because + we're using nscd not for caching, but for convincing glibc to + find NSS modules in the nix store instead of an absolute path, + we have decided to disable caching globally now, as it's + usually not the behaviour the user wants and can lead to + surprising behaviour. Furthermore, negative caching of host + lookups is also disabled now by default. This should fix the + issue of dns lookups failing in the presence of an unreliable + network. + + + If the old behaviour is desired, this can be restored by + setting the services.nscd.config option + with the desired caching parameters. + + +{ + services.nscd.config = + '' + server-user nscd + threads 1 + paranoia no + debug-level 0 + + enable-cache passwd yes + positive-time-to-live passwd 600 + negative-time-to-live passwd 20 + suggested-size passwd 211 + check-files passwd yes + persistent passwd no + shared passwd yes + + enable-cache group yes + positive-time-to-live group 3600 + negative-time-to-live group 60 + suggested-size group 211 + check-files group yes + persistent group no + shared group yes + + enable-cache hosts yes + positive-time-to-live hosts 600 + negative-time-to-live hosts 5 + suggested-size hosts 211 + check-files hosts yes + persistent hosts no + shared hosts yes + ''; +} + + + See + #50316 + for details. + + + + + GitLab Shell previously used the nix store paths for the + gitlab-shell command in its + authorized_keys file, which might stop + working after garbage collection. To circumvent that, we + regenerated that file on each startup. As + gitlab-shell has now been changed to use + /var/run/current-system/sw/bin/gitlab-shell, + this is not necessary anymore, but there might be leftover + lines with a nix store path. Regenerate the + authorized_keys file via + sudo -u git -H gitlab-rake gitlab:shell:setup + in that case. + + + + + The pam_unix account module is now loaded + with its control field set to required + instead of sufficient, so that later PAM + account modules that might do more extensive checks are being + executed. Previously, the whole account module verification + was exited prematurely in case a nss module provided the + account name to pam_unix. The LDAP and SSSD + NixOS modules already add their NSS modules when enabled. In + case your setup breaks due to some later PAM account module + previosuly shadowed, or failing NSS lookups, please file a + bug. You can get back the old behaviour by manually setting + security.pam.services.<name?>.text. + + + + + The pam_unix password module is now loaded + with its control field set to sufficient + instead of required, so that password + managed only by later PAM password modules are being executed. + Previously, for example, changing an LDAP account's password + through PAM was not possible: the whole password module + verification was exited prematurely by + pam_unix, preventing + pam_ldap to manage the password as it + should. + + + + + fish has been upgraded to 3.0. It comes + with a number of improvements and backwards incompatible + changes. See the fish + release + notes for more information. + + + + + The ibus-table input method has had a change in config format, + which causes all previous settings to be lost. See + this + commit message for details. + + + + + NixOS module system type types.optionSet + and lib.mkOption argument + options are deprecated. Use + types.submodule instead. + (#54637) + + + + + matrix-synapse has been updated to version + 0.99. It will + no + longer generate a self-signed certificate on first + launch and will be + the + last version to accept self-signed certificates. As + such, it is now recommended to use a proper certificate + verified by a root CA (for example Let's Encrypt). The new + manual chapter on + Matrix contains a working example of using nginx as a + reverse proxy in front of matrix-synapse, + using Let's Encrypt certificates. + + + + + mailutils now works by default when + sendmail is not in a setuid wrapper. As a + consequence, the sendmailPath argument, + having lost its main use, has been removed. + + + + + graylog has been upgraded from version 2.* + to 3.*. Some setups making use of extraConfig (especially + those exposing Graylog via reverse proxies) need to be updated + as upstream removed/replaced some settings. See + Upgrading + Graylog for details. + + + + + The option users.ldap.bind.password was + renamed to users.ldap.bind.passwordFile, + and needs to be readable by the nslcd user. + Same applies to the new + users.ldap.daemon.rootpwmodpwFile option. + + + + + nodejs-6_x is end-of-life. + nodejs-6_x, + nodejs-slim-6_x and + nodePackages_6_x are removed. + + + +
+
+ Other Notable Changes + + + + The services.matomo module gained the + option services.matomo.package which + determines the used Matomo version. + + + The Matomo module now also comes with the systemd service + matomo-archive-processing.service and a + timer that automatically triggers archive processing every + hour. This means that you can safely + + disable browser triggers for Matomo archiving at + Administration > System > General Settings. + + + Additionally, you can enable to + + delete old visitor logs at + Administration > System > Privacy, + but make sure that you run + systemctl start matomo-archive-processing.service + at least once without errors if you have already collected + data before, so that the reports get archived before the + source data gets deleted. + + + + + composableDerivation along with supporting + library functions has been removed. + + + + + The deprecated truecrypt package has been + removed and truecrypt attribute is now an + alias for veracrypt. VeraCrypt is + backward-compatible with TrueCrypt volumes. Note that + cryptsetup also supports loading TrueCrypt + volumes. + + + + + The Kubernetes DNS addons, kube-dns, has been replaced with + CoreDNS. This change is made in accordance with Kubernetes + making CoreDNS the official default starting from + Kubernetes + v1.11. Please beware that upgrading DNS-addon on + existing clusters might induce minor downtime while the + DNS-addon terminates and re-initializes. Also note that the + DNS-service now runs with 2 pod replicas by default. The + desired number of replicas can be configured using: + services.kubernetes.addons.dns.replicas. + + + + + The quassel-webserver package and module was removed from + nixpkgs due to the lack of maintainers. + + + + + The manual gained a + new chapter on self-hosting matrix-synapse + and riot-web , the most prevalent + server and client implementations for the + Matrix federated + communication network. + + + + + The astah-community package was removed from nixpkgs due to it + being discontinued and the downloads not being available + anymore. + + + + + The httpd service now saves log files with a .log file + extension by default for easier integration with the logrotate + service. + + + + + The owncloud server packages and httpd subservice module were + removed from nixpkgs due to the lack of maintainers. + + + + + It is possible now to uze ZRAM devices as general purpose + ephemeral block devices, not only as swap. Using more than 1 + device as ZRAM swap is no longer recommended, but is still + possible by setting zramSwap.swapDevices + explicitly. + + + ZRAM algorithm can be changed now. + + + Changes to ZRAM algorithm are applied during + nixos-rebuild switch, so make sure you have + enough swap space on disk to survive ZRAM device rebuild. + Alternatively, use + nixos-rebuild boot; reboot. + + + + + Flat volumes are now disabled by default in + hardware.pulseaudio. This has been done to + prevent applications, which are unaware of this feature, + setting their volumes to 100% on startup causing harm to your + audio hardware and potentially your ears. + + + + With this change application specific volumes are relative + to the master volume which can be adjusted independently, + whereas before they were absolute; meaning that in effect, + it scaled the device-volume with the volume of the loudest + application. + + + + + + The + ndppd + module now supports + all + config options provided by the current upstream version + as service options. Additionally the ndppd + package doesn't contain the systemd unit configuration from + upstream anymore, the unit is completely configured by the + NixOS module now. + + + + + New installs of NixOS will default to the Redmine 4.x series + unless otherwise specified in + services.redmine.package while existing + installs of NixOS will default to the Redmine 3.x series. + + + + + The + Grafana + module now supports declarative + datasource + and dashboard provisioning. + + + + + The use of insecure ports on kubernetes has been deprecated. + Thus options: + services.kubernetes.apiserver.port and + services.kubernetes.controllerManager.port + has been renamed to .insecurePort, and + default of both options has changed to 0 (disabled). + + + + + Note that the default value of + services.kubernetes.apiserver.bindAddress + has changed from 127.0.0.1 to 0.0.0.0, allowing the apiserver + to be accessible from outside the master node itself. If the + apiserver insecurePort is enabled, it is strongly recommended + to only bind on the loopback interface. See: + services.kubernetes.apiserver.insecurebindAddress. + + + + + The option + services.kubernetes.apiserver.allowPrivileged + and + services.kubernetes.kubelet.allowPrivileged + now defaults to false. Disallowing privileged containers on + the cluster. + + + + + The kubernetes module does no longer add the kubernetes + package to environment.systemPackages + implicitly. + + + + + The intel driver has been removed from the + default list of + X.org + video drivers. The modesetting + driver should take over automatically, it is better maintained + upstream and has less problems with advanced X11 features. + This can lead to a change in the output names used by + xrandr. Some performance regressions on + some GPU models might happen. Some OpenCL and VA-API + applications might also break (Beignet seems to provide OpenCL + support with modesetting driver, too). + Kernel mode setting API does not support backlight control, so + xbacklight tool will not work; backlight + level can be controlled directly via /sys/ + or with brightnessctl. Users who need this + functionality more than multi-output XRandR are advised to add + `intel` to `videoDrivers` and report an issue (or provide + additional details in an existing one) + + + + + Openmpi has been updated to version 4.0.0, which removes some + deprecated MPI-1 symbols. This may break some older + applications that still rely on those symbols. An upgrade + guide can be found + here. + + + The nginx package now relies on OpenSSL 1.1 and supports TLS + 1.3 by default. You can set the protocols used by the nginx + service using + services.nginx.sslProtocols. + + + + + A new subcommand nixos-rebuild edit was + added. + + + +
+
diff --git a/nixos/doc/manual/from_md/release-notes/rl-1909.section.xml b/nixos/doc/manual/from_md/release-notes/rl-1909.section.xml new file mode 100644 index 00000000000..83cd649f4ea --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-1909.section.xml @@ -0,0 +1,1197 @@ +
+ Release 19.09 (<quote>Loris</quote>, 2019/10/09) +
+ Highlights + + In addition to numerous new and upgraded packages, this release + has the following highlights: + + + + + End of support is planned for end of April 2020, handing over + to 20.03. + + + + + Nix has been updated to 2.3; see its + release + notes. + + + + + Core version changes: + + + systemd: 239 -> 243 + + + gcc: 7 -> 8 + + + glibc: 2.27 (unchanged) + + + linux: 4.19 LTS (unchanged) + + + openssl: 1.0 -> 1.1 + + + + + Desktop version changes: + + + plasma5: 5.14 -> 5.16 + + + gnome3: 3.30 -> 3.32 + + + + + PHP now defaults to PHP 7.3, updated from 7.2. + + + + + PHP 7.1 is no longer supported due to upstream not supporting + this version for the entire lifecycle of the 19.09 release. + + + + + The binfmt module is now easier to use. Additional systems can + be added through + boot.binfmt.emulatedSystems. For instance, + boot.binfmt.emulatedSystems = [ "wasm32-wasi" "x86_64-windows" "aarch64-linux" ]; + will set up binfmt interpreters for each of those listed + systems. + + + + + The installer now uses a less privileged + nixos user whereas before we logged in as + root. To gain root privileges use sudo -i + without a password. + + + + + We've updated to Xfce 4.14, which brings a new module + services.xserver.desktopManager.xfce4-14. + If you'd like to upgrade, please switch from the + services.xserver.desktopManager.xfce module + as it will be deprecated in a future release. They're + incompatibilities with the current Xfce module; it doesn't + support thunarPlugins and it isn't + recommended to use + services.xserver.desktopManager.xfce and + services.xserver.desktopManager.xfce4-14 + simultaneously or to downgrade from Xfce 4.14 after upgrading. + + + + + The GNOME 3 desktop manager module sports an interface to + enable/disable core services, applications, and optional GNOME + packages like games. + + + + + services.gnome3.core-os-services.enable + + + + + services.gnome3.core-shell.enable + + + + + services.gnome3.core-utilities.enable + + + + + services.gnome3.games.enable + + + + + With these options we hope to give users finer grained control + over their systems. Prior to this change you'd either have to + manually disable options or use + environment.gnome3.excludePackages which + only excluded the optional applications. + environment.gnome3.excludePackages is now + unguarded, it can exclude any package installed with + environment.systemPackages in the GNOME 3 + module. + + + + + Orthogonal to the previous changes to the GNOME 3 desktop + manager module, we've updated all default services and + applications to match as close as possible to a default + reference GNOME 3 experience. + + + The following changes were enacted in + services.gnome3.core-utilities.enable + + + + + accerciser + + + + + dconf-editor + + + + + evolution + + + + + gnome-documents + + + + + gnome-nettool + + + + + gnome-power-manager + + + + + gnome-todo + + + + + gnome-tweaks + + + + + gnome-usage + + + + + gucharmap + + + + + nautilus-sendto + + + + + vinagre + + + + + cheese + + + + + geary + + + + + The following changes were enacted in + services.gnome3.core-shell.enable + + + + + gnome-color-manager + + + + + orca + + + + + services.avahi.enable + + + + + +
+
+ New Services + + The following new services were added since the last release: + + + + + ./programs/dwm-status.nix + + + + + The new hardware.printers module allows to + declaratively configure CUPS printers via the + ensurePrinters and + ensureDefaultPrinter options. + ensurePrinters will never delete existing + printers, but will make sure that the given printers are + configured as declared. + + + + + There is a new + services.system-config-printer.enable + and + programs.system-config-printer.enable + module for the program of the same name. If you previously had + system-config-printer enabled through some + other means you should migrate to using one of these modules. + + + + + services.xserver.desktopManager.plasma5 + + + + + services.xserver.desktopManager.gnome3 + + + + + services.xserver.desktopManager.pantheon + + + + + services.xserver.desktopManager.mate + Note Mate uses + programs.system-config-printer as it + doesn't use it as a service, but its graphical interface + directly. + + + + + + + services.blueman.enable + has been added. If you previously had blueman installed via + environment.systemPackages please migrate + to using the NixOS module, as this would result in an + insufficiently configured blueman. + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + Buildbot no longer supports Python 2, as support was dropped + upstream in version 2.0.0. Configurations may need to be + modified to make them compatible with Python 3. + + + + + PostgreSQL now uses /run/postgresql as its + socket directory instead of /tmp. So if you + run an application like eg. Nextcloud, where you need to use + the Unix socket path as the database host name, you need to + change it accordingly. + + + + + PostgreSQL 9.4 is scheduled EOL during the 19.09 life cycle + and has been removed. + + + + + The options + services.prometheus.alertmanager.user and + services.prometheus.alertmanager.group have + been removed because the alertmanager service is now using + systemd's + + DynamicUser mechanism which obviates these options. + + + + + The NetworkManager systemd unit was renamed back from + network-manager.service to NetworkManager.service for better + compatibility with other applications expecting this name. The + same applies to ModemManager where modem-manager.service is + now called ModemManager.service again. + + + + + The services.nzbget.configFile and + services.nzbget.openFirewall options were + removed as they are managed internally by the nzbget. The + services.nzbget.dataDir option hadn't + actually been used by the module for some time and so was + removed as cleanup. + + + + + The services.mysql.pidDir option was + removed, as it was only used by the wordpress apache-httpd + service to wait for mysql to have started up. This can be + accomplished by either describing a dependency on + mysql.service (preferred) or waiting for the (hardcoded) + /run/mysqld/mysql.sock file to appear. + + + + + The services.emby.enable module has been + removed, see services.jellyfin.enable + instead for a free software fork of Emby. See the Jellyfin + documentation: + + Migrating from Emby to Jellyfin + + + + + IPv6 Privacy Extensions are now enabled by default for + undeclared interfaces. The previous behaviour was quite + misleading — even though the default value for + networking.interfaces.*.preferTempAddress + was true, undeclared interfaces would not + prefer temporary addresses. Now, interfaces not mentioned in + the config will prefer temporary addresses. EUI64 addresses + can still be set as preferred by explicitly setting the option + to false for the interface in question. + + + + + Since Bittorrent Sync was superseded by Resilio Sync in 2016, + the bittorrentSync, + bittorrentSync14, and + bittorrentSync16 packages have been removed + in favor of resilio-sync. + + + The corresponding module, services.btsync + has been replaced by the services.resilio + module. + + + + + The httpd service no longer attempts to start the postgresql + service. If you have come to depend on this behaviour then you + can preserve the behavior with the following configuration: + systemd.services.httpd.after = [ "postgresql.service" ]; + + + The option services.httpd.extraSubservices + has been marked as deprecated. You may still use this feature, + but it will be removed in a future release of NixOS. You are + encouraged to convert any httpd subservices you may have + written to a full NixOS module. + + + Most of the httpd subservices packaged with NixOS have been + replaced with full NixOS modules including LimeSurvey, + WordPress, and Zabbix. These modules can be enabled using the + services.limesurvey.enable, + services.mediawiki.enable, + services.wordpress.enable, and + services.zabbixWeb.enable options. + + + + + The option + systemd.network.networks.<name>.routes.*.routeConfig.GatewayOnlink + was renamed to + systemd.network.networks.<name>.routes.*.routeConfig.GatewayOnLink + (capital L). This follows + + upstreams renaming of the setting. + + + + + As of this release the NixOps feature + autoLuks is deprecated. It no longer works + with our systemd version without manual intervention. + + + Whenever the usage of the module is detected the evaluation + will fail with a message explaining why and how to deal with + the situation. + + + A new knob named + nixops.enableDeprecatedAutoLuks has been + introduced to disable the eval failure and to acknowledge the + notice was received and read. If you plan on using the feature + please note that it might break with subsequent updates. + + + Make sure you set the _netdev option for + each of the file systems referring to block devices provided + by the autoLuks module. Not doing this might render the system + in a state where it doesn't boot anymore. + + + If you are actively using the autoLuks + module please let us know in + issue + #62211. + + + + + The setopt declarations will be evaluated at the end of + /etc/zshrc, so any code in + programs.zsh.interactiveShellInit, + programs.zsh.loginShellInit + and + programs.zsh.promptInit + may break if it relies on those options being set. + + + + + The prometheus-nginx-exporter package now + uses the offical exporter provided by NGINX Inc. Its metrics + are differently structured and are incompatible to the old + ones. For information about the metrics, have a look at the + official + repo. + + + + + The shibboleth-sp package has been updated + to version 3. It is largely backward compatible, for further + information refer to the + release + notes and + upgrade + guide. + + + Nodejs 8 is scheduled EOL under the lifetime of 19.09 and has + been dropped. + + + + + By default, prometheus exporters are now run with + DynamicUser enabled. Exporters that need a + real user, now run under a seperate user and group which + follow the pattern + <exporter-name>-exporter, instead of + the previous default nobody and + nogroup. Only some exporters are affected + by the latter, namely the exporters + dovecot, node, + postfix and varnish. + + + + + The ibus-qt package is not installed by + default anymore when + i18n.inputMethod.enabled + is set to ibus. If IBus support in Qt 4.x + applications is required, add the ibus-qt + package to your + environment.systemPackages + manually. + + + + + The CUPS Printing service now uses socket-based activation by + default, only starting when needed. The previous behavior can + be restored by setting + services.cups.startWhenNeeded to + false. + + + + + The services.systemhealth module has been + removed from nixpkgs due to lack of maintainer. + + + + + The services.mantisbt module has been + removed from nixpkgs due to lack of maintainer. + + + + + Squid 3 has been removed and the squid + derivation now refers to Squid 4. + + + + + The services.pdns-recursor.extraConfig + option has been replaced by + services.pdns-recursor.settings. The new + option allows setting extra configuration while being better + type-checked and mergeable. + + + + + No service depends on keys.target anymore + which is a systemd target that indicates if all + NixOps + keys were successfully uploaded. Instead, + <key-name>-key.service should be used + to define a dependency of a key in a service. The full issue + behind the keys.target dependency is + described at + NixOS/nixpkgs#67265. + + + The following services are affected by this: + + + + + services.dovecot2 + + + + + services.nsd + + + + + services.softether + + + + + services.strongswan + + + + + services.strongswan-swanctl + + + + + services.httpd + + + + + + + The security.acme.directory option has been + replaced by a read-only + security.acme.certs.<cert>.directory + option for each certificate you define. This will be a + subdirectory of /var/lib/acme. You can use + this read-only option to figure out where the certificates are + stored for a specific certificate. For example, the + services.nginx.virtualhosts.<name>.enableACME + option will use this directory option to find the certs for + the virtual host. + + + security.acme.preDelay and + security.acme.activationDelay options have + been removed. To execute a service before certificates are + provisioned or renewed add a + RequiredBy=acme-${cert}.service to any + service. + + + Furthermore, the acme module will not automatically add a + dependency on lighttpd.service anymore. If + you are using certficates provided by letsencrypt for + lighttpd, then you should depend on the certificate service + acme-${cert}.service> manually. + + + For nginx, the dependencies are still automatically managed + when + services.nginx.virtualhosts.<name>.enableACME + is enabled just like before. What changed is that nginx now + directly depends on the specific certificates that it needs, + instead of depending on the catch-all + acme-certificates.target. This target unit + was also removed from the codebase. This will mean nginx will + no longer depend on certificates it isn't explicitly managing + and fixes a bug with certificate renewal ordering racing with + nginx restarting which could lead to nginx getting in a broken + state as described at + NixOS/nixpkgs#60180. + + + + + The old deprecated emacs package sets have + been dropped. What used to be called + emacsPackagesNg is now simply called + emacsPackages. + + + + + services.xserver.desktopManager.xterm is + now disabled by default if stateVersion is + 19.09 or higher. Previously the xterm desktopManager was + enabled when xserver was enabled, but it isn't useful for all + people so it didn't make sense to have any desktopManager + enabled default. + + + + + The WeeChat plugin + pkgs.weechatScripts.weechat-xmpp has been + removed as it doesn't receive any updates from upstream and + depends on outdated Python2-based modules. + + + + + Old unsupported versions (logstash5, + kibana5, filebeat5, + heartbeat5, metricbeat5, + packetbeat5) of the ELK-stack and Elastic + beats have been removed. + + + + + For NixOS 19.03, both Prometheus 1 and 2 were available to + allow for a seamless transition from version 1 to 2 with + existing setups. Because Prometheus 1 is no longer developed, + it was removed. Prometheus 2 is now configured with + services.prometheus. + + + + + Citrix Receiver (citrix_receiver) has been + dropped in favor of Citrix Workspace + (citrix_workspace). + + + + + The services.gitlab module has had its + literal secret options + (services.gitlab.smtp.password, + services.gitlab.databasePassword, + services.gitlab.initialRootPassword, + services.gitlab.secrets.secret, + services.gitlab.secrets.db, + services.gitlab.secrets.otp and + services.gitlab.secrets.jws) replaced by + file-based versions + (services.gitlab.smtp.passwordFile, + services.gitlab.databasePasswordFile, + services.gitlab.initialRootPasswordFile, + services.gitlab.secrets.secretFile, + services.gitlab.secrets.dbFile, + services.gitlab.secrets.otpFile and + services.gitlab.secrets.jwsFile). This was + done so that secrets aren't stored in the world-readable nix + store, but means that for each option you'll have to create a + file with the same exact string, add "File" to the + end of the option name, and change the definition to a string + pointing to the corresponding file; e.g. + services.gitlab.databasePassword = "supersecurepassword" + becomes + services.gitlab.databasePasswordFile = "/path/to/secret_file" + where the file secret_file contains the + string supersecurepassword. + + + The state path (services.gitlab.statePath) + now has the following restriction: no parent directory can be + owned by any other user than root or the + user specified in services.gitlab.user; + i.e. if services.gitlab.statePath is set to + /var/lib/gitlab/state, + gitlab and all parent directories must be + owned by either root or the user specified + in services.gitlab.user. + + + + + The networking.useDHCP option is + unsupported in combination with + networking.useNetworkd in anticipation of + defaulting to it. It has to be set to false + and enabled per interface with + networking.interfaces.<name>.useDHCP = true; + + + + + The Twitter client corebird has been + dropped as + it + is discontinued and does not work against the new Twitter + API. Please use the fork cawbird + instead which has been adapted to the API changes and is still + maintained. + + + + + The nodejs-11_x package has been removed as + it's EOLed by upstream. + + + + + Because of the systemd upgrade, systemd-timesyncd will no + longer work if system.stateVersion is not + set correctly. When upgrading from NixOS 19.03, please make + sure that system.stateVersion is set to + "19.03", or lower if the + installation dates back to an earlier version of NixOS. + + + + + Due to the short lifetime of non-LTS kernel releases package + attributes like linux_5_1, + linux_5_2 and linux_5_3 + have been removed to discourage dependence on specific non-LTS + kernel versions in stable NixOS releases. Going forward, + versioned attributes like linux_4_9 will + exist for LTS versions only. Please use + linux_latest or + linux_testing if you depend on non-LTS + releases. Keep in mind that linux_latest + and linux_testing will change versions + under the hood during the lifetime of a stable release and + might include breaking changes. + + + + + Because of the systemd upgrade, some network interfaces might + change their name. For details see + + upstream docs or + + our ticket. + + + +
+
+ Other Notable Changes + + + + The documentation module gained an option + named documentation.nixos.includeAllModules + which makes the generated configuration.nix 5 manual page + include all options from all NixOS modules included in a given + configuration.nix configuration file. + Currently, it is set to false by default as + enabling it frequently prevents evaluation. But the plan is to + eventually have it set to true by default. + Please set it to true now in your + configuration.nix and fix all the bugs it + uncovers. + + + + + The vlc package gained support for + Chromecast streaming, enabled by default. TCP port 8010 must + be open for it to work, so something like + networking.firewall.allowedTCPPorts = [ 8010 ]; + may be required in your configuration. Also consider enabling + + Accelerated Video Playback for better transcoding + performance. + + + + + The following changes apply if the + stateVersion is changed to 19.09 or higher. + For stateVersion = "19.03" or + lower the old behavior is preserved. + + + + + solr.package defaults to + pkgs.solr_8. + + + + + + + The hunspellDicts.fr-any dictionary now + ships with fr_FR.{aff,dic} which is linked + to fr-toutesvariantes.{aff,dic}. + + + + + The mysql service now runs as + mysql user. Previously, systemd did execute + it as root, and mysql dropped privileges itself. This includes + ExecStartPre= and + ExecStartPost= phases. To accomplish that, + runtime and data directory setup was delegated to + RuntimeDirectory and tmpfiles. + + + + + With the upgrade to systemd version 242 the + systemd-timesyncd service is no longer + using DynamicUser=yes. In order for the + upgrade to work we rely on an activation script to move the + state from the old to the new directory. The older directory + (prior 19.09) was + /var/lib/private/systemd/timesync. + + + As long as the system.config.stateVersion + is below 19.09 the state folder will + migrated to its proper location + (/var/lib/systemd/timesync), if required. + + + + + The package avahi is now built to look up + service definitions from + /etc/avahi/services instead of its output + directory in the nix store. Accordingly the module + avahi now supports custom service + definitions via + services.avahi.extraServiceFiles, which are + then placed in the aforementioned directory. See + avahi.service5 for more information on custom service + definitions. + + + + + Since version 0.1.19, cargo-vendor honors + package includes that are specified in the + Cargo.toml file of Rust crates. + rustPlatform.buildRustPackage uses + cargo-vendor to collect and build dependent + crates. Since this change in cargo-vendor + changes the set of vendored files for most Rust packages, the + hash that use used to verify the dependencies, + cargoSha256, also changes. + + + The cargoSha256 hashes of all in-tree + derivations that use buildRustPackage have + been updated to reflect this change. However, third-party + derivations that use buildRustPackage may + have to be updated as well. + + + + + The consul package was upgraded past + version 1.5, so its deprecated legacy UI is + no longer available. + + + + + The default resample-method for PulseAudio has been changed + from the upstream default speex-float-1 to + speex-float-5. Be aware that low-powered + ARM-based and MIPS-based boards will struggle with this so + you'll need to set + hardware.pulseaudio.daemon.config.resample-method + back to speex-float-1. + + + + + The phabricator package and associated + httpd.extraSubservice, as well as the + phd service have been removed from nixpkgs + due to lack of maintainer. + + + + + The mercurial + httpd.extraSubservice has been removed from + nixpkgs due to lack of maintainer. + + + + + The trac + httpd.extraSubservice has been removed from + nixpkgs because it was unmaintained. + + + + + The foswiki package and associated + httpd.extraSubservice have been removed + from nixpkgs due to lack of maintainer. + + + + + The tomcat-connector + httpd.extraSubservice has been removed from + nixpkgs. + + + + + It's now possible to change configuration in + services.nextcloud + after the initial deploy since all config parameters are + persisted in an additional config file generated by the + module. Previously core configuration like database parameters + were set using their imperative installer after creating + /var/lib/nextcloud. + + + + + There exists now lib.forEach, which is like + map, but with arguments flipped. When + mapping function body spans many lines (or has nested + maps), it is often hard to follow which + list is modified. + + + Previous solution to this problem was either to use + lib.flip map idiom or extract that + anonymous mapping function to a named one. Both can still be + used but lib.forEach is preferred over + lib.flip map. + + + The /etc/sysctl.d/nixos.conf file + containing all the options set via + boot.kernel.sysctl + was moved to /etc/sysctl.d/60-nixos.conf, + as sysctl.d5 recommends prefixing all filenames in + /etc/sysctl.d with a two-digit number and a + dash to simplify the ordering of the files. + + + + + We now install the sysctl snippets shipped with systemd. + + + + + Loose reverse path filtering + + + + + Source route filtering + + + + + fq_codel as a packet scheduler (this + helps to fight bufferbloat) + + + + + This also configures the kernel to pass core dumps to + systemd-coredump, and restricts the SysRq + key combinations to the sync command only. These sysctl + snippets can be found in + /etc/sysctl.d/50-*.conf, and overridden via + boot.kernel.sysctl + (which will place the parameters in + /etc/sysctl.d/60-nixos.conf). + + + + + Core dumps are now processed by + systemd-coredump by default. + systemd-coredump behaviour can still be + modified via systemd.coredump.extraConfig. + To stick to the old behaviour (having the kernel dump to a + file called core in the working directory), + without piping it through systemd-coredump, + set systemd.coredump.enable to + false. + + + + + systemd.packages option now also supports + generators and shutdown scripts. Old + systemd.generator-packages option has been + removed. + + + + + The rmilter package was removed with + associated module and options due deprecation by upstream + developer. Use rspamd in proxy mode + instead. + + + + + systemd cgroup accounting via the + systemd.enableCgroupAccounting + option is now enabled by default. It now also enables the more + recent Block IO and IP accounting features. + + + + + We no longer enable custom font rendering settings with + fonts.fontconfig.penultimate.enable by + default. The defaults from fontconfig are sufficient. + + + + + The crashplan package and the + crashplan service have been removed from + nixpkgs due to crashplan shutting down the service, while the + crashplansb package and + crashplan-small-business service have been + removed from nixpkgs due to lack of maintainer. + + + The + redis + module was hardcoded to use the + redis user, /run/redis + as runtime directory and /var/lib/redis as + state directory. Note that the NixOS module for Redis now + disables kernel support for Transparent Huge Pages (THP), + because this features causes major performance problems for + Redis, e.g. (https://redis.io/topics/latency). + + + + + Using fonts.enableDefaultFonts adds a + default emoji font noto-fonts-emoji. + + + + + services.xserver.enable + + + + + programs.sway.enable + + + + + programs.way-cooler.enable + + + + + services.xrdp.enable + + + + + + + The altcoins categorization of packages has + been removed. You now access these packages at the top level, + ie. nix-shell -p dogecoin instead of + nix-shell -p altcoins.dogecoin, etc. + + + + + Ceph has been upgraded to v14.2.1. See the + release + notes for details. The mgr dashboard as well as osds + backed by loop-devices is no longer explicitly supported by + the package and module. Note: There's been some issues with + python-cherrypy, which is used by the dashboard and prometheus + mgr modules (and possibly others), hence + 0000-dont-check-cherrypy-version.patch. + + + + + pkgs.weechat is now compiled against + pkgs.python3. Weechat also recommends + to use + Python3 in their docs. + + + +
+
diff --git a/nixos/doc/manual/from_md/release-notes/rl-2003.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2003.section.xml new file mode 100644 index 00000000000..53e6e1329a9 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-2003.section.xml @@ -0,0 +1,1497 @@ +
+ Release 20.03 (<quote>Markhor</quote>, 2020.04/20) +
+ Highlights + + In addition to numerous new and upgraded packages, this release + has the following highlights: + + + + + Support is planned until the end of October 2020, handing over + to 20.09. + + + + + Core version changes: + + + gcc: 8.3.0 -> 9.2.0 + + + glibc: 2.27 -> 2.30 + + + linux: 4.19 -> 5.4 + + + mesa: 19.1.5 -> 19.3.3 + + + openssl: 1.0.2u -> 1.1.1d + + + + + Desktop version changes: + + + plasma5: 5.16.5 -> 5.17.5 + + + kdeApplications: 19.08.2 -> 19.12.3 + + + gnome3: 3.32 -> 3.34 + + + pantheon: 5.0 -> 5.1.3 + + + + + Linux kernel is updated to branch 5.4 by default (from 4.19). + + + + + Grub is updated to 2.04, adding support for booting from F2FS + filesystems and Btrfs volumes using zstd compression. Note + that some users have been unable to boot after upgrading to + 2.04 - for more information, please see + this + discussion. + + + + + Postgresql for NixOS service now defaults to v11. + + + + + The graphical installer image starts the graphical session + automatically. Before you'd be greeted by a tty and asked to + enter systemctl start display-manager. It + is now possible to disable the display-manager from running by + selecting the Disable display-manager quirk + in the boot menu. + + + + + GNOME 3 has been upgraded to 3.34. Please take a look at their + Release + Notes for details. + + + + + If you enable the Pantheon Desktop Manager via + services.xserver.desktopManager.pantheon.enable, + we now default to also use + + Pantheon's newly designed greeter . Contrary to NixOS's + usual update policy, Pantheon will receive updates during the + cycle of NixOS 20.03 when backwards compatible. + + + + + By default zfs pools will now be trimmed on a weekly basis. + Trimming is only done on supported devices (i.e. NVME or SSDs) + and should improve throughput and lifetime of these devices. + It is controlled by the + services.zfs.trim.enable varname. The zfs + scrub service + (services.zfs.autoScrub.enable) and the zfs + autosnapshot service + (services.zfs.autoSnapshot.enable) are now + only enabled if zfs is set in + config.boot.initrd.supportedFilesystems or + config.boot.supportedFilesystems. These + lists will automatically contain zfs as soon as any zfs + mountpoint is configured in fileSystems. + + + + + nixos-option has been rewritten in C++, + speeding it up, improving correctness, and adding a + -r option which prints all options and + their values recursively. + + + + + services.xserver.desktopManager.default and + services.xserver.windowManager.default + options were replaced by a single + services.xserver.displayManager.defaultSession + option to improve support for upstream session files. If you + used something like: + + +{ + services.xserver.desktopManager.default = "xfce"; + services.xserver.windowManager.default = "icewm"; +} + + + you should change it to: + + +{ + services.xserver.displayManager.defaultSession = "xfce+icewm"; +} + + + + + The testing driver implementation in NixOS is now in Python + make-test-python.nix. This was done by + Jacek Galowicz + (@tfc), and + with the collaboration of Julian Stecklina + (@blitz) + and Jana Traue + (@jtraue). + All documentation has been updated to use this testing driver, + and a vast majority of the 286 tests in NixOS were ported to + python driver. In 20.09 the Perl driver implementation, + make-test.nix, is slated for removal. This + should give users of the NixOS integration framework a + transitory period to rewrite their tests to use the Python + implementation. Users of the Perl driver will see this warning + everytime they use it: + + +$ warning: Perl VM tests are deprecated and will be removed for 20.09. +Please update your tests to use the python test driver. +See https://github.com/NixOS/nixpkgs/pull/71684 for details. + + + API compatibility is planned to be kept for at least the next + release with the perl driver. + + + +
+
+ New Services + + The following new services were added since the last release: + + + + + The kubernetes kube-proxy now supports a new hostname + configuration + services.kubernetes.proxy.hostname which + has to be set if the hostname of the node should be non + default. + + + + + UPower's configuration is now managed by NixOS and can be + customized via services.upower. + + + + + To use Geary you should enable + programs.geary.enable + instead of just adding it to + environment.systemPackages. + It was created so Geary could function properly outside of + GNOME. + + + + + ./config/console.nix + + + + + ./hardware/brillo.nix + + + + + ./hardware/tuxedo-keyboard.nix + + + + + ./programs/bandwhich.nix + + + + + ./programs/bash-my-aws.nix + + + + + ./programs/liboping.nix + + + + + ./programs/traceroute.nix + + + + + ./services/backup/sanoid.nix + + + + + ./services/backup/syncoid.nix + + + + + ./services/backup/zfs-replication.nix + + + + + ./services/continuous-integration/buildkite-agents.nix + + + + + ./services/databases/victoriametrics.nix + + + + + ./services/desktops/gnome3/gnome-initial-setup.nix + + + + + ./services/desktops/neard.nix + + + + + ./services/games/openarena.nix + + + + + ./services/hardware/fancontrol.nix + + + + + ./services/mail/sympa.nix + + + + + ./services/misc/freeswitch.nix + + + + + ./services/misc/mame.nix + + + + + ./services/monitoring/do-agent.nix + + + + + ./services/monitoring/prometheus/xmpp-alerts.nix + + + + + ./services/network-filesystems/orangefs/server.nix + + + + + ./services/network-filesystems/orangefs/client.nix + + + + + ./services/networking/3proxy.nix + + + + + ./services/networking/corerad.nix + + + + + ./services/networking/go-shadowsocks2.nix + + + + + ./services/networking/ntp/openntpd.nix + + + + + ./services/networking/shorewall.nix + + + + + ./services/networking/shorewall6.nix + + + + + ./services/networking/spacecookie.nix + + + + + ./services/networking/trickster.nix + + + + + ./services/networking/v2ray.nix + + + + + ./services/networking/xandikos.nix + + + + + ./services/networking/yggdrasil.nix + + + + + ./services/web-apps/dokuwiki.nix + + + + + ./services/web-apps/gotify-server.nix + + + + + ./services/web-apps/grocy.nix + + + + + ./services/web-apps/ihatemoney + + + + + ./services/web-apps/moinmoin.nix + + + + + ./services/web-apps/trac.nix + + + + + ./services/web-apps/trilium.nix + + + + + ./services/web-apps/shiori.nix + + + + + ./services/web-servers/ttyd.nix + + + + + ./services/x11/picom.nix + + + + + ./services/x11/hardware/digimend.nix + + + + + ./services/x11/imwheel.nix + + + + + ./virtualisation/cri-o.nix + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + The dhcpcd package + + does not request IPv4 addresses for tap and bridge interfaces + anymore by default. In order to still get an address on + a bridge interface, one has to disable + networking.useDHCP and explicitly enable + networking.interfaces.<name>.useDHCP + on every interface, that should get an address via DHCP. This + way, dhcpcd is configured in an explicit way about which + interface to run on. + + + + + GnuPG is now built without support for a graphical passphrase + entry by default. Please enable the + gpg-agent user service via the NixOS option + programs.gnupg.agent.enable. Note that + upstream recommends using gpg-agent and + will spawn a gpg-agent on the first + invocation of GnuPG anyway. + + + + + The dynamicHosts option has been removed + from the + NetworkManager + module. Allowing (multiple) regular users to override host + entries affecting the whole system opens up a huge attack + vector. There seem to be very rare cases where this might be + useful. Consider setting system-wide host entries using + networking.hosts, + provide them via the DNS server in your network, or use + environment.etc + to add a file into + /etc/NetworkManager/dnsmasq.d reconfiguring + hostsdir. + + + + + The 99-main.network file was removed. + Matching all network interfaces caused many breakages, see + #18962 + and + #71106. + + + We already don't support the global + networking.useDHCP, + networking.defaultGateway + and + networking.defaultGateway6 + options if + networking.useNetworkd + is enabled, but direct users to configure the per-device + networking.interfaces.<name>…. + options. + + + + + The stdenv now runs all bash with set -u, + to catch the use of undefined variables. Before, it itself + used set -u but was careful to unset it so + other packages' code ran as before. Now, all bash code is held + to the same high standard, and the rather complex stateful + manipulation of the options can be discarded. + + + + + The SLIM Display Manager has been removed, as it has been + unmaintained since 2013. Consider migrating to a different + display manager such as LightDM (current default in NixOS), + SDDM, GDM, or using the startx module which uses Xinitrc. + + + + + The Way Cooler wayland compositor has been removed, as the + project has been officially canceled. There are no more + way-cooler attribute and + programs.way-cooler options. + + + + + The BEAM package set has been deleted. You will only find + there the different interpreters. You should now use the + different build tools coming with the languages with sandbox + mode disabled. + + + + + There is now only one Xfce package-set and module. This means + that attributes xfce4-14 and + xfceUnstable all now point to the latest + Xfce 4.14 packages. And in the future NixOS releases will be + the latest released version of Xfce available at the time of + the release's development (if viable). + + + + + The + phpfpm + module now sets PrivateTmp=true in its + systemd units for better process isolation. If you rely on + /tmp being shared with other services, + explicitly override this by setting + serviceConfig.PrivateTmp to + false for each phpfpm unit. + + + + + KDE’s old multimedia framework Phonon no longer supports Qt 4. + For that reason, Plasma desktop also does not have + enableQt4Support option any more. + + + + + The BeeGFS module has been removed. + + + + + The osquery module has been removed. + + + + + Going forward, ~/bin in the users home + directory will no longer be in PATH by + default. If you depend on this you should set the option + environment.homeBinInPath to + true. The aforementioned option was added + this release. + + + + + The buildRustCrate infrastructure now + produces lib outputs in addition to the + out output. This has led to drastically + reduced closure sizes for some rust crates since development + dependencies are now in the lib output. + + + + + Pango was upgraded to 1.44, which no longer uses freetype for + font loading. This means that type1 and bitmap fonts are no + longer supported in applications relying on Pango for font + rendering (notably, GTK application). See + + upstream issue for more information. + + + + + The roundcube module has been hardened. + + + + + The password of the database is not written world readable + in the store any more. If database.host + is set to localhost, then a unix user + of the same name as the database will be created and + PostreSQL peer authentication will be used, removing the + need for a password. Otherwise, a password is still needed + and can be provided with the new option + database.passwordFile, which should be + set to the path of a file containing the password and + readable by the user nginx only. The + database.password option is insecure + and deprecated. Usage of this option will print a warning. + + + + + A random des_key is set by default in + the configuration of roundcube, instead of using the + hardcoded and insecure default. To ensure a clean + migration, all users will be logged out when you upgrade + to this release. + + + + + + + The packages openobex and + obexftp are no longer installed when + enabling Bluetooth via + hardware.bluetooth.enable. + + + + + The dump1090 derivation has been changed to + use FlightAware's dump1090 as its upstream. However, this + version does not have an internal webserver anymore. The + assets in the share/dump1090 directory of + the derivation can be used in conjunction with an external + webserver to replace this functionality. + + + + + The fourStore and fourStoreEndpoint modules have been removed. + + + + + Polkit no longer has the user of uid 0 (root) as an admin + identity. We now follow the upstream default of only having + every member of the wheel group admin privileged. Before it + was root and members of wheel. The positive outcome of this is + pkexec GUI popups or terminal prompts will no longer require + the user to choose between two essentially equivalent choices + (whether to perform the action as themselves with wheel + permissions, or as the root user). + + + + + NixOS containers no longer build NixOS manual by default. This + saves evaluation time, especially if there are many + declarative containers defined. Note that this is already done + when + <nixos/modules/profiles/minimal.nix> + module is included in container config. + + + + + The kresd services deprecates the + interfaces option in favor of the + listenPlain option which requires full + systemd.socket + compatible declaration which always include a port. + + + + + Virtual console options have been reorganized and can be found + under a single top-level attribute: + console. The full set of changes is as + follows: + + + + + i18n.consoleFont renamed to + console.font + + + + + i18n.consoleKeyMap renamed to + console.keyMap + + + + + i18n.consoleColors renamed to + console.colors + + + + + i18n.consolePackages renamed to + console.packages + + + + + i18n.consoleUseXkbConfig renamed to + console.useXkbConfig + + + + + boot.earlyVconsoleSetup renamed to + console.earlySetup + + + + + boot.extraTTYs renamed to + console.extraTTYs. + + + + + + + The + awstats + module has been rewritten to serve stats via static html + pages, updated on a timer, over + nginx, + instead of dynamic cgi pages over + apache. + + + Minor changes will be required to migrate existing + configurations. Details of the required changes can seen by + looking through the + awstats + module. + + + + + The httpd module no longer provides options to support serving + web content without defining a virtual host. As a result of + this the + services.httpd.logPerVirtualHost + option now defaults to true instead of + false. Please update your configuration to + make use of + services.httpd.virtualHosts. + + + The + services.httpd.virtualHosts.<name> + option has changed type from a list of submodules to an + attribute set of submodules, better matching + services.nginx.virtualHosts.<name>. + + + This change comes with the addition of the following options + which mimic the functionality of their + nginx counterparts: + services.httpd.virtualHosts.<name>.addSSL, + services.httpd.virtualHosts.<name>.forceSSL, + services.httpd.virtualHosts.<name>.onlySSL, + services.httpd.virtualHosts.<name>.enableACME, + services.httpd.virtualHosts.<name>.acmeRoot, + and + services.httpd.virtualHosts.<name>.useACMEHost. + + + + + For NixOS configuration options, the loaOf + type has been deprecated and will be removed in a future + release. In nixpkgs, options of this type will be changed to + attrsOf instead. If you were using one of + these in your configuration, you will see a warning suggesting + what changes will be required. + + + For example, + users.users + is a loaOf option that is commonly used as + follows: + + +{ + users.users = + [ { name = "me"; + description = "My personal user."; + isNormalUser = true; + } + ]; +} + + + This should be rewritten by removing the list and using the + value of name as the name of the attribute + set: + + +{ + users.users.me = + { description = "My personal user."; + isNormalUser = true; + }; +} + + + For more information on this change have look at these links: + issue + #1800, + PR + #63103. + + + + + For NixOS modules, the types + types.submodule and + types.submoduleWith now support paths as + allowed values, similar to how imports + supports paths. Because of this, if you have a module that + defines an option of type + either (submodule ...) path, it will break + since a path is now treated as the first type instead of the + second. To fix this, change the type to + either path (submodule ...). + + + + + The + Buildkite + Agent module and corresponding packages have been + updated to 3.x, and to support multiple instances of the agent + running at the same time. This means you will have to rename + services.buildkite-agent to + services.buildkite-agents.<name>. + Furthermore, the following options have been changed: + + + + + services.buildkite-agent.meta-data has + been renamed to + services.buildkite-agents.<name>.tags, + to match upstreams naming for 3.x. Its type has also + changed - it now accepts an attrset of strings. + + + + + Theservices.buildkite-agent.openssh.publicKeyPath + option has been removed, as it's not necessary to deploy + public keys to clone private repositories. + + + + + services.buildkite-agent.openssh.privateKeyPath + has been renamed to + buildkite-agents.<name>.privateSshKeyPath, + as the whole openssh now only contained + that single option. + + + + + services.buildkite-agents.<name>.shell + has been introduced, allowing to specify a custom shell to + be used. + + + + + + + The citrix_workspace_19_3_0 package has + been removed as it will be EOLed within the lifespan of 20.03. + For further information, please refer to the + support + and maintenance information from upstream. + + + + + The gcc5 and gfortran5 + packages have been removed. + + + + + The services.xserver.displayManager.auto + module has been removed. It was only intended for use in + internal NixOS tests, and gave the false impression of it + being a special display manager when it's actually LightDM. + Please use the + services.xserver.displayManager.lightdm.autoLogin + options instead, or any other display manager in NixOS as they + all support auto-login. If you used this module specifically + because it permitted root auto-login you can override the + lightdm-autologin pam module like: + + +{ + security.pam.services.lightdm-autologin.text = lib.mkForce '' + auth requisite pam_nologin.so + auth required pam_succeed_if.so quiet + auth required pam_permit.so + + account include lightdm + + password include lightdm + + session include lightdm + ''; +} + + + The difference is the: + + +auth required pam_succeed_if.so quiet + + + line, where default it's: + + + auth required pam_succeed_if.so uid >= 1000 quiet + + + not permitting users with uid's below 1000 (like root). All + other display managers in NixOS are configured like this. + + + + + There have been lots of improvements to the Mailman module. As + a result, + + + + + The services.mailman.hyperkittyBaseUrl + option has been renamed to + services.mailman.hyperkitty.baseUrl. + + + + + The services.mailman.hyperkittyApiKey + option has been removed. This is because having an option + for the Hyperkitty API key meant that the API key would be + stored in the world-readable Nix store, which was a + security vulnerability. A new Hyperkitty API key will be + generated the first time the new Hyperkitty service is + run, and it will then be persisted outside of the Nix + store. To continue using Hyperkitty, you must set + services.mailman.hyperkitty.enable + to true. + + + + + Additionally, some Postfix configuration must now be set + manually instead of automatically by the Mailman module: + + +{ + services.postfix.relayDomains = [ "hash:/var/lib/mailman/data/postfix_domains" ]; + services.postfix.config.transport_maps = [ "hash:/var/lib/mailman/data/postfix_lmtp" ]; + services.postfix.config.local_recipient_maps = [ "hash:/var/lib/mailman/data/postfix_lmtp" ]; +} + + + This is because some users may want to include other + values in these lists as well, and this was not possible + if they were set automatically by the Mailman module. It + would not have been possible to just concatenate values + from multiple modules each setting the values they needed, + because the order of elements in the list is significant. + + + + + + + The LLVM versions 3.5, 3.9 and 4 (including the corresponding + CLang versions) have been dropped. + + + + + The + networking.interfaces.*.preferTempAddress + option has been replaced by + networking.interfaces.*.tempAddress. The + new option allows better control of the IPv6 temporary + addresses, including completely disabling them for interfaces + where they are not needed. + + + + + Rspamd was updated to version 2.2. Read + + the upstream migration notes carefully. Please be + especially aware that some modules were removed and the + default Bayes backend is now Redis. + + + + + The *psu versions of oraclejdk8 have been + removed as they aren't provided by upstream anymore. + + + + + The services.dnscrypt-proxy module has been + removed as it used the deprecated version of dnscrypt-proxy. + We've added + services.dnscrypt-proxy2.enable + to use the supported version. This module supports + configuration via the Nix attribute set + services.dnscrypt-proxy2.settings, + or by passing a TOML configuration file via + services.dnscrypt-proxy2.configFile. + + +{ + # Example configuration: + services.dnscrypt-proxy2.enable = true; + services.dnscrypt-proxy2.settings = { + listen_addresses = [ "127.0.0.1:43" ]; + sources.public-resolvers = { + urls = [ "https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md" ]; + cache_file = "public-resolvers.md"; + minisign_key = "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3"; + refresh_delay = 72; + }; + }; + + services.dnsmasq.enable = true; + services.dnsmasq.servers = [ "127.0.0.1#43" ]; +} + + + + + qesteidutil has been deprecated in favor of + qdigidoc. + + + + + sqldeveloper_18 has been removed as it's not maintained + anymore, sqldeveloper has been updated to version + 19.4. Please note that this means that this + means that the oraclejdk is now required. For further + information please read the + release + notes. + + + + + Haskell env and shellFor + dev shell environments now organize dependencies the same way + as regular builds. In particular, rather than receiving all + the different lists of dependencies mashed together as one big + list, and then partitioning into Haskell and non-Hakell + dependencies, they work from the original many different + dependency parameters and don't need to algorithmically + partition anything. + + + This means that if you incorrectly categorize a dependency, + e.g. non-Haskell library dependency as a + buildDepends or run-time Haskell dependency + as a setupDepends, whereas things would + have worked before they may not work now. + + + + + The gcc-snapshot-package has been removed. It's marked as + broken for >2 years and used to point to a fairly old + snapshot from the gcc7-branch. + + + + + The nixos-build-vms8 -script now uses the python test-driver. + + + + + The riot-web package now accepts configuration overrides as an + attribute set instead of a string. A formerly used JSON + configuration can be converted to an attribute set with + builtins.fromJSON. + + + The new default configuration also disables automatic guest + account registration and analytics to improve privacy. The + previous behavior can be restored by setting + config.riot-web.conf = { disable_guests = false; piwik = true; }. + + + + + Stand-alone usage of Upower now requires + services.upower.enable instead of just + installing into + environment.systemPackages. + + + + + nextcloud has been updated to v18.0.2. This + means that users from NixOS 19.09 can't upgrade directly since + you can only move one version forward and 19.09 uses + v16.0.8. + + + To provide a safe upgrade-path and to circumvent similar + issues in the future, the following measures were taken: + + + + + The pkgs.nextcloud-attribute has been removed and replaced + with versioned attributes (currently pkgs.nextcloud17 and + pkgs.nextcloud18). With this change major-releases can be + backported without breaking stuff and to make + upgrade-paths easier. + + + + + Existing setups will be detected using + system.stateVersion: + by default, nextcloud17 will be used, but will raise a + warning which notes that after that deploy it's + recommended to update to the latest stable version + (nextcloud18) by declaring the newly introduced setting + services.nextcloud.package. + + + + + Users with an overlay (e.g. to use nextcloud at version + v18 on 19.09) will + get an evaluation error by default. This is done to ensure + that our + package-option + doesn't select an older version by accident. It's + recommended to use pkgs.nextcloud18 or to set + package + to pkgs.nextcloud explicitly. + + + + + + Please note that if you're coming from + 19.03 or older, you have to manually + upgrade to 19.09 first to upgrade your + server to Nextcloud v16. + + + + + + Hydra has gained a massive performance improvement due to + some + database schema changes by adding several IDs and + better indexing. However, it's necessary to upgrade Hydra in + multiple steps: + + + + + At first, an older version of Hydra needs to be deployed + which adds those (nullable) columns. When having set + stateVersion + to a value older than 20.03, + this package will be selected by default from the module + when upgrading. Otherwise, the package can be deployed + using the following config: + + +{ pkgs, ... }: { + services.hydra.package = pkgs.hydra-migration; +} + + + + + + + Automatically fill the newly added ID columns on the server by + running the following command: + + +$ hydra-backfill-ids + + + + Please note that this process can take a while depending on + your database-size! + + + + + + Deploy a newer version of Hydra to activate the DB + optimizations. This can be done by using hydra-unstable. This + package already includes + flake-support + and is therefore compiled against pkgs.nixFlakes. + + + + If your + stateVersion + is set to 20.03 or greater, + hydra-unstable will be used automatically! This will break + your setup if you didn't run the migration. + + + + Please note that Hydra is currently not available with + nixStable as this doesn't compile anymore. + + + + pkgs.hydra has been removed to ensure a graceful + database-migration using the dedicated package-attributes. + If you still have pkgs.hydra defined in e.g. an overlay, an + assertion error will be thrown. To circumvent this, you need + to set + services.hydra.package + to pkgs.hydra explicitly and make sure you know what you're + doing! + + + + + + The TokuDB storage engine will be disabled in mariadb 10.5. It + is recommended to switch to RocksDB. See also + TokuDB. + + + +
+
+ Other Notable Changes + + + + SD images are now compressed by default using + bzip2. + + + + + The nginx web server previously started its master process as + root privileged, then ran worker processes as a less + privileged identity user (the nginx user). + This was changed to start all of nginx as a less privileged + user (defined by services.nginx.user and + services.nginx.group). As a consequence, + all files that are needed for nginx to run (included + configuration fragments, SSL certificates and keys, etc.) must + now be readable by this less privileged user/group. + + + To continue to use the old approach, you can configure: + + +{ + services.nginx.appendConfig = let cfg = config.services.nginx; in ''user ${cfg.user} ${cfg.group};''; + systemd.services.nginx.serviceConfig.User = lib.mkForce "root"; +} + + + + + OpenSSH has been upgraded from 7.9 to 8.1, improving security + and adding features but with potential incompatibilities. + Consult the + + release announcement for more information. + + + + + PRETTY_NAME in + /etc/os-release now uses the short rather + than full version string. + + + + + The ACME module has switched from simp-le to + lego + which allows us to support DNS-01 challenges and wildcard + certificates. The following options have been added: + security.acme.acceptTerms, + security.acme.certs.<name>.dnsProvider, + security.acme.certs.<name>.credentialsFile, + security.acme.certs.<name>.dnsPropagationCheck. + As well as this, the options + security.acme.acceptTerms and either + security.acme.email or + security.acme.certs.<name>.email must + be set in order to use the ACME module. Certificates will be + regenerated on activation, no account or certificate will be + migrated from simp-le. In particular private keys will not be + preserved. However, the credentials for simp-le are preserved + and thus it is possible to roll back to previous versions + without breaking certificate generation. Note also that in + contrary to simp-le a new private key is recreated at each + renewal by default, which can have consequences if you embed + your public key in apps. + + + + + It is now possible to unlock LUKS-Encrypted file systems using + a FIDO2 token via + boot.initrd.luks.fido2Support. + + + + + Predictably named network interfaces get renamed in stage-1. + This means that it is possible to use the proper interface + name for e.g. Dropbear setups. + + + For further reference, please read + #68953 + or the corresponding + discourse + thread. + + + + + The matrix-synapse-package has been updated to + v1.11.1. + Due to + stricter + requirements for database configuration when using + postgresql, the automated database setup of the module has + been removed to avoid any further edge-cases. + + + matrix-synapse expects postgresql-databases + to have the options LC_COLLATE and + LC_CTYPE set to + 'C' + which basically instructs postgresql to + ignore any locale-based preferences. + + + Depending on your setup, you need to incorporate one of the + following changes in your setup to upgrade to 20.03: + + + + + If you use sqlite3 you don't need to do + anything. + + + + + If you use postgresql on a different + server, you don't need to change anything as well since + this module was never designed to configure remote + databases. + + + + + If you use postgresql and configured + your synapse initially on 19.09 or + older, you simply need to enable postgresql-support + explicitly: + + +{ ... }: { + services.matrix-synapse = { + enable = true; + /* and all the other config you've defined here */ + }; + services.postgresql.enable = true; +} + + + + + + + If you deploy a fresh matrix-synapse, you need to configure + the database yourself (e.g. by using the + services.postgresql.initialScript + option). An example for this can be found in the + documentation of the + Matrix module. + + + + + If you initially deployed your matrix-synapse on + nixos-unstable after + the 19.09-release, your database is + misconfigured due to a regression in NixOS. For now, + matrix-synapse will startup with a warning, but it's + recommended to reconfigure the database to set the values + LC_COLLATE and LC_CTYPE + to + 'C'. + + + + + The + systemd.network.links + option is now respected even when + systemd-networkd + is disabled. This mirrors the behaviour of systemd - It's udev + that parses .link files, not + systemd-networkd. + + + + + mongodb has been updated to version 3.4.24. + + + + Please note that mongodb has been relicensed under their own + sspl-license. + Since it's not entirely free and not OSI-approved, it's + listed as non-free. This means that Hydra doesn't provide + prebuilt mongodb-packages and needs to be built locally. + + + + +
+
diff --git a/nixos/doc/manual/from_md/release-notes/rl-2009.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2009.section.xml new file mode 100644 index 00000000000..c74d850b2c6 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-2009.section.xml @@ -0,0 +1,2206 @@ +
+ Release 20.09 (<quote>Nightingale</quote>, 2020.10/27) + + Support is planned until the end of June 2021, handing over to + 21.05. (Plans + + have shifted by two months since release of 20.09.) + +
+ Highlights + + In addition to 7349 new, 14442 updated, and 8181 removed packages, + this release has the following highlights: + + + + + Core version changes: + + + + + gcc: 9.2.0 -> 9.3.0 + + + + + glibc: 2.30 -> 2.31 + + + + + linux: still defaults to 5.4.x, all supported kernels + available + + + + + mesa: 19.3.5 -> 20.1.7 + + + + + + + Desktop Environments: + + + + + plasma5: 5.17.5 -> 5.18.5 + + + + + kdeApplications: 19.12.3 -> 20.08.1 + + + + + gnome3: 3.34 -> 3.36, see its + release + notes + + + + + cinnamon: added at 4.6 + + + + + NixOS now distributes an official + GNOME + ISO + + + + + + + Programming Languages and Frameworks: + + + + + Agda ecosystem was heavily reworked (see more details + below) + + + + + PHP now defaults to PHP 7.4, updated from 7.3 + + + + + PHP 7.2 is no longer supported due to upstream not + supporting this version for the entire lifecycle of the + 20.09 release + + + + + Python 3 now defaults to Python 3.8 instead of 3.7 + + + + + Python 3.5 reached its upstream EOL at the end of + September 2020: it has been removed from the list of + available packages + + + + + + + Databases and Service Monitoring: + + + + + MariaDB has been updated to 10.4, MariaDB Galera to 26.4. + Please read the related upgrade instructions under + backwards + incompatibilities before upgrading. + + + + + Zabbix now defaults to 5.0, updated from 4.4. Please read + related sections under + backwards + compatibilities before upgrading. + + + + + + + Major module changes: + + + + + Quickly configure a complete, private, self-hosted video + conferencing solution with the new Jitsi Meet module. + + + + + Two new options, + authorizedKeysCommand + and + authorizedKeysCommandUser, + have been added to the openssh module. + If you have AuthorizedKeysCommand in + your + services.openssh.extraConfig + you should make use of these new options instead. + + + + + There is a new module for Podman + (virtualisation.podman), a drop-in + replacement for the Docker command line. + + + + + The new virtualisation.containers + module manages configuration shared by the CRI-O and + Podman modules. + + + + + Declarative Docker containers are renamed from + docker-containers to + virtualisation.oci-containers.containers. + This is to make it possible to use + podman instead of + docker. + + + + + The new option + documentation.man.generateCaches + has been added to automatically generate the + man-db caches, which are needed by + utilities like whatis and + apropos. The caches are generated + during the build of the NixOS configuration: since this + can be expensive when a large number of packages are + installed, the feature is disabled by default. + + + + + services.postfix.sslCACert was replaced + by + services.postfix.tlsTrustedAuthorities + which now defaults to system certificate authorities. + + + + + The various documented workarounds to use steam have been + converted to a module. + programs.steam.enable enables steam, + controller support and the workarounds. + + + + + Support for built-in LCDs in various pieces of Logitech + hardware (keyboards and USB speakers). + hardware.logitech.lcd.enable enables + support for all hardware supported by the + g15daemon + project. + + + + + The GRUB module gained support for basic password + protection, which allows to restrict non-default entries + in the boot menu to one or more users. The users and + passwords are defined via the option + boot.loader.grub.users. Note: Password + support is only available in GRUB version 2. + + + + + + + NixOS module changes: + + + + + The NixOS module system now supports freeform modules as a + mix between types.attrsOf and + types.submodule. These allow you to + explicitly declare a subset of options while still + permitting definitions without an associated option. See + for how to use + them. + + + + + Following its deprecation in 20.03, the Perl NixOS test + driver has been removed. All remaining tests have been + ported to the Python test framework. Code outside nixpkgs + using make-test.nix or + testing.nix needs to be ported to + make-test-python.nix and + testing-python.nix respectively. + + + + + Subordinate GID and UID mappings are now set up + automatically for all normal users. This will make + container tools like Podman work as non-root users out of + the box. + + + + + + + Starting with this release, the hydra-build-result + nixos-YY.MM branches no longer exist in the + deprecated + nixpkgs-channels repository. These branches are now in + the main + nixpkgs repository. + + + +
+
+ New Services + + In addition to 1119 new, 118 updated, and 476 removed options; 61 + new modules were added since the last release: + + + + + Hardware: + + + + + hardware.system76.firmware-daemon.enable + adds easy support of system76 firmware + + + + + hardware.uinput.enable + loads uinput kernel module + + + + + hardware.video.hidpi.enable + enable good defaults for HiDPI displays + + + + + hardware.wooting.enable + support for Wooting keyboards + + + + + hardware.xpadneo.enable + xpadneo driver for Xbox One wireless controllers + + + + + + + Programs: + + + + + programs.hamster.enable + enable hamster time tracking + + + + + programs.steam.enable + adds easy enablement of steam and related system + configuration + + + + + + + Security: + + + + + security.doas.enable + alternative to sudo, allows non-root users to execute + commands as root + + + + + security.tpm2.enable + add Trusted Platform Module 2 support + + + + + + + System: + + + + + boot.initrd.network.openvpn.enable + start an OpenVPN client during initrd boot + + + + + + + Virtualization: + + + + + boot.enableContainers + use nixos-containers + + + + + virtualisation.oci-containers.containers + run OCI (Docker) containers + + + + + virtualisation.podman.enable + daemonless container engine + + + + + + + Services: + + + + + services.ankisyncd.enable + Anki sync server + + + + + services.bazarr.enable + Subtitle manager for Sonarr and Radarr + + + + + services.biboumi.enable + Biboumi XMPP gateway to IRC + + + + + services.blockbook-frontend + Blockbook-frontend, a service for the Trezor wallet + + + + + services.cage.enable + Wayland cage service + + + + + services.convos.enable + IRC daemon, which can be accessed throught the browser + + + + + services.engelsystem.enable + Tool for coordinating volunteers and shifts on large + events + + + + + services.espanso.enable + text-expander written in rust + + + + + services.foldingathome.enable + Folding@home client + + + + + services.gerrit.enable + Web-based team code collaboration tool + + + + + services.go-neb.enable + Matrix bot + + + + + services.hardware.xow.enable + xow as a systemd service + + + + + services.hercules-ci-agent.enable + Hercules CI build agent + + + + + services.jicofo.enable + Jitsi Conference Focus, component of Jitsi Meet + + + + + services.jirafeau.enable + A web file repository + + + + + services.jitsi-meet.enable + Secure, simple and scalable video conferences + + + + + services.jitsi-videobridge.enable + Jitsi Videobridge, a WebRTC compatible router + + + + + services.jupyterhub.enable + Jupyterhub development server + + + + + services.k3s.enable + Lightweight Kubernetes distribution + + + + + services.magic-wormhole-mailbox-server.enable + Magic Wormhole Mailbox Server + + + + + services.malcontent.enable + Parental Control support + + + + + services.matrix-appservice-discord.enable + Matrix and Discord bridge + + + + + services.mautrix-telegram.enable + Matrix-Telegram puppeting/relaybot bridge + + + + + services.mirakurun.enable + Japanese DTV Tuner Server Service + + + + + services.molly-brown.enable + Molly-Brown Gemini server + + + + + services.mullvad-vpn.enable + Mullvad VPN daemon + + + + + services.ncdns.enable + Namecoin to DNS bridge + + + + + services.nextdns.enable + NextDNS to DoH Proxy service + + + + + services.nix-store-gcs-proxy + Google storage bucket to be used as a nix store + + + + + services.onedrive.enable + OneDrive sync service + + + + + services.pinnwand.enable + Pastebin-like service + + + + + services.pixiecore.enable + Manage network booting of machines + + + + + services.privacyidea.enable + Privacy authentication server + + + + + services.quorum.enable + Quorum blockchain daemon + + + + + services.robustirc-bridge.enable + RobustIRC bridge + + + + + services.rss-bridge.enable + Generate RSS and Atom feeds + + + + + services.rtorrent.enable + rTorrent service + + + + + services.smartdns.enable + SmartDNS DNS server + + + + + services.sogo.enable + SOGo groupware + + + + + services.teeworlds.enable + Teeworlds game server + + + + + services.torque.mom.enable + torque computing node + + + + + services.torque.server.enable + torque server + + + + + services.tuptime.enable + A total uptime service + + + + + services.urserver.enable + X11 remote server + + + + + services.wasabibackend.enable + Wasabi backend service + + + + + services.yubikey-agent.enable + Yubikey agent + + + + + services.zigbee2mqtt.enable + Zigbee to MQTT bridge + + + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + MariaDB has been updated to 10.4, MariaDB Galera to 26.4. + Before you upgrade, it would be best to take a backup of your + database. For MariaDB Galera Cluster, see + Upgrading + from MariaDB 10.3 to MariaDB 10.4 with Galera Cluster + instead. Before doing the upgrade read + Incompatible + Changes Between 10.3 and 10.4. After the upgrade you + will need to run mysql_upgrade. MariaDB + 10.4 introduces a number of changes to the authentication + process, intended to make things easier and more intuitive. + See + Authentication + from MariaDB 10.4. unix_socket auth plugin does not use + a password, and uses the connecting user's UID instead. When a + new MariaDB data directory is initialized, two MariaDB users + are created and can be used with new unix_socket auth plugin, + as well as traditional mysql_native_password plugin: + root@localhost and mysql@localhost. To actually use the + traditional mysql_native_password plugin method, one must run + the following: + + +{ +services.mysql.initialScript = pkgs.writeText "mariadb-init.sql" '' + ALTER USER root@localhost IDENTIFIED VIA mysql_native_password USING PASSWORD("verysecret"); +''; +} + + + When MariaDB data directory is just upgraded (not + initialized), the users are not created or modified. + + + + + MySQL server is now started with additional systemd + sandbox/hardening options for better security. The PrivateTmp, + ProtectHome, and ProtectSystem options may be problematic when + MySQL is attempting to read from or write to your filesystem + anywhere outside of its own state directory, for example when + calling + LOAD DATA INFILE or SELECT * INTO OUTFILE. + In this scenario a variant of the following may be required: - + allow MySQL to read from /home and /tmp directories when using + LOAD DATA INFILE + + +{ + systemd.services.mysql.serviceConfig.ProtectHome = lib.mkForce "read-only"; +} + + + - allow MySQL to write to custom folder + /var/data when using + SELECT * INTO OUTFILE, assuming the mysql + user has write access to /var/data + + +{ + systemd.services.mysql.serviceConfig.ReadWritePaths = [ "/var/data" ]; +} + + + The MySQL service no longer runs its + systemd service startup script as + root anymore. A dedicated non + root super user account is required for + operation. This means users with an existing MySQL or MariaDB + database server are required to run the following SQL + statements as a super admin user before upgrading: + + +CREATE USER IF NOT EXISTS 'mysql'@'localhost' identified with unix_socket; +GRANT ALL PRIVILEGES ON *.* TO 'mysql'@'localhost' WITH GRANT OPTION; + + + If you use MySQL instead of MariaDB please replace + unix_socket with + auth_socket. If you have changed the value + of + services.mysql.user + from the default of mysql to a different + user please change 'mysql'@'localhost' to + the corresponding user instead. + + + + + Zabbix now defaults to 5.0, updated from 4.4. Please carefully + read through + the + upgrade guide and apply any changes required. Be sure + to take special note of the section on + enabling + extended range of numeric (float) values as you will + need to apply this database migration manually. + + + If you are using Zabbix Server with a MySQL or MariaDB + database you should note that using a character set of + utf8 and a collate of + utf8_bin has become mandatory with this + release. See the upstream + issue + for further discussion. Before upgrading you should check the + character set and collation used by your database and ensure + they are correct: + + +SELECT + default_character_set_name, + default_collation_name +FROM + information_schema.schemata +WHERE + schema_name = 'zabbix'; + + + If these values are not correct you should take a backup of + your database and convert the character set and collation as + required. Here is an + example + of how to do so, taken from the Zabbix forums: + + +ALTER DATABASE `zabbix` DEFAULT CHARACTER SET utf8 COLLATE utf8_bin; + +-- the following will produce a list of SQL commands you should subsequently execute +SELECT CONCAT("ALTER TABLE ", TABLE_NAME," CONVERT TO CHARACTER SET utf8 COLLATE utf8_bin;") AS ExecuteTheString +FROM information_schema.`COLUMNS` +WHERE table_schema = "zabbix" AND COLLATION_NAME = "utf8_general_ci"; + + + + + maxx package removed along with + services.xserver.desktopManager.maxx + module. Please migrate to cdesktopenv and + services.xserver.desktopManager.cde module. + + + + + The + matrix-synapse + module no longer includes optional dependencies by default, + they have to be added through the + plugins + option. + + + + + buildGoModule now internally creates a + vendor directory in the source tree for downloaded modules + instead of using go's + module + proxy protocol. This storage format is simpler and + therefore less likely to break with future versions of go. As + a result buildGoModule switched from + modSha256 to the + vendorSha256 attribute to pin fetched + version data. + + + + + Grafana is now built without support for phantomjs by default. + Phantomjs support has been + deprecated + in Grafana and the phantomjs project is + currently + unmaintained. It can still be enabled by providing + phantomJsSupport = true to the package + instantiation: + + +{ + services.grafana.package = pkgs.grafana.overrideAttrs (oldAttrs: rec { + phantomJsSupport = true; + }); +} + + + + + The + supybot + module now uses /var/lib/supybot as its + default + stateDir + path if stateVersion is 20.09 or higher. It + also enables a number of + systemd + sandboxing options which may possibly interfere with + some plugins. If this is the case you can disable the options + through attributes in + systemd.services.supybot.serviceConfig. + + + + + The security.duosec.skey option, which + stored a secret in the nix store, has been replaced by a new + security.duosec.secretKeyFile + option for better security. + + + security.duosec.ikey has been renamed to + security.duosec.integrationKey. + + + + + vmware has been removed from the + services.x11.videoDrivers defaults. For + VMWare guests set + virtualisation.vmware.guest.enable to + true which will include the appropriate + drivers. + + + + + The initrd SSH support now uses OpenSSH rather than Dropbear + to allow the use of Ed25519 keys and other OpenSSH-specific + functionality. Host keys must now be in the OpenSSH format, + and at least one pre-generated key must be specified. + + + If you used the + boot.initrd.network.ssh.host*Key options, + you'll get an error explaining how to convert your host keys + and migrate to the new + boot.initrd.network.ssh.hostKeys option. + Otherwise, if you don't have any host keys set, you'll need to + generate some; see the hostKeys option + documentation for instructions. + + + + + Since this release there's an easy way to customize your PHP + install to get a much smaller base PHP with only wanted + extensions enabled. See the following snippet installing a + smaller PHP with the extensions imagick, + opcache, pdo and + pdo_mysql loaded: + + +{ + environment.systemPackages = [ + (pkgs.php.withExtensions + ({ all, ... }: with all; [ + imagick + opcache + pdo + pdo_mysql + ]) + ) + ]; +} + + + The default php attribute hasn't lost any + extensions. The opcache extension has been + added. All upstream PHP extensions are available under + php.extensions.<name?>. + + + All PHP config flags have been removed for + the following reasons: + + + + + The updated php attribute is now easily + customizable to your liking by using + php.withExtensions or + php.buildEnv instead of writing config + files or changing configure flags. + + + + + The remaining configuration flags can now be set directly on + the php attribute. For example, instead of + + +{ + php.override { + config.php.embed = true; + config.php.apxs2 = false; + } +} + + + you should now write + + +{ + php.override { + embedSupport = true; + apxs2Support = false; + } +} + + + + + The ACME module has been overhauled for simplicity and + maintainability. Cert generation now implicitly uses the + acme user, and the + security.acme.certs._name_.user option has + been removed. Instead, certificate access from other services + is now managed through group permissions. The module no longer + runs lego twice under certain conditions, and will correctly + renew certificates if their configuration is changed. Services + which reload nginx and httpd after certificate renewal are now + properly configured too so you no longer have to do this + manually if you are using HTTPS enabled virtual hosts. A + mechanism for regenerating certs on demand has also been added + and documented. + + + + + Gollum received a major update to version 5.x and you may have + to change some links in your wiki when migrating from gollum + 4.x. More information can be found + here. + + + + + Deluge 2.x was added and is used as default for new NixOS + installations where stateVersion is >= 20.09. If you are + upgrading from a previous NixOS version, you can set + service.deluge.package = pkgs.deluge-2_x to + upgrade to Deluge 2.x and migrate the state to the new format. + Be aware that backwards state migrations are not supported by + Deluge. + + + + + Nginx web server now starting with additional + sandbox/hardening options. By default, write access to + /var/log/nginx and + /var/cache/nginx is allowed. To allow + writing to other folders, use + systemd.services.nginx.serviceConfig.ReadWritePaths + + +{ + systemd.services.nginx.serviceConfig.ReadWritePaths = [ "/var/www" ]; +} + + + Nginx is also started with the systemd option + ProtectHome = mkDefault true; which forbids + it to read anything from /home, + /root and /run/user (see + ProtectHome + docs for details). If you require serving files from + home directories, you may choose to set e.g. + + +{ + systemd.services.nginx.serviceConfig.ProtectHome = "read-only"; +} + + + + + The NixOS options nesting.clone and + nesting.children have been deleted, and + replaced with named + specialisation + configurations. + + + Replace a nesting.clone entry with: + + +{ + specialisation.example-sub-configuration = { + configuration = { + ... + }; +}; + + + Replace a nesting.children entry with: + + +{ + specialisation.example-sub-configuration = { + inheritParentConfig = false; + configuration = { + ... + }; +}; + + + To switch to a specialised configuration at runtime you need + to run: + + +$ sudo /run/current-system/specialisation/example-sub-configuration/bin/switch-to-configuration test + + + Before you would have used: + + +$ sudo /run/current-system/fine-tune/child-1/bin/switch-to-configuration test + + + + + The Nginx log directory has been moved to + /var/log/nginx, the cache directory to + /var/cache/nginx. The option + services.nginx.stateDir has been removed. + + + + + The httpd web server previously started its main process as + root privileged, then ran worker processes as a less + privileged identity user. This was changed to start all of + httpd as a less privileged user (defined by + services.httpd.user + and + services.httpd.group). + As a consequence, all files that are needed for httpd to run + (included configuration fragments, SSL certificates and keys, + etc.) must now be readable by this less privileged user/group. + + + The default value for + services.httpd.mpm + has been changed from prefork to + event. Along with this change the default + value for + services.httpd.virtualHosts.<name>.http2 + has been set to true. + + + + + The systemd-networkd option + systemd.network.networks.<name>.dhcp.CriticalConnection + has been removed following upstream systemd's deprecation of + the same. It is recommended to use + systemd.network.networks.<name>.networkConfig.KeepConfiguration + instead. See systemd.network 5 for details. + + + + + The systemd-networkd option + systemd.network.networks._name_.dhcpConfig + has been renamed to + systemd.network.networks.name.dhcpV4Config + following upstream systemd's documentation change. See + systemd.network 5 for details. + + + + + In the picom module, several options that + accepted floating point numbers encoded as strings (for + example + services.picom.activeOpacity) + have been changed to the (relatively) new native + float type. To migrate your configuration + simply remove the quotes around the numbers. + + + + + When using buildBazelPackage from Nixpkgs, + flat hash mode is now used for dependencies + instead of recursive. This is to better + allow using hashed mirrors where needed. As a result, these + hashes will have changed. + + + + + The syntax of the PostgreSQL configuration file is now checked + at build time. If your configuration includes a file + inaccessible inside the build sandbox, set + services.postgresql.checkConfig to + false. + + + + + The rkt module has been removed, it was archived by upstream. + + + + + The + Bazaar + VCS is unmaintained and, as consequence of the Python 2 EOL, + the packages bazaar and + bazaarTools were removed. Breezy, the + backward compatible fork of Bazaar (see the + announcement), + was packaged as breezy and can be used + instead. + + + Regarding Nixpkgs, fetchbzr, + nix-prefetch-bzr and Bazaar support in + Hydra will continue to work through Breezy. + + + + + In addition to the hostname, the fully qualified domain name + (FQDN), which consists of + ${networking.hostName} and + ${networking.domain} is now added to + /etc/hosts, to allow local FQDN resolution, + as used by the hostname --fqdn command and + other applications that try to determine the FQDN. These new + entries take precedence over entries from the DNS which could + cause regressions in some very specific setups. Additionally + the hostname is now resolved to 127.0.0.2 + instead of 127.0.1.1 to be consistent with + what nss-myhostname (from systemd) returns. + The old behaviour can e.g. be restored by using + networking.hosts = lib.mkForce { "127.0.1.1" = [ config.networking.hostName ]; };. + + + + + The hostname (networking.hostName) must now + be a valid DNS label (see RFC 1035, RFC 1123) and as such must + not contain the domain part. This means that the hostname must + start with a letter or digit, end with a letter or digit, and + have as interior characters only letters, digits, and hyphen. + The maximum length is 63 characters. Additionally it is + recommended to only use lower-case characters. If (e.g. for + legacy reasons) a FQDN is required as the Linux kernel network + node hostname (uname --nodename) the option + boot.kernel.sysctl."kernel.hostname" + can be used as a workaround (but be aware of the 64 character + limit). + + + + + The GRUB specific option + boot.loader.grub.extraInitrd has been + replaced with the generic option + boot.initrd.secrets. This option creates a + secondary initrd from the specified files, rather than using a + manually created initrd file. Due to an existing bug with + boot.loader.grub.extraInitrd, it is not + possible to directly boot an older generation that used that + option. It is still possible to rollback to that generation if + the required initrd file has not been deleted. + + + + + The + DNSChain + package and NixOS module have been removed from Nixpkgs as the + software is unmaintained and can't be built. For more + information see issue + #89205. + + + + + In the resilio module, + services.resilio.httpListenAddr + has been changed to listen to [::1] instead + of 0.0.0.0. + + + + + sslh has been updated to version + 1.21. The ssl probe must + be renamed to tls in + services.sslh.appendConfig. + + + + + Users of OpenAFS + 1.6 must upgrade their services to OpenAFS 1.8! In this + release, the OpenAFS package version 1.6.24 is marked broken + but can be used during transition to OpenAFS 1.8.x. Use the + options + services.openafsClient.packages.module, + services.openafsClient.packages.programs + and services.openafsServer.package to + select a different OpenAFS package. OpenAFS 1.6 will be + removed in the next release. The package + openafs and the service options will then + silently point to the OpenAFS 1.8 release. + + + See also the OpenAFS + Administrator + Guide for instructions. Beware of the following when + updating servers: + + + + + The storage format of the server key has changed and the + key must be converted before running the new release. + + + + + When updating multiple database servers, turn off the + database servers from the highest IP down to the lowest + with resting periods in between. Start up in reverse + order. Do not concurrently run database servers working + with different OpenAFS releases! + + + + + Update servers first, then clients. + + + + + + + Radicale's default package has changed from 2.x to 3.x. An + upgrade checklist can be found + here. + You can use the newer version in the NixOS service by setting + the package to + radicale3, which is done automatically if + stateVersion is 20.09 or higher. + + + + + udpt experienced a complete rewrite from + C++ to rust. The configuration format changed from ini to + toml. The new configuration documentation can be found at + the + official website and example configuration is packaged + in ${udpt}/share/udpt/udpt.toml. + + + + + We now have a unified + services.xserver.displayManager.autoLogin + option interface to be used for every display-manager in + NixOS. + + + + + The bitcoind module has changed to + multi-instance, using submodules. Therefore, it is now + mandatory to name each instance. To use this new + multi-instance config with an existing bitcoind data directory + and user, you have to adjust the original config, e.g.: + + +{ + services.bitcoind = { + enable = true; + extraConfig = "..."; + ... + }; +} + + + To something similar: + + +{ + services.bitcoind.mainnet = { + enable = true; + dataDir = "/var/lib/bitcoind"; + user = "bitcoin"; + extraConfig = "..."; + ... + }; +} + + + The key settings are: + + + + + dataDir - to continue using the same + data directory. + + + + + user - to continue using the same user + so that bitcoind maintains access to its files. + + + + + + + Graylog introduced a change in the LDAP server certificate + validation behaviour for version 3.3.3 which might break + existing setups. When updating Graylog from a version before + 3.3.3 make sure to check the Graylog + release + info for information on how to avoid the issue. + + + + + The dokuwiki module has changed to + multi-instance, using submodules. Therefore, it is now + mandatory to name each instance. Moreover, forcing SSL by + default has been dropped, so nginx.forceSSL + and nginx.enableACME are no longer set to + true. To continue using your service with + the original SSL settings, you have to adjust the original + config, e.g.: + + +{ + services.dokuwiki = { + enable = true; + ... + }; +} + + + To something similar: + + +{ + services.dokuwiki."mywiki" = { + enable = true; + nginx = { + forceSSL = true; + enableACME = true; + }; + ... + }; +} + + + The base package has also been upgraded to the 2020-07-29 + "Hogfather" release. Plugins might be incompatible + or require upgrading. + + + + + The + services.postgresql.dataDir + option is now set to + "/var/lib/postgresql/${cfg.package.psqlSchema}" + regardless of your + system.stateVersion. + Users with an existing postgresql install that have a + system.stateVersion + of 17.03 or below should double check what + the value of their + services.postgresql.dataDir + option is (/var/db/postgresql) and then + explicitly set this value to maintain compatibility: + + +{ + services.postgresql.dataDir = "/var/db/postgresql"; +} + + + The postgresql module now expects there to be a database super + user account called postgres regardless of + your + system.stateVersion. + Users with an existing postgresql install that have a + system.stateVersion + of 17.03 or below should run the following + SQL statements as a database super admin user before + upgrading: + + +CREATE ROLE postgres LOGIN SUPERUSER; + + + + + The USBGuard module now removes options and instead hardcodes + values for IPCAccessControlFiles, + ruleFiles, and + auditFilePath. Audit logs can be found in + the journal. + + + + + The NixOS module system now evaluates option definitions more + strictly, allowing it to detect a larger set of problems. As a + result, what previously evaluated may not do so anymore. See + the + PR that changed this for more info. + + + + + For NixOS configuration options, the type + loaOf, after its initial deprecation in + release 20.03, has been removed. In NixOS and Nixpkgs options + using this type have been converted to + attrsOf. For more information on this + change have look at these links: + issue + #1800, + PR + #63103. + + + + + config.systemd.services.${name}.path now + returns a list of paths instead of a colon-separated string. + + + + + Caddy module now uses Caddy v2 by default. Caddy v1 can still + be used by setting + services.caddy.package + to pkgs.caddy1. + + + New option + services.caddy.adapter + has been added. + + + + + The + jellyfin + module will use and stay on the Jellyfin version + 10.5.5 if stateVersion + is lower than 20.09. This is because + significant changes were made to the database schema, and it + is highly recommended to backup your instance before + upgrading. After making your backup, you can upgrade to the + latest version either by setting your + stateVersion to 20.09 or + higher, or set the + services.jellyfin.package to + pkgs.jellyfin. If you do not wish to + upgrade Jellyfin, but want to change your + stateVersion, you can set the value of + services.jellyfin.package to + pkgs.jellyfin_10_5. + + + + + The security.rngd service is now disabled + by default. This choice was made because there's krngd in the + linux kernel space making it (for most usecases) functionally + redundent. + + + + + The hardware.nvidia.optimus_prime.enable + service has been renamed to + hardware.nvidia.prime.sync.enable and has + many new enhancements. Related nvidia prime settings may have + also changed. + + + + + The package nextcloud17 has been removed and nextcloud18 was + marked as insecure since both of them will + + will be EOL (end of life) within the lifetime of 20.09. + + + It's necessary to upgrade to nextcloud19: + + + + + From nextcloud17, you have to upgrade to nextcloud18 first + as Nextcloud doesn't allow going multiple major revisions + forward in a single upgrade. This is possible by setting + services.nextcloud.package + to nextcloud18. + + + + + From nextcloud18, it's possible to directly upgrade to + nextcloud19 by setting + services.nextcloud.package + to nextcloud19. + + + + + + + The GNOME desktop manager no longer default installs + gnome3.epiphany. It was chosen to do this as it has a + usability breaking issue (see issue + #98819) + that makes it unsuitable to be a default app. + + + + Issue + #98819 + is now fixed and gnome3.epiphany is once again installed by + default. + + + + + + If you want to manage the configuration of wpa_supplicant + outside of NixOS you must ensure that none of + networking.wireless.networks, + networking.wireless.extraConfig + or + networking.wireless.userControlled.enable + is being used or true. Using any of those + options will cause wpa_supplicant to be started with a NixOS + generated configuration file instead of your own. + + + +
+
+ Other Notable Changes + + + + SD images are now compressed by default using + zstd. The compression for ISO images has + also been changed to zstd, but ISO images + are still not compressed by default. + + + + + services.journald.rateLimitBurst was + updated from 1000 to + 10000 to follow the new upstream systemd + default. + + + + + The notmuch package move its emacs-related binaries and emacs + lisp files to a separate output. They're not part of the + default out output anymore - if you relied + on the notmuch-emacs-mua binary or the + emacs lisp files, access them via the + notmuch.emacs output. Device tree overlay + support was improved in + #79370 + and now uses + hardware.deviceTree.kernelPackage + instead of hardware.deviceTree.base. + hardware.deviceTree.overlays + configuration was extended to support .dts + files with symbols. Device trees can now be filtered by + setting + hardware.deviceTree.filter + option. + + + + + The default output of buildGoPackage is now + $out instead of $bin. + + + + + buildGoModule doCheck + now defaults to true. + + + + + Packages built using buildRustPackage now + use release mode for the + checkPhase by default. + + + Please note that Rust packages utilizing a custom + build/install procedure (e.g. by using a + Makefile) or test suites that rely on the + structure of the target/ directory may + break due to those assumptions. For further information, + please read the Rust section in the Nixpkgs manual. + + + + + The cc- and binutils-wrapper's "infix salt" and + _BUILD_ and _TARGET_ + user infixes have been replaced with with a "suffix + salt" and suffixes and _FOR_BUILD and + _FOR_TARGET. This matches the autotools + convention for env vars which standard for these things, + making interfacing with other tools easier. + + + + + Additional Git documentation (HTML and text files) is now + available via the git-doc package. + + + + + Default algorithm for ZRAM swap was changed to + zstd. + + + + + The installer now enables sshd by default. This improves + installation on headless machines especially ARM + single-board-computer. To login through ssh, either a password + or an ssh key must be set for the root user or the nixos user. + + + + + The scripted networking system now uses + .link files in + /etc/systemd/network to configure mac + address and link MTU, instead of the sometimes buggy + network-link-* units, which have been + removed. Bringing the interface up has been moved to the + beginning of the network-addresses-* unit. + Note this doesn't require systemd-networkd + - it's udev that parses .link files. Extra + care needs to be taken in the presence of + legacy + udev rules to rename interfaces, as MAC Address and MTU + defined in these options can only match on the original link + name. In such cases, you most likely want to create a + 10-*.link file through + systemd.network.links + and set both name and MAC Address / MTU there. + + + + + Grafana received a major update to version 7.x. A plugin is + now needed for image rendering support, and plugins must now + be signed by default. More information can be found + in + the Grafana documentation. + + + + + The hardware.u2f module, which was + installing udev rules was removed, as udev gained native + support to handle FIDO security tokens. + + + + + The services.transmission module was + enhanced with the new options: + services.transmission.credentialsFile, + services.transmission.openFirewall, + and + services.transmission.performanceNetParameters. + + + transmission-daemon is now started with + additional systemd sandbox/hardening options for better + security. Please + report + any use case where this is not working well. In particular, + the RootDirectory option newly set forbids + uploading or downloading a torrent outside of the default + directory configured at + settings.download-dir. + If you really need Transmission to access other directories, + you must include those directories into the + BindPaths of the service: + + +{ + systemd.services.transmission.serviceConfig.BindPaths = [ "/path/to/alternative/download-dir" ]; +} + + + Also, connection to the RPC (Remote Procedure Call) of + transmission-daemon is now only available + on the local network interface by default. Use: + + +{ + services.transmission.settings.rpc-bind-address = "0.0.0.0"; +} + + + to get the previous behavior of listening on all network + interfaces. + + + + + With this release systemd-networkd (when + enabled through + networking.useNetworkd) + has it's netlink socket created through a + systemd.socket unit. This gives us control + over socket buffer sizes and other parameters. For larger + setups where networkd has to create a lot of (virtual) devices + the default buffer size (currently 128MB) is not enough. + + + On a machine with >100 virtual interfaces (e.g., wireguard + tunnels, VLANs, …), that all have to be brought up during + system startup, the receive buffer size will spike for a brief + period. Eventually some of the message will be dropped since + there is not enough (permitted) buffer space available. + + + By having systemd-networkd start with a + netlink socket created by systemd we can + configure the ReceiveBufferSize= parameter + in the socket options (i.e. + systemd.sockets.systemd-networkd.socketOptions.ReceiveBufferSize) + without recompiling systemd-networkd. + + + Since the actual memory requirements depend on hardware, + timing, exact configurations etc. it isn't currently possible + to infer a good default from within the NixOS module system. + Administrators are advised to monitor the logs of + systemd-networkd for + rtnl: kernel receive buffer overrun spam + and increase the memory limit as they see fit. + + + Note: Increasing the ReceiveBufferSize= + doesn't allocate any memory. It just increases the upper bound + on the kernel side. The memory allocation depends on the + amount of messages that are queued on the kernel side of the + netlink socket. + + + + + Specifying + mailboxes + in the dovecot2 module as a list is deprecated and will break + eval in 21.05. Instead, an attribute-set should be specified + where the name should be the key of the + attribute. + + + This means that a configuration like this + + +{ + services.dovecot2.mailboxes = [ + { name = "Junk"; + auto = "create"; + } + ]; +} + + + should now look like this: + + +{ + services.dovecot2.mailboxes = { + Junk.auto = "create"; + }; +} + + + + + netbeans was upgraded to 12.0 and now defaults to OpenJDK 11. + This might cause problems if your projects depend on packages + that were removed in Java 11. + + + + + nextcloud has been updated to + v19. + + + If you have an existing installation, please make sure that + you're on nextcloud18 before upgrading to nextcloud19 since + Nextcloud doesn't support upgrades across multiple major + versions. + + + + + The nixos-run-vms script now deletes the + previous run machines states on test startup. You can use the + --keep-vm-state flag to match the previous + behaviour and keep the same VM state between different test + runs. + + + + + The + nix.buildMachines + option is now type-checked. There are no functional changes, + however this may require updating some configurations to use + correct types for all attributes. + + + + + The fontconfig module stopped generating + config and cache files for fontconfig 2.10.x, the + /etc/fonts/fonts.conf now belongs to the + latest fontconfig, just like on other Linux distributions, and + we will + no + longer be versioning the config directories. + + + Fontconfig 2.10.x was removed from Nixpkgs since it hasn’t + been used in any Nixpkgs package for years now. + + + + + Nginx module + nginxModules.fastcgi-cache-purge renamed to + official name nginxModules.cache-purge. + Nginx module nginxModules.ngx_aws_auth + renamed to official name + nginxModules.aws-auth. + + + + + The option defaultPackages was added. It + installs the packages perl, rsync and strace for now. They + were added unconditionally to + systemPackages before, but are not strictly + necessary for a minimal NixOS install. You can set it to an + empty list to have a more minimal system. Be aware that some + functionality might still have an impure dependency on those + packages, so things might break. + + + + + The undervolt option no longer needs to + apply its settings every 30s. If they still become undone, + open an issue and restore the previous behaviour using + undervolt.useTimer. + + + + + Agda has been heavily reworked. + + + + + agda.mkDerivation has been heavily + changed and is now located at agdaPackages.mkDerivation. + + + + + New top-level packages agda and + agda.withPackages have been added, the + second of which sets up agda with access to chosen + libraries. + + + + + All agda libraries now live under + agdaPackages. + + + + + Many broken libraries have been removed. + + + + + See the + new + documentation for more information. + + + + + The deepin package set has been removed + from nixpkgs. It was a work in progress to package the + Deepin + Desktop Environment (DDE), including libraries, tools + and applications, and it was still missing a service to launch + the desktop environment. It has shown to no longer be a + feasible goal due to reasons discussed in + issue + #94870. The package + netease-cloud-music has also been removed, + as it depends on libraries from deepin. + + + + + The opendkim module now uses systemd + sandboxing features to limit the exposure of the system + towards the opendkim service. + + + + + Kubernetes has been upgraded to 1.19.1, which also means that + the golang version to build it has been bumped to 1.15. This + may have consequences for your existing clusters and their + certificates. Please consider + + the release notes for Kubernetes 1.19 carefully before + upgrading. + + + + + For AMD GPUs, Vulkan can now be used by adding + amdvlk to + hardware.opengl.extraPackages. + + + + + Similarly, still for AMD GPUs, the ROCm OpenCL stack can now + be used by adding rocm-opencl-icd to + hardware.opengl.extraPackages. + + + +
+
+ Contributions + + I, Jonathan Ringer, would like to thank the following individuals + for their work on nixpkgs. This release could not be done without + the hard work of the NixOS community. There were 31282 + contributions across 1313 contributors. + + + + + 2288 Mario Rodas + + + + + 1837 Frederik Rietdijk + + + + + 946 Jörg Thalheim + + + + + 925 Maximilian Bosch + + + + + 687 Jonathan Ringer + + + + + 651 Jan Tojnar + + + + + 622 Daniël de Kok + + + + + 605 WORLDofPEACE + + + + + 597 Florian Klink + + + + + 528 José Romildo Malaquias + + + + + 281 volth + + + + + 101 Robert Scott + + + + + 86 Tim Steinbach + + + + + 76 WORLDofPEACE + + + + + 49 Maximilian Bosch + + + + + 42 Thomas Tuegel + + + + + 37 Doron Behar + + + + + 36 Vladimír Čunát + + + + + 27 Jonathan Ringer + + + + + 27 Maciej Krüger + + + + + I, Jonathan Ringer, would also like to personally thank + @WORLDofPEACE for their help in mentoring me on the release + process. Special thanks also goes to Thomas Tuegel for helping + immensely with stabilizing Qt, KDE, and Plasma5; I would also like + to thank Robert Scott for his numerous fixes and pull request + reviews. + +
+
diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 2c7935078e3..8a3c982fcb9 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -309,6 +309,8 @@ + + The antlr package now defaults to the 4.x diff --git a/nixos/doc/manual/release-notes/release-notes.xml b/nixos/doc/manual/release-notes/release-notes.xml index 6d7899f6dcd..c6fff3c30d5 100644 --- a/nixos/doc/manual/release-notes/release-notes.xml +++ b/nixos/doc/manual/release-notes/release-notes.xml @@ -10,18 +10,18 @@ - - - - - - - - - - - - - - + + + + + + + + + + + + + + diff --git a/nixos/doc/manual/release-notes/rl-1310.section.md b/nixos/doc/manual/release-notes/rl-1310.section.md new file mode 100644 index 00000000000..9efd8f6e8a1 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1310.section.md @@ -0,0 +1,3 @@ +# Release 13.10 ("Aardvark", 2013/10/31) {#sec-release-13.10} + +This is the first stable release branch of NixOS. diff --git a/nixos/doc/manual/release-notes/rl-1310.xml b/nixos/doc/manual/release-notes/rl-1310.xml deleted file mode 100644 index 248bab70c36..00000000000 --- a/nixos/doc/manual/release-notes/rl-1310.xml +++ /dev/null @@ -1,11 +0,0 @@ -
- Release 13.10 (“Aardvark”, 2013/10/31) - - - This is the first stable release branch of NixOS. - -
diff --git a/nixos/doc/manual/release-notes/rl-1404.section.md b/nixos/doc/manual/release-notes/rl-1404.section.md new file mode 100644 index 00000000000..e0a70df3a63 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1404.section.md @@ -0,0 +1,81 @@ +# Release 14.04 ("Baboon", 2014/04/30) {#sec-release-14.04} + +This is the second stable release branch of NixOS. In addition to numerous new and upgraded packages and modules, this release has the following highlights: + +- Installation on UEFI systems is now supported. See [](#sec-installation) for details. + +- Systemd has been updated to version 212, which has [numerous improvements](http://cgit.freedesktop.org/systemd/systemd/plain/NEWS?id=v212). NixOS now automatically starts systemd user instances when you log in. You can define global user units through the `systemd.unit.*` options. + +- NixOS is now based on Glibc 2.19 and GCC 4.8. + +- The default Linux kernel has been updated to 3.12. + +- KDE has been updated to 4.12. + +- GNOME 3.10 experimental support has been added. + +- Nix has been updated to 1.7 ([details](https://nixos.org/nix/manual/#ssec-relnotes-1.7)). + +- NixOS now supports fully declarative management of users and groups. If you set `users.mutableUsers` to `false`, then the contents of `/etc/passwd` and `/etc/group` will be [congruent](https://www.usenix.org/legacy/event/lisa02/tech/full_papers/traugott/traugott_html/) to your NixOS configuration. For instance, if you remove a user from `users.extraUsers` and run `nixos-rebuild`, the user account will cease to exist. Also, imperative commands for managing users and groups, such as `useradd`, are no longer available. If `users.mutableUsers` is `true` (the default), then behaviour is unchanged from NixOS 13.10. + +- NixOS now has basic container support, meaning you can easily run a NixOS instance as a container in a NixOS host system. These containers are suitable for testing and experimentation but not production use, since they're not fully isolated from the host. See [](#ch-containers) for details. + +- Systemd units provided by packages can now be overridden from the NixOS configuration. For instance, if a package `foo` provides systemd units, you can say: + + ```nix + { + systemd.packages = [ pkgs.foo ]; + } + ``` + + to enable those units. You can then set or override unit options in the usual way, e.g. + + ```nix + { + systemd.services.foo.wantedBy = [ "multi-user.target" ]; + systemd.services.foo.serviceConfig.MemoryLimit = "512M"; + } + ``` + + When upgrading from a previous release, please be aware of the following incompatible changes: + +- Nixpkgs no longer exposes unfree packages by default. If your NixOS configuration requires unfree packages from Nixpkgs, you need to enable support for them explicitly by setting: + + ```nix + { + nixpkgs.config.allowUnfree = true; + } + ``` + + Otherwise, you get an error message such as: + + ```ShellSession + error: package ‘nvidia-x11-331.49-3.12.17’ in ‘…/nvidia-x11/default.nix:56’ + has an unfree license, refusing to evaluate + ``` + +- The Adobe Flash player is no longer enabled by default in the Firefox and Chromium wrappers. To enable it, you must set: + + ```nix + { + nixpkgs.config.allowUnfree = true; + nixpkgs.config.firefox.enableAdobeFlash = true; # for Firefox + nixpkgs.config.chromium.enableAdobeFlash = true; # for Chromium + } + ``` + +- The firewall is now enabled by default. If you don't want this, you need to disable it explicitly: + + ```nix + { + networking.firewall.enable = false; + } + ``` + +- The option `boot.loader.grub.memtest86` has been renamed to `boot.loader.grub.memtest86.enable`. + +- The `mysql55` service has been merged into the `mysql` service, which no longer sets a default for the option `services.mysql.package`. + +- Package variants are now differentiated by suffixing the name, rather than the version. For instance, `sqlite-3.8.4.3-interactive` is now called `sqlite-interactive-3.8.4.3`. This ensures that `nix-env -i sqlite` is unambiguous, and that `nix-env -u` won't "upgrade" `sqlite` to `sqlite-interactive` or vice versa. Notably, this change affects the Firefox wrapper (which provides plugins), as it is now called `firefox-wrapper`. So when using `nix-env`, you should do `nix-env -e firefox; nix-env -i firefox-wrapper` if you want to keep using the wrapper. This change does not affect declarative package management, since attribute names like `pkgs.firefoxWrapper` were already unambiguous. + +- The symlink `/etc/ca-bundle.crt` is gone. Programs should instead use the environment variable `OPENSSL_X509_CERT_FILE` (which points to `/etc/ssl/certs/ca-bundle.crt`). diff --git a/nixos/doc/manual/release-notes/rl-1404.xml b/nixos/doc/manual/release-notes/rl-1404.xml deleted file mode 100644 index 56dbb74a71d..00000000000 --- a/nixos/doc/manual/release-notes/rl-1404.xml +++ /dev/null @@ -1,179 +0,0 @@ -
- Release 14.04 (“Baboon”, 2014/04/30) - - - This is the second stable release branch of NixOS. In addition to numerous - new and upgraded packages and modules, this release has the following - highlights: - - - - Installation on UEFI systems is now supported. See - for details. - - - - - Systemd has been updated to version 212, which has - numerous - improvements. NixOS now automatically starts systemd user instances - when you log in. You can define global user units through the - options. - - - - - NixOS is now based on Glibc 2.19 and GCC 4.8. - - - - - The default Linux kernel has been updated to 3.12. - - - - - KDE has been updated to 4.12. - - - - - GNOME 3.10 experimental support has been added. - - - - - Nix has been updated to 1.7 - (details). - - - - - NixOS now supports fully declarative management of users and groups. If - you set to false, - then the contents of /etc/passwd and - /etc/group will be - congruent - to your NixOS configuration. For instance, if you remove a user from - and run - nixos-rebuild, the user account will cease to exist. - Also, imperative commands for managing users and groups, such as - useradd, are no longer available. If - is true (the - default), then behaviour is unchanged from NixOS 13.10. - - - - - NixOS now has basic container support, meaning you can easily run a NixOS - instance as a container in a NixOS host system. These containers are - suitable for testing and experimentation but not production use, since - they’re not fully isolated from the host. See - for details. - - - - - Systemd units provided by packages can now be overridden from the NixOS - configuration. For instance, if a package foo provides - systemd units, you can say: - -systemd.packages = [ pkgs.foo ]; - - to enable those units. You can then set or override unit options in the - usual way, e.g. - -systemd.services.foo.wantedBy = [ "multi-user.target" ]; -systemd.services.foo.serviceConfig.MemoryLimit = "512M"; - - - - - - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - Nixpkgs no longer exposes unfree packages by default. If your NixOS - configuration requires unfree packages from Nixpkgs, you need to enable - support for them explicitly by setting: - -nixpkgs.config.allowUnfree = true; - - Otherwise, you get an error message such as: - -error: package ‘nvidia-x11-331.49-3.12.17’ in ‘…/nvidia-x11/default.nix:56’ - has an unfree license, refusing to evaluate - - - - - - The Adobe Flash player is no longer enabled by default in the Firefox and - Chromium wrappers. To enable it, you must set: - -nixpkgs.config.allowUnfree = true; -nixpkgs.config.firefox.enableAdobeFlash = true; # for Firefox -nixpkgs.config.chromium.enableAdobeFlash = true; # for Chromium - - - - - - The firewall is now enabled by default. If you don’t want this, you need - to disable it explicitly: - -networking.firewall.enable = false; - - - - - - The option has been renamed to - . - - - - - The mysql55 service has been merged into the - mysql service, which no longer sets a default for the - option . - - - - - Package variants are now differentiated by suffixing the name, rather than - the version. For instance, sqlite-3.8.4.3-interactive - is now called sqlite-interactive-3.8.4.3. This - ensures that nix-env -i sqlite is unambiguous, and that - nix-env -u won’t “upgrade” - sqlite to sqlite-interactive or vice - versa. Notably, this change affects the Firefox wrapper (which provides - plugins), as it is now called firefox-wrapper. So when - using nix-env, you should do nix-env -e - firefox; nix-env -i firefox-wrapper if you want to keep using - the wrapper. This change does not affect declarative package management, - since attribute names like pkgs.firefoxWrapper were - already unambiguous. - - - - - The symlink /etc/ca-bundle.crt is gone. Programs - should instead use the environment variable - OPENSSL_X509_CERT_FILE (which points to - /etc/ssl/certs/ca-bundle.crt). - - - - -
diff --git a/nixos/doc/manual/release-notes/rl-1412.section.md b/nixos/doc/manual/release-notes/rl-1412.section.md new file mode 100644 index 00000000000..683f1e45f09 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1412.section.md @@ -0,0 +1,171 @@ +# Release 14.12 ("Caterpillar", 2014/12/30) {#sec-release-14.12} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- Systemd has been updated to version 217, which has numerous [improvements.](http://lists.freedesktop.org/archives/systemd-devel/2014-October/024662.html) + +- [Nix has been updated to 1.8.](https://www.mail-archive.com/nix-dev@lists.science.uu.nl/msg13957.html) + +- NixOS is now based on Glibc 2.20. + +- KDE has been updated to 4.14. + +- The default Linux kernel has been updated to 3.14. + +- If `users.mutableUsers` is enabled (the default), changes made to the declaration of a user or group will be correctly realised when running `nixos-rebuild`. For instance, removing a user specification from `configuration.nix` will cause the actual user account to be deleted. If `users.mutableUsers` is disabled, it is no longer necessary to specify UIDs or GIDs; if omitted, they are allocated dynamically. + +Following new services were added since the last release: + +- `atftpd` + +- `bosun` + +- `bspwm` + +- `chronos` + +- `collectd` + +- `consul` + +- `cpuminer-cryptonight` + +- `crashplan` + +- `dnscrypt-proxy` + +- `docker-registry` + +- `docker` + +- `etcd` + +- `fail2ban` + +- `fcgiwrap` + +- `fleet` + +- `fluxbox` + +- `gdm` + +- `geoclue2` + +- `gitlab` + +- `gitolite` + +- `gnome3.gnome-documents` + +- `gnome3.gnome-online-miners` + +- `gnome3.gvfs` + +- `gnome3.seahorse` + +- `hbase` + +- `i2pd` + +- `influxdb` + +- `kubernetes` + +- `liquidsoap` + +- `lxc` + +- `mailpile` + +- `mesos` + +- `mlmmj` + +- `monetdb` + +- `mopidy` + +- `neo4j` + +- `nsd` + +- `openntpd` + +- `opentsdb` + +- `openvswitch` + +- `parallels-guest` + +- `peerflix` + +- `phd` + +- `polipo` + +- `prosody` + +- `radicale` + +- `redmine` + +- `riemann` + +- `scollector` + +- `seeks` + +- `siproxd` + +- `strongswan` + +- `tcsd` + +- `teamspeak3` + +- `thermald` + +- `torque/mrom` + +- `torque/server` + +- `uhub` + +- `unifi` + +- `znc` + +- `zookeeper` + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- The default version of Apache httpd is now 2.4. If you use the `extraConfig` option to pass literal Apache configuration text, you may need to update it --- see [Apache's documentation](http://httpd.apache.org/docs/2.4/upgrading.html) for details. If you wish to continue to use httpd 2.2, add the following line to your NixOS configuration: + + ```nix + { + services.httpd.package = pkgs.apacheHttpd_2_2; + } + ``` + +- PHP 5.3 has been removed because it is no longer supported by the PHP project. A [migration guide](http://php.net/migration54) is available. + +- The host side of a container virtual Ethernet pair is now called `ve-container-name` rather than `c-container-name`. + +- GNOME 3.10 support has been dropped. The default GNOME version is now 3.12. + +- VirtualBox has been upgraded to 4.3.20 release. Users may be required to run `rm -rf /tmp/.vbox*`. The line `imports = [ ]` is no longer necessary, use `services.virtualboxHost.enable = true` instead. + + Also, hardening mode is now enabled by default, which means that unless you want to use USB support, you no longer need to be a member of the `vboxusers` group. + +- Chromium has been updated to 39.0.2171.65. `enablePepperPDF` is now enabled by default. `chromium*Wrapper` packages no longer exist, because upstream removed NSAPI support. `chromium-stable` has been renamed to `chromium`. + +- Python packaging documentation is now part of nixpkgs manual. To override the python packages available to a custom python you now use `pkgs.pythonFull.buildEnv.override` instead of `pkgs.pythonFull.override`. + +- `boot.resumeDevice = "8:6"` is no longer supported. Most users will want to leave it undefined, which takes the swap partitions automatically. There is an evaluation assertion to ensure that the string starts with a slash. + +- The system-wide default timezone for NixOS installations changed from `CET` to `UTC`. To choose a different timezone for your system, configure `time.timeZone` in `configuration.nix`. A fairly complete list of possible values for that setting is available at . + +- GNU screen has been updated to 4.2.1, which breaks the ability to connect to sessions created by older versions of screen. + +- The Intel GPU driver was updated to the 3.x prerelease version (used by most distributions) and supports DRI3 now. diff --git a/nixos/doc/manual/release-notes/rl-1412.xml b/nixos/doc/manual/release-notes/rl-1412.xml deleted file mode 100644 index 139f61c2a55..00000000000 --- a/nixos/doc/manual/release-notes/rl-1412.xml +++ /dev/null @@ -1,467 +0,0 @@ -
- Release 14.12 (“Caterpillar”, 2014/12/30) - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - Systemd has been updated to version 217, which has numerous - improvements. - - - - - - Nix has been updated to 1.8. - - - - - NixOS is now based on Glibc 2.20. - - - - - KDE has been updated to 4.14. - - - - - The default Linux kernel has been updated to 3.14. - - - - - If is enabled (the default), changes - made to the declaration of a user or group will be correctly realised when - running nixos-rebuild. For instance, removing a user - specification from configuration.nix will cause the - actual user account to be deleted. If - is disabled, it is no longer necessary to specify UIDs or GIDs; if - omitted, they are allocated dynamically. - - - - - - - Following new services were added since the last release: - - - - atftpd - - - - - bosun - - - - - bspwm - - - - - chronos - - - - - collectd - - - - - consul - - - - - cpuminer-cryptonight - - - - - crashplan - - - - - dnscrypt-proxy - - - - - docker-registry - - - - - docker - - - - - etcd - - - - - fail2ban - - - - - fcgiwrap - - - - - fleet - - - - - fluxbox - - - - - gdm - - - - - geoclue2 - - - - - gitlab - - - - - gitolite - - - - - gnome3.gnome-documents - - - - - gnome3.gnome-online-miners - - - - - gnome3.gvfs - - - - - gnome3.seahorse - - - - - hbase - - - - - i2pd - - - - - influxdb - - - - - kubernetes - - - - - liquidsoap - - - - - lxc - - - - - mailpile - - - - - mesos - - - - - mlmmj - - - - - monetdb - - - - - mopidy - - - - - neo4j - - - - - nsd - - - - - openntpd - - - - - opentsdb - - - - - openvswitch - - - - - parallels-guest - - - - - peerflix - - - - - phd - - - - - polipo - - - - - prosody - - - - - radicale - - - - - redmine - - - - - riemann - - - - - scollector - - - - - seeks - - - - - siproxd - - - - - strongswan - - - - - tcsd - - - - - teamspeak3 - - - - - thermald - - - - - torque/mrom - - - - - torque/server - - - - - uhub - - - - - unifi - - - - - znc - - - - - zookeeper - - - - - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - The default version of Apache httpd is now 2.4. If you use the - option to pass literal Apache configuration - text, you may need to update it — see - Apache’s - documentation for details. If you wish to continue to use httpd - 2.2, add the following line to your NixOS configuration: - -services.httpd.package = pkgs.apacheHttpd_2_2; - - - - - - PHP 5.3 has been removed because it is no longer supported by the PHP - project. A migration - guide is available. - - - - - The host side of a container virtual Ethernet pair is now called - ve-container-name rather - than c-container-name. - - - - - GNOME 3.10 support has been dropped. The default GNOME version is now - 3.12. - - - - - VirtualBox has been upgraded to 4.3.20 release. Users may be required to - run rm -rf /tmp/.vbox*. The line imports = [ - <nixpkgs/nixos/modules/programs/virtualbox.nix> ] is no - longer necessary, use services.virtualboxHost.enable = - true instead. - - - Also, hardening mode is now enabled by default, which means that unless - you want to use USB support, you no longer need to be a member of the - vboxusers group. - - - - - Chromium has been updated to 39.0.2171.65. - is now enabled by default. - chromium*Wrapper packages no longer exist, because - upstream removed NSAPI support. chromium-stable has - been renamed to chromium. - - - - - Python packaging documentation is now part of nixpkgs manual. To override - the python packages available to a custom python you now use - pkgs.pythonFull.buildEnv.override instead of - pkgs.pythonFull.override. - - - - - boot.resumeDevice = "8:6" is no longer supported. Most - users will want to leave it undefined, which takes the swap partitions - automatically. There is an evaluation assertion to ensure that the string - starts with a slash. - - - - - The system-wide default timezone for NixOS installations changed from - CET to UTC. To choose a different - timezone for your system, configure time.timeZone in - configuration.nix. A fairly complete list of possible - values for that setting is available at - . - - - - - GNU screen has been updated to 4.2.1, which breaks the ability to connect - to sessions created by older versions of screen. - - - - - The Intel GPU driver was updated to the 3.x prerelease version (used by - most distributions) and supports DRI3 now. - - - - -
diff --git a/nixos/doc/manual/release-notes/rl-1509.section.md b/nixos/doc/manual/release-notes/rl-1509.section.md new file mode 100644 index 00000000000..55804ddb988 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1509.section.md @@ -0,0 +1,319 @@ +# Release 15.09 ("Dingo", 2015/09/30) {#sec-release-15.09} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- The [Haskell](http://haskell.org/) packages infrastructure has been re-designed from the ground up (\"Haskell NG\"). NixOS now distributes the latest version of every single package registered on [Hackage](http://hackage.haskell.org/) \-- well in excess of 8,000 Haskell packages. Detailed instructions on how to use that infrastructure can be found in the [User\'s Guide to the Haskell Infrastructure](https://nixos.org/nixpkgs/manual/#users-guide-to-the-haskell-infrastructure). Users migrating from an earlier release may find helpful information below, in the list of backwards-incompatible changes. Furthermore, we distribute 51(!) additional Haskell package sets that provide every single [LTS Haskell](http://www.stackage.org/) release since version 0.0 as well as the most recent [Stackage Nightly](http://www.stackage.org/) snapshot. The announcement [\"Full Stackage Support in Nixpkgs\"](https://nixos.org/nix-dev/2015-September/018138.html) gives additional details. + +- Nix has been updated to version 1.10, which among other improvements enables cryptographic signatures on binary caches for improved security. + +- You can now keep your NixOS system up to date automatically by setting + +```nix +{ + system.autoUpgrade.enable = true; +} +``` + +This will cause the system to periodically check for updates in your current channel and run `nixos-rebuild`. + +- This release is based on Glibc 2.21, GCC 4.9 and Linux 3.18. + +- GNOME has been upgraded to 3.16. + +- Xfce has been upgraded to 4.12. + +- KDE 5 has been upgraded to KDE Frameworks 5.10, Plasma 5.3.2 and Applications 15.04.3. KDE 4 has been updated to kdelibs-4.14.10. + +- E19 has been upgraded to 0.16.8.15. + +The following new services were added since the last release: + +- `services/mail/exim.nix` + +- `services/misc/apache-kafka.nix` + +- `services/misc/canto-daemon.nix` + +- `services/misc/confd.nix` + +- `services/misc/devmon.nix` + +- `services/misc/gitit.nix` + +- `services/misc/ihaskell.nix` + +- `services/misc/mbpfan.nix` + +- `services/misc/mediatomb.nix` + +- `services/misc/mwlib.nix` + +- `services/misc/parsoid.nix` + +- `services/misc/plex.nix` + +- `services/misc/ripple-rest.nix` + +- `services/misc/ripple-data-api.nix` + +- `services/misc/subsonic.nix` + +- `services/misc/sundtek.nix` + +- `services/monitoring/cadvisor.nix` + +- `services/monitoring/das_watchdog.nix` + +- `services/monitoring/grafana.nix` + +- `services/monitoring/riemann-tools.nix` + +- `services/monitoring/teamviewer.nix` + +- `services/network-filesystems/u9fs.nix` + +- `services/networking/aiccu.nix` + +- `services/networking/asterisk.nix` + +- `services/networking/bird.nix` + +- `services/networking/charybdis.nix` + +- `services/networking/docker-registry-server.nix` + +- `services/networking/fan.nix` + +- `services/networking/firefox/sync-server.nix` + +- `services/networking/gateone.nix` + +- `services/networking/heyefi.nix` + +- `services/networking/i2p.nix` + +- `services/networking/lambdabot.nix` + +- `services/networking/mstpd.nix` + +- `services/networking/nix-serve.nix` + +- `services/networking/nylon.nix` + +- `services/networking/racoon.nix` + +- `services/networking/skydns.nix` + +- `services/networking/shout.nix` + +- `services/networking/softether.nix` + +- `services/networking/sslh.nix` + +- `services/networking/tinc.nix` + +- `services/networking/tlsdated.nix` + +- `services/networking/tox-bootstrapd.nix` + +- `services/networking/tvheadend.nix` + +- `services/networking/zerotierone.nix` + +- `services/scheduling/marathon.nix` + +- `services/security/fprintd.nix` + +- `services/security/hologram.nix` + +- `services/security/munge.nix` + +- `services/system/cloud-init.nix` + +- `services/web-servers/shellinabox.nix` + +- `services/web-servers/uwsgi.nix` + +- `services/x11/unclutter.nix` + +- `services/x11/display-managers/sddm.nix` + +- `system/boot/coredump.nix` + +- `system/boot/loader/loader.nix` + +- `system/boot/loader/generic-extlinux-compatible` + +- `system/boot/networkd.nix` + +- `system/boot/resolved.nix` + +- `system/boot/timesyncd.nix` + +- `tasks/filesystems/exfat.nix` + +- `tasks/filesystems/ntfs.nix` + +- `tasks/filesystems/vboxsf.nix` + +- `virtualisation/virtualbox-host.nix` + +- `virtualisation/vmware-guest.nix` + +- `virtualisation/xen-dom0.nix` + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- `sshd` no longer supports DSA and ECDSA host keys by default. If you have existing systems with such host keys and want to continue to use them, please set + +```nix +{ + system.stateVersion = "14.12"; +} +``` + +The new option `system.stateVersion` ensures that certain configuration changes that could break existing systems (such as the `sshd` host key setting) will maintain compatibility with the specified NixOS release. NixOps sets the state version of existing deployments automatically. + +- `cron` is no longer enabled by default, unless you have a non-empty `services.cron.systemCronJobs`. To force `cron` to be enabled, set `services.cron.enable = true`. + +- Nix now requires binary caches to be cryptographically signed. If you have unsigned binary caches that you want to continue to use, you should set `nix.requireSignedBinaryCaches = false`. + +- Steam now doesn\'t need root rights to work. Instead of using `*-steam-chrootenv`, you should now just run `steam`. `steamChrootEnv` package was renamed to `steam`, and old `steam` package \-- to `steamOriginal`. + +- CMPlayer has been renamed to bomi upstream. Package `cmplayer` was accordingly renamed to `bomi` + +- Atom Shell has been renamed to Electron upstream. Package `atom-shell` was accordingly renamed to `electron` + +- Elm is not released on Hackage anymore. You should now use `elmPackages.elm` which contains the latest Elm platform. + +- The CUPS printing service has been updated to version `2.0.2`. Furthermore its systemd service has been renamed to `cups.service`. + + Local printers are no longer shared or advertised by default. This behavior can be changed by enabling `services.printing.defaultShared` or `services.printing.browsing` respectively. + +- The VirtualBox host and guest options have been named more consistently. They can now found in `virtualisation.virtualbox.host.*` instead of `services.virtualboxHost.*` and `virtualisation.virtualbox.guest.*` instead of `services.virtualboxGuest.*`. + + Also, there now is support for the `vboxsf` file system using the `fileSystems` configuration attribute. An example of how this can be used in a configuration: + +```nix +{ + fileSystems."/shiny" = { + device = "myshinysharedfolder"; + fsType = "vboxsf"; + }; +} +``` + +- \"`nix-env -qa`\" no longer discovers Haskell packages by name. The only packages visible in the global scope are `ghc`, `cabal-install`, and `stack`, but all other packages are hidden. The reason for this inconvenience is the sheer size of the Haskell package set. Name-based lookups are expensive, and most `nix-env -qa` operations would become much slower if we\'d add the entire Hackage database into the top level attribute set. Instead, the list of Haskell packages can be displayed by running: + +```ShellSession +nix-env -f "" -qaP -A haskellPackages +``` + +Executable programs written in Haskell can be installed with: + +```ShellSession +nix-env -f "" -iA haskellPackages.pandoc +``` + +Installing Haskell _libraries_ this way, however, is no longer supported. See the next item for more details. + +- Previous versions of NixOS came with a feature called `ghc-wrapper`, a small script that allowed GHC to transparently pick up on libraries installed in the user\'s profile. This feature has been deprecated; `ghc-wrapper` was removed from the distribution. The proper way to register Haskell libraries with the compiler now is the `haskellPackages.ghcWithPackages` function. The [User\'s Guide to the Haskell Infrastructure](https://nixos.org/nixpkgs/manual/#users-guide-to-the-haskell-infrastructure) provides more information about this subject. + +- All Haskell builds that have been generated with version 1.x of the `cabal2nix` utility are now invalid and need to be re-generated with a current version of `cabal2nix` to function. The most recent version of this tool can be installed by running `nix-env -i cabal2nix`. + +- The `haskellPackages` set in Nixpkgs used to have a function attribute called `extension` that users could override in their `~/.nixpkgs/config.nix` files to configure additional attributes, etc. That function still exists, but it\'s now called `overrides`. + +- The OpenBLAS library has been updated to version `0.2.14`. Support for the `x86_64-darwin` platform was added. Dynamic architecture detection was enabled; OpenBLAS now selects microarchitecture-optimized routines at runtime, so optimal performance is achieved without the need to rebuild OpenBLAS locally. OpenBLAS has replaced ATLAS in most packages which use an optimized BLAS or LAPACK implementation. + +- The `phpfpm` is now using the default PHP version (`pkgs.php`) instead of PHP 5.4 (`pkgs.php54`). + +- The `locate` service no longer indexes the Nix store by default, preventing packages with potentially numerous versions from cluttering the output. Indexing the store can be activated by setting `services.locate.includeStore = true`. + +- The Nix expression search path (`NIX_PATH`) no longer contains `/etc/nixos/nixpkgs` by default. You can override `NIX_PATH` by setting `nix.nixPath`. + +- Python 2.6 has been marked as broken (as it no longer receives security updates from upstream). + +- Any use of module arguments such as `pkgs` to access library functions, or to define `imports` attributes will now lead to an infinite loop at the time of the evaluation. + + In case of an infinite loop, use the `--show-trace` command line argument and read the line just above the error message. + + ```ShellSession + $ nixos-rebuild build --show-trace + … + while evaluating the module argument `pkgs' in "/etc/nixos/my-module.nix": + infinite recursion encountered + ``` + + Any use of `pkgs.lib`, should be replaced by `lib`, after adding it as argument of the module. The following module + + ```nix + { config, pkgs, ... }: + + with pkgs.lib; + + { + options = { + foo = mkOption { … }; + }; + config = mkIf config.foo { … }; + } + ``` + + should be modified to look like: + + ```nix + { config, pkgs, lib, ... }: + + with lib; + + { + options = { + foo = mkOption { option declaration }; + }; + config = mkIf config.foo { option definition }; + } + ``` + + When `pkgs` is used to download other projects to import their modules, and only in such cases, it should be replaced by `(import {})`. The following module + + ```nix + { config, pkgs, ... }: + + let + myProject = pkgs.fetchurl { + src = url; + sha256 = hash; + }; + in + + { + imports = [ "${myProject}/module.nix" ]; + } + ``` + + should be modified to look like: + + ```nix + { config, pkgs, ... }: + + let + myProject = (import {}).fetchurl { + src = url; + sha256 = hash; + }; + in + + { + imports = [ "${myProject}/module.nix" ]; + } + ``` + +Other notable improvements: + +- The nixos and nixpkgs channels were unified, so one _can_ use `nix-env -iA nixos.bash` instead of `nix-env -iA nixos.pkgs.bash`. See [the commit](https://github.com/NixOS/nixpkgs/commit/2cd7c1f198) for details. + +- Users running an SSH server who worry about the quality of their `/etc/ssh/moduli` file with respect to the [vulnerabilities discovered in the Diffie-Hellman key exchange](https://stribika.github.io/2015/01/04/secure-secure-shell.html) can now replace OpenSSH\'s default version with one they generated themselves using the new `services.openssh.moduliFile` option. + +- A newly packaged TeX Live 2015 is provided in `pkgs.texlive`, split into 6500 nix packages. For basic user documentation see [the source](https://github.com/NixOS/nixpkgs/blob/release-15.09/pkgs/tools/typesetting/tex/texlive/default.nix#L1). Beware of [an issue](https://github.com/NixOS/nixpkgs/issues/9757) when installing a too large package set. The plan is to deprecate and maybe delete the original TeX packages until the next release. + +- `buildEnv.env` on all Python interpreters is now available for nix-shell interoperability. diff --git a/nixos/doc/manual/release-notes/rl-1509.xml b/nixos/doc/manual/release-notes/rl-1509.xml deleted file mode 100644 index 098c8c5095b..00000000000 --- a/nixos/doc/manual/release-notes/rl-1509.xml +++ /dev/null @@ -1,750 +0,0 @@ -
- Release 15.09 (“Dingo”, 2015/09/30) - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - The Haskell packages - infrastructure has been re-designed from the ground up ("Haskell - NG"). NixOS now distributes the latest version of every single package - registered on - Hackage -- well - in excess of 8,000 Haskell packages. Detailed instructions on how to use - that infrastructure can be found in the - User's - Guide to the Haskell Infrastructure. Users migrating from an earlier - release may find helpful information below, in the list of - backwards-incompatible changes. Furthermore, we distribute 51(!) additional - Haskell package sets that provide every single - LTS Haskell release - since version 0.0 as well as the most recent - Stackage Nightly - snapshot. The announcement - "Full - Stackage Support in Nixpkgs" gives additional details. - - - - - Nix has been updated to version 1.10, which among other improvements - enables cryptographic signatures on binary caches for improved security. - - - - - You can now keep your NixOS system up to date automatically by setting - -system.autoUpgrade.enable = true; - - This will cause the system to periodically check for updates in your - current channel and run nixos-rebuild. - - - - - This release is based on Glibc 2.21, GCC 4.9 and Linux 3.18. - - - - - GNOME has been upgraded to 3.16. - - - - - Xfce has been upgraded to 4.12. - - - - - KDE 5 has been upgraded to KDE Frameworks 5.10, Plasma 5.3.2 and - Applications 15.04.3. KDE 4 has been updated to kdelibs-4.14.10. - - - - - E19 has been upgraded to 0.16.8.15. - - - - - - The following new services were added since the last release: - - - - services/mail/exim.nix - - - - - services/misc/apache-kafka.nix - - - - - services/misc/canto-daemon.nix - - - - - services/misc/confd.nix - - - - - services/misc/devmon.nix - - - - - services/misc/gitit.nix - - - - - services/misc/ihaskell.nix - - - - - services/misc/mbpfan.nix - - - - - services/misc/mediatomb.nix - - - - - services/misc/mwlib.nix - - - - - services/misc/parsoid.nix - - - - - services/misc/plex.nix - - - - - services/misc/ripple-rest.nix - - - - - services/misc/ripple-data-api.nix - - - - - services/misc/subsonic.nix - - - - - services/misc/sundtek.nix - - - - - services/monitoring/cadvisor.nix - - - - - services/monitoring/das_watchdog.nix - - - - - services/monitoring/grafana.nix - - - - - services/monitoring/riemann-tools.nix - - - - - services/monitoring/teamviewer.nix - - - - - services/network-filesystems/u9fs.nix - - - - - services/networking/aiccu.nix - - - - - services/networking/asterisk.nix - - - - - services/networking/bird.nix - - - - - services/networking/charybdis.nix - - - - - services/networking/docker-registry-server.nix - - - - - services/networking/fan.nix - - - - - services/networking/firefox/sync-server.nix - - - - - services/networking/gateone.nix - - - - - services/networking/heyefi.nix - - - - - services/networking/i2p.nix - - - - - services/networking/lambdabot.nix - - - - - services/networking/mstpd.nix - - - - - services/networking/nix-serve.nix - - - - - services/networking/nylon.nix - - - - - services/networking/racoon.nix - - - - - services/networking/skydns.nix - - - - - services/networking/shout.nix - - - - - services/networking/softether.nix - - - - - services/networking/sslh.nix - - - - - services/networking/tinc.nix - - - - - services/networking/tlsdated.nix - - - - - services/networking/tox-bootstrapd.nix - - - - - services/networking/tvheadend.nix - - - - - services/networking/zerotierone.nix - - - - - services/scheduling/marathon.nix - - - - - services/security/fprintd.nix - - - - - services/security/hologram.nix - - - - - services/security/munge.nix - - - - - services/system/cloud-init.nix - - - - - services/web-servers/shellinabox.nix - - - - - services/web-servers/uwsgi.nix - - - - - services/x11/unclutter.nix - - - - - services/x11/display-managers/sddm.nix - - - - - system/boot/coredump.nix - - - - - system/boot/loader/loader.nix - - - - - system/boot/loader/generic-extlinux-compatible - - - - - system/boot/networkd.nix - - - - - system/boot/resolved.nix - - - - - system/boot/timesyncd.nix - - - - - tasks/filesystems/exfat.nix - - - - - tasks/filesystems/ntfs.nix - - - - - tasks/filesystems/vboxsf.nix - - - - - virtualisation/virtualbox-host.nix - - - - - virtualisation/vmware-guest.nix - - - - - virtualisation/xen-dom0.nix - - - - - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - sshd no longer supports DSA and ECDSA host keys by - default. If you have existing systems with such host keys and want to - continue to use them, please set - -system.stateVersion = "14.12"; - - The new option ensures that certain - configuration changes that could break existing systems (such as the - sshd host key setting) will maintain compatibility with - the specified NixOS release. NixOps sets the state version of existing - deployments automatically. - - - - - cron is no longer enabled by default, unless you have a - non-empty . To force - cron to be enabled, set . - - - - - Nix now requires binary caches to be cryptographically signed. If you have - unsigned binary caches that you want to continue to use, you should set - . - - - - - Steam now doesn't need root rights to work. Instead of using - *-steam-chrootenv, you should now just run - steam. steamChrootEnv package was - renamed to steam, and old steam - package -- to steamOriginal. - - - - - CMPlayer has been renamed to bomi upstream. Package - cmplayer was accordingly renamed to - bomi - - - - - Atom Shell has been renamed to Electron upstream. Package - atom-shell was accordingly renamed to - electron - - - - - Elm is not released on Hackage anymore. You should now use - elmPackages.elm which contains the latest Elm platform. - - - - - The CUPS printing service has been updated to version - 2.0.2. Furthermore its systemd service has been renamed - to cups.service. - - - Local printers are no longer shared or advertised by default. This - behavior can be changed by enabling - or - respectively. - - - - - The VirtualBox host and guest options have been named more consistently. - They can now found in - instead of and - instead of - . - - - Also, there now is support for the vboxsf file system - using the configuration attribute. An example - of how this can be used in a configuration: - -fileSystems."/shiny" = { - device = "myshinysharedfolder"; - fsType = "vboxsf"; -}; - - - - - - "nix-env -qa" no longer discovers Haskell - packages by name. The only packages visible in the global scope are - ghc, cabal-install, and - stack, but all other packages are hidden. The reason - for this inconvenience is the sheer size of the Haskell package set. - Name-based lookups are expensive, and most nix-env -qa - operations would become much slower if we'd add the entire Hackage - database into the top level attribute set. Instead, the list of Haskell - packages can be displayed by running: - - -nix-env -f "<nixpkgs>" -qaP -A haskellPackages - - - Executable programs written in Haskell can be installed with: - - -nix-env -f "<nixpkgs>" -iA haskellPackages.pandoc - - - Installing Haskell libraries this way, however, is no - longer supported. See the next item for more details. - - - - - Previous versions of NixOS came with a feature called - ghc-wrapper, a small script that allowed GHC to - transparently pick up on libraries installed in the user's profile. This - feature has been deprecated; ghc-wrapper was removed - from the distribution. The proper way to register Haskell libraries with - the compiler now is the haskellPackages.ghcWithPackages - function. The - User's - Guide to the Haskell Infrastructure provides more information about - this subject. - - - - - All Haskell builds that have been generated with version 1.x of the - cabal2nix utility are now invalid and need to be - re-generated with a current version of cabal2nix to - function. The most recent version of this tool can be installed by running - nix-env -i cabal2nix. - - - - - The haskellPackages set in Nixpkgs used to have a - function attribute called extension that users could - override in their ~/.nixpkgs/config.nix files to - configure additional attributes, etc. That function still exists, but it's - now called overrides. - - - - - The OpenBLAS library has been updated to version - 0.2.14. Support for the - x86_64-darwin platform was added. Dynamic architecture - detection was enabled; OpenBLAS now selects microarchitecture-optimized - routines at runtime, so optimal performance is achieved without the need - to rebuild OpenBLAS locally. OpenBLAS has replaced ATLAS in most packages - which use an optimized BLAS or LAPACK implementation. - - - - - The phpfpm is now using the default PHP version - (pkgs.php) instead of PHP 5.4 - (pkgs.php54). - - - - - The locate service no longer indexes the Nix store by - default, preventing packages with potentially numerous versions from - cluttering the output. Indexing the store can be activated by setting - . - - - - - The Nix expression search path (NIX_PATH) no longer - contains /etc/nixos/nixpkgs by default. You can - override NIX_PATH by setting . - - - - - Python 2.6 has been marked as broken (as it no longer receives security - updates from upstream). - - - - - Any use of module arguments such as pkgs to access - library functions, or to define imports attributes will - now lead to an infinite loop at the time of the evaluation. - - - In case of an infinite loop, use the --show-trace - command line argument and read the line just above the error message. - -$ nixos-rebuild build --show-trace -… -while evaluating the module argument `pkgs' in "/etc/nixos/my-module.nix": -infinite recursion encountered - - - - Any use of pkgs.lib, should be replaced by - lib, after adding it as argument of the module. The - following module - -{ config, pkgs, ... }: - -with pkgs.lib; - -{ - options = { - foo = mkOption { … }; - }; - config = mkIf config.foo { … }; -} - - should be modified to look like: - -{ config, pkgs, lib, ... }: - -with lib; - -{ - options = { - foo = mkOption { option declaration }; - }; - config = mkIf config.foo { option definition }; -} - - - - When pkgs is used to download other projects to import - their modules, and only in such cases, it should be replaced by - (import <nixpkgs> {}). The following module - -{ config, pkgs, ... }: - -let - myProject = pkgs.fetchurl { - src = url; - sha256 = hash; - }; -in - -{ - imports = [ "${myProject}/module.nix" ]; -} - - should be modified to look like: - -{ config, pkgs, ... }: - -let - myProject = (import <nixpkgs> {}).fetchurl { - src = url; - sha256 = hash; - }; -in - -{ - imports = [ "${myProject}/module.nix" ]; -} - - - - - - - - Other notable improvements: - - - - The nixos and nixpkgs channels were unified, so one - can use nix-env -iA nixos.bash - instead of nix-env -iA nixos.pkgs.bash. See - the - commit for details. - - - - - Users running an SSH server who worry about the quality of their - /etc/ssh/moduli file with respect to the - vulnerabilities - discovered in the Diffie-Hellman key exchange can now replace - OpenSSH's default version with one they generated themselves using the new - option. - - - - - A newly packaged TeX Live 2015 is provided in - pkgs.texlive, split into 6500 nix packages. For basic - user documentation see - the - source. Beware of - an - issue when installing a too large package set. The plan is to - deprecate and maybe delete the original TeX packages until the next - release. - - - - - on all Python interpreters is now available - for nix-shell interoperability. - - - - -
diff --git a/nixos/doc/manual/release-notes/rl-1603.section.md b/nixos/doc/manual/release-notes/rl-1603.section.md new file mode 100644 index 00000000000..dce879ec16d --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1603.section.md @@ -0,0 +1,282 @@ +# Release 16.03 ("Emu", 2016/03/31) {#sec-release-16.03} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- Systemd 229, bringing [numerous improvements](https://github.com/systemd/systemd/blob/v229/NEWS) over 217. + +- Linux 4.4 (was 3.18). + +- GCC 5.3 (was 4.9). Note that GCC 5 [changes the C++ ABI in an incompatible way](https://gcc.gnu.org/onlinedocs/libstdc++/manual/using_dual_abi.html); this may cause problems if you try to link objects compiled with different versions of GCC. + +- Glibc 2.23 (was 2.21). + +- Binutils 2.26 (was 2.23.1). See \#909 + +- Improved support for ensuring [bitwise reproducible builds](https://reproducible-builds.org/). For example, `stdenv` now sets the environment variable `SOURCE_DATE_EPOCH` to a deterministic value, and Nix has [gained an option](https://nixos.org/nix/manual/#ssec-relnotes-1.11) to repeat a build a number of times to test determinism. An ongoing project, the goal of exact reproducibility is to allow binaries to be verified independently (e.g., a user might only trust binaries that appear in three independent binary caches). + +- Perl 5.22. + +The following new services were added since the last release: + +- `services/monitoring/longview.nix` + +- `hardware/video/webcam/facetimehd.nix` + +- `i18n/input-method/default.nix` + +- `i18n/input-method/fcitx.nix` + +- `i18n/input-method/ibus.nix` + +- `i18n/input-method/nabi.nix` + +- `i18n/input-method/uim.nix` + +- `programs/fish.nix` + +- `security/acme.nix` + +- `security/audit.nix` + +- `security/oath.nix` + +- `services/hardware/irqbalance.nix` + +- `services/mail/dspam.nix` + +- `services/mail/opendkim.nix` + +- `services/mail/postsrsd.nix` + +- `services/mail/rspamd.nix` + +- `services/mail/rmilter.nix` + +- `services/misc/autofs.nix` + +- `services/misc/bepasty.nix` + +- `services/misc/calibre-server.nix` + +- `services/misc/cfdyndns.nix` + +- `services/misc/gammu-smsd.nix` + +- `services/misc/mathics.nix` + +- `services/misc/matrix-synapse.nix` + +- `services/misc/octoprint.nix` + +- `services/monitoring/hdaps.nix` + +- `services/monitoring/heapster.nix` + +- `services/monitoring/longview.nix` + +- `services/network-filesystems/netatalk.nix` + +- `services/network-filesystems/xtreemfs.nix` + +- `services/networking/autossh.nix` + +- `services/networking/dnschain.nix` + +- `services/networking/gale.nix` + +- `services/networking/miniupnpd.nix` + +- `services/networking/namecoind.nix` + +- `services/networking/ostinato.nix` + +- `services/networking/pdnsd.nix` + +- `services/networking/shairport-sync.nix` + +- `services/networking/supplicant.nix` + +- `services/search/kibana.nix` + +- `services/security/haka.nix` + +- `services/security/physlock.nix` + +- `services/web-apps/pump.io.nix` + +- `services/x11/hardware/libinput.nix` + +- `services/x11/window-managers/windowlab.nix` + +- `system/boot/initrd-network.nix` + +- `system/boot/initrd-ssh.nix` + +- `system/boot/loader/loader.nix` + +- `system/boot/networkd.nix` + +- `system/boot/resolved.nix` + +- `virtualisation/lxd.nix` + +- `virtualisation/rkt.nix` + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- We no longer produce graphical ISO images and VirtualBox images for `i686-linux`. A minimal ISO image is still provided. + +- Firefox and similar browsers are now _wrapped by default_. The package and attribute names are plain `firefox` or `midori`, etc. Backward-compatibility attributes were set up, but note that `nix-env -u` will _not_ update your current `firefox-with-plugins`; you have to uninstall it and install `firefox` instead. + +- `wmiiSnap` has been replaced with `wmii_hg`, but `services.xserver.windowManager.wmii.enable` has been updated respectively so this only affects you if you have explicitly installed `wmiiSnap`. + +- `jobs` NixOS option has been removed. It served as compatibility layer between Upstart jobs and SystemD services. All services have been rewritten to use `systemd.services` + +- `wmiimenu` is removed, as it has been removed by the developers upstream. Use `wimenu` from the `wmii-hg` package. + +- Gitit is no longer automatically added to the module list in NixOS and as such there will not be any manual entries for it. You will need to add an import statement to your NixOS configuration in order to use it, e.g. + + ```nix + { + imports = [ ]; + } + ``` + + will include the Gitit service configuration options. + +- `nginx` does not accept flags for enabling and disabling modules anymore. Instead it accepts `modules` argument, which is a list of modules to be built in. All modules now reside in `nginxModules` set. Example configuration: + + ```nix + nginx.override { + modules = [ nginxModules.rtmp nginxModules.dav nginxModules.moreheaders ]; + } + ``` + +- `s3sync` is removed, as it hasn\'t been developed by upstream for 4 years and only runs with ruby 1.8. For an actively-developer alternative look at `tarsnap` and others. + +- `ruby_1_8` has been removed as it\'s not supported from upstream anymore and probably contains security issues. + +- `tidy-html5` package is removed. Upstream only provided `(lib)tidy5` during development, and now they went back to `(lib)tidy` to work as a drop-in replacement of the original package that has been unmaintained for years. You can (still) use the `html-tidy` package, which got updated to a stable release from this new upstream. + +- `extraDeviceOptions` argument is removed from `bumblebee` package. Instead there are now two separate arguments: `extraNvidiaDeviceOptions` and `extraNouveauDeviceOptions` for setting extra X11 options for nvidia and nouveau drivers, respectively. + +- The `Ctrl+Alt+Backspace` key combination no longer kills the X server by default. There\'s a new option `services.xserver.enableCtrlAltBackspace` allowing to enable the combination again. + +- `emacsPackagesNg` now contains all packages from the ELPA, MELPA, and MELPA Stable repositories. + +- Data directory for Postfix MTA server is moved from `/var/postfix` to `/var/lib/postfix`. Old configurations are migrated automatically. `service.postfix` module has also received many improvements, such as correct directories\' access rights, new `aliasFiles` and `mapFiles` options and more. + +- Filesystem options should now be configured as a list of strings, not a comma-separated string. The old style will continue to work, but print a warning, until the 16.09 release. An example of the new style: + + ```nix + { + fileSystems."/example" = { + device = "/dev/sdc"; + fsType = "btrfs"; + options = [ "noatime" "compress=lzo" "space_cache" "autodefrag" ]; + }; + } + ``` + +- CUPS, installed by `services.printing` module, now has its data directory in `/var/lib/cups`. Old configurations from `/etc/cups` are moved there automatically, but there might be problems. Also configuration options `services.printing.cupsdConf` and `services.printing.cupsdFilesConf` were removed because they had been allowing one to override configuration variables required for CUPS to work at all on NixOS. For most use cases, `services.printing.extraConf` and new option `services.printing.extraFilesConf` should be enough; if you encounter a situation when they are not, please file a bug. + + There are also Gutenprint improvements; in particular, a new option `services.printing.gutenprint` is added to enable automatic updating of Gutenprint PPMs; it\'s greatly recommended to enable it instead of adding `gutenprint` to the `drivers` list. + +- `services.xserver.vaapiDrivers` has been removed. Use `hardware.opengl.extraPackages{,32}` instead. You can also specify VDPAU drivers there. + +- `programs.ibus` moved to `i18n.inputMethod.ibus`. The option `programs.ibus.plugins` changed to `i18n.inputMethod.ibus.engines` and the option to enable ibus changed from `programs.ibus.enable` to `i18n.inputMethod.enabled`. `i18n.inputMethod.enabled` should be set to the used input method name, `"ibus"` for ibus. An example of the new style: + + ```nix + { + i18n.inputMethod.enabled = "ibus"; + i18n.inputMethod.ibus.engines = with pkgs.ibus-engines; [ anthy mozc ]; + } + ``` + + That is equivalent to the old version: + + ```nix + { + programs.ibus.enable = true; + programs.ibus.plugins = with pkgs; [ ibus-anthy mozc ]; + } + ``` + +- `services.udev.extraRules` option now writes rules to `99-local.rules` instead of `10-local.rules`. This makes all the user rules apply after others, so their results wouldn\'t be overriden by anything else. + +- Large parts of the `services.gitlab` module has been been rewritten. There are new configuration options available. The `stateDir` option was renamned to `statePath` and the `satellitesDir` option was removed. Please review the currently available options. + +- The option `services.nsd.zones..data` no longer interpret the dollar sign (\$) as a shell variable, as such it should not be escaped anymore. Thus the following zone data: + + ```dns-zone + $ORIGIN example.com. + $TTL 1800 + @ IN SOA ns1.vpn.nbp.name. admin.example.com. ( + + ``` + + Should modified to look like the actual file expected by nsd: + + ```dns-zone + $ORIGIN example.com. + $TTL 1800 + @ IN SOA ns1.vpn.nbp.name. admin.example.com. ( + + ``` + +- `service.syncthing.dataDir` options now has to point to exact folder where syncthing is writing to. Example configuration should look something like: + + ```nix + { + services.syncthing = { + enable = true; + dataDir = "/home/somebody/.syncthing"; + user = "somebody"; + }; + } + ``` + +- `networking.firewall.allowPing` is now enabled by default. Users are encouraged to configure an appropriate rate limit for their machines using the Kernel interface at `/proc/sys/net/ipv4/icmp_ratelimit` and `/proc/sys/net/ipv6/icmp/ratelimit` or using the firewall itself, i.e. by setting the NixOS option `networking.firewall.pingLimit`. + +- Systems with some broadcom cards used to result into a generated config that is no longer accepted. If you get errors like + + ```ShellSession + error: path ‘/nix/store/*-broadcom-sta-*’ does not exist and cannot be created + ``` + + you should either re-run `nixos-generate-config` or manually replace `"${config.boot.kernelPackages.broadcom_sta}"` by `config.boot.kernelPackages.broadcom_sta` in your `/etc/nixos/hardware-configuration.nix`. More discussion is on [ the github issue](https://github.com/NixOS/nixpkgs/pull/12595). + +- The `services.xserver.startGnuPGAgent` option has been removed. GnuPG 2.1.x changed the way the gpg-agent works, and that new approach no longer requires (or even supports) the \"start everything as a child of the agent\" scheme we\'ve implemented in NixOS for older versions. To configure the gpg-agent for your X session, add the following code to `~/.bashrc` or some file that's sourced when your shell is started: + + ```shell + GPG_TTY=$(tty) + export GPG_TTY + ``` + + If you want to use gpg-agent for SSH, too, add the following to your session initialization (e.g. `displayManager.sessionCommands`) + + ```shell + gpg-connect-agent /bye + unset SSH_AGENT_PID + export SSH_AUTH_SOCK="''${HOME}/.gnupg/S.gpg-agent.ssh" + ``` + + and make sure that + + ```conf + enable-ssh-support + ``` + + is included in your `~/.gnupg/gpg-agent.conf`. You will need to use `ssh-add` to re-add your ssh keys. If gpg's automatic transformation of the private keys to the new format fails, you will need to re-import your private keyring as well: + + ```ShellSession + gpg --import ~/.gnupg/secring.gpg + ``` + + The `gpg-agent(1)` man page has more details about this subject, i.e. in the \"EXAMPLES\" section. + +Other notable improvements: + +- `ejabberd` module is brought back and now works on NixOS. + +- Input method support was improved. New NixOS modules (fcitx, nabi and uim), fcitx engines (chewing, hangul, m17n, mozc and table-other) and ibus engines (hangul and m17n) have been added. diff --git a/nixos/doc/manual/release-notes/rl-1603.xml b/nixos/doc/manual/release-notes/rl-1603.xml deleted file mode 100644 index 6d4b28825fa..00000000000 --- a/nixos/doc/manual/release-notes/rl-1603.xml +++ /dev/null @@ -1,671 +0,0 @@ -
- Release 16.03 (“Emu”, 2016/03/31) - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - Systemd 229, bringing - numerous - improvements over 217. - - - - - Linux 4.4 (was 3.18). - - - - - GCC 5.3 (was 4.9). Note that GCC 5 - changes - the C++ ABI in an incompatible way; this may cause problems if you - try to link objects compiled with different versions of GCC. - - - - - Glibc 2.23 (was 2.21). - - - - - Binutils 2.26 (was 2.23.1). See #909 - - - - - Improved support for ensuring - bitwise - reproducible builds. For example, stdenv now sets - the environment variable - SOURCE_DATE_EPOCH - to a deterministic value, and Nix has - gained - an option to repeat a build a number of times to test determinism. - An ongoing project, the goal of exact reproducibility is to allow binaries - to be verified independently (e.g., a user might only trust binaries that - appear in three independent binary caches). - - - - - Perl 5.22. - - - - - - The following new services were added since the last release: - - - - services/monitoring/longview.nix - - - - - hardware/video/webcam/facetimehd.nix - - - - - i18n/input-method/default.nix - - - - - i18n/input-method/fcitx.nix - - - - - i18n/input-method/ibus.nix - - - - - i18n/input-method/nabi.nix - - - - - i18n/input-method/uim.nix - - - - - programs/fish.nix - - - - - security/acme.nix - - - - - security/audit.nix - - - - - security/oath.nix - - - - - services/hardware/irqbalance.nix - - - - - services/mail/dspam.nix - - - - - services/mail/opendkim.nix - - - - - services/mail/postsrsd.nix - - - - - services/mail/rspamd.nix - - - - - services/mail/rmilter.nix - - - - - services/misc/autofs.nix - - - - - services/misc/bepasty.nix - - - - - services/misc/calibre-server.nix - - - - - services/misc/cfdyndns.nix - - - - - services/misc/gammu-smsd.nix - - - - - services/misc/mathics.nix - - - - - services/misc/matrix-synapse.nix - - - - - services/misc/octoprint.nix - - - - - services/monitoring/hdaps.nix - - - - - services/monitoring/heapster.nix - - - - - services/monitoring/longview.nix - - - - - services/network-filesystems/netatalk.nix - - - - - services/network-filesystems/xtreemfs.nix - - - - - services/networking/autossh.nix - - - - - services/networking/dnschain.nix - - - - - services/networking/gale.nix - - - - - services/networking/miniupnpd.nix - - - - - services/networking/namecoind.nix - - - - - services/networking/ostinato.nix - - - - - services/networking/pdnsd.nix - - - - - services/networking/shairport-sync.nix - - - - - services/networking/supplicant.nix - - - - - services/search/kibana.nix - - - - - services/security/haka.nix - - - - - services/security/physlock.nix - - - - - services/web-apps/pump.io.nix - - - - - services/x11/hardware/libinput.nix - - - - - services/x11/window-managers/windowlab.nix - - - - - system/boot/initrd-network.nix - - - - - system/boot/initrd-ssh.nix - - - - - system/boot/loader/loader.nix - - - - - system/boot/networkd.nix - - - - - system/boot/resolved.nix - - - - - virtualisation/lxd.nix - - - - - virtualisation/rkt.nix - - - - - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - We no longer produce graphical ISO images and VirtualBox images for - i686-linux. A minimal ISO image is still provided. - - - - - Firefox and similar browsers are now wrapped by - default. The package and attribute names are plain - firefox or midori, etc. - Backward-compatibility attributes were set up, but note that - nix-env -u will not update your - current firefox-with-plugins; you have to uninstall it - and install firefox instead. - - - - - wmiiSnap has been replaced with - wmii_hg, but - services.xserver.windowManager.wmii.enable has been - updated respectively so this only affects you if you have explicitly - installed wmiiSnap. - - - - - jobs NixOS option has been removed. It served as - compatibility layer between Upstart jobs and SystemD services. All services - have been rewritten to use systemd.services - - - - - wmiimenu is removed, as it has been removed by the - developers upstream. Use wimenu from the - wmii-hg package. - - - - - Gitit is no longer automatically added to the module list in NixOS and as - such there will not be any manual entries for it. You will need to add an - import statement to your NixOS configuration in order to use it, e.g. - ]; -} -]]> - will include the Gitit service configuration options. - - - - - nginx does not accept flags for enabling and disabling - modules anymore. Instead it accepts modules argument, - which is a list of modules to be built in. All modules now reside in - nginxModules set. Example configuration: - - - - - - s3sync is removed, as it hasn't been developed by - upstream for 4 years and only runs with ruby 1.8. For an actively-developer - alternative look at tarsnap and others. - - - - - ruby_1_8 has been removed as it's not supported from - upstream anymore and probably contains security issues. - - - - - tidy-html5 package is removed. Upstream only provided - (lib)tidy5 during development, and now they went back to - (lib)tidy to work as a drop-in replacement of the - original package that has been unmaintained for years. You can (still) use - the html-tidy package, which got updated to a stable - release from this new upstream. - - - - - extraDeviceOptions argument is removed from - bumblebee package. Instead there are now two separate - arguments: extraNvidiaDeviceOptions and - extraNouveauDeviceOptions for setting extra X11 options - for nvidia and nouveau drivers, respectively. - - - - - The Ctrl+Alt+Backspace key combination no longer kills - the X server by default. There's a new option - allowing to enable - the combination again. - - - - - emacsPackagesNg now contains all packages from the ELPA, - MELPA, and MELPA Stable repositories. - - - - - Data directory for Postfix MTA server is moved from - /var/postfix to /var/lib/postfix. - Old configurations are migrated automatically. - service.postfix module has also received many - improvements, such as correct directories' access rights, new - aliasFiles and mapFiles options and - more. - - - - - Filesystem options should now be configured as a list of strings, not a - comma-separated string. The old style will continue to work, but print a - warning, until the 16.09 release. An example of the new style: - -fileSystems."/example" = { - device = "/dev/sdc"; - fsType = "btrfs"; - options = [ "noatime" "compress=lzo" "space_cache" "autodefrag" ]; -}; - - - - - - CUPS, installed by services.printing module, now has its - data directory in /var/lib/cups. Old configurations - from /etc/cups are moved there automatically, but - there might be problems. Also configuration options - services.printing.cupsdConf and - services.printing.cupsdFilesConf were removed because - they had been allowing one to override configuration variables required for - CUPS to work at all on NixOS. For most use cases, - services.printing.extraConf and new option - services.printing.extraFilesConf should be enough; if - you encounter a situation when they are not, please file a bug. - - - There are also Gutenprint improvements; in particular, a new option - services.printing.gutenprint is added to enable - automatic updating of Gutenprint PPMs; it's greatly recommended to enable - it instead of adding gutenprint to the - drivers list. - - - - - services.xserver.vaapiDrivers has been removed. Use - hardware.opengl.extraPackages{,32} instead. You can also - specify VDPAU drivers there. - - - - - programs.ibus moved to - i18n.inputMethod.ibus. The option - programs.ibus.plugins changed to - i18n.inputMethod.ibus.engines and the option to enable - ibus changed from programs.ibus.enable to - i18n.inputMethod.enabled. - i18n.inputMethod.enabled should be set to the used input - method name, "ibus" for ibus. An example of the new - style: - -i18n.inputMethod.enabled = "ibus"; -i18n.inputMethod.ibus.engines = with pkgs.ibus-engines; [ anthy mozc ]; - - That is equivalent to the old version: - -programs.ibus.enable = true; -programs.ibus.plugins = with pkgs; [ ibus-anthy mozc ]; - - - - - - services.udev.extraRules option now writes rules to - 99-local.rules instead of - 10-local.rules. This makes all the user rules apply - after others, so their results wouldn't be overriden by anything else. - - - - - Large parts of the services.gitlab module has been been - rewritten. There are new configuration options available. The - stateDir option was renamned to - statePath and the satellitesDir - option was removed. Please review the currently available options. - - - - - The option no longer - interpret the dollar sign ($) as a shell variable, as such it should not be - escaped anymore. Thus the following zone data: - - -\$ORIGIN example.com. -\$TTL 1800 -@ IN SOA ns1.vpn.nbp.name. admin.example.com. ( - - - Should modified to look like the actual file expected by nsd: - - -$ORIGIN example.com. -$TTL 1800 -@ IN SOA ns1.vpn.nbp.name. admin.example.com. ( - - - - - service.syncthing.dataDir options now has to point to - exact folder where syncthing is writing to. Example configuration should - look something like: - - -services.syncthing = { - enable = true; - dataDir = "/home/somebody/.syncthing"; - user = "somebody"; -}; - - - - - networking.firewall.allowPing is now enabled by default. - Users are encouraged to configure an appropriate rate limit for their - machines using the Kernel interface at - /proc/sys/net/ipv4/icmp_ratelimit and - /proc/sys/net/ipv6/icmp/ratelimit or using the - firewall itself, i.e. by setting the NixOS option - networking.firewall.pingLimit. - - - - - Systems with some broadcom cards used to result into a generated config - that is no longer accepted. If you get errors like -error: path ‘/nix/store/*-broadcom-sta-*’ does not exist and cannot be created - you should either re-run nixos-generate-config or - manually replace - "${config.boot.kernelPackages.broadcom_sta}" by - config.boot.kernelPackages.broadcom_sta in your - /etc/nixos/hardware-configuration.nix. More discussion - is on the - github issue. - - - - - The services.xserver.startGnuPGAgent option has been - removed. GnuPG 2.1.x changed the way the gpg-agent works, and that new - approach no longer requires (or even supports) the "start everything as a - child of the agent" scheme we've implemented in NixOS for older versions. - To configure the gpg-agent for your X session, add the following code to - ~/.bashrc or some file that’s sourced when your - shell is started: - -GPG_TTY=$(tty) -export GPG_TTY - - If you want to use gpg-agent for SSH, too, add the following to your - session initialization (e.g. - displayManager.sessionCommands) - -gpg-connect-agent /bye -unset SSH_AGENT_PID -export SSH_AUTH_SOCK="''${HOME}/.gnupg/S.gpg-agent.ssh" - - and make sure that - -enable-ssh-support - - is included in your ~/.gnupg/gpg-agent.conf. You will - need to use ssh-add to re-add your ssh keys. If gpg’s - automatic transformation of the private keys to the new format fails, you - will need to re-import your private keyring as well: - -gpg --import ~/.gnupg/secring.gpg - - The gpg-agent(1) man page has more details about this - subject, i.e. in the "EXAMPLES" section. - - - - - - Other notable improvements: - - - - - ejabberd module is brought back and now works on NixOS. - - - - - Input method support was improved. New NixOS modules (fcitx, nabi and - uim), fcitx engines (chewing, hangul, m17n, mozc and table-other) and ibus - engines (hangul and m17n) have been added. - - - - -
diff --git a/nixos/doc/manual/release-notes/rl-1609.section.md b/nixos/doc/manual/release-notes/rl-1609.section.md new file mode 100644 index 00000000000..075f0cf52cd --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1609.section.md @@ -0,0 +1,73 @@ +# Release 16.09 ("Flounder", 2016/09/30) {#sec-release-16.09} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- Many NixOS configurations and Nix packages now use significantly less disk space, thanks to the [extensive work on closure size reduction](https://github.com/NixOS/nixpkgs/issues/7117). For example, the closure size of a minimal NixOS container went down from \~424 MiB in 16.03 to \~212 MiB in 16.09, while the closure size of Firefox went from \~651 MiB to \~259 MiB. + +- To improve security, packages are now [built using various hardening features](https://github.com/NixOS/nixpkgs/pull/12895). See the Nixpkgs manual for more information. + +- Support for PXE netboot. See [](#sec-booting-from-pxe) for documentation. + +- X.org server 1.18. If you use the `ati_unfree` driver, 1.17 is still used due to an ABI incompatibility. + +- This release is based on Glibc 2.24, GCC 5.4.0 and systemd 231. The default Linux kernel remains 4.4. + +The following new services were added since the last release: + +- `(this will get automatically generated at release time)` + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- A large number of packages have been converted to use the multiple outputs feature of Nix to greatly reduce the amount of required disk space, as mentioned above. This may require changes to any custom packages to make them build again; see the relevant chapter in the Nixpkgs manual for more information. (Additional caveat to packagers: some packaging conventions related to multiple-output packages [were changed](https://github.com/NixOS/nixpkgs/pull/14766) late (August 2016) in the release cycle and differ from the initial introduction of multiple outputs.) + +- Previous versions of Nixpkgs had support for all versions of the LTS Haskell package set. That support has been dropped. The previously provided `haskell.packages.lts-x_y` package sets still exist in name to aviod breaking user code, but these package sets don\'t actually contain the versions mandated by the corresponding LTS release. Instead, our package set it loosely based on the latest available LTS release, i.e. LTS 7.x at the time of this writing. New releases of NixOS and Nixpkgs will drop those old names entirely. [The motivation for this change](https://nixos.org/nix-dev/2016-June/020585.html) has been discussed at length on the `nix-dev` mailing list and in [Github issue \#14897](https://github.com/NixOS/nixpkgs/issues/14897). Development strategies for Haskell hackers who want to rely on Nix and NixOS have been described in [another nix-dev article](https://nixos.org/nix-dev/2016-June/020642.html). + +- Shell aliases for systemd sub-commands [were dropped](https://github.com/NixOS/nixpkgs/pull/15598): `start`, `stop`, `restart`, `status`. + +- Redis now binds to 127.0.0.1 only instead of listening to all network interfaces. This is the default behavior of Redis 3.2 + +- `/var/empty` is now immutable. Activation script runs `chattr +i` to forbid any modifications inside the folder. See [ the pull request](https://github.com/NixOS/nixpkgs/pull/18365) for what bugs this caused. + +- Gitlab\'s maintainance script `gitlab-runner` was removed and split up into the more clearer `gitlab-run` and `gitlab-rake` scripts, because `gitlab-runner` is a component of Gitlab CI. + +- `services.xserver.libinput.accelProfile` default changed from `flat` to `adaptive`, as per [ official documentation](https://wayland.freedesktop.org/libinput/doc/latest/group__config.html#gad63796972347f318b180e322e35cee79). + +- `fonts.fontconfig.ultimate.rendering` was removed because our presets were obsolete for some time. New presets are hardcoded into FreeType; you can select a preset via `fonts.fontconfig.ultimate.preset`. You can customize those presets via ordinary environment variables, using `environment.variables`. + +- The `audit` service is no longer enabled by default. Use `security.audit.enable = true` to explicitly enable it. + +- `pkgs.linuxPackages.virtualbox` now contains only the kernel modules instead of the VirtualBox user space binaries. If you want to reference the user space binaries, you have to use the new `pkgs.virtualbox` instead. + +- `goPackages` was replaced with separated Go applications in appropriate `nixpkgs` categories. Each Go package uses its own dependency set. There\'s also a new `go2nix` tool introduced to generate a Go package definition from its Go source automatically. + +- `services.mongodb.extraConfig` configuration format was changed to YAML. + +- PHP has been upgraded to 7.0 + +Other notable improvements: + +- Revamped grsecurity/PaX support. There is now only a single general-purpose distribution kernel and the configuration interface has been streamlined. Desktop users should be able to simply set + + ```nix + { + security.grsecurity.enable = true; + } + ``` + + to get a reasonably secure system without having to sacrifice too much functionality. + +- Special filesystems, like `/proc`, `/run` and others, now have the same mount options as recommended by systemd and are unified across different places in NixOS. Mount options are updated during `nixos-rebuild switch` if possible. One benefit from this is improved security --- most such filesystems are now mounted with `noexec`, `nodev` and/or `nosuid` options. + +- The reverse path filter was interfering with DHCPv4 server operation in the past. An exception for DHCPv4 and a new option to log packets that were dropped due to the reverse path filter was added (`networking.firewall.logReversePathDrops`) for easier debugging. + +- Containers configuration within `containers..config` is [now properly typed and checked](https://github.com/NixOS/nixpkgs/pull/17365). In particular, partial configurations are merged correctly. + +- The directory container setuid wrapper programs, `/var/setuid-wrappers`, [is now updated atomically to prevent failures if the switch to a new configuration is interrupted.](https://github.com/NixOS/nixpkgs/pull/18124) + +- `services.xserver.startGnuPGAgent` has been removed due to GnuPG 2.1.x bump. See [ how to achieve similar behavior](https://github.com/NixOS/nixpkgs/commit/5391882ebd781149e213e8817fba6ac3c503740c). You might need to `pkill gpg-agent` after the upgrade to prevent a stale agent being in the way. + +- [ Declarative users could share the uid due to the bug in the script handling conflict resolution. ](https://github.com/NixOS/nixpkgs/commit/e561edc322d275c3687fec431935095cfc717147) + +- Gummi boot has been replaced using systemd-boot. + +- Hydra package and NixOS module were added for convenience. diff --git a/nixos/doc/manual/release-notes/rl-1609.xml b/nixos/doc/manual/release-notes/rl-1609.xml deleted file mode 100644 index 4a2343edc97..00000000000 --- a/nixos/doc/manual/release-notes/rl-1609.xml +++ /dev/null @@ -1,277 +0,0 @@ -
- Release 16.09 (“Flounder”, 2016/09/30) - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - Many NixOS configurations and Nix packages now use significantly less disk - space, thanks to the - extensive - work on closure size reduction. For example, the closure size of a - minimal NixOS container went down from ~424 MiB in 16.03 to ~212 MiB in - 16.09, while the closure size of Firefox went from ~651 MiB to ~259 MiB. - - - - - To improve security, packages are now - built - using various hardening features. See the Nixpkgs manual for more - information. - - - - - Support for PXE netboot. See - for documentation. - - - - - X.org server 1.18. If you use the ati_unfree driver, - 1.17 is still used due to an ABI incompatibility. - - - - - This release is based on Glibc 2.24, GCC 5.4.0 and systemd 231. The default - Linux kernel remains 4.4. - - - - - - The following new services were added since the last release: - - - - - - (this will get automatically generated at release time) - - - - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - A large number of packages have been converted to use the multiple outputs - feature of Nix to greatly reduce the amount of required disk space, as - mentioned above. This may require changes to any custom packages to make - them build again; see the relevant chapter in the Nixpkgs manual for more - information. (Additional caveat to packagers: some packaging conventions - related to multiple-output packages - were - changed late (August 2016) in the release cycle and differ from the - initial introduction of multiple outputs.) - - - - - Previous versions of Nixpkgs had support for all versions of the LTS - Haskell package set. That support has been dropped. The previously provided - haskell.packages.lts-x_y package sets still exist in - name to aviod breaking user code, but these package sets don't actually - contain the versions mandated by the corresponding LTS release. Instead, - our package set it loosely based on the latest available LTS release, i.e. - LTS 7.x at the time of this writing. New releases of NixOS and Nixpkgs will - drop those old names entirely. - The - motivation for this change has been discussed at length on the - nix-dev mailing list and in - Github - issue #14897. Development strategies for Haskell hackers who want to - rely on Nix and NixOS have been described in - another - nix-dev article. - - - - - Shell aliases for systemd sub-commands - were - dropped: start, stop, - restart, status. - - - - - Redis now binds to 127.0.0.1 only instead of listening to all network - interfaces. This is the default behavior of Redis 3.2 - - - - - /var/empty is now immutable. Activation script runs - chattr +i to forbid any modifications inside the folder. - See the - pull request for what bugs this caused. - - - - - Gitlab's maintainance script gitlab-runner was removed - and split up into the more clearer gitlab-run and - gitlab-rake scripts, because - gitlab-runner is a component of Gitlab CI. - - - - - services.xserver.libinput.accelProfile default changed - from flat to adaptive, as per - - official documentation. - - - - - fonts.fontconfig.ultimate.rendering was removed because - our presets were obsolete for some time. New presets are hardcoded into - FreeType; you can select a preset via - fonts.fontconfig.ultimate.preset. You can customize - those presets via ordinary environment variables, using - environment.variables. - - - - - The audit service is no longer enabled by default. Use - security.audit.enable = true to explicitly enable it. - - - - - pkgs.linuxPackages.virtualbox now contains only the - kernel modules instead of the VirtualBox user space binaries. If you want - to reference the user space binaries, you have to use the new - pkgs.virtualbox instead. - - - - - goPackages was replaced with separated Go applications - in appropriate nixpkgs categories. Each Go package uses - its own dependency set. There's also a new go2nix tool - introduced to generate a Go package definition from its Go source - automatically. - - - - - services.mongodb.extraConfig configuration format was - changed to YAML. - - - - - PHP has been upgraded to 7.0 - - - - - - Other notable improvements: - - - - - - Revamped grsecurity/PaX support. There is now only a single general-purpose - distribution kernel and the configuration interface has been streamlined. - Desktop users should be able to simply set -security.grsecurity.enable = true - to get a reasonably secure system without having to sacrifice too much - functionality. - - - - - Special filesystems, like /proc, /run - and others, now have the same mount options as recommended by systemd and - are unified across different places in NixOS. Mount options are updated - during nixos-rebuild switch if possible. One benefit - from this is improved security — most such filesystems are now mounted - with noexec, nodev and/or - nosuid options. - - - - - The reverse path filter was interfering with DHCPv4 server operation in the - past. An exception for DHCPv4 and a new option to log packets that were - dropped due to the reverse path filter was added - (networking.firewall.logReversePathDrops) for easier - debugging. - - - - - Containers configuration within - containers.<name>.config is - now - properly typed and checked. In particular, partial configurations - are merged correctly. - - - - - The directory container setuid wrapper programs, - /var/setuid-wrappers, - is now - updated atomically to prevent failures if the switch to a new configuration - is interrupted. - - - - - services.xserver.startGnuPGAgent has been removed due to - GnuPG 2.1.x bump. See - - how to achieve similar behavior. You might need to pkill - gpg-agent after the upgrade to prevent a stale agent being in the - way. - - - - - - Declarative users could share the uid due to the bug in the script handling - conflict resolution. - - - - - Gummi boot has been replaced using systemd-boot. - - - - - Hydra package and NixOS module were added for convenience. - - - -
diff --git a/nixos/doc/manual/release-notes/rl-1703.section.md b/nixos/doc/manual/release-notes/rl-1703.section.md new file mode 100644 index 00000000000..7f424f2a6ce --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1703.section.md @@ -0,0 +1,303 @@ +# Release 17.03 ("Gorilla", 2017/03/31) {#sec-release-17.03} + +## Highlights {#sec-release-17.03-highlights} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- Nixpkgs is now extensible through overlays. See the [Nixpkgs manual](https://nixos.org/nixpkgs/manual/#sec-overlays-install) for more information. + +- This release is based on Glibc 2.25, GCC 5.4.0 and systemd 232. The default Linux kernel is 4.9 and Nix is at 1.11.8. + +- The default desktop environment now is KDE\'s Plasma 5. KDE 4 has been removed + +- The setuid wrapper functionality now supports setting capabilities. + +- X.org server uses branch 1.19. Due to ABI incompatibilities, `ati_unfree` keeps forcing 1.17 and `amdgpu-pro` starts forcing 1.18. + +- Cross compilation has been rewritten. See the nixpkgs manual for details. The most obvious breaking change is that in derivations there is no `.nativeDrv` nor `.crossDrv` are now cross by default, not native. + +- The `overridePackages` function has been rewritten to be replaced by [ overlays](https://nixos.org/nixpkgs/manual/#sec-overlays-install) + +- Packages in nixpkgs can be marked as insecure through listed vulnerabilities. See the [Nixpkgs manual](https://nixos.org/nixpkgs/manual/#sec-allow-insecure) for more information. + +- PHP now defaults to PHP 7.1 + +## New Services {#sec-release-17.03-new-services} + +The following new services were added since the last release: + +- `hardware/ckb.nix` + +- `hardware/mcelog.nix` + +- `hardware/usb-wwan.nix` + +- `hardware/video/capture/mwprocapture.nix` + +- `programs/adb.nix` + +- `programs/chromium.nix` + +- `programs/gphoto2.nix` + +- `programs/java.nix` + +- `programs/mtr.nix` + +- `programs/oblogout.nix` + +- `programs/vim.nix` + +- `programs/wireshark.nix` + +- `security/dhparams.nix` + +- `services/audio/ympd.nix` + +- `services/computing/boinc/client.nix` + +- `services/continuous-integration/buildbot/master.nix` + +- `services/continuous-integration/buildbot/worker.nix` + +- `services/continuous-integration/gitlab-runner.nix` + +- `services/databases/riak-cs.nix` + +- `services/databases/stanchion.nix` + +- `services/desktops/gnome3/gnome-terminal-server.nix` + +- `services/editors/infinoted.nix` + +- `services/hardware/illum.nix` + +- `services/hardware/trezord.nix` + +- `services/logging/journalbeat.nix` + +- `services/mail/offlineimap.nix` + +- `services/mail/postgrey.nix` + +- `services/misc/couchpotato.nix` + +- `services/misc/docker-registry.nix` + +- `services/misc/errbot.nix` + +- `services/misc/geoip-updater.nix` + +- `services/misc/gogs.nix` + +- `services/misc/leaps.nix` + +- `services/misc/nix-optimise.nix` + +- `services/misc/ssm-agent.nix` + +- `services/misc/sssd.nix` + +- `services/monitoring/arbtt.nix` + +- `services/monitoring/netdata.nix` + +- `services/monitoring/prometheus/default.nix` + +- `services/monitoring/prometheus/alertmanager.nix` + +- `services/monitoring/prometheus/blackbox-exporter.nix` + +- `services/monitoring/prometheus/json-exporter.nix` + +- `services/monitoring/prometheus/nginx-exporter.nix` + +- `services/monitoring/prometheus/node-exporter.nix` + +- `services/monitoring/prometheus/snmp-exporter.nix` + +- `services/monitoring/prometheus/unifi-exporter.nix` + +- `services/monitoring/prometheus/varnish-exporter.nix` + +- `services/monitoring/sysstat.nix` + +- `services/monitoring/telegraf.nix` + +- `services/monitoring/vnstat.nix` + +- `services/network-filesystems/cachefilesd.nix` + +- `services/network-filesystems/glusterfs.nix` + +- `services/network-filesystems/ipfs.nix` + +- `services/networking/dante.nix` + +- `services/networking/dnscrypt-wrapper.nix` + +- `services/networking/fakeroute.nix` + +- `services/networking/flannel.nix` + +- `services/networking/htpdate.nix` + +- `services/networking/miredo.nix` + +- `services/networking/nftables.nix` + +- `services/networking/powerdns.nix` + +- `services/networking/pdns-recursor.nix` + +- `services/networking/quagga.nix` + +- `services/networking/redsocks.nix` + +- `services/networking/wireguard.nix` + +- `services/system/cgmanager.nix` + +- `services/torrent/opentracker.nix` + +- `services/web-apps/atlassian/confluence.nix` + +- `services/web-apps/atlassian/crowd.nix` + +- `services/web-apps/atlassian/jira.nix` + +- `services/web-apps/frab.nix` + +- `services/web-apps/nixbot.nix` + +- `services/web-apps/selfoss.nix` + +- `services/web-apps/quassel-webserver.nix` + +- `services/x11/unclutter-xfixes.nix` + +- `services/x11/urxvtd.nix` + +- `system/boot/systemd-nspawn.nix` + +- `virtualisation/ecs-agent.nix` + +- `virtualisation/lxcfs.nix` + +- `virtualisation/openstack/keystone.nix` + +- `virtualisation/openstack/glance.nix` + +## Backward Incompatibilities {#sec-release-17.03-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- Derivations have no `.nativeDrv` nor `.crossDrv` and are now cross by default, not native. + +- `stdenv.overrides` is now expected to take `self` and `super` arguments. See `lib.trivial.extends` for what those parameters represent. + +- `ansible` now defaults to ansible version 2 as version 1 has been removed due to a serious [ vulnerability](https://www.computest.nl/advisories/CT-2017-0109_Ansible.txt) unpatched by upstream. + +- `gnome` alias has been removed along with `gtk`, `gtkmm` and several others. Now you need to use versioned attributes, like `gnome3`. + +- The attribute name of the Radicale daemon has been changed from `pythonPackages.radicale` to `radicale`. + +- The `stripHash` bash function in `stdenv` changed according to its documentation; it now outputs the stripped name to `stdout` instead of putting it in the variable `strippedName`. + +- PHP now scans for extra configuration .ini files in /etc/php.d instead of /etc. This prevents accidentally loading non-PHP .ini files that may be in /etc. + +- Two lone top-level dict dbs moved into `dictdDBs`. This affects: `dictdWordnet` which is now at `dictdDBs.wordnet` and `dictdWiktionary` which is now at `dictdDBs.wiktionary` + +- Parsoid service now uses YAML configuration format. `service.parsoid.interwikis` is now called `service.parsoid.wikis` and is a list of either API URLs or attribute sets as specified in parsoid\'s documentation. + +- `Ntpd` was replaced by `systemd-timesyncd` as the default service to synchronize system time with a remote NTP server. The old behavior can be restored by setting `services.ntp.enable` to `true`. Upstream time servers for all NTP implementations are now configured using `networking.timeServers`. + +- `service.nylon` is now declared using named instances. As an example: + + ```nix + { + services.nylon = { + enable = true; + acceptInterface = "br0"; + bindInterface = "tun1"; + port = 5912; + }; + } + ``` + + should be replaced with: + + ```nix + { + services.nylon.myvpn = { + enable = true; + acceptInterface = "br0"; + bindInterface = "tun1"; + port = 5912; + }; + } + ``` + + this enables you to declare a SOCKS proxy for each uplink. + +- `overridePackages` function no longer exists. It is replaced by [ overlays](https://nixos.org/nixpkgs/manual/#sec-overlays-install). For example, the following code: + + ```nix + let + pkgs = import {}; + in + pkgs.overridePackages (self: super: ...) + ``` + + should be replaced by: + + ```nix + let + pkgs = import {}; + in + import pkgs.path { overlays = [(self: super: ...)]; } + ``` + +- Autoloading connection tracking helpers is now disabled by default. This default was also changed in the Linux kernel and is considered insecure if not configured properly in your firewall. If you need connection tracking helpers (i.e. for active FTP) please enable `networking.firewall.autoLoadConntrackHelpers` and tune `networking.firewall.connectionTrackingModules` to suit your needs. + +- `local_recipient_maps` is not set to empty value by Postfix service. It\'s an insecure default as stated by Postfix documentation. Those who want to retain this setting need to set it via `services.postfix.extraConfig`. + +- Iputils no longer provide ping6 and traceroute6. The functionality of these tools has been integrated into ping and traceroute respectively. To enforce an address family the new flags `-4` and `-6` have been added. One notable incompatibility is that specifying an interface (for link-local IPv6 for instance) is no longer done with the `-I` flag, but by encoding the interface into the address (`ping fe80::1%eth0`). + +- The socket handling of the `services.rmilter` module has been fixed and refactored. As rmilter doesn\'t support binding to more than one socket, the options `bindUnixSockets` and `bindInetSockets` have been replaced by `services.rmilter.bindSocket.*`. The default is still a unix socket in `/run/rmilter/rmilter.sock`. Refer to the options documentation for more information. + +- The `fetch*` functions no longer support md5, please use sha256 instead. + +- The dnscrypt-proxy module interface has been streamlined around the `extraArgs` option. Where possible, legacy option declarations are mapped to `extraArgs` but will emit warnings. The `resolverList` has been outright removed: to use an unlisted resolver, use the `customResolver` option. + +- torbrowser now stores local state under `~/.local/share/tor-browser` by default. Any browser profile data from the old location, `~/.torbrowser4`, must be migrated manually. + +- The ihaskell, monetdb, offlineimap and sitecopy services have been removed. + +## Other Notable Changes {#sec-release-17.03-notable-changes} + +- Module type system have a new extensible option types feature that allow to extend certain types, such as enum, through multiple option declarations of the same option across multiple modules. + +- `jre` now defaults to GTK UI by default. This improves visual consistency and makes Java follow system font style, improving the situation on HighDPI displays. This has a cost of increased closure size; for server and other headless workloads it\'s recommended to use `jre_headless`. + +- Python 2.6 interpreter and package set have been removed. + +- The Python 2.7 interpreter does not use modules anymore. Instead, all CPython interpreters now include the whole standard library except for \`tkinter\`, which is available in the Python package set. + +- Python 2.7, 3.5 and 3.6 are now built deterministically and 3.4 mostly. Minor modifications had to be made to the interpreters in order to generate deterministic bytecode. This has security implications and is relevant for those using Python in a `nix-shell`. See the Nixpkgs manual for details. + +- The Python package sets now use a fixed-point combinator and the sets are available as attributes of the interpreters. + +- The Python function `buildPythonPackage` has been improved and can be used to build from Setuptools source, Flit source, and precompiled Wheels. + +- When adding new or updating current Python libraries, the expressions should be put in separate files in `pkgs/development/python-modules` and called from `python-packages.nix`. + +- The dnscrypt-proxy service supports synchronizing the list of public resolvers without working DNS resolution. This fixes issues caused by the resolver list becoming outdated. It also improves the viability of DNSCrypt only configurations. + +- Containers using bridged networking no longer lose their connection after changes to the host networking. + +- ZFS supports pool auto scrubbing. + +- The bind DNS utilities (e.g. dig) have been split into their own output and are now also available in `pkgs.dnsutils` and it is no longer necessary to pull in all of `bind` to use them. + +- Per-user configuration was moved from `~/.nixpkgs` to `~/.config/nixpkgs`. The former is still valid for `config.nix` for backwards compatibility. diff --git a/nixos/doc/manual/release-notes/rl-1703.xml b/nixos/doc/manual/release-notes/rl-1703.xml deleted file mode 100644 index 14b31b232e9..00000000000 --- a/nixos/doc/manual/release-notes/rl-1703.xml +++ /dev/null @@ -1,817 +0,0 @@ -
- Release 17.03 (“Gorilla”, 2017/03/31) - -
- Highlights - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - Nixpkgs is now extensible through overlays. See the - Nixpkgs - manual for more information. - - - - - This release is based on Glibc 2.25, GCC 5.4.0 and systemd 232. The - default Linux kernel is 4.9 and Nix is at 1.11.8. - - - - - The default desktop environment now is KDE's Plasma 5. KDE 4 has been - removed - - - - - The setuid wrapper functionality now supports setting capabilities. - - - - - X.org server uses branch 1.19. Due to ABI incompatibilities, - ati_unfree keeps forcing 1.17 and - amdgpu-pro starts forcing 1.18. - - - - - Cross compilation has been rewritten. See the nixpkgs manual for details. - The most obvious breaking change is that in derivations there is no - .nativeDrv nor .crossDrv are now - cross by default, not native. - - - - - The overridePackages function has been rewritten to be - replaced by - - overlays - - - - - Packages in nixpkgs can be marked as insecure through listed - vulnerabilities. See the - Nixpkgs - manual for more information. - - - - - PHP now defaults to PHP 7.1 - - - -
- -
- New Services - - - The following new services were added since the last release: - - - - - - hardware/ckb.nix - - - - - hardware/mcelog.nix - - - - - hardware/usb-wwan.nix - - - - - hardware/video/capture/mwprocapture.nix - - - - - programs/adb.nix - - - - - programs/chromium.nix - - - - - programs/gphoto2.nix - - - - - programs/java.nix - - - - - programs/mtr.nix - - - - - programs/oblogout.nix - - - - - programs/vim.nix - - - - - programs/wireshark.nix - - - - - security/dhparams.nix - - - - - services/audio/ympd.nix - - - - - services/computing/boinc/client.nix - - - - - services/continuous-integration/buildbot/master.nix - - - - - services/continuous-integration/buildbot/worker.nix - - - - - services/continuous-integration/gitlab-runner.nix - - - - - services/databases/riak-cs.nix - - - - - services/databases/stanchion.nix - - - - - services/desktops/gnome3/gnome-terminal-server.nix - - - - - services/editors/infinoted.nix - - - - - services/hardware/illum.nix - - - - - services/hardware/trezord.nix - - - - - services/logging/journalbeat.nix - - - - - services/mail/offlineimap.nix - - - - - services/mail/postgrey.nix - - - - - services/misc/couchpotato.nix - - - - - services/misc/docker-registry.nix - - - - - services/misc/errbot.nix - - - - - services/misc/geoip-updater.nix - - - - - services/misc/gogs.nix - - - - - services/misc/leaps.nix - - - - - services/misc/nix-optimise.nix - - - - - services/misc/ssm-agent.nix - - - - - services/misc/sssd.nix - - - - - services/monitoring/arbtt.nix - - - - - services/monitoring/netdata.nix - - - - - services/monitoring/prometheus/default.nix - - - - - services/monitoring/prometheus/alertmanager.nix - - - - - services/monitoring/prometheus/blackbox-exporter.nix - - - - - services/monitoring/prometheus/json-exporter.nix - - - - - services/monitoring/prometheus/nginx-exporter.nix - - - - - services/monitoring/prometheus/node-exporter.nix - - - - - services/monitoring/prometheus/snmp-exporter.nix - - - - - services/monitoring/prometheus/unifi-exporter.nix - - - - - services/monitoring/prometheus/varnish-exporter.nix - - - - - services/monitoring/sysstat.nix - - - - - services/monitoring/telegraf.nix - - - - - services/monitoring/vnstat.nix - - - - - services/network-filesystems/cachefilesd.nix - - - - - services/network-filesystems/glusterfs.nix - - - - - services/network-filesystems/ipfs.nix - - - - - services/networking/dante.nix - - - - - services/networking/dnscrypt-wrapper.nix - - - - - services/networking/fakeroute.nix - - - - - services/networking/flannel.nix - - - - - services/networking/htpdate.nix - - - - - services/networking/miredo.nix - - - - - services/networking/nftables.nix - - - - - services/networking/powerdns.nix - - - - - services/networking/pdns-recursor.nix - - - - - services/networking/quagga.nix - - - - - services/networking/redsocks.nix - - - - - services/networking/wireguard.nix - - - - - services/system/cgmanager.nix - - - - - services/torrent/opentracker.nix - - - - - services/web-apps/atlassian/confluence.nix - - - - - services/web-apps/atlassian/crowd.nix - - - - - services/web-apps/atlassian/jira.nix - - - - - services/web-apps/frab.nix - - - - - services/web-apps/nixbot.nix - - - - - services/web-apps/selfoss.nix - - - - - services/web-apps/quassel-webserver.nix - - - - - services/x11/unclutter-xfixes.nix - - - - - services/x11/urxvtd.nix - - - - - system/boot/systemd-nspawn.nix - - - - - virtualisation/ecs-agent.nix - - - - - virtualisation/lxcfs.nix - - - - - virtualisation/openstack/keystone.nix - - - - - virtualisation/openstack/glance.nix - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - Derivations have no .nativeDrv nor - .crossDrv and are now cross by default, not native. - - - - - stdenv.overrides is now expected to take - self and super arguments. See - lib.trivial.extends for what those parameters - represent. - - - - - ansible now defaults to ansible version 2 as version 1 - has been removed due to a serious - - vulnerability unpatched by upstream. - - - - - gnome alias has been removed along with - gtk, gtkmm and several others. Now - you need to use versioned attributes, like gnome3. - - - - - The attribute name of the Radicale daemon has been changed from - pythonPackages.radicale to radicale. - - - - - The stripHash bash function in - stdenv changed according to its documentation; it now - outputs the stripped name to stdout instead of putting - it in the variable strippedName. - - - - - PHP now scans for extra configuration .ini files in /etc/php.d instead of - /etc. This prevents accidentally loading non-PHP .ini files that may be in - /etc. - - - - - Two lone top-level dict dbs moved into dictdDBs. This - affects: dictdWordnet which is now at - dictdDBs.wordnet and dictdWiktionary - which is now at dictdDBs.wiktionary - - - - - Parsoid service now uses YAML configuration format. - service.parsoid.interwikis is now called - service.parsoid.wikis and is a list of either API URLs - or attribute sets as specified in parsoid's documentation. - - - - - Ntpd was replaced by - systemd-timesyncd as the default service to synchronize - system time with a remote NTP server. The old behavior can be restored by - setting services.ntp.enable to true. - Upstream time servers for all NTP implementations are now configured using - networking.timeServers. - - - - - service.nylon is now declared using named instances. As - an example: - - services.nylon = { - enable = true; - acceptInterface = "br0"; - bindInterface = "tun1"; - port = 5912; - }; - - should be replaced with: - - services.nylon.myvpn = { - enable = true; - acceptInterface = "br0"; - bindInterface = "tun1"; - port = 5912; - }; - - this enables you to declare a SOCKS proxy for each uplink. - - - - - overridePackages function no longer exists. It is - replaced by - - overlays. For example, the following code: - -let - pkgs = import <nixpkgs> {}; -in - pkgs.overridePackages (self: super: ...) - - should be replaced by: - -let - pkgs = import <nixpkgs> {}; -in - import pkgs.path { overlays = [(self: super: ...)]; } - - - - - - Autoloading connection tracking helpers is now disabled by default. This - default was also changed in the Linux kernel and is considered insecure if - not configured properly in your firewall. If you need connection tracking - helpers (i.e. for active FTP) please enable - networking.firewall.autoLoadConntrackHelpers and tune - networking.firewall.connectionTrackingModules to suit - your needs. - - - - - local_recipient_maps is not set to empty value by - Postfix service. It's an insecure default as stated by Postfix - documentation. Those who want to retain this setting need to set it via - services.postfix.extraConfig. - - - - - Iputils no longer provide ping6 and traceroute6. The functionality of - these tools has been integrated into ping and traceroute respectively. To - enforce an address family the new flags -4 and - -6 have been added. One notable incompatibility is that - specifying an interface (for link-local IPv6 for instance) is no longer - done with the -I flag, but by encoding the interface - into the address (ping fe80::1%eth0). - - - - - The socket handling of the services.rmilter module has - been fixed and refactored. As rmilter doesn't support binding to more than - one socket, the options bindUnixSockets and - bindInetSockets have been replaced by - services.rmilter.bindSocket.*. The default is still a - unix socket in /run/rmilter/rmilter.sock. Refer to the - options documentation for more information. - - - - - The fetch* functions no longer support md5, please use - sha256 instead. - - - - - The dnscrypt-proxy module interface has been streamlined around the - option. Where possible, legacy option - declarations are mapped to but will emit - warnings. The has been outright removed: to - use an unlisted resolver, use the option. - - - - - torbrowser now stores local state under - ~/.local/share/tor-browser by default. Any browser - profile data from the old location, ~/.torbrowser4, - must be migrated manually. - - - - - The ihaskell, monetdb, offlineimap and sitecopy services have been - removed. - - - -
- -
- Other Notable Changes - - - - - Module type system have a new extensible option types feature that allow - to extend certain types, such as enum, through multiple option - declarations of the same option across multiple modules. - - - - - jre now defaults to GTK UI by default. This improves - visual consistency and makes Java follow system font style, improving the - situation on HighDPI displays. This has a cost of increased closure size; - for server and other headless workloads it's recommended to use - jre_headless. - - - - - Python 2.6 interpreter and package set have been removed. - - - - - The Python 2.7 interpreter does not use modules anymore. Instead, all - CPython interpreters now include the whole standard library except for - `tkinter`, which is available in the Python package set. - - - - - Python 2.7, 3.5 and 3.6 are now built deterministically and 3.4 mostly. - Minor modifications had to be made to the interpreters in order to - generate deterministic bytecode. This has security implications and is - relevant for those using Python in a nix-shell. See the - Nixpkgs manual for details. - - - - - The Python package sets now use a fixed-point combinator and the sets are - available as attributes of the interpreters. - - - - - The Python function buildPythonPackage has been - improved and can be used to build from Setuptools source, Flit source, and - precompiled Wheels. - - - - - When adding new or updating current Python libraries, the expressions - should be put in separate files in - pkgs/development/python-modules and called from - python-packages.nix. - - - - - The dnscrypt-proxy service supports synchronizing the list of public - resolvers without working DNS resolution. This fixes issues caused by the - resolver list becoming outdated. It also improves the viability of - DNSCrypt only configurations. - - - - - Containers using bridged networking no longer lose their connection after - changes to the host networking. - - - - - ZFS supports pool auto scrubbing. - - - - - The bind DNS utilities (e.g. dig) have been split into their own output - and are now also available in pkgs.dnsutils and it is - no longer necessary to pull in all of bind to use them. - - - - - Per-user configuration was moved from ~/.nixpkgs to - ~/.config/nixpkgs. The former is still valid for - config.nix for backwards compatibility. - - - -
-
diff --git a/nixos/doc/manual/release-notes/rl-1709.section.md b/nixos/doc/manual/release-notes/rl-1709.section.md new file mode 100644 index 00000000000..e5af22721b0 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1709.section.md @@ -0,0 +1,316 @@ +# Release 17.09 ("Hummingbird", 2017/09/??) {#sec-release-17.09} + +## Highlights {#sec-release-17.09-highlights} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- The GNOME version is now 3.24. KDE Plasma was upgraded to 5.10, KDE Applications to 17.08.1 and KDE Frameworks to 5.37. + +- The user handling now keeps track of deallocated UIDs/GIDs. When a user or group is revived, this allows it to be allocated the UID/GID it had before. A consequence is that UIDs and GIDs are no longer reused. + +- The module option `services.xserver.xrandrHeads` now causes the first head specified in this list to be set as the primary head. Apart from that, it\'s now possible to also set additional options by using an attribute set, for example: + + ```nix + { services.xserver.xrandrHeads = [ + "HDMI-0" + { + output = "DVI-0"; + primary = true; + monitorConfig = '' + Option "Rotate" "right" + ''; + } + ]; + } + ``` + + This will set the `DVI-0` output to be the primary head, even though `HDMI-0` is the first head in the list. + +- The handling of SSL in the `services.nginx` module has been cleaned up, renaming the misnamed `enableSSL` to `onlySSL` which reflects its original intention. This is not to be used with the already existing `forceSSL` which creates a second non-SSL virtual host redirecting to the SSL virtual host. This by chance had worked earlier due to specific implementation details. In case you had specified both please remove the `enableSSL` option to keep the previous behaviour. + + Another `addSSL` option has been introduced to configure both a non-SSL virtual host and an SSL virtual host with the same configuration. + + Options to configure `resolver` options and `upstream` blocks have been introduced. See their information for further details. + + The `port` option has been replaced by a more generic `listen` option which makes it possible to specify multiple addresses, ports and SSL configs dependant on the new SSL handling mentioned above. + +## New Services {#sec-release-17.09-new-services} + +The following new services were added since the last release: + +- `config/fonts/fontconfig-penultimate.nix` + +- `config/fonts/fontconfig-ultimate.nix` + +- `config/terminfo.nix` + +- `hardware/sensor/iio.nix` + +- `hardware/nitrokey.nix` + +- `hardware/raid/hpsa.nix` + +- `programs/browserpass.nix` + +- `programs/gnupg.nix` + +- `programs/qt5ct.nix` + +- `programs/slock.nix` + +- `programs/thefuck.nix` + +- `security/auditd.nix` + +- `security/lock-kernel-modules.nix` + +- `service-managers/docker.nix` + +- `service-managers/trivial.nix` + +- `services/admin/salt/master.nix` + +- `services/admin/salt/minion.nix` + +- `services/audio/slimserver.nix` + +- `services/cluster/kubernetes/default.nix` + +- `services/cluster/kubernetes/dns.nix` + +- `services/cluster/kubernetes/dashboard.nix` + +- `services/continuous-integration/hail.nix` + +- `services/databases/clickhouse.nix` + +- `services/databases/postage.nix` + +- `services/desktops/gnome3/gnome-disks.nix` + +- `services/desktops/gnome3/gpaste.nix` + +- `services/logging/SystemdJournal2Gelf.nix` + +- `services/logging/heartbeat.nix` + +- `services/logging/journalwatch.nix` + +- `services/logging/syslogd.nix` + +- `services/mail/mailhog.nix` + +- `services/mail/nullmailer.nix` + +- `services/misc/airsonic.nix` + +- `services/misc/autorandr.nix` + +- `services/misc/exhibitor.nix` + +- `services/misc/fstrim.nix` + +- `services/misc/gollum.nix` + +- `services/misc/irkerd.nix` + +- `services/misc/jackett.nix` + +- `services/misc/radarr.nix` + +- `services/misc/snapper.nix` + +- `services/monitoring/osquery.nix` + +- `services/monitoring/prometheus/collectd-exporter.nix` + +- `services/monitoring/prometheus/fritzbox-exporter.nix` + +- `services/network-filesystems/kbfs.nix` + +- `services/networking/dnscache.nix` + +- `services/networking/fireqos.nix` + +- `services/networking/iwd.nix` + +- `services/networking/keepalived/default.nix` + +- `services/networking/keybase.nix` + +- `services/networking/lldpd.nix` + +- `services/networking/matterbridge.nix` + +- `services/networking/squid.nix` + +- `services/networking/tinydns.nix` + +- `services/networking/xrdp.nix` + +- `services/security/shibboleth-sp.nix` + +- `services/security/sks.nix` + +- `services/security/sshguard.nix` + +- `services/security/torify.nix` + +- `services/security/usbguard.nix` + +- `services/security/vault.nix` + +- `services/system/earlyoom.nix` + +- `services/system/saslauthd.nix` + +- `services/web-apps/nexus.nix` + +- `services/web-apps/pgpkeyserver-lite.nix` + +- `services/web-apps/piwik.nix` + +- `services/web-servers/lighttpd/collectd.nix` + +- `services/web-servers/minio.nix` + +- `services/x11/display-managers/xpra.nix` + +- `services/x11/xautolock.nix` + +- `tasks/filesystems/bcachefs.nix` + +- `tasks/powertop.nix` + +## Backward Incompatibilities {#sec-release-17.09-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- **In an Qemu-based virtualization environment, the network interface names changed from i.e. `enp0s3` to `ens3`.** + + This is due to a kernel configuration change. The new naming is consistent with those of other Linux distributions with systemd. See [\#29197](https://github.com/NixOS/nixpkgs/issues/29197) for more information. + + A machine is affected if the `virt-what` tool either returns `qemu` or `kvm` _and_ has interface names used in any part of its NixOS configuration, in particular if a static network configuration with `networking.interfaces` is used. + + Before rebooting affected machines, please ensure: + + - Change the interface names in your NixOS configuration. The first interface will be called `ens3`, the second one `ens8` and starting from there incremented by 1. + + - After changing the interface names, rebuild your system with `nixos-rebuild boot` to activate the new configuration after a reboot. If you switch to the new configuration right away you might lose network connectivity! If using `nixops`, deploy with `nixops deploy --force-reboot`. + +- The following changes apply if the `stateVersion` is changed to 17.09 or higher. For `stateVersion = "17.03"` or lower the old behavior is preserved. + + - The `postgres` default version was changed from 9.5 to 9.6. + + - The `postgres` superuser name has changed from `root` to `postgres` to more closely follow what other Linux distributions are doing. + + - The `postgres` default `dataDir` has changed from `/var/db/postgres` to `/var/lib/postgresql/$psqlSchema` where \$psqlSchema is 9.6 for example. + + - The `mysql` default `dataDir` has changed from `/var/mysql` to `/var/lib/mysql`. + + - Radicale\'s default package has changed from 1.x to 2.x. Instructions to migrate can be found [ here ](http://radicale.org/1to2/). It is also possible to use the newer version by setting the `package` to `radicale2`, which is done automatically when `stateVersion` is 17.09 or higher. The `extraArgs` option has been added to allow passing the data migration arguments specified in the instructions; see the `radicale.nix` NixOS test for an example migration. + +- The `aiccu` package was removed. This is due to SixXS [ sunsetting](https://www.sixxs.net/main/) its IPv6 tunnel. + +- The `fanctl` package and `fan` module have been removed due to the developers not upstreaming their iproute2 patches and lagging with compatibility to recent iproute2 versions. + +- Top-level `idea` package collection was renamed. All JetBrains IDEs are now at `jetbrains`. + +- `flexget`\'s state database cannot be upgraded to its new internal format, requiring removal of any existing `db-config.sqlite` which will be automatically recreated. + +- The `ipfs` service now doesn\'t ignore the `dataDir` option anymore. If you\'ve ever set this option to anything other than the default you\'ll have to either unset it (so the default gets used) or migrate the old data manually with + + ```ShellSession + dataDir= + mv /var/lib/ipfs/.ipfs/* $dataDir + rmdir /var/lib/ipfs/.ipfs + ``` + +- The `caddy` service was previously using an extra `.caddy` directory in the data directory specified with the `dataDir` option. The contents of the `.caddy` directory are now expected to be in the `dataDir`. + +- The `ssh-agent` user service is not started by default anymore. Use `programs.ssh.startAgent` to enable it if needed. There is also a new `programs.gnupg.agent` module that creates a `gpg-agent` user service. It can also serve as a SSH agent if `enableSSHSupport` is set. + +- The `services.tinc.networks..listenAddress` option had a misleading name that did not correspond to its behavior. It now correctly defines the ip to listen for incoming connections on. To keep the previous behaviour, use `services.tinc.networks..bindToAddress` instead. Refer to the description of the options for more details. + +- `tlsdate` package and module were removed. This is due to the project being dead and not building with openssl 1.1. + +- `wvdial` package and module were removed. This is due to the project being dead and not building with openssl 1.1. + +- `cc-wrapper`\'s setup-hook now exports a number of environment variables corresponding to binutils binaries, (e.g. `LD`, `STRIP`, `RANLIB`, etc). This is done to prevent packages\' build systems guessing, which is harder to predict, especially when cross-compiling. However, some packages have broken due to this---their build systems either not supporting, or claiming to support without adequate testing, taking such environment variables as parameters. + +- `services.firefox.syncserver` now runs by default as a non-root user. To accomodate this change, the default sqlite database location has also been changed. Migration should work automatically. Refer to the description of the options for more details. + +- The `compiz` window manager and package was removed. The system support had been broken for several years. + +- Touchpad support should now be enabled through `libinput` as `synaptics` is now deprecated. See the option `services.xserver.libinput.enable`. + +- grsecurity/PaX support has been dropped, following upstream\'s decision to cease free support. See [ upstream\'s announcement](https://grsecurity.net/passing_the_baton.php) for more information. No complete replacement for grsecurity/PaX is available presently. + +- `services.mysql` now has declarative configuration of databases and users with the `ensureDatabases` and `ensureUsers` options. + + These options will never delete existing databases and users, especially not when the value of the options are changed. + + The MySQL users will be identified using [ Unix socket authentication](https://mariadb.com/kb/en/library/authentication-plugin-unix-socket/). This authenticates the Unix user with the same name only, and that without the need for a password. + + If you have previously created a MySQL `root` user _with a password_, you will need to add `root` user for unix socket authentication before using the new options. This can be done by running the following SQL script: + + ```SQL + CREATE USER 'root'@'%' IDENTIFIED BY ''; + GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' WITH GRANT OPTION; + FLUSH PRIVILEGES; + + -- Optionally, delete the password-authenticated user: + -- DROP USER 'root'@'localhost'; + ``` + +- `services.mysqlBackup` now works by default without any user setup, including for users other than `mysql`. + + By default, the `mysql` user is no longer the user which performs the backup. Instead a system account `mysqlbackup` is used. + + The `mysqlBackup` service is also now using systemd timers instead of `cron`. + + Therefore, the `services.mysqlBackup.period` option no longer exists, and has been replaced with `services.mysqlBackup.calendar`, which is in the format of [systemd.time(7)](https://www.freedesktop.org/software/systemd/man/systemd.time.html#Calendar%20Events). + + If you expect to be sent an e-mail when the backup fails, consider using a script which monitors the systemd journal for errors. Regretfully, at present there is no built-in functionality for this. + + You can check that backups still work by running `systemctl start mysql-backup` then `systemctl status mysql-backup`. + +- Templated systemd services e.g `container@name` are now handled currectly when switching to a new configuration, resulting in them being reloaded. + +- Steam: the `newStdcpp` parameter was removed and should not be needed anymore. + +- Redis has been updated to version 4 which mandates a cluster mass-restart, due to changes in the network handling, in order to ensure compatibility with networks NATing traffic. + +## Other Notable Changes {#sec-release-17.09-notable-changes} + +- Modules can now be disabled by using [ disabledModules](https://nixos.org/nixpkgs/manual/#sec-replace-modules), allowing another to take it\'s place. This can be used to import a set of modules from another channel while keeping the rest of the system on a stable release. + +- Updated to FreeType 2.7.1, including a new TrueType engine. The new engine replaces the Infinality engine which was the default in NixOS. The default font rendering settings are now provided by fontconfig-penultimate, replacing fontconfig-ultimate; the new defaults are less invasive and provide rendering that is more consistent with other systems and hopefully with each font designer\'s intent. Some system-wide configuration has been removed from the Fontconfig NixOS module where user Fontconfig settings are available. + +- ZFS/SPL have been updated to 0.7.0, `zfsUnstable, splUnstable` have therefore been removed. + +- The `time.timeZone` option now allows the value `null` in addition to timezone strings. This value allows changing the timezone of a system imperatively using `timedatectl set-timezone`. The default timezone is still UTC. + +- Nixpkgs overlays may now be specified with a file as well as a directory. The value of `` may be a file, and `~/.config/nixpkgs/overlays.nix` can be used instead of the `~/.config/nixpkgs/overlays` directory. + + See the overlays chapter of the Nixpkgs manual for more details. + +- Definitions for `/etc/hosts` can now be specified declaratively with `networking.hosts`. + +- Two new options have been added to the installer loader, in addition to the default having changed. The kernel log verbosity has been lowered to the upstream default for the default options, in order to not spam the console when e.g. joining a network. + + This therefore leads to adding a new `debug` option to set the log level to the previous verbose mode, to make debugging easier, but still accessible easily. + + Additionally a `copytoram` option has been added, which makes it possible to remove the install medium after booting. This allows tethering from your phone after booting from it. + +- `services.gitlab-runner.configOptions` has been added to specify the configuration of gitlab-runners declaratively. + +- `services.jenkins.plugins` has been added to install plugins easily, this can be generated with jenkinsPlugins2nix. + +- `services.postfix.config` has been added to specify the main.cf with NixOS options. Additionally other options have been added to the postfix module and has been improved further. + +- The GitLab package and module have been updated to the latest 10.0 release. + +- The `systemd-boot` boot loader now lists the NixOS version, kernel version and build date of all bootable generations. + +- The dnscrypt-proxy service now defaults to using a random upstream resolver, selected from the list of public non-logging resolvers with DNSSEC support. Existing configurations can be migrated to this mode of operation by omitting the `services.dnscrypt-proxy.resolverName` option or setting it to `"random"`. diff --git a/nixos/doc/manual/release-notes/rl-1709.xml b/nixos/doc/manual/release-notes/rl-1709.xml deleted file mode 100644 index 795c51d2923..00000000000 --- a/nixos/doc/manual/release-notes/rl-1709.xml +++ /dev/null @@ -1,899 +0,0 @@ -
- Release 17.09 (“Hummingbird”, 2017/09/??) - -
- Highlights - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - The GNOME version is now 3.24. KDE Plasma was upgraded to 5.10, KDE - Applications to 17.08.1 and KDE Frameworks to 5.37. - - - - - The user handling now keeps track of deallocated UIDs/GIDs. When a user or - group is revived, this allows it to be allocated the UID/GID it had - before. A consequence is that UIDs and GIDs are no longer reused. - - - - - The module option now causes - the first head specified in this list to be set as the primary head. Apart - from that, it's now possible to also set additional options by using an - attribute set, for example: - -{ services.xserver.xrandrHeads = [ - "HDMI-0" - { - output = "DVI-0"; - primary = true; - monitorConfig = '' - Option "Rotate" "right" - ''; - } - ]; -} - - This will set the DVI-0 output to be the primary head, - even though HDMI-0 is the first head in the list. - - - - - The handling of SSL in the services.nginx module has - been cleaned up, renaming the misnamed enableSSL to - onlySSL which reflects its original intention. This is - not to be used with the already existing forceSSL which - creates a second non-SSL virtual host redirecting to the SSL virtual host. - This by chance had worked earlier due to specific implementation details. - In case you had specified both please remove the - enableSSL option to keep the previous behaviour. - - - Another addSSL option has been introduced to configure - both a non-SSL virtual host and an SSL virtual host with the same - configuration. - - - Options to configure resolver options and - upstream blocks have been introduced. See their - information for further details. - - - The port option has been replaced by a more generic - listen option which makes it possible to specify - multiple addresses, ports and SSL configs dependant on the new SSL - handling mentioned above. - - - -
- -
- New Services - - - The following new services were added since the last release: - - - - - - config/fonts/fontconfig-penultimate.nix - - - - - config/fonts/fontconfig-ultimate.nix - - - - - config/terminfo.nix - - - - - hardware/sensor/iio.nix - - - - - hardware/nitrokey.nix - - - - - hardware/raid/hpsa.nix - - - - - programs/browserpass.nix - - - - - programs/gnupg.nix - - - - - programs/qt5ct.nix - - - - - programs/slock.nix - - - - - programs/thefuck.nix - - - - - security/auditd.nix - - - - - security/lock-kernel-modules.nix - - - - - service-managers/docker.nix - - - - - service-managers/trivial.nix - - - - - services/admin/salt/master.nix - - - - - services/admin/salt/minion.nix - - - - - services/audio/slimserver.nix - - - - - services/cluster/kubernetes/default.nix - - - - - services/cluster/kubernetes/dns.nix - - - - - services/cluster/kubernetes/dashboard.nix - - - - - services/continuous-integration/hail.nix - - - - - services/databases/clickhouse.nix - - - - - services/databases/postage.nix - - - - - services/desktops/gnome3/gnome-disks.nix - - - - - services/desktops/gnome3/gpaste.nix - - - - - services/logging/SystemdJournal2Gelf.nix - - - - - services/logging/heartbeat.nix - - - - - services/logging/journalwatch.nix - - - - - services/logging/syslogd.nix - - - - - services/mail/mailhog.nix - - - - - services/mail/nullmailer.nix - - - - - services/misc/airsonic.nix - - - - - services/misc/autorandr.nix - - - - - services/misc/exhibitor.nix - - - - - services/misc/fstrim.nix - - - - - services/misc/gollum.nix - - - - - services/misc/irkerd.nix - - - - - services/misc/jackett.nix - - - - - services/misc/radarr.nix - - - - - services/misc/snapper.nix - - - - - services/monitoring/osquery.nix - - - - - services/monitoring/prometheus/collectd-exporter.nix - - - - - services/monitoring/prometheus/fritzbox-exporter.nix - - - - - services/network-filesystems/kbfs.nix - - - - - services/networking/dnscache.nix - - - - - services/networking/fireqos.nix - - - - - services/networking/iwd.nix - - - - - services/networking/keepalived/default.nix - - - - - services/networking/keybase.nix - - - - - services/networking/lldpd.nix - - - - - services/networking/matterbridge.nix - - - - - services/networking/squid.nix - - - - - services/networking/tinydns.nix - - - - - services/networking/xrdp.nix - - - - - services/security/shibboleth-sp.nix - - - - - services/security/sks.nix - - - - - services/security/sshguard.nix - - - - - services/security/torify.nix - - - - - services/security/usbguard.nix - - - - - services/security/vault.nix - - - - - services/system/earlyoom.nix - - - - - services/system/saslauthd.nix - - - - - services/web-apps/nexus.nix - - - - - services/web-apps/pgpkeyserver-lite.nix - - - - - services/web-apps/piwik.nix - - - - - services/web-servers/lighttpd/collectd.nix - - - - - services/web-servers/minio.nix - - - - - services/x11/display-managers/xpra.nix - - - - - services/x11/xautolock.nix - - - - - tasks/filesystems/bcachefs.nix - - - - - tasks/powertop.nix - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - In an Qemu-based virtualization environment, the - network interface names changed from i.e. enp0s3 to - ens3. - - - This is due to a kernel configuration change. The new naming is consistent - with those of other Linux distributions with systemd. See - #29197 - for more information. - - - A machine is affected if the virt-what tool either - returns qemu or kvm - and has interface names used in any part of its NixOS - configuration, in particular if a static network configuration with - networking.interfaces is used. - - - Before rebooting affected machines, please ensure: - - - - Change the interface names in your NixOS configuration. The first - interface will be called ens3, the second one - ens8 and starting from there incremented by 1. - - - - - After changing the interface names, rebuild your system with - nixos-rebuild boot to activate the new configuration - after a reboot. If you switch to the new configuration right away you - might lose network connectivity! If using nixops, - deploy with nixops deploy --force-reboot. - - - - - - - - The following changes apply if the stateVersion is - changed to 17.09 or higher. For stateVersion = "17.03" - or lower the old behavior is preserved. - - - - - The postgres default version was changed from 9.5 to - 9.6. - - - - - The postgres superuser name has changed from - root to postgres to more closely - follow what other Linux distributions are doing. - - - - - The postgres default dataDir has - changed from /var/db/postgres to - /var/lib/postgresql/$psqlSchema where $psqlSchema is - 9.6 for example. - - - - - The mysql default dataDir has - changed from /var/mysql to - /var/lib/mysql. - - - - - Radicale's default package has changed from 1.x to 2.x. Instructions to - migrate can be found here - . It is also possible to use the newer version by setting the - package to radicale2, which is - done automatically when stateVersion is 17.09 or - higher. The extraArgs option has been added to allow - passing the data migration arguments specified in the instructions; see - the - radicale.nix - NixOS test for an example migration. - - - - - - - The aiccu package was removed. This is due to SixXS - sunsetting its IPv6 - tunnel. - - - - - The fanctl package and fan module - have been removed due to the developers not upstreaming their iproute2 - patches and lagging with compatibility to recent iproute2 versions. - - - - - Top-level idea package collection was renamed. All - JetBrains IDEs are now at jetbrains. - - - - - flexget's state database cannot be upgraded to its new - internal format, requiring removal of any existing - db-config.sqlite which will be automatically recreated. - - - - - The ipfs service now doesn't ignore the - dataDir option anymore. If you've ever set this option - to anything other than the default you'll have to either unset it (so the - default gets used) or migrate the old data manually with - -dataDir=<valueOfDataDir> -mv /var/lib/ipfs/.ipfs/* $dataDir -rmdir /var/lib/ipfs/.ipfs - - - - - - The caddy service was previously using an extra - .caddy directory in the data directory specified with - the dataDir option. The contents of the - .caddy directory are now expected to be in the - dataDir. - - - - - The ssh-agent user service is not started by default - anymore. Use programs.ssh.startAgent to enable it if - needed. There is also a new programs.gnupg.agent module - that creates a gpg-agent user service. It can also - serve as a SSH agent if enableSSHSupport is set. - - - - - The services.tinc.networks.<name>.listenAddress - option had a misleading name that did not correspond to its behavior. It - now correctly defines the ip to listen for incoming connections on. To - keep the previous behaviour, use - services.tinc.networks.<name>.bindToAddress - instead. Refer to the description of the options for more details. - - - - - tlsdate package and module were removed. This is due to - the project being dead and not building with openssl 1.1. - - - - - wvdial package and module were removed. This is due to - the project being dead and not building with openssl 1.1. - - - - - cc-wrapper's setup-hook now exports a number of - environment variables corresponding to binutils binaries, (e.g. - LD, STRIP, RANLIB, etc). This - is done to prevent packages' build systems guessing, which is harder to - predict, especially when cross-compiling. However, some packages have - broken due to this—their build systems either not supporting, or - claiming to support without adequate testing, taking such environment - variables as parameters. - - - - - services.firefox.syncserver now runs by default as a - non-root user. To accomodate this change, the default sqlite database - location has also been changed. Migration should work automatically. Refer - to the description of the options for more details. - - - - - The compiz window manager and package was removed. The - system support had been broken for several years. - - - - - Touchpad support should now be enabled through libinput - as synaptics is now deprecated. See the option - services.xserver.libinput.enable. - - - - - grsecurity/PaX support has been dropped, following upstream's decision to - cease free support. See - - upstream's announcement for more information. No complete - replacement for grsecurity/PaX is available presently. - - - - - services.mysql now has declarative configuration of - databases and users with the ensureDatabases and - ensureUsers options. - - - These options will never delete existing databases and users, especially - not when the value of the options are changed. - - - The MySQL users will be identified using - - Unix socket authentication. This authenticates the Unix user with - the same name only, and that without the need for a password. - - - If you have previously created a MySQL root user - with a password, you will need to add - root user for unix socket authentication before using - the new options. This can be done by running the following SQL script: - -CREATE USER 'root'@'%' IDENTIFIED BY ''; -GRANT ALL PRIVILEGES ON *.* TO 'root'@'%' WITH GRANT OPTION; -FLUSH PRIVILEGES; - --- Optionally, delete the password-authenticated user: --- DROP USER 'root'@'localhost'; - - - - - - services.mysqlBackup now works by default without any - user setup, including for users other than mysql. - - - By default, the mysql user is no longer the user which - performs the backup. Instead a system account - mysqlbackup is used. - - - The mysqlBackup service is also now using systemd - timers instead of cron. - - - Therefore, the services.mysqlBackup.period option no - longer exists, and has been replaced with - services.mysqlBackup.calendar, which is in the format - of - systemd.time(7). - - - If you expect to be sent an e-mail when the backup fails, consider using a - script which monitors the systemd journal for errors. Regretfully, at - present there is no built-in functionality for this. - - - You can check that backups still work by running systemctl start - mysql-backup then systemctl status - mysql-backup. - - - - - Templated systemd services e.g container@name are now - handled currectly when switching to a new configuration, resulting in them - being reloaded. - - - - - Steam: the newStdcpp parameter was removed and should - not be needed anymore. - - - - - Redis has been updated to version 4 which mandates a cluster mass-restart, - due to changes in the network handling, in order to ensure compatibility - with networks NATing traffic. - - - -
- -
- Other Notable Changes - - - - - Modules can now be disabled by using - - disabledModules, allowing another to take it's place. This can be - used to import a set of modules from another channel while keeping the - rest of the system on a stable release. - - - - - Updated to FreeType 2.7.1, including a new TrueType engine. The new engine - replaces the Infinality engine which was the default in NixOS. The default - font rendering settings are now provided by fontconfig-penultimate, - replacing fontconfig-ultimate; the new defaults are less invasive and - provide rendering that is more consistent with other systems and hopefully - with each font designer's intent. Some system-wide configuration has been - removed from the Fontconfig NixOS module where user Fontconfig settings - are available. - - - - - ZFS/SPL have been updated to 0.7.0, zfsUnstable, - splUnstable have therefore been removed. - - - - - The option now allows the value - null in addition to timezone strings. This value allows - changing the timezone of a system imperatively using timedatectl - set-timezone. The default timezone is still UTC. - - - - - Nixpkgs overlays may now be specified with a file as well as a directory. - The value of <nixpkgs-overlays> may be a file, and - ~/.config/nixpkgs/overlays.nix can be used instead of - the ~/.config/nixpkgs/overlays directory. - - - See the overlays chapter of the Nixpkgs manual for more details. - - - - - Definitions for /etc/hosts can now be specified - declaratively with networking.hosts. - - - - - Two new options have been added to the installer loader, in addition to - the default having changed. The kernel log verbosity has been lowered to - the upstream default for the default options, in order to not spam the - console when e.g. joining a network. - - - This therefore leads to adding a new debug option to - set the log level to the previous verbose mode, to make debugging easier, - but still accessible easily. - - - Additionally a copytoram option has been added, which - makes it possible to remove the install medium after booting. This allows - tethering from your phone after booting from it. - - - - - services.gitlab-runner.configOptions has been added to - specify the configuration of gitlab-runners declaratively. - - - - - services.jenkins.plugins has been added to install - plugins easily, this can be generated with jenkinsPlugins2nix. - - - - - services.postfix.config has been added to specify the - main.cf with NixOS options. Additionally other options have been added to - the postfix module and has been improved further. - - - - - The GitLab package and module have been updated to the latest 10.0 - release. - - - - - The systemd-boot boot loader now lists the NixOS - version, kernel version and build date of all bootable generations. - - - - - The dnscrypt-proxy service now defaults to using a random upstream - resolver, selected from the list of public non-logging resolvers with - DNSSEC support. Existing configurations can be migrated to this mode of - operation by omitting the - option or setting it - to "random". - - - -
-
diff --git a/nixos/doc/manual/release-notes/rl-1803.section.md b/nixos/doc/manual/release-notes/rl-1803.section.md new file mode 100644 index 00000000000..e4e46798104 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1803.section.md @@ -0,0 +1,284 @@ +# Release 18.03 ("Impala", 2018/04/04) {#sec-release-18.03} + +## Highlights {#sec-release-18.03-highlights} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- End of support is planned for end of October 2018, handing over to 18.09. + +- Platform support: x86_64-linux and x86_64-darwin since release time (the latter isn\'t NixOS, really). Binaries for aarch64-linux are available, but no channel exists yet, as it\'s waiting for some test fixes, etc. + +- Nix now defaults to 2.0; see its [release notes](https://nixos.org/nix/manual/#ssec-relnotes-2.0). + +- Core version changes: linux: 4.9 -\> 4.14, glibc: 2.25 -\> 2.26, gcc: 6 -\> 7, systemd: 234 -\> 237. + +- Desktop version changes: gnome: 3.24 -\> 3.26, (KDE) plasma-desktop: 5.10 -\> 5.12. + +- MariaDB 10.2, updated from 10.1, is now the default MySQL implementation. While upgrading a few changes have been made to the infrastructure involved: + + - `libmysql` has been deprecated, please use `mysql.connector-c` instead, a compatibility passthru has been added to the MySQL packages. + + - The `mysql57` package has a new `static` output containing the static libraries including `libmysqld.a` + +- PHP now defaults to PHP 7.2, updated from 7.1. + +## New Services {#sec-release-18.03-new-services} + +The following new services were added since the last release: + +- `./config/krb5/default.nix` + +- `./hardware/digitalbitbox.nix` + +- `./misc/label.nix` + +- `./programs/ccache.nix` + +- `./programs/criu.nix` + +- `./programs/digitalbitbox/default.nix` + +- `./programs/less.nix` + +- `./programs/npm.nix` + +- `./programs/plotinus.nix` + +- `./programs/rootston.nix` + +- `./programs/systemtap.nix` + +- `./programs/sway.nix` + +- `./programs/udevil.nix` + +- `./programs/way-cooler.nix` + +- `./programs/yabar.nix` + +- `./programs/zsh/zsh-autoenv.nix` + +- `./services/backup/borgbackup.nix` + +- `./services/backup/crashplan-small-business.nix` + +- `./services/desktops/dleyna-renderer.nix` + +- `./services/desktops/dleyna-server.nix` + +- `./services/desktops/pipewire.nix` + +- `./services/desktops/gnome3/chrome-gnome-shell.nix` + +- `./services/desktops/gnome3/tracker-miners.nix` + +- `./services/hardware/fwupd.nix` + +- `./services/hardware/interception-tools.nix` + +- `./services/hardware/u2f.nix` + +- `./services/hardware/usbmuxd.nix` + +- `./services/mail/clamsmtp.nix` + +- `./services/mail/dkimproxy-out.nix` + +- `./services/mail/pfix-srsd.nix` + +- `./services/misc/gitea.nix` + +- `./services/misc/home-assistant.nix` + +- `./services/misc/ihaskell.nix` + +- `./services/misc/logkeys.nix` + +- `./services/misc/novacomd.nix` + +- `./services/misc/osrm.nix` + +- `./services/misc/plexpy.nix` + +- `./services/misc/pykms.nix` + +- `./services/misc/tzupdate.nix` + +- `./services/monitoring/fusion-inventory.nix` + +- `./services/monitoring/prometheus/exporters.nix` + +- `./services/network-filesystems/beegfs.nix` + +- `./services/network-filesystems/davfs2.nix` + +- `./services/network-filesystems/openafs/client.nix` + +- `./services/network-filesystems/openafs/server.nix` + +- `./services/network-filesystems/ceph.nix` + +- `./services/networking/aria2.nix` + +- `./services/networking/monero.nix` + +- `./services/networking/nghttpx/default.nix` + +- `./services/networking/nixops-dns.nix` + +- `./services/networking/rxe.nix` + +- `./services/networking/stunnel.nix` + +- `./services/web-apps/matomo.nix` + +- `./services/web-apps/restya-board.nix` + +- `./services/web-servers/mighttpd2.nix` + +- `./services/x11/fractalart.nix` + +- `./system/boot/binfmt.nix` + +- `./system/boot/grow-partition.nix` + +- `./tasks/filesystems/ecryptfs.nix` + +- `./virtualisation/hyperv-guest.nix` + +## Backward Incompatibilities {#sec-release-18.03-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- `sound.enable` now defaults to false. + +- Dollar signs in options under `services.postfix` are passed verbatim to Postfix, which will interpret them as the beginning of a parameter expression. This was already true for string-valued options in the previous release, but not for list-valued options. If you need to pass literal dollar signs through Postfix, double them. + +- The `postage` package (for web-based PostgreSQL administration) has been renamed to `pgmanage`. The corresponding module has also been renamed. To migrate please rename all `services.postage` options to `services.pgmanage`. + +- Package attributes starting with a digit have been prefixed with an underscore sign. This is to avoid quoting in the configuration and other issues with command-line tools like `nix-env`. The change affects the following packages: + + - `2048-in-terminal` → `_2048-in-terminal` + + - `90secondportraits` → `_90secondportraits` + + - `2bwm` → `_2bwm` + + - `389-ds-base` → `_389-ds-base` + +- **The OpenSSH service no longer enables support for DSA keys by default, which could cause a system lock out. Update your keys or, unfavorably, re-enable DSA support manually.** + + DSA support was [deprecated in OpenSSH 7.0](https://www.openssh.com/legacy.html), due to it being too weak. To re-enable support, add `PubkeyAcceptedKeyTypes +ssh-dss` to the end of your `services.openssh.extraConfig`. + + After updating the keys to be stronger, anyone still on a pre-17.03 version is safe to jump to 17.03, as vetted [here](https://search.nix.gsc.io/?q=stateVersion). + +- The `openssh` package now includes Kerberos support by default; the `openssh_with_kerberos` package is now a deprecated alias. If you do not want Kerberos support, you can do `openssh.override { withKerberos = false; }`. Note, this also applies to the `openssh_hpn` package. + +- `cc-wrapper` has been split in two; there is now also a `bintools-wrapper`. The most commonly used files in `nix-support` are now split between the two wrappers. Some commonly used ones, like `nix-support/dynamic-linker`, are duplicated for backwards compatability, even though they rightly belong only in `bintools-wrapper`. Other more obscure ones are just moved. + +- The propagation logic has been changed. The new logic, along with new types of dependencies that go with, is thoroughly documented in the \"Specifying dependencies\" section of the \"Standard Environment\" chapter of the nixpkgs manual. The old logic isn\'t but is easy to describe: dependencies were propagated as the same type of dependency no matter what. In practice, that means that many `propagatedNativeBuildInputs` should instead be `propagatedBuildInputs`. Thankfully, that was and is the least used type of dependency. Also, it means that some `propagatedBuildInputs` should instead be `depsTargetTargetPropagated`. Other types dependencies should be unaffected. + +- `lib.addPassthru drv passthru` is removed. Use `lib.extendDerivation true passthru drv` instead. + +- The `memcached` service no longer accept dynamic socket paths via `services.memcached.socket`. Unix sockets can be still enabled by `services.memcached.enableUnixSocket` and will be accessible at `/run/memcached/memcached.sock`. + +- The `hardware.amdHybridGraphics.disable` option was removed for lack of a maintainer. If you still need this module, you may wish to include a copy of it from an older version of nixos in your imports. + +- The merging of config options for `services.postfix.config` was buggy. Previously, if other options in the Postfix module like `services.postfix.useSrs` were set and the user set config options that were also set by such options, the resulting config wouldn\'t include all options that were needed. They are now merged correctly. If config options need to be overridden, `lib.mkForce` or `lib.mkOverride` can be used. + +- The following changes apply if the `stateVersion` is changed to 18.03 or higher. For `stateVersion = "17.09"` or lower the old behavior is preserved. + + - `matrix-synapse` uses postgresql by default instead of sqlite. Migration instructions can be found [ here ](https://github.com/matrix-org/synapse/blob/master/docs/postgres.rst#porting-from-sqlite). + +- The `jid` package has been removed, due to maintenance overhead of a go package having non-versioned dependencies. + +- When using `services.xserver.libinput` (enabled by default in GNOME), it now handles all input devices, not just touchpads. As a result, you might need to re-evaluate any custom Xorg configuration. In particular, `Option "XkbRules" "base"` may result in broken keyboard layout. + +- The `attic` package was removed. A maintained fork called [Borg](https://www.borgbackup.org/) should be used instead. Migration instructions can be found [here](http://borgbackup.readthedocs.io/en/stable/usage/upgrade.html#attic-and-borg-0-xx-to-borg-1-x). + +- The Piwik analytics software was renamed to Matomo: + + - The package `pkgs.piwik` was renamed to `pkgs.matomo`. + + - The service `services.piwik` was renamed to `services.matomo`. + + - The data directory `/var/lib/piwik` was renamed to `/var/lib/matomo`. All files will be moved automatically on first startup, but you might need to adjust your backup scripts. + + - The default `serverName` for the nginx configuration changed from `piwik.${config.networking.hostName}` to `matomo.${config.networking.hostName}.${config.networking.domain}` if `config.networking.domain` is set, `matomo.${config.networking.hostName}` if it is not set. If you change your `serverName`, remember you\'ll need to update the `trustedHosts[]` array in `/var/lib/matomo/config/config.ini.php` as well. + + - The `piwik` user was renamed to `matomo`. The service will adjust ownership automatically for files in the data directory. If you use unix socket authentication, remember to give the new `matomo` user access to the database and to change the `username` to `matomo` in the `[database]` section of `/var/lib/matomo/config/config.ini.php`. + + - If you named your database \`piwik\`, you might want to rename it to \`matomo\` to keep things clean, but this is neither enforced nor required. + +- `nodejs-4_x` is end-of-life. `nodejs-4_x`, `nodejs-slim-4_x` and `nodePackages_4_x` are removed. + +- The `pump.io` NixOS module was removed. It is now maintained as an [external module](https://github.com/rvl/pump.io-nixos). + +- The Prosody XMPP server has received a major update. The following modules were renamed: + + - `services.prosody.modules.httpserver` is now `services.prosody.modules.http_files` + + - `services.prosody.modules.console` is now `services.prosody.modules.admin_telnet` + + Many new modules are now core modules, most notably `services.prosody.modules.carbons` and `services.prosody.modules.mam`. + + The better-performing `libevent` backend is now enabled by default. + + `withCommunityModules` now passes through the modules to `services.prosody.extraModules`. Use `withOnlyInstalledCommunityModules` for modules that should not be enabled directly, e.g `lib_ldap`. + +- All prometheus exporter modules are now defined as submodules. The exporters are configured using `services.prometheus.exporters`. + +## Other Notable Changes {#sec-release-18.03-notable-changes} + +- ZNC option `services.znc.mutable` now defaults to `true`. That means that old configuration is not overwritten by default when update to the znc options are made. + +- The option `networking.wireless.networks..auth` has been added for wireless networks with WPA-Enterprise authentication. There is also a new `extraConfig` option to directly configure `wpa_supplicant` and `hidden` to connect to hidden networks. + +- In the module `networking.interfaces.` the following options have been removed: + + - `ipAddress` + + - `ipv6Address` + + - `prefixLength` + + - `ipv6PrefixLength` + + - `subnetMask` + + To assign static addresses to an interface the options `ipv4.addresses` and `ipv6.addresses` should be used instead. The options `ip4` and `ip6` have been renamed to `ipv4.addresses` `ipv6.addresses` respectively. The new options `ipv4.routes` and `ipv6.routes` have been added to set up static routing. + +- The option `services.logstash.listenAddress` is now `127.0.0.1` by default. Previously the default behaviour was to listen on all interfaces. + +- `services.btrfs.autoScrub` has been added, to periodically check btrfs filesystems for data corruption. If there\'s a correct copy available, it will automatically repair corrupted blocks. + +- `displayManager.lightdm.greeters.gtk.clock-format.` has been added, the clock format string (as expected by strftime, e.g. `%H:%M`) to use with the lightdm gtk greeter panel. + + If set to null the default clock format is used. + +- `displayManager.lightdm.greeters.gtk.indicators` has been added, a list of allowed indicator modules to use with the lightdm gtk greeter panel. + + Built-in indicators include `~a11y`, `~language`, `~session`, `~power`, `~clock`, `~host`, `~spacer`. Unity indicators can be represented by short name (e.g. `sound`, `power`), service file name, or absolute path. + + If set to `null` the default indicators are used. + + In order to have the previous default configuration add + + ```nix + { + services.xserver.displayManager.lightdm.greeters.gtk.indicators = [ + "~host" "~spacer" + "~clock" "~spacer" + "~session" + "~language" + "~a11y" + "~power" + ]; + } + ``` + + to your `configuration.nix`. + +- The NixOS test driver supports user services declared by `systemd.user.services`. The methods `waitForUnit`, `getUnitInfo`, `startJob` and `stopJob` provide an optional `$user` argument for that purpose. + +- Enabling bash completion on NixOS, `programs.bash.enableCompletion`, will now also enable completion for the Nix command line tools by installing the [nix-bash-completions](https://github.com/hedning/nix-bash-completions) package. diff --git a/nixos/doc/manual/release-notes/rl-1803.xml b/nixos/doc/manual/release-notes/rl-1803.xml deleted file mode 100644 index c14679eea07..00000000000 --- a/nixos/doc/manual/release-notes/rl-1803.xml +++ /dev/null @@ -1,855 +0,0 @@ -
- Release 18.03 (“Impala”, 2018/04/04) - -
- Highlights - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - End of support is planned for end of October 2018, handing over to 18.09. - - - - - Platform support: x86_64-linux and x86_64-darwin since release time (the - latter isn't NixOS, really). Binaries for aarch64-linux are available, but - no channel exists yet, as it's waiting for some test fixes, etc. - - - - - Nix now defaults to 2.0; see its - release - notes. - - - - - Core version changes: linux: 4.9 -> 4.14, glibc: 2.25 -> 2.26, gcc: 6 -> - 7, systemd: 234 -> 237. - - - - - Desktop version changes: gnome: 3.24 -> 3.26, (KDE) plasma-desktop: 5.10 - -> 5.12. - - - - - MariaDB 10.2, updated from 10.1, is now the default MySQL implementation. - While upgrading a few changes have been made to the infrastructure - involved: - - - - libmysql has been deprecated, please use - mysql.connector-c instead, a compatibility passthru - has been added to the MySQL packages. - - - - - The mysql57 package has a new - static output containing the static libraries - including libmysqld.a - - - - - - - - PHP now defaults to PHP 7.2, updated from 7.1. - - - -
- -
- New Services - - - The following new services were added since the last release: - - - - - - ./config/krb5/default.nix - - - - - ./hardware/digitalbitbox.nix - - - - - ./misc/label.nix - - - - - ./programs/ccache.nix - - - - - ./programs/criu.nix - - - - - ./programs/digitalbitbox/default.nix - - - - - ./programs/less.nix - - - - - ./programs/npm.nix - - - - - ./programs/plotinus.nix - - - - - ./programs/rootston.nix - - - - - ./programs/systemtap.nix - - - - - ./programs/sway.nix - - - - - ./programs/udevil.nix - - - - - ./programs/way-cooler.nix - - - - - ./programs/yabar.nix - - - - - ./programs/zsh/zsh-autoenv.nix - - - - - ./services/backup/borgbackup.nix - - - - - ./services/backup/crashplan-small-business.nix - - - - - ./services/desktops/dleyna-renderer.nix - - - - - ./services/desktops/dleyna-server.nix - - - - - ./services/desktops/pipewire.nix - - - - - ./services/desktops/gnome3/chrome-gnome-shell.nix - - - - - ./services/desktops/gnome3/tracker-miners.nix - - - - - ./services/hardware/fwupd.nix - - - - - ./services/hardware/interception-tools.nix - - - - - ./services/hardware/u2f.nix - - - - - ./services/hardware/usbmuxd.nix - - - - - ./services/mail/clamsmtp.nix - - - - - ./services/mail/dkimproxy-out.nix - - - - - ./services/mail/pfix-srsd.nix - - - - - ./services/misc/gitea.nix - - - - - ./services/misc/home-assistant.nix - - - - - ./services/misc/ihaskell.nix - - - - - ./services/misc/logkeys.nix - - - - - ./services/misc/novacomd.nix - - - - - ./services/misc/osrm.nix - - - - - ./services/misc/plexpy.nix - - - - - ./services/misc/pykms.nix - - - - - ./services/misc/tzupdate.nix - - - - - ./services/monitoring/fusion-inventory.nix - - - - - ./services/monitoring/prometheus/exporters.nix - - - - - ./services/network-filesystems/beegfs.nix - - - - - ./services/network-filesystems/davfs2.nix - - - - - ./services/network-filesystems/openafs/client.nix - - - - - ./services/network-filesystems/openafs/server.nix - - - - - ./services/network-filesystems/ceph.nix - - - - - ./services/networking/aria2.nix - - - - - ./services/networking/monero.nix - - - - - ./services/networking/nghttpx/default.nix - - - - - ./services/networking/nixops-dns.nix - - - - - ./services/networking/rxe.nix - - - - - ./services/networking/stunnel.nix - - - - - ./services/web-apps/matomo.nix - - - - - ./services/web-apps/restya-board.nix - - - - - ./services/web-servers/mighttpd2.nix - - - - - ./services/x11/fractalart.nix - - - - - ./system/boot/binfmt.nix - - - - - ./system/boot/grow-partition.nix - - - - - ./tasks/filesystems/ecryptfs.nix - - - - - ./virtualisation/hyperv-guest.nix - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - sound.enable now defaults to false. - - - - - Dollar signs in options under are passed - verbatim to Postfix, which will interpret them as the beginning of a - parameter expression. This was already true for string-valued options in - the previous release, but not for list-valued options. If you need to pass - literal dollar signs through Postfix, double them. - - - - - The postage package (for web-based PostgreSQL - administration) has been renamed to pgmanage. The - corresponding module has also been renamed. To migrate please rename all - options to - . - - - - - Package attributes starting with a digit have been prefixed with an - underscore sign. This is to avoid quoting in the configuration and other - issues with command-line tools like nix-env. The change - affects the following packages: - - - - 2048-in-terminal → - _2048-in-terminal - - - - - 90secondportraits → - _90secondportraits - - - - - 2bwm_2bwm - - - - - 389-ds-base_389-ds-base - - - - - - - - The OpenSSH service no longer enables support for - DSA keys by default, which could cause a system lock out. Update your keys - or, unfavorably, re-enable DSA support manually. - - - DSA support was - deprecated in - OpenSSH 7.0, due to it being too weak. To re-enable support, add - PubkeyAcceptedKeyTypes +ssh-dss to the end of your - . - - - After updating the keys to be stronger, anyone still on a pre-17.03 - version is safe to jump to 17.03, as vetted - here. - - - - - The openssh package now includes Kerberos support by - default; the openssh_with_kerberos package is now a - deprecated alias. If you do not want Kerberos support, you can do - openssh.override { withKerberos = false; }. Note, this - also applies to the openssh_hpn package. - - - - - cc-wrapper has been split in two; there is now also a - bintools-wrapper. The most commonly used files in - nix-support are now split between the two wrappers. - Some commonly used ones, like - nix-support/dynamic-linker, are duplicated for - backwards compatability, even though they rightly belong only in - bintools-wrapper. Other more obscure ones are just - moved. - - - - - The propagation logic has been changed. The new logic, along with new - types of dependencies that go with, is thoroughly documented in the - "Specifying dependencies" section of the "Standard Environment" chapter of - the nixpkgs manual. - - The old logic isn't but is easy to describe: dependencies were propagated - as the same type of dependency no matter what. In practice, that means - that many propagatedNativeBuildInputs should instead - be propagatedBuildInputs. Thankfully, that was and is - the least used type of dependency. Also, it means that some - propagatedBuildInputs should instead be - depsTargetTargetPropagated. Other types dependencies - should be unaffected. - - - - - lib.addPassthru drv passthru is removed. Use - lib.extendDerivation true passthru drv instead. - - - - - The memcached service no longer accept dynamic socket - paths via . Unix sockets can be - still enabled by and - will be accessible at /run/memcached/memcached.sock. - - - - - The hardware.amdHybridGraphics.disable option was - removed for lack of a maintainer. If you still need this module, you may - wish to include a copy of it from an older version of nixos in your - imports. - - - - - The merging of config options for - services.postfix.config was buggy. Previously, if other - options in the Postfix module like - services.postfix.useSrs were set and the user set - config options that were also set by such options, the resulting config - wouldn't include all options that were needed. They are now merged - correctly. If config options need to be overridden, - lib.mkForce or lib.mkOverride can be - used. - - - - - The following changes apply if the stateVersion is - changed to 18.03 or higher. For stateVersion = "17.09" - or lower the old behavior is preserved. - - - - - matrix-synapse uses postgresql by default instead of - sqlite. Migration instructions can be found - - here . - - - - - - - The jid package has been removed, due to maintenance - overhead of a go package having non-versioned dependencies. - - - - - When using (enabled by default - in GNOME), it now handles all input devices, not just touchpads. As a - result, you might need to re-evaluate any custom Xorg configuration. In - particular, Option "XkbRules" "base" may result in - broken keyboard layout. - - - - - The attic package was removed. A maintained fork called - Borg should be used - instead. Migration instructions can be found - here. - - - - - The Piwik analytics software was renamed to Matomo: - - - - The package pkgs.piwik was renamed to - pkgs.matomo. - - - - - The service services.piwik was renamed to - services.matomo. - - - - - The data directory /var/lib/piwik was renamed to - /var/lib/matomo. All files will be moved - automatically on first startup, but you might need to adjust your - backup scripts. - - - - - The default for the nginx configuration - changed from piwik.${config.networking.hostName} to - matomo.${config.networking.hostName}.${config.networking.domain} - if is set, - matomo.${config.networking.hostName} if it is not - set. If you change your , remember you'll - need to update the trustedHosts[] array in - /var/lib/matomo/config/config.ini.php as well. - - - - - The piwik user was renamed to - matomo. The service will adjust ownership - automatically for files in the data directory. If you use unix socket - authentication, remember to give the new matomo user - access to the database and to change the username to - matomo in the [database] section - of /var/lib/matomo/config/config.ini.php. - - - - - If you named your database `piwik`, you might want to rename it to - `matomo` to keep things clean, but this is neither enforced nor - required. - - - - - - - - nodejs-4_x is end-of-life. - nodejs-4_x, nodejs-slim-4_x and - nodePackages_4_x are removed. - - - - - The pump.io NixOS module was removed. It is now - maintained as an - external - module. - - - - - The Prosody XMPP server has received a major update. The following modules - were renamed: - - - - is now - - - - - - is now - - - - - - - Many new modules are now core modules, most notably - and - . - - - The better-performing libevent backend is now enabled - by default. - - - withCommunityModules now passes through the modules to - . Use - withOnlyInstalledCommunityModules for modules that - should not be enabled directly, e.g lib_ldap. - - - - - All prometheus exporter modules are now defined as submodules. The - exporters are configured using - services.prometheus.exporters. - - - -
- -
- Other Notable Changes - - - - - ZNC option now defaults to - true. That means that old configuration is not - overwritten by default when update to the znc options are made. - - - - - The option - has been added for wireless networks with WPA-Enterprise authentication. - There is also a new option to directly - configure wpa_supplicant and to - connect to hidden networks. - - - - - In the module the - following options have been removed: - - - - - - - - - - - - - - - - - - - - - - - - - - - - To assign static addresses to an interface the options - and should - be used instead. The options and - have been renamed to - respectively. The new options - and have been - added to set up static routing. - - - - - The option is now - 127.0.0.1 by default. Previously the default behaviour - was to listen on all interfaces. - - - - - services.btrfs.autoScrub has been added, to - periodically check btrfs filesystems for data corruption. If there's a - correct copy available, it will automatically repair corrupted blocks. - - - - - displayManager.lightdm.greeters.gtk.clock-format. has - been added, the clock format string (as expected by strftime, e.g. - %H:%M) to use with the lightdm gtk greeter panel. - - - If set to null the default clock format is used. - - - - - displayManager.lightdm.greeters.gtk.indicators has been - added, a list of allowed indicator modules to use with the lightdm gtk - greeter panel. - - - Built-in indicators include ~a11y, - ~language, ~session, - ~power, ~clock, - ~host, ~spacer. Unity indicators can - be represented by short name (e.g. sound, - power), service file name, or absolute path. - - - If set to null the default indicators are used. - - - In order to have the previous default configuration add - - services.xserver.displayManager.lightdm.greeters.gtk.indicators = [ - "~host" "~spacer" - "~clock" "~spacer" - "~session" - "~language" - "~a11y" - "~power" - ]; - - to your configuration.nix. - - - - - The NixOS test driver supports user services declared by - systemd.user.services. The methods - waitForUnit, getUnitInfo, - startJob and stopJob provide an - optional $user argument for that purpose. - - - - - Enabling bash completion on NixOS, - programs.bash.enableCompletion, will now also enable - completion for the Nix command line tools by installing the - nix-bash-completions - package. - - - -
-
diff --git a/nixos/doc/manual/release-notes/rl-1809.section.md b/nixos/doc/manual/release-notes/rl-1809.section.md new file mode 100644 index 00000000000..3443db37c97 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1809.section.md @@ -0,0 +1,332 @@ +# Release 18.09 ("Jellyfish", 2018/10/05) {#sec-release-18.09} + +## Highlights {#sec-release-18.09-highlights} + +In addition to numerous new and upgraded packages, this release has the following notable updates: + +- End of support is planned for end of April 2019, handing over to 19.03. + +- Platform support: x86_64-linux and x86_64-darwin as always. Support for aarch64-linux is as with the previous releases, not equivalent to the x86-64-linux release, but with efforts to reach parity. + +- Nix has been updated to 2.1; see its [release notes](https://nixos.org/nix/manual/#ssec-relnotes-2.1). + +- Core versions: linux: 4.14 LTS (unchanged), glibc: 2.26 → 2.27, gcc: 7 (unchanged), systemd: 237 → 239. + +- Desktop version changes: gnome: 3.26 → 3.28, (KDE) plasma-desktop: 5.12 → 5.13. + +Notable changes and additions for 18.09 include: + +- Support for wrapping binaries using `firejail` has been added through `programs.firejail.wrappedBinaries`. + + For example + + ```nix + { + programs.firejail = { + enable = true; + wrappedBinaries = { + firefox = "${lib.getBin pkgs.firefox}/bin/firefox"; + mpv = "${lib.getBin pkgs.mpv}/bin/mpv"; + }; + }; + } + ``` + + This will place `firefox` and `mpv` binaries in the global path wrapped by firejail. + +- User channels are now in the default `NIX_PATH`, allowing users to use their personal `nix-channel` defined channels in `nix-build` and `nix-shell` commands, as well as in imports like `import `. + + For example + + ```ShellSession + $ nix-channel --add https://nixos.org/channels/nixpkgs-unstable nixpkgsunstable + $ nix-channel --update + $ nix-build '' -A gitFull + $ nix run -f '' gitFull + $ nix-instantiate -E '(import {}).gitFull' + ``` + +## New Services {#sec-release-18.09-new-services} + +A curated selection of new services that were added since the last release: + +- The `services.cassandra` module has been reworked and was rewritten from scratch. The service has succeeding tests for the versions 2.1, 2.2, 3.0 and 3.11 of [Apache Cassandra](https://cassandra.apache.org/). + +- There is a new `services.foundationdb` module for deploying [FoundationDB](https://www.foundationdb.org) clusters. + +- When enabled the `iproute2` will copy the files expected by ip route (e.g., `rt_tables`) in `/etc/iproute2`. This allows to write aliases for routing tables for instance. + +- `services.strongswan-swanctl` is a modern replacement for `services.strongswan`. You can use either one of them to setup IPsec VPNs but not both at the same time. + + `services.strongswan-swanctl` uses the [swanctl](https://wiki.strongswan.org/projects/strongswan/wiki/swanctl) command which uses the modern [vici](https://github.com/strongswan/strongswan/blob/master/src/libcharon/plugins/vici/README.md) _Versatile IKE Configuration Interface_. The deprecated `ipsec` command used in `services.strongswan` is using the legacy [stroke configuration interface](https://github.com/strongswan/strongswan/blob/master/README_LEGACY.md). + +- The new `services.elasticsearch-curator` service periodically curates or manages, your Elasticsearch indices and snapshots. + +Every new services: + +- `./config/xdg/autostart.nix` + +- `./config/xdg/icons.nix` + +- `./config/xdg/menus.nix` + +- `./config/xdg/mime.nix` + +- `./hardware/brightnessctl.nix` + +- `./hardware/onlykey.nix` + +- `./hardware/video/uvcvideo/default.nix` + +- `./misc/documentation.nix` + +- `./programs/firejail.nix` + +- `./programs/iftop.nix` + +- `./programs/sedutil.nix` + +- `./programs/singularity.nix` + +- `./programs/xss-lock.nix` + +- `./programs/zsh/zsh-autosuggestions.nix` + +- `./services/admin/oxidized.nix` + +- `./services/backup/duplicati.nix` + +- `./services/backup/restic.nix` + +- `./services/backup/restic-rest-server.nix` + +- `./services/cluster/hadoop/default.nix` + +- `./services/databases/aerospike.nix` + +- `./services/databases/monetdb.nix` + +- `./services/desktops/bamf.nix` + +- `./services/desktops/flatpak.nix` + +- `./services/desktops/zeitgeist.nix` + +- `./services/development/bloop.nix` + +- `./services/development/jupyter/default.nix` + +- `./services/hardware/lcd.nix` + +- `./services/hardware/undervolt.nix` + +- `./services/misc/clipmenu.nix` + +- `./services/misc/gitweb.nix` + +- `./services/misc/serviio.nix` + +- `./services/misc/safeeyes.nix` + +- `./services/misc/sysprof.nix` + +- `./services/misc/weechat.nix` + +- `./services/monitoring/datadog-agent.nix` + +- `./services/monitoring/incron.nix` + +- `./services/networking/dnsdist.nix` + +- `./services/networking/freeradius.nix` + +- `./services/networking/hans.nix` + +- `./services/networking/morty.nix` + +- `./services/networking/ndppd.nix` + +- `./services/networking/ocserv.nix` + +- `./services/networking/owamp.nix` + +- `./services/networking/quagga.nix` + +- `./services/networking/shadowsocks.nix` + +- `./services/networking/stubby.nix` + +- `./services/networking/zeronet.nix` + +- `./services/security/certmgr.nix` + +- `./services/security/cfssl.nix` + +- `./services/security/oauth2_proxy_nginx.nix` + +- `./services/web-apps/virtlyst.nix` + +- `./services/web-apps/youtrack.nix` + +- `./services/web-servers/hitch/default.nix` + +- `./services/web-servers/hydron.nix` + +- `./services/web-servers/meguca.nix` + +- `./services/web-servers/nginx/gitweb.nix` + +- `./virtualisation/kvmgt.nix` + +- `./virtualisation/qemu-guest-agent.nix` + +## Backward Incompatibilities {#sec-release-18.09-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- Some licenses that were incorrectly not marked as unfree now are. This is the case for: + + - cc-by-nc-sa-20: Creative Commons Attribution Non Commercial Share Alike 2.0 + + - cc-by-nc-sa-25: Creative Commons Attribution Non Commercial Share Alike 2.5 + + - cc-by-nc-sa-30: Creative Commons Attribution Non Commercial Share Alike 3.0 + + - cc-by-nc-sa-40: Creative Commons Attribution Non Commercial Share Alike 4.0 + + - cc-by-nd-30: Creative Commons Attribution-No Derivative Works v3.00 + + - msrla: Microsoft Research License Agreement + +- The deprecated `services.cassandra` module has seen a complete rewrite. (See above.) + +- `lib.strict` is removed. Use `builtins.seq` instead. + +- The `clementine` package points now to the free derivation. `clementineFree` is removed now and `clementineUnfree` points to the package which is bundled with the unfree `libspotify` package. + +- The `netcat` package is now taken directly from OpenBSD\'s `libressl`, instead of relying on Debian\'s fork. The new version should be very close to the old version, but there are some minor differences. Importantly, flags like -b, -q, -C, and -Z are no longer accepted by the nc command. + +- The `services.docker-registry.extraConfig` object doesn\'t contain environment variables anymore. Instead it needs to provide an object structure that can be mapped onto the YAML configuration defined in [the `docker/distribution` docs](https://github.com/docker/distribution/blob/v2.6.2/docs/configuration.md). + +- `gnucash` has changed from version 2.4 to 3.x. If you\'ve been using `gnucash` (version 2.4) instead of `gnucash26` (version 2.6) you must open your Gnucash data file(s) with `gnucash26` and then save them to upgrade the file format. Then you may use your data file(s) with Gnucash 3.x. See the upgrade [documentation](https://wiki.gnucash.org/wiki/FAQ#Using_Different_Versions.2C_Up_And_Downgrade). Gnucash 2.4 is still available under the attribute `gnucash24`. + +- `services.munge` now runs as user (and group) `munge` instead of root. Make sure the key file is accessible to the daemon. + +- `dockerTools.buildImage` now uses `null` as default value for `tag`, which indicates that the nix output hash will be used as tag. + +- The ELK stack: `elasticsearch`, `logstash` and `kibana` has been upgraded from 2.\* to 6.3.\*. The 2.\* versions have been [unsupported since last year](https://www.elastic.co/support/eol) so they have been removed. You can still use the 5.\* versions under the names `elasticsearch5`, `logstash5` and `kibana5`. + + The elastic beats: `filebeat`, `heartbeat`, `metricbeat` and `packetbeat` have had the same treatment: they now target 6.3.\* as well. The 5.\* versions are available under the names: `filebeat5`, `heartbeat5`, `metricbeat5` and `packetbeat5` + + The ELK-6.3 stack now comes with [X-Pack by default](https://www.elastic.co/products/x-pack/open). Since X-Pack is licensed under the [Elastic License](https://github.com/elastic/elasticsearch/blob/master/licenses/ELASTIC-LICENSE.txt) the ELK packages now have an unfree license. To use them you need to specify `allowUnfree = true;` in your nixpkgs configuration. + + Fortunately there is also a free variant of the ELK stack without X-Pack. The packages are available under the names: `elasticsearch-oss`, `logstash-oss` and `kibana-oss`. + +- Options `boot.initrd.luks.devices.name.yubikey.ramfsMountPoint` `boot.initrd.luks.devices.name.yubikey.storage.mountPoint` were removed. `luksroot.nix` module never supported more than one YubiKey at a time anyway, hence those options never had any effect. You should be able to remove them from your config without any issues. + +- `stdenv.system` and `system` in nixpkgs now refer to the host platform instead of the build platform. For native builds this is not change, let alone a breaking one. For cross builds, it is a breaking change, and `stdenv.buildPlatform.system` can be used instead for the old behavior. They should be using that anyways for clarity. + +- Groups `kvm` and `render` are introduced now, as systemd requires them. + +## Other Notable Changes {#sec-release-18.09-notable-changes} + +- `dockerTools.pullImage` relies on image digest instead of image tag to download the image. The `sha256` of a pulled image has to be updated. + +- `lib.attrNamesToStr` has been deprecated. Use more specific concatenation (`lib.concat(Map)StringsSep`) instead. + +- `lib.addErrorContextToAttrs` has been deprecated. Use `builtins.addErrorContext` directly. + +- `lib.showVal` has been deprecated. Use `lib.traceSeqN` instead. + +- `lib.traceXMLVal` has been deprecated. Use `lib.traceValFn builtins.toXml` instead. + +- `lib.traceXMLValMarked` has been deprecated. Use `lib.traceValFn (x: str + builtins.toXML x)` instead. + +- The `pkgs` argument to NixOS modules can now be set directly using `nixpkgs.pkgs`. Previously, only the `system`, `config` and `overlays` arguments could be used to influence `pkgs`. + +- A NixOS system can now be constructed more easily based on a preexisting invocation of Nixpkgs. For example: + + ```nix + { + inherit (pkgs.nixos { + boot.loader.grub.enable = false; + fileSystems."/".device = "/dev/xvda1"; + }) toplevel kernel initialRamdisk manual; + } + ``` + + This benefits evaluation performance, lets you write Nixpkgs packages that depend on NixOS images and is consistent with a deployment architecture that would be centered around Nixpkgs overlays. + +- `lib.traceValIfNot` has been deprecated. Use `if/then/else` and `lib.traceValSeq` instead. + +- `lib.traceCallXml` has been deprecated. Please complain if you use the function regularly. + +- The attribute `lib.nixpkgsVersion` has been deprecated in favor of `lib.version`. Please refer to the discussion in [NixOS/nixpkgs\#39416](https://github.com/NixOS/nixpkgs/pull/39416#discussion_r183845745) for further reference. + +- `lib.recursiveUpdateUntil` was not acting according to its specification. It has been fixed to act according to the docstring, and a test has been added. + +- The module for `security.dhparams` has two new options now: + + `security.dhparams.stateless` + + : Puts the generated Diffie-Hellman parameters into the Nix store instead of managing them in a stateful manner in `/var/lib/dhparams`. + + `security.dhparams.defaultBitSize` + + : The default bit size to use for the generated Diffie-Hellman parameters. + + ::: {.note} + The path to the actual generated parameter files should now be queried using `config.security.dhparams.params.name.path` because it might be either in the Nix store or in a directory configured by `security.dhparams.path`. + ::: + + ::: {.note} + **For developers:** + + Module implementers should not set a specific bit size in order to let users configure it by themselves if they want to have a different bit size than the default (2048). + + An example usage of this would be: + + ```nix + { config, ... }: + + { + security.dhparams.params.myservice = {}; + environment.etc."myservice.conf".text = '' + dhparams = ${config.security.dhparams.params.myservice.path} + ''; + } + ``` + + ::: + +- `networking.networkmanager.useDnsmasq` has been deprecated. Use `networking.networkmanager.dns` instead. + +- The Kubernetes package has been bumped to major version 1.11. Please consult the [release notes](https://github.com/kubernetes/kubernetes/blob/release-1.11/CHANGELOG-1.11.md) for details on new features and api changes. + +- The option `services.kubernetes.apiserver.admissionControl` was renamed to `services.kubernetes.apiserver.enableAdmissionPlugins`. + +- Recommended way to access the Kubernetes Dashboard is via HTTPS (TLS) Therefore; public service port for the dashboard has changed to 443 (container port 8443) and scheme to https. + +- The option `services.kubernetes.apiserver.address` was renamed to `services.kubernetes.apiserver.bindAddress`. Note that the default value has changed from 127.0.0.1 to 0.0.0.0. + +- The option `services.kubernetes.apiserver.publicAddress` was not used and thus has been removed. + +- The option `services.kubernetes.addons.dashboard.enableRBAC` was renamed to `services.kubernetes.addons.dashboard.rbac.enable`. + +- The Kubernetes Dashboard now has only minimal RBAC permissions by default. If dashboard cluster-admin rights are desired, set `services.kubernetes.addons.dashboard.rbac.clusterAdmin` to true. On existing clusters, in order for the revocation of privileges to take effect, the current ClusterRoleBinding for kubernetes-dashboard must be manually removed: `kubectl delete clusterrolebinding kubernetes-dashboard` + +- The `programs.screen` module provides allows to configure `/etc/screenrc`, however the module behaved fairly counterintuitive as the config exists, but the package wasn\'t available. Since 18.09 `pkgs.screen` will be added to `environment.systemPackages`. + +- The module `services.networking.hostapd` now uses WPA2 by default. + +- `s6Dns`, `s6Networking`, `s6LinuxUtils` and `s6PortableUtils` renamed to `s6-dns`, `s6-networking`, `s6-linux-utils` and `s6-portable-utils` respectively. + +- The module option `nix.useSandbox` is now defaulted to `true`. + +- The config activation script of `nixos-rebuild` now [reloads](https://www.freedesktop.org/software/systemd/man/systemctl.html#Manager%20Lifecycle%20Commands) all user units for each authenticated user. + +- The default display manager is now LightDM. To use SLiM set `services.xserver.displayManager.slim.enable` to `true`. + +- NixOS option descriptions are now automatically broken up into individual paragraphs if the text contains two consecutive newlines, so it\'s no longer necessary to use `` to start a new paragraph. + +- Top-level `buildPlatform`, `hostPlatform`, and `targetPlatform` in Nixpkgs are deprecated. Please use their equivalents in `stdenv` instead: `stdenv.buildPlatform`, `stdenv.hostPlatform`, and `stdenv.targetPlatform`. diff --git a/nixos/doc/manual/release-notes/rl-1809.xml b/nixos/doc/manual/release-notes/rl-1809.xml deleted file mode 100644 index 3f10b26223d..00000000000 --- a/nixos/doc/manual/release-notes/rl-1809.xml +++ /dev/null @@ -1,933 +0,0 @@ -
- Release 18.09 (“Jellyfish”, 2018/10/05) - -
- Highlights - - - In addition to numerous new and upgraded packages, this release has the - following notable updates: - - - - - - End of support is planned for end of April 2019, handing over to 19.03. - - - - - Platform support: x86_64-linux and x86_64-darwin as always. Support for - aarch64-linux is as with the previous releases, not equivalent to the - x86-64-linux release, but with efforts to reach parity. - - - - - Nix has been updated to 2.1; see its - release - notes. - - - - - Core versions: linux: 4.14 LTS (unchanged), glibc: 2.26 → 2.27, gcc: 7 - (unchanged), systemd: 237 → 239. - - - - - Desktop version changes: gnome: 3.26 → 3.28, (KDE) plasma-desktop: 5.12 - → 5.13. - - - - - - Notable changes and additions for 18.09 include: - - - - - - Support for wrapping binaries using firejail has been - added through programs.firejail.wrappedBinaries. - - - For example - - -programs.firejail = { - enable = true; - wrappedBinaries = { - firefox = "${lib.getBin pkgs.firefox}/bin/firefox"; - mpv = "${lib.getBin pkgs.mpv}/bin/mpv"; - }; -}; - - - This will place firefox and mpv - binaries in the global path wrapped by firejail. - - - - - User channels are now in the default NIX_PATH, allowing - users to use their personal nix-channel defined - channels in nix-build and nix-shell - commands, as well as in imports like import - <mychannel>. - - - For example - - -$ nix-channel --add https://nixos.org/channels/nixpkgs-unstable nixpkgsunstable -$ nix-channel --update -$ nix-build '<nixpkgsunstable>' -A gitFull -$ nix run -f '<nixpkgsunstable>' gitFull -$ nix-instantiate -E '(import <nixpkgsunstable> {}).gitFull' - - - -
- -
- New Services - - - A curated selection of new services that were added since the last release: - - - - - - The services.cassandra module has been reworked and was - rewritten from scratch. The service has succeeding tests for the versions - 2.1, 2.2, 3.0 and 3.11 of - Apache - Cassandra. - - - - - There is a new services.foundationdb module for - deploying - FoundationDB - clusters. - - - - - When enabled the iproute2 will copy the files expected - by ip route (e.g., rt_tables) in - /etc/iproute2. This allows to write aliases for - routing tables for instance. - - - - - services.strongswan-swanctl is a modern replacement for - services.strongswan. You can use either one of them to - setup IPsec VPNs but not both at the same time. - - - services.strongswan-swanctl uses the - swanctl - command which uses the modern - vici - Versatile IKE Configuration Interface. The deprecated - ipsec command used in - services.strongswan is using the legacy - stroke - configuration interface. - - - - - The new services.elasticsearch-curator service - periodically curates or manages, your Elasticsearch indices and snapshots. - - - - - - Every new services: - - - - - - ./config/xdg/autostart.nix - - - - - ./config/xdg/icons.nix - - - - - ./config/xdg/menus.nix - - - - - ./config/xdg/mime.nix - - - - - ./hardware/brightnessctl.nix - - - - - ./hardware/onlykey.nix - - - - - ./hardware/video/uvcvideo/default.nix - - - - - ./misc/documentation.nix - - - - - ./programs/firejail.nix - - - - - ./programs/iftop.nix - - - - - ./programs/sedutil.nix - - - - - ./programs/singularity.nix - - - - - ./programs/xss-lock.nix - - - - - ./programs/zsh/zsh-autosuggestions.nix - - - - - ./services/admin/oxidized.nix - - - - - ./services/backup/duplicati.nix - - - - - ./services/backup/restic.nix - - - - - ./services/backup/restic-rest-server.nix - - - - - ./services/cluster/hadoop/default.nix - - - - - ./services/databases/aerospike.nix - - - - - ./services/databases/monetdb.nix - - - - - ./services/desktops/bamf.nix - - - - - ./services/desktops/flatpak.nix - - - - - ./services/desktops/zeitgeist.nix - - - - - ./services/development/bloop.nix - - - - - ./services/development/jupyter/default.nix - - - - - ./services/hardware/lcd.nix - - - - - ./services/hardware/undervolt.nix - - - - - ./services/misc/clipmenu.nix - - - - - ./services/misc/gitweb.nix - - - - - ./services/misc/serviio.nix - - - - - ./services/misc/safeeyes.nix - - - - - ./services/misc/sysprof.nix - - - - - ./services/misc/weechat.nix - - - - - ./services/monitoring/datadog-agent.nix - - - - - ./services/monitoring/incron.nix - - - - - ./services/networking/dnsdist.nix - - - - - ./services/networking/freeradius.nix - - - - - ./services/networking/hans.nix - - - - - ./services/networking/morty.nix - - - - - ./services/networking/ndppd.nix - - - - - ./services/networking/ocserv.nix - - - - - ./services/networking/owamp.nix - - - - - ./services/networking/quagga.nix - - - - - ./services/networking/shadowsocks.nix - - - - - ./services/networking/stubby.nix - - - - - ./services/networking/zeronet.nix - - - - - ./services/security/certmgr.nix - - - - - ./services/security/cfssl.nix - - - - - ./services/security/oauth2_proxy_nginx.nix - - - - - ./services/web-apps/virtlyst.nix - - - - - ./services/web-apps/youtrack.nix - - - - - ./services/web-servers/hitch/default.nix - - - - - ./services/web-servers/hydron.nix - - - - - ./services/web-servers/meguca.nix - - - - - ./services/web-servers/nginx/gitweb.nix - - - - - ./virtualisation/kvmgt.nix - - - - - ./virtualisation/qemu-guest-agent.nix - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - Some licenses that were incorrectly not marked as unfree now are. This is - the case for: - - - - cc-by-nc-sa-20: Creative Commons Attribution Non Commercial Share Alike - 2.0 - - - - - cc-by-nc-sa-25: Creative Commons Attribution Non Commercial Share Alike - 2.5 - - - - - cc-by-nc-sa-30: Creative Commons Attribution Non Commercial Share Alike - 3.0 - - - - - cc-by-nc-sa-40: Creative Commons Attribution Non Commercial Share Alike - 4.0 - - - - - cc-by-nd-30: Creative Commons Attribution-No Derivative Works v3.00 - - - - - msrla: Microsoft Research License Agreement - - - - - - - - The deprecated services.cassandra module has seen a - complete rewrite. (See above.) - - - - - lib.strict is removed. Use - builtins.seq instead. - - - - - The clementine package points now to the free - derivation. clementineFree is removed now and - clementineUnfree points to the package which is bundled - with the unfree libspotify package. - - - - - The netcat package is now taken directly from OpenBSD's - libressl, instead of relying on Debian's fork. The new - version should be very close to the old version, but there are some minor - differences. Importantly, flags like -b, -q, -C, and -Z are no longer - accepted by the nc command. - - - - - The services.docker-registry.extraConfig object doesn't - contain environment variables anymore. Instead it needs to provide an - object structure that can be mapped onto the YAML configuration defined in - the - docker/distribution docs. - - - - - gnucash has changed from version 2.4 to 3.x. If you've - been using gnucash (version 2.4) instead of - gnucash26 (version 2.6) you must open your Gnucash data - file(s) with gnucash26 and then save them to upgrade - the file format. Then you may use your data file(s) with Gnucash 3.x. See - the upgrade - documentation. - Gnucash 2.4 is still available under the attribute - gnucash24. - - - - - services.munge now runs as user (and group) - munge instead of root. Make sure the key file is - accessible to the daemon. - - - - - dockerTools.buildImage now uses null - as default value for tag, which indicates that the nix - output hash will be used as tag. - - - - - The ELK stack: elasticsearch, - logstash and kibana has been - upgraded from 2.* to 6.3.*. The 2.* versions have been - unsupported since - last year so they have been removed. You can still use the 5.* - versions under the names elasticsearch5, - logstash5 and kibana5. - - - The elastic beats: filebeat, - heartbeat, metricbeat and - packetbeat have had the same treatment: they now target - 6.3.* as well. The 5.* versions are available under the names: - filebeat5, heartbeat5, - metricbeat5 and packetbeat5 - - - The ELK-6.3 stack now comes with - X-Pack by - default. Since X-Pack is licensed under the - Elastic - License the ELK packages now have an unfree license. To use them - you need to specify allowUnfree = true; in your nixpkgs - configuration. - - - Fortunately there is also a free variant of the ELK stack without X-Pack. - The packages are available under the names: - elasticsearch-oss, logstash-oss and - kibana-oss. - - - - - Options - boot.initrd.luks.devices.name.yubikey.ramfsMountPoint - boot.initrd.luks.devices.name.yubikey.storage.mountPoint - were removed. luksroot.nix module never supported more - than one YubiKey at a time anyway, hence those options never had any - effect. You should be able to remove them from your config without any - issues. - - - - - stdenv.system and system in nixpkgs - now refer to the host platform instead of the build platform. For native - builds this is not change, let alone a breaking one. For cross builds, it - is a breaking change, and stdenv.buildPlatform.system - can be used instead for the old behavior. They should be using that - anyways for clarity. - - - - - Groups kvm and render are introduced - now, as systemd requires them. - - - -
- -
- Other Notable Changes - - - - - dockerTools.pullImage relies on image digest instead of - image tag to download the image. The sha256 of a pulled - image has to be updated. - - - - - lib.attrNamesToStr has been deprecated. Use more - specific concatenation (lib.concat(Map)StringsSep) - instead. - - - - - lib.addErrorContextToAttrs has been deprecated. Use - builtins.addErrorContext directly. - - - - - lib.showVal has been deprecated. Use - lib.traceSeqN instead. - - - - - lib.traceXMLVal has been deprecated. Use - lib.traceValFn builtins.toXml instead. - - - - - lib.traceXMLValMarked has been deprecated. Use - lib.traceValFn (x: str + builtins.toXML x) instead. - - - - - The pkgs argument to NixOS modules can now be set - directly using nixpkgs.pkgs. Previously, only the - system, config and - overlays arguments could be used to influence - pkgs. - - - - - A NixOS system can now be constructed more easily based on a preexisting - invocation of Nixpkgs. For example: - -inherit (pkgs.nixos { - boot.loader.grub.enable = false; - fileSystems."/".device = "/dev/xvda1"; -}) toplevel kernel initialRamdisk manual; - - This benefits evaluation performance, lets you write Nixpkgs packages that - depend on NixOS images and is consistent with a deployment architecture - that would be centered around Nixpkgs overlays. - - - - - lib.traceValIfNot has been deprecated. Use - if/then/else and lib.traceValSeq - instead. - - - - - lib.traceCallXml has been deprecated. Please complain - if you use the function regularly. - - - - - The attribute lib.nixpkgsVersion has been deprecated in - favor of lib.version. Please refer to the discussion in - NixOS/nixpkgs#39416 - for further reference. - - - - - lib.recursiveUpdateUntil was not acting according to - its specification. It has been fixed to act according to the docstring, - and a test has been added. - - - - - The module for has two new options now: - - - - - - - - - Puts the generated Diffie-Hellman parameters into the Nix store instead - of managing them in a stateful manner in - /var/lib/dhparams. - - - - - - - - - - The default bit size to use for the generated Diffie-Hellman - parameters. - - - - - - - The path to the actual generated parameter files should now be queried - using - config.security.dhparams.params.name.path - because it might be either in the Nix store or in a directory configured - by . - - - - For developers: - - Module implementers should not set a specific bit size in order to let - users configure it by themselves if they want to have a different bit - size than the default (2048). - - - An example usage of this would be: - -{ config, ... }: - -{ - security.dhparams.params.myservice = {}; - environment.etc."myservice.conf".text = '' - dhparams = ${config.security.dhparams.params.myservice.path} - ''; -} - - - - - - - networking.networkmanager.useDnsmasq has been - deprecated. Use networking.networkmanager.dns instead. - - - - - The Kubernetes package has been bumped to major version 1.11. Please - consult the - release - notes for details on new features and api changes. - - - - - The option - services.kubernetes.apiserver.admissionControl was - renamed to - services.kubernetes.apiserver.enableAdmissionPlugins. - - - - - Recommended way to access the Kubernetes Dashboard is via HTTPS (TLS) - Therefore; public service port for the dashboard has changed to 443 - (container port 8443) and scheme to https. - - - - - The option services.kubernetes.apiserver.address was - renamed to services.kubernetes.apiserver.bindAddress. - Note that the default value has changed from 127.0.0.1 to 0.0.0.0. - - - - - The option services.kubernetes.apiserver.publicAddress - was not used and thus has been removed. - - - - - The option - services.kubernetes.addons.dashboard.enableRBAC was - renamed to - services.kubernetes.addons.dashboard.rbac.enable. - - - - - The Kubernetes Dashboard now has only minimal RBAC permissions by default. - If dashboard cluster-admin rights are desired, set - services.kubernetes.addons.dashboard.rbac.clusterAdmin - to true. On existing clusters, in order for the revocation of privileges - to take effect, the current ClusterRoleBinding for kubernetes-dashboard - must be manually removed: kubectl delete clusterrolebinding - kubernetes-dashboard - - - - - The programs.screen module provides allows to configure - /etc/screenrc, however the module behaved fairly - counterintuitive as the config exists, but the package wasn't available. - Since 18.09 pkgs.screen will be added to - environment.systemPackages. - - - - - The module now uses WPA2 by - default. - - - - - s6Dns, s6Networking, - s6LinuxUtils and s6PortableUtils - renamed to s6-dns, s6-networking, - s6-linux-utils and s6-portable-utils - respectively. - - - - - The module option is now defaulted to - true. - - - - - The config activation script of nixos-rebuild now - reloads - all user units for each authenticated user. - - - - - The default display manager is now LightDM. To use SLiM set - services.xserver.displayManager.slim.enable to - true. - - - - - NixOS option descriptions are now automatically broken up into individual - paragraphs if the text contains two consecutive newlines, so it's no - longer necessary to use </para><para> to start a - new paragraph. - - - - - Top-level buildPlatform, - hostPlatform, and targetPlatform in - Nixpkgs are deprecated. Please use their equivalents in - stdenv instead: - stdenv.buildPlatform, - stdenv.hostPlatform, and - stdenv.targetPlatform. - - - -
-
diff --git a/nixos/doc/manual/release-notes/rl-1903.section.md b/nixos/doc/manual/release-notes/rl-1903.section.md new file mode 100644 index 00000000000..7637a70c1bf --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1903.section.md @@ -0,0 +1,214 @@ +# Release 19.03 ("Koi", 2019/04/11) {#sec-release-19.03} + +## Highlights {#sec-release-19.03-highlights} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- End of support is planned for end of October 2019, handing over to 19.09. + +- The default Python 3 interpreter is now CPython 3.7 instead of CPython 3.6. + +- Added the Pantheon desktop environment. It can be enabled through `services.xserver.desktopManager.pantheon.enable`. + + ::: {.note} + By default, `services.xserver.desktopManager.pantheon` enables LightDM as a display manager, as pantheon\'s screen locking implementation relies on it. + Because of that it is recommended to leave LightDM enabled. If you\'d like to disable it anyway, set `services.xserver.displayManager.lightdm.enable` to `false` and enable your preferred display manager. + ::: + + Also note that Pantheon\'s LightDM greeter is not enabled by default, because it has numerous issues in NixOS and isn\'t optimal for use here yet. + +- A major refactoring of the Kubernetes module has been completed. Refactorings primarily focus on decoupling components and enhancing security. Two-way TLS and RBAC has been enabled by default for all components, which slightly changes the way the module is configured. See: [](#sec-kubernetes) for details. + +- There is now a set of `confinement` options for `systemd.services`, which allows to restrict services into a chroot 2 ed environment that only contains the store paths from the runtime closure of the service. + +## New Services {#sec-release-19.03-new-services} + +The following new services were added since the last release: + +- `./programs/nm-applet.nix` + +- There is a new `security.googleOsLogin` module for using [OS Login](https://cloud.google.com/compute/docs/instances/managing-instance-access) to manage SSH access to Google Compute Engine instances, which supersedes the imperative and broken `google-accounts-daemon` used in `nixos/modules/virtualisation/google-compute-config.nix`. + +- `./services/misc/beanstalkd.nix` + +- There is a new `services.cockroachdb` module for running CockroachDB databases. NixOS now ships with CockroachDB 2.1.x as well, available on `x86_64-linux` and `aarch64-linux`. + +- `./security/duosec.nix` + +- The [PAM module for Duo Security](https://duo.com/docs/duounix) has been enabled for use. One can configure it using the `security.duosec` options along with the corresponding PAM option in `security.pam.services..duoSecurity.enable`. + +## Backward Incompatibilities {#sec-release-19.03-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- The minimum version of Nix required to evaluate Nixpkgs is now 2.0. + + - For users of NixOS 18.03 and 19.03, NixOS defaults to Nix 2.0, but supports using Nix 1.11 by setting `nix.package = pkgs.nix1;`. If this option is set to a Nix 1.11 package, you will need to either unset the option or upgrade it to Nix 2.0. + + - For users of NixOS 17.09, you will first need to upgrade Nix by setting `nix.package = pkgs.nixStable2;` and run `nixos-rebuild switch` as the `root` user. + + - For users of a daemon-less Nix installation on Linux or macOS, you can upgrade Nix by running `curl -L https://nixos.org/nix/install | sh`, or prior to doing a channel update, running `nix-env -iA nix`. If you have already run a channel update and Nix is no longer able to evaluate Nixpkgs, the error message printed should provide adequate directions for upgrading Nix. + + - For users of the Nix daemon on macOS, you can upgrade Nix by running `sudo -i sh -c 'nix-channel --update && nix-env -iA nixpkgs.nix'; sudo launchctl stop org.nixos.nix-daemon; sudo launchctl start org.nixos.nix-daemon`. + +- The `buildPythonPackage` function now sets `strictDeps = true` to help distinguish between native and non-native dependencies in order to improve cross-compilation compatibility. Note however that this may break user expressions. + +- The `buildPythonPackage` function now sets `LANG = C.UTF-8` to enable Unicode support. The `glibcLocales` package is no longer needed as a build input. + +- The Syncthing state and configuration data has been moved from `services.syncthing.dataDir` to the newly defined `services.syncthing.configDir`, which default to `/var/lib/syncthing/.config/syncthing`. This change makes possible to share synced directories using ACLs without Syncthing resetting the permission on every start. + +- The `ntp` module now has sane default restrictions. If you\'re relying on the previous defaults, which permitted all queries and commands from all firewall-permitted sources, you can set `services.ntp.restrictDefault` and `services.ntp.restrictSource` to `[]`. + +- Package `rabbitmq_server` is renamed to `rabbitmq-server`. + +- The `light` module no longer uses setuid binaries, but udev rules. As a consequence users of that module have to belong to the `video` group in order to use the executable (i.e. `users.users.yourusername.extraGroups = ["video"];`). + +- Buildbot now supports Python 3 and its packages have been moved to `pythonPackages`. The options `services.buildbot-master.package` and `services.buildbot-worker.package` can be used to select the Python 2 or 3 version of the package. + +- Options `services.znc.confOptions.networks.name.userName` and `services.znc.confOptions.networks.name.modulePackages` were removed. They were never used for anything and can therefore safely be removed. + +- Package `wasm` has been renamed `proglodyte-wasm`. The package `wasm` will be pointed to `ocamlPackages.wasm` in 19.09, so make sure to update your configuration if you want to keep `proglodyte-wasm` + +- When the `nixpkgs.pkgs` option is set, NixOS will no longer ignore the `nixpkgs.overlays` option. The old behavior can be recovered by setting `nixpkgs.overlays = lib.mkForce [];`. + +- OpenSMTPD has been upgraded to version 6.4.0p1. This release makes backwards-incompatible changes to the configuration file format. See `man smtpd.conf` for more information on the new file format. + +- The versioned `postgresql` have been renamed to use underscore number seperators. For example, `postgresql96` has been renamed to `postgresql_9_6`. + +- Package `consul-ui` and passthrough `consul.ui` have been removed. The package `consul` now uses upstream releases that vendor the UI into the binary. See [\#48714](https://github.com/NixOS/nixpkgs/pull/48714#issuecomment-433454834) for details. + +- Slurm introduces the new option `services.slurm.stateSaveLocation`, which is now set to `/var/spool/slurm` by default (instead of `/var/spool`). Make sure to move all files to the new directory or to set the option accordingly. + + The slurmctld now runs as user `slurm` instead of `root`. If you want to keep slurmctld running as `root`, set `services.slurm.user = root`. + + The options `services.slurm.nodeName` and `services.slurm.partitionName` are now sets of strings to correctly reflect that fact that each of these options can occour more than once in the configuration. + +- The `solr` package has been upgraded from 4.10.3 to 7.5.0 and has undergone some major changes. The `services.solr` module has been updated to reflect these changes. Please review http://lucene.apache.org/solr/ carefully before upgrading. + +- Package `ckb` is renamed to `ckb-next`, and options `hardware.ckb.*` are renamed to `hardware.ckb-next.*`. + +- The option `services.xserver.displayManager.job.logToFile` which was previously set to `true` when using the display managers `lightdm`, `sddm` or `xpra` has been reset to the default value (`false`). + +- Network interface indiscriminate NixOS firewall options (`networking.firewall.allow*`) are now preserved when also setting interface specific rules such as `networking.firewall.interfaces.en0.allow*`. These rules continue to use the pseudo device \"default\" (`networking.firewall.interfaces.default.*`), and assigning to this pseudo device will override the (`networking.firewall.allow*`) options. + +- The `nscd` service now disables all caching of `passwd` and `group` databases by default. This was interferring with the correct functioning of the `libnss_systemd.so` module which is used by `systemd` to manage uids and usernames in the presence of `DynamicUser=` in systemd services. This was already the default behaviour in presence of `services.sssd.enable = true` because nscd caching would interfere with `sssd` in unpredictable ways as well. Because we\'re using nscd not for caching, but for convincing glibc to find NSS modules in the nix store instead of an absolute path, we have decided to disable caching globally now, as it\'s usually not the behaviour the user wants and can lead to surprising behaviour. Furthermore, negative caching of host lookups is also disabled now by default. This should fix the issue of dns lookups failing in the presence of an unreliable network. + + If the old behaviour is desired, this can be restored by setting the `services.nscd.config` option with the desired caching parameters. + + ```nix + { + services.nscd.config = + '' + server-user nscd + threads 1 + paranoia no + debug-level 0 + + enable-cache passwd yes + positive-time-to-live passwd 600 + negative-time-to-live passwd 20 + suggested-size passwd 211 + check-files passwd yes + persistent passwd no + shared passwd yes + + enable-cache group yes + positive-time-to-live group 3600 + negative-time-to-live group 60 + suggested-size group 211 + check-files group yes + persistent group no + shared group yes + + enable-cache hosts yes + positive-time-to-live hosts 600 + negative-time-to-live hosts 5 + suggested-size hosts 211 + check-files hosts yes + persistent hosts no + shared hosts yes + ''; + } + ``` + + See [\#50316](https://github.com/NixOS/nixpkgs/pull/50316) for details. + +- GitLab Shell previously used the nix store paths for the `gitlab-shell` command in its `authorized_keys` file, which might stop working after garbage collection. To circumvent that, we regenerated that file on each startup. As `gitlab-shell` has now been changed to use `/var/run/current-system/sw/bin/gitlab-shell`, this is not necessary anymore, but there might be leftover lines with a nix store path. Regenerate the `authorized_keys` file via `sudo -u git -H gitlab-rake gitlab:shell:setup` in that case. + +- The `pam_unix` account module is now loaded with its control field set to `required` instead of `sufficient`, so that later PAM account modules that might do more extensive checks are being executed. Previously, the whole account module verification was exited prematurely in case a nss module provided the account name to `pam_unix`. The LDAP and SSSD NixOS modules already add their NSS modules when enabled. In case your setup breaks due to some later PAM account module previosuly shadowed, or failing NSS lookups, please file a bug. You can get back the old behaviour by manually setting `security.pam.services..text`. + +- The `pam_unix` password module is now loaded with its control field set to `sufficient` instead of `required`, so that password managed only by later PAM password modules are being executed. Previously, for example, changing an LDAP account\'s password through PAM was not possible: the whole password module verification was exited prematurely by `pam_unix`, preventing `pam_ldap` to manage the password as it should. + +- `fish` has been upgraded to 3.0. It comes with a number of improvements and backwards incompatible changes. See the `fish` [release notes](https://github.com/fish-shell/fish-shell/releases/tag/3.0.0) for more information. + +- The ibus-table input method has had a change in config format, which causes all previous settings to be lost. See [this commit message](https://github.com/mike-fabian/ibus-table/commit/f9195f877c5212fef0dfa446acb328c45ba5852b) for details. + +- NixOS module system type `types.optionSet` and `lib.mkOption` argument `options` are deprecated. Use `types.submodule` instead. ([\#54637](https://github.com/NixOS/nixpkgs/pull/54637)) + +- `matrix-synapse` has been updated to version 0.99. It will [no longer generate a self-signed certificate on first launch](https://github.com/matrix-org/synapse/pull/4509) and will be [the last version to accept self-signed certificates](https://matrix.org/blog/2019/02/05/synapse-0-99-0/). As such, it is now recommended to use a proper certificate verified by a root CA (for example Let\'s Encrypt). The new [manual chapter on Matrix](#module-services-matrix) contains a working example of using nginx as a reverse proxy in front of `matrix-synapse`, using Let\'s Encrypt certificates. + +- `mailutils` now works by default when `sendmail` is not in a setuid wrapper. As a consequence, the `sendmailPath` argument, having lost its main use, has been removed. + +- `graylog` has been upgraded from version 2.\* to 3.\*. Some setups making use of extraConfig (especially those exposing Graylog via reverse proxies) need to be updated as upstream removed/replaced some settings. See [Upgrading Graylog](http://docs.graylog.org/en/3.0/pages/upgrade/graylog-3.0.html#simplified-http-interface-configuration) for details. + +- The option `users.ldap.bind.password` was renamed to `users.ldap.bind.passwordFile`, and needs to be readable by the `nslcd` user. Same applies to the new `users.ldap.daemon.rootpwmodpwFile` option. + +- `nodejs-6_x` is end-of-life. `nodejs-6_x`, `nodejs-slim-6_x` and `nodePackages_6_x` are removed. + +## Other Notable Changes {#sec-release-19.03-notable-changes} + +- The `services.matomo` module gained the option `services.matomo.package` which determines the used Matomo version. + + The Matomo module now also comes with the systemd service `matomo-archive-processing.service` and a timer that automatically triggers archive processing every hour. This means that you can safely [ disable browser triggers for Matomo archiving ](https://matomo.org/docs/setup-auto-archiving/#disable-browser-triggers-for-matomo-archiving-and-limit-matomo-reports-to-updating-every-hour) at `Administration > System > General Settings`. + + Additionally, you can enable to [ delete old visitor logs ](https://matomo.org/docs/privacy/#step-2-delete-old-visitors-logs) at `Administration > System > Privacy`, but make sure that you run `systemctl start matomo-archive-processing.service` at least once without errors if you have already collected data before, so that the reports get archived before the source data gets deleted. + +- `composableDerivation` along with supporting library functions has been removed. + +- The deprecated `truecrypt` package has been removed and `truecrypt` attribute is now an alias for `veracrypt`. VeraCrypt is backward-compatible with TrueCrypt volumes. Note that `cryptsetup` also supports loading TrueCrypt volumes. + +- The Kubernetes DNS addons, kube-dns, has been replaced with CoreDNS. This change is made in accordance with Kubernetes making CoreDNS the official default starting from [Kubernetes v1.11](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG-1.11.md#sig-cluster-lifecycle). Please beware that upgrading DNS-addon on existing clusters might induce minor downtime while the DNS-addon terminates and re-initializes. Also note that the DNS-service now runs with 2 pod replicas by default. The desired number of replicas can be configured using: `services.kubernetes.addons.dns.replicas`. + +- The quassel-webserver package and module was removed from nixpkgs due to the lack of maintainers. + +- The manual gained a [ new chapter on self-hosting `matrix-synapse` and `riot-web` ](#module-services-matrix), the most prevalent server and client implementations for the [Matrix](https://matrix.org/) federated communication network. + +- The astah-community package was removed from nixpkgs due to it being discontinued and the downloads not being available anymore. + +- The httpd service now saves log files with a .log file extension by default for easier integration with the logrotate service. + +- The owncloud server packages and httpd subservice module were removed from nixpkgs due to the lack of maintainers. + +- It is possible now to uze ZRAM devices as general purpose ephemeral block devices, not only as swap. Using more than 1 device as ZRAM swap is no longer recommended, but is still possible by setting `zramSwap.swapDevices` explicitly. + + ZRAM algorithm can be changed now. + + Changes to ZRAM algorithm are applied during `nixos-rebuild switch`, so make sure you have enough swap space on disk to survive ZRAM device rebuild. Alternatively, use `nixos-rebuild boot; reboot`. + +- Flat volumes are now disabled by default in `hardware.pulseaudio`. This has been done to prevent applications, which are unaware of this feature, setting their volumes to 100% on startup causing harm to your audio hardware and potentially your ears. + + ::: {.note} + With this change application specific volumes are relative to the master volume which can be adjusted independently, whereas before they were absolute; meaning that in effect, it scaled the device-volume with the volume of the loudest application. + ::: + +- The [`ndppd`](https://github.com/DanielAdolfsson/ndppd) module now supports [all config options](options.html#opt-services.ndppd.enable) provided by the current upstream version as service options. Additionally the `ndppd` package doesn\'t contain the systemd unit configuration from upstream anymore, the unit is completely configured by the NixOS module now. + +- New installs of NixOS will default to the Redmine 4.x series unless otherwise specified in `services.redmine.package` while existing installs of NixOS will default to the Redmine 3.x series. + +- The [Grafana module](options.html#opt-services.grafana.enable) now supports declarative [datasource and dashboard](http://docs.grafana.org/administration/provisioning/) provisioning. + +- The use of insecure ports on kubernetes has been deprecated. Thus options: `services.kubernetes.apiserver.port` and `services.kubernetes.controllerManager.port` has been renamed to `.insecurePort`, and default of both options has changed to 0 (disabled). + +- Note that the default value of `services.kubernetes.apiserver.bindAddress` has changed from 127.0.0.1 to 0.0.0.0, allowing the apiserver to be accessible from outside the master node itself. If the apiserver insecurePort is enabled, it is strongly recommended to only bind on the loopback interface. See: `services.kubernetes.apiserver.insecurebindAddress`. + +- The option `services.kubernetes.apiserver.allowPrivileged` and `services.kubernetes.kubelet.allowPrivileged` now defaults to false. Disallowing privileged containers on the cluster. + +- The kubernetes module does no longer add the kubernetes package to `environment.systemPackages` implicitly. + +- The `intel` driver has been removed from the default list of [X.org video drivers](options.html#opt-services.xserver.videoDrivers). The `modesetting` driver should take over automatically, it is better maintained upstream and has less problems with advanced X11 features. This can lead to a change in the output names used by `xrandr`. Some performance regressions on some GPU models might happen. Some OpenCL and VA-API applications might also break (Beignet seems to provide OpenCL support with `modesetting` driver, too). Kernel mode setting API does not support backlight control, so `xbacklight` tool will not work; backlight level can be controlled directly via `/sys/` or with `brightnessctl`. Users who need this functionality more than multi-output XRandR are advised to add \`intel\` to \`videoDrivers\` and report an issue (or provide additional details in an existing one) + +- Openmpi has been updated to version 4.0.0, which removes some deprecated MPI-1 symbols. This may break some older applications that still rely on those symbols. An upgrade guide can be found [here](https://www.open-mpi.org/faq/?category=mpi-removed). + + The nginx package now relies on OpenSSL 1.1 and supports TLS 1.3 by default. You can set the protocols used by the nginx service using [services.nginx.sslProtocols](options.html#opt-services.nginx.sslProtocols). + +- A new subcommand `nixos-rebuild edit` was added. diff --git a/nixos/doc/manual/release-notes/rl-1903.xml b/nixos/doc/manual/release-notes/rl-1903.xml deleted file mode 100644 index 5593cb3e5df..00000000000 --- a/nixos/doc/manual/release-notes/rl-1903.xml +++ /dev/null @@ -1,768 +0,0 @@ -
- Release 19.03 (“Koi”, 2019/04/11) - -
- Highlights - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - End of support is planned for end of October 2019, handing over to 19.09. - - - - - The default Python 3 interpreter is now CPython 3.7 instead of CPython - 3.6. - - - - - Added the Pantheon desktop environment. It can be enabled through - services.xserver.desktopManager.pantheon.enable. - - - - By default, services.xserver.desktopManager.pantheon - enables LightDM as a display manager, as pantheon's screen locking - implementation relies on it. - - - Because of that it is recommended to leave LightDM enabled. If you'd like - to disable it anyway, set - to - false and enable your preferred display manager. - - - - Also note that Pantheon's LightDM greeter is not enabled by default, - because it has numerous issues in NixOS and isn't optimal for use here - yet. - - - - - A major refactoring of the Kubernetes module has been completed. - Refactorings primarily focus on decoupling components and enhancing - security. Two-way TLS and RBAC has been enabled by default for all - components, which slightly changes the way the module is configured. See: - for details. - - - - - There is now a set of options for - , which allows to restrict services - into a - chroot - 2 - ed environment that only contains the store paths from - the runtime closure of the service. - - - -
- -
- New Services - - - The following new services were added since the last release: - - - - - - ./programs/nm-applet.nix - - - - - There is a new security.googleOsLogin module for using - OS - Login to manage SSH access to Google Compute Engine instances, - which supersedes the imperative and broken - google-accounts-daemon used in - nixos/modules/virtualisation/google-compute-config.nix. - - - - - ./services/misc/beanstalkd.nix - - - - - There is a new services.cockroachdb module for running - CockroachDB databases. NixOS now ships with CockroachDB 2.1.x as well, - available on x86_64-linux and - aarch64-linux. - - - - - - - - ./security/duosec.nix - - - - - The PAM module for Duo - Security has been enabled for use. One can configure it using the - options along with the corresponding PAM - option in - . - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - The minimum version of Nix required to evaluate Nixpkgs is now 2.0. - - - - - For users of NixOS 18.03 and 19.03, NixOS defaults to Nix 2.0, but - supports using Nix 1.11 by setting nix.package = - pkgs.nix1;. If this option is set to a Nix 1.11 package, you - will need to either unset the option or upgrade it to Nix 2.0. - - - - - For users of NixOS 17.09, you will first need to upgrade Nix by setting - nix.package = pkgs.nixStable2; and run - nixos-rebuild switch as the root - user. - - - - - For users of a daemon-less Nix installation on Linux or macOS, you can - upgrade Nix by running curl -L https://nixos.org/nix/install | - sh, or prior to doing a channel update, running - nix-env -iA nix. - - - If you have already run a channel update and Nix is no longer able to - evaluate Nixpkgs, the error message printed should provide adequate - directions for upgrading Nix. - - - - - For users of the Nix daemon on macOS, you can upgrade Nix by running - sudo -i sh -c 'nix-channel --update && nix-env -iA - nixpkgs.nix'; sudo launchctl stop org.nixos.nix-daemon; sudo launchctl - start org.nixos.nix-daemon. - - - - - - - The buildPythonPackage function now sets - strictDeps = true to help distinguish between native - and non-native dependencies in order to improve cross-compilation - compatibility. Note however that this may break user expressions. - - - - - The buildPythonPackage function now sets LANG - = C.UTF-8 to enable Unicode support. The - glibcLocales package is no longer needed as a build - input. - - - - - The Syncthing state and configuration data has been moved from - services.syncthing.dataDir to the newly defined - services.syncthing.configDir, which default to - /var/lib/syncthing/.config/syncthing. This change makes - possible to share synced directories using ACLs without Syncthing - resetting the permission on every start. - - - - - The ntp module now has sane default restrictions. If - you're relying on the previous defaults, which permitted all queries and - commands from all firewall-permitted sources, you can set - services.ntp.restrictDefault and - services.ntp.restrictSource to []. - - - - - Package rabbitmq_server is renamed to - rabbitmq-server. - - - - - The light module no longer uses setuid binaries, but - udev rules. As a consequence users of that module have to belong to the - video group in order to use the executable (i.e. - users.users.yourusername.extraGroups = ["video"];). - - - - - Buildbot now supports Python 3 and its packages have been moved to - pythonPackages. The options - and - can be used to select - the Python 2 or 3 version of the package. - - - - - Options - services.znc.confOptions.networks.name.userName - and - services.znc.confOptions.networks.name.modulePackages - were removed. They were never used for anything and can therefore safely - be removed. - - - - - Package wasm has been renamed - proglodyte-wasm. The package wasm - will be pointed to ocamlPackages.wasm in 19.09, so make - sure to update your configuration if you want to keep - proglodyte-wasm - - - - - When the nixpkgs.pkgs option is set, NixOS will no - longer ignore the nixpkgs.overlays option. The old - behavior can be recovered by setting nixpkgs.overlays = - lib.mkForce [];. - - - - - OpenSMTPD has been upgraded to version 6.4.0p1. This release makes - backwards-incompatible changes to the configuration file format. See - man smtpd.conf for more information on the new file - format. - - - - - The versioned postgresql have been renamed to use - underscore number seperators. For example, postgresql96 - has been renamed to postgresql_9_6. - - - - - Package consul-ui and passthrough - consul.ui have been removed. The package - consul now uses upstream releases that vendor the UI - into the binary. See - #48714 - for details. - - - - - Slurm introduces the new option - services.slurm.stateSaveLocation, which is now set to - /var/spool/slurm by default (instead of - /var/spool). Make sure to move all files to the new - directory or to set the option accordingly. - - - The slurmctld now runs as user slurm instead of - root. If you want to keep slurmctld running as - root, set services.slurm.user = - root. - - - The options services.slurm.nodeName and - services.slurm.partitionName are now sets of strings to - correctly reflect that fact that each of these options can occour more - than once in the configuration. - - - - - The solr package has been upgraded from 4.10.3 to 7.5.0 - and has undergone some major changes. The services.solr - module has been updated to reflect these changes. Please review - http://lucene.apache.org/solr/ carefully before upgrading. - - - - - Package ckb is renamed to ckb-next, - and options hardware.ckb.* are renamed to - hardware.ckb-next.*. - - - - - The option - services.xserver.displayManager.job.logToFile which was - previously set to true when using the display managers - lightdm, sddm or - xpra has been reset to the default value - (false). - - - - - Network interface indiscriminate NixOS firewall options - (networking.firewall.allow*) are now preserved when - also setting interface specific rules such as - networking.firewall.interfaces.en0.allow*. These rules - continue to use the pseudo device "default" - (networking.firewall.interfaces.default.*), and - assigning to this pseudo device will override the - (networking.firewall.allow*) options. - - - - - The nscd service now disables all caching of - passwd and group databases by - default. This was interferring with the correct functioning of the - libnss_systemd.so module which is used by - systemd to manage uids and usernames in the presence of - DynamicUser= in systemd services. This was already the - default behaviour in presence of services.sssd.enable = - true because nscd caching would interfere with - sssd in unpredictable ways as well. Because we're using - nscd not for caching, but for convincing glibc to find NSS modules in the - nix store instead of an absolute path, we have decided to disable caching - globally now, as it's usually not the behaviour the user wants and can - lead to surprising behaviour. Furthermore, negative caching of host - lookups is also disabled now by default. This should fix the issue of dns - lookups failing in the presence of an unreliable network. - - - If the old behaviour is desired, this can be restored by setting the - services.nscd.config option with the desired caching - parameters. - - services.nscd.config = - '' - server-user nscd - threads 1 - paranoia no - debug-level 0 - - enable-cache passwd yes - positive-time-to-live passwd 600 - negative-time-to-live passwd 20 - suggested-size passwd 211 - check-files passwd yes - persistent passwd no - shared passwd yes - - enable-cache group yes - positive-time-to-live group 3600 - negative-time-to-live group 60 - suggested-size group 211 - check-files group yes - persistent group no - shared group yes - - enable-cache hosts yes - positive-time-to-live hosts 600 - negative-time-to-live hosts 5 - suggested-size hosts 211 - check-files hosts yes - persistent hosts no - shared hosts yes - ''; - - See - #50316 - for details. - - - - - GitLab Shell previously used the nix store paths for the - gitlab-shell command in its - authorized_keys file, which might stop working after - garbage collection. To circumvent that, we regenerated that file on each - startup. As gitlab-shell has now been changed to use - /var/run/current-system/sw/bin/gitlab-shell, this is - not necessary anymore, but there might be leftover lines with a nix store - path. Regenerate the authorized_keys file via - sudo -u git -H gitlab-rake gitlab:shell:setup in that - case. - - - - - The pam_unix account module is now loaded with its - control field set to required instead of - sufficient, so that later PAM account modules that - might do more extensive checks are being executed. Previously, the whole - account module verification was exited prematurely in case a nss module - provided the account name to pam_unix. The LDAP and - SSSD NixOS modules already add their NSS modules when enabled. In case - your setup breaks due to some later PAM account module previosuly - shadowed, or failing NSS lookups, please file a bug. You can get back the - old behaviour by manually setting -.text]]> - . - - - - - The pam_unix password module is now loaded with its - control field set to sufficient instead of - required, so that password managed only by later PAM - password modules are being executed. Previously, for example, changing an - LDAP account's password through PAM was not possible: the whole password - module verification was exited prematurely by pam_unix, - preventing pam_ldap to manage the password as it - should. - - - - - fish has been upgraded to 3.0. It comes with a number - of improvements and backwards incompatible changes. See the - fish - release - notes for more information. - - - - - The ibus-table input method has had a change in config format, which - causes all previous settings to be lost. See - this - commit message for details. - - - - - NixOS module system type types.optionSet and - lib.mkOption argument options are - deprecated. Use types.submodule instead. - (#54637) - - - - - matrix-synapse has been updated to version 0.99. It - will no - longer generate a self-signed certificate on first launch and will - be - the - last version to accept self-signed certificates. As such, it is now - recommended to use a proper certificate verified by a root CA (for example - Let's Encrypt). The new manual - chapter on Matrix contains a working example of using nginx as a - reverse proxy in front of matrix-synapse, using Let's - Encrypt certificates. - - - - - mailutils now works by default when - sendmail is not in a setuid wrapper. As a consequence, - the sendmailPath argument, having lost its main use, - has been removed. - - - - - graylog has been upgraded from version 2.* to 3.*. Some - setups making use of extraConfig (especially those exposing Graylog via - reverse proxies) need to be updated as upstream removed/replaced some - settings. See - Upgrading - Graylog for details. - - - - - The option users.ldap.bind.password was renamed to users.ldap.bind.passwordFile, - and needs to be readable by the nslcd user. - Same applies to the new users.ldap.daemon.rootpwmodpwFile option. - - - - - nodejs-6_x is end-of-life. - nodejs-6_x, nodejs-slim-6_x and - nodePackages_6_x are removed. - - - -
- -
- Other Notable Changes - - - - - The module gained the option - which determines the used Matomo - version. - - - The Matomo module now also comes with the systemd service - matomo-archive-processing.service and a timer that - automatically triggers archive processing every hour. This means that you - can safely - - disable browser triggers for Matomo archiving at - Administration > System > General Settings. - - - Additionally, you can enable to - - delete old visitor logs at Administration > System > - Privacy, but make sure that you run systemctl start - matomo-archive-processing.service at least once without errors - if you have already collected data before, so that the reports get - archived before the source data gets deleted. - - - - - composableDerivation along with supporting library - functions has been removed. - - - - - The deprecated truecrypt package has been removed and - truecrypt attribute is now an alias for - veracrypt. VeraCrypt is backward-compatible with - TrueCrypt volumes. Note that cryptsetup also supports - loading TrueCrypt volumes. - - - - - The Kubernetes DNS addons, kube-dns, has been replaced with CoreDNS. This - change is made in accordance with Kubernetes making CoreDNS the official - default starting from - Kubernetes - v1.11. Please beware that upgrading DNS-addon on existing clusters - might induce minor downtime while the DNS-addon terminates and - re-initializes. Also note that the DNS-service now runs with 2 pod - replicas by default. The desired number of replicas can be configured - using: . - - - - - The quassel-webserver package and module was removed from nixpkgs due to - the lack of maintainers. - - - - - The manual gained a new chapter on - self-hosting matrix-synapse and - riot-web , the most prevalent server and client - implementations for the - Matrix federated - communication network. - - - - - The astah-community package was removed from nixpkgs due to it being - discontinued and the downloads not being available anymore. - - - - - The httpd service now saves log files with a .log file extension by - default for easier integration with the logrotate service. - - - - - The owncloud server packages and httpd subservice module were removed from - nixpkgs due to the lack of maintainers. - - - - - It is possible now to uze ZRAM devices as general purpose ephemeral block - devices, not only as swap. Using more than 1 device as ZRAM swap is no - longer recommended, but is still possible by setting - zramSwap.swapDevices explicitly. - - - ZRAM algorithm can be changed now. - - - Changes to ZRAM algorithm are applied during nixos-rebuild - switch, so make sure you have enough swap space on disk to - survive ZRAM device rebuild. Alternatively, use nixos-rebuild - boot; reboot. - - - - - Flat volumes are now disabled by default in - hardware.pulseaudio. This has been done to prevent - applications, which are unaware of this feature, setting their volumes to - 100% on startup causing harm to your audio hardware and potentially your - ears. - - - - With this change application specific volumes are relative to the master - volume which can be adjusted independently, whereas before they were - absolute; meaning that in effect, it scaled the device-volume with the - volume of the loudest application. - - - - - - The - ndppd - module now supports all config - options provided by the current upstream version as service - options. Additionally the ndppd package doesn't contain - the systemd unit configuration from upstream anymore, the unit is - completely configured by the NixOS module now. - - - - - New installs of NixOS will default to the Redmine 4.x series unless - otherwise specified in services.redmine.package while - existing installs of NixOS will default to the Redmine 3.x series. - - - - - The Grafana module now - supports declarative - datasource - and dashboard provisioning. - - - - - The use of insecure ports on kubernetes has been deprecated. Thus options: - services.kubernetes.apiserver.port and - services.kubernetes.controllerManager.port has been - renamed to .insecurePort, and default of both options - has changed to 0 (disabled). - - - - - Note that the default value of - services.kubernetes.apiserver.bindAddress has changed - from 127.0.0.1 to 0.0.0.0, allowing the apiserver to be accessible from - outside the master node itself. If the apiserver insecurePort is enabled, - it is strongly recommended to only bind on the loopback interface. See: - services.kubernetes.apiserver.insecurebindAddress. - - - - - The option - services.kubernetes.apiserver.allowPrivileged and - services.kubernetes.kubelet.allowPrivileged now - defaults to false. Disallowing privileged containers on the cluster. - - - - - The kubernetes module does no longer add the kubernetes package to - environment.systemPackages implicitly. - - - - - The intel driver has been removed from the default list - of X.org video - drivers. The modesetting driver should take over - automatically, it is better maintained upstream and has less problems with - advanced X11 features. This can lead to a change in the output names used - by xrandr. Some performance regressions on some GPU - models might happen. Some OpenCL and VA-API applications might also break - (Beignet seems to provide OpenCL support with - modesetting driver, too). Kernel mode setting API does - not support backlight control, so xbacklight tool will - not work; backlight level can be controlled directly via - /sys/ or with brightnessctl. Users - who need this functionality more than multi-output XRandR are advised to - add `intel` to `videoDrivers` and report an issue (or provide additional - details in an existing one) - - - - - Openmpi has been updated to version 4.0.0, which removes some deprecated - MPI-1 symbols. This may break some older applications that still rely on - those symbols. An upgrade guide can be found - here. - - - The nginx package now relies on OpenSSL 1.1 and supports TLS 1.3 by - default. You can set the protocols used by the nginx service using - . - - - - - A new subcommand nixos-rebuild edit was added. - - - -
-
diff --git a/nixos/doc/manual/release-notes/rl-1909.section.md b/nixos/doc/manual/release-notes/rl-1909.section.md new file mode 100644 index 00000000000..572f1bf5a25 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-1909.section.md @@ -0,0 +1,313 @@ +# Release 19.09 ("Loris", 2019/10/09) {#sec-release-19.09} + +## Highlights {#sec-release-19.09-highlights} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- End of support is planned for end of April 2020, handing over to 20.03. + +- Nix has been updated to 2.3; see its [release notes](https://nixos.org/nix/manual/#ssec-relnotes-2.3). + +- Core version changes: + + systemd: 239 -\> 243 + + gcc: 7 -\> 8 + + glibc: 2.27 (unchanged) + + linux: 4.19 LTS (unchanged) + + openssl: 1.0 -\> 1.1 + +- Desktop version changes: + + plasma5: 5.14 -\> 5.16 + + gnome3: 3.30 -\> 3.32 + +- PHP now defaults to PHP 7.3, updated from 7.2. + +- PHP 7.1 is no longer supported due to upstream not supporting this version for the entire lifecycle of the 19.09 release. + +- The binfmt module is now easier to use. Additional systems can be added through `boot.binfmt.emulatedSystems`. For instance, `boot.binfmt.emulatedSystems = [ "wasm32-wasi" "x86_64-windows" "aarch64-linux" ];` will set up binfmt interpreters for each of those listed systems. + +- The installer now uses a less privileged `nixos` user whereas before we logged in as root. To gain root privileges use `sudo -i` without a password. + +- We\'ve updated to Xfce 4.14, which brings a new module `services.xserver.desktopManager.xfce4-14`. If you\'d like to upgrade, please switch from the `services.xserver.desktopManager.xfce` module as it will be deprecated in a future release. They\'re incompatibilities with the current Xfce module; it doesn\'t support `thunarPlugins` and it isn\'t recommended to use `services.xserver.desktopManager.xfce` and `services.xserver.desktopManager.xfce4-14` simultaneously or to downgrade from Xfce 4.14 after upgrading. + +- The GNOME 3 desktop manager module sports an interface to enable/disable core services, applications, and optional GNOME packages like games. + + - `services.gnome3.core-os-services.enable` + + - `services.gnome3.core-shell.enable` + + - `services.gnome3.core-utilities.enable` + + - `services.gnome3.games.enable` + + With these options we hope to give users finer grained control over their systems. Prior to this change you\'d either have to manually disable options or use `environment.gnome3.excludePackages` which only excluded the optional applications. `environment.gnome3.excludePackages` is now unguarded, it can exclude any package installed with `environment.systemPackages` in the GNOME 3 module. + +- Orthogonal to the previous changes to the GNOME 3 desktop manager module, we\'ve updated all default services and applications to match as close as possible to a default reference GNOME 3 experience. + + **The following changes were enacted in `services.gnome3.core-utilities.enable`** + + - `accerciser` + + - `dconf-editor` + + - `evolution` + + - `gnome-documents` + + - `gnome-nettool` + + - `gnome-power-manager` + + - `gnome-todo` + + - `gnome-tweaks` + + - `gnome-usage` + + - `gucharmap` + + - `nautilus-sendto` + + - `vinagre` + + - `cheese` + + - `geary` + + **The following changes were enacted in `services.gnome3.core-shell.enable`** + + - `gnome-color-manager` + + - `orca` + + - `services.avahi.enable` + +## New Services {#sec-release-19.09-new-services} + +The following new services were added since the last release: + +- `./programs/dwm-status.nix` + +- The new `hardware.printers` module allows to declaratively configure CUPS printers via the `ensurePrinters` and `ensureDefaultPrinter` options. `ensurePrinters` will never delete existing printers, but will make sure that the given printers are configured as declared. + +- There is a new [services.system-config-printer.enable](options.html#opt-services.system-config-printer.enable) and [programs.system-config-printer.enable](options.html#opt-programs.system-config-printer.enable) module for the program of the same name. If you previously had `system-config-printer` enabled through some other means you should migrate to using one of these modules. + + - `services.xserver.desktopManager.plasma5` + + - `services.xserver.desktopManager.gnome3` + + - `services.xserver.desktopManager.pantheon` + + - `services.xserver.desktopManager.mate` Note Mate uses `programs.system-config-printer` as it doesn\'t use it as a service, but its graphical interface directly. + +- [services.blueman.enable](options.html#opt-services.blueman.enable) has been added. If you previously had blueman installed via `environment.systemPackages` please migrate to using the NixOS module, as this would result in an insufficiently configured blueman. + +## Backward Incompatibilities {#sec-release-19.09-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- Buildbot no longer supports Python 2, as support was dropped upstream in version 2.0.0. Configurations may need to be modified to make them compatible with Python 3. + +- PostgreSQL now uses `/run/postgresql` as its socket directory instead of `/tmp`. So if you run an application like eg. Nextcloud, where you need to use the Unix socket path as the database host name, you need to change it accordingly. + +- PostgreSQL 9.4 is scheduled EOL during the 19.09 life cycle and has been removed. + +- The options `services.prometheus.alertmanager.user` and `services.prometheus.alertmanager.group` have been removed because the alertmanager service is now using systemd\'s [ DynamicUser mechanism](http://0pointer.net/blog/dynamic-users-with-systemd.html) which obviates these options. + +- The NetworkManager systemd unit was renamed back from network-manager.service to NetworkManager.service for better compatibility with other applications expecting this name. The same applies to ModemManager where modem-manager.service is now called ModemManager.service again. + +- The `services.nzbget.configFile` and `services.nzbget.openFirewall` options were removed as they are managed internally by the nzbget. The `services.nzbget.dataDir` option hadn\'t actually been used by the module for some time and so was removed as cleanup. + +- The `services.mysql.pidDir` option was removed, as it was only used by the wordpress apache-httpd service to wait for mysql to have started up. This can be accomplished by either describing a dependency on mysql.service (preferred) or waiting for the (hardcoded) `/run/mysqld/mysql.sock` file to appear. + +- The `services.emby.enable` module has been removed, see `services.jellyfin.enable` instead for a free software fork of Emby. See the Jellyfin documentation: [ Migrating from Emby to Jellyfin ](https://jellyfin.readthedocs.io/en/latest/administrator-docs/migrate-from-emby/) + +- IPv6 Privacy Extensions are now enabled by default for undeclared interfaces. The previous behaviour was quite misleading --- even though the default value for `networking.interfaces.*.preferTempAddress` was `true`, undeclared interfaces would not prefer temporary addresses. Now, interfaces not mentioned in the config will prefer temporary addresses. EUI64 addresses can still be set as preferred by explicitly setting the option to `false` for the interface in question. + +- Since Bittorrent Sync was superseded by Resilio Sync in 2016, the `bittorrentSync`, `bittorrentSync14`, and `bittorrentSync16` packages have been removed in favor of `resilio-sync`. + + The corresponding module, `services.btsync` has been replaced by the `services.resilio` module. + +- The httpd service no longer attempts to start the postgresql service. If you have come to depend on this behaviour then you can preserve the behavior with the following configuration: `systemd.services.httpd.after = [ "postgresql.service" ];` + + The option `services.httpd.extraSubservices` has been marked as deprecated. You may still use this feature, but it will be removed in a future release of NixOS. You are encouraged to convert any httpd subservices you may have written to a full NixOS module. + + Most of the httpd subservices packaged with NixOS have been replaced with full NixOS modules including LimeSurvey, WordPress, and Zabbix. These modules can be enabled using the `services.limesurvey.enable`, `services.mediawiki.enable`, `services.wordpress.enable`, and `services.zabbixWeb.enable` options. + +- The option `systemd.network.networks..routes.*.routeConfig.GatewayOnlink` was renamed to `systemd.network.networks..routes.*.routeConfig.GatewayOnLink` (capital `L`). This follows [ upstreams renaming ](https://github.com/systemd/systemd/commit/9cb8c5593443d24c19e40bfd4fc06d672f8c554c) of the setting. + +- As of this release the NixOps feature `autoLuks` is deprecated. It no longer works with our systemd version without manual intervention. + + Whenever the usage of the module is detected the evaluation will fail with a message explaining why and how to deal with the situation. + + A new knob named `nixops.enableDeprecatedAutoLuks` has been introduced to disable the eval failure and to acknowledge the notice was received and read. If you plan on using the feature please note that it might break with subsequent updates. + + Make sure you set the `_netdev` option for each of the file systems referring to block devices provided by the autoLuks module. Not doing this might render the system in a state where it doesn\'t boot anymore. + + If you are actively using the `autoLuks` module please let us know in [issue \#62211](https://github.com/NixOS/nixpkgs/issues/62211). + +- The setopt declarations will be evaluated at the end of `/etc/zshrc`, so any code in [programs.zsh.interactiveShellInit](options.html#opt-programs.zsh.interactiveShellInit), [programs.zsh.loginShellInit](options.html#opt-programs.zsh.loginShellInit) and [programs.zsh.promptInit](options.html#opt-programs.zsh.promptInit) may break if it relies on those options being set. + +- The `prometheus-nginx-exporter` package now uses the offical exporter provided by NGINX Inc. Its metrics are differently structured and are incompatible to the old ones. For information about the metrics, have a look at the [official repo](https://github.com/nginxinc/nginx-prometheus-exporter). + +- The `shibboleth-sp` package has been updated to version 3. It is largely backward compatible, for further information refer to the [release notes](https://wiki.shibboleth.net/confluence/display/SP3/ReleaseNotes) and [upgrade guide](https://wiki.shibboleth.net/confluence/display/SP3/UpgradingFromV2). + + Nodejs 8 is scheduled EOL under the lifetime of 19.09 and has been dropped. + +- By default, prometheus exporters are now run with `DynamicUser` enabled. Exporters that need a real user, now run under a seperate user and group which follow the pattern `-exporter`, instead of the previous default `nobody` and `nogroup`. Only some exporters are affected by the latter, namely the exporters `dovecot`, `node`, `postfix` and `varnish`. + +- The `ibus-qt` package is not installed by default anymore when [i18n.inputMethod.enabled](options.html#opt-i18n.inputMethod.enabled) is set to `ibus`. If IBus support in Qt 4.x applications is required, add the `ibus-qt` package to your [environment.systemPackages](options.html#opt-environment.systemPackages) manually. + +- The CUPS Printing service now uses socket-based activation by default, only starting when needed. The previous behavior can be restored by setting `services.cups.startWhenNeeded` to `false`. + +- The `services.systemhealth` module has been removed from nixpkgs due to lack of maintainer. + +- The `services.mantisbt` module has been removed from nixpkgs due to lack of maintainer. + +- Squid 3 has been removed and the `squid` derivation now refers to Squid 4. + +- The `services.pdns-recursor.extraConfig` option has been replaced by `services.pdns-recursor.settings`. The new option allows setting extra configuration while being better type-checked and mergeable. + +- No service depends on `keys.target` anymore which is a systemd target that indicates if all [NixOps keys](https://nixos.org/nixops/manual/#idm140737322342384) were successfully uploaded. Instead, `-key.service` should be used to define a dependency of a key in a service. The full issue behind the `keys.target` dependency is described at [NixOS/nixpkgs\#67265](https://github.com/NixOS/nixpkgs/issues/67265). + + The following services are affected by this: + + - [`services.dovecot2`](options.html#opt-services.dovecot2.enable) + + - [`services.nsd`](options.html#opt-services.nsd.enable) + + - [`services.softether`](options.html#opt-services.softether.enable) + + - [`services.strongswan`](options.html#opt-services.strongswan.enable) + + - [`services.strongswan-swanctl`](options.html#opt-services.strongswan-swanctl.enable) + + - [`services.httpd`](options.html#opt-services.httpd.enable) + +- The `security.acme.directory` option has been replaced by a read-only `security.acme.certs..directory` option for each certificate you define. This will be a subdirectory of `/var/lib/acme`. You can use this read-only option to figure out where the certificates are stored for a specific certificate. For example, the `services.nginx.virtualhosts..enableACME` option will use this directory option to find the certs for the virtual host. + + `security.acme.preDelay` and `security.acme.activationDelay` options have been removed. To execute a service before certificates are provisioned or renewed add a `RequiredBy=acme-${cert}.service` to any service. + + Furthermore, the acme module will not automatically add a dependency on `lighttpd.service` anymore. If you are using certficates provided by letsencrypt for lighttpd, then you should depend on the certificate service `acme-${cert}.service>` manually. + + For nginx, the dependencies are still automatically managed when `services.nginx.virtualhosts..enableACME` is enabled just like before. What changed is that nginx now directly depends on the specific certificates that it needs, instead of depending on the catch-all `acme-certificates.target`. This target unit was also removed from the codebase. This will mean nginx will no longer depend on certificates it isn\'t explicitly managing and fixes a bug with certificate renewal ordering racing with nginx restarting which could lead to nginx getting in a broken state as described at [NixOS/nixpkgs\#60180](https://github.com/NixOS/nixpkgs/issues/60180). + +- The old deprecated `emacs` package sets have been dropped. What used to be called `emacsPackagesNg` is now simply called `emacsPackages`. + +- `services.xserver.desktopManager.xterm` is now disabled by default if `stateVersion` is 19.09 or higher. Previously the xterm desktopManager was enabled when xserver was enabled, but it isn\'t useful for all people so it didn\'t make sense to have any desktopManager enabled default. + +- The WeeChat plugin `pkgs.weechatScripts.weechat-xmpp` has been removed as it doesn\'t receive any updates from upstream and depends on outdated Python2-based modules. + +- Old unsupported versions (`logstash5`, `kibana5`, `filebeat5`, `heartbeat5`, `metricbeat5`, `packetbeat5`) of the ELK-stack and Elastic beats have been removed. + +- For NixOS 19.03, both Prometheus 1 and 2 were available to allow for a seamless transition from version 1 to 2 with existing setups. Because Prometheus 1 is no longer developed, it was removed. Prometheus 2 is now configured with `services.prometheus`. + +- Citrix Receiver (`citrix_receiver`) has been dropped in favor of Citrix Workspace (`citrix_workspace`). + +- The `services.gitlab` module has had its literal secret options (`services.gitlab.smtp.password`, `services.gitlab.databasePassword`, `services.gitlab.initialRootPassword`, `services.gitlab.secrets.secret`, `services.gitlab.secrets.db`, `services.gitlab.secrets.otp` and `services.gitlab.secrets.jws`) replaced by file-based versions (`services.gitlab.smtp.passwordFile`, `services.gitlab.databasePasswordFile`, `services.gitlab.initialRootPasswordFile`, `services.gitlab.secrets.secretFile`, `services.gitlab.secrets.dbFile`, `services.gitlab.secrets.otpFile` and `services.gitlab.secrets.jwsFile`). This was done so that secrets aren\'t stored in the world-readable nix store, but means that for each option you\'ll have to create a file with the same exact string, add \"File\" to the end of the option name, and change the definition to a string pointing to the corresponding file; e.g. `services.gitlab.databasePassword = "supersecurepassword"` becomes `services.gitlab.databasePasswordFile = "/path/to/secret_file"` where the file `secret_file` contains the string `supersecurepassword`. + + The state path (`services.gitlab.statePath`) now has the following restriction: no parent directory can be owned by any other user than `root` or the user specified in `services.gitlab.user`; i.e. if `services.gitlab.statePath` is set to `/var/lib/gitlab/state`, `gitlab` and all parent directories must be owned by either `root` or the user specified in `services.gitlab.user`. + +- The `networking.useDHCP` option is unsupported in combination with `networking.useNetworkd` in anticipation of defaulting to it. It has to be set to `false` and enabled per interface with `networking.interfaces..useDHCP = true;` + +- The Twitter client `corebird` has been dropped as [it is discontinued and does not work against the new Twitter API](https://www.patreon.com/posts/corebirds-future-18921328). Please use the fork `cawbird` instead which has been adapted to the API changes and is still maintained. + +- The `nodejs-11_x` package has been removed as it\'s EOLed by upstream. + +- Because of the systemd upgrade, systemd-timesyncd will no longer work if `system.stateVersion` is not set correctly. When upgrading from NixOS 19.03, please make sure that `system.stateVersion` is set to `"19.03"`, or lower if the installation dates back to an earlier version of NixOS. + +- Due to the short lifetime of non-LTS kernel releases package attributes like `linux_5_1`, `linux_5_2` and `linux_5_3` have been removed to discourage dependence on specific non-LTS kernel versions in stable NixOS releases. Going forward, versioned attributes like `linux_4_9` will exist for LTS versions only. Please use `linux_latest` or `linux_testing` if you depend on non-LTS releases. Keep in mind that `linux_latest` and `linux_testing` will change versions under the hood during the lifetime of a stable release and might include breaking changes. + +- Because of the systemd upgrade, some network interfaces might change their name. For details see [ upstream docs](https://www.freedesktop.org/software/systemd/man/systemd.net-naming-scheme.html#History) or [ our ticket](https://github.com/NixOS/nixpkgs/issues/71086). + +## Other Notable Changes {#sec-release-19.09-notable-changes} + +- The `documentation` module gained an option named `documentation.nixos.includeAllModules` which makes the generated configuration.nix 5 manual page include all options from all NixOS modules included in a given `configuration.nix` configuration file. Currently, it is set to `false` by default as enabling it frequently prevents evaluation. But the plan is to eventually have it set to `true` by default. Please set it to `true` now in your `configuration.nix` and fix all the bugs it uncovers. + +- The `vlc` package gained support for Chromecast streaming, enabled by default. TCP port 8010 must be open for it to work, so something like `networking.firewall.allowedTCPPorts = [ 8010 ];` may be required in your configuration. Also consider enabling [ Accelerated Video Playback](https://nixos.wiki/wiki/Accelerated_Video_Playback) for better transcoding performance. + +- The following changes apply if the `stateVersion` is changed to 19.09 or higher. For `stateVersion = "19.03"` or lower the old behavior is preserved. + + - `solr.package` defaults to `pkgs.solr_8`. + +- The `hunspellDicts.fr-any` dictionary now ships with `fr_FR.{aff,dic}` which is linked to `fr-toutesvariantes.{aff,dic}`. + +- The `mysql` service now runs as `mysql` user. Previously, systemd did execute it as root, and mysql dropped privileges itself. This includes `ExecStartPre=` and `ExecStartPost=` phases. To accomplish that, runtime and data directory setup was delegated to RuntimeDirectory and tmpfiles. + +- With the upgrade to systemd version 242 the `systemd-timesyncd` service is no longer using `DynamicUser=yes`. In order for the upgrade to work we rely on an activation script to move the state from the old to the new directory. The older directory (prior `19.09`) was `/var/lib/private/systemd/timesync`. + + As long as the `system.config.stateVersion` is below `19.09` the state folder will migrated to its proper location (`/var/lib/systemd/timesync`), if required. + +- The package `avahi` is now built to look up service definitions from `/etc/avahi/services` instead of its output directory in the nix store. Accordingly the module `avahi` now supports custom service definitions via `services.avahi.extraServiceFiles`, which are then placed in the aforementioned directory. See avahi.service5 for more information on custom service definitions. + +- Since version 0.1.19, `cargo-vendor` honors package includes that are specified in the `Cargo.toml` file of Rust crates. `rustPlatform.buildRustPackage` uses `cargo-vendor` to collect and build dependent crates. Since this change in `cargo-vendor` changes the set of vendored files for most Rust packages, the hash that use used to verify the dependencies, `cargoSha256`, also changes. + + The `cargoSha256` hashes of all in-tree derivations that use `buildRustPackage` have been updated to reflect this change. However, third-party derivations that use `buildRustPackage` may have to be updated as well. + +- The `consul` package was upgraded past version `1.5`, so its deprecated legacy UI is no longer available. + +- The default resample-method for PulseAudio has been changed from the upstream default `speex-float-1` to `speex-float-5`. Be aware that low-powered ARM-based and MIPS-based boards will struggle with this so you\'ll need to set `hardware.pulseaudio.daemon.config.resample-method` back to `speex-float-1`. + +- The `phabricator` package and associated `httpd.extraSubservice`, as well as the `phd` service have been removed from nixpkgs due to lack of maintainer. + +- The `mercurial` `httpd.extraSubservice` has been removed from nixpkgs due to lack of maintainer. + +- The `trac` `httpd.extraSubservice` has been removed from nixpkgs because it was unmaintained. + +- The `foswiki` package and associated `httpd.extraSubservice` have been removed from nixpkgs due to lack of maintainer. + +- The `tomcat-connector` `httpd.extraSubservice` has been removed from nixpkgs. + +- It\'s now possible to change configuration in [services.nextcloud](options.html#opt-services.nextcloud.enable) after the initial deploy since all config parameters are persisted in an additional config file generated by the module. Previously core configuration like database parameters were set using their imperative installer after creating `/var/lib/nextcloud`. + +- There exists now `lib.forEach`, which is like `map`, but with arguments flipped. When mapping function body spans many lines (or has nested `map`s), it is often hard to follow which list is modified. + + Previous solution to this problem was either to use `lib.flip map` idiom or extract that anonymous mapping function to a named one. Both can still be used but `lib.forEach` is preferred over `lib.flip map`. + + The `/etc/sysctl.d/nixos.conf` file containing all the options set via [boot.kernel.sysctl](options.html#opt-boot.kernel.sysctl) was moved to `/etc/sysctl.d/60-nixos.conf`, as sysctl.d5 recommends prefixing all filenames in `/etc/sysctl.d` with a two-digit number and a dash to simplify the ordering of the files. + +- We now install the sysctl snippets shipped with systemd. + + - Loose reverse path filtering + + - Source route filtering + + - `fq_codel` as a packet scheduler (this helps to fight bufferbloat) + + This also configures the kernel to pass core dumps to `systemd-coredump`, and restricts the SysRq key combinations to the sync command only. These sysctl snippets can be found in `/etc/sysctl.d/50-*.conf`, and overridden via [boot.kernel.sysctl](options.html#opt-boot.kernel.sysctl) (which will place the parameters in `/etc/sysctl.d/60-nixos.conf`). + +- Core dumps are now processed by `systemd-coredump` by default. `systemd-coredump` behaviour can still be modified via `systemd.coredump.extraConfig`. To stick to the old behaviour (having the kernel dump to a file called `core` in the working directory), without piping it through `systemd-coredump`, set `systemd.coredump.enable` to `false`. + +- `systemd.packages` option now also supports generators and shutdown scripts. Old `systemd.generator-packages` option has been removed. + +- The `rmilter` package was removed with associated module and options due deprecation by upstream developer. Use `rspamd` in proxy mode instead. + +- systemd cgroup accounting via the [systemd.enableCgroupAccounting](options.html#opt-systemd.enableCgroupAccounting) option is now enabled by default. It now also enables the more recent Block IO and IP accounting features. + +- We no longer enable custom font rendering settings with `fonts.fontconfig.penultimate.enable` by default. The defaults from fontconfig are sufficient. + +- The `crashplan` package and the `crashplan` service have been removed from nixpkgs due to crashplan shutting down the service, while the `crashplansb` package and `crashplan-small-business` service have been removed from nixpkgs due to lack of maintainer. + + The [redis module](options.html#opt-services.redis.enable) was hardcoded to use the `redis` user, `/run/redis` as runtime directory and `/var/lib/redis` as state directory. Note that the NixOS module for Redis now disables kernel support for Transparent Huge Pages (THP), because this features causes major performance problems for Redis, e.g. (https://redis.io/topics/latency). + +- Using `fonts.enableDefaultFonts` adds a default emoji font `noto-fonts-emoji`. + + - `services.xserver.enable` + + - `programs.sway.enable` + + - `programs.way-cooler.enable` + + - `services.xrdp.enable` + +- The `altcoins` categorization of packages has been removed. You now access these packages at the top level, ie. `nix-shell -p dogecoin` instead of `nix-shell -p altcoins.dogecoin`, etc. + +- Ceph has been upgraded to v14.2.1. See the [release notes](https://ceph.com/releases/v14-2-0-nautilus-released/) for details. The mgr dashboard as well as osds backed by loop-devices is no longer explicitly supported by the package and module. Note: There\'s been some issues with python-cherrypy, which is used by the dashboard and prometheus mgr modules (and possibly others), hence 0000-dont-check-cherrypy-version.patch. + +- `pkgs.weechat` is now compiled against `pkgs.python3`. Weechat also recommends [to use Python3 in their docs.](https://weechat.org/scripts/python3/) diff --git a/nixos/doc/manual/release-notes/rl-1909.xml b/nixos/doc/manual/release-notes/rl-1909.xml deleted file mode 100644 index 0dae49c636f..00000000000 --- a/nixos/doc/manual/release-notes/rl-1909.xml +++ /dev/null @@ -1,902 +0,0 @@ -
- Release 19.09 (“Loris”, 2019/10/09) - -
- Highlights - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - End of support is planned for end of April 2020, handing over to 20.03. - - - - - Nix has been updated to 2.3; see its - release - notes. - - - - Core version changes: - systemd: 239 -> 243 - gcc: 7 -> 8 - glibc: 2.27 (unchanged) - linux: 4.19 LTS (unchanged) - openssl: 1.0 -> 1.1 - - - Desktop version changes: - plasma5: 5.14 -> 5.16 - gnome3: 3.30 -> 3.32 - - - - PHP now defaults to PHP 7.3, updated from 7.2. - - - - - PHP 7.1 is no longer supported due to upstream not supporting this version for the entire lifecycle of the 19.09 release. - - - - - The binfmt module is now easier to use. Additional systems can - be added through . - For instance, boot.binfmt.emulatedSystems = [ - "wasm32-wasi" "x86_64-windows" "aarch64-linux" ]; will - set up binfmt interpreters for each of those listed systems. - - - - - The installer now uses a less privileged nixos user whereas before we logged in as root. - To gain root privileges use sudo -i without a password. - - - - - We've updated to Xfce 4.14, which brings a new module . - If you'd like to upgrade, please switch from the module as it - will be deprecated in a future release. They're incompatibilities with the current Xfce module; it doesn't support - and it isn't recommended to use - and simultaneously or to downgrade from Xfce 4.14 after upgrading. - - - - - The GNOME 3 desktop manager module sports an interface to enable/disable core services, applications, and optional GNOME packages - like games. - - This can be achieved with the following options which the desktop manager default enables, excluding games. - - - - - - With these options we hope to give users finer grained control over their systems. Prior to this change you'd either have to manually - disable options or use which only excluded the optional applications. - is now unguarded, it can exclude any package installed with - in the GNOME 3 module. - - - - - Orthogonal to the previous changes to the GNOME 3 desktop manager module, we've updated all default services and applications - to match as close as possible to a default reference GNOME 3 experience. - - - The following changes were enacted in - - - Applications removed from defaults: - accerciser - dconf-editor - evolution - gnome-documents - gnome-nettool - gnome-power-manager - gnome-todo - gnome-tweaks - gnome-usage - gucharmap - nautilus-sendto - vinagre - - - Applications added to defaults: - cheese - geary - - - The following changes were enacted in - - - Applications added to defaults: - gnome-color-manager - orca - - - Services enabled: - - - - -
- -
- New Services - - - The following new services were added since the last release: - - - - - - ./programs/dwm-status.nix - - - - - The new hardware.printers module allows to declaratively configure CUPS printers - via the ensurePrinters and - ensureDefaultPrinter options. - ensurePrinters will never delete existing printers, - but will make sure that the given printers are configured as declared. - - - - - There is a new and module - for the program of the same name. If you previously had system-config-printer enabled through some other - means you should migrate to using one of these modules. - - - If you're a user of the following desktopManager modules no action is needed: - - - - - - - - - - - - - Note Mate uses programs.system-config-printer as it doesn't - use it as a service, but its graphical interface directly. - - - - - - - has been added. - If you previously had blueman installed via please - migrate to using the NixOS module, as this would result in an insufficiently configured blueman. - - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - Buildbot no longer supports Python 2, as support was dropped upstream in - version 2.0.0. Configurations may need to be modified to make them - compatible with Python 3. - - - - - PostgreSQL now uses - /run/postgresql as its socket - directory instead of /tmp. So - if you run an application like eg. Nextcloud, where you need to use - the Unix socket path as the database host name, you need to change it - accordingly. - - - - - PostgreSQL 9.4 is scheduled EOL during the 19.09 life cycle and has been removed. - - - - - The options and - have been removed - because the alertmanager service is now using systemd's - DynamicUser mechanism which obviates these options. - - - - - The NetworkManager systemd unit was renamed back from network-manager.service to - NetworkManager.service for better compatibility with other applications expecting this name. - The same applies to ModemManager where modem-manager.service is now called ModemManager.service again. - - - - - The and - options were removed as they are managed internally by the nzbget. The - option hadn't actually been used by - the module for some time and so was removed as cleanup. - - - - - The option was removed, as it was only used by the wordpress - apache-httpd service to wait for mysql to have started up. - This can be accomplished by either describing a dependency on mysql.service (preferred) - or waiting for the (hardcoded) /run/mysqld/mysql.sock file to appear. - - - - - The module has been removed, see - instead for a free software fork of Emby. - - See the Jellyfin documentation: - - Migrating from Emby to Jellyfin - - - - - - IPv6 Privacy Extensions are now enabled by default for undeclared - interfaces. The previous behaviour was quite misleading — even though - the default value for - was - true, undeclared interfaces would not prefer temporary - addresses. Now, interfaces not mentioned in the config will prefer - temporary addresses. EUI64 addresses can still be set as preferred by - explicitly setting the option to false for the - interface in question. - - - - - Since Bittorrent Sync was superseded by Resilio Sync in 2016, the - bittorrentSync, bittorrentSync14, - and bittorrentSync16 packages have been removed in - favor of resilio-sync. - - - The corresponding module, has been - replaced by the module. - - - - - The httpd service no longer attempts to start the postgresql service. If you have come to depend - on this behaviour then you can preserve the behavior with the following configuration: - systemd.services.httpd.after = [ "postgresql.service" ]; - - - The option has been - marked as deprecated. You may still use this feature, but it will be - removed in a future release of NixOS. You are encouraged to convert any - httpd subservices you may have written to a full NixOS module. - - - Most of the httpd subservices packaged with NixOS have been replaced with - full NixOS modules including LimeSurvey, WordPress, and Zabbix. These - modules can be enabled using the , - , , - and options. - - - - - The option - was renamed to - (capital L). This follows - - upstreams renaming - of the setting. - - - - - As of this release the NixOps feature autoLuks is deprecated. It no longer works - with our systemd version without manual intervention. - - - Whenever the usage of the module is detected the evaluation will fail with a message - explaining why and how to deal with the situation. - - - A new knob named nixops.enableDeprecatedAutoLuks - has been introduced to disable the eval failure and to acknowledge the notice was received and read. - If you plan on using the feature please note that it might break with subsequent updates. - - - Make sure you set the _netdev option for each of the file systems referring to block - devices provided by the autoLuks module. Not doing this might render the system in a - state where it doesn't boot anymore. - - - If you are actively using the autoLuks module please let us know in - issue #62211. - - - - - The setopt declarations will be evaluated at the end of /etc/zshrc, so any code in , - and may break if it relies on those options being set. - - - - - The prometheus-nginx-exporter package now uses the offical exporter provided by NGINX Inc. - Its metrics are differently structured and are incompatible to the old ones. For information about the metrics, - have a look at the official repo. - - - - - The shibboleth-sp package has been updated to version 3. - It is largely backward compatible, for further information refer to the - release notes - and upgrade guide. - - - Nodejs 8 is scheduled EOL under the lifetime of 19.09 and has been dropped. - - - - - By default, prometheus exporters are now run with DynamicUser enabled. - Exporters that need a real user, now run under a seperate user and group which follow the pattern <exporter-name>-exporter, instead of the previous default nobody and nogroup. - Only some exporters are affected by the latter, namely the exporters dovecot, node, postfix and varnish. - - - - - The ibus-qt package is not installed by default anymore when is set to ibus. - If IBus support in Qt 4.x applications is required, add the ibus-qt package to your manually. - - - - - The CUPS Printing service now uses socket-based activation by - default, only starting when needed. The previous behavior can - be restored by setting - to - false. - - - - - The module has been removed from nixpkgs due to lack of maintainer. - - - - - The module has been removed from nixpkgs due to lack of maintainer. - - - - - Squid 3 has been removed and the derivation now refers to Squid 4. - - - - - The option has been replaced by - . The new option allows setting extra - configuration while being better type-checked and mergeable. - - - - - No service depends on keys.target anymore which is a systemd - target that indicates if all NixOps keys were successfully uploaded. - Instead, <key-name>-key.service should be used to define - a dependency of a key in a service. The full issue behind the keys.target - dependency is described at NixOS/nixpkgs#67265. - - - The following services are affected by this: - - services.dovecot2 - services.nsd - services.softether - services.strongswan - services.strongswan-swanctl - services.httpd - - - - - - The option has been replaced by a read-only option for each certificate you define. This will be - a subdirectory of /var/lib/acme. You can use this read-only option to figure out where the certificates are stored for a specific certificate. For example, - the option will use this directory option to find the certs for the virtual host. - - - and options have been removed. To execute a service before certificates - are provisioned or renewed add a RequiredBy=acme-${cert}.service to any service. - - - Furthermore, the acme module will not automatically add a dependency on lighttpd.service anymore. If you are using certficates provided by letsencrypt - for lighttpd, then you should depend on the certificate service acme-${cert}.service> manually. - - - For nginx, the dependencies are still automatically managed when is enabled just like before. What changed is that nginx now directly depends on the specific certificates that it needs, - instead of depending on the catch-all acme-certificates.target. This target unit was also removed from the codebase. - This will mean nginx will no longer depend on certificates it isn't explicitly managing and fixes a bug with certificate renewal - ordering racing with nginx restarting which could lead to nginx getting in a broken state as described at - NixOS/nixpkgs#60180. - - - - - The old deprecated emacs package sets have been dropped. - What used to be called emacsPackagesNg is now simply called emacsPackages. - - - - - is now disabled by default if stateVersion is 19.09 or higher. - Previously the xterm desktopManager was enabled when xserver was enabled, but it isn't useful for all people so it didn't make sense to - have any desktopManager enabled default. - - - - - The WeeChat plugin pkgs.weechatScripts.weechat-xmpp has been removed as it doesn't receive - any updates from upstream and depends on outdated Python2-based modules. - - - - - Old unsupported versions (logstash5, - kibana5, - filebeat5, - heartbeat5, - metricbeat5, - packetbeat5) of the ELK-stack and Elastic beats have been removed. - - - - - For NixOS 19.03, both Prometheus 1 and 2 were available to allow for - a seamless transition from version 1 to 2 with existing setups. - Because Prometheus 1 is no longer developed, it was removed. - Prometheus 2 is now configured with services.prometheus. - - - - - Citrix Receiver (citrix_receiver) has been dropped in favor of Citrix Workspace - (citrix_workspace). - - - - - The services.gitlab module has had its literal secret options (, - , - , - , - , - and - ) replaced by file-based versions (, - , - , - , - , - and - ). This was done so that secrets aren't stored - in the world-readable nix store, but means that for each option you'll have to create a file with - the same exact string, add "File" to the end of the option name, and change the definition to a - string pointing to the corresponding file; e.g. services.gitlab.databasePassword = "supersecurepassword" - becomes services.gitlab.databasePasswordFile = "/path/to/secret_file" where the - file secret_file contains the string supersecurepassword. - - - The state path () now has the following restriction: - no parent directory can be owned by any other user than root or the user - specified in ; i.e. if - is set to /var/lib/gitlab/state, gitlab and all parent directories - must be owned by either root or the user specified in . - - - - - The option is unsupported in combination with - in anticipation of defaulting to it. - It has to be set to false and enabled per - interface with - - - - - The Twitter client corebird has been dropped as it is discontinued and does not work against the new Twitter API. - Please use the fork cawbird instead which has been adapted to the API changes and is still maintained. - - - - - The nodejs-11_x package has been removed as it's EOLed by upstream. - - - - - Because of the systemd upgrade, - systemd-timesyncd will no longer work if - is not set correctly. When - upgrading from NixOS 19.03, please make sure that - is set to - "19.03", or lower if the installation dates back to an - earlier version of NixOS. - - - - - Due to the short lifetime of non-LTS kernel releases package attributes like linux_5_1, - linux_5_2 and linux_5_3 have been removed to discourage dependence - on specific non-LTS kernel versions in stable NixOS releases. - - Going forward, versioned attributes like linux_4_9 will exist for LTS versions only. - Please use linux_latest or linux_testing if you depend on non-LTS - releases. Keep in mind that linux_latest and linux_testing will - change versions under the hood during the lifetime of a stable release and might include breaking changes. - - - - - Because of the systemd upgrade, - some network interfaces might change their name. For details see - - upstream docs or - our ticket. - - - -
- -
- Other Notable Changes - - - - - The module gained an option named - which makes the - generated - configuration.nix - 5 manual page include all options - from all NixOS modules included in a given - configuration.nix configuration file. Currently, it is - set to false by default as enabling it frequently - prevents evaluation. But the plan is to eventually have it set to - true by default. Please set it to - true now in your configuration.nix - and fix all the bugs it uncovers. - - - - - The vlc package gained support for Chromecast - streaming, enabled by default. TCP port 8010 must be open for it to work, - so something like networking.firewall.allowedTCPPorts = [ 8010 - ]; may be required in your configuration. Also consider enabling - - Accelerated Video Playback for better transcoding performance. - - - - - The following changes apply if the stateVersion is - changed to 19.09 or higher. For stateVersion = "19.03" - or lower the old behavior is preserved. - - - - - solr.package defaults to - pkgs.solr_8. - - - - - - - The hunspellDicts.fr-any dictionary now ships with fr_FR.{aff,dic} - which is linked to fr-toutesvariantes.{aff,dic}. - - - - - The mysql service now runs as mysql - user. Previously, systemd did execute it as root, and mysql dropped privileges - itself. - This includes ExecStartPre= and - ExecStartPost= phases. - To accomplish that, runtime and data directory setup was delegated to - RuntimeDirectory and tmpfiles. - - - - - With the upgrade to systemd version 242 the systemd-timesyncd - service is no longer using DynamicUser=yes. In order for the - upgrade to work we rely on an activation script to move the state from the old - to the new directory. The older directory (prior 19.09) was - /var/lib/private/systemd/timesync. - - - As long as the system.config.stateVersion is below - 19.09 the state folder will migrated to its proper location - (/var/lib/systemd/timesync), if required. - - - - - The package avahi is now built to look up service - definitions from /etc/avahi/services instead of its - output directory in the nix store. Accordingly the module - now supports custom service definitions via - , which are then placed - in the aforementioned directory. See - avahi.service5 - for more information on custom service definitions. - - - - - Since version 0.1.19, cargo-vendor honors package - includes that are specified in the Cargo.toml - file of Rust crates. rustPlatform.buildRustPackage uses - cargo-vendor to collect and build dependent crates. - Since this change in cargo-vendor changes the set of - vendored files for most Rust packages, the hash that use used to verify - the dependencies, cargoSha256, also changes. - - - The cargoSha256 hashes of all in-tree derivations that - use buildRustPackage have been updated to reflect this - change. However, third-party derivations that use - buildRustPackage may have to be updated as well. - - - - - The consul package was upgraded past version 1.5, - so its deprecated legacy UI is no longer available. - - - - - The default resample-method for PulseAudio has been changed from the upstream default speex-float-1 - to speex-float-5. Be aware that low-powered ARM-based and MIPS-based boards will struggle with this - so you'll need to set back to speex-float-1. - - - - - The phabricator package and associated httpd.extraSubservice, as well as the - phd service have been removed from nixpkgs due to lack of maintainer. - - - - - The mercurial httpd.extraSubservice has been removed from nixpkgs due to lack of maintainer. - - - - - The trac httpd.extraSubservice has been removed from nixpkgs because it was unmaintained. - - - - - The foswiki package and associated httpd.extraSubservice have been removed - from nixpkgs due to lack of maintainer. - - - - - The tomcat-connector httpd.extraSubservice has been removed from nixpkgs. - - - - - It's now possible to change configuration in - services.nextcloud after the initial deploy - since all config parameters are persisted in an additional config file generated by the module. - Previously core configuration like database parameters were set using their imperative - installer after creating /var/lib/nextcloud. - - - - - There exists now lib.forEach, which is like map, but with - arguments flipped. When mapping function body spans many lines (or has nested - maps), it is often hard to follow which list is modified. - - - Previous solution to this problem was either to use lib.flip map - idiom or extract that anonymous mapping function to a named one. Both can still be used - but lib.forEach is preferred over lib.flip map. - - - The /etc/sysctl.d/nixos.conf file containing all the options set via - boot.kernel.sysctl was moved to - /etc/sysctl.d/60-nixos.conf, as - sysctl.d5 - recommends prefixing all filenames in /etc/sysctl.d with a - two-digit number and a dash to simplify the ordering of the files. - - - - - We now install the sysctl snippets shipped with systemd. - - This enables: - - Loose reverse path filtering - - - Source route filtering - - - - fq_codel as a packet scheduler (this helps to fight bufferbloat) - - - - This also configures the kernel to pass core dumps to systemd-coredump, - and restricts the SysRq key combinations to the sync command only. - These sysctl snippets can be found in /etc/sysctl.d/50-*.conf, - and overridden via boot.kernel.sysctl - (which will place the parameters in /etc/sysctl.d/60-nixos.conf). - - - - - Core dumps are now processed by systemd-coredump - by default. systemd-coredump behaviour can - still be modified via - . To stick to the - old behaviour (having the kernel dump to a file called - core in the working directory), without piping - it through systemd-coredump, set - to - false. - - - - - systemd.packages option now also supports generators and - shutdown scripts. Old systemd.generator-packages option has - been removed. - - - - - The rmilter package was removed with associated module and options due deprecation by upstream developer. - Use rspamd in proxy mode instead. - - - - - systemd cgroup accounting via the - systemd.enableCgroupAccounting - option is now enabled by default. It now also enables the more recent Block IO and IP accounting - features. - - - - - We no longer enable custom font rendering settings with by default. - The defaults from fontconfig are sufficient. - - - - - The crashplan package and the - crashplan service have been removed from nixpkgs due to - crashplan shutting down the service, while the crashplansb - package and crashplan-small-business service have been - removed from nixpkgs due to lack of maintainer. - - - The redis module was hardcoded to use the redis user, - /run/redis as runtime directory and - /var/lib/redis as state directory. - Note that the NixOS module for Redis now disables kernel support for Transparent Huge Pages (THP), - because this features causes major performance problems for Redis, - e.g. (https://redis.io/topics/latency). - - - - - Using adds a default emoji font noto-fonts-emoji. - - Users of the following options will have this enabled by default: - - - - - - - - - - - - - - - - - - The altcoins categorization of packages has - been removed. You now access these packages at the top level, - ie. nix-shell -p dogecoin instead of - nix-shell -p altcoins.dogecoin, etc. - - - - - Ceph has been upgraded to v14.2.1. - See the release notes for details. - The mgr dashboard as well as osds backed by loop-devices is no longer explicitly supported by the package and module. - Note: There's been some issues with python-cherrypy, which is used by the dashboard - and prometheus mgr modules (and possibly others), hence 0000-dont-check-cherrypy-version.patch. - - - - - pkgs.weechat is now compiled against pkgs.python3. - Weechat also recommends to use Python3 - in their docs. - - - -
-
diff --git a/nixos/doc/manual/release-notes/rl-2003.section.md b/nixos/doc/manual/release-notes/rl-2003.section.md new file mode 100644 index 00000000000..b92c7f6634c --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-2003.section.md @@ -0,0 +1,507 @@ +# Release 20.03 ("Markhor", 2020.04/20) {#sec-release-20.03} + +## Highlights {#sec-release-20.03-highlights} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- Support is planned until the end of October 2020, handing over to 20.09. + +- Core version changes: + + gcc: 8.3.0 -\> 9.2.0 + + glibc: 2.27 -\> 2.30 + + linux: 4.19 -\> 5.4 + + mesa: 19.1.5 -\> 19.3.3 + + openssl: 1.0.2u -\> 1.1.1d + +- Desktop version changes: + + plasma5: 5.16.5 -\> 5.17.5 + + kdeApplications: 19.08.2 -\> 19.12.3 + + gnome3: 3.32 -\> 3.34 + + pantheon: 5.0 -\> 5.1.3 + +- Linux kernel is updated to branch 5.4 by default (from 4.19). + +- Grub is updated to 2.04, adding support for booting from F2FS filesystems and Btrfs volumes using zstd compression. Note that some users have been unable to boot after upgrading to 2.04 - for more information, please see [this discussion](https://github.com/NixOS/nixpkgs/issues/61718#issuecomment-617618503). + +- Postgresql for NixOS service now defaults to v11. + +- The graphical installer image starts the graphical session automatically. Before you\'d be greeted by a tty and asked to enter `systemctl start display-manager`. It is now possible to disable the display-manager from running by selecting the `Disable display-manager` quirk in the boot menu. + +- GNOME 3 has been upgraded to 3.34. Please take a look at their [Release Notes](https://help.gnome.org/misc/release-notes/3.34) for details. + +- If you enable the Pantheon Desktop Manager via [services.xserver.desktopManager.pantheon.enable](options.html#opt-services.xserver.desktopManager.pantheon.enable), we now default to also use [ Pantheon\'s newly designed greeter ](https://blog.elementary.io/say-hello-to-the-new-greeter/). Contrary to NixOS\'s usual update policy, Pantheon will receive updates during the cycle of NixOS 20.03 when backwards compatible. + +- By default zfs pools will now be trimmed on a weekly basis. Trimming is only done on supported devices (i.e. NVME or SSDs) and should improve throughput and lifetime of these devices. It is controlled by the `services.zfs.trim.enable` varname. The zfs scrub service (`services.zfs.autoScrub.enable`) and the zfs autosnapshot service (`services.zfs.autoSnapshot.enable`) are now only enabled if zfs is set in `config.boot.initrd.supportedFilesystems` or `config.boot.supportedFilesystems`. These lists will automatically contain zfs as soon as any zfs mountpoint is configured in `fileSystems`. + +- `nixos-option` has been rewritten in C++, speeding it up, improving correctness, and adding a `-r` option which prints all options and their values recursively. + +- `services.xserver.desktopManager.default` and `services.xserver.windowManager.default` options were replaced by a single [services.xserver.displayManager.defaultSession](options.html#opt-services.xserver.displayManager.defaultSession) option to improve support for upstream session files. If you used something like: + + ```nix + { + services.xserver.desktopManager.default = "xfce"; + services.xserver.windowManager.default = "icewm"; + } + ``` + + you should change it to: + + ```nix + { + services.xserver.displayManager.defaultSession = "xfce+icewm"; + } + ``` + +- The testing driver implementation in NixOS is now in Python `make-test-python.nix`. This was done by Jacek Galowicz ([\@tfc](https://github.com/tfc)), and with the collaboration of Julian Stecklina ([\@blitz](https://github.com/blitz)) and Jana Traue ([\@jtraue](https://github.com/jtraue)). All documentation has been updated to use this testing driver, and a vast majority of the 286 tests in NixOS were ported to python driver. In 20.09 the Perl driver implementation, `make-test.nix`, is slated for removal. This should give users of the NixOS integration framework a transitory period to rewrite their tests to use the Python implementation. Users of the Perl driver will see this warning everytime they use it: + + ```ShellSession + $ warning: Perl VM tests are deprecated and will be removed for 20.09. + Please update your tests to use the python test driver. + See https://github.com/NixOS/nixpkgs/pull/71684 for details. + ``` + + API compatibility is planned to be kept for at least the next release with the perl driver. + +## New Services {#sec-release-20.03-new-services} + +The following new services were added since the last release: + +- The kubernetes kube-proxy now supports a new hostname configuration `services.kubernetes.proxy.hostname` which has to be set if the hostname of the node should be non default. + +- UPower\'s configuration is now managed by NixOS and can be customized via `services.upower`. + +- To use Geary you should enable [programs.geary.enable](options.html#opt-programs.geary.enable) instead of just adding it to [environment.systemPackages](options.html#opt-environment.systemPackages). It was created so Geary could function properly outside of GNOME. + +- `./config/console.nix` + +- `./hardware/brillo.nix` + +- `./hardware/tuxedo-keyboard.nix` + +- `./programs/bandwhich.nix` + +- `./programs/bash-my-aws.nix` + +- `./programs/liboping.nix` + +- `./programs/traceroute.nix` + +- `./services/backup/sanoid.nix` + +- `./services/backup/syncoid.nix` + +- `./services/backup/zfs-replication.nix` + +- `./services/continuous-integration/buildkite-agents.nix` + +- `./services/databases/victoriametrics.nix` + +- `./services/desktops/gnome3/gnome-initial-setup.nix` + +- `./services/desktops/neard.nix` + +- `./services/games/openarena.nix` + +- `./services/hardware/fancontrol.nix` + +- `./services/mail/sympa.nix` + +- `./services/misc/freeswitch.nix` + +- `./services/misc/mame.nix` + +- `./services/monitoring/do-agent.nix` + +- `./services/monitoring/prometheus/xmpp-alerts.nix` + +- `./services/network-filesystems/orangefs/server.nix` + +- `./services/network-filesystems/orangefs/client.nix` + +- `./services/networking/3proxy.nix` + +- `./services/networking/corerad.nix` + +- `./services/networking/go-shadowsocks2.nix` + +- `./services/networking/ntp/openntpd.nix` + +- `./services/networking/shorewall.nix` + +- `./services/networking/shorewall6.nix` + +- `./services/networking/spacecookie.nix` + +- `./services/networking/trickster.nix` + +- `./services/networking/v2ray.nix` + +- `./services/networking/xandikos.nix` + +- `./services/networking/yggdrasil.nix` + +- `./services/web-apps/dokuwiki.nix` + +- `./services/web-apps/gotify-server.nix` + +- `./services/web-apps/grocy.nix` + +- `./services/web-apps/ihatemoney` + +- `./services/web-apps/moinmoin.nix` + +- `./services/web-apps/trac.nix` + +- `./services/web-apps/trilium.nix` + +- `./services/web-apps/shiori.nix` + +- `./services/web-servers/ttyd.nix` + +- `./services/x11/picom.nix` + +- `./services/x11/hardware/digimend.nix` + +- `./services/x11/imwheel.nix` + +- `./virtualisation/cri-o.nix` + +## Backward Incompatibilities {#sec-release-20.03-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- The dhcpcd package [ does not request IPv4 addresses for tap and bridge interfaces anymore by default](https://roy.marples.name/archives/dhcpcd-discuss/0002621.html). In order to still get an address on a bridge interface, one has to disable `networking.useDHCP` and explicitly enable `networking.interfaces..useDHCP` on every interface, that should get an address via DHCP. This way, dhcpcd is configured in an explicit way about which interface to run on. + +- GnuPG is now built without support for a graphical passphrase entry by default. Please enable the `gpg-agent` user service via the NixOS option `programs.gnupg.agent.enable`. Note that upstream recommends using `gpg-agent` and will spawn a `gpg-agent` on the first invocation of GnuPG anyway. + +- The `dynamicHosts` option has been removed from the [NetworkManager](options.html#opt-networking.networkmanager.enable) module. Allowing (multiple) regular users to override host entries affecting the whole system opens up a huge attack vector. There seem to be very rare cases where this might be useful. Consider setting system-wide host entries using [networking.hosts](options.html#opt-networking.hosts), provide them via the DNS server in your network, or use [environment.etc](options.html#opt-environment.etc) to add a file into `/etc/NetworkManager/dnsmasq.d` reconfiguring `hostsdir`. + +- The `99-main.network` file was removed. Matching all network interfaces caused many breakages, see [\#18962](https://github.com/NixOS/nixpkgs/pull/18962) and [\#71106](https://github.com/NixOS/nixpkgs/pull/71106). + + We already don\'t support the global [networking.useDHCP](options.html#opt-networking.useDHCP), [networking.defaultGateway](options.html#opt-networking.defaultGateway) and [networking.defaultGateway6](options.html#opt-networking.defaultGateway6) options if [networking.useNetworkd](options.html#opt-networking.useNetworkd) is enabled, but direct users to configure the per-device [networking.interfaces.\....](options.html#opt-networking.interfaces) options. + +- The stdenv now runs all bash with `set -u`, to catch the use of undefined variables. Before, it itself used `set -u` but was careful to unset it so other packages\' code ran as before. Now, all bash code is held to the same high standard, and the rather complex stateful manipulation of the options can be discarded. + +- The SLIM Display Manager has been removed, as it has been unmaintained since 2013. Consider migrating to a different display manager such as LightDM (current default in NixOS), SDDM, GDM, or using the startx module which uses Xinitrc. + +- The Way Cooler wayland compositor has been removed, as the project has been officially canceled. There are no more `way-cooler` attribute and `programs.way-cooler` options. + +- The BEAM package set has been deleted. You will only find there the different interpreters. You should now use the different build tools coming with the languages with sandbox mode disabled. + +- There is now only one Xfce package-set and module. This means that attributes `xfce4-14` and `xfceUnstable` all now point to the latest Xfce 4.14 packages. And in the future NixOS releases will be the latest released version of Xfce available at the time of the release\'s development (if viable). + +- The [phpfpm](options.html#opt-services.phpfpm.pools) module now sets `PrivateTmp=true` in its systemd units for better process isolation. If you rely on `/tmp` being shared with other services, explicitly override this by setting `serviceConfig.PrivateTmp` to `false` for each phpfpm unit. + +- KDE's old multimedia framework Phonon no longer supports Qt 4. For that reason, Plasma desktop also does not have `enableQt4Support` option any more. + +- The BeeGFS module has been removed. + +- The osquery module has been removed. + +- Going forward, `~/bin` in the users home directory will no longer be in `PATH` by default. If you depend on this you should set the option `environment.homeBinInPath` to `true`. The aforementioned option was added this release. + +- The `buildRustCrate` infrastructure now produces `lib` outputs in addition to the `out` output. This has led to drastically reduced closure sizes for some rust crates since development dependencies are now in the `lib` output. + +- Pango was upgraded to 1.44, which no longer uses freetype for font loading. This means that type1 and bitmap fonts are no longer supported in applications relying on Pango for font rendering (notably, GTK application). See [ upstream issue](https://gitlab.gnome.org/GNOME/pango/issues/386) for more information. + +- The `roundcube` module has been hardened. + + - The password of the database is not written world readable in the store any more. If `database.host` is set to `localhost`, then a unix user of the same name as the database will be created and PostreSQL peer authentication will be used, removing the need for a password. Otherwise, a password is still needed and can be provided with the new option `database.passwordFile`, which should be set to the path of a file containing the password and readable by the user `nginx` only. The `database.password` option is insecure and deprecated. Usage of this option will print a warning. + + - A random `des_key` is set by default in the configuration of roundcube, instead of using the hardcoded and insecure default. To ensure a clean migration, all users will be logged out when you upgrade to this release. + +- The packages `openobex` and `obexftp` are no longer installed when enabling Bluetooth via `hardware.bluetooth.enable`. + +- The `dump1090` derivation has been changed to use FlightAware\'s dump1090 as its upstream. However, this version does not have an internal webserver anymore. The assets in the `share/dump1090` directory of the derivation can be used in conjunction with an external webserver to replace this functionality. + +- The fourStore and fourStoreEndpoint modules have been removed. + +- Polkit no longer has the user of uid 0 (root) as an admin identity. We now follow the upstream default of only having every member of the wheel group admin privileged. Before it was root and members of wheel. The positive outcome of this is pkexec GUI popups or terminal prompts will no longer require the user to choose between two essentially equivalent choices (whether to perform the action as themselves with wheel permissions, or as the root user). + +- NixOS containers no longer build NixOS manual by default. This saves evaluation time, especially if there are many declarative containers defined. Note that this is already done when `` module is included in container config. + +- The `kresd` services deprecates the `interfaces` option in favor of the `listenPlain` option which requires full [systemd.socket compatible](https://www.freedesktop.org/software/systemd/man/systemd.socket.html#ListenStream=) declaration which always include a port. + +- Virtual console options have been reorganized and can be found under a single top-level attribute: `console`. The full set of changes is as follows: + + - `i18n.consoleFont` renamed to [console.font](options.html#opt-console.font) + + - `i18n.consoleKeyMap` renamed to [console.keyMap](options.html#opt-console.keyMap) + + - `i18n.consoleColors` renamed to [console.colors](options.html#opt-console.colors) + + - `i18n.consolePackages` renamed to [console.packages](options.html#opt-console.packages) + + - `i18n.consoleUseXkbConfig` renamed to [console.useXkbConfig](options.html#opt-console.useXkbConfig) + + - `boot.earlyVconsoleSetup` renamed to [console.earlySetup](options.html#opt-console.earlySetup) + + - `boot.extraTTYs` renamed to `console.extraTTYs`. + +- The [awstats](options.html#opt-services.awstats.enable) module has been rewritten to serve stats via static html pages, updated on a timer, over [nginx](options.html#opt-services.nginx.virtualHosts), instead of dynamic cgi pages over [apache](options.html#opt-services.httpd.enable). + + Minor changes will be required to migrate existing configurations. Details of the required changes can seen by looking through the [awstats](options.html#opt-services.awstats.enable) module. + +- The httpd module no longer provides options to support serving web content without defining a virtual host. As a result of this the [services.httpd.logPerVirtualHost](options.html#opt-services.httpd.logPerVirtualHost) option now defaults to `true` instead of `false`. Please update your configuration to make use of [services.httpd.virtualHosts](options.html#opt-services.httpd.virtualHosts). + + The [services.httpd.virtualHosts.\](options.html#opt-services.httpd.virtualHosts) option has changed type from a list of submodules to an attribute set of submodules, better matching [services.nginx.virtualHosts.\](options.html#opt-services.nginx.virtualHosts). + + This change comes with the addition of the following options which mimic the functionality of their `nginx` counterparts: [services.httpd.virtualHosts.\.addSSL](options.html#opt-services.httpd.virtualHosts), [services.httpd.virtualHosts.\.forceSSL](options.html#opt-services.httpd.virtualHosts), [services.httpd.virtualHosts.\.onlySSL](options.html#opt-services.httpd.virtualHosts), [services.httpd.virtualHosts.\.enableACME](options.html#opt-services.httpd.virtualHosts), [services.httpd.virtualHosts.\.acmeRoot](options.html#opt-services.httpd.virtualHosts), and [services.httpd.virtualHosts.\.useACMEHost](options.html#opt-services.httpd.virtualHosts). + +- For NixOS configuration options, the `loaOf` type has been deprecated and will be removed in a future release. In nixpkgs, options of this type will be changed to `attrsOf` instead. If you were using one of these in your configuration, you will see a warning suggesting what changes will be required. + + For example, [users.users](options.html#opt-users.users) is a `loaOf` option that is commonly used as follows: + + ```nix + { + users.users = + [ { name = "me"; + description = "My personal user."; + isNormalUser = true; + } + ]; + } + ``` + + This should be rewritten by removing the list and using the value of `name` as the name of the attribute set: + + ```nix + { + users.users.me = + { description = "My personal user."; + isNormalUser = true; + }; + } + ``` + + For more information on this change have look at these links: [issue \#1800](https://github.com/NixOS/nixpkgs/issues/1800), [PR \#63103](https://github.com/NixOS/nixpkgs/pull/63103). + +- For NixOS modules, the types `types.submodule` and `types.submoduleWith` now support paths as allowed values, similar to how `imports` supports paths. Because of this, if you have a module that defines an option of type `either (submodule ...) path`, it will break since a path is now treated as the first type instead of the second. To fix this, change the type to `either path (submodule ...)`. + +- The [Buildkite Agent](options.html#opt-services.buildkite-agents) module and corresponding packages have been updated to 3.x, and to support multiple instances of the agent running at the same time. This means you will have to rename `services.buildkite-agent` to `services.buildkite-agents.`. Furthermore, the following options have been changed: + + - `services.buildkite-agent.meta-data` has been renamed to [services.buildkite-agents.\.tags](options.html#opt-services.buildkite-agents), to match upstreams naming for 3.x. Its type has also changed - it now accepts an attrset of strings. + + - The`services.buildkite-agent.openssh.publicKeyPath` option has been removed, as it\'s not necessary to deploy public keys to clone private repositories. + + - `services.buildkite-agent.openssh.privateKeyPath` has been renamed to [buildkite-agents.\.privateSshKeyPath](options.html#opt-services.buildkite-agents), as the whole `openssh` now only contained that single option. + + - [services.buildkite-agents.\.shell](options.html#opt-services.buildkite-agents) has been introduced, allowing to specify a custom shell to be used. + +- The `citrix_workspace_19_3_0` package has been removed as it will be EOLed within the lifespan of 20.03. For further information, please refer to the [support and maintenance information](https://www.citrix.com/de-de/support/product-lifecycle/milestones/receiver.html) from upstream. + +- The `gcc5` and `gfortran5` packages have been removed. + +- The `services.xserver.displayManager.auto` module has been removed. It was only intended for use in internal NixOS tests, and gave the false impression of it being a special display manager when it\'s actually LightDM. Please use the `services.xserver.displayManager.lightdm.autoLogin` options instead, or any other display manager in NixOS as they all support auto-login. If you used this module specifically because it permitted root auto-login you can override the lightdm-autologin pam module like: + + ```nix + { + security.pam.services.lightdm-autologin.text = lib.mkForce '' + auth requisite pam_nologin.so + auth required pam_succeed_if.so quiet + auth required pam_permit.so + + account include lightdm + + password include lightdm + + session include lightdm + ''; + } + ``` + + The difference is the: + + ``` + auth required pam_succeed_if.so quiet + ``` + + line, where default it\'s: + + ``` + auth required pam_succeed_if.so uid >= 1000 quiet + ``` + + not permitting users with uid\'s below 1000 (like root). All other display managers in NixOS are configured like this. + +- There have been lots of improvements to the Mailman module. As a result, + + - The `services.mailman.hyperkittyBaseUrl` option has been renamed to [services.mailman.hyperkitty.baseUrl](options.html#opt-services.mailman.hyperkitty.baseUrl). + + - The `services.mailman.hyperkittyApiKey` option has been removed. This is because having an option for the Hyperkitty API key meant that the API key would be stored in the world-readable Nix store, which was a security vulnerability. A new Hyperkitty API key will be generated the first time the new Hyperkitty service is run, and it will then be persisted outside of the Nix store. To continue using Hyperkitty, you must set [services.mailman.hyperkitty.enable](options.html#opt-services.mailman.hyperkitty.enable) to `true`. + + - Additionally, some Postfix configuration must now be set manually instead of automatically by the Mailman module: + + ```nix + { + services.postfix.relayDomains = [ "hash:/var/lib/mailman/data/postfix_domains" ]; + services.postfix.config.transport_maps = [ "hash:/var/lib/mailman/data/postfix_lmtp" ]; + services.postfix.config.local_recipient_maps = [ "hash:/var/lib/mailman/data/postfix_lmtp" ]; + } + ``` + + This is because some users may want to include other values in these lists as well, and this was not possible if they were set automatically by the Mailman module. It would not have been possible to just concatenate values from multiple modules each setting the values they needed, because the order of elements in the list is significant. + +- The LLVM versions 3.5, 3.9 and 4 (including the corresponding CLang versions) have been dropped. + +- The `networking.interfaces.*.preferTempAddress` option has been replaced by `networking.interfaces.*.tempAddress`. The new option allows better control of the IPv6 temporary addresses, including completely disabling them for interfaces where they are not needed. + +- Rspamd was updated to version 2.2. Read [ the upstream migration notes](https://rspamd.com/doc/migration.html#migration-to-rspamd-20) carefully. Please be especially aware that some modules were removed and the default Bayes backend is now Redis. + +- The `*psu` versions of oraclejdk8 have been removed as they aren\'t provided by upstream anymore. + +- The `services.dnscrypt-proxy` module has been removed as it used the deprecated version of dnscrypt-proxy. We\'ve added [services.dnscrypt-proxy2.enable](options.html#opt-services.dnscrypt-proxy2.enable) to use the supported version. This module supports configuration via the Nix attribute set [services.dnscrypt-proxy2.settings](options.html#opt-services.dnscrypt-proxy2.settings), or by passing a TOML configuration file via [services.dnscrypt-proxy2.configFile](options.html#opt-services.dnscrypt-proxy2.configFile). + + ```nix + { + # Example configuration: + services.dnscrypt-proxy2.enable = true; + services.dnscrypt-proxy2.settings = { + listen_addresses = [ "127.0.0.1:43" ]; + sources.public-resolvers = { + urls = [ "https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md" ]; + cache_file = "public-resolvers.md"; + minisign_key = "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3"; + refresh_delay = 72; + }; + }; + + services.dnsmasq.enable = true; + services.dnsmasq.servers = [ "127.0.0.1#43" ]; + } + ``` + +- `qesteidutil` has been deprecated in favor of `qdigidoc`. + +- sqldeveloper_18 has been removed as it\'s not maintained anymore, sqldeveloper has been updated to version `19.4`. Please note that this means that this means that the oraclejdk is now required. For further information please read the [release notes](https://www.oracle.com/technetwork/developer-tools/sql-developer/downloads/sqldev-relnotes-194-5908846.html). + +- Haskell `env` and `shellFor` dev shell environments now organize dependencies the same way as regular builds. In particular, rather than receiving all the different lists of dependencies mashed together as one big list, and then partitioning into Haskell and non-Hakell dependencies, they work from the original many different dependency parameters and don\'t need to algorithmically partition anything. + + This means that if you incorrectly categorize a dependency, e.g. non-Haskell library dependency as a `buildDepends` or run-time Haskell dependency as a `setupDepends`, whereas things would have worked before they may not work now. + +- The gcc-snapshot-package has been removed. It\'s marked as broken for \>2 years and used to point to a fairly old snapshot from the gcc7-branch. + +- The nixos-build-vms8 -script now uses the python test-driver. + +- The riot-web package now accepts configuration overrides as an attribute set instead of a string. A formerly used JSON configuration can be converted to an attribute set with `builtins.fromJSON`. + + The new default configuration also disables automatic guest account registration and analytics to improve privacy. The previous behavior can be restored by setting `config.riot-web.conf = { disable_guests = false; piwik = true; }`. + +- Stand-alone usage of `Upower` now requires `services.upower.enable` instead of just installing into [environment.systemPackages](options.html#opt-environment.systemPackages). + +- nextcloud has been updated to `v18.0.2`. This means that users from NixOS 19.09 can\'t upgrade directly since you can only move one version forward and 19.09 uses `v16.0.8`. + + To provide a safe upgrade-path and to circumvent similar issues in the future, the following measures were taken: + + - The pkgs.nextcloud-attribute has been removed and replaced with versioned attributes (currently pkgs.nextcloud17 and pkgs.nextcloud18). With this change major-releases can be backported without breaking stuff and to make upgrade-paths easier. + + - Existing setups will be detected using [system.stateVersion](options.html#opt-system.stateVersion): by default, nextcloud17 will be used, but will raise a warning which notes that after that deploy it\'s recommended to update to the latest stable version (nextcloud18) by declaring the newly introduced setting [services.nextcloud.package](options.html#opt-services.nextcloud.package). + + - Users with an overlay (e.g. to use nextcloud at version `v18` on `19.09`) will get an evaluation error by default. This is done to ensure that our [package](options.html#opt-services.nextcloud.package)-option doesn\'t select an older version by accident. It\'s recommended to use pkgs.nextcloud18 or to set [package](options.html#opt-services.nextcloud.package) to pkgs.nextcloud explicitly. + + ::: {.warning} + Please note that if you\'re coming from `19.03` or older, you have to manually upgrade to `19.09` first to upgrade your server to Nextcloud v16. + ::: + +- Hydra has gained a massive performance improvement due to [some database schema changes](https://github.com/NixOS/hydra/pull/710) by adding several IDs and better indexing. However, it\'s necessary to upgrade Hydra in multiple steps: + + - At first, an older version of Hydra needs to be deployed which adds those (nullable) columns. When having set [stateVersion ](options.html#opt-system.stateVersion) to a value older than `20.03`, this package will be selected by default from the module when upgrading. Otherwise, the package can be deployed using the following config: + + ```nix + { pkgs, ... }: { + services.hydra.package = pkgs.hydra-migration; + } + ``` + +- Automatically fill the newly added ID columns on the server by running the following command: + + ```ShellSession + $ hydra-backfill-ids + ``` + ::: {.warning} + Please note that this process can take a while depending on your database-size! + ::: + +- Deploy a newer version of Hydra to activate the DB optimizations. This can be done by using hydra-unstable. This package already includes [flake-support](https://github.com/nixos/rfcs/pull/49) and is therefore compiled against pkgs.nixFlakes. + + ::: {.warning} + If your [stateVersion](options.html#opt-system.stateVersion) is set to `20.03` or greater, hydra-unstable will be used automatically! This will break your setup if you didn\'t run the migration. + ::: + + Please note that Hydra is currently not available with nixStable as this doesn\'t compile anymore. + + ::: {.warning} + pkgs.hydra has been removed to ensure a graceful database-migration using the dedicated package-attributes. If you still have pkgs.hydra defined in e.g. an overlay, an assertion error will be thrown. To circumvent this, you need to set [services.hydra.package](options.html#opt-services.hydra.package) to pkgs.hydra explicitly and make sure you know what you\'re doing! + ::: + +- The TokuDB storage engine will be disabled in mariadb 10.5. It is recommended to switch to RocksDB. See also [TokuDB](https://mariadb.com/kb/en/tokudb/). + +## Other Notable Changes {#sec-release-20.03-notable-changes} + +- SD images are now compressed by default using `bzip2`. + +- The nginx web server previously started its master process as root privileged, then ran worker processes as a less privileged identity user (the `nginx` user). This was changed to start all of nginx as a less privileged user (defined by `services.nginx.user` and `services.nginx.group`). As a consequence, all files that are needed for nginx to run (included configuration fragments, SSL certificates and keys, etc.) must now be readable by this less privileged user/group. + + To continue to use the old approach, you can configure: + + ```nix + { + services.nginx.appendConfig = let cfg = config.services.nginx; in ''user ${cfg.user} ${cfg.group};''; + systemd.services.nginx.serviceConfig.User = lib.mkForce "root"; + } + ``` + +- OpenSSH has been upgraded from 7.9 to 8.1, improving security and adding features but with potential incompatibilities. Consult the [ release announcement](https://www.openssh.com/txt/release-8.1) for more information. + +- `PRETTY_NAME` in `/etc/os-release` now uses the short rather than full version string. + +- The ACME module has switched from simp-le to [lego](https://github.com/go-acme/lego) which allows us to support DNS-01 challenges and wildcard certificates. The following options have been added: [security.acme.acceptTerms](options.html#opt-security.acme.acceptTerms), [security.acme.certs.\.dnsProvider](options.html#opt-security.acme.certs), [security.acme.certs.\.credentialsFile](options.html#opt-security.acme.certs), [security.acme.certs.\.dnsPropagationCheck](options.html#opt-security.acme.certs). As well as this, the options `security.acme.acceptTerms` and either `security.acme.email` or `security.acme.certs..email` must be set in order to use the ACME module. Certificates will be regenerated on activation, no account or certificate will be migrated from simp-le. In particular private keys will not be preserved. However, the credentials for simp-le are preserved and thus it is possible to roll back to previous versions without breaking certificate generation. Note also that in contrary to simp-le a new private key is recreated at each renewal by default, which can have consequences if you embed your public key in apps. + +- It is now possible to unlock LUKS-Encrypted file systems using a FIDO2 token via `boot.initrd.luks.fido2Support`. + +- Predictably named network interfaces get renamed in stage-1. This means that it is possible to use the proper interface name for e.g. Dropbear setups. + + For further reference, please read [\#68953](https://github.com/NixOS/nixpkgs/pull/68953) or the corresponding [discourse thread](https://discourse.nixos.org/t/predictable-network-interface-names-in-initrd/4055). + +- The matrix-synapse-package has been updated to [v1.11.1](https://github.com/matrix-org/synapse/releases/tag/v1.11.1). Due to [stricter requirements](https://github.com/matrix-org/synapse/releases/tag/v1.10.0rc1) for database configuration when using postgresql, the automated database setup of the module has been removed to avoid any further edge-cases. + + matrix-synapse expects `postgresql`-databases to have the options `LC_COLLATE` and `LC_CTYPE` set to [`'C'`](https://www.postgresql.org/docs/12/locale.html) which basically instructs `postgresql` to ignore any locale-based preferences. + + Depending on your setup, you need to incorporate one of the following changes in your setup to upgrade to 20.03: + + - If you use `sqlite3` you don\'t need to do anything. + + - If you use `postgresql` on a different server, you don\'t need to change anything as well since this module was never designed to configure remote databases. + + - If you use `postgresql` and configured your synapse initially on `19.09` or older, you simply need to enable postgresql-support explicitly: + + ```nix + { ... }: { + services.matrix-synapse = { + enable = true; + /* and all the other config you've defined here */ + }; + services.postgresql.enable = true; + } + ``` + +- If you deploy a fresh matrix-synapse, you need to configure the database yourself (e.g. by using the [services.postgresql.initialScript](options.html#opt-services.postgresql.initialScript) option). An example for this can be found in the [documentation of the Matrix module](#module-services-matrix). + +- If you initially deployed your matrix-synapse on `nixos-unstable` _after_ the `19.09`-release, your database is misconfigured due to a regression in NixOS. For now, matrix-synapse will startup with a warning, but it\'s recommended to reconfigure the database to set the values `LC_COLLATE` and `LC_CTYPE` to [`'C'`](https://www.postgresql.org/docs/12/locale.html). + +- The [systemd.network.links](options.html#opt-systemd.network.links) option is now respected even when [systemd-networkd](options.html#opt-systemd.network.enable) is disabled. This mirrors the behaviour of systemd - It\'s udev that parses `.link` files, not `systemd-networkd`. + +- mongodb has been updated to version `3.4.24`. + + ::: {.warning} + Please note that mongodb has been relicensed under their own [` sspl`](https://www.mongodb.com/licensing/server-side-public-license/faq)-license. Since it\'s not entirely free and not OSI-approved, it\'s listed as non-free. This means that Hydra doesn\'t provide prebuilt mongodb-packages and needs to be built locally. + ::: diff --git a/nixos/doc/manual/release-notes/rl-2003.xml b/nixos/doc/manual/release-notes/rl-2003.xml deleted file mode 100644 index 4206f44f6c7..00000000000 --- a/nixos/doc/manual/release-notes/rl-2003.xml +++ /dev/null @@ -1,1252 +0,0 @@ -
- Release 20.03 (“Markhor”, 2020.04/20) - -
- Highlights - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - Support is planned until the end of October 2020, handing over to 20.09. - - - - Core version changes: - gcc: 8.3.0 -> 9.2.0 - glibc: 2.27 -> 2.30 - linux: 4.19 -> 5.4 - mesa: 19.1.5 -> 19.3.3 - openssl: 1.0.2u -> 1.1.1d - - - Desktop version changes: - plasma5: 5.16.5 -> 5.17.5 - kdeApplications: 19.08.2 -> 19.12.3 - gnome3: 3.32 -> 3.34 - pantheon: 5.0 -> 5.1.3 - - - - Linux kernel is updated to branch 5.4 by default (from 4.19). - - - - - Grub is updated to 2.04, adding support for booting from F2FS filesystems and - Btrfs volumes using zstd compression. Note that some users have been unable -to boot after upgrading to 2.04 - for more information, please see this - discussion. - - - - - Postgresql for NixOS service now defaults to v11. - - - - - The graphical installer image starts the graphical session automatically. - Before you'd be greeted by a tty and asked to enter systemctl start display-manager. - It is now possible to disable the display-manager from running by selecting the Disable display-manager - quirk in the boot menu. - - - - - GNOME 3 has been upgraded to 3.34. Please take a look at their - Release Notes - for details. - - - - - If you enable the Pantheon Desktop Manager via - , we now default to also use - - Pantheon's newly designed greeter - . - Contrary to NixOS's usual update policy, Pantheon will receive updates during the cycle of - NixOS 20.03 when backwards compatible. - - - - - By default zfs pools will now be trimmed on a weekly basis. - Trimming is only done on supported devices (i.e. NVME or SSDs) - and should improve throughput and lifetime of these devices. - It is controlled by the services.zfs.trim.enable varname. - The zfs scrub service (services.zfs.autoScrub.enable) - and the zfs autosnapshot service (services.zfs.autoSnapshot.enable) - are now only enabled if zfs is set in config.boot.initrd.supportedFilesystems or - config.boot.supportedFilesystems. These lists will automatically contain - zfs as soon as any zfs mountpoint is configured in fileSystems. - - - - - nixos-option has been rewritten in C++, speeding it up, improving correctness, - and adding a option which prints all options and their values recursively. - - - - - and options were replaced by a single option to improve support for upstream session files. If you used something like: - -services.xserver.desktopManager.default = "xfce"; -services.xserver.windowManager.default = "icewm"; - - you should change it to: - -services.xserver.displayManager.defaultSession = "xfce+icewm"; - - - - - - The testing driver implementation in NixOS is now in Python make-test-python.nix. - This was done by Jacek Galowicz (@tfc), and with the - collaboration of Julian Stecklina (@blitz) and - Jana Traue (@jtraue). All documentation has been updated to use this - testing driver, and a vast majority of the 286 tests in NixOS were ported to python driver. In 20.09 the Perl driver implementation, - make-test.nix, is slated for removal. This should give users of the NixOS integration framework - a transitory period to rewrite their tests to use the Python implementation. Users of the Perl driver will see - this warning everytime they use it: - -$ warning: Perl VM tests are deprecated and will be removed for 20.09. -Please update your tests to use the python test driver. -See https://github.com/NixOS/nixpkgs/pull/71684 for details. - - API compatibility is planned to be kept for at least the next release with the perl driver. - - - -
- -
- New Services - - - The following new services were added since the last release: - - - - - - The kubernetes kube-proxy now supports a new hostname configuration - services.kubernetes.proxy.hostname which has to - be set if the hostname of the node should be non default. - - - - - UPower's configuration is now managed by NixOS and can be customized - via . - - - - - To use Geary you should enable instead of - just adding it to . - It was created so Geary could function properly outside of GNOME. - - - - - ./config/console.nix - - - - - ./hardware/brillo.nix - - - - - ./hardware/tuxedo-keyboard.nix - - - - - ./programs/bandwhich.nix - - - - - ./programs/bash-my-aws.nix - - - - - ./programs/liboping.nix - - - - - ./programs/traceroute.nix - - - - - ./services/backup/sanoid.nix - - - - - ./services/backup/syncoid.nix - - - - - ./services/backup/zfs-replication.nix - - - - - ./services/continuous-integration/buildkite-agents.nix - - - - - ./services/databases/victoriametrics.nix - - - - - ./services/desktops/gnome3/gnome-initial-setup.nix - - - - - ./services/desktops/neard.nix - - - - - ./services/games/openarena.nix - - - - - ./services/hardware/fancontrol.nix - - - - - ./services/mail/sympa.nix - - - - - ./services/misc/freeswitch.nix - - - - - ./services/misc/mame.nix - - - - - ./services/monitoring/do-agent.nix - - - - - ./services/monitoring/prometheus/xmpp-alerts.nix - - - - - ./services/network-filesystems/orangefs/server.nix - - - - - ./services/network-filesystems/orangefs/client.nix - - - - - ./services/networking/3proxy.nix - - - - - ./services/networking/corerad.nix - - - - - ./services/networking/go-shadowsocks2.nix - - - - - ./services/networking/ntp/openntpd.nix - - - - - ./services/networking/shorewall.nix - - - - - ./services/networking/shorewall6.nix - - - - - ./services/networking/spacecookie.nix - - - - - ./services/networking/trickster.nix - - - - - ./services/networking/v2ray.nix - - - - - ./services/networking/xandikos.nix - - - - - ./services/networking/yggdrasil.nix - - - - - ./services/web-apps/dokuwiki.nix - - - - - ./services/web-apps/gotify-server.nix - - - - - ./services/web-apps/grocy.nix - - - - - ./services/web-apps/ihatemoney - - - - - ./services/web-apps/moinmoin.nix - - - - - ./services/web-apps/trac.nix - - - - - ./services/web-apps/trilium.nix - - - - - ./services/web-apps/shiori.nix - - - - - ./services/web-servers/ttyd.nix - - - - - ./services/x11/picom.nix - - - - - ./services/x11/hardware/digimend.nix - - - - - ./services/x11/imwheel.nix - - - - - ./virtualisation/cri-o.nix - - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - The dhcpcd package - does not request IPv4 addresses for tap and bridge interfaces anymore by default. - In order to still get an address on a bridge interface, one has to disable - networking.useDHCP and explicitly enable - networking.interfaces.<name>.useDHCP on - every interface, that should get an address via DHCP. This way, dhcpcd - is configured in an explicit way about which interface to run on. - - - - - GnuPG is now built without support for a graphical passphrase entry - by default. Please enable the gpg-agent user service - via the NixOS option programs.gnupg.agent.enable. - Note that upstream recommends using gpg-agent and - will spawn a gpg-agent on the first invocation of - GnuPG anyway. - - - - - The dynamicHosts option has been removed from the - NetworkManager - module. Allowing (multiple) regular users to override host entries - affecting the whole system opens up a huge attack vector. - There seem to be very rare cases where this might be useful. - Consider setting system-wide host entries using - networking.hosts, provide - them via the DNS server in your network, or use - environment.etc - to add a file into /etc/NetworkManager/dnsmasq.d - reconfiguring hostsdir. - - - - - The 99-main.network file was removed. Matching all - network interfaces caused many breakages, see - #18962 - and #71106. - - - We already don't support the global networking.useDHCP, - networking.defaultGateway and - networking.defaultGateway6 options - if networking.useNetworkd is enabled, - but direct users to configure the per-device - networking.interfaces.<name>.… options. - - - - - The stdenv now runs all bash with set -u, to catch the use of undefined variables. - Before, it itself used set -u but was careful to unset it so other packages' code ran as before. - Now, all bash code is held to the same high standard, and the rather complex stateful manipulation of the options can be discarded. - - - - - The SLIM Display Manager has been removed, as it has been unmaintained since 2013. - Consider migrating to a different display manager such as LightDM (current default in NixOS), - SDDM, GDM, or using the startx module which uses Xinitrc. - - - - - The Way Cooler wayland compositor has been removed, as the project has been officially canceled. - There are no more way-cooler attribute and programs.way-cooler options. - - - - - The BEAM package set has been deleted. You will only find there the different interpreters. - You should now use the different build tools coming with the languages with sandbox mode disabled. - - - - - There is now only one Xfce package-set and module. This means that attributes xfce4-14 - and xfceUnstable all now point to the latest Xfce 4.14 - packages. And in the future NixOS releases will be the latest released version of Xfce available at the - time of the release's development (if viable). - - - - - The phpfpm module now sets - PrivateTmp=true in its systemd units for better process isolation. - If you rely on /tmp being shared with other services, explicitly override this by - setting serviceConfig.PrivateTmp to false for each phpfpm unit. - - - - - KDE’s old multimedia framework Phonon no longer supports Qt 4. For that reason, Plasma desktop also does not have option any more. - - - - - The BeeGFS module has been removed. - - - - - The osquery module has been removed. - - - - - Going forward, ~/bin in the users home directory will no longer be in PATH by default. - If you depend on this you should set the option environment.homeBinInPath to true. - The aforementioned option was added this release. - - - - - The buildRustCrate infrastructure now produces lib outputs in addition to the out output. - This has led to drastically reduced closure sizes for some rust crates since development dependencies are now in the lib output. - - - - - Pango was upgraded to 1.44, which no longer uses freetype for font loading. This means that type1 - and bitmap fonts are no longer supported in applications relying on Pango for font rendering - (notably, GTK application). See - upstream issue for more information. - - - - - The roundcube module has been hardened. - - - - The password of the database is not written world readable in the store any more. If database.host is set to localhost, then a unix user of the same name as the database will be created and PostreSQL peer authentication will be used, removing the need for a password. Otherwise, a password is still needed and can be provided with the new option database.passwordFile, which should be set to the path of a file containing the password and readable by the user nginx only. The database.password option is insecure and deprecated. Usage of this option will print a warning. - - - - - A random des_key is set by default in the configuration of roundcube, instead of using the hardcoded and insecure default. To ensure a clean migration, all users will be logged out when you upgrade to this release. - - - - - - - - The packages openobex and obexftp - are no longer installed when enabling Bluetooth via - . - - - - - The dump1090 derivation has been changed to use FlightAware's dump1090 - as its upstream. However, this version does not have an internal webserver anymore. The - assets in the share/dump1090 directory of the derivation can be used - in conjunction with an external webserver to replace this functionality. - - - - - The fourStore and fourStoreEndpoint modules have been removed. - - - - - Polkit no longer has the user of uid 0 (root) as an admin identity. - We now follow the upstream default of only having every member of the wheel - group admin privileged. Before it was root and members of wheel. - The positive outcome of this is pkexec GUI popups or terminal prompts - will no longer require the user to choose between two essentially equivalent - choices (whether to perform the action as themselves with wheel permissions, or as the root user). - - - - - NixOS containers no longer build NixOS manual by default. This saves evaluation time, - especially if there are many declarative containers defined. Note that this is already done - when <nixos/modules/profiles/minimal.nix> module is included - in container config. - - - - - The kresd services deprecates the interfaces option - in favor of the listenPlain option which requires full - systemd.socket compatible - declaration which always include a port. - - - - - Virtual console options have been reorganized and can be found under - a single top-level attribute: console. - The full set of changes is as follows: - - - - - i18n.consoleFont renamed to - console.font - - - - - i18n.consoleKeyMap renamed to - console.keyMap - - - - - i18n.consoleColors renamed to - console.colors - - - - - i18n.consolePackages renamed to - console.packages - - - - - i18n.consoleUseXkbConfig renamed to - console.useXkbConfig - - - - - boot.earlyVconsoleSetup renamed to - console.earlySetup - - - - - boot.extraTTYs renamed to - console.extraTTYs. - - - - - - - The awstats module has been rewritten - to serve stats via static html pages, updated on a timer, over nginx, - instead of dynamic cgi pages over apache. - - - Minor changes will be required to migrate existing configurations. Details of the - required changes can seen by looking through the awstats - module. - - - - - The httpd module no longer provides options to support serving web content without defining a virtual host. As a - result of this the services.httpd.logPerVirtualHost - option now defaults to true instead of false. Please update your - configuration to make use of services.httpd.virtualHosts. - - - The services.httpd.virtualHosts.<name> - option has changed type from a list of submodules to an attribute set of submodules, better matching - services.nginx.virtualHosts.<name>. - - - This change comes with the addition of the following options which mimic the functionality of their nginx counterparts: - services.httpd.virtualHosts.<name>.addSSL, - services.httpd.virtualHosts.<name>.forceSSL, - services.httpd.virtualHosts.<name>.onlySSL, - services.httpd.virtualHosts.<name>.enableACME, - services.httpd.virtualHosts.<name>.acmeRoot, and - services.httpd.virtualHosts.<name>.useACMEHost. - - - - - For NixOS configuration options, the loaOf type has - been deprecated and will be removed in a future release. In nixpkgs, - options of this type will be changed to attrsOf - instead. If you were using one of these in your configuration, you will - see a warning suggesting what changes will be required. - - - For example, users.users is a - loaOf option that is commonly used as follows: - -users.users = - [ { name = "me"; - description = "My personal user."; - isNormalUser = true; - } - ]; - - This should be rewritten by removing the list and using the - value of name as the name of the attribute set: - -users.users.me = - { description = "My personal user."; - isNormalUser = true; - }; - - - - For more information on this change have look at these links: - issue #1800, - PR #63103. - - - - - For NixOS modules, the types types.submodule and types.submoduleWith now support - paths as allowed values, similar to how imports supports paths. - Because of this, if you have a module that defines an option of type - either (submodule ...) path, it will break since a path - is now treated as the first type instead of the second. To fix this, change - the type to either path (submodule ...). - - - - - The Buildkite - Agent module and corresponding packages have been updated to - 3.x, and to support multiple instances of the agent running at the - same time. This means you will have to rename - services.buildkite-agent to - services.buildkite-agents.<name>. Furthermore, - the following options have been changed: - - - - - services.buildkite-agent.meta-data has been renamed to - services.buildkite-agents.<name>.tags, - to match upstreams naming for 3.x. - Its type has also changed - it now accepts an attrset of strings. - - - - - Theservices.buildkite-agent.openssh.publicKeyPath option - has been removed, as it's not necessary to deploy public keys to clone private - repositories. - - - - - services.buildkite-agent.openssh.privateKeyPath - has been renamed to - buildkite-agents.<name>.privateSshKeyPath, - as the whole openssh now only contained that single option. - - - - - services.buildkite-agents.<name>.shell - has been introduced, allowing to specify a custom shell to be used. - - - - - - - The citrix_workspace_19_3_0 package has been removed as - it will be EOLed within the lifespan of 20.03. For further information, - please refer to the support and maintenance information from upstream. - - - - - The gcc5 and gfortran5 packages have been removed. - - - - - The module has been removed. - It was only intended for use in internal NixOS tests, and gave the false impression - of it being a special display manager when it's actually LightDM. - Please use the options instead, - or any other display manager in NixOS as they all support auto-login. If you used this module specifically - because it permitted root auto-login you can override the lightdm-autologin pam module like: - -security.pam.services.lightdm-autologin.text = lib.mkForce '' - auth requisite pam_nologin.so - auth required pam_succeed_if.so quiet - auth required pam_permit.so - - account include lightdm - - password include lightdm - - session include lightdm -''; - - The difference is the: - -auth required pam_succeed_if.so quiet - - line, where default it's: - -auth required pam_succeed_if.so uid >= 1000 quiet - - not permitting users with uid's below 1000 (like root). - All other display managers in NixOS are configured like this. - - - - - There have been lots of improvements to the Mailman module. As - a result, - - - - - The - option has been renamed to . - - - - - The - option has been removed. This is because having an option - for the Hyperkitty API key meant that the API key would be - stored in the world-readable Nix store, which was a - security vulnerability. A new Hyperkitty API key will be - generated the first time the new Hyperkitty service is run, - and it will then be persisted outside of the Nix store. To - continue using Hyperkitty, you must set to - true. - - - - - Additionally, some Postfix configuration must now be set - manually instead of automatically by the Mailman module: - - = [ "hash:/var/lib/mailman/data/postfix_domains" ]; -.transport_maps = [ "hash:/var/lib/mailman/data/postfix_lmtp" ]; -.local_recipient_maps = [ "hash:/var/lib/mailman/data/postfix_lmtp" ]; - - This is because some users may want to include other values - in these lists as well, and this was not possible if they - were set automatically by the Mailman module. It would not - have been possible to just concatenate values from multiple - modules each setting the values they needed, because the - order of elements in the list is significant. - - - - - - The LLVM versions 3.5, 3.9 and 4 (including the corresponding CLang versions) have been dropped. - - - - The option has - been replaced by . - The new option allows better control of the IPv6 temporary addresses, - including completely disabling them for interfaces where they are not - needed. - - - - - Rspamd was updated to version 2.2. Read - - the upstream migration notes carefully. Please be especially - aware that some modules were removed and the default Bayes backend is - now Redis. - - - - - The *psu versions of oraclejdk8 have been removed - as they aren't provided by upstream anymore. - - - - - The module has been removed - as it used the deprecated version of dnscrypt-proxy. We've added - to use the supported version. - This module supports configuration via the Nix attribute set - , or by passing a TOML configuration file via - . - -# Example configuration: -services.dnscrypt-proxy2.enable = true; -services.dnscrypt-proxy2.settings = { - listen_addresses = [ "127.0.0.1:43" ]; - sources.public-resolvers = { - urls = [ "https://download.dnscrypt.info/resolvers-list/v2/public-resolvers.md" ]; - cache_file = "public-resolvers.md"; - minisign_key = "RWQf6LRCGA9i53mlYecO4IzT51TGPpvWucNSCh1CBM0QTaLn73Y7GFO3"; - refresh_delay = 72; - }; -}; - -services.dnsmasq.enable = true; -services.dnsmasq.servers = [ "127.0.0.1#43" ]; - - - - - - qesteidutil has been deprecated in favor of qdigidoc. - - - - - sqldeveloper_18 has been removed as it's not maintained anymore, - sqldeveloper has been updated to version 19.4. - Please note that this means that this means that the oraclejdk is now - required. For further information please read the - release notes. - - - - - Haskell env and shellFor dev shell environments now organize dependencies the same way as regular builds. - In particular, rather than receiving all the different lists of dependencies mashed together as one big list, and then partitioning into Haskell and non-Hakell dependencies, they work from the original many different dependency parameters and don't need to algorithmically partition anything. - - - This means that if you incorrectly categorize a dependency, e.g. non-Haskell library dependency as a buildDepends or run-time Haskell dependency as a setupDepends, whereas things would have worked before they may not work now. - - - - - The gcc-snapshot-package has been removed. It's marked as broken for >2 years and used to point - to a fairly old snapshot from the gcc7-branch. - - - - - The nixos-build-vms8 - -script now uses the python test-driver. - - - - - The riot-web package now accepts configuration overrides as an attribute set instead of a string. - A formerly used JSON configuration can be converted to an attribute set with builtins.fromJSON. - - - The new default configuration also disables automatic guest account registration and analytics to improve privacy. - The previous behavior can be restored by setting config.riot-web.conf = { disable_guests = false; piwik = true; }. - - - - - Stand-alone usage of Upower now requires - instead of just installing into - . - - - - - nextcloud has been updated to v18.0.2. This means - that users from NixOS 19.09 can't upgrade directly since you can only move one version - forward and 19.09 uses v16.0.8. - - - To provide a safe upgrade-path and to circumvent similar issues in the future, the following - measures were taken: - - - - The pkgs.nextcloud-attribute has been removed and replaced with - versioned attributes (currently pkgs.nextcloud17 and - pkgs.nextcloud18). With this change major-releases can be backported - without breaking stuff and to make upgrade-paths easier. - - - - - Existing setups will be detected using - system.stateVersion: by default, - nextcloud17 will be used, but will raise a warning which notes - that after that deploy it's recommended to update to the latest stable version - (nextcloud18) by declaring the newly introduced setting - services.nextcloud.package. - - - - - Users with an overlay (e.g. to use nextcloud at version - v18 on 19.09) will get an evaluation error - by default. This is done to ensure that our - package-option doesn't select an - older version by accident. It's recommended to use pkgs.nextcloud18 - or to set package to - pkgs.nextcloud explicitly. - - - - - - - Please note that if you're coming from 19.03 or older, you have - to manually upgrade to 19.09 first to upgrade your server - to Nextcloud v16. - - - - - - Hydra has gained a massive performance improvement due to - some database schema - changes by adding several IDs and better indexing. However, it's necessary - to upgrade Hydra in multiple steps: - - - - At first, an older version of Hydra needs to be deployed which adds those - (nullable) columns. When having set stateVersion - to a value older than 20.03, this package will be selected - by default from the module when upgrading. Otherwise, the package can be deployed using - the following config: -{ pkgs, ... }: { - services.hydra.package = pkgs.hydra-migration; -} - - - - - Automatically fill the newly added ID columns on the server by running the following - command: - -$ hydra-backfill-ids - - - Please note that this process can take a while depending on your database-size! - - - - - - Deploy a newer version of Hydra to activate the DB optimizations. This can be done by - using hydra-unstable. This package already includes - flake-support and is - therefore compiled against pkgs.nixFlakes. - - - If your stateVersion is set to - 20.03 or greater, hydra-unstable will be used - automatically! This will break your setup if you didn't run the migration. - - - Please note that Hydra is currently not available with nixStable - as this doesn't compile anymore. - - - - - - pkgs.hydra has been removed to ensure a graceful database-migration - using the dedicated package-attributes. If you still have pkgs.hydra - defined in e.g. an overlay, an assertion error will be thrown. To circumvent this, - you need to set to pkgs.hydra - explicitly and make sure you know what you're doing! - - - - - - - The TokuDB storage engine will be disabled in mariadb 10.5. It is recommended to switch - to RocksDB. See also TokuDB. - - - -
- -
- Other Notable Changes - - - - SD images are now compressed by default using bzip2. - - - - The nginx web server previously started its master process as root - privileged, then ran worker processes as a less privileged identity user - (the nginx user). - This was changed to start all of nginx as a less privileged user (defined by - services.nginx.user and - services.nginx.group). As a consequence, all files that - are needed for nginx to run (included configuration fragments, SSL - certificates and keys, etc.) must now be readable by this less privileged - user/group. - - - To continue to use the old approach, you can configure: - -services.nginx.appendConfig = let cfg = config.services.nginx; in ''user ${cfg.user} ${cfg.group};''; -systemd.services.nginx.serviceConfig.User = lib.mkForce "root"; - - - - - - OpenSSH has been upgraded from 7.9 to 8.1, improving security and adding features - but with potential incompatibilities. Consult the - - release announcement for more information. - - - - - PRETTY_NAME in /etc/os-release - now uses the short rather than full version string. - - - - - The ACME module has switched from simp-le to lego - which allows us to support DNS-01 challenges and wildcard certificates. The following options have been added: - security.acme.acceptTerms, - security.acme.certs.<name>.dnsProvider, - security.acme.certs.<name>.credentialsFile, - security.acme.certs.<name>.dnsPropagationCheck. - As well as this, the options security.acme.acceptTerms and either - security.acme.email or security.acme.certs.<name>.email - must be set in order to use the ACME module. - Certificates will be regenerated on activation, no account or certificate will be migrated from simp-le. - In particular private keys will not be preserved. However, the credentials for simp-le are preserved and - thus it is possible to roll back to previous versions without breaking certificate generation. - Note also that in contrary to simp-le a new private key is recreated at each renewal by default, which can - have consequences if you embed your public key in apps. - - - - - It is now possible to unlock LUKS-Encrypted file systems using a FIDO2 token - via . - - - - - Predictably named network interfaces get renamed in stage-1. This means that it is possible - to use the proper interface name for e.g. Dropbear setups. - - - For further reference, please read #68953 or the corresponding discourse thread. - - - - - The matrix-synapse-package has been updated to - v1.11.1. - Due to stricter requirements - for database configuration when using postgresql, the automated database setup - of the module has been removed to avoid any further edge-cases. - - - matrix-synapse expects postgresql-databases to have the options - LC_COLLATE and LC_CTYPE set to - 'C' which basically - instructs postgresql to ignore any locale-based preferences. - - - Depending on your setup, you need to incorporate one of the following changes in your setup to - upgrade to 20.03: - - If you use sqlite3 you don't need to do anything. - If you use postgresql on a different server, you don't need - to change anything as well since this module was never designed to configure remote databases. - - If you use postgresql and configured your synapse initially on - 19.09 or older, you simply need to enable postgresql-support - explicitly: -{ ... }: { - services.matrix-synapse = { - enable = true; - /* and all the other config you've defined here */ - }; - services.postgresql.enable = true; -} - - If you deploy a fresh matrix-synapse, you need to configure - the database yourself (e.g. by using the - services.postgresql.initialScript - option). An example for this can be found in the - documentation of the Matrix module. - - If you initially deployed your matrix-synapse on - nixos-unstable after the 19.09-release, - your database is misconfigured due to a regression in NixOS. For now, matrix-synapse will - startup with a warning, but it's recommended to reconfigure the database to set the values - LC_COLLATE and LC_CTYPE to - 'C'. - - - - - - - The systemd.network.links option is now respected - even when systemd-networkd is disabled. - This mirrors the behaviour of systemd - It's udev that parses .link files, - not systemd-networkd. - - - - - mongodb has been updated to version 3.4.24. - - - Please note that mongodb has been relicensed under their own - - sspl-license. Since it's not entirely free and not OSI-approved, - it's listed as non-free. This means that Hydra doesn't provide prebuilt - mongodb-packages and needs to be built locally. - - - - - -
-
diff --git a/nixos/doc/manual/release-notes/rl-2009.section.md b/nixos/doc/manual/release-notes/rl-2009.section.md new file mode 100644 index 00000000000..48059ab07f5 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-2009.section.md @@ -0,0 +1,745 @@ +# Release 20.09 ("Nightingale", 2020.10/27) {#sec-release-20.09} + +Support is planned until the end of June 2021, handing over to 21.05. (Plans [ have shifted](https://github.com/NixOS/rfcs/blob/master/rfcs/0080-nixos-release-schedule.md#core-changes) by two months since release of 20.09.) + +## Highlights {#sec-release-20.09-highlights} + +In addition to 7349 new, 14442 updated, and 8181 removed packages, this release has the following highlights: + +- Core version changes: + + - gcc: 9.2.0 -\> 9.3.0 + + - glibc: 2.30 -\> 2.31 + + - linux: still defaults to 5.4.x, all supported kernels available + + - mesa: 19.3.5 -\> 20.1.7 + +- Desktop Environments: + + - plasma5: 5.17.5 -\> 5.18.5 + + - kdeApplications: 19.12.3 -\> 20.08.1 + + - gnome3: 3.34 -\> 3.36, see its [release notes](https://help.gnome.org/misc/release-notes/3.36/) + + - cinnamon: added at 4.6 + + - NixOS now distributes an official [GNOME ISO](https://nixos.org/download.html#nixos-iso) + +- Programming Languages and Frameworks: + + - Agda ecosystem was heavily reworked (see more details below) + + - PHP now defaults to PHP 7.4, updated from 7.3 + + - PHP 7.2 is no longer supported due to upstream not supporting this version for the entire lifecycle of the 20.09 release + + - Python 3 now defaults to Python 3.8 instead of 3.7 + + - Python 3.5 reached its upstream EOL at the end of September 2020: it has been removed from the list of available packages + +- Databases and Service Monitoring: + + - MariaDB has been updated to 10.4, MariaDB Galera to 26.4. Please read the related upgrade instructions under [backwards incompatibilities](#sec-release-20.09-incompatibilities) before upgrading. + + - Zabbix now defaults to 5.0, updated from 4.4. Please read related sections under [backwards compatibilities](#sec-release-20.09-incompatibilities) before upgrading. + +- Major module changes: + + - Quickly configure a complete, private, self-hosted video conferencing solution with the new Jitsi Meet module. + + - Two new options, [authorizedKeysCommand](options.html#opt-services.openssh.authorizedKeysCommand) and [authorizedKeysCommandUser](options.html#opt-services.openssh.authorizedKeysCommandUser), have been added to the `openssh` module. If you have `AuthorizedKeysCommand` in your [services.openssh.extraConfig](options.html#opt-services.openssh.extraConfig) you should make use of these new options instead. + + - There is a new module for Podman (`virtualisation.podman`), a drop-in replacement for the Docker command line. + + - The new `virtualisation.containers` module manages configuration shared by the CRI-O and Podman modules. + + - Declarative Docker containers are renamed from `docker-containers` to `virtualisation.oci-containers.containers`. This is to make it possible to use `podman` instead of `docker`. + + - The new option [documentation.man.generateCaches](options.html#opt-documentation.man.generateCaches) has been added to automatically generate the `man-db` caches, which are needed by utilities like `whatis` and `apropos`. The caches are generated during the build of the NixOS configuration: since this can be expensive when a large number of packages are installed, the feature is disabled by default. + + - `services.postfix.sslCACert` was replaced by `services.postfix.tlsTrustedAuthorities` which now defaults to system certificate authorities. + + - The various documented workarounds to use steam have been converted to a module. `programs.steam.enable` enables steam, controller support and the workarounds. + + - Support for built-in LCDs in various pieces of Logitech hardware (keyboards and USB speakers). `hardware.logitech.lcd.enable` enables support for all hardware supported by the [g15daemon project](https://sourceforge.net/projects/g15daemon/). + + - The GRUB module gained support for basic password protection, which allows to restrict non-default entries in the boot menu to one or more users. The users and passwords are defined via the option `boot.loader.grub.users`. Note: Password support is only available in GRUB version 2. + +- NixOS module changes: + + - The NixOS module system now supports freeform modules as a mix between `types.attrsOf` and `types.submodule`. These allow you to explicitly declare a subset of options while still permitting definitions without an associated option. See [](#sec-freeform-modules) for how to use them. + + - Following its deprecation in 20.03, the Perl NixOS test driver has been removed. All remaining tests have been ported to the Python test framework. Code outside nixpkgs using `make-test.nix` or `testing.nix` needs to be ported to `make-test-python.nix` and `testing-python.nix` respectively. + + - Subordinate GID and UID mappings are now set up automatically for all normal users. This will make container tools like Podman work as non-root users out of the box. + +- Starting with this release, the hydra-build-result `nixos-YY.MM` branches no longer exist in the [deprecated nixpkgs-channels repository](https://github.com/nixos/nixpkgs-channels). These branches are now in [the main nixpkgs repository](https://github.com/nixos/nixpkgs). + +## New Services {#sec-release-20.09-new-services} + +In addition to 1119 new, 118 updated, and 476 removed options; 61 new modules were added since the last release: + +- Hardware: + + - [hardware.system76.firmware-daemon.enable](options.html#opt-hardware.system76.firmware-daemon.enable) adds easy support of system76 firmware + + - [hardware.uinput.enable](options.html#opt-hardware.uinput.enable) loads uinput kernel module + + - [hardware.video.hidpi.enable](options.html#opt-hardware.video.hidpi.enable) enable good defaults for HiDPI displays + + - [hardware.wooting.enable](options.html#opt-hardware.wooting.enable) support for Wooting keyboards + + - [hardware.xpadneo.enable](options.html#opt-hardware.xpadneo.enable) xpadneo driver for Xbox One wireless controllers + +- Programs: + + - [programs.hamster.enable](options.html#opt-programs.hamster.enable) enable hamster time tracking + + - [programs.steam.enable](options.html#opt-programs.steam.enable) adds easy enablement of steam and related system configuration + +- Security: + + - [security.doas.enable](options.html#opt-security.doas.enable) alternative to sudo, allows non-root users to execute commands as root + + - [security.tpm2.enable](options.html#opt-security.tpm2.enable) add Trusted Platform Module 2 support + +- System: + + - [boot.initrd.network.openvpn.enable](options.html#opt-boot.initrd.network.openvpn.enable) start an OpenVPN client during initrd boot + +- Virtualization: + + - [boot.enableContainers](options.html#opt-boot.enableContainers) use nixos-containers + + - [virtualisation.oci-containers.containers](options.html#opt-virtualisation.oci-containers.containers) run OCI (Docker) containers + + - [virtualisation.podman.enable](options.html#opt-virtualisation.podman.enable) daemonless container engine + +- Services: + + - [services.ankisyncd.enable](options.html#opt-services.ankisyncd.enable) Anki sync server + + - [services.bazarr.enable](options.html#opt-services.bazarr.enable) Subtitle manager for Sonarr and Radarr + + - [services.biboumi.enable](options.html#opt-services.biboumi.enable) Biboumi XMPP gateway to IRC + + - [services.blockbook-frontend](options.html#opt-services.blockbook-frontend) Blockbook-frontend, a service for the Trezor wallet + + - [services.cage.enable](options.html#opt-services.cage.enable) Wayland cage service + + - [services.convos.enable](options.html#opt-services.convos.enable) IRC daemon, which can be accessed throught the browser + + - [services.engelsystem.enable](options.html#opt-services.engelsystem.enable) Tool for coordinating volunteers and shifts on large events + + - [services.espanso.enable](options.html#opt-services.espanso.enable) text-expander written in rust + + - [services.foldingathome.enable](options.html#opt-services.foldingathome.enable) Folding\@home client + + - [services.gerrit.enable](options.html#opt-services.gerrit.enable) Web-based team code collaboration tool + + - [services.go-neb.enable](options.html#opt-services.go-neb.enable) Matrix bot + + - [services.hardware.xow.enable](options.html#opt-services.hardware.xow.enable) xow as a systemd service + + - [services.hercules-ci-agent.enable](options.html#opt-services.hercules-ci-agent.enable) Hercules CI build agent + + - [services.jicofo.enable](options.html#opt-services.jicofo.enable) Jitsi Conference Focus, component of Jitsi Meet + + - [services.jirafeau.enable](options.html#opt-services.jirafeau.enable) A web file repository + + - [services.jitsi-meet.enable](options.html#opt-services.jitsi-meet.enable) Secure, simple and scalable video conferences + + - [services.jitsi-videobridge.enable](options.html#opt-services.jitsi-videobridge.enable) Jitsi Videobridge, a WebRTC compatible router + + - [services.jupyterhub.enable](options.html#opt-services.jupyterhub.enable) Jupyterhub development server + + - [services.k3s.enable](options.html#opt-services.k3s.enable) Lightweight Kubernetes distribution + + - [services.magic-wormhole-mailbox-server.enable](options.html#opt-services.magic-wormhole-mailbox-server.enable) Magic Wormhole Mailbox Server + + - [services.malcontent.enable](options.html#opt-services.malcontent.enable) Parental Control support + + - [services.matrix-appservice-discord.enable](options.html#opt-services.matrix-appservice-discord.enable) Matrix and Discord bridge + + - [services.mautrix-telegram.enable](options.html#opt-services.mautrix-telegram.enable) Matrix-Telegram puppeting/relaybot bridge + + - [services.mirakurun.enable](options.html#opt-services.mirakurun.enable) Japanese DTV Tuner Server Service + + - [services.molly-brown.enable](options.html#opt-services.molly-brown.enable) Molly-Brown Gemini server + + - [services.mullvad-vpn.enable](options.html#opt-services.mullvad-vpn.enable) Mullvad VPN daemon + + - [services.ncdns.enable](options.html#opt-services.ncdns.enable) Namecoin to DNS bridge + + - [services.nextdns.enable](options.html#opt-services.nextdns.enable) NextDNS to DoH Proxy service + + - [services.nix-store-gcs-proxy](options.html#opt-services.nix-store-gcs-proxy) Google storage bucket to be used as a nix store + + - [services.onedrive.enable](options.html#opt-services.onedrive.enable) OneDrive sync service + + - [services.pinnwand.enable](options.html#opt-services.pinnwand.enable) Pastebin-like service + + - [services.pixiecore.enable](options.html#opt-services.pixiecore.enable) Manage network booting of machines + + - [services.privacyidea.enable](options.html#opt-services.privacyidea.enable) Privacy authentication server + + - [services.quorum.enable](options.html#opt-services.quorum.enable) Quorum blockchain daemon + + - [services.robustirc-bridge.enable](options.html#opt-services.robustirc-bridge.enable) RobustIRC bridge + + - [services.rss-bridge.enable](options.html#opt-services.rss-bridge.enable) Generate RSS and Atom feeds + + - [services.rtorrent.enable](options.html#opt-services.rtorrent.enable) rTorrent service + + - [services.smartdns.enable](options.html#opt-services.smartdns.enable) SmartDNS DNS server + + - [services.sogo.enable](options.html#opt-services.sogo.enable) SOGo groupware + + - [services.teeworlds.enable](options.html#opt-services.teeworlds.enable) Teeworlds game server + + - [services.torque.mom.enable](options.html#opt-services.torque.mom.enable) torque computing node + + - [services.torque.server.enable](options.html#opt-services.torque.server.enable) torque server + + - [services.tuptime.enable](options.html#opt-services.tuptime.enable) A total uptime service + + - [services.urserver.enable](options.html#opt-services.urserver.enable) X11 remote server + + - [services.wasabibackend.enable](options.html#opt-services.wasabibackend.enable) Wasabi backend service + + - [services.yubikey-agent.enable](options.html#opt-services.yubikey-agent.enable) Yubikey agent + + - [services.zigbee2mqtt.enable](options.html#opt-services.zigbee2mqtt.enable) Zigbee to MQTT bridge + +## Backward Incompatibilities {#sec-release-20.09-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- MariaDB has been updated to 10.4, MariaDB Galera to 26.4. Before you upgrade, it would be best to take a backup of your database. For MariaDB Galera Cluster, see [Upgrading from MariaDB 10.3 to MariaDB 10.4 with Galera Cluster](https://mariadb.com/kb/en/upgrading-from-mariadb-103-to-mariadb-104-with-galera-cluster/) instead. Before doing the upgrade read [Incompatible Changes Between 10.3 and 10.4](https://mariadb.com/kb/en/upgrading-from-mariadb-103-to-mariadb-104/#incompatible-changes-between-103-and-104). After the upgrade you will need to run `mysql_upgrade`. MariaDB 10.4 introduces a number of changes to the authentication process, intended to make things easier and more intuitive. See [Authentication from MariaDB 10.4](https://mariadb.com/kb/en/authentication-from-mariadb-104/). unix_socket auth plugin does not use a password, and uses the connecting user\'s UID instead. When a new MariaDB data directory is initialized, two MariaDB users are created and can be used with new unix_socket auth plugin, as well as traditional mysql_native_password plugin: root\@localhost and mysql\@localhost. To actually use the traditional mysql_native_password plugin method, one must run the following: + + ```nix + { + services.mysql.initialScript = pkgs.writeText "mariadb-init.sql" '' + ALTER USER root@localhost IDENTIFIED VIA mysql_native_password USING PASSWORD("verysecret"); + ''; + } + ``` + + When MariaDB data directory is just upgraded (not initialized), the users are not created or modified. + +- MySQL server is now started with additional systemd sandbox/hardening options for better security. The PrivateTmp, ProtectHome, and ProtectSystem options may be problematic when MySQL is attempting to read from or write to your filesystem anywhere outside of its own state directory, for example when calling `LOAD DATA INFILE or SELECT * INTO OUTFILE`. In this scenario a variant of the following may be required: - allow MySQL to read from /home and /tmp directories when using `LOAD DATA INFILE` + + ```nix + { + systemd.services.mysql.serviceConfig.ProtectHome = lib.mkForce "read-only"; + } + ``` + + \- allow MySQL to write to custom folder `/var/data` when using `SELECT * INTO OUTFILE`, assuming the mysql user has write access to `/var/data` + + ```nix + { + systemd.services.mysql.serviceConfig.ReadWritePaths = [ "/var/data" ]; + } + ``` + + The MySQL service no longer runs its `systemd` service startup script as `root` anymore. A dedicated non `root` super user account is required for operation. This means users with an existing MySQL or MariaDB database server are required to run the following SQL statements as a super admin user before upgrading: + + ```SQL + CREATE USER IF NOT EXISTS 'mysql'@'localhost' identified with unix_socket; + GRANT ALL PRIVILEGES ON *.* TO 'mysql'@'localhost' WITH GRANT OPTION; + ``` + + If you use MySQL instead of MariaDB please replace `unix_socket` with `auth_socket`. If you have changed the value of [services.mysql.user](options.html#opt-services.mysql.user) from the default of `mysql` to a different user please change `'mysql'@'localhost'` to the corresponding user instead. + +- Zabbix now defaults to 5.0, updated from 4.4. Please carefully read through [the upgrade guide](https://www.zabbix.com/documentation/current/manual/installation/upgrade/sources) and apply any changes required. Be sure to take special note of the section on [enabling extended range of numeric (float) values](https://www.zabbix.com/documentation/current/manual/installation/upgrade_notes_500#enabling_extended_range_of_numeric_float_values) as you will need to apply this database migration manually. + + If you are using Zabbix Server with a MySQL or MariaDB database you should note that using a character set of `utf8` and a collate of `utf8_bin` has become mandatory with this release. See the upstream [issue](https://support.zabbix.com/browse/ZBX-17357) for further discussion. Before upgrading you should check the character set and collation used by your database and ensure they are correct: + + ```SQL + SELECT + default_character_set_name, + default_collation_name + FROM + information_schema.schemata + WHERE + schema_name = 'zabbix'; + ``` + + If these values are not correct you should take a backup of your database and convert the character set and collation as required. Here is an [example](https://www.zabbix.com/forum/zabbix-help/396573-reinstall-after-upgrade?p=396891#post396891) of how to do so, taken from the Zabbix forums: + + ```SQL + ALTER DATABASE `zabbix` DEFAULT CHARACTER SET utf8 COLLATE utf8_bin; + + -- the following will produce a list of SQL commands you should subsequently execute + SELECT CONCAT("ALTER TABLE ", TABLE_NAME," CONVERT TO CHARACTER SET utf8 COLLATE utf8_bin;") AS ExecuteTheString + FROM information_schema.`COLUMNS` + WHERE table_schema = "zabbix" AND COLLATION_NAME = "utf8_general_ci"; + ``` + +- maxx package removed along with `services.xserver.desktopManager.maxx` module. Please migrate to cdesktopenv and `services.xserver.desktopManager.cde` module. + +- The [matrix-synapse](options.html#opt-services.matrix-synapse.enable) module no longer includes optional dependencies by default, they have to be added through the [plugins](options.html#opt-services.matrix-synapse.plugins) option. + +- `buildGoModule` now internally creates a vendor directory in the source tree for downloaded modules instead of using go\'s [module proxy protocol](https://golang.org/cmd/go/#hdr-Module_proxy_protocol). This storage format is simpler and therefore less likely to break with future versions of go. As a result `buildGoModule` switched from `modSha256` to the `vendorSha256` attribute to pin fetched version data. + +- Grafana is now built without support for phantomjs by default. Phantomjs support has been [deprecated in Grafana](https://grafana.com/docs/grafana/latest/guides/whats-new-in-v6-4/) and the phantomjs project is [currently unmaintained](https://github.com/ariya/phantomjs/issues/15344#issue-302015362). It can still be enabled by providing `phantomJsSupport = true` to the package instantiation: + + ```nix + { + services.grafana.package = pkgs.grafana.overrideAttrs (oldAttrs: rec { + phantomJsSupport = true; + }); + } + ``` + +- The [supybot](options.html#opt-services.supybot.enable) module now uses `/var/lib/supybot` as its default [stateDir](options.html#opt-services.supybot.stateDir) path if `stateVersion` is 20.09 or higher. It also enables a number of [systemd sandboxing options](https://www.freedesktop.org/software/systemd/man/systemd.exec.html#Sandboxing) which may possibly interfere with some plugins. If this is the case you can disable the options through attributes in `systemd.services.supybot.serviceConfig`. + +- The `security.duosec.skey` option, which stored a secret in the nix store, has been replaced by a new [security.duosec.secretKeyFile](options.html#opt-security.duosec.secretKeyFile) option for better security. + + `security.duosec.ikey` has been renamed to [security.duosec.integrationKey](options.html#opt-security.duosec.integrationKey). + +- `vmware` has been removed from the `services.x11.videoDrivers` defaults. For VMWare guests set `virtualisation.vmware.guest.enable` to `true` which will include the appropriate drivers. + +- The initrd SSH support now uses OpenSSH rather than Dropbear to allow the use of Ed25519 keys and other OpenSSH-specific functionality. Host keys must now be in the OpenSSH format, and at least one pre-generated key must be specified. + + If you used the `boot.initrd.network.ssh.host*Key` options, you\'ll get an error explaining how to convert your host keys and migrate to the new `boot.initrd.network.ssh.hostKeys` option. Otherwise, if you don\'t have any host keys set, you\'ll need to generate some; see the `hostKeys` option documentation for instructions. + +- Since this release there\'s an easy way to customize your PHP install to get a much smaller base PHP with only wanted extensions enabled. See the following snippet installing a smaller PHP with the extensions `imagick`, `opcache`, `pdo` and `pdo_mysql` loaded: + + ```nix + { + environment.systemPackages = [ + (pkgs.php.withExtensions + ({ all, ... }: with all; [ + imagick + opcache + pdo + pdo_mysql + ]) + ) + ]; + } + ``` + + The default `php` attribute hasn\'t lost any extensions. The `opcache` extension has been added. All upstream PHP extensions are available under php.extensions.\. + + All PHP `config` flags have been removed for the following reasons: + +- The updated `php` attribute is now easily customizable to your liking by using `php.withExtensions` or `php.buildEnv` instead of writing config files or changing configure flags. + +- The remaining configuration flags can now be set directly on the `php` attribute. For example, instead of + + ```nix + { + php.override { + config.php.embed = true; + config.php.apxs2 = false; + } + } + ``` + + you should now write + + ```nix + { + php.override { + embedSupport = true; + apxs2Support = false; + } + } + ``` + +- The ACME module has been overhauled for simplicity and maintainability. Cert generation now implicitly uses the `acme` user, and the `security.acme.certs._name_.user` option has been removed. Instead, certificate access from other services is now managed through group permissions. The module no longer runs lego twice under certain conditions, and will correctly renew certificates if their configuration is changed. Services which reload nginx and httpd after certificate renewal are now properly configured too so you no longer have to do this manually if you are using HTTPS enabled virtual hosts. A mechanism for regenerating certs on demand has also been added and documented. + +- Gollum received a major update to version 5.x and you may have to change some links in your wiki when migrating from gollum 4.x. More information can be found [here](https://github.com/gollum/gollum/wiki/5.0-release-notes#migrating-your-wiki). + +- Deluge 2.x was added and is used as default for new NixOS installations where stateVersion is \>= 20.09. If you are upgrading from a previous NixOS version, you can set `service.deluge.package = pkgs.deluge-2_x` to upgrade to Deluge 2.x and migrate the state to the new format. Be aware that backwards state migrations are not supported by Deluge. + +- Nginx web server now starting with additional sandbox/hardening options. By default, write access to `/var/log/nginx` and `/var/cache/nginx` is allowed. To allow writing to other folders, use `systemd.services.nginx.serviceConfig.ReadWritePaths` + + ```nix + { + systemd.services.nginx.serviceConfig.ReadWritePaths = [ "/var/www" ]; + } + ``` + + Nginx is also started with the systemd option `ProtectHome = mkDefault true;` which forbids it to read anything from `/home`, `/root` and `/run/user` (see [ProtectHome docs](https://www.freedesktop.org/software/systemd/man/systemd.exec.html#ProtectHome=) for details). If you require serving files from home directories, you may choose to set e.g. + + ```nix + { + systemd.services.nginx.serviceConfig.ProtectHome = "read-only"; + } + ``` + +- The NixOS options `nesting.clone` and `nesting.children` have been deleted, and replaced with named [specialisation](options.html#opt-specialisation) configurations. + + Replace a `nesting.clone` entry with: + + ```nix + { + specialisation.example-sub-configuration = { + configuration = { + ... + }; + }; + ``` + + Replace a `nesting.children` entry with: + + ```nix + { + specialisation.example-sub-configuration = { + inheritParentConfig = false; + configuration = { + ... + }; + }; + ``` + + To switch to a specialised configuration at runtime you need to run: + + ```ShellSession + $ sudo /run/current-system/specialisation/example-sub-configuration/bin/switch-to-configuration test + ``` + + Before you would have used: + + ```ShellSession + $ sudo /run/current-system/fine-tune/child-1/bin/switch-to-configuration test + ``` + +- The Nginx log directory has been moved to `/var/log/nginx`, the cache directory to `/var/cache/nginx`. The option `services.nginx.stateDir` has been removed. + +- The httpd web server previously started its main process as root privileged, then ran worker processes as a less privileged identity user. This was changed to start all of httpd as a less privileged user (defined by [services.httpd.user](options.html#opt-services.httpd.user) and [services.httpd.group](options.html#opt-services.httpd.group)). As a consequence, all files that are needed for httpd to run (included configuration fragments, SSL certificates and keys, etc.) must now be readable by this less privileged user/group. + + The default value for [services.httpd.mpm](options.html#opt-services.httpd.mpm) has been changed from `prefork` to `event`. Along with this change the default value for [services.httpd.virtualHosts.\.http2](options.html#opt-services.httpd.virtualHosts) has been set to `true`. + +- The `systemd-networkd` option `systemd.network.networks..dhcp.CriticalConnection` has been removed following upstream systemd\'s deprecation of the same. It is recommended to use `systemd.network.networks..networkConfig.KeepConfiguration` instead. See systemd.network 5 for details. + +- The `systemd-networkd` option `systemd.network.networks._name_.dhcpConfig` has been renamed to [systemd.network.networks._name_.dhcpV4Config](options.html#opt-systemd.network.networks._name_.dhcpV4Config) following upstream systemd\'s documentation change. See systemd.network 5 for details. + +- In the `picom` module, several options that accepted floating point numbers encoded as strings (for example [services.picom.activeOpacity](options.html#opt-services.picom.activeOpacity)) have been changed to the (relatively) new native `float` type. To migrate your configuration simply remove the quotes around the numbers. + +- When using `buildBazelPackage` from Nixpkgs, `flat` hash mode is now used for dependencies instead of `recursive`. This is to better allow using hashed mirrors where needed. As a result, these hashes will have changed. + +- The syntax of the PostgreSQL configuration file is now checked at build time. If your configuration includes a file inaccessible inside the build sandbox, set `services.postgresql.checkConfig` to `false`. + +- The rkt module has been removed, it was archived by upstream. + +- The [Bazaar](https://bazaar.canonical.com) VCS is unmaintained and, as consequence of the Python 2 EOL, the packages `bazaar` and `bazaarTools` were removed. Breezy, the backward compatible fork of Bazaar (see the [announcement](https://www.jelmer.uk/breezy-intro.html)), was packaged as `breezy` and can be used instead. + + Regarding Nixpkgs, `fetchbzr`, `nix-prefetch-bzr` and Bazaar support in Hydra will continue to work through Breezy. + +- In addition to the hostname, the fully qualified domain name (FQDN), which consists of `${networking.hostName}` and `${networking.domain}` is now added to `/etc/hosts`, to allow local FQDN resolution, as used by the `hostname --fqdn` command and other applications that try to determine the FQDN. These new entries take precedence over entries from the DNS which could cause regressions in some very specific setups. Additionally the hostname is now resolved to `127.0.0.2` instead of `127.0.1.1` to be consistent with what `nss-myhostname` (from systemd) returns. The old behaviour can e.g. be restored by using `networking.hosts = lib.mkForce { "127.0.1.1" = [ config.networking.hostName ]; };`. + +- The hostname (`networking.hostName`) must now be a valid DNS label (see RFC 1035, RFC 1123) and as such must not contain the domain part. This means that the hostname must start with a letter or digit, end with a letter or digit, and have as interior characters only letters, digits, and hyphen. The maximum length is 63 characters. Additionally it is recommended to only use lower-case characters. If (e.g. for legacy reasons) a FQDN is required as the Linux kernel network node hostname (`uname --nodename`) the option `boot.kernel.sysctl."kernel.hostname"` can be used as a workaround (but be aware of the 64 character limit). + +- The GRUB specific option `boot.loader.grub.extraInitrd` has been replaced with the generic option `boot.initrd.secrets`. This option creates a secondary initrd from the specified files, rather than using a manually created initrd file. Due to an existing bug with `boot.loader.grub.extraInitrd`, it is not possible to directly boot an older generation that used that option. It is still possible to rollback to that generation if the required initrd file has not been deleted. + +- The [DNSChain](https://github.com/okTurtles/dnschain) package and NixOS module have been removed from Nixpkgs as the software is unmaintained and can\'t be built. For more information see issue [\#89205](https://github.com/NixOS/nixpkgs/issues/89205). + +- In the `resilio` module, [services.resilio.httpListenAddr](options.html#opt-services.resilio.httpListenAddr) has been changed to listen to `[::1]` instead of `0.0.0.0`. + +- `sslh` has been updated to version `1.21`. The `ssl` probe must be renamed to `tls` in [services.sslh.appendConfig](options.html#opt-services.sslh.appendConfig). + +- Users of [OpenAFS 1.6](http://openafs.org) must upgrade their services to OpenAFS 1.8! In this release, the OpenAFS package version 1.6.24 is marked broken but can be used during transition to OpenAFS 1.8.x. Use the options `services.openafsClient.packages.module`, `services.openafsClient.packages.programs` and `services.openafsServer.package` to select a different OpenAFS package. OpenAFS 1.6 will be removed in the next release. The package `openafs` and the service options will then silently point to the OpenAFS 1.8 release. + + See also the OpenAFS [Administrator Guide](http://docs.openafs.org/AdminGuide/index.html) for instructions. Beware of the following when updating servers: + + - The storage format of the server key has changed and the key must be converted before running the new release. + + - When updating multiple database servers, turn off the database servers from the highest IP down to the lowest with resting periods in between. Start up in reverse order. Do not concurrently run database servers working with different OpenAFS releases! + + - Update servers first, then clients. + +- Radicale\'s default package has changed from 2.x to 3.x. An upgrade checklist can be found [here](https://github.com/Kozea/Radicale/blob/3.0.x/NEWS.md#upgrade-checklist). You can use the newer version in the NixOS service by setting the `package` to `radicale3`, which is done automatically if `stateVersion` is 20.09 or higher. + +- `udpt` experienced a complete rewrite from C++ to rust. The configuration format changed from ini to toml. The new configuration documentation can be found at [the official website](https://naim94a.github.io/udpt/config.html) and example configuration is packaged in `${udpt}/share/udpt/udpt.toml`. + +- We now have a unified [services.xserver.displayManager.autoLogin](options.html#opt-services.xserver.displayManager.autoLogin) option interface to be used for every display-manager in NixOS. + +- The `bitcoind` module has changed to multi-instance, using submodules. Therefore, it is now mandatory to name each instance. To use this new multi-instance config with an existing bitcoind data directory and user, you have to adjust the original config, e.g.: + + ```nix + { + services.bitcoind = { + enable = true; + extraConfig = "..."; + ... + }; + } + ``` + + To something similar: + + ```nix + { + services.bitcoind.mainnet = { + enable = true; + dataDir = "/var/lib/bitcoind"; + user = "bitcoin"; + extraConfig = "..."; + ... + }; + } + ``` + + The key settings are: + + - `dataDir` - to continue using the same data directory. + + - `user` - to continue using the same user so that bitcoind maintains access to its files. + +- Graylog introduced a change in the LDAP server certificate validation behaviour for version 3.3.3 which might break existing setups. When updating Graylog from a version before 3.3.3 make sure to check the Graylog [release info](https://www.graylog.org/post/announcing-graylog-v3-3-3) for information on how to avoid the issue. + +- The `dokuwiki` module has changed to multi-instance, using submodules. Therefore, it is now mandatory to name each instance. Moreover, forcing SSL by default has been dropped, so `nginx.forceSSL` and `nginx.enableACME` are no longer set to `true`. To continue using your service with the original SSL settings, you have to adjust the original config, e.g.: + + ```nix + { + services.dokuwiki = { + enable = true; + ... + }; + } + ``` + + To something similar: + + ```nix + { + services.dokuwiki."mywiki" = { + enable = true; + nginx = { + forceSSL = true; + enableACME = true; + }; + ... + }; + } + ``` + + The base package has also been upgraded to the 2020-07-29 \"Hogfather\" release. Plugins might be incompatible or require upgrading. + +- The [services.postgresql.dataDir](options.html#opt-services.postgresql.dataDir) option is now set to `"/var/lib/postgresql/${cfg.package.psqlSchema}"` regardless of your [system.stateVersion](options.html#opt-system.stateVersion). Users with an existing postgresql install that have a [system.stateVersion](options.html#opt-system.stateVersion) of `17.03` or below should double check what the value of their [services.postgresql.dataDir](options.html#opt-services.postgresql.dataDir) option is (`/var/db/postgresql`) and then explicitly set this value to maintain compatibility: + + ```nix + { + services.postgresql.dataDir = "/var/db/postgresql"; + } + ``` + + The postgresql module now expects there to be a database super user account called `postgres` regardless of your [system.stateVersion](options.html#opt-system.stateVersion). Users with an existing postgresql install that have a [system.stateVersion](options.html#opt-system.stateVersion) of `17.03` or below should run the following SQL statements as a database super admin user before upgrading: + + ```SQL + CREATE ROLE postgres LOGIN SUPERUSER; + ``` + +- The USBGuard module now removes options and instead hardcodes values for `IPCAccessControlFiles`, `ruleFiles`, and `auditFilePath`. Audit logs can be found in the journal. + +- The NixOS module system now evaluates option definitions more strictly, allowing it to detect a larger set of problems. As a result, what previously evaluated may not do so anymore. See [the PR that changed this](https://github.com/NixOS/nixpkgs/pull/82743#issuecomment-674520472) for more info. + +- For NixOS configuration options, the type `loaOf`, after its initial deprecation in release 20.03, has been removed. In NixOS and Nixpkgs options using this type have been converted to `attrsOf`. For more information on this change have look at these links: [issue \#1800](https://github.com/NixOS/nixpkgs/issues/1800), [PR \#63103](https://github.com/NixOS/nixpkgs/pull/63103). + +- `config.systemd.services.${name}.path` now returns a list of paths instead of a colon-separated string. + +- Caddy module now uses Caddy v2 by default. Caddy v1 can still be used by setting [services.caddy.package](options.html#opt-services.caddy.package) to `pkgs.caddy1`. + + New option [services.caddy.adapter](options.html#opt-services.caddy.adapter) has been added. + +- The [jellyfin](options.html#opt-services.jellyfin.enable) module will use and stay on the Jellyfin version `10.5.5` if `stateVersion` is lower than `20.09`. This is because significant changes were made to the database schema, and it is highly recommended to backup your instance before upgrading. After making your backup, you can upgrade to the latest version either by setting your `stateVersion` to `20.09` or higher, or set the `services.jellyfin.package` to `pkgs.jellyfin`. If you do not wish to upgrade Jellyfin, but want to change your `stateVersion`, you can set the value of `services.jellyfin.package` to `pkgs.jellyfin_10_5`. + +- The `security.rngd` service is now disabled by default. This choice was made because there\'s krngd in the linux kernel space making it (for most usecases) functionally redundent. + +- The `hardware.nvidia.optimus_prime.enable` service has been renamed to `hardware.nvidia.prime.sync.enable` and has many new enhancements. Related nvidia prime settings may have also changed. + +- The package nextcloud17 has been removed and nextcloud18 was marked as insecure since both of them will [ will be EOL (end of life) within the lifetime of 20.09](https://docs.nextcloud.com/server/19/admin_manual/release_schedule.html). + + It\'s necessary to upgrade to nextcloud19: + + - From nextcloud17, you have to upgrade to nextcloud18 first as Nextcloud doesn\'t allow going multiple major revisions forward in a single upgrade. This is possible by setting [services.nextcloud.package](options.html#opt-services.nextcloud.package) to nextcloud18. + + - From nextcloud18, it\'s possible to directly upgrade to nextcloud19 by setting [services.nextcloud.package](options.html#opt-services.nextcloud.package) to nextcloud19. + +- The GNOME desktop manager no longer default installs gnome3.epiphany. It was chosen to do this as it has a usability breaking issue (see issue [\#98819](https://github.com/NixOS/nixpkgs/issues/98819)) that makes it unsuitable to be a default app. + + ::: {.note} + Issue [\#98819](https://github.com/NixOS/nixpkgs/issues/98819) is now fixed and gnome3.epiphany is once again installed by default. + ::: + +- If you want to manage the configuration of wpa_supplicant outside of NixOS you must ensure that none of [networking.wireless.networks](options.html#opt-networking.wireless.networks), [networking.wireless.extraConfig](options.html#opt-networking.wireless.extraConfig) or [networking.wireless.userControlled.enable](options.html#opt-networking.wireless.userControlled.enable) is being used or `true`. Using any of those options will cause wpa_supplicant to be started with a NixOS generated configuration file instead of your own. + +## Other Notable Changes {#sec-release-20.09-notable-changes} + +- SD images are now compressed by default using `zstd`. The compression for ISO images has also been changed to `zstd`, but ISO images are still not compressed by default. + +- `services.journald.rateLimitBurst` was updated from `1000` to `10000` to follow the new upstream systemd default. + +- The notmuch package move its emacs-related binaries and emacs lisp files to a separate output. They\'re not part of the default `out` output anymore - if you relied on the `notmuch-emacs-mua` binary or the emacs lisp files, access them via the `notmuch.emacs` output. Device tree overlay support was improved in [\#79370](https://github.com/NixOS/nixpkgs/pull/79370) and now uses [hardware.deviceTree.kernelPackage](options.html#opt-hardware.deviceTree.kernelPackage) instead of `hardware.deviceTree.base`. [hardware.deviceTree.overlays](options.html#opt-hardware.deviceTree.overlays) configuration was extended to support `.dts` files with symbols. Device trees can now be filtered by setting [hardware.deviceTree.filter](options.html#opt-hardware.deviceTree.filter) option. + +- The default output of `buildGoPackage` is now `$out` instead of `$bin`. + +- `buildGoModule` `doCheck` now defaults to `true`. + +- Packages built using `buildRustPackage` now use `release` mode for the `checkPhase` by default. + + Please note that Rust packages utilizing a custom build/install procedure (e.g. by using a `Makefile`) or test suites that rely on the structure of the `target/` directory may break due to those assumptions. For further information, please read the Rust section in the Nixpkgs manual. + +- The cc- and binutils-wrapper\'s \"infix salt\" and `_BUILD_` and `_TARGET_` user infixes have been replaced with with a \"suffix salt\" and suffixes and `_FOR_BUILD` and `_FOR_TARGET`. This matches the autotools convention for env vars which standard for these things, making interfacing with other tools easier. + +- Additional Git documentation (HTML and text files) is now available via the `git-doc` package. + +- Default algorithm for ZRAM swap was changed to `zstd`. + +- The installer now enables sshd by default. This improves installation on headless machines especially ARM single-board-computer. To login through ssh, either a password or an ssh key must be set for the root user or the nixos user. + +- The scripted networking system now uses `.link` files in `/etc/systemd/network` to configure mac address and link MTU, instead of the sometimes buggy `network-link-*` units, which have been removed. Bringing the interface up has been moved to the beginning of the `network-addresses-*` unit. Note this doesn\'t require `systemd-networkd` - it\'s udev that parses `.link` files. Extra care needs to be taken in the presence of [legacy udev rules](https://wiki.debian.org/NetworkInterfaceNames#THE_.22PERSISTENT_NAMES.22_SCHEME) to rename interfaces, as MAC Address and MTU defined in these options can only match on the original link name. In such cases, you most likely want to create a `10-*.link` file through [systemd.network.links](options.html#opt-systemd.network.links) and set both name and MAC Address / MTU there. + +- Grafana received a major update to version 7.x. A plugin is now needed for image rendering support, and plugins must now be signed by default. More information can be found [in the Grafana documentation](https://grafana.com/docs/grafana/latest/installation/upgrading/#upgrading-to-v7-0). + +- The `hardware.u2f` module, which was installing udev rules was removed, as udev gained native support to handle FIDO security tokens. + +- The `services.transmission` module was enhanced with the new options: [services.transmission.credentialsFile](options.html#opt-services.transmission.credentialsFile), [services.transmission.openFirewall](options.html#opt-services.transmission.openFirewall), and [services.transmission.performanceNetParameters](options.html#opt-services.transmission.performanceNetParameters). + + `transmission-daemon` is now started with additional systemd sandbox/hardening options for better security. Please [report](https://github.com/NixOS/nixpkgs/issues) any use case where this is not working well. In particular, the `RootDirectory` option newly set forbids uploading or downloading a torrent outside of the default directory configured at [settings.download-dir](options.html#opt-services.transmission.settings). If you really need Transmission to access other directories, you must include those directories into the `BindPaths` of the service: + + ```nix + { + systemd.services.transmission.serviceConfig.BindPaths = [ "/path/to/alternative/download-dir" ]; + } + ``` + + Also, connection to the RPC (Remote Procedure Call) of `transmission-daemon` is now only available on the local network interface by default. Use: + + ```nix + { + services.transmission.settings.rpc-bind-address = "0.0.0.0"; + } + ``` + + to get the previous behavior of listening on all network interfaces. + +- With this release `systemd-networkd` (when enabled through [networking.useNetworkd](options.html#opt-networking.useNetworkd)) has it\'s netlink socket created through a `systemd.socket` unit. This gives us control over socket buffer sizes and other parameters. For larger setups where networkd has to create a lot of (virtual) devices the default buffer size (currently 128MB) is not enough. + + On a machine with \>100 virtual interfaces (e.g., wireguard tunnels, VLANs, ...), that all have to be brought up during system startup, the receive buffer size will spike for a brief period. Eventually some of the message will be dropped since there is not enough (permitted) buffer space available. + + By having `systemd-networkd` start with a netlink socket created by `systemd` we can configure the `ReceiveBufferSize=` parameter in the socket options (i.e. `systemd.sockets.systemd-networkd.socketOptions.ReceiveBufferSize`) without recompiling `systemd-networkd`. + + Since the actual memory requirements depend on hardware, timing, exact configurations etc. it isn\'t currently possible to infer a good default from within the NixOS module system. Administrators are advised to monitor the logs of `systemd-networkd` for `rtnl: kernel receive buffer overrun` spam and increase the memory limit as they see fit. + + Note: Increasing the `ReceiveBufferSize=` doesn\'t allocate any memory. It just increases the upper bound on the kernel side. The memory allocation depends on the amount of messages that are queued on the kernel side of the netlink socket. + +- Specifying [mailboxes](options.html#opt-services.dovecot2.mailboxes) in the dovecot2 module as a list is deprecated and will break eval in 21.05. Instead, an attribute-set should be specified where the `name` should be the key of the attribute. + + This means that a configuration like this + + ```nix + { + services.dovecot2.mailboxes = [ + { name = "Junk"; + auto = "create"; + } + ]; + } + ``` + + should now look like this: + + ```nix + { + services.dovecot2.mailboxes = { + Junk.auto = "create"; + }; + } + ``` + +- netbeans was upgraded to 12.0 and now defaults to OpenJDK 11. This might cause problems if your projects depend on packages that were removed in Java 11. + +- nextcloud has been updated to [v19](https://nextcloud.com/blog/nextcloud-hub-brings-productivity-to-home-office/). + + If you have an existing installation, please make sure that you\'re on nextcloud18 before upgrading to nextcloud19 since Nextcloud doesn\'t support upgrades across multiple major versions. + +- The `nixos-run-vms` script now deletes the previous run machines states on test startup. You can use the `--keep-vm-state` flag to match the previous behaviour and keep the same VM state between different test runs. + +- The [nix.buildMachines](options.html#opt-nix.buildMachines) option is now type-checked. There are no functional changes, however this may require updating some configurations to use correct types for all attributes. + +- The `fontconfig` module stopped generating config and cache files for fontconfig 2.10.x, the `/etc/fonts/fonts.conf` now belongs to the latest fontconfig, just like on other Linux distributions, and we will [no longer](https://github.com/NixOS/nixpkgs/pull/95358) be versioning the config directories. + + Fontconfig 2.10.x was removed from Nixpkgs since it hasn't been used in any Nixpkgs package for years now. + +- Nginx module `nginxModules.fastcgi-cache-purge` renamed to official name `nginxModules.cache-purge`. Nginx module `nginxModules.ngx_aws_auth` renamed to official name `nginxModules.aws-auth`. + +- The option `defaultPackages` was added. It installs the packages perl, rsync and strace for now. They were added unconditionally to `systemPackages` before, but are not strictly necessary for a minimal NixOS install. You can set it to an empty list to have a more minimal system. Be aware that some functionality might still have an impure dependency on those packages, so things might break. + +- The `undervolt` option no longer needs to apply its settings every 30s. If they still become undone, open an issue and restore the previous behaviour using `undervolt.useTimer`. + +- Agda has been heavily reworked. + + - `agda.mkDerivation` has been heavily changed and is now located at agdaPackages.mkDerivation. + + - New top-level packages agda and `agda.withPackages` have been added, the second of which sets up agda with access to chosen libraries. + + - All agda libraries now live under `agdaPackages`. + + - Many broken libraries have been removed. + + See the [new documentation](https://nixos.org/nixpkgs/manual/#agda) for more information. + +- The `deepin` package set has been removed from nixpkgs. It was a work in progress to package the [Deepin Desktop Environment (DDE)](https://www.deepin.org/en/dde/), including libraries, tools and applications, and it was still missing a service to launch the desktop environment. It has shown to no longer be a feasible goal due to reasons discussed in [issue \#94870](https://github.com/NixOS/nixpkgs/issues/94870). The package `netease-cloud-music` has also been removed, as it depends on libraries from deepin. + +- The `opendkim` module now uses systemd sandboxing features to limit the exposure of the system towards the opendkim service. + +- Kubernetes has been upgraded to 1.19.1, which also means that the golang version to build it has been bumped to 1.15. This may have consequences for your existing clusters and their certificates. Please consider [ the release notes for Kubernetes 1.19 carefully ](https://relnotes.k8s.io/?markdown=93264) before upgrading. + +- For AMD GPUs, Vulkan can now be used by adding `amdvlk` to `hardware.opengl.extraPackages`. + +- Similarly, still for AMD GPUs, the ROCm OpenCL stack can now be used by adding `rocm-opencl-icd` to `hardware.opengl.extraPackages`. + +## Contributions {#sec-release-20.09-contributions} + +I, Jonathan Ringer, would like to thank the following individuals for their work on nixpkgs. This release could not be done without the hard work of the NixOS community. There were 31282 contributions across 1313 contributors. + +1. 2288 Mario Rodas + +2. 1837 Frederik Rietdijk + +3. 946 Jörg Thalheim + +4. 925 Maximilian Bosch + +5. 687 Jonathan Ringer + +6. 651 Jan Tojnar + +7. 622 Daniël de Kok + +8. 605 WORLDofPEACE + +9. 597 Florian Klink + +10. 528 José Romildo Malaquias + +11. 281 volth + +12. 101 Robert Scott + +13. 86 Tim Steinbach + +14. 76 WORLDofPEACE + +15. 49 Maximilian Bosch + +16. 42 Thomas Tuegel + +17. 37 Doron Behar + +18. 36 Vladimír Čunát + +19. 27 Jonathan Ringer + +20. 27 Maciej Krüger + +I, Jonathan Ringer, would also like to personally thank \@WORLDofPEACE for their help in mentoring me on the release process. Special thanks also goes to Thomas Tuegel for helping immensely with stabilizing Qt, KDE, and Plasma5; I would also like to thank Robert Scott for his numerous fixes and pull request reviews. diff --git a/nixos/doc/manual/release-notes/rl-2009.xml b/nixos/doc/manual/release-notes/rl-2009.xml deleted file mode 100644 index 49446afdead..00000000000 --- a/nixos/doc/manual/release-notes/rl-2009.xml +++ /dev/null @@ -1,1838 +0,0 @@ -
- Release 20.09 (“Nightingale”, 2020.10/27) - - - Support is planned until the end of June 2021, handing over to 21.05. - (Plans - have shifted by two months since release of 20.09.) - -
- Highlights - - - In addition to 7349 new, 14442 updated, and 8181 removed packages, this release has the - following highlights: - - - - - - Core version changes: - - - - - gcc: 9.2.0 -> 9.3.0 - - - - - glibc: 2.30 -> 2.31 - - - - - linux: still defaults to 5.4.x, all supported kernels available - - - - - mesa: 19.3.5 -> 20.1.7 - - - - - - - Desktop Environments: - - - - - plasma5: 5.17.5 -> 5.18.5 - - - - - kdeApplications: 19.12.3 -> 20.08.1 - - - - - gnome3: 3.34 -> 3.36, see its release notes - - - - - cinnamon: added at 4.6 - - - - - NixOS now distributes an official GNOME ISO - - - - - - - - Programming Languages and Frameworks: - - - - - - Agda ecosystem was heavily reworked (see more details below) - - - - - PHP now defaults to PHP 7.4, updated from 7.3 - - - - - PHP 7.2 is no longer supported due to upstream not supporting this version for the entire lifecycle of the 20.09 release - - - - - Python 3 now defaults to Python 3.8 instead of 3.7 - - - - - Python 3.5 reached its upstream EOL at the end of September 2020: it - has been removed from the list of available packages - - - - - - - - Databases and Service Monitoring: - - - - - MariaDB has been updated to 10.4, MariaDB Galera to 26.4. Please read the related upgrade instructions under backwards incompatibilities before upgrading. - - - - - Zabbix now defaults to 5.0, updated from 4.4. Please read related sections under backwards compatibilities before upgrading. - - - - - - - - Major module changes: - - - - - Quickly configure a complete, private, self-hosted video - conferencing solution with the new Jitsi Meet module. - - - - - Two new options, authorizedKeysCommand - and authorizedKeysCommandUser, have - been added to the openssh module. If you have AuthorizedKeysCommand - in your services.openssh.extraConfig you should - make use of these new options instead. - - - - - There is a new module for Podman (virtualisation.podman), a drop-in replacement for the Docker command line. - - - - - The new virtualisation.containers module manages configuration shared by the CRI-O and Podman modules. - - - - - Declarative Docker containers are renamed from docker-containers to virtualisation.oci-containers.containers. - This is to make it possible to use podman instead of docker. - - - - - The new option documentation.man.generateCaches - has been added to automatically generate the man-db caches, which are needed by utilities - like whatis and apropos. The caches are generated during the build of - the NixOS configuration: since this can be expensive when a large number of packages are installed, the - feature is disabled by default. - - - - - services.postfix.sslCACert was replaced by services.postfix.tlsTrustedAuthorities which now defaults to system certificate authorities. - - - - - The various documented workarounds to use steam have been converted to a module. programs.steam.enable enables steam, controller support and the workarounds. - - - - - Support for built-in LCDs in various pieces of Logitech hardware (keyboards and USB speakers). hardware.logitech.lcd.enable enables support for all hardware supported by the g15daemon project. - - - - - The GRUB module gained support for basic password protection, which - allows to restrict non-default entries in the boot menu to one or more - users. The users and passwords are defined via the option - . - Note: Password support is only available in GRUB version 2. - - - - - - - - NixOS module changes: - - - - - The NixOS module system now supports freeform modules as a mix between types.attrsOf and types.submodule. These allow you to explicitly declare a subset of options while still permitting definitions without an associated option. See for how to use them. - - - - - Following its deprecation in 20.03, the Perl NixOS test driver has been removed. - All remaining tests have been ported to the Python test framework. - Code outside nixpkgs using make-test.nix or - testing.nix needs to be ported to - make-test-python.nix and - testing-python.nix respectively. - - - - - Subordinate GID and UID mappings are now set up automatically for all normal users. - This will make container tools like Podman work as non-root users out of the box. - - - - - - - Starting with this release, the hydra-build-result - nixos-YY.MM - branches no longer exist in the deprecated - nixpkgs-channels repository. These branches are now in - the main nixpkgs - repository. - - - -
- -
- New Services - - - In addition to 1119 new, 118 updated, and 476 removed options; 61 new modules were added since the last release: - - - - - - Hardware: - - - - - adds easy support of system76 firmware - - - - - loads uinput kernel module - - - - - enable good defaults for HiDPI displays - - - - - support for Wooting keyboards - - - - - xpadneo driver for Xbox One wireless controllers - - - - - - - Programs: - - - - - enable hamster time tracking - - - - - adds easy enablement of steam and related system configuration - - - - - - - Security: - - - - - alternative to sudo, allows non-root users to execute commands as root - - - - - add Trusted Platform Module 2 support - - - - - - - System: - - - - - start an OpenVPN client during initrd boot - - - - - - - Virtualization: - - - - - use nixos-containers - - - - - run OCI (Docker) containers - - - - - daemonless container engine - - - - - - - - Services: - - - - - Anki sync server - - - - - Subtitle manager for Sonarr and Radarr - - - - - Biboumi XMPP gateway to IRC - - - - - Blockbook-frontend, a service for the Trezor wallet - - - - - Wayland cage service - - - - - IRC daemon, which can be accessed throught the browser - - - - - Tool for coordinating volunteers and shifts on large events - - - - - text-expander written in rust - - - - - Folding@home client - - - - - Web-based team code collaboration tool - - - - - Matrix bot - - - - - xow as a systemd service - - - - - Hercules CI build agent - - - - - Jitsi Conference Focus, component of Jitsi Meet - - - - - A web file repository - - - - - Secure, simple and scalable video conferences - - - - - Jitsi Videobridge, a WebRTC compatible router - - - - - Jupyterhub development server - - - - - Lightweight Kubernetes distribution - - - - - Magic Wormhole Mailbox Server - - - - - Parental Control support - - - - - Matrix and Discord bridge - - - - - Matrix-Telegram puppeting/relaybot bridge - - - - - Japanese DTV Tuner Server Service - - - - - Molly-Brown Gemini server - - - - - Mullvad VPN daemon - - - - - Namecoin to DNS bridge - - - - - NextDNS to DoH Proxy service - - - - - Google storage bucket to be used as a nix store - - - - - OneDrive sync service - - - - - Pastebin-like service - - - - - Manage network booting of machines - - - - - Privacy authentication server - - - - - Quorum blockchain daemon - - - - - RobustIRC bridge - - - - - Generate RSS and Atom feeds - - - - - rTorrent service - - - - - SmartDNS DNS server - - - - - SOGo groupware - - - - - Teeworlds game server - - - - - torque computing node - - - - - torque server - - - - - A total uptime service - - - - - X11 remote server - - - - - Wasabi backend service - - - - - Yubikey agent - - - - - Zigbee to MQTT bridge - - - - - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - - MariaDB has been updated to 10.4, MariaDB Galera to 26.4. - Before you upgrade, it would be best to take a backup of your database. - For MariaDB Galera Cluster, see Upgrading - from MariaDB 10.3 to MariaDB 10.4 with Galera Cluster instead. - Before doing the upgrade read Incompatible - Changes Between 10.3 and 10.4. - After the upgrade you will need to run mysql_upgrade. - MariaDB 10.4 introduces a number of changes to the authentication process, intended to make things easier and more - intuitive. See Authentication from MariaDB 10.4. - unix_socket auth plugin does not use a password, and uses the connecting user's UID instead. When a new MariaDB data directory is initialized, two MariaDB users are - created and can be used with new unix_socket auth plugin, as well as traditional mysql_native_password plugin: root@localhost and mysql@localhost. To actually use - the traditional mysql_native_password plugin method, one must run the following: - -services.mysql.initialScript = pkgs.writeText "mariadb-init.sql" '' - ALTER USER root@localhost IDENTIFIED VIA mysql_native_password USING PASSWORD("verysecret"); -''; - - When MariaDB data directory is just upgraded (not initialized), the users are not created or modified. - - - - - MySQL server is now started with additional systemd sandbox/hardening options for better security. The PrivateTmp, ProtectHome, and ProtectSystem options - may be problematic when MySQL is attempting to read from or write to your filesystem anywhere outside of its own state directory, for example when - calling LOAD DATA INFILE or SELECT * INTO OUTFILE. In this scenario a variant of the following may be required: - - allow MySQL to read from /home and /tmp directories when using LOAD DATA INFILE - -systemd.services.mysql.serviceConfig.ProtectHome = lib.mkForce "read-only"; - - - allow MySQL to write to custom folder /var/data when using SELECT * INTO OUTFILE, assuming the mysql user has write - access to /var/data - -systemd.services.mysql.serviceConfig.ReadWritePaths = [ "/var/data" ]; - - - - The MySQL service no longer runs its systemd service startup script as root anymore. A dedicated non root - super user account is required for operation. This means users with an existing MySQL or MariaDB database server are required to run the following SQL statements - as a super admin user before upgrading: - -CREATE USER IF NOT EXISTS 'mysql'@'localhost' identified with unix_socket; -GRANT ALL PRIVILEGES ON *.* TO 'mysql'@'localhost' WITH GRANT OPTION; - - If you use MySQL instead of MariaDB please replace unix_socket with auth_socket. If you have changed the value of - from the default of mysql to a different user please change 'mysql'@'localhost' to the corresponding user instead. - - - - - - Zabbix now defaults to 5.0, updated from 4.4. Please carefully read through - the upgrade guide - and apply any changes required. Be sure to take special note of the section on - enabling extended range of numeric (float) values - as you will need to apply this database migration manually. - - - If you are using Zabbix Server with a MySQL or MariaDB database you should note that using a character set of utf8 and a collate of utf8_bin has become mandatory with - this release. See the upstream issue for further discussion. Before upgrading you should check the character set and collation used by - your database and ensure they are correct: - - SELECT - default_character_set_name, - default_collation_name - FROM - information_schema.schemata - WHERE - schema_name = 'zabbix'; - - If these values are not correct you should take a backup of your database and convert the character set and collation as required. Here is an - example of how to do so, taken from - the Zabbix forums: - - ALTER DATABASE `zabbix` DEFAULT CHARACTER SET utf8 COLLATE utf8_bin; - - -- the following will produce a list of SQL commands you should subsequently execute - SELECT CONCAT("ALTER TABLE ", TABLE_NAME," CONVERT TO CHARACTER SET utf8 COLLATE utf8_bin;") AS ExecuteTheString - FROM information_schema.`COLUMNS` - WHERE table_schema = "zabbix" AND COLLATION_NAME = "utf8_general_ci"; - - - - - - - maxx package removed along with services.xserver.desktopManager.maxx module. - Please migrate to cdesktopenv and services.xserver.desktopManager.cde module. - - - - - The matrix-synapse module no longer includes optional dependencies by default, they have to be added through the plugins option. - - - - - buildGoModule now internally creates a vendor directory - in the source tree for downloaded modules instead of using go's module - proxy protocol. This storage format is simpler and therefore less - likely to break with future versions of go. As a result - buildGoModule switched from - modSha256 to the vendorSha256 - attribute to pin fetched version data. - - - - - Grafana is now built without support for phantomjs by default. Phantomjs support has been - deprecated in Grafana - and the phantomjs project is - currently unmaintained. - It can still be enabled by providing phantomJsSupport = true to the package instantiation: -{ - services.grafana.package = pkgs.grafana.overrideAttrs (oldAttrs: rec { - phantomJsSupport = true; - }); -} - - - - - The supybot module now uses /var/lib/supybot - as its default stateDir path if stateVersion - is 20.09 or higher. It also enables a number of - systemd sandboxing options - which may possibly interfere with some plugins. If this is the case you can disable the options through attributes in - . - - - - - The security.duosec.skey option, which stored a secret in the - nix store, has been replaced by a new - security.duosec.secretKeyFile - option for better security. - - - security.duosec.ikey has been renamed to - security.duosec.integrationKey. - - - - - vmware has been removed from the services.x11.videoDrivers defaults. - For VMWare guests set virtualisation.vmware.guest.enable to true which will include the appropriate drivers. - - - - - The initrd SSH support now uses OpenSSH rather than Dropbear to - allow the use of Ed25519 keys and other OpenSSH-specific - functionality. Host keys must now be in the OpenSSH format, and at - least one pre-generated key must be specified. - - - If you used the - options, you'll get an error explaining how to convert your host - keys and migrate to the new - option. - Otherwise, if you don't have any host keys set, you'll need to - generate some; see the option - documentation for instructions. - - - - - Since this release there's an easy way to customize your PHP - install to get a much smaller base PHP with only wanted - extensions enabled. See the following snippet installing a - smaller PHP with the extensions imagick, - opcache, pdo and - pdo_mysql loaded: - - -environment.systemPackages = [ - (pkgs.php.withExtensions - ({ all, ... }: with all; [ - imagick - opcache - pdo - pdo_mysql - ]) - ) -]; - - The default php attribute hasn't lost any - extensions. The opcache extension has been - added. - - All upstream PHP extensions are available under ]]>. - - - All PHP config flags have been removed for - the following reasons: - - - - - The updated php attribute is now easily - customizable to your liking by using - php.withExtensions or - php.buildEnv instead of writing config files - or changing configure flags. - - - - - The remaining configuration flags can now be set directly on - the php attribute. For example, instead of - - -php.override { - config.php.embed = true; - config.php.apxs2 = false; -} - - - you should now write - - -php.override { - embedSupport = true; - apxs2Support = false; -} - - - - - - - - - - The ACME module has been overhauled for simplicity and maintainability. - Cert generation now implicitly uses the acme - user, and the security.acme.certs._name_.user option - has been removed. Instead, certificate access from other services is now - managed through group permissions. The module no longer runs lego - twice under certain conditions, and will correctly renew certificates if - their configuration is changed. Services which reload nginx and httpd after - certificate renewal are now properly configured too so you no longer have - to do this manually if you are using HTTPS enabled virtual hosts. A mechanism - for regenerating certs on demand has also been added and documented. - - - - - Gollum received a major update to version 5.x and you may have to change - some links in your wiki when migrating from gollum 4.x. More information - can be found - here. - - - - - Deluge 2.x was added and is used as default for new NixOS - installations where stateVersion is >= 20.09. If you are upgrading from a previous - NixOS version, you can set service.deluge.package = pkgs.deluge-2_x - to upgrade to Deluge 2.x and migrate the state to the new format. - Be aware that backwards state migrations are not supported by Deluge. - - - - - Nginx web server now starting with additional sandbox/hardening options. By default, write access - to /var/log/nginx and /var/cache/nginx is allowed. To allow writing to other folders, - use systemd.services.nginx.serviceConfig.ReadWritePaths - -systemd.services.nginx.serviceConfig.ReadWritePaths = [ "/var/www" ]; - - - - Nginx is also started with the systemd option ProtectHome = mkDefault true; - which forbids it to read anything from /home, /root - and /run/user (see - ProtectHome docs - for details). - If you require serving files from home directories, you may choose to set e.g. - -systemd.services.nginx.serviceConfig.ProtectHome = "read-only"; - - - - - - The NixOS options nesting.clone and - nesting.children have been deleted, and - replaced with named - configurations. - - - - Replace a nesting.clone entry with: - -{ -specialisation.example-sub-configuration = { - configuration = { - ... - }; -}; - - - - Replace a nesting.children entry with: - -{ -specialisation.example-sub-configuration = { - inheritParentConfig = false; - configuration = { - ... - }; -}; - - - - To switch to a specialised configuration at runtime you need to - run: - -# sudo /run/current-system/specialisation/example-sub-configuration/bin/switch-to-configuration test - - Before you would have used: - -# sudo /run/current-system/fine-tune/child-1/bin/switch-to-configuration test - - - - - - The Nginx log directory has been moved to /var/log/nginx, the cache directory - to /var/cache/nginx. The option services.nginx.stateDir has - been removed. - - - - - The httpd web server previously started its main process as root - privileged, then ran worker processes as a less privileged identity user. - This was changed to start all of httpd as a less privileged user (defined by - and - ). As a consequence, all files that - are needed for httpd to run (included configuration fragments, SSL - certificates and keys, etc.) must now be readable by this less privileged - user/group. - - - The default value for - has been changed from prefork to event. Along with - this change the default value for - services.httpd.virtualHosts.<name>.http2 - has been set to true. - - - - - The systemd-networkd option - systemd.network.networks.<name>.dhcp.CriticalConnection - has been removed following upstream systemd's deprecation of the same. It is recommended to use - systemd.network.networks.<name>.networkConfig.KeepConfiguration instead. - See systemd.network - 5 for details. - - - - - The systemd-networkd option - systemd.network.networks._name_.dhcpConfig - has been renamed to - - following upstream systemd's documentation change. - See systemd.network - 5 for details. - - - - - In the picom module, several options that accepted - floating point numbers encoded as strings (for example - ) have been changed - to the (relatively) new native float type. To migrate - your configuration simply remove the quotes around the numbers. - - - - - When using buildBazelPackage from Nixpkgs, - flat hash mode is now used for dependencies - instead of recursive. This is to better allow - using hashed mirrors where needed. As a result, these hashes - will have changed. - - - - - The syntax of the PostgreSQL configuration file is now checked at build - time. If your configuration includes a file inaccessible inside the build - sandbox, set services.postgresql.checkConfig to - false. - - - - - The rkt module has been removed, it was archived by upstream. - - - - - The Bazaar VCS is - unmaintained and, as consequence of the Python 2 EOL, the packages - bazaar and bazaarTools were - removed. Breezy, the backward compatible fork of Bazaar (see the - announcement), - was packaged as breezy and can be used instead. - - - Regarding Nixpkgs, fetchbzr, - nix-prefetch-bzr and Bazaar support in Hydra will - continue to work through Breezy. - - - - - In addition to the hostname, the fully qualified domain name (FQDN), - which consists of ${networking.hostName} and - ${networking.domain} is now added to - /etc/hosts, to allow local FQDN resolution, as used by the - hostname --fqdn command and other applications that - try to determine the FQDN. These new entries take precedence over entries - from the DNS which could cause regressions in some very specific setups. - Additionally the hostname is now resolved to 127.0.0.2 - instead of 127.0.1.1 to be consistent with what - nss-myhostname (from systemd) returns. - The old behaviour can e.g. be restored by using - networking.hosts = lib.mkForce { "127.0.1.1" = [ config.networking.hostName ]; };. - - - - - The hostname (networking.hostName) must now be a valid - DNS label (see RFC 1035, RFC 1123) and as such must not contain the domain part. - This means that the hostname must start with a letter or digit, end with a letter - or digit, and have as interior characters only letters, digits, and - hyphen. The maximum length is 63 characters. Additionally it is - recommended to only use lower-case characters. - If (e.g. for legacy reasons) a FQDN is required as the Linux kernel network node hostname - (uname --nodename) the option - boot.kernel.sysctl."kernel.hostname" - can be used as a workaround (but be aware of the 64 character limit). - - - - - The GRUB specific option - has been replaced with the generic option - . This option creates a secondary - initrd from the specified files, rather than using a manually created - initrd file. - - Due to an existing bug with , - it is not possible to directly boot an older generation that used that - option. It is still possible to rollback to that generation if the required - initrd file has not been deleted. - - - - - The DNSChain - package and NixOS module have been removed from Nixpkgs as the software is - unmaintained and can't be built. For more information see issue - #89205. - - - - - In the resilio module, has been changed to listen to [::1] instead of 0.0.0.0. - - - - - sslh has been updated to version - 1.21. The ssl probe must be - renamed to tls in . - - - - - Users of OpenAFS 1.6 must - upgrade their services to OpenAFS 1.8! In this release, the OpenAFS package - version 1.6.24 is marked broken but can be used during transition to - OpenAFS 1.8.x. Use the options - , - and - to select a different - OpenAFS package. OpenAFS 1.6 will be removed in the next release. The - package openafs and the service options will then - silently point to the OpenAFS 1.8 release. - - - See also the OpenAFS Administrator - Guide for instructions. Beware of the following when updating - servers: - - - - The storage format of the server key has changed and the key must be converted before running the new release. - - - - - When updating multiple database servers, turn off the database servers - from the highest IP down to the lowest with resting periods in - between. Start up in reverse order. Do not concurrently run database - servers working with different OpenAFS releases! - - - - - Update servers first, then clients. - - - - - - - - Radicale's default package has changed from 2.x to 3.x. An upgrade - checklist can be found - here. - You can use the newer version in the NixOS service by setting the - package to radicale3, which is done - automatically if stateVersion is 20.09 or higher. - - - - - udpt experienced a complete rewrite from C++ to rust. The configuration format changed from ini to toml. - The new configuration documentation can be found at - the official website and example - configuration is packaged in ${udpt}/share/udpt/udpt.toml. - - - - - We now have a unified option interface - to be used for every display-manager in NixOS. - - - - - The bitcoind module has changed to multi-instance, using submodules. - Therefore, it is now mandatory to name each instance. - To use this new multi-instance config with an existing bitcoind data directory and user, - you have to adjust the original config, e.g.: - - services.bitcoind = { - enable = true; - extraConfig = "..."; - ... - }; - - To something similar: - - services.bitcoind.mainnet = { - enable = true; - dataDir = "/var/lib/bitcoind"; - user = "bitcoin"; - extraConfig = "..."; - ... - }; - - The key settings are: - - - - dataDir - to continue using the same data directory. - - - - - user - to continue using the same user so that bitcoind maintains access to its files. - - - - - - - - Graylog introduced a change in the LDAP server certificate validation behaviour for version 3.3.3 which might break existing setups. - When updating Graylog from a version before 3.3.3 make sure to check the Graylog release info for information on how to avoid the issue. - - - - - The dokuwiki module has changed to multi-instance, using submodules. - Therefore, it is now mandatory to name each instance. Moreover, forcing SSL by default has been dropped, so - nginx.forceSSL and nginx.enableACME are no longer set to true. - To continue using your service with the original SSL settings, you have to adjust the original config, e.g.: - -services.dokuwiki = { - enable = true; - ... -}; - - To something similar: - -services.dokuwiki."mywiki" = { - enable = true; - nginx = { - forceSSL = true; - enableACME = true; - }; - ... -}; - - The base package has also been upgraded to the 2020-07-29 "Hogfather" release. Plugins might be incompatible or require upgrading. - - - - - The option is now set to "/var/lib/postgresql/${cfg.package.psqlSchema}" regardless of your - . Users with an existing postgresql install that have a of 17.03 or below - should double check what the value of their option is (/var/db/postgresql) and then explicitly - set this value to maintain compatibility: - -services.postgresql.dataDir = "/var/db/postgresql"; - - - - The postgresql module now expects there to be a database super user account called postgres regardless of your . Users - with an existing postgresql install that have a of 17.03 or below should run the following SQL statements as a - database super admin user before upgrading: - -CREATE ROLE postgres LOGIN SUPERUSER; - - - - - - The USBGuard module now removes options and instead hardcodes values for IPCAccessControlFiles, ruleFiles, and auditFilePath. Audit logs can be found in the journal. - - - - - The NixOS module system now evaluates option definitions more strictly, allowing it to detect a larger set of problems. - As a result, what previously evaluated may not do so anymore. - See the PR that changed this for more info. - - - - - For NixOS configuration options, the type loaOf, after - its initial deprecation in release 20.03, has been removed. In NixOS and - Nixpkgs options using this type have been converted to attrsOf. - For more information on this change have look at these links: - issue #1800, - PR #63103. - - - - - config.systemd.services.${name}.path now returns a list of paths instead of a colon-separated string. - - - - - Caddy module now uses Caddy v2 by default. Caddy v1 can still be used by setting - to pkgs.caddy1. - - - New option has been added. - - - - - The jellyfin module will use and stay on the Jellyfin version 10.5.5 - if stateVersion is lower than 20.09. This is because significant changes were made to the database schema, - and it is highly recommended to backup your instance before upgrading. After making your backup, you can upgrade to the latest version either by - setting your stateVersion to 20.09 or higher, or set the to - pkgs.jellyfin. If you do not wish to upgrade Jellyfin, but want to change your stateVersion, you can set - the value of to pkgs.jellyfin_10_5. - - - - - The security.rngd service is now disabled by default. - This choice was made because there's krngd in the linux kernel space making it (for most usecases) - functionally redundent. - - - - - The hardware.nvidia.optimus_prime.enable service has been renamed to - hardware.nvidia.prime.sync.enable and has many new enhancements. - Related nvidia prime settings may have also changed. - - - - - The package nextcloud17 has been removed and nextcloud18 was marked as insecure - since both of them will - will be EOL (end of life) within the lifetime of 20.09. - - - It's necessary to upgrade to nextcloud19: - - - - From nextcloud17, you have to upgrade to nextcloud18 first as - Nextcloud doesn't allow going multiple major revisions forward in a single upgrade. This is possible - by setting to nextcloud18. - - - - - From nextcloud18, it's possible to directly upgrade to nextcloud19 - by setting to nextcloud19. - - - - - - - - The GNOME desktop manager no longer default installs gnome3.epiphany. - It was chosen to do this as it has a usability breaking issue (see issue #98819) - that makes it unsuitable to be a default app. - - - - Issue #98819 - is now fixed and gnome3.epiphany is once - again installed by default. - - - - - - If you want to manage the configuration of wpa_supplicant outside of NixOS you must ensure that none of , or is being used or true. - Using any of those options will cause wpa_supplicant to be started with a NixOS generated configuration file instead of your own. - - - -
- -
- Other Notable Changes - - - - SD images are now compressed by default using zstd. The compression for ISO images has also been changed to zstd, but ISO images are still not compressed by default. - - - - was updated from - 1000 to 10000 to follow the new - upstream systemd default. - - - - - The notmuch package move its emacs-related binaries and - emacs lisp files to a separate output. They're not part - of the default out output anymore - if you relied on the - notmuch-emacs-mua binary or the emacs lisp files, access them via - the notmuch.emacs output. - - Device tree overlay support was improved in - #79370 - and now uses - instead of . - - configuration was - extended to support .dts files with symbols. - - Device trees can now be filtered by setting - option. - - - - - The default output of buildGoPackage is now $out instead of $bin. - - - - - buildGoModule doCheck now defaults to true. - - - - - Packages built using buildRustPackage now use release - mode for the checkPhase by default. - - - Please note that Rust packages utilizing a custom build/install procedure - (e.g. by using a Makefile) or test suites that rely on the - structure of the target/ directory may break due to those assumptions. - For further information, please read the Rust section in the Nixpkgs manual. - - - - - The cc- and binutils-wrapper's "infix salt" and _BUILD_ and _TARGET_ user infixes have been replaced with with a "suffix salt" and suffixes and _FOR_BUILD and _FOR_TARGET. - This matches the autotools convention for env vars which standard for these things, making interfacing with other tools easier. - - - - - Additional Git documentation (HTML and text files) is now available via the git-doc package. - - - - - Default algorithm for ZRAM swap was changed to zstd. - - - - - The installer now enables sshd by default. This improves installation on headless machines especially ARM single-board-computer. - To login through ssh, either a password or an ssh key must be set for the root user or the nixos user. - - - - - The scripted networking system now uses .link files in - /etc/systemd/network to configure mac address and link MTU, - instead of the sometimes buggy network-link-* units, which - have been removed. - Bringing the interface up has been moved to the beginning of the - network-addresses-* unit. - Note this doesn't require systemd-networkd - it's udev that - parses .link files. - Extra care needs to be taken in the presence of legacy udev rules - to rename interfaces, as MAC Address and MTU defined in these options can only match on the original link name. - In such cases, you most likely want to create a 10-*.link file through and set both name and MAC Address / MTU there. - - - - - Grafana received a major update to version 7.x. A plugin is now needed for - image rendering support, and plugins must now be signed by default. More - information can be found - in the Grafana documentation. - - - - - The hardware.u2f module, which was installing udev rules - was removed, as udev gained native support to handle FIDO security tokens. - - - - - The services.transmission module - was enhanced with the new options: - , - , - and . - - - transmission-daemon is now started with additional systemd sandbox/hardening options for better security. - Please report - any use case where this is not working well. - In particular, the RootDirectory option newly set - forbids uploading or downloading a torrent outside of the default directory - configured at settings.download-dir. - If you really need Transmission to access other directories, - you must include those directories into the BindPaths of the service: - -systemd.services.transmission.serviceConfig.BindPaths = [ "/path/to/alternative/download-dir" ]; - - - - Also, connection to the RPC (Remote Procedure Call) of transmission-daemon - is now only available on the local network interface by default. - Use: - -services.transmission.settings.rpc-bind-address = "0.0.0.0"; - - to get the previous behavior of listening on all network interfaces. - - - - - With this release systemd-networkd (when enabled through ) - has it's netlink socket created through a systemd.socket unit. This gives us control over - socket buffer sizes and other parameters. For larger setups where networkd has to create a lot of (virtual) - devices the default buffer size (currently 128MB) is not enough. - - - On a machine with >100 virtual interfaces (e.g., wireguard tunnels, VLANs, …), that all have to - be brought up during system startup, the receive buffer size will spike for a brief period. - Eventually some of the message will be dropped since there is not enough (permitted) buffer - space available. - - - By having systemd-networkd start with a netlink socket created by - systemd we can configure the ReceiveBufferSize= parameter - in the socket options (i.e. systemd.sockets.systemd-networkd.socketOptions.ReceiveBufferSize) - without recompiling systemd-networkd. - - - Since the actual memory requirements depend on hardware, timing, exact - configurations etc. it isn't currently possible to infer a good default - from within the NixOS module system. Administrators are advised to - monitor the logs of systemd-networkd for rtnl: kernel receive buffer - overrun spam and increase the memory limit as they see fit. - - - Note: Increasing the ReceiveBufferSize= doesn't allocate any memory. It just increases - the upper bound on the kernel side. The memory allocation depends on the amount of messages that are - queued on the kernel side of the netlink socket. - - - - - Specifying mailboxes in the dovecot2 module - as a list is deprecated and will break eval in 21.05. Instead, an attribute-set should be specified where the name - should be the key of the attribute. - - - This means that a configuration like this -{ - services.dovecot2.mailboxes = [ - { name = "Junk"; - auto = "create"; - } - ]; -} - should now look like this: -{ - services.dovecot2.mailboxes = { - Junk.auto = "create"; - }; -} - - - - - netbeans was upgraded to 12.0 and now defaults to OpenJDK 11. This might cause problems if your projects depend on packages that were removed in Java 11. - - - - - nextcloud has been updated to v19. - - - If you have an existing installation, please make sure that you're on - nextcloud18 before upgrading to nextcloud19 - since Nextcloud doesn't support upgrades across multiple major versions. - - - - - The nixos-run-vms script now deletes the - previous run machines states on test startup. You can use the - --keep-vm-state flag to match the previous - behaviour and keep the same VM state between different test runs. - - - - - The nix.buildMachines option is now type-checked. - There are no functional changes, however this may require updating some configurations to use correct types for all attributes. - - - - - The fontconfig module stopped generating config and cache files for fontconfig 2.10.x, the /etc/fonts/fonts.conf now belongs to the latest fontconfig, just like on other Linux distributions, and we will no longer be versioning the config directories. - - - Fontconfig 2.10.x was removed from Nixpkgs since it hasn’t been used in any Nixpkgs package for years now. - - - - - Nginx module nginxModules.fastcgi-cache-purge renamed to official name nginxModules.cache-purge. - Nginx module nginxModules.ngx_aws_auth renamed to official name nginxModules.aws-auth. - - - - - The option was added. It installs the packages perl, rsync and strace for now. They were added unconditionally to before, but are not strictly necessary for a minimal NixOS install. You can set it to an empty list to have a more minimal system. Be aware that some functionality might still have an impure dependency on those packages, so things might break. - - - - - The undervolt option no longer needs to apply its - settings every 30s. If they still become undone, open an issue and restore - the previous behaviour using undervolt.useTimer. - - - - - Agda has been heavily reworked. - - - - agda.mkDerivation has been heavily changed and - is now located at agdaPackages.mkDerivation. - - - - - New top-level packages agda and - agda.withPackages have been added, the second - of which sets up agda with access to chosen libraries. - - - - - All agda libraries now live under - agdaPackages. - - - - - Many broken libraries have been removed. - - - - See the new - documentation for more information. - - - - - The deepin package set has been removed from - nixpkgs. It was a work in progress to package the - Deepin Desktop Environment (DDE), - including libraries, tools and applications, and it was still - missing a service to launch the desktop environment. It has shown - to no longer be a feasible goal due to reasons discussed in - issue #94870. - The package netease-cloud-music has also been - removed, as it depends on libraries from deepin. - - - - - The opendkim module now uses systemd sandboxing features - to limit the exposure of the system towards the opendkim service. - - - - - - - - Kubernetes has been upgraded to 1.19.1, which also means that the - golang version to build it has been bumped to 1.15. This may have - consequences for your existing clusters and their certificates. Please - consider - - the release notes for Kubernetes 1.19 carefully - - before upgrading. - - - - - - - For AMD GPUs, Vulkan can now be used by adding amdvlk - to hardware.opengl.extraPackages. - - - - - Similarly, still for AMD GPUs, the ROCm OpenCL stack can now be used by adding - rocm-opencl-icd to - hardware.opengl.extraPackages. - - - -
- -
- Contributions - - I, Jonathan Ringer, would like to thank the following individuals for their work on nixpkgs. This release could not be done without the hard work of the NixOS community. There were 31282 contributions across 1313 contributors. - - - - Top contributors to NixOS/Nixpkgs from the 20.03 release to the 20.09 release: - - - - 2288 Mario Rodas - - - - - 1837 Frederik Rietdijk - - - - - 946 Jörg Thalheim - - - - - 925 Maximilian Bosch - - - - - 687 Jonathan Ringer - - - - - 651 Jan Tojnar - - - - - 622 Daniël de Kok - - - - - 605 WORLDofPEACE - - - - - 597 Florian Klink - - - - - 528 José Romildo Malaquias - - - - - - - Top contributors to stabilizing this release (Zero Hydra Failures period): - - - - 281 volth - - - - - 101 Robert Scott - - - - - 86 Tim Steinbach - - - - - 76 WORLDofPEACE - - - - - 49 Maximilian Bosch - - - - - 42 Thomas Tuegel - - - - - 37 Doron Behar - - - - - 36 Vladimír Čunát - - - - - 27 Jonathan Ringer - - - - - 27 Maciej Krüger - - - - - - I, Jonathan Ringer, would also like to personally thank @WORLDofPEACE for their help in mentoring me on the release process. Special thanks also goes to Thomas Tuegel for helping immensely with stabilizing Qt, KDE, and Plasma5; I would also like to thank Robert Scott for his numerous fixes and pull request reviews. - - -
-
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index e97aed4ccf2..f7578c8ddee 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -2,43 +2,34 @@ In addition to numerous new and upgraded packages, this release has the following highlights: -* Support is planned until the end of April 2022, handing over to 22.05. +- Support is planned until the end of April 2022, handing over to 22.05. ## Highlights {#sec-release-21.11-highlights} -* PHP now defaults to PHP 8.0, updated from 7.4. +- PHP now defaults to PHP 8.0, updated from 7.4. ## New Services {#sec-release-21.11-new-services} -* [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP - database updater from MaxMind. Available as - [services.geoipupdate](options.html#opt-services.geoipupdate.enable). +- [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP database updater from MaxMind. Available as [services.geoipupdate](options.html#opt-services.geoipupdate.enable). -* [sourcehut](https://sr.ht), a collection of tools useful for software - development. Available as - [services.sourcehut](options.html#opt-services.sourcehut.enable). +- [sourcehut](https://sr.ht), a collection of tools useful for software development. Available as [services.sourcehut](options.html#opt-services.sourcehut.enable). -* [ucarp](https://download.pureftpd.org/pub/ucarp/README), an userspace - implementation of the Common Address Redundancy Protocol (CARP). Available as - [networking.ucarp](options.html#opt-networking.ucarp.enable). +- [ucarp](https://download.pureftpd.org/pub/ucarp/README), an userspace implementation of the Common Address Redundancy Protocol (CARP). Available as [networking.ucarp](options.html#opt-networking.ucarp.enable). ## Backward Incompatibilities {#sec-release-21.11-incompatibilities} -* The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 +- The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 -* `services.geoip-updater` was broken and has been replaced by - [services.geoipupdate](options.html#opt-services.geoipupdate.enable). +- `services.geoip-updater` was broken and has been replaced by [services.geoipupdate](options.html#opt-services.geoipupdate.enable). -* PHP 7.3 is no longer supported due to upstream not supporting this - version for the entire lifecycle of the 21.11 release. +- PHP 7.3 is no longer supported due to upstream not supporting this version for the entire lifecycle of the 21.11 release. -* Those making use of `buildBazelPackage` will need to regenerate the fetch - hashes (preferred), or set `fetchConfigured = false;`. +- Those making use of `buildBazelPackage` will need to regenerate the fetch hashes (preferred), or set `fetchConfigured = false;`. -* fsharp41 has been removed in preference to use the latest dotnet-sdk +- fsharp41 has been removed in preference to use the latest dotnet-sdk + +- The following F#-related packages have been removed for being unmaintaned. Please use `fetchNuGet` for specific packages. -* The following F#-related packages have been removed for being unmaintaned. - Please use `fetchNuGet` for specific packages. - ExtCore - Fake - Fantomas @@ -68,10 +59,9 @@ In addition to numerous new and upgraded packages, this release has the followin - ExcelDnaRegistration - MathNetNumerics -* `programs.x2goserver` is now `services.x2goserver` +- `programs.x2goserver` is now `services.x2goserver` -* The following dotnet-related packages have been removed for being unmaintaned. - Please use `fetchNuGet` for specific packages. +- The following dotnet-related packages have been removed for being unmaintaned. Please use `fetchNuGet` for specific packages. - Autofac - SystemValueTuple - MicrosoftDiaSymReader -- cgit 1.4.1 From a48fea4c5e53bace66f1730877e7b16178e5f7ea Mon Sep 17 00:00:00 2001 From: Niklas Hambüchen Date: Sun, 11 Oct 2020 17:27:49 +0200 Subject: sshd service: Default to INFO logLevel (upstream default). The previous justification for using "VERBOSE" is incorrect, because OpenSSH does use level INFO to log "which key was used to log in" for sccessful logins, see: https://github.com/openssh/openssh-portable/blob/6247812c76f70b2245f3c23f5074665b3d436cae/auth.c#L323-L328 Also update description to the wording of the sshd_config man page. `fail2ban` needs, sshd to be "VERBOSE" to work well, thus the `fail2ban` module sets it to "VERBOSE" if enabled. The docs are updated accordingly. --- .../from_md/release-notes/rl-2111.section.xml | 23 ++++++++++++++++++++-- nixos/doc/manual/release-notes/rl-2111.section.md | 4 ++++ nixos/modules/services/networking/ssh/sshd.nix | 7 ++----- nixos/modules/services/security/fail2ban.nix | 19 +++++++++++++++++- 4 files changed, 45 insertions(+), 8 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 8a3c982fcb9..08b1d779e75 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -321,7 +321,26 @@
Other Notable Changes - - + + + + The setting + services.openssh.logLevel + "VERBOSE" + "INFO". This brings NixOS in line + with upstream and other Linux distributions, and reduces log + spam on servers due to bruteforcing botnets. + + + However, if + services.fail2ban.enable + is true, the fail2ban + will override the verbosity to + "VERBOSE", so that + fail2ban can observe the failed login + attempts from the SSH logs. + + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index f7578c8ddee..c19b46c5def 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -79,3 +79,7 @@ In addition to numerous new and upgraded packages, this release has the followin old 2.7.7 version. ## Other Notable Changes {#sec-release-21.11-notable-changes} + +- The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets. + + However, if [`services.fail2ban.enable`](options.html#opt-services.fail2ban.enable) is `true`, the `fail2ban` will override the verbosity to `"VERBOSE"`, so that `fail2ban` can observe the failed login attempts from the SSH logs. diff --git a/nixos/modules/services/networking/ssh/sshd.nix b/nixos/modules/services/networking/ssh/sshd.nix index 227dfe834b2..91caa2ccb42 100644 --- a/nixos/modules/services/networking/ssh/sshd.nix +++ b/nixos/modules/services/networking/ssh/sshd.nix @@ -351,15 +351,12 @@ in logLevel = mkOption { type = types.enum [ "QUIET" "FATAL" "ERROR" "INFO" "VERBOSE" "DEBUG" "DEBUG1" "DEBUG2" "DEBUG3" ]; - default = "VERBOSE"; + default = "INFO"; # upstream default description = '' Gives the verbosity level that is used when logging messages from sshd(8). The possible values are: - QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. The default is VERBOSE. DEBUG and DEBUG1 + QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3. The default is INFO. DEBUG and DEBUG1 are equivalent. DEBUG2 and DEBUG3 each specify higher levels of debugging output. Logging with a DEBUG level violates the privacy of users and is not recommended. - - LogLevel VERBOSE logs user's key fingerprint on login. - Needed to have a clear audit track of which key was used to log in. ''; }; diff --git a/nixos/modules/services/security/fail2ban.nix b/nixos/modules/services/security/fail2ban.nix index 07702bfb9d0..499d3466750 100644 --- a/nixos/modules/services/security/fail2ban.nix +++ b/nixos/modules/services/security/fail2ban.nix @@ -45,7 +45,12 @@ in enable = mkOption { default = false; type = types.bool; - description = "Whether to enable the fail2ban service."; + description = '' + Whether to enable the fail2ban service. + + See the documentation of + for what jails are enabled by default. + ''; }; package = mkOption { @@ -221,6 +226,15 @@ in defined in /etc/fail2ban/action.d, while filters are defined in /etc/fail2ban/filter.d. + + NixOS comes with a default sshd jail; + for it to work well, + should be set to + "VERBOSE" or higher so that fail2ban + can observe failed login attempts. + This module sets it to "VERBOSE" if + not set otherwise, so enabling fail2ban can make SSH logs + more verbose. ''; }; @@ -313,6 +327,9 @@ in banaction_allports = ${cfg.banaction-allports} ''; # Block SSH if there are too many failing connection attempts. + # Benefits from verbose sshd logging to observe failed login attempts, + # so we set that here unless the user overrode it. + services.openssh.logLevel = lib.mkDefault "VERBOSE"; services.fail2ban.jails.sshd = mkDefault '' enabled = true port = ${concatMapStringsSep "," (p: toString p) config.services.openssh.ports} -- cgit 1.4.1 From eb8a694d92332b62769e5b880a93b9ba96883e26 Mon Sep 17 00:00:00 2001 From: Michael Weiss Date: Wed, 23 Jun 2021 17:16:56 +0200 Subject: nixos/sway: Drop rxvt-unicode from the extraPackages default Upstream switched to Alacritty for the default configuration. --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 11 +++++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ nixos/modules/programs/sway.nix | 3 +-- 3 files changed, 14 insertions(+), 2 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 08b1d779e75..bb00cde0195 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -341,6 +341,17 @@ attempts from the SSH logs. + + + Sway: The terminal emulator rxvt-unicode is + no longer installed by default via + programs.sway.extraPackages. The current + default configuration uses alacritty (and + soon foot) so this is only an issue when + using a customized configuration and not installing + rxvt-unicode explicitly. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index c19b46c5def..e8a75151736 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -83,3 +83,5 @@ In addition to numerous new and upgraded packages, this release has the followin - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets. However, if [`services.fail2ban.enable`](options.html#opt-services.fail2ban.enable) is `true`, the `fail2ban` will override the verbosity to `"VERBOSE"`, so that `fail2ban` can observe the failed login attempts from the SSH logs. + +- Sway: The terminal emulator `rxvt-unicode` is no longer installed by default via `programs.sway.extraPackages`. The current default configuration uses `alacritty` (and soon `foot`) so this is only an issue when using a customized configuration and not installing `rxvt-unicode` explicitly. diff --git a/nixos/modules/programs/sway.nix b/nixos/modules/programs/sway.nix index 3c09d9f00fd..d5819a08e8f 100644 --- a/nixos/modules/programs/sway.nix +++ b/nixos/modules/programs/sway.nix @@ -91,10 +91,9 @@ in { type = with types; listOf package; default = with pkgs; [ swaylock swayidle alacritty dmenu - rxvt-unicode # For backward compatibility (old default terminal) ]; defaultText = literalExample '' - with pkgs; [ swaylock swayidle rxvt-unicode alacritty dmenu ]; + with pkgs; [ swaylock swayidle alacritty dmenu ]; ''; example = literalExample '' with pkgs; [ -- cgit 1.4.1 From 32c2dd304d5e1b2a48a0772f906d0cc86332992e Mon Sep 17 00:00:00 2001 From: David Arnold Date: Wed, 16 Jun 2021 15:02:47 -0500 Subject: docs: nixos release notes to CommonMark (2105) docs: nixos release notes (revise code blocks) docs: nixos release notes (fix opt links outside of code blocks) docs: nixos release notes (fix opt links inside of code blocks) went fishing with: ```console rg -A1 \ --multiline \ --multiline-dotall \ '[^]+' \ | rg linkend ``` docs: nixos release notes (prettier) docs: nixos release notes (restore admonition from prettier destriction) docs: nixos release notes (recreate xml files) docs: nixos release notes (fix code block indentation) docs: nixos release notes (diff after converting with https://github.com/NixOS/nixpkgs/pull/127270) --- .../from_md/release-notes/rl-2105.section.xml | 1565 ++++++++++++++++++++ nixos/doc/manual/release-notes/release-notes.xml | 2 +- nixos/doc/manual/release-notes/rl-2105.section.md | 428 ++++++ nixos/doc/manual/release-notes/rl-2105.xml | 1266 ---------------- 4 files changed, 1994 insertions(+), 1267 deletions(-) create mode 100644 nixos/doc/manual/from_md/release-notes/rl-2105.section.xml create mode 100644 nixos/doc/manual/release-notes/rl-2105.section.md (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml new file mode 100644 index 00000000000..e043bee7761 --- /dev/null +++ b/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml @@ -0,0 +1,1565 @@ +
+ Release 21.05 (<quote>Okapi</quote>, 2021.05/31) + + Support is planned until the end of December 2021, handing over to + 21.11. + +
+ Highlights + + In addition to numerous new and upgraded packages, this release + has the following highlights: + + + + + Core version changes: + + + + + gcc: 9.3.0 -> 10.3.0 + + + + + glibc: 2.30 -> 2.32 + + + + + default linux: 5.4 -> 5.10, all supported kernels + available + + + + + mesa: 20.1.7 -> 21.0.1 + + + + + + + Desktop Environments: + + + + + GNOME: 3.36 -> 40, see its + release + notes + + + + + Plasma5: 5.18.5 -> 5.21.3 + + + + + kdeApplications: 20.08.1 -> 20.12.3 + + + + + cinnamon: 4.6 -> 4.8.1 + + + + + + + Programming Languages and Frameworks: + + + + + Python optimizations were disabled again. Builds with + optimizations enabled are not reproducible. Optimizations + can now be enabled with an option. + + + + + + + The linux_latest kernel was updated to the 5.12 series. It + currently is not officially supported for use with the zfs + filesystem. If you use zfs, you should use a different kernel + version (either the LTS kernel, or track a specific one). + + + +
+
+ New Services + + The following new services were added since the last release: + + + + + GNURadio + 3.8 was + finally + packaged, along with a rewrite to the Nix expressions, + allowing users to override the features upstream supports + selecting to compile or not to. Additionally, the attribute + gnuradio and gnuradio3_7 + now point to an externally wrapped by default derivations, + that allow you to also add `extraPythonPackages` to the Python + interpreter used by GNURadio. Missing environmental variables + needed for operational GUI were also added + (#75478). + + + + + Keycloak, + an open source identity and access management server with + support for + OpenID + Connect, OAUTH + 2.0 and + SAML + 2.0. + + + See the Keycloak + section of the NixOS manual for more information. + + + + + services.samba-wsdd.enable + Web Services Dynamic Discovery host daemon + + + + + Discourse, + a modern and open source discussion platform. + + + See the Discourse + section of the NixOS manual for more information. + + + + + services.nebula.networks + Nebula + VPN + + + +
+
+ Backward Incompatibilities + + When upgrading from a previous release, please be aware of the + following incompatible changes: + + + + + GNOME desktop environment was upgraded to 40, see the release + notes for + 40.0 + and + 3.38. + The gnome3 attribute set has been renamed + to gnome and so have been the NixOS + options. + + + + + If you are using services.udev.extraRules + to assign custom names to network interfaces, this may stop + working due to a change in the initialisation of dhcpcd and + systemd networkd. To avoid this, either move them to + services.udev.initrdRules or see the new + Assigning custom + names section of the NixOS manual for an example using + networkd links. + + + + + The security.hideProcessInformation module + has been removed. It was broken since the switch to + cgroups-v2. + + + + + The linuxPackages.ati_drivers_x11 kernel + modules have been removed. The drivers only supported kernels + prior to 4.2, and thus have become obsolete. + + + + + The systemConfig kernel parameter is no + longer added to boot loader entries. It has been unused since + September 2010, but if do have a system generation from that + era, you will now be unable to boot into them. + + + + + systemd-journal2gelf no longer parses json + and expects the receiving system to handle it. How to achieve + this with Graylog is described in this + GitHub + issue. + + + + + If the services.dbus module is enabled, + then the user D-Bus session is now always socket activated. + The associated options + services.dbus.socketActivated and + services.xserver.startDbusSession have + therefore been removed and you will receive a warning if they + are present in your configuration. This change makes the user + D-Bus session available also for non-graphical logins. + + + + + The networking.wireless.iwd module now + installs the upstream-provided 80-iwd.link file, which sets + the NamePolicy= for all wlan devices to "keep + kernel", to avoid race conditions between iwd and + networkd. If you don't want this, you can set + systemd.network.links."80-iwd" = lib.mkForce {}. + + + + + rubyMinimal was removed due to being unused + and unusable. The default ruby interpreter includes JIT + support, which makes it reference it's compiler. Since JIT + support is probably needed by some Gems, it was decided to + enable this feature with all cc references by default, and + allow to build a Ruby derivation without references to cc, by + setting jitSupport = false; in an overlay. + See + #90151 + for more info. + + + + + Setting + services.openssh.authorizedKeysFiles now + also affects which keys + security.pam.enableSSHAgentAuth will use. + WARNING: If you are using these options in combination do make + sure that any key paths you use are present in + services.openssh.authorizedKeysFiles! + + + + + The option fonts.enableFontDir has been + renamed to + fonts.fontDir.enable. + The path of font directory has also been changed to + /run/current-system/sw/share/X11/fonts, for + consistency with other X11 resources. + + + + + A number of options have been renamed in the kicad interface. + oceSupport has been renamed to + withOCE, withOCCT has + been renamed to withOCC, + ngspiceSupport has been renamed to + withNgspice, and + scriptingSupport has been renamed to + withScripting. Additionally, + kicad/base.nix no longer provides default + argument values since these are provided by + kicad/default.nix. + + + + + The socket for the pdns-recursor module was + moved from /var/lib/pdns-recursor to + /run/pdns-recursor to match upstream. + + + + + Paperwork was updated to version 2. The on-disk format + slightly changed, and it is not possible to downgrade from + Paperwork 2 back to Paperwork 1.3. Back your documents up + before upgrading. See + this + thread for more details. + + + + + PowerDNS has been updated from 4.2.x to + 4.3.x. Please be sure to review the + Upgrade + Notes provided by upstream before upgrading. Worth + specifically noting is that the service now runs entirely as a + dedicated pdns user, instead of starting as + root and dropping privileges, as well as + the default socket-dir location changing + from /var/lib/powerdns to + /run/pdns. + + + + + The mediatomb service is now using by + default the new and maintained fork gerbera + package instead of the unmaintained + mediatomb package. If you want to keep the + old behavior, you must declare it with: + + +{ + services.mediatomb.package = pkgs.mediatomb; +} + + + One new option openFirewall has been + introduced which defaults to false. If you relied on the + service declaration to add the firewall rules itself before, + you should now declare it with: + + +{ + services.mediatomb.openFirewall = true; +} + + + + + xfsprogs was update from 4.19 to 5.11. It now enables reflink + support by default on filesystem creation. Support for + reflinks was added with an experimental status to kernel 4.9 + and deemed stable in kernel 4.16. If you want to be able to + mount XFS filesystems created with this release of xfsprogs on + kernel releases older than those, you need to format them with + mkfs.xfs -m reflink=0. + + + + + The uWSGI server is now built with POSIX capabilities. As a + consequence, root is no longer required in emperor mode and + the service defaults to running as the unprivileged + uwsgi user. Any additional capability can + be added via the new option + services.uwsgi.capabilities. + The previous behaviour can be restored by setting: + + +{ + services.uwsgi.user = "root"; + services.uwsgi.group = "root"; + services.uwsgi.instance = + { + uid = "uwsgi"; + gid = "uwsgi"; + }; +} + + + Another incompatibility from the previous release is that + vassals running under a different user or group need to use + immediate-{uid,gid} instead of the usual + uid,gid options. + + + + + btc1 has been abandoned upstream, and removed. + + + + + cpp_ethereum (aleth) has been abandoned upstream, and removed. + + + + + riak-cs package removed along with + services.riak-cs module. + + + + + stanchion package removed along with + services.stanchion module. + + + + + mutt has been updated to a new major version (2.x), which + comes with some backward incompatible changes that are + described in the + release + notes for Mutt 2.0. + + + + + vim and neovim switched + to Python 3, dropping all Python 2 support. + + + + + networking.wireguard.interfaces.<name>.generatePrivateKeyFile, + which is off by default, had a chmod race + condition fixed. As an aside, the parent directory's + permissions were widened, and the key files were made + owner-writable. This only affects newly created keys. However, + if the exact permissions are important for your setup, read + #121294. + + + + + boot.zfs.forceImportAll + previously did nothing, but has been fixed. However its + default has been changed to false to + preserve the existing default behaviour. If you have this + explicitly set to true, please note that + your non-root pools will now be forcibly imported. + + + + + openafs now points to openafs_1_8, which is the new stable + release. OpenAFS 1.6 was removed. + + + + + The WireGuard module gained a new option + networking.wireguard.interfaces.<name>.peers.*.dynamicEndpointRefreshSeconds + that implements refreshing the IP of DNS-based endpoints + periodically (which WireGuard itself + cannot + do). + + + + + MariaDB has been updated to 10.5. Before you upgrade, it would + be best to take a backup of your database and read + + Incompatible Changes Between 10.4 and 10.5. After the + upgrade you will need to run mysql_upgrade. + + + + + The TokuDB storage engine dropped in mariadb 10.5 and removed + in mariadb 10.6. It is recommended to switch to RocksDB. See + also + TokuDB + and + MDEV-19780: + Remove the TokuDB storage engine. + + + + + The openldap module now has support for + OLC-style configuration, users of the + configDir option may wish to migrate. If + you continue to use configDir, ensure that + olcPidFile is set to + /run/slapd/slapd.pid. + + + As a result, extraConfig and + extraDatabaseConfig are removed. To help + with migration, you can convert your + slapd.conf file to OLC configuration with + the following script (find the location of this configuration + file by running systemctl status openldap, + it is the -f option. + + +$ TMPDIR=$(mktemp -d) +$ slaptest -f /path/to/slapd.conf -F $TMPDIR +$ slapcat -F $TMPDIR -n0 -H 'ldap:///???(!(objectClass=olcSchemaConfig))' + + + This will dump your current configuration in LDIF format, + which should be straightforward to convert into Nix settings. + This does not show your schema configuration, as this is + unnecessarily verbose for users of the default schemas and + slaptest is buggy with schemas directly in + the config file. + + + + + Amazon EC2 and OpenStack Compute (nova) images now re-fetch + instance meta data and user data from the instance metadata + service (IMDS) on each boot. For example: stopping an EC2 + instance, changing its user data, and restarting the instance + will now cause it to fetch and apply the new user data. + + + + Specifically, /etc/ec2-metadata is + re-populated on each boot. Some NixOS scripts that read from + this directory are guarded to only run if the files they + want to manipulate do not already exist, and so will not + re-apply their changes if the IMDS response changes. + Examples: root's SSH key is only added if + /root/.ssh/authorized_keys does not + exist, and SSH host keys are only set from user data if they + do not exist in /etc/ssh. + + + + + + The rspamd services is now sandboxed. It is + run as a dynamic user instead of root, so secrets and other + files may have to be moved or their permissions may have to be + fixed. The sockets are now located in + /run/rspamd instead of + /run. + + + + + Enabling the Tor client no longer silently also enables and + configures Privoxy, and the + services.tor.client.privoxy.enable option + has been removed. To enable Privoxy, and to configure it to + use Tor's faster port, use the following configuration: + + +{ + opt-services.privoxy.enable = true; + opt-services.privoxy.enableTor = true; +} + + + + + The services.tor module has a new + exhaustively typed + services.tor.settings + option following RFC 0042; backward compatibility with old + options has been preserved when aliasing was possible. The + corresponding systemd service has been hardened, but there is + a chance that the service still requires more permissions, so + please report any related trouble on the bugtracker. Onion + services v3 are now supported in + services.tor.relay.onionServices. + A new + services.tor.openFirewall + option as been introduced for allowing connections on all the + TCP ports configured. + + + + + The options + services.slurm.dbdserver.storagePass and + services.slurm.dbdserver.configFile have + been removed. Use + services.slurm.dbdserver.storagePassFile + instead to provide the database password. Extra config options + can be given via the option + services.slurm.dbdserver.extraConfig. The + actual configuration file is created on the fly on startup of + the service. This avoids that the password gets exposed in the + nix store. + + + + + The wafHook hook does not wrap Python + anymore. Packages depending on wafHook need + to include any Python into their + nativeBuildInputs. + + + + + Starting with version 1.7.0, the project formerly named + CodiMD is now named + HedgeDoc. New installations will no longer + use the old name for users, state directories and such, this + needs to be considered when moving state to a more recent + NixOS installation. Based on + system.stateVersion, + existing installations will continue to work. + + + + + The fish-foreign-env package has been replaced with + fishPlugins.foreign-env, in which the fish functions have been + relocated to the vendor_functions.d + directory to be loaded automatically. + + + + + The prometheus json exporter is now managed by the prometheus + community. Together with additional features some backwards + incompatibilities were introduced. Most importantly the + exporter no longer accepts a fixed command-line parameter to + specify the URL of the endpoint serving JSON. It now expects + this URL to be passed as an URL parameter, when scraping the + exporter's /probe endpoint. In the + prometheus scrape configuration the scrape target might look + like this: + + +http://some.json-exporter.host:7979/probe?target=https://example.com/some/json/endpoint + + + Existing configuration for the exporter needs to be updated, + but can partially be re-used. Documentation is available in + the upstream repository and a small example for NixOS is + available in the corresponding NixOS test. + + + These changes also affect + services.prometheus.exporters.rspamd.enable, + which is just a preconfigured instance of the json exporter. + + + For more information, take a look at the + + official documentation of the json_exporter. + + + + + Androidenv was updated, removing the + includeDocs and + lldbVersions arguments. Docs only covered a + single version of the Android SDK, LLDB is now bundled with + the NDK, and both are no longer available to download from the + Android package repositories. Additionally, since the package + lists have been updated, some older versions of Android + packages may not be bundled. If you depend on older versions + of Android packages, we recommend overriding the repo. + + + Android packages are now loaded from a repo.json file created + by parsing Android repo XML files. The arguments + repoJson and repoXmls + have been added to allow overriding the built-in androidenv + repo.json with your own. Additionally, license files are now + written to allow compatibility with Gradle-based tools, and + the extraLicenses argument has been added + to accept more SDK licenses if your project requires it. See + the androidenv documentation for more details. + + + + + The attribute mpi is now consistently used + to provide a default, system-wide MPI implementation. The + default implementation is openmpi, which has been used before + by all derivations affects by this change. Note that all + packages that have used mpi ? null in the + input for optional MPI builds, have been changed to the + boolean input paramater useMpi to enable + building with MPI. Building all packages with + mpich instead of the default + openmpi can now be achived like this: + + +self: super: +{ + mpi = super.mpich; +} + + + + + The Searx module has been updated with the ability to + configure the service declaratively and uWSGI integration. The + option services.searx.configFile has been + renamed to + services.searx.settingsFile + for consistency with the new + services.searx.settings. + In addition, the searx uid and gid + reservations have been removed since they were not necessary: + the service is now running with a dynamically allocated uid. + + + + + The libinput module has been updated with the ability to + configure mouse and touchpad settings separately. The options + in services.xserver.libinput have been + renamed to + services.xserver.libinput.touchpad, while + there is a new + services.xserver.libinput.mouse for mouse + related configuration. + + + Since touchpad options no longer apply to all devices, you may + want to replicate your touchpad configuration in mouse + section. + + + + + ALSA OSS emulation + (sound.enableOSSEmulation) is now disabled + by default. + + + + + Thinkfan as been updated to 1.2.x, which + comes with a new YAML based configuration format. For this + reason, several NixOS options of the thinkfan module have been + changed to non-backward compatible types. In addition, a new + services.thinkfan.settings + option has been added. + + + Please read the + + thinkfan documentation before updating. + + + + + Adobe Flash Player support has been dropped from the tree. In + particular, the following packages no longer support it: + + + + + chromium + + + + + firefox + + + + + qt48 + + + + + qt5.qtwebkit + + + + + Additionally, packages flashplayer and hal-flash were removed + along with the services.flashpolicyd + module. + + + + + The security.rngd module has been removed. + It was disabled by default in 20.09 as it was functionally + redundant with krngd in the linux kernel. It is not necessary + for any device that the kernel recognises as an hardware RNG, + as it will automatically run the krngd task to periodically + collect random data from the device and mix it into the + kernel's RNG. + + + The default SMTP port for GitLab has been changed to + 25 from its previous default of + 465. If you depended on this default, you + should now set the + services.gitlab.smtp.port + option. + + + + + The default version of ImageMagick has been updated from 6 to + 7. You can use imagemagick6, imagemagick6_light, and + imagemagick6Big if you need the older version. + + + + + services.xserver.videoDrivers + no longer uses the deprecated cirrus and + vesa device dependent X drivers by default. + It also enables both amdgpu and + nouveau drivers by default now. + + + + + The kindlegen package is gone, because it + is no longer supported or hosted by Amazon. Sadly, its + replacement, Kindle Previewer, has no Linux support. However, + there are other ways to generate MOBI files. See + the + discussion for more info. + + + + + The apacheKafka packages are now built with version-matched + JREs. Versions 2.6 and above, the ones that recommend it, use + jdk11, while versions below remain on jdk8. The NixOS service + has been adjusted to start the service using the same version + as the package, adjustable with the new + services.apache-kafka.jre + option. Furthermore, the default list of + services.apache-kafka.jvmOptions + have been removed. You should set your own according to the + upstream + documentation for your Kafka version. + + + + + The kodi package has been modified to allow concise addon + management. Consider the following configuration from previous + releases of NixOS to install kodi, including the + kodiPackages.inputstream-adaptive and kodiPackages.vfs-sftp + addons: + + +{ + environment.systemPackages = [ + pkgs.kodi + ]; + + nixpkgs.config.kodi = { + enableInputStreamAdaptive = true; + enableVFSSFTP = true; + }; +} + + + All Kodi config flags have been removed, + and as a result the above configuration should now be written + as: + + +{ + environment.systemPackages = [ + (pkgs.kodi.withPackages (p: with p; [ + inputstream-adaptive + vfs-sftp + ])) + ]; +} + + + + + environment.defaultPackages now includes + the nano package. If pkgs.nano is not added to the list, make + sure another editor is installed and the + EDITOR environment variable is set to it. + Environment variables can be set using + environment.variables. + + + + + services.minio.dataDir changed type to a + list of paths, required for specifiyng multiple data + directories for using with erasure coding. Currently, the + service doesn't enforce nor checks the correct number of paths + to correspond to minio requirements. + + + + + All CUDA toolkit versions prior to CUDA 10 have been removed. + + + + + The kbdKeymaps package was removed since dvp and neo are now + included in kbd. If you want to use the Programmer Dvorak + Keyboard Layout, you have to use + dvorak-programmer in + console.keyMap now instead of + dvp. In + services.xserver.xkbVariant it's still + dvp. + + + + + The babeld service is now being run as an unprivileged user. + To achieve that the module configures + skip-kernel-setup true and takes care of + setting forwarding and rp_filter sysctls by itself as well as + for each interface in + services.babeld.interfaces. + + + + + The services.zigbee2mqtt.config option has + been renamed to + services.zigbee2mqtt.settings and now + follows + RFC + 0042. + + + + + The yadm dotfile manager has been updated from 2.x to 3.x, which + has new (XDG) default locations for some data/state files. Most + yadm commands will fail and print a legacy path warning (which + describes how to upgrade/migrate your repository). If you have + scripts, daemons, scheduled jobs, shell profiles, etc. that invoke + yadm, expect them to fail or misbehave until you perform this + migration and prepare accordingly. + + + + + Instead of determining + services.radicale.package automatically + based on system.stateVersion, the latest + version is always used because old versions are not officially + supported. + + + Furthermore, Radicale's systemd unit was hardened which might + break some deployments. In particular, a non-default + filesystem_folder has to be added to + systemd.services.radicale.serviceConfig.ReadWritePaths + if the deprecated services.radicale.config + is used. + + + + + In the security.acme module, use of + --reuse-key parameter for Lego has been + removed. It was introduced for HKPK, but this security feature + is now deprecated. It is a better security practice to rotate + key pairs instead of always keeping the same. If you need to + keep this parameter, you can add it back using + extraLegoRenewFlags as an option for the + appropriate certificate. + + + +
+
+ Other Notable Changes + + + + stdenv.lib has been deprecated and will + break eval in 21.11. Please use pkgs.lib + instead. See + #108938 + for details. + + + + + GNURadio + has a pkgs attribute set, and there's a + gnuradio.callPackage function that extends + pkgs with a + mkDerivation, and a + mkDerivationWith, like Qt5. Now all + gnuradio.pkgs are defined with + gnuradio.callPackage and some packages that + depend on gnuradio are defined with this as well. + + + + + Privoxy has + been updated to version 3.0.32 (See + announcement). + Compared to the previous release, Privoxy has gained support + for HTTPS inspection (still experimental), Brotli + decompression, several new filters and lots of bug fixes, + including security ones. In addition, the package is now built + with compression and external filters support, which were + previously disabled. + + + Regarding the NixOS module, new options for HTTPS inspection + have been added and + services.privoxy.extraConfig has been + replaced by the new + services.privoxy.settings + (See + RFC + 0042 for the motivation). + + + + + Kodi has been + updated to version 19.1 "Matrix". See the + announcement + for further details. + + + + + The services.packagekit.backend option has + been removed as it only supported a single setting which would + always be the default. Instead new + RFC + 0042 compliant + services.packagekit.settings + and + services.packagekit.vendorSettings + options have been introduced. + + + + + Nginx has been + updated to stable version 1.20.0. Now nginx uses the zlib-ng + library by default. + + + + + KDE Gear (formerly KDE Applications) is upgraded to 21.04, see + its + release + notes for details. + + + The kdeApplications package set is now + kdeGear, in keeping with the new name. The + old name remains for compatibility, but it is deprecated. + + + + + Libreswan has + been updated to version 4.4. The package now includes example + configurations and manual pages by default. The NixOS module + has been changed to use the upstream systemd units and write + the configuration in the /etc/ipsec.d/ + directory. In addition, two new options have been added to + specify connection policies + (services.libreswan.policies) + and disable send/receive redirects + (services.libreswan.disableRedirects). + + + + + The Mailman NixOS module (services.mailman) + has a new option + services.mailman.enablePostfix, + defaulting to true, that controls integration with Postfix. + + + If this option is disabled, default MTA config becomes not set + and you should set the options in + services.mailman.settings.mta according to + the desired configuration as described in + Mailman + documentation. + + + + + The default-version of nextcloud is + nextcloud21. Please note that it's not + possible to upgrade nextcloud across + multiple major versions! This means that it's e.g. not + possible to upgrade from nextcloud18 to nextcloud20 in a + single deploy and most 20.09 users will + have to upgrade to nextcloud20 first. + + + The package can be manually upgraded by setting + services.nextcloud.package + to nextcloud21. + + + + + The setting + services.redis.bind + defaults to 127.0.0.1 now, making Redis + listen on the loopback interface only, and not all public + network interfaces. + + + + + NixOS now emits a deprecation warning if systemd's + StartLimitInterval setting is used in a + serviceConfig section instead of in a + unitConfig; that setting is deprecated and + now undocumented for the service section by systemd upstream, + but still effective and somewhat buggy there, which can be + confusing. See + #45785 + for details. + + + All services should use + systemd.services.name.startLimitIntervalSec + or StartLimitIntervalSec in + systemd.services.name.unitConfig + instead. + + + + + The mediatomb service declares new options. + It also adapts existing options so the configuration + generation is now lazy. The existing option + customCfg (defaults to false), when + enabled, stops the service configuration generation + completely. It then expects the users to provide their own + correct configuration at the right location (whereas the + configuration was generated and not used at all before). The + new option transcodingOption (defaults to + no) allows a generated configuration. It makes the mediatomb + service pulls the necessary runtime dependencies in the nix + store (whereas it was generated with hardcoded values before). + The new option mediaDirectories allows the + users to declare autoscan media directories from their nixos + configuration: + + +{ + services.mediatomb.mediaDirectories = [ + { path = "/var/lib/mediatomb/pictures"; recursive = false; hidden-files = false; } + { path = "/var/lib/mediatomb/audio"; recursive = true; hidden-files = false; } + ]; +} + + + + + The Unbound DNS resolver service + (services.unbound) has been refactored to + allow reloading, control sockets and to fix startup ordering + issues. + + + It is now possible to enable a local UNIX control socket for + unbound by setting the + services.unbound.localControlSocketPath + option. + + + Previously we just applied a very minimal set of restrictions + and trusted unbound to properly drop root privs and + capabilities. + + + As of this we are (for the most part) just using the upstream + example unit file for unbound. The main difference is that we + start unbound as unbound user with the + required capabilities instead of letting unbound do the chroot + & uid/gid changes. + + + The upstream unit configuration this is based on is a lot + stricter with all kinds of permissions then our previous + variant. It also came with the default of having the + Type set to notify, + therefore we are now also using the + unbound-with-systemd package here. Unbound + will start up, read the configuration files and start + listening on the configured ports before systemd will declare + the unit active (running). This will likely + help with startup order and the occasional race condition + during system activation where the DNS service is started but + not yet ready to answer queries. Services depending on + nss-lookup.target or + unbound.service are now be able to use + unbound when those targets have been reached. + + + Additionally to the much stricter runtime environment the + /dev/urandom mount lines we previously had + in the code (that randomly failed during the stop-phase) have + been removed as systemd will take care of those for us. + + + The preStart script is now only required if + we enabled the trust anchor updates (which are still enabled + by default). + + + Another benefit of the refactoring is that we can now issue + reloads via either pkill -HUP unbound and + systemctl reload unbound to reload the + running configuration without taking the daemon offline. A + prerequisite of this was that unbound configuration is + available on a well known path on the file system. We are + using the path /etc/unbound/unbound.conf as + that is the default in the CLI tooling which in turn enables + us to use unbound-control without passing a + custom configuration location. + + + The module has also been reworked to be + RFC + 0042 compliant. As such, + sevices.unbound.extraConfig has been + removed and replaced by + services.unbound.settings. + services.unbound.interfaces has been + renamed to + services.unbound.settings.server.interface. + + + services.unbound.forwardAddresses and + services.unbound.allowedAccess have also + been changed to use the new settings interface. You can follow + the instructions when executing + nixos-rebuild to upgrade your configuration + to use the new interface. + + + + + The services.dnscrypt-proxy2 module now + takes the upstream's example configuration and updates it with + the user's settings. An option has been added to restore the + old behaviour if you prefer to declare the configuration from + scratch. + + + + + NixOS now defaults to the unified cgroup hierarchy + (cgroupsv2). See the + Fedora + Article for 31 for details on why this is desirable, + and how it impacts containers. + + + If you want to run containers with a runtime that does not yet + support cgroupsv2, you can switch back to the old behaviour by + setting + systemd.enableUnifiedCgroupHierarchy + = false; and rebooting. + + + + + PulseAudio was upgraded to 14.0, with changes to the handling + of default sinks. See its + release + notes. + + + + + GNOME users may wish to delete their + ~/.config/pulse due to the changes to + stream routing logic. See + PulseAudio + bug 832 for more information. + + + + + The zookeeper package does not provide + zooInspector.sh anymore, as that + "contrib" has been dropped from upstream releases. + + + + + In the ACME module, the data used to build the hash for the + account directory has changed to accomodate new features to + reduce account rate limit issues. This will trigger new + account creation on the first rebuild following this update. + No issues are expected to arise from this, thanks to the new + account creation handling. + + + + + users.users.name.createHome + now always ensures home directory permissions to be + 0700. Permissions had previously been + ignored for already existing home directories, possibly + leaving them readable by others. The option's description was + incorrect regarding ownership management and has been + simplified greatly. + + + + + When defining a new user, one of + users.users.name.isNormalUser + and + users.users.name.isSystemUser + is now required. This is to prevent accidentally giving a UID + above 1000 to system users, which could have unexpected + consequences, like running user activation scripts for system + users. Note that users defined with an explicit UID below 500 + are exempted from this check, as + users.users.name.isSystemUser + has no effect for those. + + + + + The security.apparmor module, for the + AppArmor + Mandatory Access Control system, has been substantialy + improved along with related tools, so that module maintainers + can now more easily write AppArmor profiles for NixOS. The + most notable change on the user-side is the new option + security.apparmor.policies, + replacing the previous profiles option to + provide a way to disable a profile and to select whether to + confine in enforce mode (default) or in complain mode (see + journalctl -b --grep apparmor). + Security-minded users may also want to enable + security.apparmor.killUnconfinedConfinables, + at the cost of having some of their processes killed when + updating to a NixOS version introducing new AppArmor profiles. + + + + + The GNOME desktop manager once again installs gnome.epiphany + by default. + + + + + NixOS now generates empty /etc/netgroup. + /etc/netgroup defines network-wide groups + and may affect to setups using NIS. + + + + + Platforms, like stdenv.hostPlatform, no + longer have a platform attribute. It has + been (mostly) flattened away: + + + + + platform.gcc is now + gcc + + + + + platform.kernel* is now + linux-kernel.* + + + + + Additionally, platform.kernelArch moved to + the top level as linuxArch to match the + other *Arch variables. + + + The platform grouping of these things never + meant anything, and was just a historial/implementation + artifact that was overdue removal. + + + + + services.restic now uses a dedicated cache + directory for every backup defined in + services.restic.backups. The old global + cache directory, /root/.cache/restic, is + now unused and can be removed to free up disk space. + + + + + isync: The isync + compatibility wrapper was removed and the Master/Slave + terminology has been deprecated and should be replaced with + Far/Near in the configuration file. + + + + + The nix-gc service now accepts randomizedDelaySec (default: 0) + and persistent (default: true) parameters. By default nix-gc + will now run immediately if it would have been triggered at + least once during the time when the timer was inactive. + + + + + The rustPlatform.buildRustPackage function + is split into several hooks: cargoSetupHook to set up + vendoring for Cargo-based projects, cargoBuildHook to build a + project using Cargo, cargoInstallHook to install a project + using Cargo, and cargoCheckHook to run tests in Cargo-based + projects. With this change, mixed-language projects can use + the relevant hooks within builders other than + buildRustPackage. However, these changes + also required several API changes to + buildRustPackage itself: + + + + + The target argument was removed. + Instead, buildRustPackage will always + use the same target as the C/C++ compiler that is used. + + + + + The cargoParallelTestThreads argument + was removed. Parallel tests are now disabled through + dontUseCargoParallelTests. + + + + + + + The rustPlatform.maturinBuildHook hook was + added. This hook can be used with + buildPythonPackage to build Python packages + that are written in Rust and use Maturin as their build tool. + + + + + Kubernetes has + deprecated + docker as container runtime. As a consequence, the + Kubernetes module now has support for configuration of custom + remote container runtimes and enables containerd by default. + Note that containerd is more strict regarding container image + OCI-compliance. As an example, images with CMD or ENTRYPOINT + defined as strings (not lists) will fail on containerd, while + working fine on docker. Please test your setup and container + images with containerd prior to upgrading. + + + + + The GitLab module now has support for automatic backups. A + schedule can be set with the + services.gitlab.backup.startAt + option. + + + + + Prior to this release, systemd would also read system units + from an undocumented + /etc/systemd-mutable/system path. This path + has been dropped from the defaults. That path (or others) can + be re-enabled by adding it to the + boot.extraSystemdUnitPaths + list. + + + + + PostgreSQL 9.5 is scheduled EOL during the 21.05 life cycle + and has been removed. + + + + + Xfce4 relies + on GIO/GVfs for userspace virtual filesystem access in + applications like + thunar + and + gigolo. + For that to work, the gvfs nixos service is enabled by + default, and it can be configured with the specific package + that provides GVfs. Until now Xfce4 was setting it to use a + lighter version of GVfs (without support for samba). To avoid + conflicts with other desktop environments this setting has + been dropped. Users that still want it should add the + following to their system configuration: + + +{ + services.gvfs.package = pkgs.gvfs.override { samba = null; }; +} + + + + + The newly enabled systemd-pstore.service + now automatically evacuates crashdumps and panic logs from the + persistent storage to + /var/lib/systemd/pstore. This prevents + NVRAM from filling up, which ensures the latest diagnostic + data is always stored and alleviates problems with writing new + boot configurations. + + + + + Nixpkgs now contains + automatically + packaged GNOME Shell extensions from the + GNOME + Extensions portal. You can find them, filed by their + UUID, under gnome38Extensions attribute for + GNOME 3.38 and under gnome40Extensions for + GNOME 40. Finally, the gnomeExtensions + attribute contains extensions for the latest GNOME Shell + version in Nixpkgs, listed under a more human-friendly name. + The unqualified attribute scope also contains manually + packaged extensions. Note that the automatically packaged + extensions are provided for convenience and are not checked or + guaranteed to work. + + + + + Erlang/OTP versions older than R21 got dropped. We also + dropped the cuter package, as it was purely an example of how + to build a package. We also dropped lfe_1_2 + as it could not build with R21+. Moving forward, we expect to + only support 3 yearly releases of OTP. + + + +
+
diff --git a/nixos/doc/manual/release-notes/release-notes.xml b/nixos/doc/manual/release-notes/release-notes.xml index c6fff3c30d5..74ca57850ea 100644 --- a/nixos/doc/manual/release-notes/release-notes.xml +++ b/nixos/doc/manual/release-notes/release-notes.xml @@ -9,7 +9,7 @@ current unstable revision. - + diff --git a/nixos/doc/manual/release-notes/rl-2105.section.md b/nixos/doc/manual/release-notes/rl-2105.section.md new file mode 100644 index 00000000000..e4565b8ca60 --- /dev/null +++ b/nixos/doc/manual/release-notes/rl-2105.section.md @@ -0,0 +1,428 @@ +# Release 21.05 ("Okapi", 2021.05/31) {#sec-release-21.05} + +Support is planned until the end of December 2021, handing over to 21.11. + +## Highlights {#sec-release-21.05-highlights} + +In addition to numerous new and upgraded packages, this release has the following highlights: + +- Core version changes: + + - gcc: 9.3.0 -\> 10.3.0 + + - glibc: 2.30 -\> 2.32 + + - default linux: 5.4 -\> 5.10, all supported kernels available + + - mesa: 20.1.7 -\> 21.0.1 + +- Desktop Environments: + + - GNOME: 3.36 -\> 40, see its [release notes](https://help.gnome.org/misc/release-notes/40.0/) + + - Plasma5: 5.18.5 -\> 5.21.3 + + - kdeApplications: 20.08.1 -\> 20.12.3 + + - cinnamon: 4.6 -\> 4.8.1 + +- Programming Languages and Frameworks: + + - Python optimizations were disabled again. Builds with optimizations enabled are not reproducible. Optimizations can now be enabled with an option. + +- The linux_latest kernel was updated to the 5.12 series. It currently is not officially supported for use with the zfs filesystem. If you use zfs, you should use a different kernel version (either the LTS kernel, or track a specific one). + +## New Services {#sec-release-21.05-new-services} + +The following new services were added since the last release: + +- [GNURadio](https://www.gnuradio.org/) 3.8 was [finally](https://github.com/NixOS/nixpkgs/issues/82263) packaged, along with a rewrite to the Nix expressions, allowing users to override the features upstream supports selecting to compile or not to. Additionally, the attribute `gnuradio` and `gnuradio3_7` now point to an externally wrapped by default derivations, that allow you to also add \`extraPythonPackages\` to the Python interpreter used by GNURadio. Missing environmental variables needed for operational GUI were also added ([\#75478](https://github.com/NixOS/nixpkgs/issues/75478)). + +- [Keycloak](https://www.keycloak.org/), an open source identity and access management server with support for [OpenID Connect](https://openid.net/connect/), [OAUTH 2.0](https://oauth.net/2/) and [SAML 2.0](https://en.wikipedia.org/wiki/SAML_2.0). + + See the [Keycloak section of the NixOS manual](#module-services-keycloak) for more information. + +- [services.samba-wsdd.enable](options.html#opt-services.samba-wsdd.enable) Web Services Dynamic Discovery host daemon + +- [Discourse](https://www.discourse.org/), a modern and open source discussion platform. + + See the [Discourse section of the NixOS manual](#module-services-discourse) for more information. + +- [services.nebula.networks](options.html#opt-services.nebula.networks) [Nebula VPN](https://github.com/slackhq/nebula) + +## Backward Incompatibilities {#sec-release-21.05-incompatibilities} + +When upgrading from a previous release, please be aware of the following incompatible changes: + +- GNOME desktop environment was upgraded to 40, see the release notes for [40.0](https://help.gnome.org/misc/release-notes/40.0/) and [3.38](https://help.gnome.org/misc/release-notes/3.38/). The `gnome3` attribute set has been renamed to `gnome` and so have been the NixOS options. + +- If you are using `services.udev.extraRules` to assign custom names to network interfaces, this may stop working due to a change in the initialisation of dhcpcd and systemd networkd. To avoid this, either move them to `services.udev.initrdRules` or see the new [Assigning custom names](#sec-custom-ifnames) section of the NixOS manual for an example using networkd links. + +- The `security.hideProcessInformation` module has been removed. It was broken since the switch to cgroups-v2. + +- The `linuxPackages.ati_drivers_x11` kernel modules have been removed. The drivers only supported kernels prior to 4.2, and thus have become obsolete. + +- The `systemConfig` kernel parameter is no longer added to boot loader entries. It has been unused since September 2010, but if do have a system generation from that era, you will now be unable to boot into them. + +- `systemd-journal2gelf` no longer parses json and expects the receiving system to handle it. How to achieve this with Graylog is described in this [GitHub issue](https://github.com/parse-nl/SystemdJournal2Gelf/issues/10). + +- If the `services.dbus` module is enabled, then the user D-Bus session is now always socket activated. The associated options `services.dbus.socketActivated` and `services.xserver.startDbusSession` have therefore been removed and you will receive a warning if they are present in your configuration. This change makes the user D-Bus session available also for non-graphical logins. + +- The `networking.wireless.iwd` module now installs the upstream-provided 80-iwd.link file, which sets the NamePolicy= for all wlan devices to \"keep kernel\", to avoid race conditions between iwd and networkd. If you don\'t want this, you can set `systemd.network.links."80-iwd" = lib.mkForce {}`. + +- `rubyMinimal` was removed due to being unused and unusable. The default ruby interpreter includes JIT support, which makes it reference it\'s compiler. Since JIT support is probably needed by some Gems, it was decided to enable this feature with all cc references by default, and allow to build a Ruby derivation without references to cc, by setting `jitSupport = false;` in an overlay. See [\#90151](https://github.com/NixOS/nixpkgs/pull/90151) for more info. + +- Setting `services.openssh.authorizedKeysFiles` now also affects which keys `security.pam.enableSSHAgentAuth` will use. WARNING: If you are using these options in combination do make sure that any key paths you use are present in `services.openssh.authorizedKeysFiles`! + +- The option `fonts.enableFontDir` has been renamed to [fonts.fontDir.enable](options.html#opt-fonts.fontDir.enable). The path of font directory has also been changed to `/run/current-system/sw/share/X11/fonts`, for consistency with other X11 resources. + +- A number of options have been renamed in the kicad interface. `oceSupport` has been renamed to `withOCE`, `withOCCT` has been renamed to `withOCC`, `ngspiceSupport` has been renamed to `withNgspice`, and `scriptingSupport` has been renamed to `withScripting`. Additionally, `kicad/base.nix` no longer provides default argument values since these are provided by `kicad/default.nix`. + +- The socket for the `pdns-recursor` module was moved from `/var/lib/pdns-recursor` to `/run/pdns-recursor` to match upstream. + +- Paperwork was updated to version 2. The on-disk format slightly changed, and it is not possible to downgrade from Paperwork 2 back to Paperwork 1.3. Back your documents up before upgrading. See [this thread](https://forum.openpaper.work/t/paperwork-2-0/112/5) for more details. + +- PowerDNS has been updated from `4.2.x` to `4.3.x`. Please be sure to review the [Upgrade Notes](https://doc.powerdns.com/authoritative/upgrading.html#x-to-4-3-0) provided by upstream before upgrading. Worth specifically noting is that the service now runs entirely as a dedicated `pdns` user, instead of starting as `root` and dropping privileges, as well as the default `socket-dir` location changing from `/var/lib/powerdns` to `/run/pdns`. + +- The `mediatomb` service is now using by default the new and maintained fork `gerbera` package instead of the unmaintained `mediatomb` package. If you want to keep the old behavior, you must declare it with: + + ```nix + { + services.mediatomb.package = pkgs.mediatomb; + } + ``` + + One new option `openFirewall` has been introduced which defaults to false. If you relied on the service declaration to add the firewall rules itself before, you should now declare it with: + + ```nix + { + services.mediatomb.openFirewall = true; + } + ``` + +- xfsprogs was update from 4.19 to 5.11. It now enables reflink support by default on filesystem creation. Support for reflinks was added with an experimental status to kernel 4.9 and deemed stable in kernel 4.16. If you want to be able to mount XFS filesystems created with this release of xfsprogs on kernel releases older than those, you need to format them with `mkfs.xfs -m reflink=0`. + +- The uWSGI server is now built with POSIX capabilities. As a consequence, root is no longer required in emperor mode and the service defaults to running as the unprivileged `uwsgi` user. Any additional capability can be added via the new option [services.uwsgi.capabilities](options.html#opt-services.uwsgi.capabilities). The previous behaviour can be restored by setting: + + ```nix + { + services.uwsgi.user = "root"; + services.uwsgi.group = "root"; + services.uwsgi.instance = + { + uid = "uwsgi"; + gid = "uwsgi"; + }; + } + ``` + + Another incompatibility from the previous release is that vassals running under a different user or group need to use `immediate-{uid,gid}` instead of the usual `uid,gid` options. + +- btc1 has been abandoned upstream, and removed. + +- cpp_ethereum (aleth) has been abandoned upstream, and removed. + +- riak-cs package removed along with `services.riak-cs` module. + +- stanchion package removed along with `services.stanchion` module. + +- mutt has been updated to a new major version (2.x), which comes with some backward incompatible changes that are described in the [release notes for Mutt 2.0](http://www.mutt.org/relnotes/2.0/). + +- `vim` and `neovim` switched to Python 3, dropping all Python 2 support. + +- [networking.wireguard.interfaces.\.generatePrivateKeyFile](options.html#opt-networking.wireguard.interfaces), which is off by default, had a `chmod` race condition fixed. As an aside, the parent directory\'s permissions were widened, and the key files were made owner-writable. This only affects newly created keys. However, if the exact permissions are important for your setup, read [\#121294](https://github.com/NixOS/nixpkgs/pull/121294). + +- [boot.zfs.forceImportAll](options.html#opt-boot.zfs.forceImportAll) previously did nothing, but has been fixed. However its default has been changed to `false` to preserve the existing default behaviour. If you have this explicitly set to `true`, please note that your non-root pools will now be forcibly imported. + +- openafs now points to openafs_1_8, which is the new stable release. OpenAFS 1.6 was removed. + +- The WireGuard module gained a new option `networking.wireguard.interfaces..peers.*.dynamicEndpointRefreshSeconds` that implements refreshing the IP of DNS-based endpoints periodically (which WireGuard itself [cannot do](https://lists.zx2c4.com/pipermail/wireguard/2017-November/002028.html)). + +- MariaDB has been updated to 10.5. Before you upgrade, it would be best to take a backup of your database and read [ Incompatible Changes Between 10.4 and 10.5](https://mariadb.com/kb/en/upgrading-from-mariadb-104-to-mariadb-105/#incompatible-changes-between-104-and-105). After the upgrade you will need to run `mysql_upgrade`. + +- The TokuDB storage engine dropped in mariadb 10.5 and removed in mariadb 10.6. It is recommended to switch to RocksDB. See also [TokuDB](https://mariadb.com/kb/en/tokudb/) and [MDEV-19780: Remove the TokuDB storage engine](https://jira.mariadb.org/browse/MDEV-19780). + +- The `openldap` module now has support for OLC-style configuration, users of the `configDir` option may wish to migrate. If you continue to use `configDir`, ensure that `olcPidFile` is set to `/run/slapd/slapd.pid`. + + As a result, `extraConfig` and `extraDatabaseConfig` are removed. To help with migration, you can convert your `slapd.conf` file to OLC configuration with the following script (find the location of this configuration file by running `systemctl status openldap`, it is the `-f` option. + + ```ShellSession + $ TMPDIR=$(mktemp -d) + $ slaptest -f /path/to/slapd.conf -F $TMPDIR + $ slapcat -F $TMPDIR -n0 -H 'ldap:///???(!(objectClass=olcSchemaConfig))' + ``` + + This will dump your current configuration in LDIF format, which should be straightforward to convert into Nix settings. This does not show your schema configuration, as this is unnecessarily verbose for users of the default schemas and `slaptest` is buggy with schemas directly in the config file. + +- Amazon EC2 and OpenStack Compute (nova) images now re-fetch instance meta data and user data from the instance metadata service (IMDS) on each boot. For example: stopping an EC2 instance, changing its user data, and restarting the instance will now cause it to fetch and apply the new user data. + + ::: {.warning} + Specifically, `/etc/ec2-metadata` is re-populated on each boot. Some NixOS scripts that read from this directory are guarded to only run if the files they want to manipulate do not already exist, and so will not re-apply their changes if the IMDS response changes. Examples: `root`\'s SSH key is only added if `/root/.ssh/authorized_keys` does not exist, and SSH host keys are only set from user data if they do not exist in `/etc/ssh`. + ::: + +- The `rspamd` services is now sandboxed. It is run as a dynamic user instead of root, so secrets and other files may have to be moved or their permissions may have to be fixed. The sockets are now located in `/run/rspamd` instead of `/run`. + +- Enabling the Tor client no longer silently also enables and configures Privoxy, and the `services.tor.client.privoxy.enable` option has been removed. To enable Privoxy, and to configure it to use Tor\'s faster port, use the following configuration: + + ```nix + { + opt-services.privoxy.enable = true; + opt-services.privoxy.enableTor = true; + } + ``` + +- The `services.tor` module has a new exhaustively typed [services.tor.settings](options.html#opt-services.tor.settings) option following RFC 0042; backward compatibility with old options has been preserved when aliasing was possible. The corresponding systemd service has been hardened, but there is a chance that the service still requires more permissions, so please report any related trouble on the bugtracker. Onion services v3 are now supported in [services.tor.relay.onionServices](options.html#opt-services.tor.relay.onionServices). A new [services.tor.openFirewall](options.html#opt-services.tor.openFirewall) option as been introduced for allowing connections on all the TCP ports configured. + +- The options `services.slurm.dbdserver.storagePass` and `services.slurm.dbdserver.configFile` have been removed. Use `services.slurm.dbdserver.storagePassFile` instead to provide the database password. Extra config options can be given via the option `services.slurm.dbdserver.extraConfig`. The actual configuration file is created on the fly on startup of the service. This avoids that the password gets exposed in the nix store. + +- The `wafHook` hook does not wrap Python anymore. Packages depending on `wafHook` need to include any Python into their `nativeBuildInputs`. + +- Starting with version 1.7.0, the project formerly named `CodiMD` is now named `HedgeDoc`. New installations will no longer use the old name for users, state directories and such, this needs to be considered when moving state to a more recent NixOS installation. Based on [system.stateVersion](options.html#opt-system.stateVersion), existing installations will continue to work. + +- The fish-foreign-env package has been replaced with fishPlugins.foreign-env, in which the fish functions have been relocated to the `vendor_functions.d` directory to be loaded automatically. + +- The prometheus json exporter is now managed by the prometheus community. Together with additional features some backwards incompatibilities were introduced. Most importantly the exporter no longer accepts a fixed command-line parameter to specify the URL of the endpoint serving JSON. It now expects this URL to be passed as an URL parameter, when scraping the exporter\'s `/probe` endpoint. In the prometheus scrape configuration the scrape target might look like this: + + ``` + http://some.json-exporter.host:7979/probe?target=https://example.com/some/json/endpoint + ``` + + Existing configuration for the exporter needs to be updated, but can partially be re-used. Documentation is available in the upstream repository and a small example for NixOS is available in the corresponding NixOS test. + + These changes also affect [services.prometheus.exporters.rspamd.enable](options.html#opt-services.prometheus.exporters.rspamd.enable), which is just a preconfigured instance of the json exporter. + + For more information, take a look at the [ official documentation](https://github.com/prometheus-community/json_exporter) of the json_exporter. + +- Androidenv was updated, removing the `includeDocs` and `lldbVersions` arguments. Docs only covered a single version of the Android SDK, LLDB is now bundled with the NDK, and both are no longer available to download from the Android package repositories. Additionally, since the package lists have been updated, some older versions of Android packages may not be bundled. If you depend on older versions of Android packages, we recommend overriding the repo. + + Android packages are now loaded from a repo.json file created by parsing Android repo XML files. The arguments `repoJson` and `repoXmls` have been added to allow overriding the built-in androidenv repo.json with your own. Additionally, license files are now written to allow compatibility with Gradle-based tools, and the `extraLicenses` argument has been added to accept more SDK licenses if your project requires it. See the androidenv documentation for more details. + +- The attribute `mpi` is now consistently used to provide a default, system-wide MPI implementation. The default implementation is openmpi, which has been used before by all derivations affects by this change. Note that all packages that have used `mpi ? null` in the input for optional MPI builds, have been changed to the boolean input paramater `useMpi` to enable building with MPI. Building all packages with `mpich` instead of the default `openmpi` can now be achived like this: + + ```nix + self: super: + { + mpi = super.mpich; + } + ``` + +- The Searx module has been updated with the ability to configure the service declaratively and uWSGI integration. The option `services.searx.configFile` has been renamed to [services.searx.settingsFile](options.html#opt-services.searx.settingsFile) for consistency with the new [services.searx.settings](options.html#opt-services.searx.settings). In addition, the `searx` uid and gid reservations have been removed since they were not necessary: the service is now running with a dynamically allocated uid. + +- The libinput module has been updated with the ability to configure mouse and touchpad settings separately. The options in `services.xserver.libinput` have been renamed to `services.xserver.libinput.touchpad`, while there is a new `services.xserver.libinput.mouse` for mouse related configuration. + + Since touchpad options no longer apply to all devices, you may want to replicate your touchpad configuration in mouse section. + +- ALSA OSS emulation (`sound.enableOSSEmulation`) is now disabled by default. + +- Thinkfan as been updated to `1.2.x`, which comes with a new YAML based configuration format. For this reason, several NixOS options of the thinkfan module have been changed to non-backward compatible types. In addition, a new [services.thinkfan.settings](options.html#opt-services.thinkfan.settings) option has been added. + + Please read the [ thinkfan documentation](https://github.com/vmatare/thinkfan#readme) before updating. + +- Adobe Flash Player support has been dropped from the tree. In particular, the following packages no longer support it: + + - chromium + + - firefox + + - qt48 + + - qt5.qtwebkit + + Additionally, packages flashplayer and hal-flash were removed along with the `services.flashpolicyd` module. + +- The `security.rngd` module has been removed. It was disabled by default in 20.09 as it was functionally redundant with krngd in the linux kernel. It is not necessary for any device that the kernel recognises as an hardware RNG, as it will automatically run the krngd task to periodically collect random data from the device and mix it into the kernel\'s RNG. + + The default SMTP port for GitLab has been changed to `25` from its previous default of `465`. If you depended on this default, you should now set the [services.gitlab.smtp.port](options.html#opt-services.gitlab.smtp.port) option. + +- The default version of ImageMagick has been updated from 6 to 7. You can use imagemagick6, imagemagick6_light, and imagemagick6Big if you need the older version. + +- [services.xserver.videoDrivers](options.html#opt-services.xserver.videoDrivers) no longer uses the deprecated `cirrus` and `vesa` device dependent X drivers by default. It also enables both `amdgpu` and `nouveau` drivers by default now. + +- The `kindlegen` package is gone, because it is no longer supported or hosted by Amazon. Sadly, its replacement, Kindle Previewer, has no Linux support. However, there are other ways to generate MOBI files. See [the discussion](https://github.com/NixOS/nixpkgs/issues/96439) for more info. + +- The apacheKafka packages are now built with version-matched JREs. Versions 2.6 and above, the ones that recommend it, use jdk11, while versions below remain on jdk8. The NixOS service has been adjusted to start the service using the same version as the package, adjustable with the new [services.apache-kafka.jre](options.html#opt-services.apache-kafka.jre) option. Furthermore, the default list of [services.apache-kafka.jvmOptions](options.html#opt-services.apache-kafka.jvmOptions) have been removed. You should set your own according to the [upstream documentation](https://kafka.apache.org/documentation/#java) for your Kafka version. + +- The kodi package has been modified to allow concise addon management. Consider the following configuration from previous releases of NixOS to install kodi, including the kodiPackages.inputstream-adaptive and kodiPackages.vfs-sftp addons: + + ```nix + { + environment.systemPackages = [ + pkgs.kodi + ]; + + nixpkgs.config.kodi = { + enableInputStreamAdaptive = true; + enableVFSSFTP = true; + }; + } + ``` + + All Kodi `config` flags have been removed, and as a result the above configuration should now be written as: + + ```nix + { + environment.systemPackages = [ + (pkgs.kodi.withPackages (p: with p; [ + inputstream-adaptive + vfs-sftp + ])) + ]; + } + ``` + +- `environment.defaultPackages` now includes the nano package. If pkgs.nano is not added to the list, make sure another editor is installed and the `EDITOR` environment variable is set to it. Environment variables can be set using `environment.variables`. + +- `services.minio.dataDir` changed type to a list of paths, required for specifiyng multiple data directories for using with erasure coding. Currently, the service doesn\'t enforce nor checks the correct number of paths to correspond to minio requirements. + +- All CUDA toolkit versions prior to CUDA 10 have been removed. + +- The kbdKeymaps package was removed since dvp and neo are now included in kbd. If you want to use the Programmer Dvorak Keyboard Layout, you have to use `dvorak-programmer` in `console.keyMap` now instead of `dvp`. In `services.xserver.xkbVariant` it\'s still `dvp`. + +- The babeld service is now being run as an unprivileged user. To achieve that the module configures `skip-kernel-setup true` and takes care of setting forwarding and rp_filter sysctls by itself as well as for each interface in `services.babeld.interfaces`. + +- The `services.zigbee2mqtt.config` option has been renamed to `services.zigbee2mqtt.settings` and now follows [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md). + + The yadm dotfile manager has been updated from 2.x to 3.x, which has new (XDG) default locations for some data/state files. Most yadm commands will fail and print a legacy path warning (which describes how to upgrade/migrate your repository). If you have scripts, daemons, scheduled jobs, shell profiles, etc. that invoke yadm, expect them to fail or misbehave until you perform this migration and prepare accordingly. + +- Instead of determining `services.radicale.package` automatically based on `system.stateVersion`, the latest version is always used because old versions are not officially supported. + + Furthermore, Radicale\'s systemd unit was hardened which might break some deployments. In particular, a non-default `filesystem_folder` has to be added to `systemd.services.radicale.serviceConfig.ReadWritePaths` if the deprecated `services.radicale.config` is used. + +- In the `security.acme` module, use of `--reuse-key` parameter for Lego has been removed. It was introduced for HKPK, but this security feature is now deprecated. It is a better security practice to rotate key pairs instead of always keeping the same. If you need to keep this parameter, you can add it back using `extraLegoRenewFlags` as an option for the appropriate certificate. + +## Other Notable Changes {#sec-release-21.05-notable-changes} + +- `stdenv.lib` has been deprecated and will break eval in 21.11. Please use `pkgs.lib` instead. See [\#108938](https://github.com/NixOS/nixpkgs/issues/108938) for details. + +- [GNURadio](https://www.gnuradio.org/) has a `pkgs` attribute set, and there\'s a `gnuradio.callPackage` function that extends `pkgs` with a `mkDerivation`, and a `mkDerivationWith`, like Qt5. Now all `gnuradio.pkgs` are defined with `gnuradio.callPackage` and some packages that depend on gnuradio are defined with this as well. + +- [Privoxy](https://www.privoxy.org/) has been updated to version 3.0.32 (See [announcement](https://lists.privoxy.org/pipermail/privoxy-announce/2021-February/000007.html)). Compared to the previous release, Privoxy has gained support for HTTPS inspection (still experimental), Brotli decompression, several new filters and lots of bug fixes, including security ones. In addition, the package is now built with compression and external filters support, which were previously disabled. + + Regarding the NixOS module, new options for HTTPS inspection have been added and `services.privoxy.extraConfig` has been replaced by the new [services.privoxy.settings](options.html#opt-services.privoxy.settings) (See [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) for the motivation). + +- [Kodi](https://kodi.tv/) has been updated to version 19.1 \"Matrix\". See the [announcement](https://kodi.tv/article/kodi-190-matrix-release) for further details. + +- The `services.packagekit.backend` option has been removed as it only supported a single setting which would always be the default. Instead new [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) compliant [services.packagekit.settings](options.html#opt-services.packagekit.settings) and [services.packagekit.vendorSettings](options.html#opt-services.packagekit.vendorSettings) options have been introduced. + +- [Nginx](https://nginx.org) has been updated to stable version 1.20.0. Now nginx uses the zlib-ng library by default. + +- KDE Gear (formerly KDE Applications) is upgraded to 21.04, see its [release notes](https://kde.org/announcements/gear/21.04/) for details. + + The `kdeApplications` package set is now `kdeGear`, in keeping with the new name. The old name remains for compatibility, but it is deprecated. + +- [Libreswan](https://libreswan.org/) has been updated to version 4.4. The package now includes example configurations and manual pages by default. The NixOS module has been changed to use the upstream systemd units and write the configuration in the `/etc/ipsec.d/ ` directory. In addition, two new options have been added to specify connection policies ([services.libreswan.policies](options.html#opt-services.libreswan.policies)) and disable send/receive redirects ([services.libreswan.disableRedirects](options.html#opt-services.libreswan.disableRedirects)). + +- The Mailman NixOS module (`services.mailman`) has a new option [services.mailman.enablePostfix](options.html#opt-services.mailman.enablePostfix), defaulting to true, that controls integration with Postfix. + + If this option is disabled, default MTA config becomes not set and you should set the options in `services.mailman.settings.mta` according to the desired configuration as described in [Mailman documentation](https://mailman.readthedocs.io/en/latest/src/mailman/docs/mta.html). + +- The default-version of `nextcloud` is nextcloud21. Please note that it\'s _not_ possible to upgrade `nextcloud` across multiple major versions! This means that it\'s e.g. not possible to upgrade from nextcloud18 to nextcloud20 in a single deploy and most `20.09` users will have to upgrade to nextcloud20 first. + + The package can be manually upgraded by setting [services.nextcloud.package](options.html#opt-services.nextcloud.package) to nextcloud21. + +- The setting [services.redis.bind](options.html#opt-services.redis.bind) defaults to `127.0.0.1` now, making Redis listen on the loopback interface only, and not all public network interfaces. + +- NixOS now emits a deprecation warning if systemd\'s `StartLimitInterval` setting is used in a `serviceConfig` section instead of in a `unitConfig`; that setting is deprecated and now undocumented for the service section by systemd upstream, but still effective and somewhat buggy there, which can be confusing. See [\#45785](https://github.com/NixOS/nixpkgs/issues/45785) for details. + + All services should use [systemd.services._name_.startLimitIntervalSec](options.html#opt-systemd.services._name_.startLimitIntervalSec) or `StartLimitIntervalSec` in [systemd.services._name_.unitConfig](options.html#opt-systemd.services._name_.unitConfig) instead. + +- The `mediatomb` service declares new options. It also adapts existing options so the configuration generation is now lazy. The existing option `customCfg` (defaults to false), when enabled, stops the service configuration generation completely. It then expects the users to provide their own correct configuration at the right location (whereas the configuration was generated and not used at all before). The new option `transcodingOption` (defaults to no) allows a generated configuration. It makes the mediatomb service pulls the necessary runtime dependencies in the nix store (whereas it was generated with hardcoded values before). The new option `mediaDirectories` allows the users to declare autoscan media directories from their nixos configuration: + + ```nix + { + services.mediatomb.mediaDirectories = [ + { path = "/var/lib/mediatomb/pictures"; recursive = false; hidden-files = false; } + { path = "/var/lib/mediatomb/audio"; recursive = true; hidden-files = false; } + ]; + } + ``` + +- The Unbound DNS resolver service (`services.unbound`) has been refactored to allow reloading, control sockets and to fix startup ordering issues. + + It is now possible to enable a local UNIX control socket for unbound by setting the [services.unbound.localControlSocketPath](options.html#opt-services.unbound.localControlSocketPath) option. + + Previously we just applied a very minimal set of restrictions and trusted unbound to properly drop root privs and capabilities. + + As of this we are (for the most part) just using the upstream example unit file for unbound. The main difference is that we start unbound as `unbound` user with the required capabilities instead of letting unbound do the chroot & uid/gid changes. + + The upstream unit configuration this is based on is a lot stricter with all kinds of permissions then our previous variant. It also came with the default of having the `Type` set to `notify`, therefore we are now also using the `unbound-with-systemd` package here. Unbound will start up, read the configuration files and start listening on the configured ports before systemd will declare the unit `active (running)`. This will likely help with startup order and the occasional race condition during system activation where the DNS service is started but not yet ready to answer queries. Services depending on `nss-lookup.target` or `unbound.service` are now be able to use unbound when those targets have been reached. + + Additionally to the much stricter runtime environment the `/dev/urandom` mount lines we previously had in the code (that randomly failed during the stop-phase) have been removed as systemd will take care of those for us. + + The `preStart` script is now only required if we enabled the trust anchor updates (which are still enabled by default). + + Another benefit of the refactoring is that we can now issue reloads via either `pkill -HUP unbound` and `systemctl reload unbound` to reload the running configuration without taking the daemon offline. A prerequisite of this was that unbound configuration is available on a well known path on the file system. We are using the path `/etc/unbound/unbound.conf` as that is the default in the CLI tooling which in turn enables us to use `unbound-control` without passing a custom configuration location. + + The module has also been reworked to be [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) compliant. As such, `sevices.unbound.extraConfig` has been removed and replaced by [services.unbound.settings](options.html#opt-services.unbound.settings). `services.unbound.interfaces` has been renamed to `services.unbound.settings.server.interface`. + + `services.unbound.forwardAddresses` and `services.unbound.allowedAccess` have also been changed to use the new settings interface. You can follow the instructions when executing `nixos-rebuild` to upgrade your configuration to use the new interface. + +- The `services.dnscrypt-proxy2` module now takes the upstream\'s example configuration and updates it with the user\'s settings. An option has been added to restore the old behaviour if you prefer to declare the configuration from scratch. + +- NixOS now defaults to the unified cgroup hierarchy (cgroupsv2). See the [Fedora Article for 31](https://www.redhat.com/sysadmin/fedora-31-control-group-v2) for details on why this is desirable, and how it impacts containers. + + If you want to run containers with a runtime that does not yet support cgroupsv2, you can switch back to the old behaviour by setting [systemd.enableUnifiedCgroupHierarchy](options.html#opt-systemd.enableUnifiedCgroupHierarchy) = `false`; and rebooting. + +- PulseAudio was upgraded to 14.0, with changes to the handling of default sinks. See its [release notes](https://www.freedesktop.org/wiki/Software/PulseAudio/Notes/14.0/). + +- GNOME users may wish to delete their `~/.config/pulse` due to the changes to stream routing logic. See [PulseAudio bug 832](https://gitlab.freedesktop.org/pulseaudio/pulseaudio/-/issues/832) for more information. + +- The zookeeper package does not provide `zooInspector.sh` anymore, as that \"contrib\" has been dropped from upstream releases. + +- In the ACME module, the data used to build the hash for the account directory has changed to accomodate new features to reduce account rate limit issues. This will trigger new account creation on the first rebuild following this update. No issues are expected to arise from this, thanks to the new account creation handling. + +- [users.users._name_.createHome](options.html#opt-users.users._name_.createHome) now always ensures home directory permissions to be `0700`. Permissions had previously been ignored for already existing home directories, possibly leaving them readable by others. The option\'s description was incorrect regarding ownership management and has been simplified greatly. + +- When defining a new user, one of [users.users._name_.isNormalUser](options.html#opt-users.users._name_.isNormalUser) and [users.users._name_.isSystemUser](options.html#opt-users.users._name_.isSystemUser) is now required. This is to prevent accidentally giving a UID above 1000 to system users, which could have unexpected consequences, like running user activation scripts for system users. Note that users defined with an explicit UID below 500 are exempted from this check, as [users.users._name_.isSystemUser](options.html#opt-users.users._name_.isSystemUser) has no effect for those. + +- The `security.apparmor` module, for the [AppArmor](https://gitlab.com/apparmor/apparmor/-/wikis/Documentation) Mandatory Access Control system, has been substantialy improved along with related tools, so that module maintainers can now more easily write AppArmor profiles for NixOS. The most notable change on the user-side is the new option [security.apparmor.policies](options.html#opt-security.apparmor.policies), replacing the previous `profiles` option to provide a way to disable a profile and to select whether to confine in enforce mode (default) or in complain mode (see `journalctl -b --grep apparmor`). Security-minded users may also want to enable [security.apparmor.killUnconfinedConfinables](options.html#opt-security.apparmor.killUnconfinedConfinables), at the cost of having some of their processes killed when updating to a NixOS version introducing new AppArmor profiles. + +- The GNOME desktop manager once again installs gnome.epiphany by default. + +- NixOS now generates empty `/etc/netgroup`. `/etc/netgroup` defines network-wide groups and may affect to setups using NIS. + +- Platforms, like `stdenv.hostPlatform`, no longer have a `platform` attribute. It has been (mostly) flattened away: + + - `platform.gcc` is now `gcc` + + - `platform.kernel*` is now `linux-kernel.*` + + Additionally, `platform.kernelArch` moved to the top level as `linuxArch` to match the other `*Arch` variables. + + The `platform` grouping of these things never meant anything, and was just a historial/implementation artifact that was overdue removal. + +- `services.restic` now uses a dedicated cache directory for every backup defined in `services.restic.backups`. The old global cache directory, `/root/.cache/restic`, is now unused and can be removed to free up disk space. + +- `isync`: The `isync` compatibility wrapper was removed and the Master/Slave terminology has been deprecated and should be replaced with Far/Near in the configuration file. + +- The nix-gc service now accepts randomizedDelaySec (default: 0) and persistent (default: true) parameters. By default nix-gc will now run immediately if it would have been triggered at least once during the time when the timer was inactive. + +- The `rustPlatform.buildRustPackage` function is split into several hooks: cargoSetupHook to set up vendoring for Cargo-based projects, cargoBuildHook to build a project using Cargo, cargoInstallHook to install a project using Cargo, and cargoCheckHook to run tests in Cargo-based projects. With this change, mixed-language projects can use the relevant hooks within builders other than `buildRustPackage`. However, these changes also required several API changes to `buildRustPackage` itself: + + - The `target` argument was removed. Instead, `buildRustPackage` will always use the same target as the C/C++ compiler that is used. + + - The `cargoParallelTestThreads` argument was removed. Parallel tests are now disabled through `dontUseCargoParallelTests`. + +- The `rustPlatform.maturinBuildHook` hook was added. This hook can be used with `buildPythonPackage` to build Python packages that are written in Rust and use Maturin as their build tool. + +- Kubernetes has [deprecated docker](https://kubernetes.io/blog/2020/12/02/dont-panic-kubernetes-and-docker/) as container runtime. As a consequence, the Kubernetes module now has support for configuration of custom remote container runtimes and enables containerd by default. Note that containerd is more strict regarding container image OCI-compliance. As an example, images with CMD or ENTRYPOINT defined as strings (not lists) will fail on containerd, while working fine on docker. Please test your setup and container images with containerd prior to upgrading. + +- The GitLab module now has support for automatic backups. A schedule can be set with the [services.gitlab.backup.startAt](options.html#opt-services.gitlab.backup.startAt) option. + +- Prior to this release, systemd would also read system units from an undocumented `/etc/systemd-mutable/system` path. This path has been dropped from the defaults. That path (or others) can be re-enabled by adding it to the [boot.extraSystemdUnitPaths](options.html#opt-boot.extraSystemdUnitPaths) list. + +- PostgreSQL 9.5 is scheduled EOL during the 21.05 life cycle and has been removed. + +- [Xfce4](https://www.xfce.org/) relies on GIO/GVfs for userspace virtual filesystem access in applications like [thunar](https://docs.xfce.org/xfce/thunar/) and [gigolo](https://docs.xfce.org/apps/gigolo/). For that to work, the gvfs nixos service is enabled by default, and it can be configured with the specific package that provides GVfs. Until now Xfce4 was setting it to use a lighter version of GVfs (without support for samba). To avoid conflicts with other desktop environments this setting has been dropped. Users that still want it should add the following to their system configuration: + + ```nix + { + services.gvfs.package = pkgs.gvfs.override { samba = null; }; + } + ``` + +- The newly enabled `systemd-pstore.service` now automatically evacuates crashdumps and panic logs from the persistent storage to `/var/lib/systemd/pstore`. This prevents NVRAM from filling up, which ensures the latest diagnostic data is always stored and alleviates problems with writing new boot configurations. + +- Nixpkgs now contains [automatically packaged GNOME Shell extensions](https://github.com/NixOS/nixpkgs/pull/118232) from the [GNOME Extensions](https://extensions.gnome.org/) portal. You can find them, filed by their UUID, under `gnome38Extensions` attribute for GNOME 3.38 and under `gnome40Extensions` for GNOME 40. Finally, the `gnomeExtensions` attribute contains extensions for the latest GNOME Shell version in Nixpkgs, listed under a more human-friendly name. The unqualified attribute scope also contains manually packaged extensions. Note that the automatically packaged extensions are provided for convenience and are not checked or guaranteed to work. + +- Erlang/OTP versions older than R21 got dropped. We also dropped the cuter package, as it was purely an example of how to build a package. We also dropped `lfe_1_2` as it could not build with R21+. Moving forward, we expect to only support 3 yearly releases of OTP. diff --git a/nixos/doc/manual/release-notes/rl-2105.xml b/nixos/doc/manual/release-notes/rl-2105.xml index 4ecdd23d2de..e69de29bb2d 100644 --- a/nixos/doc/manual/release-notes/rl-2105.xml +++ b/nixos/doc/manual/release-notes/rl-2105.xml @@ -1,1266 +0,0 @@ -
- Release 21.05 (“Okapi”, 2021.05/31) - - - Support is planned until the end of December 2021, handing over to 21.11. - -
- Highlights - - - In addition to numerous new and upgraded packages, this release has the - following highlights: - - - - - - - Core version changes: - - - - - gcc: 9.3.0 -> 10.3.0 - - - - - glibc: 2.30 -> 2.32 - - - - - default linux: 5.4 -> 5.10, all supported kernels available - - - - - mesa: 20.1.7 -> 21.0.1 - - - - - - - Desktop Environments: - - - - - GNOME: 3.36 -> 40, see its release notes - - - - - Plasma5: 5.18.5 -> 5.21.3 - - - - - kdeApplications: 20.08.1 -> 20.12.3 - - - - - cinnamon: 4.6 -> 4.8.1 - - - - - - - - Programming Languages and Frameworks: - - - - - - Python optimizations were disabled again. Builds with optimizations enabled - are not reproducible. Optimizations can now be enabled with an option. - - - - - - - The linux_latest kernel was updated to the 5.12 series. It currently is not officially supported for use with the zfs filesystem. If you use zfs, you should use a different kernel version (either the LTS kernel, or track a specific one). - - - -
- -
- New Services - - - The following new services were added since the last release: - - - - - - GNURadio 3.8 and 3.9 were - finally - packaged, along with a rewrite to the Nix expressions, allowing users to - override the features upstream supports selecting to compile or not to. - Additionally, the attribute gnuradio (3.9), gnuradio3_8 and gnuradio3_7 - now point to an externally wrapped by default derivations, that allow you to - also add `extraPythonPackages` to the Python interpreter used by GNURadio. - Missing environmental variables needed for operational GUI were also added - (#75478). - - - - - - Keycloak, - an open source identity and access management server with - support for OpenID Connect, - OAUTH 2.0 and - SAML - 2.0. - - - See the Keycloak - section of the NixOS manual for more information. - - - - - Web Services Dynamic Discovery host daemon - - - - - Discourse, a - modern and open source discussion platform. - - - See the Discourse - section of the NixOS manual for more information. - - - - - Nebula VPN - - - - -
- -
- Backward Incompatibilities - - - When upgrading from a previous release, please be aware of the following - incompatible changes: - - - - - GNOME desktop environment was upgraded to 40, see the release notes for 40.0 and 3.38. The gnome3 attribute set has been renamed to gnome and so have been the NixOS options. - - - - - If you are using to assign - custom names to network interfaces, this may stop working due to a change - in the initialisation of dhcpcd and systemd networkd. To avoid this, either - move them to or see the new - Assigning custom names section - of the NixOS manual for an example using networkd links. - - - - - The module has been removed. - It was broken since the switch to cgroups-v2. - - - - - The linuxPackages.ati_drivers_x11 kernel modules have been removed. - The drivers only supported kernels prior to 4.2, and thus have become obsolete. - - - - - The systemConfig kernel parameter is no longer added to boot loader entries. It has been unused since September 2010, but if do have a system generation from that era, you will now be unable to boot into them. - - - - - systemd-journal2gelf no longer parses json and expects the receiving system to handle it. How to achieve this with Graylog is described in this GitHub issue. - - - - - If the services.dbus module is enabled, then - the user D-Bus session is now always socket activated. The - associated options services.dbus.socketActivated - and services.xserver.startDbusSession have - therefore been removed and you will receive a warning if - they are present in your configuration. This change makes the - user D-Bus session available also for non-graphical logins. - - - - - The networking.wireless.iwd module now installs - the upstream-provided 80-iwd.link file, which sets the NamePolicy= - for all wlan devices to "keep kernel", to avoid race conditions - between iwd and networkd. If you don't want this, you can set - systemd.network.links."80-iwd" = lib.mkForce {}. - - - - - rubyMinimal was removed due to being unused and - unusable. The default ruby interpreter includes JIT support, which makes - it reference it's compiler. Since JIT support is probably needed by some - Gems, it was decided to enable this feature with all cc references by - default, and allow to build a Ruby derivation without references to cc, - by setting jitSupport = false; in an overlay. See - #90151 - for more info. - - - - - Setting now also affects which keys will use. - - WARNING: If you are using these options in combination do make sure that any key paths you use are present in ! - - - - - The option has been renamed to - . The path of font directory - has also been changed to /run/current-system/sw/share/X11/fonts, - for consistency with other X11 resources. - - - - - A number of options have been renamed in the kicad interface. oceSupport - has been renamed to withOCE, withOCCT has been renamed - to withOCC, ngspiceSupport has been renamed to - withNgspice, and scriptingSupport has been renamed to - withScripting. Additionally, kicad/base.nix no longer - provides default argument values since these are provided by - kicad/default.nix. - - - - - The socket for the pdns-recursor module was moved from /var/lib/pdns-recursor - to /run/pdns-recursor to match upstream. - - - - - Paperwork was updated to version 2. The on-disk format slightly changed, - and it is not possible to downgrade from Paperwork 2 back to Paperwork - 1.3. Back your documents up before upgrading. See this thread for more details. - - - - - PowerDNS has been updated from 4.2.x to 4.3.x. Please - be sure to review the Upgrade Notes - provided by upstream before upgrading. Worth specifically noting is that the service now runs - entirely as a dedicated pdns user, instead of starting as root - and dropping privileges, as well as the default socket-dir location changing from - /var/lib/powerdns to /run/pdns. - - - - - The mediatomb service is - now using by default the new and maintained fork - gerbera package instead of the unmaintained - mediatomb package. If you want to keep the old - behavior, you must declare it with: - - services.mediatomb.package = pkgs.mediatomb; - - One new option openFirewall has been introduced which - defaults to false. If you relied on the service declaration to add the - firewall rules itself before, you should now declare it with: - - services.mediatomb.openFirewall = true; - - - - - - xfsprogs was update from 4.19 to 5.11. It now enables reflink support by default on filesystem creation. - Support for reflinks was added with an experimental status to kernel 4.9 and deemed stable in kernel 4.16. - If you want to be able to mount XFS filesystems created with this release of xfsprogs on kernel releases older than those, you need to format them - with mkfs.xfs -m reflink=0. - - - - - The uWSGI server is now built with POSIX capabilities. As a consequence, - root is no longer required in emperor mode and the service defaults to - running as the unprivileged uwsgi user. Any additional - capability can be added via the new option - . - The previous behaviour can be restored by setting: - - = "root"; - = "root"; - = - { - uid = "uwsgi"; - gid = "uwsgi"; - }; - - - - Another incompatibility from the previous release is that vassals running under a - different user or group need to use immediate-{uid,gid} - instead of the usual uid,gid options. - - - - - btc1 has been abandoned upstream, and removed. - - - - - cpp_ethereum (aleth) has been abandoned upstream, and removed. - - - - - riak-cs package removed along with services.riak-cs module. - - - - - stanchion package removed along with services.stanchion module. - - - - - mutt has been updated to a new major version (2.x), which comes with - some backward incompatible changes that are described in the - release notes for Mutt 2.0. - - - - - vim and neovim switched to Python 3, dropping all Python 2 support. - - - - - networking.wireguard.interfaces.<name>.generatePrivateKeyFile, - which is off by default, had a chmod race condition - fixed. As an aside, the parent directory's permissions were widened, - and the key files were made owner-writable. - This only affects newly created keys. - However, if the exact permissions are important for your setup, read - #121294. - - - - - boot.zfs.forceImportAll - previously did nothing, but has been fixed. However its default has been - changed to false to preserve the existing default - behaviour. If you have this explicitly set to true, - please note that your non-root pools will now be forcibly imported. - - - - - openafs now points to openafs_1_8, - which is the new stable release. OpenAFS 1.6 was removed. - - - - - The WireGuard module gained a new option - - that implements refreshing the IP of DNS-based endpoints periodically - (which WireGuard itself - cannot do). - - - - - MariaDB has been updated to 10.5. - Before you upgrade, it would be best to take a backup of your database and read - - Incompatible Changes Between 10.4 and 10.5. - After the upgrade you will need to run mysql_upgrade. - - - - - The TokuDB storage engine dropped in mariadb 10.5 and removed in mariadb 10.6. - It is recommended to switch to RocksDB. See also TokuDB and - MDEV-19780: Remove the TokuDB storage engine. - - - - - The openldap module now has support for OLC-style - configuration, users of the configDir option may wish - to migrate. If you continue to use configDir, ensure that - olcPidFile is set to /run/slapd/slapd.pid. - - - As a result, extraConfig and extraDatabaseConfig - are removed. To help with migration, you can convert your slapd.conf - file to OLC configuration with the following script (find the location of this - configuration file by running systemctl status openldap, it is the - -f option. - - - TMPDIR=$(mktemp -d) - slaptest -f /path/to/slapd.conf -F $TMPDIR - slapcat -F $TMPDIR -n0 -H 'ldap:///???(!(objectClass=olcSchemaConfig))' - - - This will dump your current configuration in LDIF format, which should be - straightforward to convert into Nix settings. This does not show your schema - configuration, as this is unnecessarily verbose for users of the default schemas - and slaptest is buggy with schemas directly in the config file. - - - - - Amazon EC2 and OpenStack Compute (nova) images now re-fetch instance meta data and user data from the instance - metadata service (IMDS) on each boot. For example: stopping an EC2 instance, changing its user data, and - restarting the instance will now cause it to fetch and apply the new user data. - - - - Specifically, /etc/ec2-metadata is re-populated on each boot. Some NixOS scripts that read - from this directory are guarded to only run if the files they want to manipulate do not already exist, and so - will not re-apply their changes if the IMDS response changes. Examples: root's SSH key is - only added if /root/.ssh/authorized_keys does not exist, and SSH host keys are only set from - user data if they do not exist in /etc/ssh. - - - - - - The rspamd services is now sandboxed. It is run as - a dynamic user instead of root, so secrets and other files may have to - be moved or their permissions may have to be fixed. The sockets are now - located in /run/rspamd instead of /run. - - - - - Enabling the Tor client no longer silently also enables and - configures Privoxy, and the - services.tor.client.privoxy.enable option has - been removed. To enable Privoxy, and to configure it to use - Tor's faster port, use the following configuration: - - - = true; - = true; - - - - - The services.tor module has a new exhaustively typed option following RFC 0042; backward compatibility with old options has been preserved when aliasing was possible. - The corresponding systemd service has been hardened, - but there is a chance that the service still requires more permissions, - so please report any related trouble on the bugtracker. - Onion services v3 are now supported in . - A new option as been introduced for allowing connections on all the TCP ports configured. - - - - - The options services.slurm.dbdserver.storagePass - and services.slurm.dbdserver.configFile have been removed. - Use services.slurm.dbdserver.storagePassFile instead to provide the database password. - Extra config options can be given via the option services.slurm.dbdserver.extraConfig. The actual configuration file is created on the fly on startup of the service. - This avoids that the password gets exposed in the nix store. - - - - - The wafHook hook does not wrap Python anymore. - Packages depending on wafHook need to include any Python into their nativeBuildInputs. - - - - - Starting with version 1.7.0, the project formerly named CodiMD - is now named HedgeDoc. - New installations will no longer use the old name for users, state directories and such, this needs to be considered when moving state to a more recent NixOS installation. - Based on , existing installations will continue to work. - - - - - The fish-foreign-env package has been replaced with - fishPlugins.foreign-env, in which the fish - functions have been relocated to the - vendor_functions.d directory to be loaded automatically. - - - - - The prometheus json exporter is now managed by the prometheus community. Together with additional features - some backwards incompatibilities were introduced. - Most importantly the exporter no longer accepts a fixed command-line parameter to specify the URL of the - endpoint serving JSON. It now expects this URL to be passed as an URL parameter, when scraping the exporter's - /probe endpoint. - In the prometheus scrape configuration the scrape target might look like this: - -http://some.json-exporter.host:7979/probe?target=https://example.com/some/json/endpoint - - - - Existing configuration for the exporter needs to be updated, but can partially be re-used. - Documentation is available in the upstream repository and a small example for NixOS is available - in the corresponding NixOS test. - - - These changes also affect , which is - just a preconfigured instance of the json exporter. - - - For more information, take a look at the - official documentation of the json_exporter. - - - - - Androidenv was updated, removing the includeDocs and lldbVersions - arguments. Docs only covered a single version of the Android SDK, LLDB is now bundled with the NDK, - and both are no longer available to download from the Android package repositories. Additionally, since - the package lists have been updated, some older versions of Android packages may not be bundled. If you - depend on older versions of Android packages, we recommend overriding the repo. - - - Android packages are now loaded from a repo.json file created by parsing Android repo XML files. The arguments - repoJson and repoXmls have been added to allow overriding the built-in - androidenv repo.json with your own. Additionally, license files are now written to allow compatibility - with Gradle-based tools, and the extraLicenses argument has been added to accept more - SDK licenses if your project requires it. See the androidenv documentation for more details. - - - - - The attribute mpi is now consistently used to - provide a default, system-wide MPI implementation. - The default implementation is openmpi, which has been used before by - all derivations affects by this change. - Note that all packages that have used mpi ? null in the input - for optional MPI builds, have been changed to the boolean input paramater - useMpi to enable building with MPI. - - Building all packages with mpich instead - of the default openmpi can now be achived like this: - -self: super: -{ - mpi = super.mpich; -} - - - - - - The Searx module has been updated with the ability to configure the - service declaratively and uWSGI integration. - The option services.searx.configFile has been renamed - to for consistency with - the new . In addition, the - searx uid and gid reservations have been removed - since they were not necessary: the service is now running with a - dynamically allocated uid. - - - - - The libinput module has been updated with the ability to configure mouse and touchpad settings separately. - The options in services.xserver.libinput have been renamed to services.xserver.libinput.touchpad, - while there is a new services.xserver.libinput.mouse for mouse related configuration. - - - Since touchpad options no longer apply to all devices, you may want to replicate your touchpad configuration in - mouse section. - - - - - ALSA OSS emulation (sound.enableOSSEmulation) is now disabled by default. - - - - - Thinkfan as been updated to 1.2.x, which comes with a - new YAML based configuration format. For this reason, several NixOS options - of the thinkfan module have been changed to non-backward compatible types. - In addition, a new option has - been added. - - - Please read the - thinkfan documentation before updating. - - - - - Adobe Flash Player support has been dropped from the tree. In particular, - the following packages no longer support it: - - chromium - firefox - qt48 - qt5.qtwebkit - - Additionally, packages flashplayer and - hal-flash were removed along with the - services.flashpolicyd module. - - - - - The security.rngd module has been removed. - It was disabled by default in 20.09 as it was functionally redundant - with krngd in the linux kernel. It is not necessary for any device that the kernel recognises - as an hardware RNG, as it will automatically run the krngd task to periodically collect random - data from the device and mix it into the kernel's RNG. - - - The default SMTP port for GitLab has been changed to - 25 from its previous default of - 465. If you depended on this default, you - should now set the - option. - - - - - The default version of ImageMagick has been updated from 6 to 7. - You can use imagemagick6, - imagemagick6_light, and - imagemagick6Big if you need the older version. - - - - - no longer uses the deprecated cirrus and vesa device dependent X drivers by default. It also enables both amdgpu and nouveau drivers by default now. - - - - - The kindlegen package is gone, because it is no longer supported or hosted by Amazon. Sadly, its replacement, Kindle Previewer, has no Linux support. However, there are other ways to generate MOBI files. See the discussion for more info. - - - - - The apacheKafka packages are now built with - version-matched JREs. Versions 2.6 and above, the ones that recommend it, - use jdk11, while versions below remain on jdk8. The NixOS service has - been adjusted to start the service using the same version as the package, - adjustable with the new - services.apache-kafka.jre - option. Furthermore, the default list of - services.apache-kafka.jvmOptions - have been removed. You should set your own according to the - upstream documentation - for your Kafka version. - - - - - The kodi package has been modified to allow concise addon management. Consider - the following configuration from previous releases of NixOS to install kodi, - including the kodiPackages.inputstream-adaptive and kodiPackages.vfs-sftp - addons: - - -environment.systemPackages = [ - pkgs.kodi -]; - -nixpkgs.config.kodi = { - enableInputStreamAdaptive = true; - enableVFSSFTP = true; -}; - - - All Kodi config flags have been removed, and as a result the above configuration - should now be written as: - - -environment.systemPackages = [ - (pkgs.kodi.withPackages (p: with p; [ - inputstream-adaptive - vfs-sftp - ])) -]; - - - - - - now includes the nano package. - If pkgs.nano is not added to the list, - make sure another editor is installed and the EDITOR - environment variable is set to it. - Environment variables can be set using . - - - - - changed type to a list of paths, required for specifiyng multiple data directories for using with erasure coding. - Currently, the service doesn't enforce nor checks the correct number of paths to correspond to minio requirements. - - - - - All CUDA toolkit versions prior to CUDA 10 have been removed. - - - - - The kbdKeymaps package was removed since dvp and neo - are now included in kbd. - - If you want to use the Programmer Dvorak Keyboard Layout, you have to use - dvorak-programmer in - now instead of dvp. - In it's still dvp. - - - - - The babeld service is now being run as an unprivileged user. To achieve that the module configures - skip-kernel-setup true and takes care of setting forwarding and rp_filter sysctls by itself as well - as for each interface in services.babeld.interfaces. - - - - - The option has been renamed to and - now follows RFC 0042. - - - - - The yadm dotfile manager has been updated from 2.x to 3.x, which has new (XDG) default locations for some data/state files. Most yadm commands will fail and print a legacy path warning (which describes how to upgrade/migrate your repository). If you have scripts, daemons, scheduled jobs, shell profiles, etc. that invoke yadm, expect them to fail or misbehave until you perform this migration and prepare accordingly. - - - - - Instead of determining - automatically based on , the latest - version is always used because old versions are not officially supported. - - - Furthermore, Radicale's systemd unit was hardened which might break some - deployments. In particular, a non-default - filesystem_folder has to be added to - if - the deprecated is used. - - - - - In the module, use of --reuse-key - parameter for Lego has been removed. It was introduced for HKPK, but this security - feature is now deprecated. It is a better security practice to rotate key pairs - instead of always keeping the same. If you need to keep this parameter, you can add - it back using extraLegoRenewFlags as an option for the - appropriate certificate. - - - -
- -
- Other Notable Changes - - - - - stdenv.lib has been deprecated and will break - eval in 21.11. Please use pkgs.lib instead. - See #108938 - for details. - - - - - - GNURadio has a - pkgs attribute set, and there's a gnuradio.callPackage - function that extends pkgs with a mkDerivation, and a - mkDerivationWith, like Qt5. Now all gnuradio.pkgs are - defined with gnuradio.callPackage and some packages that depend - on gnuradio are defined with this as well. - - - - - Privoxy has been updated - to version 3.0.32 (See announcement). - Compared to the previous release, Privoxy has gained support for HTTPS - inspection (still experimental), Brotli decompression, several new filters - and lots of bug fixes, including security ones. In addition, the package - is now built with compression and external filters support, which were - previously disabled. - - - Regarding the NixOS module, new options for HTTPS inspection have been added - and has been replaced by the new - - (See RFC 0042 - for the motivation). - - - - - Kodi has been updated to version 19.1 "Matrix". See - the announcement for - further details. - - - - - The option has been removed as - it only supported a single setting which would always be the default. - Instead new RFC - 0042 compliant - and options have - been introduced. - - - - - Nginx has been updated to stable version 1.20.0. - Now nginx uses the zlib-ng library by default. - - - - - KDE Gear (formerly KDE Applications) is upgraded to 21.04, see its - release - notes for details. - - - The kdeApplications package set is now kdeGear, - in keeping with the new name. The old name remains for compatibility, but - it is deprecated. - - - - - Libreswan has been updated - to version 4.4. The package now includes example configurations and manual - pages by default. The NixOS module has been changed to use the upstream - systemd units and write the configuration in the /etc/ipsec.d/ - directory. In addition, two new options have been added to - specify connection policies - () - and disable send/receive redirects - (). - - - - - - The Mailman NixOS module (services.mailman) has a new - option , defaulting - to true, that controls integration with Postfix. - - - If this option is disabled, default MTA config becomes not set and you - should set the options in services.mailman.settings.mta - according to the desired configuration as described in - Mailman documentation. - - - - - The default-version of nextcloud is nextcloud21. - Please note that it's not possible to upgrade nextcloud - across multiple major versions! This means that it's e.g. not possible to upgrade - from nextcloud18 to nextcloud20 in a single deploy and - most 20.09 users will have to upgrade to nextcloud20 - first. - - - The package can be manually upgraded by setting - to nextcloud21. - - - - - The setting defaults to 127.0.0.1 now, making Redis listen on the loopback interface only, and not all public network interfaces. - - - - - NixOS now emits a deprecation warning if systemd's StartLimitInterval setting is used in a serviceConfig section instead of in a unitConfig; that setting is deprecated and now undocumented for the service section by systemd upstream, but still effective and somewhat buggy there, which can be confusing. See #45785 for details. - - - All services should use or StartLimitIntervalSec in instead. - - - - - The mediatomb service - declares new options. It also adapts existing options so the - configuration generation is now lazy. The existing option - customCfg (defaults to false), when enabled, stops - the service configuration generation completely. It then expects the - users to provide their own correct configuration at the right location - (whereas the configuration was generated and not used at all before). - The new option transcodingOption (defaults to no) - allows a generated configuration. It makes the mediatomb service pulls - the necessary runtime dependencies in the nix store (whereas it was - generated with hardcoded values before). The new option - mediaDirectories allows the users to declare autoscan - media directories from their nixos configuration: - - services.mediatomb.mediaDirectories = [ - { path = "/var/lib/mediatomb/pictures"; recursive = false; hidden-files = false; } - { path = "/var/lib/mediatomb/audio"; recursive = true; hidden-files = false; } - ]; - - - - - - The Unbound DNS resolver service (services.unbound) has been refactored to allow reloading, control sockets and to fix startup ordering issues. - - - - It is now possible to enable a local UNIX control socket for unbound by setting the - option. - - - - Previously we just applied a very minimal set of restrictions and - trusted unbound to properly drop root privs and capabilities. - - - - As of this we are (for the most part) just using the upstream - example unit file for unbound. The main difference is that we start - unbound as unbound user with the required capabilities instead of - letting unbound do the chroot & uid/gid changes. - - - - The upstream unit configuration this is based on is a lot stricter with - all kinds of permissions then our previous variant. It also came with - the default of having the Type set to notify, therefore we are now also - using the unbound-with-systemd package here. Unbound will start up, - read the configuration files and start listening on the configured ports - before systemd will declare the unit active (running). - This will likely help with startup order and the occasional race condition during system - activation where the DNS service is started but not yet ready to answer - queries. Services depending on nss-lookup.target or unbound.service - are now be able to use unbound when those targets have been reached. - - - - Additionally to the much stricter runtime environment the - /dev/urandom mount lines we previously had in the code (that - randomly failed during the stop-phase) have been removed as systemd will take care of those for us. - - - - The preStart script is now only required if we enabled the trust - anchor updates (which are still enabled by default). - - - - Another benefit of the refactoring is that we can now issue reloads via - either pkill -HUP unbound and systemctl reload unbound to reload the - running configuration without taking the daemon offline. A prerequisite - of this was that unbound configuration is available on a well known path - on the file system. We are using the path /etc/unbound/unbound.conf as that is the - default in the CLI tooling which in turn enables us to use - unbound-control without passing a custom configuration location. - - - - The module has also been reworked to be RFC - 0042 compliant. As such, - has been removed and replaced - by . - has been renamed to . - - - - and - have also been changed to - use the new settings interface. You can follow the instructions when - executing nixos-rebuild to upgrade your configuration to - use the new interface. - - - - - The services.dnscrypt-proxy2 module now takes the upstream's example configuration and updates it with the user's settings. - - An option has been added to restore the old behaviour if you prefer to declare the configuration from scratch. - - - - - NixOS now defaults to the unified cgroup hierarchy (cgroupsv2). - See the Fedora Article for 31 - for details on why this is desirable, and how it impacts containers. - - - If you want to run containers with a runtime that does not yet support cgroupsv2, - you can switch back to the old behaviour by setting - = false; - and rebooting. - - - - - PulseAudio was upgraded to 14.0, with changes to the handling of default sinks. - See its release notes. - - - - - GNOME users may wish to delete their ~/.config/pulse due to the changes to stream routing - logic. See PulseAudio bug 832 - for more information. - - - - - The zookeeper package does not provide - zooInspector.sh anymore, as that "contrib" has - been dropped from upstream releases. - - - - - In the ACME module, the data used to build the hash for the account - directory has changed to accomodate new features to reduce account - rate limit issues. This will trigger new account creation on the first - rebuild following this update. No issues are expected to arise from this, - thanks to the new account creation handling. - - - - - now always ensures home directory permissions to be 0700. - Permissions had previously been ignored for already existing home directories, possibly leaving them readable by others. - The option's description was incorrect regarding ownership management and has been simplified greatly. - - - - - When defining a new user, one of and is now required. - This is to prevent accidentally giving a UID above 1000 to system users, which could have unexpected consequences, like running user activation scripts for system users. - Note that users defined with an explicit UID below 500 are exempted from this check, as has no effect for those. - - - - - The security.apparmor module, - for the AppArmor - Mandatory Access Control system, - has been substantialy improved along with related tools, - so that module maintainers can now more easily write AppArmor profiles for NixOS. - The most notable change on the user-side is the new option , - replacing the previous profiles option - to provide a way to disable a profile - and to select whether to confine in enforce mode (default) - or in complain mode (see journalctl -b --grep apparmor). - Security-minded users may also want to enable , - at the cost of having some of their processes killed - when updating to a NixOS version introducing new AppArmor profiles. - - - - - The GNOME desktop manager once again installs gnome.epiphany by default. - - - - - NixOS now generates empty /etc/netgroup. - /etc/netgroup defines network-wide groups and may affect to setups using NIS. - - - - - Platforms, like stdenv.hostPlatform, no longer have a platform attribute. - It has been (mostly) flattened away: - - - platform.gcc is now gcc - platform.kernel* is now linux-kernel.* - - - Additionally, platform.kernelArch moved to the top level as linuxArch to match the other *Arch variables. - - - The platform grouping of these things never meant anything, and was just a historial/implementation artifact that was overdue removal. - - - - - services.restic now uses a dedicated cache directory for every backup defined in services.restic.backups. The old global cache directory, /root/.cache/restic, is now unused and can be removed to free up disk space. - - - - - isync: The isync compatibility wrapper was removed and the Master/Slave - terminology has been deprecated and should be replaced with Far/Near in the configuration file. - - - - - The nix-gc service now accepts randomizedDelaySec (default: 0) and persistent (default: true) parameters. - By default nix-gc will now run immediately if it would have been triggered at least - once during the time when the timer was inactive. - - - - - The rustPlatform.buildRustPackage function is split into several hooks: - cargoSetupHook to set up vendoring for Cargo-based projects, - cargoBuildHook to build a project using Cargo, - cargoInstallHook to install a project using Cargo, and - cargoCheckHook to run tests in Cargo-based projects. With this change, - mixed-language projects can use the relevant hooks within builders other than - buildRustPackage. However, these changes also required several API changes to - buildRustPackage itself: - - - - - The target argument was removed. Instead, buildRustPackage - will always use the same target as the C/C++ compiler that is used. - - - - - The cargoParallelTestThreads argument was removed. Parallel tests are - now disabled through dontUseCargoParallelTests. - - - - - - - - The rustPlatform.maturinBuildHook hook was added. This hook can be used - with buildPythonPackage to build Python packages that are written in Rust - and use Maturin as their build tool. - - - - - Kubernetes has deprecated docker as container runtime. - As a consequence, the Kubernetes module now has support for configuration of custom remote container runtimes and enables containerd by default. - Note that containerd is more strict regarding container image OCI-compliance. - As an example, images with CMD or ENTRYPOINT defined as strings (not lists) will fail on containerd, while working fine on docker. - Please test your setup and container images with containerd prior to upgrading. - - - - - The GitLab module now has support for automatic backups. A - schedule can be set with the - services.gitlab.backup.startAt - option. - - - - - Prior to this release, systemd would also read system units from an undocumented /etc/systemd-mutable/system path. - This path has been dropped from the defaults. That path (or others) can be re-enabled by adding it to the - boot.extraSystemdUnitPaths list. - - - - - PostgreSQL 9.5 is scheduled EOL during the 21.05 life cycle and has been removed. - - - - - Xfce4 relies on - GIO/GVfs for userspace virtual filesystem access in applications - like thunar and - gigolo. - For that to work, the gvfs nixos service is enabled by default, - and it can be configured with the specific package that provides - GVfs. Until now Xfce4 was setting it to use a lighter version of - GVfs (without support for samba). To avoid conflicts with other - desktop environments this setting has been dropped. Users that - still want it should add the following to their system - configuration: - - = pkgs.gvfs.override { samba = null; }; - - - - - - The newly enabled systemd-pstore.service now automatically evacuates crashdumps and panic logs from the persistent storage to /var/lib/systemd/pstore. - This prevents NVRAM from filling up, which ensures the latest diagnostic data is always stored and alleviates problems with writing new boot configurations. - - - - - Nixpkgs now contains automatically packaged GNOME Shell extensions from the GNOME Extensions portal. You can find them, filed by their UUID, under gnome38Extensions attribute for GNOME 3.38 and under gnome40Extensions for GNOME 40. Finally, the gnomeExtensions attribute contains extensions for the latest GNOME Shell version in Nixpkgs, listed under a more human-friendly name. The unqualified attribute scope also contains manually packaged extensions. Note that the automatically packaged extensions are provided for convenience and are not checked or guaranteed to work. - - - - - Erlang/OTP versions older than R21 got dropped. We also dropped the cuter package, as it was purely an example of how to build a package. - We also dropped lfe_1_2 as it could not build with R21+. - Moving forward, we expect to only support 3 yearly releases of OTP. - - - - -
-
-- cgit 1.4.1 From 8609f3fd20ed9a3ba925986bc55005689d84e6ef Mon Sep 17 00:00:00 2001 From: Olli Helenius Date: Wed, 23 Jun 2021 21:22:04 +0300 Subject: libwnck: make 3.36.0 default --- .../from_md/release-notes/rl-2111.section.xml | 8 ++- nixos/doc/manual/release-notes/rl-2111.section.md | 3 + pkgs/applications/misc/devilspie2/default.nix | 4 +- pkgs/applications/misc/dockbarx/default.nix | 4 +- pkgs/applications/misc/gxkb/default.nix | 4 +- pkgs/applications/misc/kupfer/default.nix | 4 +- .../misc/notify-osd-customizable/default.nix | 4 +- pkgs/applications/misc/notify-osd/default.nix | 4 +- pkgs/applications/misc/plank/default.nix | 4 +- pkgs/applications/misc/xsuspender/default.nix | 4 +- pkgs/applications/system/monitor/default.nix | 4 +- .../terminal-emulators/guake/default.nix | 4 +- pkgs/applications/video/kazam/default.nix | 4 +- .../bindings/gnome-python-desktop/default.nix | 4 +- pkgs/desktops/gnome-2/default.nix | 2 +- pkgs/desktops/gnome/apps/accerciser/default.nix | 4 +- pkgs/desktops/gnome/misc/gnome-applets/default.nix | 4 +- pkgs/desktops/gnome/misc/gnome-panel/default.nix | 4 +- pkgs/desktops/lxde/core/lxpanel/default.nix | 4 +- pkgs/desktops/mate/mate-applets/default.nix | 4 +- pkgs/desktops/mate/mate-netbook/default.nix | 4 +- .../mate/mate-notification-daemon/default.nix | 4 +- pkgs/desktops/mate/mate-panel/default.nix | 4 +- pkgs/desktops/mate/mate-system-monitor/default.nix | 4 +- .../pantheon/apps/elementary-dock/default.nix | 4 +- .../applications/xfce4-taskmanager/default.nix | 4 +- .../xfce/applications/xfdashboard/default.nix | 4 +- pkgs/desktops/xfce/core/xfce4-panel/default.nix | 4 +- pkgs/desktops/xfce/core/xfce4-session/default.nix | 4 +- pkgs/desktops/xfce/core/xfdesktop/default.nix | 4 +- pkgs/desktops/xfce/core/xfwm4/default.nix | 4 +- .../panel-plugins/xfce4-namebar-plugin/default.nix | 4 +- .../xfce4-windowck-plugin/default.nix | 4 +- .../panel-plugins/xfce4-xkb-plugin/default.nix | 4 +- pkgs/development/libraries/bamf/default.nix | 4 +- pkgs/development/libraries/libwnck/2.nix | 30 ++++++++ pkgs/development/libraries/libwnck/3.x.nix | 76 -------------------- pkgs/development/libraries/libwnck/default.nix | 80 +++++++++++++++++----- pkgs/development/tools/misc/d-feet/default.nix | 4 +- pkgs/tools/misc/clipster/default.nix | 4 +- pkgs/top-level/aliases.nix | 1 + pkgs/top-level/all-packages.nix | 5 +- pkgs/top-level/perl-packages.nix | 2 +- 43 files changed, 176 insertions(+), 167 deletions(-) create mode 100644 pkgs/development/libraries/libwnck/2.nix delete mode 100644 pkgs/development/libraries/libwnck/3.x.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index bb00cde0195..50cab308fa5 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -310,13 +310,19 @@ - + The antlr package now defaults to the 4.x release instead of the old 2.7.7 version. + + + The libwnck package now defaults to the 3.x + release instead of the old 2.31.0 version. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index e8a75151736..1ae9a7b658f 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -78,6 +78,9 @@ In addition to numerous new and upgraded packages, this release has the followin * The `antlr` package now defaults to the 4.x release instead of the old 2.7.7 version. +* The `libwnck` package now defaults to the 3.x release instead of the + old 2.31.0 version. + ## Other Notable Changes {#sec-release-21.11-notable-changes} - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets. diff --git a/pkgs/applications/misc/devilspie2/default.nix b/pkgs/applications/misc/devilspie2/default.nix index 2d3c28b2d71..b9d8b0f9797 100644 --- a/pkgs/applications/misc/devilspie2/default.nix +++ b/pkgs/applications/misc/devilspie2/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, intltool, pkg-config, glib, gtk, lua, libwnck3 }: +{ lib, stdenv, fetchurl, intltool, pkg-config, glib, gtk, lua, libwnck }: stdenv.mkDerivation rec { pname = "devilspie2"; @@ -10,7 +10,7 @@ stdenv.mkDerivation rec { }; nativeBuildInputs = [ intltool pkg-config ]; - buildInputs = [ glib gtk lua libwnck3 ]; + buildInputs = [ glib gtk lua libwnck ]; installPhase = '' mkdir -p $out/bin $out/share/man/man1 diff --git a/pkgs/applications/misc/dockbarx/default.nix b/pkgs/applications/misc/dockbarx/default.nix index cac6c363c32..9471751844e 100644 --- a/pkgs/applications/misc/dockbarx/default.nix +++ b/pkgs/applications/misc/dockbarx/default.nix @@ -4,7 +4,7 @@ , gobject-introspection , gtk3 , keybinder3 -, libwnck3 +, libwnck , python3Packages , wrapGAppsHook }: @@ -31,7 +31,7 @@ python3Packages.buildPythonApplication rec { buildInputs = [ gobject-introspection gtk3 - libwnck3 + libwnck keybinder3 ]; diff --git a/pkgs/applications/misc/gxkb/default.nix b/pkgs/applications/misc/gxkb/default.nix index 7f2b93f1495..16268bc76c7 100644 --- a/pkgs/applications/misc/gxkb/default.nix +++ b/pkgs/applications/misc/gxkb/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, gtk3, libwnck3, libxklavier +{ lib, stdenv, fetchFromGitHub, autoreconfHook, pkg-config, gtk3, libwnck, libxklavier , appindicatorSupport ? true, libayatana-appindicator-gtk3 }: @@ -14,7 +14,7 @@ stdenv.mkDerivation rec { }; nativeBuildInputs = [ pkg-config autoreconfHook ]; - buildInputs = [ gtk3 libwnck3 libxklavier ] ++ lib.optional appindicatorSupport libayatana-appindicator-gtk3; + buildInputs = [ gtk3 libwnck libxklavier ] ++ lib.optional appindicatorSupport libayatana-appindicator-gtk3; configureFlags = lib.optional appindicatorSupport "--enable-appindicator=yes"; outputs = [ "out" "man" ]; diff --git a/pkgs/applications/misc/kupfer/default.nix b/pkgs/applications/misc/kupfer/default.nix index 07ff7c17f69..47e310fb765 100644 --- a/pkgs/applications/misc/kupfer/default.nix +++ b/pkgs/applications/misc/kupfer/default.nix @@ -5,7 +5,7 @@ , gobject-introspection , gtk3 , itstool -, libwnck3 +, libwnck , keybinder3 , desktop-file-utils , shared-mime-info @@ -34,7 +34,7 @@ buildPythonApplication rec { desktop-file-utils # for update-desktop-database shared-mime-info # for update-mime-info ]; - buildInputs = [ docutils libwnck3 keybinder3 ]; + buildInputs = [ docutils libwnck keybinder3 ]; propagatedBuildInputs = [ pygobject3 gtk3 pyxdg dbus-python pycairo ]; # without strictDeps kupfer fails to build: Could not find the python module 'gi.repository.Gtk' diff --git a/pkgs/applications/misc/notify-osd-customizable/default.nix b/pkgs/applications/misc/notify-osd-customizable/default.nix index b00ee18d5f3..820eceabb51 100644 --- a/pkgs/applications/misc/notify-osd-customizable/default.nix +++ b/pkgs/applications/misc/notify-osd-customizable/default.nix @@ -5,7 +5,7 @@ , gnome , libnotify , libtool -, libwnck3 +, libwnck , makeWrapper , pkg-config , gsettings-desktop-schemas @@ -26,7 +26,7 @@ in stdenv.mkDerivation rec { nativeBuildInputs = [ pkg-config ]; buildInputs = [ - glib libwnck3 libnotify dbus-glib makeWrapper + glib libwnck libnotify dbus-glib makeWrapper gsettings-desktop-schemas gnome.gnome-common libtool ]; diff --git a/pkgs/applications/misc/notify-osd/default.nix b/pkgs/applications/misc/notify-osd/default.nix index d68601ca6ec..005d0273466 100644 --- a/pkgs/applications/misc/notify-osd/default.nix +++ b/pkgs/applications/misc/notify-osd/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, pkg-config, glib, libwnck3, libnotify, dbus-glib, makeWrapper, gsettings-desktop-schemas }: +{ lib, stdenv, fetchurl, pkg-config, glib, libwnck, libnotify, dbus-glib, makeWrapper, gsettings-desktop-schemas }: stdenv.mkDerivation rec { pname = "notify-osd"; @@ -11,7 +11,7 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ pkg-config ]; buildInputs = [ - glib libwnck3 libnotify dbus-glib makeWrapper + glib libwnck libnotify dbus-glib makeWrapper gsettings-desktop-schemas ]; diff --git a/pkgs/applications/misc/plank/default.nix b/pkgs/applications/misc/plank/default.nix index 30d9533d453..85e3bb48119 100644 --- a/pkgs/applications/misc/plank/default.nix +++ b/pkgs/applications/misc/plank/default.nix @@ -7,7 +7,7 @@ , glib , gnome , gtk3 -, libwnck3 +, libwnck , libX11 , libXfixes , libXi @@ -59,7 +59,7 @@ stdenv.mkDerivation rec { libXi libdbusmenu-gtk3 libgee - libwnck3 + libwnck pango ]; diff --git a/pkgs/applications/misc/xsuspender/default.nix b/pkgs/applications/misc/xsuspender/default.nix index 93e56f1df2d..c09c9329aab 100644 --- a/pkgs/applications/misc/xsuspender/default.nix +++ b/pkgs/applications/misc/xsuspender/default.nix @@ -1,5 +1,5 @@ { lib, stdenv, fetchFromGitHub, cmake, makeWrapper, pkg-config -, glib, libwnck3, procps }: +, glib, libwnck, procps }: with lib; @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { outputs = [ "out" "man" "doc" ]; nativeBuildInputs = [ cmake pkg-config makeWrapper ]; - buildInputs = [ glib libwnck3 ]; + buildInputs = [ glib libwnck ]; postInstall = '' wrapProgram $out/bin/xsuspender \ diff --git a/pkgs/applications/system/monitor/default.nix b/pkgs/applications/system/monitor/default.nix index 11bdeeb3bf6..588839b859d 100644 --- a/pkgs/applications/system/monitor/default.nix +++ b/pkgs/applications/system/monitor/default.nix @@ -11,7 +11,7 @@ , glib , gtk3 , bamf -, libwnck3 +, libwnck , libgee , libgtop , wrapGAppsHook @@ -47,7 +47,7 @@ stdenv.mkDerivation rec { pantheon.wingpanel libgee libgtop - libwnck3 + libwnck ]; postPatch = '' diff --git a/pkgs/applications/terminal-emulators/guake/default.nix b/pkgs/applications/terminal-emulators/guake/default.nix index 62cb6707c1b..8c4c6b383d5 100644 --- a/pkgs/applications/terminal-emulators/guake/default.nix +++ b/pkgs/applications/terminal-emulators/guake/default.nix @@ -9,7 +9,7 @@ , libnotify , libutempter , vte -, libwnck3 +, libwnck }: python3.pkgs.buildPythonApplication rec { @@ -41,7 +41,7 @@ python3.pkgs.buildPythonApplication rec { gtk3 keybinder3 libnotify - libwnck3 + libwnck python3 vte ]; diff --git a/pkgs/applications/video/kazam/default.nix b/pkgs/applications/video/kazam/default.nix index 35b7d173257..f99b4930870 100644 --- a/pkgs/applications/video/kazam/default.nix +++ b/pkgs/applications/video/kazam/default.nix @@ -1,5 +1,5 @@ { lib, fetchurl, substituteAll, python3, gst_all_1, wrapGAppsHook, gobject-introspection -, gtk3, libwnck3, keybinder3, intltool, libcanberra-gtk3, libappindicator-gtk3, libpulseaudio +, gtk3, libwnck, keybinder3, intltool, libcanberra-gtk3, libappindicator-gtk3, libpulseaudio , fetchpatch }: python3.pkgs.buildPythonApplication rec { @@ -14,7 +14,7 @@ python3.pkgs.buildPythonApplication rec { nativeBuildInputs = [ gobject-introspection python3.pkgs.distutils_extra intltool wrapGAppsHook ]; buildInputs = [ - gst_all_1.gstreamer gst_all_1.gst-plugins-base gst_all_1.gst-plugins-good gtk3 libwnck3 + gst_all_1.gstreamer gst_all_1.gst-plugins-base gst_all_1.gst-plugins-good gtk3 libwnck keybinder3 libappindicator-gtk3 ]; diff --git a/pkgs/desktops/gnome-2/bindings/gnome-python-desktop/default.nix b/pkgs/desktops/gnome-2/bindings/gnome-python-desktop/default.nix index 86d92adbea8..a350c224e8a 100644 --- a/pkgs/desktops/gnome-2/bindings/gnome-python-desktop/default.nix +++ b/pkgs/desktops/gnome-2/bindings/gnome-python-desktop/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, gnome_python, librsvg, libwnck, libgtop, pkg-config, python2, gtk2 }: +{ lib, stdenv, fetchurl, gnome_python, librsvg, libwnck2, libgtop, pkg-config, python2, gtk2 }: let inherit (python2.pkgs) python pygtk; @@ -14,7 +14,7 @@ in stdenv.mkDerivation rec { }; nativeBuildInputs = [ pkg-config ]; - buildInputs = [ gtk2 librsvg libwnck libgtop python ]; + buildInputs = [ gtk2 librsvg libwnck2 libgtop python ]; propagatedBuildInputs = [ gnome_python pygtk ]; # gnome-python-desktop expects that .pth file is already installed by PyGTK diff --git a/pkgs/desktops/gnome-2/default.nix b/pkgs/desktops/gnome-2/default.nix index 50222b386c8..72216863206 100644 --- a/pkgs/desktops/gnome-2/default.nix +++ b/pkgs/desktops/gnome-2/default.nix @@ -74,7 +74,7 @@ lib.makeScope pkgs.newScope (self: with self; { glib glibmm atk atkmm cairo pango pangomm gdk_pixbuf gtkmm2 libcanberra-gtk2 # Included for backwards compatibility - libsoup libwnck gtk-doc gnome-doc-utils rarian + libsoup libwnck2 gtk-doc gnome-doc-utils rarian gvfs # added 2019-09-03 ; diff --git a/pkgs/desktops/gnome/apps/accerciser/default.nix b/pkgs/desktops/gnome/apps/accerciser/default.nix index d81b8466194..9c099f65295 100644 --- a/pkgs/desktops/gnome/apps/accerciser/default.nix +++ b/pkgs/desktops/gnome/apps/accerciser/default.nix @@ -11,7 +11,7 @@ , at-spi2-core , dbus , gettext -, libwnck3 +, libwnck , adwaita-icon-theme }: @@ -40,7 +40,7 @@ python3.pkgs.buildPythonApplication rec { adwaita-icon-theme at-spi2-core gtk3 - libwnck3 + libwnck ]; propagatedBuildInputs = with python3.pkgs; [ diff --git a/pkgs/desktops/gnome/misc/gnome-applets/default.nix b/pkgs/desktops/gnome/misc/gnome-applets/default.nix index d414266a9d9..f581017dd56 100644 --- a/pkgs/desktops/gnome/misc/gnome-applets/default.nix +++ b/pkgs/desktops/gnome/misc/gnome-applets/default.nix @@ -7,7 +7,7 @@ , gnome-panel , gtk3 , glib -, libwnck3 +, libwnck , libgtop , libnotify , upower @@ -42,7 +42,7 @@ stdenv.mkDerivation rec { gtk3 glib libxml2 - libwnck3 + libwnck libgtop libnotify upower diff --git a/pkgs/desktops/gnome/misc/gnome-panel/default.nix b/pkgs/desktops/gnome/misc/gnome-panel/default.nix index 8ab1a87d01c..2e33be766b8 100644 --- a/pkgs/desktops/gnome/misc/gnome-panel/default.nix +++ b/pkgs/desktops/gnome/misc/gnome-panel/default.nix @@ -13,7 +13,7 @@ , itstool , libgweather , libsoup -, libwnck3 +, libwnck , libxml2 , pkg-config , polkit @@ -75,7 +75,7 @@ stdenv.mkDerivation rec { gtk3 libgweather libsoup - libwnck3 + libwnck polkit systemd ]; diff --git a/pkgs/desktops/lxde/core/lxpanel/default.nix b/pkgs/desktops/lxde/core/lxpanel/default.nix index 548f8938959..1208f9cd64c 100644 --- a/pkgs/desktops/lxde/core/lxpanel/default.nix +++ b/pkgs/desktops/lxde/core/lxpanel/default.nix @@ -10,7 +10,7 @@ , gtk2 , libX11 , libfm -, libwnck +, libwnck2 , libXmu , libXpm , cairo @@ -38,7 +38,7 @@ stdenv.mkDerivation rec { gtk2 libX11 libfm - libwnck + libwnck2 libXmu libXpm cairo diff --git a/pkgs/desktops/mate/mate-applets/default.nix b/pkgs/desktops/mate/mate-applets/default.nix index ccd20a6b875..3a34d7af715 100644 --- a/pkgs/desktops/mate/mate-applets/default.nix +++ b/pkgs/desktops/mate/mate-applets/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, pkg-config, gettext, itstool, gnome, glib, gtk3, gtksourceview3, libwnck3 +{ lib, stdenv, fetchurl, pkg-config, gettext, itstool, gnome, glib, gtk3, gtksourceview3, libwnck , libgtop, libxml2, libnotify, polkit, upower, wirelesstools, mate, hicolor-icon-theme, wrapGAppsHook , mateUpdateScript }: @@ -22,7 +22,7 @@ stdenv.mkDerivation rec { gtk3 gtksourceview3 gnome.gucharmap - libwnck3 + libwnck libgtop libxml2 libnotify diff --git a/pkgs/desktops/mate/mate-netbook/default.nix b/pkgs/desktops/mate/mate-netbook/default.nix index 9b7a5ae6718..de452f456a2 100644 --- a/pkgs/desktops/mate/mate-netbook/default.nix +++ b/pkgs/desktops/mate/mate-netbook/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, pkg-config, gettext, gtk3, libwnck3, libfakekey, libXtst, mate, wrapGAppsHook, mateUpdateScript }: +{ lib, stdenv, fetchurl, pkg-config, gettext, gtk3, libwnck, libfakekey, libXtst, mate, wrapGAppsHook, mateUpdateScript }: stdenv.mkDerivation rec { pname = "mate-netbook"; @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { buildInputs = [ gtk3 - libwnck3 + libwnck libfakekey libXtst mate.mate-panel diff --git a/pkgs/desktops/mate/mate-notification-daemon/default.nix b/pkgs/desktops/mate/mate-notification-daemon/default.nix index 62181418fdf..ac5e5376a8e 100644 --- a/pkgs/desktops/mate/mate-notification-daemon/default.nix +++ b/pkgs/desktops/mate/mate-notification-daemon/default.nix @@ -1,5 +1,5 @@ { lib, stdenv, fetchurl, pkg-config, gettext, glib, libcanberra-gtk3, - libnotify, libwnck3, gtk3, libxml2, wrapGAppsHook, mateUpdateScript }: + libnotify, libwnck, gtk3, libxml2, wrapGAppsHook, mateUpdateScript }: stdenv.mkDerivation rec { pname = "mate-notification-daemon"; @@ -20,7 +20,7 @@ stdenv.mkDerivation rec { buildInputs = [ libcanberra-gtk3 libnotify - libwnck3 + libwnck gtk3 ]; diff --git a/pkgs/desktops/mate/mate-panel/default.nix b/pkgs/desktops/mate/mate-panel/default.nix index 328fcfd20de..cd73408d4c8 100644 --- a/pkgs/desktops/mate/mate-panel/default.nix +++ b/pkgs/desktops/mate/mate-panel/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, pkg-config, gettext, itstool, glib, libwnck3, librsvg, libxml2, dconf, gtk3, mate, hicolor-icon-theme, gobject-introspection, wrapGAppsHook, mateUpdateScript }: +{ lib, stdenv, fetchurl, pkg-config, gettext, itstool, glib, libwnck, librsvg, libxml2, dconf, gtk3, mate, hicolor-icon-theme, gobject-introspection, wrapGAppsHook, mateUpdateScript }: stdenv.mkDerivation rec { pname = "mate-panel"; @@ -19,7 +19,7 @@ stdenv.mkDerivation rec { buildInputs = [ glib - libwnck3 + libwnck librsvg libxml2 gtk3 diff --git a/pkgs/desktops/mate/mate-system-monitor/default.nix b/pkgs/desktops/mate/mate-system-monitor/default.nix index 4527c91eed6..fed7dc12629 100644 --- a/pkgs/desktops/mate/mate-system-monitor/default.nix +++ b/pkgs/desktops/mate/mate-system-monitor/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchurl, pkg-config, gettext, itstool, gtkmm3, libxml2, libgtop, libwnck3, librsvg, polkit, systemd, wrapGAppsHook, mateUpdateScript }: +{ lib, stdenv, fetchurl, pkg-config, gettext, itstool, gtkmm3, libxml2, libgtop, libwnck, librsvg, polkit, systemd, wrapGAppsHook, mateUpdateScript }: stdenv.mkDerivation rec { pname = "mate-system-monitor"; @@ -20,7 +20,7 @@ stdenv.mkDerivation rec { gtkmm3 libxml2 libgtop - libwnck3 + libwnck librsvg polkit systemd diff --git a/pkgs/desktops/pantheon/apps/elementary-dock/default.nix b/pkgs/desktops/pantheon/apps/elementary-dock/default.nix index db6633aa5bd..797f62cf8e2 100644 --- a/pkgs/desktops/pantheon/apps/elementary-dock/default.nix +++ b/pkgs/desktops/pantheon/apps/elementary-dock/default.nix @@ -7,7 +7,7 @@ , dconf , glib , gtk3 -, libwnck3 +, libwnck , libX11 , libXfixes , libXi @@ -73,7 +73,7 @@ stdenv.mkDerivation rec { libXi libdbusmenu-gtk3 libgee - libwnck3 + libwnck pango ]; diff --git a/pkgs/desktops/xfce/applications/xfce4-taskmanager/default.nix b/pkgs/desktops/xfce/applications/xfce4-taskmanager/default.nix index 0c277f3a843..6c7e0b29681 100644 --- a/pkgs/desktops/xfce/applications/xfce4-taskmanager/default.nix +++ b/pkgs/desktops/xfce/applications/xfce4-taskmanager/default.nix @@ -1,4 +1,4 @@ -{ mkXfceDerivation, exo, gtk3, libwnck3, libXmu }: +{ mkXfceDerivation, exo, gtk3, libwnck, libXmu }: mkXfceDerivation { category = "apps"; @@ -8,7 +8,7 @@ mkXfceDerivation { sha256 = "sha256-jcICXPtG/7t0U0xqgvU52mjiA8wsyw7JQ0OmNjwA89A="; nativeBuildInputs = [ exo ]; - buildInputs = [ gtk3 libwnck3 libXmu ]; + buildInputs = [ gtk3 libwnck libXmu ]; meta = { description = "Easy to use task manager for Xfce"; diff --git a/pkgs/desktops/xfce/applications/xfdashboard/default.nix b/pkgs/desktops/xfce/applications/xfdashboard/default.nix index 80e3b7ed791..493a70a75ed 100644 --- a/pkgs/desktops/xfce/applications/xfdashboard/default.nix +++ b/pkgs/desktops/xfce/applications/xfdashboard/default.nix @@ -4,7 +4,7 @@ , libXinerama , libXdamage , libX11 -, libwnck3 +, libwnck , libxfce4ui , libxfce4util , garcon @@ -33,7 +33,7 @@ mkXfceDerivation { libXcomposite libXdamage libXinerama - libwnck3 + libwnck libxfce4ui libxfce4util xfconf diff --git a/pkgs/desktops/xfce/core/xfce4-panel/default.nix b/pkgs/desktops/xfce/core/xfce4-panel/default.nix index 86c1789a1b0..417241235b9 100644 --- a/pkgs/desktops/xfce/core/xfce4-panel/default.nix +++ b/pkgs/desktops/xfce/core/xfce4-panel/default.nix @@ -5,7 +5,7 @@ , gobject-introspection , gtk3 , libdbusmenu-gtk3 -, libwnck3 +, libwnck , libxfce4ui , libxfce4util , tzdata @@ -30,7 +30,7 @@ mkXfceDerivation { garcon libdbusmenu-gtk3 libxfce4ui - libwnck3 + libwnck xfconf tzdata ]; diff --git a/pkgs/desktops/xfce/core/xfce4-session/default.nix b/pkgs/desktops/xfce/core/xfce4-session/default.nix index d47dbc9340a..27eaf94b259 100644 --- a/pkgs/desktops/xfce/core/xfce4-session/default.nix +++ b/pkgs/desktops/xfce/core/xfce4-session/default.nix @@ -1,4 +1,4 @@ -{ mkXfceDerivation, polkit, exo, libxfce4util, libxfce4ui, xfconf, iceauth, gtk3, glib, libwnck3, xfce4-session }: +{ mkXfceDerivation, polkit, exo, libxfce4util, libxfce4ui, xfconf, iceauth, gtk3, glib, libwnck, xfce4-session }: mkXfceDerivation { category = "xfce"; @@ -7,7 +7,7 @@ mkXfceDerivation { sha256 = "sha256-LIRAQ1YAkAHwIzC5NYV/0iFLkAP5V96wuTIrYTGbGy0="; - buildInputs = [ exo gtk3 glib libxfce4ui libxfce4util libwnck3 xfconf polkit iceauth ]; + buildInputs = [ exo gtk3 glib libxfce4ui libxfce4util libwnck xfconf polkit iceauth ]; configureFlags = [ "--with-xsession-prefix=${placeholder "out"}" ]; diff --git a/pkgs/desktops/xfce/core/xfdesktop/default.nix b/pkgs/desktops/xfce/core/xfdesktop/default.nix index d47d4769a56..bc6a19346ec 100644 --- a/pkgs/desktops/xfce/core/xfdesktop/default.nix +++ b/pkgs/desktops/xfce/core/xfdesktop/default.nix @@ -1,4 +1,4 @@ -{ mkXfceDerivation, exo, gtk3, libxfce4ui, libxfce4util, libwnck3, xfconf, libnotify, garcon, thunar }: +{ mkXfceDerivation, exo, gtk3, libxfce4ui, libxfce4util, libwnck, xfconf, libnotify, garcon, thunar }: mkXfceDerivation { category = "xfce"; @@ -12,7 +12,7 @@ mkXfceDerivation { gtk3 libxfce4ui libxfce4util - libwnck3 + libwnck xfconf libnotify garcon diff --git a/pkgs/desktops/xfce/core/xfwm4/default.nix b/pkgs/desktops/xfce/core/xfwm4/default.nix index 179da89a521..cc998487f16 100644 --- a/pkgs/desktops/xfce/core/xfwm4/default.nix +++ b/pkgs/desktops/xfce/core/xfwm4/default.nix @@ -1,5 +1,5 @@ { mkXfceDerivation, exo, librsvg, dbus-glib, epoxy, gtk3, libXdamage -, libstartup_notification, libxfce4ui, libxfce4util, libwnck3 +, libstartup_notification, libxfce4ui, libxfce4util, libwnck , libXpresent, xfconf }: mkXfceDerivation { @@ -19,7 +19,7 @@ mkXfceDerivation { libstartup_notification libxfce4ui libxfce4util - libwnck3 + libwnck libXpresent xfconf ]; diff --git a/pkgs/desktops/xfce/panel-plugins/xfce4-namebar-plugin/default.nix b/pkgs/desktops/xfce/panel-plugins/xfce4-namebar-plugin/default.nix index a44e923d356..baba34212fd 100644 --- a/pkgs/desktops/xfce/panel-plugins/xfce4-namebar-plugin/default.nix +++ b/pkgs/desktops/xfce/panel-plugins/xfce4-namebar-plugin/default.nix @@ -1,5 +1,5 @@ { lib, stdenv, pkg-config, fetchFromGitHub, python3, vala_0_46 -, gtk3, libwnck3, libxfce4util, xfce4-panel, wafHook, xfce }: +, gtk3, libwnck, libxfce4util, xfce4-panel, wafHook, xfce }: stdenv.mkDerivation rec { pname = "xfce4-namebar-plugin"; @@ -13,7 +13,7 @@ stdenv.mkDerivation rec { }; nativeBuildInputs = [ pkg-config vala_0_46 wafHook python3 ]; - buildInputs = [ gtk3 libwnck3 libxfce4util xfce4-panel ]; + buildInputs = [ gtk3 libwnck libxfce4util xfce4-panel ]; postPatch = '' substituteInPlace src/namebar.vala --replace 'var dirs = Environment.get_system_data_dirs()' "string[] dirs = { \"$out/share\" }" diff --git a/pkgs/desktops/xfce/panel-plugins/xfce4-windowck-plugin/default.nix b/pkgs/desktops/xfce/panel-plugins/xfce4-windowck-plugin/default.nix index bcd43d328e3..8f4751b1737 100644 --- a/pkgs/desktops/xfce/panel-plugins/xfce4-windowck-plugin/default.nix +++ b/pkgs/desktops/xfce/panel-plugins/xfce4-windowck-plugin/default.nix @@ -1,4 +1,4 @@ -{ lib, stdenv, fetchFromGitHub, pkg-config, intltool, python3, imagemagick, libwnck3, libxfce4ui, xfce4-panel, xfconf, xfce4-dev-tools, xfce }: +{ lib, stdenv, fetchFromGitHub, pkg-config, intltool, python3, imagemagick, libwnck, libxfce4ui, xfce4-panel, xfconf, xfce4-dev-tools, xfce }: stdenv.mkDerivation rec { pname = "xfce4-windowck-plugin"; @@ -19,7 +19,7 @@ stdenv.mkDerivation rec { buildInputs = [ python3 imagemagick - libwnck3 + libwnck libxfce4ui xfce4-panel xfconf diff --git a/pkgs/desktops/xfce/panel-plugins/xfce4-xkb-plugin/default.nix b/pkgs/desktops/xfce/panel-plugins/xfce4-xkb-plugin/default.nix index f24a38c82a3..8145f1a2af0 100644 --- a/pkgs/desktops/xfce/panel-plugins/xfce4-xkb-plugin/default.nix +++ b/pkgs/desktops/xfce/panel-plugins/xfce4-xkb-plugin/default.nix @@ -2,7 +2,7 @@ , mkXfceDerivation , gtk3 , librsvg -, libwnck3 +, libwnck , libxklavier , garcon , libxfce4ui @@ -25,7 +25,7 @@ mkXfceDerivation { libxfce4ui libxfce4util libxklavier - libwnck3 + libwnck xfce4-panel xfconf ]; diff --git a/pkgs/development/libraries/bamf/default.nix b/pkgs/development/libraries/bamf/default.nix index faee853808c..f1a7420fbce 100644 --- a/pkgs/development/libraries/bamf/default.nix +++ b/pkgs/development/libraries/bamf/default.nix @@ -7,7 +7,7 @@ , which , fetchgit , libgtop -, libwnck3 +, libwnck , glib , vala , pkg-config @@ -54,7 +54,7 @@ stdenv.mkDerivation rec { glib libgtop libstartup_notification - libwnck3 + libwnck ]; patches = [ diff --git a/pkgs/development/libraries/libwnck/2.nix b/pkgs/development/libraries/libwnck/2.nix new file mode 100644 index 00000000000..fd7d80574a7 --- /dev/null +++ b/pkgs/development/libraries/libwnck/2.nix @@ -0,0 +1,30 @@ +{ lib, stdenv, fetchurl, pkg-config, gtk2, intltool, xorg }: + +stdenv.mkDerivation rec { + pname = "libwnck"; + version = "2.31.0"; + + src = fetchurl { + url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; + sha256 = "17isfjvrzgj5znld2a7zsk9vd39q9wnsysnw5jr8iz410z935xw3"; + }; + + outputs = [ "out" "dev" "devdoc" ]; + outputBin = "dev"; + + nativeBuildInputs = [ pkg-config ]; + buildInputs = [ gtk2 intltool xorg.libX11 xorg.libXres ]; + # ?another optional: startup-notification + + configureFlags = [ "--disable-introspection" ]; # not needed anywhere AFAIK + + meta = { + description = "A library for creating task lists and pagers"; + homepage = "https://gitlab.gnome.org/GNOME/libwnck"; + license = lib.licenses.lgpl21; + maintainers = with lib.maintainers; [ johnazoidberg ]; + # ./xutils.h:31:10: fatal error: 'gdk/gdkx.h' file not found + # #include + broken = stdenv.isDarwin; + }; +} diff --git a/pkgs/development/libraries/libwnck/3.x.nix b/pkgs/development/libraries/libwnck/3.x.nix deleted file mode 100644 index 425a1bab355..00000000000 --- a/pkgs/development/libraries/libwnck/3.x.nix +++ /dev/null @@ -1,76 +0,0 @@ -{ lib, stdenv -, fetchurl -, fetchpatch -, meson -, ninja -, pkg-config -, gtk-doc -, docbook_xsl -, docbook_xml_dtd_412 -, libX11 -, glib -, gtk3 -, pango -, cairo -, libXres -, libstartup_notification -, gettext -, gobject-introspection -, gnome -}: - -stdenv.mkDerivation rec { - pname = "libwnck"; - version = "3.36.0"; - - outputs = [ "out" "dev" "devdoc" ]; - outputBin = "dev"; - - src = fetchurl { - url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; - sha256 = "0pwjdhca9lz2n1gf9b60xf0m6ipf9snp8rqf9csj4pgdnd882l5w"; - }; - - nativeBuildInputs = [ - meson - ninja - pkg-config - gettext - gobject-introspection - gtk-doc - docbook_xsl - docbook_xml_dtd_412 - ]; - - buildInputs = [ - libX11 - libstartup_notification - pango - cairo - libXres - ]; - - propagatedBuildInputs = [ - glib - gtk3 - ]; - - mesonFlags = [ - "-Dgtk_doc=true" - ]; - - passthru = { - updateScript = gnome.updateScript { - packageName = pname; - attrPath = "${pname}${lib.versions.major version}"; - versionPolicy = "odd-unstable"; - }; - }; - - meta = with lib; { - description = "Library to manage X windows and workspaces (via pagers, tasklists, etc.)"; - license = licenses.lgpl21Plus; - platforms = platforms.linux; - maintainers = [ ]; - }; -} diff --git a/pkgs/development/libraries/libwnck/default.nix b/pkgs/development/libraries/libwnck/default.nix index fd7d80574a7..39a1d505b65 100644 --- a/pkgs/development/libraries/libwnck/default.nix +++ b/pkgs/development/libraries/libwnck/default.nix @@ -1,30 +1,76 @@ -{ lib, stdenv, fetchurl, pkg-config, gtk2, intltool, xorg }: +{ lib, stdenv +, fetchurl +, fetchpatch +, meson +, ninja +, pkg-config +, gtk-doc +, docbook_xsl +, docbook_xml_dtd_412 +, libX11 +, glib +, gtk3 +, pango +, cairo +, libXres +, libstartup_notification +, gettext +, gobject-introspection +, gnome +}: stdenv.mkDerivation rec { pname = "libwnck"; - version = "2.31.0"; + version = "3.36.0"; + + outputs = [ "out" "dev" "devdoc" ]; + outputBin = "dev"; src = fetchurl { url = "mirror://gnome/sources/${pname}/${lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; - sha256 = "17isfjvrzgj5znld2a7zsk9vd39q9wnsysnw5jr8iz410z935xw3"; + sha256 = "0pwjdhca9lz2n1gf9b60xf0m6ipf9snp8rqf9csj4pgdnd882l5w"; }; - outputs = [ "out" "dev" "devdoc" ]; - outputBin = "dev"; + nativeBuildInputs = [ + meson + ninja + pkg-config + gettext + gobject-introspection + gtk-doc + docbook_xsl + docbook_xml_dtd_412 + ]; + + buildInputs = [ + libX11 + libstartup_notification + pango + cairo + libXres + ]; - nativeBuildInputs = [ pkg-config ]; - buildInputs = [ gtk2 intltool xorg.libX11 xorg.libXres ]; - # ?another optional: startup-notification + propagatedBuildInputs = [ + glib + gtk3 + ]; - configureFlags = [ "--disable-introspection" ]; # not needed anywhere AFAIK + mesonFlags = [ + "-Dgtk_doc=true" + ]; + + passthru = { + updateScript = gnome.updateScript { + packageName = pname; + attrPath = "${pname}${lib.versions.major version}"; + versionPolicy = "odd-unstable"; + }; + }; - meta = { - description = "A library for creating task lists and pagers"; - homepage = "https://gitlab.gnome.org/GNOME/libwnck"; - license = lib.licenses.lgpl21; - maintainers = with lib.maintainers; [ johnazoidberg ]; - # ./xutils.h:31:10: fatal error: 'gdk/gdkx.h' file not found - # #include - broken = stdenv.isDarwin; + meta = with lib; { + description = "Library to manage X windows and workspaces (via pagers, tasklists, etc.)"; + license = licenses.lgpl21Plus; + platforms = platforms.linux; + maintainers = with maintainers; [ liff ]; }; } diff --git a/pkgs/development/tools/misc/d-feet/default.nix b/pkgs/development/tools/misc/d-feet/default.nix index a44b5ed8c76..3db895f4de0 100644 --- a/pkgs/development/tools/misc/d-feet/default.nix +++ b/pkgs/development/tools/misc/d-feet/default.nix @@ -8,7 +8,7 @@ , python3 , wrapGAppsHook , gnome -, libwnck3 +, libwnck , gobject-introspection , gettext , itstool @@ -40,7 +40,7 @@ python3.pkgs.buildPythonApplication rec { glib gnome.adwaita-icon-theme gtk3 - libwnck3 + libwnck ]; propagatedBuildInputs = with python3.pkgs; [ diff --git a/pkgs/tools/misc/clipster/default.nix b/pkgs/tools/misc/clipster/default.nix index 7da185050fb..4e278b8cc62 100644 --- a/pkgs/tools/misc/clipster/default.nix +++ b/pkgs/tools/misc/clipster/default.nix @@ -1,4 +1,4 @@ -{fetchFromGitHub , lib, stdenv, python3, gtk3, libwnck3, +{fetchFromGitHub , lib, stdenv, python3, gtk3, libwnck, gobject-introspection, wrapGAppsHook }: stdenv.mkDerivation rec { @@ -14,7 +14,7 @@ stdenv.mkDerivation rec { pythonEnv = python3.withPackages(ps: with ps; [ pygobject3 ]); - buildInputs = [ pythonEnv gtk3 libwnck3 gobject-introspection wrapGAppsHook ]; + buildInputs = [ pythonEnv gtk3 libwnck gobject-introspection wrapGAppsHook ]; installPhase = '' sed -i 's/python/python3/g' clipster diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index cc4d33024b0..018b746a51f 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -419,6 +419,7 @@ mapAliases ({ libsexy = throw "libsexy has been removed from nixpkgs, as it's abandoned and no package needed it."; # 2019-12-10 libstdcxxHook = throw "libstdcxx hook has been removed because cc-wrapper is now directly aware of the c++ standard library intended to be used."; # 2020-06-22 libqmatrixclient = throw "libqmatrixclient was renamed to libquotient"; # added 2020-04-09 + libwnck3 = libwnck; lilypond-unstable = lilypond; # added 2021-03-11 links = links2; # added 2016-01-31 linux_rpi0 = linux_rpi1; diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index cb94c1b5146..897ce358e0f 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -17063,9 +17063,8 @@ in libwmf = callPackage ../development/libraries/libwmf { }; - libwnck = libwnck2; - libwnck2 = callPackage ../development/libraries/libwnck { }; - libwnck3 = callPackage ../development/libraries/libwnck/3.x.nix { }; + libwnck = callPackage ../development/libraries/libwnck { }; + libwnck2 = callPackage ../development/libraries/libwnck/2.nix { }; libwpd = callPackage ../development/libraries/libwpd { }; diff --git a/pkgs/top-level/perl-packages.nix b/pkgs/top-level/perl-packages.nix index db2359def2b..36efc12582c 100644 --- a/pkgs/top-level/perl-packages.nix +++ b/pkgs/top-level/perl-packages.nix @@ -8930,7 +8930,7 @@ let url = "mirror://cpan/authors/id/T/TS/TSCH/Gnome2-Wnck-0.16.tar.gz"; sha256 = "604a8ece88ac29f132d59b0caac27657ec31371c1606a4698a2160e88ac586e5"; }; - buildInputs = [ pkgs.libwnck pkgs.glib pkgs.gtk2 ]; + buildInputs = [ pkgs.libwnck2 pkgs.glib pkgs.gtk2 ]; propagatedBuildInputs = [ Gtk2 ]; meta = { description = "Perl interface to the Window Navigator Construction Kit"; -- cgit 1.4.1 From c223fd60072771c8dea3bba2f8f866302aa4c956 Mon Sep 17 00:00:00 2001 From: Niklas Hambüchen Date: Fri, 25 Jun 2021 02:27:03 +0200 Subject: release notes: Mention consul breaking changes --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 8 ++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ 2 files changed, 10 insertions(+) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index bb00cde0195..50403cc319b 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -79,6 +79,14 @@ fetchConfigured = false;. + + + consul was upgraded to a new major release + with breaking changes, see + upstream + changelog. + + fsharp41 has been removed in preference to use the latest diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index e8a75151736..bff791bc85d 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -26,6 +26,8 @@ In addition to numerous new and upgraded packages, this release has the followin - Those making use of `buildBazelPackage` will need to regenerate the fetch hashes (preferred), or set `fetchConfigured = false;`. +- `consul` was upgraded to a new major release with breaking changes, see [upstream changelog](https://github.com/hashicorp/consul/releases/tag/v1.10.0). + - fsharp41 has been removed in preference to use the latest dotnet-sdk - The following F#-related packages have been removed for being unmaintaned. Please use `fetchNuGet` for specific packages. -- cgit 1.4.1 From b7a2309786b75989fb31816439f7e52a31cc64b3 Mon Sep 17 00:00:00 2001 From: Felix Singer Date: Sat, 26 Jun 2021 03:37:52 +0200 Subject: flashrom: Install udev-rules file Add the udev-rules file from flashrom source to the out directory. The file contains rules for programmers used by flashrom. Members of the `flashrom` system group are allowed to access these devices. Also, add a module for installing flashrom and adding flashrom to udev packages. The module can be used by setting `programs.flashrom.enable` to `true`. Signed-off-by: Felix Singer --- .../from_md/release-notes/rl-2111.section.xml | 8 +++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ nixos/modules/module-list.nix | 1 + nixos/modules/programs/flashrom.nix | 26 ++++++++++++++++++++++ pkgs/tools/misc/flashrom/default.nix | 6 +++++ 5 files changed, 43 insertions(+) create mode 100644 nixos/modules/programs/flashrom.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 896a797cefb..abd10a6f9a7 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -48,6 +48,14 @@ networking.ucarp. + + + Users of flashrom should migrate to + programs.flashrom.enable + and add themselves to the flashrom group to + be able to access programmers supported by flashrom. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index afb12996041..1b7250a1815 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -16,6 +16,8 @@ In addition to numerous new and upgraded packages, this release has the followin - [ucarp](https://download.pureftpd.org/pub/ucarp/README), an userspace implementation of the Common Address Redundancy Protocol (CARP). Available as [networking.ucarp](options.html#opt-networking.ucarp.enable). +- Users of flashrom should migrate to [programs.flashrom.enable](options.html#opt-programs.flashrom.enable) and add themselves to the `flashrom` group to be able to access programmers supported by flashrom. + ## Backward Incompatibilities {#sec-release-21.11-incompatibilities} - The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 8a96b42c556..a54533f7af1 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -138,6 +138,7 @@ ./programs/file-roller.nix ./programs/firejail.nix ./programs/fish.nix + ./programs/flashrom.nix ./programs/flexoptix-app.nix ./programs/freetds.nix ./programs/fuse.nix diff --git a/nixos/modules/programs/flashrom.nix b/nixos/modules/programs/flashrom.nix new file mode 100644 index 00000000000..f026c2e31cd --- /dev/null +++ b/nixos/modules/programs/flashrom.nix @@ -0,0 +1,26 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.programs.flashrom; +in +{ + options.programs.flashrom = { + enable = mkOption { + type = types.bool; + default = false; + description = '' + Installs flashrom and configures udev rules for programmers + used by flashrom. Grants access to users in the "flashrom" + group. + ''; + }; + }; + + config = mkIf cfg.enable { + services.udev.packages = [ pkgs.flashrom ]; + environment.systemPackages = [ pkgs.flashrom ]; + users.groups.flashrom = { }; + }; +} diff --git a/pkgs/tools/misc/flashrom/default.nix b/pkgs/tools/misc/flashrom/default.nix index 66a8b213403..07a2d02b0b2 100644 --- a/pkgs/tools/misc/flashrom/default.nix +++ b/pkgs/tools/misc/flashrom/default.nix @@ -19,11 +19,17 @@ stdenv.mkDerivation rec { sha256 = "0ax4kqnh7kd3z120ypgp73qy1knz47l6qxsqzrfkd97mh5cdky71"; }; + postPatch = '' + substituteInPlace util/z60_flashrom.rules \ + --replace "plugdev" "flashrom" + ''; + # Meson build doesn't build and install manpage. Only Makefile can. # Build manpage from source directory. Here we're inside the ./build subdirectory postInstall = '' make flashrom.8 -C .. installManPage ../flashrom.8 + install -Dm644 ../util/z60_flashrom.rules $out/etc/udev/rules.d/flashrom.rules ''; mesonFlags = lib.optionals stdenv.isAarch64 [ "-Dpciutils=false" ]; -- cgit 1.4.1 From dc1b56c714095d787f52c45c83723944dfeef779 Mon Sep 17 00:00:00 2001 From: K900 Date: Thu, 1 Jul 2021 12:14:51 +0300 Subject: vaultwarden: update to 1.22.1, rename from bitwarden_rs I tried to make this as non-breaking as possible, but it will still break things slightly for people expecting certain file names in the packages themselves. --- .../from_md/release-notes/rl-2111.section.xml | 110 ++++++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 26 +++ nixos/modules/module-list.nix | 2 +- .../services/security/bitwarden_rs/backup.sh | 17 -- .../services/security/bitwarden_rs/default.nix | 161 ------------------ .../services/security/vaultwarden/backup.sh | 17 ++ .../services/security/vaultwarden/default.nix | 168 ++++++++++++++++++ nixos/tests/all-tests.nix | 2 +- nixos/tests/bitwarden.nix | 189 --------------------- nixos/tests/vaultwarden.nix | 189 +++++++++++++++++++++ .../python-modules/selenium/default.nix | 2 +- pkgs/tools/security/bitwarden_rs/default.nix | 46 ----- pkgs/tools/security/bitwarden_rs/vault.nix | 28 --- pkgs/tools/security/vaultwarden/default.nix | 47 +++++ pkgs/tools/security/vaultwarden/vault.nix | 28 +++ pkgs/top-level/aliases.nix | 8 + pkgs/top-level/all-packages.nix | 18 +- 17 files changed, 605 insertions(+), 453 deletions(-) delete mode 100644 nixos/modules/services/security/bitwarden_rs/backup.sh delete mode 100644 nixos/modules/services/security/bitwarden_rs/default.nix create mode 100644 nixos/modules/services/security/vaultwarden/backup.sh create mode 100644 nixos/modules/services/security/vaultwarden/default.nix delete mode 100644 nixos/tests/bitwarden.nix create mode 100644 nixos/tests/vaultwarden.nix delete mode 100644 pkgs/tools/security/bitwarden_rs/default.nix delete mode 100644 pkgs/tools/security/bitwarden_rs/vault.nix create mode 100644 pkgs/tools/security/vaultwarden/default.nix create mode 100644 pkgs/tools/security/vaultwarden/vault.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index abd10a6f9a7..6f4079ea9bb 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -339,6 +339,116 @@ release instead of the old 2.31.0 version. + + + The bitwarden_rs packages and modules were + renamed to vaultwarden + following + upstream. More specifically, + + + + + pkgs.bitwarden_rs, + pkgs.bitwarden_rs-sqlite, + pkgs.bitwarden_rs-mysql and + pkgs.bitwarden_rs-postgresql were + renamed to pkgs.vaultwarden, + pkgs.vaultwarden-sqlite, + pkgs.vaultwarden-mysql and + pkgs.vaultwarden-postgresql, + respectively. + + + + + Old names are preserved as aliases for backwards + compatibility, but may be removed in the future. + + + + + The bitwarden_rs executable was + also renamed to vaultwarden in all + packages. + + + + + + + pkgs.bitwarden_rs-vault was renamed to + pkgs.vaultwarden-vault. + + + + + pkgs.bitwarden_rs-vault is + preserved as an alias for backwards compatibility, but + may be removed in the future. + + + + + The static files were moved from + /usr/share/bitwarden_rs to + /usr/share/vaultwarden. + + + + + + + The services.bitwarden_rs config module + was renamed to services.vaultwarden. + + + + + services.bitwarden_rs is preserved + as an alias for backwards compatibility, but may be + removed in the future. + + + + + + + systemd.services.bitwarden_rs, + systemd.services.backup-bitwarden_rs + and systemd.timers.backup-bitwarden_rs + were renamed to + systemd.services.vaultwarden, + systemd.services.backup-vaultwarden and + systemd.timers.backup-vaultwarden, + respectively. + + + + + Old names are preserved as aliases for backwards + compatibility, but may be removed in the future. + + + + + + + users.users.bitwarden_rs and + users.groups.bitwarden_rs were renamed + to users.users.vaultwarden and + users.groups.vaultwarden, respectively. + + + + + The data directory remains located at + /var/lib/bitwarden_rs, for backwards + compatibility. + + + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 1b7250a1815..1f532a296ea 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -85,6 +85,32 @@ In addition to numerous new and upgraded packages, this release has the followin * The `libwnck` package now defaults to the 3.x release instead of the old 2.31.0 version. +* The `bitwarden_rs` packages and modules were renamed to `vaultwarden` + [following upstream](https://github.com/dani-garcia/vaultwarden/discussions/1642). More specifically, + + * `pkgs.bitwarden_rs`, `pkgs.bitwarden_rs-sqlite`, `pkgs.bitwarden_rs-mysql` and + `pkgs.bitwarden_rs-postgresql` were renamed to `pkgs.vaultwarden`, `pkgs.vaultwarden-sqlite`, + `pkgs.vaultwarden-mysql` and `pkgs.vaultwarden-postgresql`, respectively. + * Old names are preserved as aliases for backwards compatibility, but may be removed in the future. + * The `bitwarden_rs` executable was also renamed to `vaultwarden` in all packages. + + * `pkgs.bitwarden_rs-vault` was renamed to `pkgs.vaultwarden-vault`. + * `pkgs.bitwarden_rs-vault` is preserved as an alias for backwards compatibility, but may be removed in the future. + * The static files were moved from `/usr/share/bitwarden_rs` to `/usr/share/vaultwarden`. + + * The `services.bitwarden_rs` config module was renamed to `services.vaultwarden`. + * `services.bitwarden_rs` is preserved as an alias for backwards compatibility, but may be removed in the future. + + * `systemd.services.bitwarden_rs`, `systemd.services.backup-bitwarden_rs` and `systemd.timers.backup-bitwarden_rs` + were renamed to `systemd.services.vaultwarden`, `systemd.services.backup-vaultwarden` and + `systemd.timers.backup-vaultwarden`, respectively. + * Old names are preserved as aliases for backwards compatibility, but may be removed in the future. + + * `users.users.bitwarden_rs` and `users.groups.bitwarden_rs` were renamed to `users.users.vaultwarden` and + `users.groups.vaultwarden`, respectively. + + * The data directory remains located at `/var/lib/bitwarden_rs`, for backwards compatibility. + ## Other Notable Changes {#sec-release-21.11-notable-changes} - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets. diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 2d0f5d37f9e..7eb4c7e922e 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -874,7 +874,6 @@ ./services/search/hound.nix ./services/search/kibana.nix ./services/search/solr.nix - ./services/security/bitwarden_rs/default.nix ./services/security/certmgr.nix ./services/security/cfssl.nix ./services/security/clamav.nix @@ -900,6 +899,7 @@ ./services/security/torsocks.nix ./services/security/usbguard.nix ./services/security/vault.nix + ./services/security/vaultwarden/default.nix ./services/security/yubikey-agent.nix ./services/system/cloud-init.nix ./services/system/dbus.nix diff --git a/nixos/modules/services/security/bitwarden_rs/backup.sh b/nixos/modules/services/security/bitwarden_rs/backup.sh deleted file mode 100644 index 264a7da9cbb..00000000000 --- a/nixos/modules/services/security/bitwarden_rs/backup.sh +++ /dev/null @@ -1,17 +0,0 @@ -#!/usr/bin/env bash - -# Based on: https://github.com/dani-garcia/bitwarden_rs/wiki/Backing-up-your-vault -if ! mkdir -p "$BACKUP_FOLDER"; then - echo "Could not create backup folder '$BACKUP_FOLDER'" >&2 - exit 1 -fi - -if [[ ! -f "$DATA_FOLDER"/db.sqlite3 ]]; then - echo "Could not find SQLite database file '$DATA_FOLDER/db.sqlite3'" >&2 - exit 1 -fi - -sqlite3 "$DATA_FOLDER"/db.sqlite3 ".backup '$BACKUP_FOLDER/db.sqlite3'" -cp "$DATA_FOLDER"/rsa_key.{der,pem,pub.der} "$BACKUP_FOLDER" -cp -r "$DATA_FOLDER"/attachments "$BACKUP_FOLDER" -cp -r "$DATA_FOLDER"/icon_cache "$BACKUP_FOLDER" diff --git a/nixos/modules/services/security/bitwarden_rs/default.nix b/nixos/modules/services/security/bitwarden_rs/default.nix deleted file mode 100644 index bed59dbf821..00000000000 --- a/nixos/modules/services/security/bitwarden_rs/default.nix +++ /dev/null @@ -1,161 +0,0 @@ -{ config, lib, pkgs, ... }: - -with lib; - -let - cfg = config.services.bitwarden_rs; - user = config.users.users.bitwarden_rs.name; - group = config.users.groups.bitwarden_rs.name; - - # Convert name from camel case (e.g. disable2FARemember) to upper case snake case (e.g. DISABLE_2FA_REMEMBER). - nameToEnvVar = name: - let - parts = builtins.split "([A-Z0-9]+)" name; - partsToEnvVar = parts: foldl' (key: x: let last = stringLength key - 1; in - if isList x then key + optionalString (key != "" && substring last 1 key != "_") "_" + head x - else if key != "" && elem (substring 0 1 x) lowerChars then # to handle e.g. [ "disable" [ "2FAR" ] "emember" ] - substring 0 last key + optionalString (substring (last - 1) 1 key != "_") "_" + substring last 1 key + toUpper x - else key + toUpper x) "" parts; - in if builtins.match "[A-Z0-9_]+" name != null then name else partsToEnvVar parts; - - # Due to the different naming schemes allowed for config keys, - # we can only check for values consistently after converting them to their corresponding environment variable name. - configEnv = - let - configEnv = listToAttrs (concatLists (mapAttrsToList (name: value: - if value != null then [ (nameValuePair (nameToEnvVar name) (if isBool value then boolToString value else toString value)) ] else [] - ) cfg.config)); - in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") { - WEB_VAULT_FOLDER = "${pkgs.bitwarden_rs-vault}/share/bitwarden_rs/vault"; - } // configEnv; - - configFile = pkgs.writeText "bitwarden_rs.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv)); - - bitwarden_rs = pkgs.bitwarden_rs.override { inherit (cfg) dbBackend; }; - -in { - options.services.bitwarden_rs = with types; { - enable = mkEnableOption "bitwarden_rs"; - - dbBackend = mkOption { - type = enum [ "sqlite" "mysql" "postgresql" ]; - default = "sqlite"; - description = '' - Which database backend bitwarden_rs will be using. - ''; - }; - - backupDir = mkOption { - type = nullOr str; - default = null; - description = '' - The directory under which bitwarden_rs will backup its persistent data. - ''; - }; - - config = mkOption { - type = attrsOf (nullOr (oneOf [ bool int str ])); - default = {}; - example = literalExample '' - { - domain = "https://bw.domain.tld:8443"; - signupsAllowed = true; - rocketPort = 8222; - rocketLog = "critical"; - } - ''; - description = '' - The configuration of bitwarden_rs is done through environment variables, - therefore the names are converted from camel case (e.g. disable2FARemember) - to upper case snake case (e.g. DISABLE_2FA_REMEMBER). - In this conversion digits (0-9) are handled just like upper case characters, - so foo2 would be converted to FOO_2. - Names already in this format remain unchanged, so FOO2 remains FOO2 if passed as such, - even though foo2 would have been converted to FOO_2. - This allows working around any potential future conflicting naming conventions. - - Based on the attributes passed to this config option an environment file will be generated - that is passed to bitwarden_rs's systemd service. - - The available configuration options can be found in - the environment template file. - ''; - }; - - environmentFile = mkOption { - type = with types; nullOr path; - default = null; - example = "/root/bitwarden_rs.env"; - description = '' - Additional environment file as defined in - systemd.exec5 - . - - Secrets like ADMIN_TOKEN and SMTP_PASSWORD - may be passed to the service without adding them to the world-readable Nix store. - - Note that this file needs to be available on the host on which - bitwarden_rs is running. - ''; - }; - }; - - config = mkIf cfg.enable { - assertions = [ { - assertion = cfg.backupDir != null -> cfg.dbBackend == "sqlite"; - message = "Backups for database backends other than sqlite will need customization"; - } ]; - - users.users.bitwarden_rs = { - inherit group; - isSystemUser = true; - }; - users.groups.bitwarden_rs = { }; - - systemd.services.bitwarden_rs = { - after = [ "network.target" ]; - path = with pkgs; [ openssl ]; - serviceConfig = { - User = user; - Group = group; - EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile; - ExecStart = "${bitwarden_rs}/bin/bitwarden_rs"; - LimitNOFILE = "1048576"; - PrivateTmp = "true"; - PrivateDevices = "true"; - ProtectHome = "true"; - ProtectSystem = "strict"; - AmbientCapabilities = "CAP_NET_BIND_SERVICE"; - StateDirectory = "bitwarden_rs"; - }; - wantedBy = [ "multi-user.target" ]; - }; - - systemd.services.backup-bitwarden_rs = mkIf (cfg.backupDir != null) { - description = "Backup bitwarden_rs"; - environment = { - DATA_FOLDER = "/var/lib/bitwarden_rs"; - BACKUP_FOLDER = cfg.backupDir; - }; - path = with pkgs; [ sqlite ]; - serviceConfig = { - SyslogIdentifier = "backup-bitwarden_rs"; - Type = "oneshot"; - User = mkDefault user; - Group = mkDefault group; - ExecStart = "${pkgs.bash}/bin/bash ${./backup.sh}"; - }; - wantedBy = [ "multi-user.target" ]; - }; - - systemd.timers.backup-bitwarden_rs = mkIf (cfg.backupDir != null) { - description = "Backup bitwarden_rs on time"; - timerConfig = { - OnCalendar = mkDefault "23:00"; - Persistent = "true"; - Unit = "backup-bitwarden_rs.service"; - }; - wantedBy = [ "multi-user.target" ]; - }; - }; -} diff --git a/nixos/modules/services/security/vaultwarden/backup.sh b/nixos/modules/services/security/vaultwarden/backup.sh new file mode 100644 index 00000000000..2a3de0ab1de --- /dev/null +++ b/nixos/modules/services/security/vaultwarden/backup.sh @@ -0,0 +1,17 @@ +#!/usr/bin/env bash + +# Based on: https://github.com/dani-garcia/vaultwarden/wiki/Backing-up-your-vault +if ! mkdir -p "$BACKUP_FOLDER"; then + echo "Could not create backup folder '$BACKUP_FOLDER'" >&2 + exit 1 +fi + +if [[ ! -f "$DATA_FOLDER"/db.sqlite3 ]]; then + echo "Could not find SQLite database file '$DATA_FOLDER/db.sqlite3'" >&2 + exit 1 +fi + +sqlite3 "$DATA_FOLDER"/db.sqlite3 ".backup '$BACKUP_FOLDER/db.sqlite3'" +cp "$DATA_FOLDER"/rsa_key.{der,pem,pub.der} "$BACKUP_FOLDER" +cp -r "$DATA_FOLDER"/attachments "$BACKUP_FOLDER" +cp -r "$DATA_FOLDER"/icon_cache "$BACKUP_FOLDER" diff --git a/nixos/modules/services/security/vaultwarden/default.nix b/nixos/modules/services/security/vaultwarden/default.nix new file mode 100644 index 00000000000..940ac7832da --- /dev/null +++ b/nixos/modules/services/security/vaultwarden/default.nix @@ -0,0 +1,168 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.services.vaultwarden; + user = config.users.users.vaultwarden.name; + group = config.users.groups.vaultwarden.name; + + # Convert name from camel case (e.g. disable2FARemember) to upper case snake case (e.g. DISABLE_2FA_REMEMBER). + nameToEnvVar = name: + let + parts = builtins.split "([A-Z0-9]+)" name; + partsToEnvVar = parts: foldl' (key: x: let last = stringLength key - 1; in + if isList x then key + optionalString (key != "" && substring last 1 key != "_") "_" + head x + else if key != "" && elem (substring 0 1 x) lowerChars then # to handle e.g. [ "disable" [ "2FAR" ] "emember" ] + substring 0 last key + optionalString (substring (last - 1) 1 key != "_") "_" + substring last 1 key + toUpper x + else key + toUpper x) "" parts; + in if builtins.match "[A-Z0-9_]+" name != null then name else partsToEnvVar parts; + + # Due to the different naming schemes allowed for config keys, + # we can only check for values consistently after converting them to their corresponding environment variable name. + configEnv = + let + configEnv = listToAttrs (concatLists (mapAttrsToList (name: value: + if value != null then [ (nameValuePair (nameToEnvVar name) (if isBool value then boolToString value else toString value)) ] else [] + ) cfg.config)); + in { DATA_FOLDER = "/var/lib/bitwarden_rs"; } // optionalAttrs (!(configEnv ? WEB_VAULT_ENABLED) || configEnv.WEB_VAULT_ENABLED == "true") { + WEB_VAULT_FOLDER = "${pkgs.vaultwarden-vault}/share/vaultwarden/vault"; + } // configEnv; + + configFile = pkgs.writeText "vaultwarden.env" (concatStrings (mapAttrsToList (name: value: "${name}=${value}\n") configEnv)); + + vaultwarden = pkgs.vaultwarden.override { inherit (cfg) dbBackend; }; + +in { + imports = [ + (mkRenamedOptionModule [ "services" "bitwarden_rs" ] [ "services" "vaultwarden" ]) + ]; + + options.services.vaultwarden = with types; { + enable = mkEnableOption "vaultwarden"; + + dbBackend = mkOption { + type = enum [ "sqlite" "mysql" "postgresql" ]; + default = "sqlite"; + description = '' + Which database backend vaultwarden will be using. + ''; + }; + + backupDir = mkOption { + type = nullOr str; + default = null; + description = '' + The directory under which vaultwarden will backup its persistent data. + ''; + }; + + config = mkOption { + type = attrsOf (nullOr (oneOf [ bool int str ])); + default = {}; + example = literalExample '' + { + domain = "https://bw.domain.tld:8443"; + signupsAllowed = true; + rocketPort = 8222; + rocketLog = "critical"; + } + ''; + description = '' + The configuration of vaultwarden is done through environment variables, + therefore the names are converted from camel case (e.g. disable2FARemember) + to upper case snake case (e.g. DISABLE_2FA_REMEMBER). + In this conversion digits (0-9) are handled just like upper case characters, + so foo2 would be converted to FOO_2. + Names already in this format remain unchanged, so FOO2 remains FOO2 if passed as such, + even though foo2 would have been converted to FOO_2. + This allows working around any potential future conflicting naming conventions. + + Based on the attributes passed to this config option an environment file will be generated + that is passed to vaultwarden's systemd service. + + The available configuration options can be found in + the environment template file. + ''; + }; + + environmentFile = mkOption { + type = with types; nullOr path; + default = null; + example = "/root/vaultwarden.env"; + description = '' + Additional environment file as defined in + systemd.exec5 + . + + Secrets like ADMIN_TOKEN and SMTP_PASSWORD + may be passed to the service without adding them to the world-readable Nix store. + + Note that this file needs to be available on the host on which + vaultwarden is running. + ''; + }; + }; + + config = mkIf cfg.enable { + assertions = [ { + assertion = cfg.backupDir != null -> cfg.dbBackend == "sqlite"; + message = "Backups for database backends other than sqlite will need customization"; + } ]; + + users.users.vaultwarden = { + inherit group; + isSystemUser = true; + }; + users.groups.vaultwarden = { }; + + systemd.services.vaultwarden = { + aliases = [ "bitwarden_rs" ]; + after = [ "network.target" ]; + path = with pkgs; [ openssl ]; + serviceConfig = { + User = user; + Group = group; + EnvironmentFile = [ configFile ] ++ optional (cfg.environmentFile != null) cfg.environmentFile; + ExecStart = "${vaultwarden}/bin/vaultwarden"; + LimitNOFILE = "1048576"; + PrivateTmp = "true"; + PrivateDevices = "true"; + ProtectHome = "true"; + ProtectSystem = "strict"; + AmbientCapabilities = "CAP_NET_BIND_SERVICE"; + StateDirectory = "bitwarden_rs"; + }; + wantedBy = [ "multi-user.target" ]; + }; + + systemd.services.backup-vaultwarden = mkIf (cfg.backupDir != null) { + aliases = [ "backup-bitwarden_rs" ]; + description = "Backup vaultwarden"; + environment = { + DATA_FOLDER = "/var/lib/bitwarden_rs"; + BACKUP_FOLDER = cfg.backupDir; + }; + path = with pkgs; [ sqlite ]; + serviceConfig = { + SyslogIdentifier = "backup-vaultwarden"; + Type = "oneshot"; + User = mkDefault user; + Group = mkDefault group; + ExecStart = "${pkgs.bash}/bin/bash ${./backup.sh}"; + }; + wantedBy = [ "multi-user.target" ]; + }; + + systemd.timers.backup-vaultwarden = mkIf (cfg.backupDir != null) { + aliases = [ "backup-bitwarden_rs" ]; + description = "Backup vaultwarden on time"; + timerConfig = { + OnCalendar = mkDefault "23:00"; + Persistent = "true"; + Unit = "backup-vaultwarden.service"; + }; + wantedBy = [ "multi-user.target" ]; + }; + }; +} diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix index b5126be8af7..4c72f30f7be 100644 --- a/nixos/tests/all-tests.nix +++ b/nixos/tests/all-tests.nix @@ -42,7 +42,6 @@ in bind = handleTest ./bind.nix {}; bitcoind = handleTest ./bitcoind.nix {}; bittorrent = handleTest ./bittorrent.nix {}; - bitwarden = handleTest ./bitwarden.nix {}; blockbook-frontend = handleTest ./blockbook-frontend.nix {}; boot = handleTestOn ["x86_64-linux"] ./boot.nix {}; # syslinux is unsupported on aarch64 boot-stage1 = handleTest ./boot-stage1.nix {}; @@ -446,6 +445,7 @@ in v2ray = handleTest ./v2ray.nix {}; vault = handleTest ./vault.nix {}; vault-postgresql = handleTest ./vault-postgresql.nix {}; + vaultwarden = handleTest ./vaultwarden.nix {}; vector = handleTest ./vector.nix {}; victoriametrics = handleTest ./victoriametrics.nix {}; virtualbox = handleTestOn ["x86_64-linux"] ./virtualbox.nix {}; diff --git a/nixos/tests/bitwarden.nix b/nixos/tests/bitwarden.nix deleted file mode 100644 index f64cf171f01..00000000000 --- a/nixos/tests/bitwarden.nix +++ /dev/null @@ -1,189 +0,0 @@ -{ system ? builtins.currentSystem -, config ? { } -, pkgs ? import ../.. { inherit system config; } -}: - -# These tests will: -# * Set up a bitwarden-rs server -# * Have Firefox use the web vault to create an account, log in, and save a password to the valut -# * Have the bw cli log in and read that password from the vault -# -# Note that Firefox must be on the same machine as the server for WebCrypto APIs to be available (or HTTPS must be configured) -# -# The same tests should work without modification on the official bitwarden server, if we ever package that. - -with import ../lib/testing-python.nix { inherit system pkgs; }; -with pkgs.lib; -let - backends = [ "sqlite" "mysql" "postgresql" ]; - - dbPassword = "please_dont_hack"; - - userEmail = "meow@example.com"; - userPassword = "also_super_secret_ZJWpBKZi668QGt"; # Must be complex to avoid interstitial warning on the signup page - - storedPassword = "seeeecret"; - - makeBitwardenTest = backend: makeTest { - name = "bitwarden_rs-${backend}"; - meta = { - maintainers = with pkgs.lib.maintainers; [ jjjollyjim ]; - }; - - nodes = { - server = { pkgs, ... }: - let backendConfig = { - mysql = { - services.mysql = { - enable = true; - initialScript = pkgs.writeText "mysql-init.sql" '' - CREATE DATABASE bitwarden; - CREATE USER 'bitwardenuser'@'localhost' IDENTIFIED BY '${dbPassword}'; - GRANT ALL ON `bitwarden`.* TO 'bitwardenuser'@'localhost'; - FLUSH PRIVILEGES; - ''; - package = pkgs.mariadb; - }; - - services.bitwarden_rs.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden"; - - systemd.services.bitwarden_rs.after = [ "mysql.service" ]; - }; - - postgresql = { - services.postgresql = { - enable = true; - initialScript = pkgs.writeText "postgresql-init.sql" '' - CREATE DATABASE bitwarden; - CREATE USER bitwardenuser WITH PASSWORD '${dbPassword}'; - GRANT ALL PRIVILEGES ON DATABASE bitwarden TO bitwardenuser; - ''; - }; - - services.bitwarden_rs.config.databaseUrl = "postgresql://bitwardenuser:${dbPassword}@localhost/bitwarden"; - - systemd.services.bitwarden_rs.after = [ "postgresql.service" ]; - }; - - sqlite = { }; - }; - in - mkMerge [ - backendConfig.${backend} - { - services.bitwarden_rs = { - enable = true; - dbBackend = backend; - config.rocketPort = 80; - }; - - networking.firewall.allowedTCPPorts = [ 80 ]; - - environment.systemPackages = - let - testRunner = pkgs.writers.writePython3Bin "test-runner" - { - libraries = [ pkgs.python3Packages.selenium ]; - } '' - from selenium.webdriver import Firefox - from selenium.webdriver.firefox.options import Options - from selenium.webdriver.support.ui import WebDriverWait - from selenium.webdriver.support import expected_conditions as EC - - options = Options() - options.add_argument('--headless') - driver = Firefox(options=options) - - driver.implicitly_wait(20) - driver.get('http://localhost/#/register') - - wait = WebDriverWait(driver, 10) - - wait.until(EC.title_contains("Create Account")) - - driver.find_element_by_css_selector('input#email').send_keys( - '${userEmail}' - ) - driver.find_element_by_css_selector('input#name').send_keys( - 'A Cat' - ) - driver.find_element_by_css_selector('input#masterPassword').send_keys( - '${userPassword}' - ) - driver.find_element_by_css_selector('input#masterPasswordRetype').send_keys( - '${userPassword}' - ) - driver.find_element_by_css_selector('input#acceptPolicies').click() - - driver.find_element_by_xpath("//button[contains(., 'Submit')]").click() - - wait.until_not(EC.title_contains("Create Account")) - - driver.find_element_by_css_selector('input#masterPassword').send_keys( - '${userPassword}' - ) - driver.find_element_by_xpath("//button[contains(., 'Log In')]").click() - - wait.until(EC.title_contains("My Vault")) - - driver.find_element_by_xpath("//button[contains(., 'Add Item')]").click() - - driver.find_element_by_css_selector('input#name').send_keys( - 'secrets' - ) - driver.find_element_by_css_selector('input#loginPassword').send_keys( - '${storedPassword}' - ) - - driver.find_element_by_xpath("//button[contains(., 'Save')]").click() - ''; - in - [ pkgs.firefox-unwrapped pkgs.geckodriver testRunner ]; - - virtualisation.memorySize = 768; - } - ]; - - client = { pkgs, ... }: - { - environment.systemPackages = [ pkgs.bitwarden-cli ]; - }; - }; - - testScript = '' - start_all() - server.wait_for_unit("bitwarden_rs.service") - server.wait_for_open_port(80) - - with subtest("configure the cli"): - client.succeed("bw --nointeraction config server http://server") - - with subtest("can't login to nonexistant account"): - client.fail( - "bw --nointeraction --raw login ${userEmail} ${userPassword}" - ) - - with subtest("use the web interface to sign up, log in, and save a password"): - server.succeed("PYTHONUNBUFFERED=1 test-runner | systemd-cat -t test-runner") - - with subtest("log in with the cli"): - key = client.succeed( - "bw --nointeraction --raw login ${userEmail} ${userPassword}" - ).strip() - - with subtest("sync with the cli"): - client.succeed(f"bw --nointeraction --raw --session {key} sync -f") - - with subtest("get the password with the cli"): - password = client.succeed( - f"bw --nointeraction --raw --session {key} list items | ${pkgs.jq}/bin/jq -r .[].login.password" - ) - assert password.strip() == "${storedPassword}" - ''; - }; -in -builtins.listToAttrs ( - map - (backend: { name = backend; value = makeBitwardenTest backend; }) - backends -) diff --git a/nixos/tests/vaultwarden.nix b/nixos/tests/vaultwarden.nix new file mode 100644 index 00000000000..b5343f5cad2 --- /dev/null +++ b/nixos/tests/vaultwarden.nix @@ -0,0 +1,189 @@ +{ system ? builtins.currentSystem +, config ? { } +, pkgs ? import ../.. { inherit system config; } +}: + +# These tests will: +# * Set up a vaultwarden server +# * Have Firefox use the web vault to create an account, log in, and save a password to the valut +# * Have the bw cli log in and read that password from the vault +# +# Note that Firefox must be on the same machine as the server for WebCrypto APIs to be available (or HTTPS must be configured) +# +# The same tests should work without modification on the official bitwarden server, if we ever package that. + +with import ../lib/testing-python.nix { inherit system pkgs; }; +with pkgs.lib; +let + backends = [ "sqlite" "mysql" "postgresql" ]; + + dbPassword = "please_dont_hack"; + + userEmail = "meow@example.com"; + userPassword = "also_super_secret_ZJWpBKZi668QGt"; # Must be complex to avoid interstitial warning on the signup page + + storedPassword = "seeeecret"; + + makeVaultwardenTest = backend: makeTest { + name = "vaultwarden-${backend}"; + meta = { + maintainers = with pkgs.lib.maintainers; [ jjjollyjim ]; + }; + + nodes = { + server = { pkgs, ... }: + let backendConfig = { + mysql = { + services.mysql = { + enable = true; + initialScript = pkgs.writeText "mysql-init.sql" '' + CREATE DATABASE bitwarden; + CREATE USER 'bitwardenuser'@'localhost' IDENTIFIED BY '${dbPassword}'; + GRANT ALL ON `bitwarden`.* TO 'bitwardenuser'@'localhost'; + FLUSH PRIVILEGES; + ''; + package = pkgs.mariadb; + }; + + services.vaultwarden.config.databaseUrl = "mysql://bitwardenuser:${dbPassword}@localhost/bitwarden"; + + systemd.services.vaultwarden.after = [ "mysql.service" ]; + }; + + postgresql = { + services.postgresql = { + enable = true; + initialScript = pkgs.writeText "postgresql-init.sql" '' + CREATE DATABASE bitwarden; + CREATE USER bitwardenuser WITH PASSWORD '${dbPassword}'; + GRANT ALL PRIVILEGES ON DATABASE bitwarden TO bitwardenuser; + ''; + }; + + services.vaultwarden.config.databaseUrl = "postgresql://bitwardenuser:${dbPassword}@localhost/bitwarden"; + + systemd.services.vaultwarden.after = [ "postgresql.service" ]; + }; + + sqlite = { }; + }; + in + mkMerge [ + backendConfig.${backend} + { + services.vaultwarden = { + enable = true; + dbBackend = backend; + config.rocketPort = 80; + }; + + networking.firewall.allowedTCPPorts = [ 80 ]; + + environment.systemPackages = + let + testRunner = pkgs.writers.writePython3Bin "test-runner" + { + libraries = [ pkgs.python3Packages.selenium ]; + } '' + from selenium.webdriver import Firefox + from selenium.webdriver.firefox.options import Options + from selenium.webdriver.support.ui import WebDriverWait + from selenium.webdriver.support import expected_conditions as EC + + options = Options() + options.add_argument('--headless') + driver = Firefox(options=options) + + driver.implicitly_wait(20) + driver.get('http://localhost/#/register') + + wait = WebDriverWait(driver, 10) + + wait.until(EC.title_contains("Create Account")) + + driver.find_element_by_css_selector('input#email').send_keys( + '${userEmail}' + ) + driver.find_element_by_css_selector('input#name').send_keys( + 'A Cat' + ) + driver.find_element_by_css_selector('input#masterPassword').send_keys( + '${userPassword}' + ) + driver.find_element_by_css_selector('input#masterPasswordRetype').send_keys( + '${userPassword}' + ) + driver.find_element_by_css_selector('input#acceptPolicies').click() + + driver.find_element_by_xpath("//button[contains(., 'Submit')]").click() + + wait.until_not(EC.title_contains("Create Account")) + + driver.find_element_by_css_selector('input#masterPassword').send_keys( + '${userPassword}' + ) + driver.find_element_by_xpath("//button[contains(., 'Log In')]").click() + + wait.until(EC.title_contains("My Vault")) + + driver.find_element_by_xpath("//button[contains(., 'Add Item')]").click() + + driver.find_element_by_css_selector('input#name').send_keys( + 'secrets' + ) + driver.find_element_by_css_selector('input#loginPassword').send_keys( + '${storedPassword}' + ) + + driver.find_element_by_xpath("//button[contains(., 'Save')]").click() + ''; + in + [ pkgs.firefox-unwrapped pkgs.geckodriver testRunner ]; + + virtualisation.memorySize = 768; + } + ]; + + client = { pkgs, ... }: + { + environment.systemPackages = [ pkgs.bitwarden-cli ]; + }; + }; + + testScript = '' + start_all() + server.wait_for_unit("vaultwarden.service") + server.wait_for_open_port(80) + + with subtest("configure the cli"): + client.succeed("bw --nointeraction config server http://server") + + with subtest("can't login to nonexistant account"): + client.fail( + "bw --nointeraction --raw login ${userEmail} ${userPassword}" + ) + + with subtest("use the web interface to sign up, log in, and save a password"): + server.succeed("PYTHONUNBUFFERED=1 test-runner | systemd-cat -t test-runner") + + with subtest("log in with the cli"): + key = client.succeed( + "bw --nointeraction --raw login ${userEmail} ${userPassword}" + ).strip() + + with subtest("sync with the cli"): + client.succeed(f"bw --nointeraction --raw --session {key} sync -f") + + with subtest("get the password with the cli"): + password = client.succeed( + f"bw --nointeraction --raw --session {key} list items | ${pkgs.jq}/bin/jq -r .[].login.password" + ) + assert password.strip() == "${storedPassword}" + ''; + }; +in +builtins.listToAttrs ( + map + (backend: { name = backend; value = makeVaultwardenTest backend; }) + backends +) diff --git a/pkgs/development/python-modules/selenium/default.nix b/pkgs/development/python-modules/selenium/default.nix index 370d2548980..7a1d1439c1f 100644 --- a/pkgs/development/python-modules/selenium/default.nix +++ b/pkgs/development/python-modules/selenium/default.nix @@ -49,7 +49,7 @@ buildPythonPackage rec { ''; passthru.tests = { - testing-bitwarden = nixosTests.bitwarden; + testing-vaultwarden = nixosTests.vaultwarden; }; meta = with lib; { diff --git a/pkgs/tools/security/bitwarden_rs/default.nix b/pkgs/tools/security/bitwarden_rs/default.nix deleted file mode 100644 index 2790a643499..00000000000 --- a/pkgs/tools/security/bitwarden_rs/default.nix +++ /dev/null @@ -1,46 +0,0 @@ -{ lib, stdenv, rustPlatform, fetchFromGitHub, nixosTests -, pkg-config, openssl -, libiconv, Security, CoreServices -, dbBackend ? "sqlite", libmysqlclient, postgresql }: - -let - featuresFlag = "--features ${dbBackend}"; - -in rustPlatform.buildRustPackage rec { - pname = "bitwarden_rs"; - version = "1.20.0"; - - src = fetchFromGitHub { - owner = "dani-garcia"; - repo = pname; - rev = version; - sha256 = "1ncy4iwmdzdp8rv1gc5i4s1rp97d94n4l4bh08v6w4zdpx0zn8b9"; - }; - - nativeBuildInputs = [ pkg-config ]; - buildInputs = with lib; [ openssl ] - ++ optionals stdenv.isDarwin [ libiconv Security CoreServices ] - ++ optional (dbBackend == "mysql") libmysqlclient - ++ optional (dbBackend == "postgresql") postgresql; - - RUSTC_BOOTSTRAP = 1; - - cargoSha256 = "0vdi792bzqxj8g215r9r5anzs4qhqsm6sjzwpj1l9861bn7j4xsz"; - cargoBuildFlags = [ featuresFlag ]; - - checkPhase = '' - runHook preCheck - echo "Running cargo cargo test ${featuresFlag} -- ''${checkFlags} ''${checkFlagsArray+''${checkFlagsArray[@]}}" - cargo test ${featuresFlag} -- ''${checkFlags} ''${checkFlagsArray+"''${checkFlagsArray[@]}"} - runHook postCheck - ''; - - passthru.tests = nixosTests.bitwarden; - - meta = with lib; { - description = "Unofficial Bitwarden compatible server written in Rust"; - homepage = "https://github.com/dani-garcia/bitwarden_rs"; - license = licenses.gpl3Only; - maintainers = with maintainers; [ msteen ]; - }; -} diff --git a/pkgs/tools/security/bitwarden_rs/vault.nix b/pkgs/tools/security/bitwarden_rs/vault.nix deleted file mode 100644 index 2b0855b821d..00000000000 --- a/pkgs/tools/security/bitwarden_rs/vault.nix +++ /dev/null @@ -1,28 +0,0 @@ -{ lib, stdenv, fetchurl, nixosTests }: - -stdenv.mkDerivation rec { - pname = "bitwarden_rs-vault"; - version = "2.19.0"; - - src = fetchurl { - url = "https://github.com/dani-garcia/bw_web_builds/releases/download/v${version}/bw_web_v${version}.tar.gz"; - sha256 = "sha256:0yrk2b2d5sld4z60siacafdz95gqikcv4snzd6hwhq1l6kz151az"; - }; - - buildCommand = '' - mkdir -p $out/share/bitwarden_rs/ - cd $out/share/bitwarden_rs/ - tar xf $src - mv web-vault vault - ''; - - passthru.tests = nixosTests.bitwarden; - - meta = with lib; { - description = "Integrates the web vault into bitwarden_rs"; - homepage = "https://github.com/dani-garcia/bw_web_builds"; - platforms = platforms.all; - license = licenses.gpl3Plus; - maintainers = with maintainers; [ msteen mic92 ]; - }; -} diff --git a/pkgs/tools/security/vaultwarden/default.nix b/pkgs/tools/security/vaultwarden/default.nix new file mode 100644 index 00000000000..4342c8f3ac9 --- /dev/null +++ b/pkgs/tools/security/vaultwarden/default.nix @@ -0,0 +1,47 @@ +{ lib, stdenv, rustPlatform, fetchFromGitHub, fetchurl, nixosTests +, pkg-config, openssl +, libiconv, Security, CoreServices +, dbBackend ? "sqlite", libmysqlclient, postgresql }: + +let + featuresFlag = "--features ${dbBackend}"; + +in rustPlatform.buildRustPackage rec { + pname = "vaultwarden"; + version = "1.22.1"; + + src = fetchFromGitHub { + owner = "dani-garcia"; + repo = pname; + rev = version; + sha256 = "sha256-aXbnNO3mTAgE1yNx7YVDo1vPpO8ACZpBGHQ633fNZ3k="; + }; + + cargoSha256 = "sha256-SFzq3OU0a0s3zlEzUkqGdZb/knYafqDamLy4ghH4i8I="; + + nativeBuildInputs = [ pkg-config ]; + buildInputs = with lib; [ openssl ] + ++ optionals stdenv.isDarwin [ libiconv Security CoreServices ] + ++ optional (dbBackend == "mysql") libmysqlclient + ++ optional (dbBackend == "postgresql") postgresql; + + RUSTC_BOOTSTRAP = 1; + + cargoBuildFlags = [ featuresFlag ]; + + checkPhase = '' + runHook preCheck + echo "Running cargo cargo test ${featuresFlag} -- ''${checkFlags} ''${checkFlagsArray+''${checkFlagsArray[@]}}" + cargo test ${featuresFlag} -- ''${checkFlags} ''${checkFlagsArray+"''${checkFlagsArray[@]}"} + runHook postCheck + ''; + + passthru.tests = nixosTests.vaultwarden; + + meta = with lib; { + description = "Unofficial Bitwarden compatible server written in Rust"; + homepage = "https://github.com/dani-garcia/vaultwarden"; + license = licenses.gpl3Only; + maintainers = with maintainers; [ msteen ]; + }; +} diff --git a/pkgs/tools/security/vaultwarden/vault.nix b/pkgs/tools/security/vaultwarden/vault.nix new file mode 100644 index 00000000000..49e7cc4f3ba --- /dev/null +++ b/pkgs/tools/security/vaultwarden/vault.nix @@ -0,0 +1,28 @@ +{ lib, stdenv, fetchurl, nixosTests }: + +stdenv.mkDerivation rec { + pname = "vaultwarden-vault"; + version = "2.19.0"; + + src = fetchurl { + url = "https://github.com/dani-garcia/bw_web_builds/releases/download/v${version}/bw_web_v${version}.tar.gz"; + sha256 = "sha256:0yrk2b2d5sld4z60siacafdz95gqikcv4snzd6hwhq1l6kz151az"; + }; + + buildCommand = '' + mkdir -p $out/share/vaultwarden/ + cd $out/share/vaultwarden/ + tar xf $src + mv web-vault vault + ''; + + passthru.tests = nixosTests.vaultwarden; + + meta = with lib; { + description = "Integrates the web vault into vaultwarden"; + homepage = "https://github.com/dani-garcia/bw_web_builds"; + platforms = platforms.all; + license = licenses.gpl3Plus; + maintainers = with maintainers; [ msteen mic92 ]; + }; +} diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index 5bfaed5ac45..d36f7e9719d 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -88,6 +88,14 @@ mapAliases ({ bittorrentSync = throw "bittorrentSync has been deprecated by resilio-sync."; # added 2019-06-03 bittorrentSync14 = throw "bittorrentSync14 has been deprecated by resilio-sync."; # added 2019-06-03 bittorrentSync20 = throw "bittorrentSync20 has been deprecated by resilio-sync."; # added 2019-06-03 + + # bitwarden_rs renamed to vaultwarden with release 1.21.0 (2021-04-30) + bitwarden_rs = vaultwarden; + bitwarden_rs-sqlite = vaultwarden-sqlite; + bitwarden_rs-mysql = vaultwarden-mysql; + bitwarden_rs-postgresql = vaultwarden-postgresql; + bitwarden_rs-vault = vaultwarden-vault; + bs1770gain = throw "bs1770gain has been removed from nixpkgs, as it had no maintainer or reverse dependencies."; # added 2021-01-02 btc1 = throw "btc1 has been removed, it was abandoned by upstream"; # added 2020-11-03 buildPerlPackage = perlPackages.buildPerlPackage; # added 2018-10-12 diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 285f9ec31b0..999a0451aa9 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -1308,15 +1308,6 @@ in inherit (nodePackages) bitwarden-cli; - bitwarden_rs = callPackage ../tools/security/bitwarden_rs { - inherit (darwin.apple_sdk.frameworks) Security CoreServices; - }; - bitwarden_rs-sqlite = bitwarden_rs; - bitwarden_rs-mysql = bitwarden_rs.override { dbBackend = "mysql"; }; - bitwarden_rs-postgresql = bitwarden_rs.override { dbBackend = "postgresql"; }; - - bitwarden_rs-vault = callPackage ../tools/security/bitwarden_rs/vault.nix { }; - bkyml = callPackage ../tools/misc/bkyml { }; blockbench-electron = callPackage ../applications/graphics/blockbench-electron { }; @@ -31572,6 +31563,15 @@ in vazir-code-font = callPackage ../data/fonts/vazir-code-font { }; + vaultwarden = callPackage ../tools/security/vaultwarden { + inherit (darwin.apple_sdk.frameworks) Security CoreServices; + }; + vaultwarden-sqlite = vaultwarden; + vaultwarden-mysql = vaultwarden.override { dbBackend = "mysql"; }; + vaultwarden-postgresql = vaultwarden.override { dbBackend = "postgresql"; }; + + vaultwarden-vault = callPackage ../tools/security/vaultwarden/vault.nix { }; + vazir-fonts = callPackage ../data/fonts/vazir-fonts { }; vbam = callPackage ../misc/emulators/vbam { }; -- cgit 1.4.1 From 8b9d56a19ada3094bb107c558b02f62f7b13ac53 Mon Sep 17 00:00:00 2001 From: Guillaume Girol Date: Sat, 19 Jun 2021 12:00:00 +0000 Subject: nixos/btrbk: add release notes --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 9 +++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ 2 files changed, 11 insertions(+) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index abd10a6f9a7..cc4ae7d1d79 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -25,6 +25,15 @@
New Services + + + btrbk, + a backup tool for btrfs subvolumes, taking advantage of btrfs + specific capabilities to create atomic snapshots and transfer + them incrementally to your backup locations. Available as + services.btrbk. + + geoipupdate, diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 1b7250a1815..7281bfc0051 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -10,6 +10,8 @@ In addition to numerous new and upgraded packages, this release has the followin ## New Services {#sec-release-21.11-new-services} +- [btrbk](https://digint.ch/btrbk/index.html), a backup tool for btrfs subvolumes, taking advantage of btrfs specific capabilities to create atomic snapshots and transfer them incrementally to your backup locations. Available as [services.btrbk](options.html#opt-services.brtbk.instances). + - [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP database updater from MaxMind. Available as [services.geoipupdate](options.html#opt-services.geoipupdate.enable). - [sourcehut](https://sr.ht), a collection of tools useful for software development. Available as [services.sourcehut](options.html#opt-services.sourcehut.enable). -- cgit 1.4.1 From f93e9e98e947630b24362220b1112101a65a2b63 Mon Sep 17 00:00:00 2001 From: Francesco Gazzetta Date: Sat, 3 Jul 2021 18:24:38 +0200 Subject: staticjinja: 2.1.0 -> 3.0.1 --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 2 +- nixos/doc/manual/release-notes/rl-2111.section.md | 2 +- pkgs/development/python-modules/staticjinja/default.nix | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 6f4079ea9bb..f3c4d146685 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -64,7 +64,7 @@ The staticjinja package has been upgraded - from 1.0.4 to 2.0.0 + from 1.0.4 to 3.0.1 diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 1f532a296ea..536c77fb788 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -20,7 +20,7 @@ In addition to numerous new and upgraded packages, this release has the followin ## Backward Incompatibilities {#sec-release-21.11-incompatibilities} -- The `staticjinja` package has been upgraded from 1.0.4 to 2.0.0 +- The `staticjinja` package has been upgraded from 1.0.4 to 3.0.1 - `services.geoip-updater` was broken and has been replaced by [services.geoipupdate](options.html#opt-services.geoipupdate.enable). diff --git a/pkgs/development/python-modules/staticjinja/default.nix b/pkgs/development/python-modules/staticjinja/default.nix index 0681218cd0a..dc36066ec30 100644 --- a/pkgs/development/python-modules/staticjinja/default.nix +++ b/pkgs/development/python-modules/staticjinja/default.nix @@ -14,7 +14,7 @@ buildPythonPackage rec { pname = "staticjinja"; - version = "2.1.0"; + version = "3.0.1"; format = "pyproject"; # No tests in pypi @@ -22,7 +22,7 @@ buildPythonPackage rec { owner = "staticjinja"; repo = pname; rev = version; - sha256 = "sha256-VKsDvWEurBdckWbPG5hQLK3dzdM7XVbrp23fR5wp1xk="; + sha256 = "sha256-W4q0vG8Kl2gCmA8UnUbdiGRtghhdnWxIJXFIIa6BogA="; }; nativeBuildInputs = [ -- cgit 1.4.1 From ed9db4a7f8b69fea1643a964919fca3b6f9d40fc Mon Sep 17 00:00:00 2001 From: Bjørn Forsman Date: Sat, 3 Jul 2021 18:10:55 +0200 Subject: doc: fix link to kodi-19.0 announcement Logically re-apply 7afaacf9a8 ("doc: fix link to kodi-19.0 announcement"), because it was lost in the conversion from docbook to markdown, in commit 32c2dd304d ("docs: nixos release notes to CommonMark (2105)"). (Hm, apparently we have *both* docbook and markdown? CI failed before I updated the .xml file.) --- nixos/doc/manual/from_md/release-notes/rl-2105.section.xml | 2 +- nixos/doc/manual/release-notes/rl-2105.section.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml index e043bee7761..db17b4530ab 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml @@ -1026,7 +1026,7 @@ self: super: Kodi has been updated to version 19.1 "Matrix". See the - announcement + announcement for further details. diff --git a/nixos/doc/manual/release-notes/rl-2105.section.md b/nixos/doc/manual/release-notes/rl-2105.section.md index e4565b8ca60..3fe792b2143 100644 --- a/nixos/doc/manual/release-notes/rl-2105.section.md +++ b/nixos/doc/manual/release-notes/rl-2105.section.md @@ -300,7 +300,7 @@ When upgrading from a previous release, please be aware of the following incompa Regarding the NixOS module, new options for HTTPS inspection have been added and `services.privoxy.extraConfig` has been replaced by the new [services.privoxy.settings](options.html#opt-services.privoxy.settings) (See [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) for the motivation). -- [Kodi](https://kodi.tv/) has been updated to version 19.1 \"Matrix\". See the [announcement](https://kodi.tv/article/kodi-190-matrix-release) for further details. +- [Kodi](https://kodi.tv/) has been updated to version 19.1 \"Matrix\". See the [announcement](https://kodi.tv/article/kodi-19-0-matrix-release) for further details. - The `services.packagekit.backend` option has been removed as it only supported a single setting which would always be the default. Instead new [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) compliant [services.packagekit.settings](options.html#opt-services.packagekit.settings) and [services.packagekit.vendorSettings](options.html#opt-services.packagekit.vendorSettings) options have been introduced. -- cgit 1.4.1 From ede1785d110103d43a75c19db7573ad5808bd3b3 Mon Sep 17 00:00:00 2001 From: Bjørn Forsman Date: Sat, 3 Jul 2021 18:18:51 +0200 Subject: doc: point out that nixos-21.05 has gnuradio 3.9 Logically re-apply 64c70a8c4c ("doc: point out that nixos-21.05 has gnuradio 3.9"), because it was lost in the conversion from docbook to markdown, in commit 32c2dd304d ("docs: nixos release notes to CommonMark (2105)"). (Apparently we have both .md and .xml release notes now, and CI fails unless they have the same content (after .md processing), so update the .xml file to match...) --- nixos/doc/manual/from_md/release-notes/rl-2105.section.xml | 14 ++++++++------ nixos/doc/manual/release-notes/rl-2105.section.md | 2 +- 2 files changed, 9 insertions(+), 7 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml index db17b4530ab..f4155d6f8ce 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2105.section.xml @@ -101,16 +101,18 @@ GNURadio - 3.8 was + 3.8 and 3.9 were finally packaged, along with a rewrite to the Nix expressions, allowing users to override the features upstream supports selecting to compile or not to. Additionally, the attribute - gnuradio and gnuradio3_7 - now point to an externally wrapped by default derivations, - that allow you to also add `extraPythonPackages` to the Python - interpreter used by GNURadio. Missing environmental variables - needed for operational GUI were also added + gnuradio (3.9), + gnuradio3_8 and + gnuradio3_7 now point to an externally + wrapped by default derivations, that allow you to also add + `extraPythonPackages` to the Python interpreter used by + GNURadio. Missing environmental variables needed for + operational GUI were also added (#75478). diff --git a/nixos/doc/manual/release-notes/rl-2105.section.md b/nixos/doc/manual/release-notes/rl-2105.section.md index 3fe792b2143..49b97c203fe 100644 --- a/nixos/doc/manual/release-notes/rl-2105.section.md +++ b/nixos/doc/manual/release-notes/rl-2105.section.md @@ -36,7 +36,7 @@ In addition to numerous new and upgraded packages, this release has the followin The following new services were added since the last release: -- [GNURadio](https://www.gnuradio.org/) 3.8 was [finally](https://github.com/NixOS/nixpkgs/issues/82263) packaged, along with a rewrite to the Nix expressions, allowing users to override the features upstream supports selecting to compile or not to. Additionally, the attribute `gnuradio` and `gnuradio3_7` now point to an externally wrapped by default derivations, that allow you to also add \`extraPythonPackages\` to the Python interpreter used by GNURadio. Missing environmental variables needed for operational GUI were also added ([\#75478](https://github.com/NixOS/nixpkgs/issues/75478)). +- [GNURadio](https://www.gnuradio.org/) 3.8 and 3.9 were [finally](https://github.com/NixOS/nixpkgs/issues/82263) packaged, along with a rewrite to the Nix expressions, allowing users to override the features upstream supports selecting to compile or not to. Additionally, the attribute `gnuradio` (3.9), `gnuradio3_8` and `gnuradio3_7` now point to an externally wrapped by default derivations, that allow you to also add \`extraPythonPackages\` to the Python interpreter used by GNURadio. Missing environmental variables needed for operational GUI were also added ([\#75478](https://github.com/NixOS/nixpkgs/issues/75478)). - [Keycloak](https://www.keycloak.org/), an open source identity and access management server with support for [OpenID Connect](https://openid.net/connect/), [OAUTH 2.0](https://oauth.net/2/) and [SAML 2.0](https://en.wikipedia.org/wiki/SAML_2.0). -- cgit 1.4.1 From 7265334f1ab7726e8cbda4670e77c31b42fb5665 Mon Sep 17 00:00:00 2001 From: Bruno Bigras Date: Sun, 4 Jul 2021 11:33:28 -0400 Subject: yggdrasil: 0.3.16 -> 0.4.0 --- .../manual/from_md/release-notes/rl-2111.section.xml | 10 ++++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ nixos/tests/yggdrasil.nix | 18 +++++++----------- pkgs/tools/networking/yggdrasil/default.nix | 6 +++--- 4 files changed, 22 insertions(+), 14 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 2a285669efe..a95b1dd66b9 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -459,6 +459,16 @@ + + + + yggdrasil was upgraded to a new major + release with breaking changes, see + upstream + changelog. + + +
Other Notable Changes diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 0de63a46199..be46591dfa1 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -113,6 +113,8 @@ In addition to numerous new and upgraded packages, this release has the followin * The data directory remains located at `/var/lib/bitwarden_rs`, for backwards compatibility. +- `yggdrasil` was upgraded to a new major release with breaking changes, see [upstream changelog](https://github.com/yggdrasil-network/yggdrasil-go/releases/tag/v0.4.0). + ## Other Notable Changes {#sec-release-21.11-notable-changes} - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets. diff --git a/nixos/tests/yggdrasil.nix b/nixos/tests/yggdrasil.nix index 0e75ed54db2..b409d9ed785 100644 --- a/nixos/tests/yggdrasil.nix +++ b/nixos/tests/yggdrasil.nix @@ -1,23 +1,19 @@ let - aliceIp6 = "200:3b91:b2d8:e708:fbf3:f06:fdd5:90d0"; + aliceIp6 = "202:b70:9b0b:cf34:f93c:8f18:bbfd:7034"; aliceKeys = { - EncryptionPublicKey = "13e23986fe76bc3966b42453f479bc563348b7ff76633b7efcb76e185ec7652f"; - EncryptionPrivateKey = "9f86947b15e86f9badac095517a1982e39a2db37ca726357f95987b898d82208"; - SigningPublicKey = "e2c43349083bc1e998e4ec4535b4c6a8f44ca9a5a8e07336561267253b2be5f4"; - SigningPrivateKey = "fe3add8da35316c05f6d90d3ca79bd2801e6ccab6d37e5339fef4152589398abe2c43349083bc1e998e4ec4535b4c6a8f44ca9a5a8e07336561267253b2be5f4"; + PublicKey = "3e91ec9e861960d86e1ce88051f97c435bdf2859640ab681dfa906eb45ad5182"; + PrivateKey = "a867f9e078e4ce58d310cf5acd4622d759e2a21df07e1d6fc380a2a26489480d3e91ec9e861960d86e1ce88051f97c435bdf2859640ab681dfa906eb45ad5182"; }; - bobIp6 = "201:ebbd:bde9:f138:c302:4afa:1fb6:a19a"; - bobPrefix = "301:ebbd:bde9:f138"; + bobIp6 = "202:a483:73a4:9f2d:a559:4a19:bc9:8458"; + bobPrefix = "302:a483:73a4:9f2d"; bobConfig = { InterfacePeers = { eth1 = [ "tcp://192.168.1.200:12345" ]; }; MulticastInterfaces = [ "eth1" ]; LinkLocalTCPPort = 54321; - EncryptionPublicKey = "c99d6830111e12d1b004c52fe9e5a2eef0f6aefca167aca14589a370b7373279"; - EncryptionPrivateKey = "2e698a53d3fdce5962d2ff37de0fe77742a5c8b56cd8259f5da6aa792f6e8ba3"; - SigningPublicKey = "de111da0ec781e45bf6c63ecb45a78c24d7d4655abfaeea83b26c36eb5c0fd5b"; - SigningPrivateKey = "2a6c21550f3fca0331df50668ffab66b6dce8237bcd5728e571e8033b363e247de111da0ec781e45bf6c63ecb45a78c24d7d4655abfaeea83b26c36eb5c0fd5b"; + PublicKey = "2b6f918b6c1a4b54d6bcde86cf74e074fb32ead4ee439b7930df2aa60c825186"; + PrivateKey = "0c4a24acd3402722ce9277ed179f4a04b895b49586493c25fbaed60653d857d62b6f918b6c1a4b54d6bcde86cf74e074fb32ead4ee439b7930df2aa60c825186"; }; danIp6 = bobPrefix + "::2"; diff --git a/pkgs/tools/networking/yggdrasil/default.nix b/pkgs/tools/networking/yggdrasil/default.nix index 8228132b5c8..506869238e5 100644 --- a/pkgs/tools/networking/yggdrasil/default.nix +++ b/pkgs/tools/networking/yggdrasil/default.nix @@ -2,16 +2,16 @@ buildGoModule rec { pname = "yggdrasil"; - version = "0.3.16"; + version = "0.4.0"; src = fetchFromGitHub { owner = "yggdrasil-network"; repo = "yggdrasil-go"; rev = "v${version}"; - sha256 = "sha256-uUF0zkgtzdMZB/GKOtawjn7AQBkRoiAEj9nUUmpQSVQ="; + sha256 = "sha256-sMcbOTLdmAXp3U2XeNM0hrwOTjzr+9B6IvAaVbjhuFY="; }; - vendorSha256 = "sha256-619PSqd7pl3Akj/kzLQhDIp1adumBGhLrzQsZvMzC7w="; + vendorSha256 = "sha256-QQN8ePOQ7DT9KeuY4ohFuPtocuinh3Y3us6QMnCQ4gc="; doCheck = false; -- cgit 1.4.1 From 642b5ec6fdd50196830ddd713c7fd590ab2b34d0 Mon Sep 17 00:00:00 2001 From: Jonathan Ringer Date: Tue, 29 Jun 2021 11:00:51 -0700 Subject: nixos/rl-notes/21.11: add python3 default bump entry --- .../doc/manual/from_md/release-notes/rl-2111.section.xml | 16 +++++++++++++++- nixos/doc/manual/release-notes/rl-2111.section.md | 4 ++++ 2 files changed, 19 insertions(+), 1 deletion(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index a95b1dd66b9..7860d21215b 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -14,12 +14,18 @@
Highlights - + PHP now defaults to PHP 8.0, updated from 7.4. + + + python3 now defaults to Python 3.9, updated + from Python 3.8. + +
@@ -503,6 +509,14 @@ rxvt-unicode explicitly. + + + python3 now defaults to Python 3.9. Python + 3.9 introduces many deprecation warnings, please look at the + What’s + New In Python 3.9 post for more information. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index be46591dfa1..df5f84ed0b3 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -8,6 +8,8 @@ In addition to numerous new and upgraded packages, this release has the followin - PHP now defaults to PHP 8.0, updated from 7.4. +- `python3` now defaults to Python 3.9, updated from Python 3.8. + ## New Services {#sec-release-21.11-new-services} - [btrbk](https://digint.ch/btrbk/index.html), a backup tool for btrfs subvolumes, taking advantage of btrfs specific capabilities to create atomic snapshots and transfer them incrementally to your backup locations. Available as [services.btrbk](options.html#opt-services.brtbk.instances). @@ -122,3 +124,5 @@ In addition to numerous new and upgraded packages, this release has the followin However, if [`services.fail2ban.enable`](options.html#opt-services.fail2ban.enable) is `true`, the `fail2ban` will override the verbosity to `"VERBOSE"`, so that `fail2ban` can observe the failed login attempts from the SSH logs. - Sway: The terminal emulator `rxvt-unicode` is no longer installed by default via `programs.sway.extraPackages`. The current default configuration uses `alacritty` (and soon `foot`) so this is only an issue when using a customized configuration and not installing `rxvt-unicode` explicitly. + +- `python3` now defaults to Python 3.9. Python 3.9 introduces many deprecation warnings, please look at the [What's New In Python 3.9 post](https://docs.python.org/3/whatsnew/3.9.html) for more information. -- cgit 1.4.1 From be80d6208a604a28ce4c213a280e443c2f2e7ddc Mon Sep 17 00:00:00 2001 From: Kevin Cox Date: Wed, 7 Jul 2021 09:37:48 -0400 Subject: pulseeffects,easyeffects: 5.0.3 -> 6.0.0 New release, the main feature is updating to GTK4 and significant updates to the internal processing pipelines. Many dependencies no longer seem to be required, I have manually checked that mentioned plugins are still available. --- .../from_md/release-notes/rl-2111.section.xml | 7 ++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 + pkgs/applications/audio/easyeffects/default.nix | 85 ++++++++++++++ pkgs/applications/audio/pulseeffects/default.nix | 127 --------------------- pkgs/top-level/aliases.nix | 3 +- pkgs/top-level/all-packages.nix | 4 +- 6 files changed, 98 insertions(+), 130 deletions(-) create mode 100644 pkgs/applications/audio/easyeffects/default.nix delete mode 100644 pkgs/applications/audio/pulseeffects/default.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index a95b1dd66b9..7d046d39de7 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -342,6 +342,13 @@ release instead of the old 2.7.7 version. + + + The pulseeffects package updated to + version + 4.x and renamed to easyeffects. + + The libwnck package now defaults to the 3.x diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index be46591dfa1..96854ffdd74 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -84,6 +84,8 @@ In addition to numerous new and upgraded packages, this release has the followin * The `antlr` package now defaults to the 4.x release instead of the old 2.7.7 version. +* The `pulseeffects` package updated to [version 4.x](https://github.com/wwmm/easyeffects/releases/tag/v6.0.0) and renamed to `easyeffects`. + * The `libwnck` package now defaults to the 3.x release instead of the old 2.31.0 version. diff --git a/pkgs/applications/audio/easyeffects/default.nix b/pkgs/applications/audio/easyeffects/default.nix new file mode 100644 index 00000000000..9bbbaf22f42 --- /dev/null +++ b/pkgs/applications/audio/easyeffects/default.nix @@ -0,0 +1,85 @@ +{ lib, stdenv +, desktop-file-utils +, fetchFromGitHub +, fftwFloat +, glib +, glibmm +, gtk4 +, gtkmm4 +, itstool +, libbs2b +, libebur128 +, libsamplerate +, libsndfile +, lilv +, lv2 +, meson +, ninja +, nlohmann_json +, pipewire +, pkg-config +, python3 +, rnnoise +, rubberband +, speexdsp +, wrapGAppsHook +, zita-convolver +}: + +stdenv.mkDerivation rec { + pname = "easyeffects"; + version = "6.0.0"; + + src = fetchFromGitHub { + owner = "wwmm"; + repo = "easyeffects"; + rev = "v${version}"; + hash = "sha256:1m3jamnhgpx3z51nfc8xg7adhf5x7dirvw0wf129hzxx4fjl7rch"; + }; + + nativeBuildInputs = [ + desktop-file-utils + itstool + meson + ninja + pkg-config + python3 + wrapGAppsHook + ]; + + buildInputs = [ + fftwFloat + glib + glibmm + gtk4 + gtkmm4 + libbs2b + libebur128 + libsamplerate + libsndfile + lilv + lv2 + nlohmann_json + pipewire + rnnoise + rubberband + speexdsp + zita-convolver + ]; + + postPatch = '' + chmod +x meson_post_install.py + patchShebangs meson_post_install.py + ''; + + separateDebugInfo = true; + + meta = with lib; { + description = "Audio effects for PipeWire applications."; + homepage = "https://github.com/wwmm/easyeffects"; + license = licenses.gpl3Plus; + maintainers = with maintainers; [ jtojnar ]; + platforms = platforms.linux; + badPlatforms = [ "aarch64-linux" ]; + }; +} diff --git a/pkgs/applications/audio/pulseeffects/default.nix b/pkgs/applications/audio/pulseeffects/default.nix deleted file mode 100644 index 7a7c7175a45..00000000000 --- a/pkgs/applications/audio/pulseeffects/default.nix +++ /dev/null @@ -1,127 +0,0 @@ -{ lib, stdenv -, fetchFromGitHub -, fetchpatch -, meson -, ninja -, pkg-config -, itstool -, python3 -, libxml2 -, desktop-file-utils -, wrapGAppsHook -, gst_all_1 -, pipewire -, gtk3 -, glib -, glibmm -, gtkmm3 -, lilv -, lv2 -, serd -, sord -, sratom -, libbs2b -, libsamplerate -, libsndfile -, libebur128 -, rnnoise -, boost -, dbus -, fftwFloat -, calf -, zita-convolver -, zam-plugins -, rubberband -, lsp-plugins -}: - -let - lv2Plugins = [ - calf # limiter, compressor exciter, bass enhancer and others - lsp-plugins # delay - ]; - ladspaPlugins = [ - rubberband # pitch shifting - zam-plugins # maximizer - ]; -in stdenv.mkDerivation rec { - pname = "pulseeffects"; - version = "5.0.3"; - - src = fetchFromGitHub { - owner = "wwmm"; - repo = "pulseeffects"; - rev = "v${version}"; - sha256 = "1dicvq17vajk3vr4g1y80599ahkw0dp5ynlany1cfljfjz40s8sx"; - }; - - nativeBuildInputs = [ - meson - ninja - pkg-config - libxml2 - itstool - python3 - desktop-file-utils - wrapGAppsHook - ]; - - buildInputs = [ - pipewire - glib - glibmm - gtk3 - gtkmm3 - gst_all_1.gstreamer - gst_all_1.gst-plugins-base # gst-fft - gst_all_1.gst-plugins-good # spectrum plugin - gst_all_1.gst-plugins-bad - lilv lv2 serd sord sratom - libbs2b - libebur128 - libsamplerate - libsndfile - rnnoise - boost - dbus - fftwFloat - zita-convolver - ]; - - patches = [ - (fetchpatch { - # Fix build failure. - # https://github.com/wwmm/pulseeffects/pull/934 - url = "https://github.com/wwmm/pulseeffects/commit/ab7354a6850d23840b4c9af212dbebf4f31a562f.patch"; - sha256 = "1hd05xn6sp0xs632mqgwk19hl40kh2f69mx5mgzahysrj057w22c"; - }) - ]; - - postPatch = '' - chmod +x meson_post_install.py - patchShebangs meson_post_install.py - ''; - - preFixup = '' - gappsWrapperArgs+=( - --set LV2_PATH "${lib.makeSearchPath "lib/lv2" lv2Plugins}" - --set LADSPA_PATH "${lib.makeSearchPath "lib/ladspa" ladspaPlugins}" - ) - ''; - - # Meson is no longer able to pick up Boost automatically. - # https://github.com/NixOS/nixpkgs/issues/86131 - BOOST_INCLUDEDIR = "${lib.getDev boost}/include"; - BOOST_LIBRARYDIR = "${lib.getLib boost}/lib"; - - separateDebugInfo = true; - - meta = with lib; { - description = "Limiter, compressor, reverberation, equalizer and auto volume effects for Pulseaudio applications"; - homepage = "https://github.com/wwmm/pulseeffects"; - license = licenses.gpl3Plus; - maintainers = with maintainers; [ jtojnar ]; - platforms = platforms.linux; - badPlatforms = [ "aarch64-linux" ]; - }; -} diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index d36f7e9719d..0df082ff35c 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -653,7 +653,8 @@ mapAliases ({ pyo3-pack = maturin; pmenu = throw "pmenu has been removed from nixpkgs, as its maintainer is no longer interested in the package."; # added 2019-12-10 pulseaudioLight = pulseaudio; # added 2018-04-25 - pulseeffects = throw "Use pulseeffects-legacy if you use PulseAudio and pulseeffects-pw if you use PipeWire."; # added 2021-02-13, move back once we default to PipeWire audio server. + pulseeffects = throw "Use pulseeffects-legacy if you use PulseAudio and easyeffects if you use PipeWire."; # added 2021-02-13 + pulseeffects-pw = easyeffects; # added 2021-07-07 phonon-backend-gstreamer = throw "phonon-backend-gstreamer: Please use libsForQt5.phonon-backend-gstreamer, as Qt4 support in this package has been removed."; # added 2019-11-22 phonon-backend-vlc = throw "phonon-backend-vlc: Please use libsForQt5.phonon-backend-vlc, as Qt4 support in this package has been removed."; # added 2019-11-22 phonon = throw "phonon: Please use libsForQt5.phonon, as Qt4 support in this package has been removed."; # added 2019-11-22 diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index be0b6059699..bc5d83614af 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -19749,8 +19749,8 @@ in libpulseaudio = libpulseaudio-vanilla; - pulseeffects-pw = callPackage ../applications/audio/pulseeffects { - boost = boost172; + easyeffects = callPackage ../applications/audio/easyeffects { + glibmm = glibmm_2_68; }; pulseeffects-legacy = callPackage ../applications/audio/pulseeffects-legacy { -- cgit 1.4.1 From c0bd900632d2d896830897de888a9387b92df3b8 Mon Sep 17 00:00:00 2001 From: Leo Maroni Date: Fri, 11 Jun 2021 19:54:13 +0200 Subject: nixos/vikunja: init nixos/vikunka: Use RFC 0042 settings proposal (thanks to @aanderse) --- .../from_md/release-notes/rl-2111.section.xml | 7 + nixos/doc/manual/release-notes/rl-2111.section.md | 2 + nixos/modules/module-list.nix | 1 + nixos/modules/services/web-apps/vikunja.nix | 145 +++++++++++++++++++++ 4 files changed, 155 insertions(+) create mode 100644 nixos/modules/services/web-apps/vikunja.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 7d046d39de7..b14ca9e3e72 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -65,6 +65,13 @@ be able to access programmers supported by flashrom. + + + vikunja, a to-do + list app. Available as + services.vikunja. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 96854ffdd74..8648f89dbd3 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -20,6 +20,8 @@ In addition to numerous new and upgraded packages, this release has the followin - Users of flashrom should migrate to [programs.flashrom.enable](options.html#opt-programs.flashrom.enable) and add themselves to the `flashrom` group to be able to access programmers supported by flashrom. +- [vikunja](https://vikunja.io), a to-do list app. Available as [services.vikunja](#opt-services.vikunja.enable). + ## Backward Incompatibilities {#sec-release-21.11-incompatibilities} - The `staticjinja` package has been upgraded from 1.0.4 to 3.0.1 diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 980e7027c98..be640f53eb6 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -968,6 +968,7 @@ ./services/web-apps/trilium.nix ./services/web-apps/selfoss.nix ./services/web-apps/shiori.nix + ./services/web-apps/vikunja.nix ./services/web-apps/virtlyst.nix ./services/web-apps/wiki-js.nix ./services/web-apps/whitebophir.nix diff --git a/nixos/modules/services/web-apps/vikunja.nix b/nixos/modules/services/web-apps/vikunja.nix new file mode 100644 index 00000000000..b0b6eb6df17 --- /dev/null +++ b/nixos/modules/services/web-apps/vikunja.nix @@ -0,0 +1,145 @@ +{ pkgs, lib, config, ... }: + +with lib; + +let + cfg = config.services.vikunja; + format = pkgs.formats.yaml {}; + configFile = format.generate "config.yaml" cfg.settings; + useMysql = cfg.database.type == "mysql"; + usePostgresql = cfg.database.type == "postgres"; +in { + options.services.vikunja = with lib; { + enable = mkEnableOption "vikunja service"; + package-api = mkOption { + default = pkgs.vikunja-api; + type = types.package; + defaultText = "pkgs.vikunja-api"; + description = "vikunja-api derivation to use."; + }; + package-frontend = mkOption { + default = pkgs.vikunja-frontend; + type = types.package; + defaultText = "pkgs.vikunja-frontend"; + description = "vikunja-frontend derivation to use."; + }; + environmentFiles = mkOption { + type = types.listOf types.path; + default = [ ]; + description = '' + List of environment files set in the vikunja systemd service. + For example passwords should be set in one of these files. + ''; + }; + setupNginx = mkOption { + type = types.bool; + default = config.services.nginx.enable; + defaultText = "config.services.nginx.enable"; + description = '' + Whether to setup NGINX. + Further nginx configuration can be done by changing + . + This does not enable TLS or ACME by default. To enable this, set the + to + true and if appropriate do the same for + . + ''; + }; + frontendScheme = mkOption { + type = types.enum [ "http" "https" ]; + description = '' + Whether the site is available via http or https. + This does not configure https or ACME in nginx! + ''; + }; + frontendHostname = mkOption { + type = types.str; + description = "The Hostname under which the frontend is running."; + }; + + settings = mkOption { + type = format.type; + default = {}; + description = '' + Vikunja configuration. Refer to + + for details on supported values. + ''; + }; + database = { + type = mkOption { + type = types.enum [ "sqlite" "mysql" "postgres" ]; + example = "postgres"; + default = "sqlite"; + description = "Database engine to use."; + }; + host = mkOption { + type = types.str; + default = "localhost"; + description = "Database host address. Can also be a socket."; + }; + user = mkOption { + type = types.str; + default = "vikunja"; + description = "Database user."; + }; + database = mkOption { + type = types.str; + default = "vikunja"; + description = "Database name."; + }; + path = mkOption { + type = types.str; + default = "/var/lib/vikunja/vikunja.db"; + description = "Path to the sqlite3 database file."; + }; + }; + }; + config = lib.mkIf cfg.enable { + services.vikunja.settings = { + database = { + inherit (cfg.database) type host user database path; + }; + service = { + frontendurl = "${cfg.frontendScheme}://${cfg.frontendHostname}/"; + }; + files = { + basepath = "/var/lib/vikunja/files"; + }; + }; + + systemd.services.vikunja-api = { + description = "vikunja-api"; + after = [ "network.target" ] ++ lib.optional usePostgresql "postgresql.service" ++ lib.optional useMysql "mysql.service"; + wantedBy = [ "multi-user.target" ]; + path = [ cfg.package-api ]; + restartTriggers = [ configFile ]; + + serviceConfig = { + Type = "simple"; + DynamicUser = true; + StateDirectory = "vikunja"; + ExecStart = "${cfg.package-api}/bin/vikunja"; + Restart = "always"; + EnvironmentFile = cfg.environmentFiles; + }; + }; + + services.nginx.virtualHosts."${cfg.frontendHostname}" = mkIf cfg.setupNginx { + locations = { + "/" = { + root = cfg.package-frontend; + tryFiles = "try_files $uri $uri/ /"; + }; + "~* ^/(api|dav|\\.well-known)/" = { + proxyPass = "http://localhost:3456"; + extraConfig = '' + client_max_body_size 20M; + ''; + }; + }; + }; + + environment.etc."vikunja/config.yaml".source = configFile; + }; +} -- cgit 1.4.1 From dafb3dfc483a1e12017ac9ddf88907d009b3edec Mon Sep 17 00:00:00 2001 From: Eric Bailey Date: Sat, 10 Jul 2021 14:44:00 -0500 Subject: kops: default to 1.21.0, drop 1.18 (#129472) --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 6 ++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 1 + pkgs/applications/networking/cluster/kops/default.nix | 11 ++++++----- pkgs/top-level/all-packages.nix | 4 ++-- 4 files changed, 15 insertions(+), 7 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index b14ca9e3e72..da046e62bfb 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -20,6 +20,12 @@ PHP now defaults to PHP 8.0, updated from 7.4. + + + kOps now defaults to 1.21.0, which uses containerd as the + default runtime. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 8648f89dbd3..5ae9a5ccfd7 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -7,6 +7,7 @@ In addition to numerous new and upgraded packages, this release has the followin ## Highlights {#sec-release-21.11-highlights} - PHP now defaults to PHP 8.0, updated from 7.4. +- kOps now defaults to 1.21.0, which uses containerd as the default runtime. ## New Services {#sec-release-21.11-new-services} diff --git a/pkgs/applications/networking/cluster/kops/default.nix b/pkgs/applications/networking/cluster/kops/default.nix index 4dc37364e7b..54d13f819ab 100644 --- a/pkgs/applications/networking/cluster/kops/default.nix +++ b/pkgs/applications/networking/cluster/kops/default.nix @@ -53,11 +53,6 @@ rec { mkKops = generic; - kops_1_18 = mkKops { - version = "1.18.2"; - sha256 = "17na83j6sfhk69w9ssvicc0xd1904z952ad3zzbpha50lcy6nlhp"; - }; - kops_1_19 = mkKops rec { version = "1.19.2"; sha256 = "15csxih1xy8myky37n5dyzp5mc31pc4bq9asaw6zz51mgw8ad5r9"; @@ -69,4 +64,10 @@ rec { sha256 = "011ib3xkj6nn7qax8d0ns8y4jhkwwmry1qnzxklvzssaxhmzs557"; rev = "v${version}"; }; + + kops_1_21 = mkKops rec { + version = "1.21.0"; + sha256 = "sha256-T2i3qpg3GC7yaYCGrN1V5XXrUyT+Ce9Q4aV00gQJ7gM="; + rev = "v${version}"; + }; } diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index ac525f720f2..3ca6d840318 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -30979,11 +30979,11 @@ in # Exceptions are versions that we need to keep to allow upgrades from older NixOS releases inherit (callPackage ../applications/networking/cluster/kops {}) mkKops - kops_1_18 kops_1_19 kops_1_20 + kops_1_21 ; - kops = kops_1_20; + kops = kops_1_21; lguf-brightness = callPackage ../misc/lguf-brightness { }; -- cgit 1.4.1 From 26f52bf6b5d32ebdfc799a6cefc0c1d37700b67a Mon Sep 17 00:00:00 2001 From: Alvar Penning Date: Sat, 10 Jul 2021 12:01:15 +0200 Subject: claws-mail: 3.17.8 -> 4.0.0 With Claws Mail's latest double release of 3.18.0 and 4.0.0, the package will refer to the more "modern" GTK+ 3 release, major version four. The GTK+ 2 release, major version 3, is now available in the `claws-mail-gtk2` package. In other words, this commit bumps the GTK+ 2 version from 3.17.8 to 3.18.0, the previously unstable GTK+ 3 version 3.99.0 to 4.0.0 and changes the default to GTK+ 3. --- .../from_md/release-notes/rl-2111.section.xml | 8 ++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ .../networking/mailreaders/claws-mail/default.nix | 29 +++++++++++++++------- pkgs/top-level/aliases.nix | 1 + pkgs/top-level/all-packages.nix | 5 ++-- 5 files changed, 34 insertions(+), 11 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index b14ca9e3e72..407e073a6dc 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -517,6 +517,14 @@ rxvt-unicode explicitly. + + + The claws-mail package now references the + new GTK+ 3 release branch, major version 4. To use the GTK+ 2 + releases, one can install the + claws-mail-gtk2 package. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 8648f89dbd3..da0462a1597 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -126,3 +126,5 @@ In addition to numerous new and upgraded packages, this release has the followin However, if [`services.fail2ban.enable`](options.html#opt-services.fail2ban.enable) is `true`, the `fail2ban` will override the verbosity to `"VERBOSE"`, so that `fail2ban` can observe the failed login attempts from the SSH logs. - Sway: The terminal emulator `rxvt-unicode` is no longer installed by default via `programs.sway.extraPackages`. The current default configuration uses `alacritty` (and soon `foot`) so this is only an issue when using a customized configuration and not installing `rxvt-unicode` explicitly. + +- The `claws-mail` package now references the new GTK+ 3 release branch, major version 4. To use the GTK+ 2 releases, one can install the `claws-mail-gtk2` package. diff --git a/pkgs/applications/networking/mailreaders/claws-mail/default.nix b/pkgs/applications/networking/mailreaders/claws-mail/default.nix index e28680c245f..5090b1fd027 100644 --- a/pkgs/applications/networking/mailreaders/claws-mail/default.nix +++ b/pkgs/applications/networking/mailreaders/claws-mail/default.nix @@ -1,9 +1,9 @@ -{ stdenv, lib, fetchgit, wrapGAppsHook, autoreconfHook, bison, flex +{ stdenv, lib, fetchgit, fetchpatch, wrapGAppsHook, autoreconfHook, bison, flex , curl, gtk2, gtk3, pkg-config, python2, python3, shared-mime-info , glib-networking, gsettings-desktop-schemas -# Use the experimental gtk3 branch. -, useGtk3 ? false +# Selector between the GTK+ 3 and GTK+ 2 releases. +, useGtk3 # Package compatibility: old parameters whose name were not directly derived , enablePgp ? true @@ -57,16 +57,15 @@ with lib; let - version = if useGtk3 then "3.99.0" else "3.17.8"; + # Last release and hash for both the GTK+ 3 and GTK+ 2 version. + version = if useGtk3 then "4.0.0" else "3.18.0"; - # The official release uses gtk2 and contains the version tag. gtk2src = { - sha256 = "0l4f8q11iyj8pi120lrapgq51k5j64xf0jlczkzbm99rym752ch5"; + sha256 = "1vsiy3xsppw4d8ylsz70wsyrvmgy88lp2hj7vrc353ckny80r9lh"; }; - # The corresponding commit in the gtk3 branch. gtk3src = { - sha256 = "176h1swh1zx6dqyzfz470x4a1xicnv0zhy8ir47k7p23g6y17i2k"; + sha256 = "0mwnjiqg2sj61va0y9yi3v52iyr5kzmbnvsqxav3a48m2f8p27qn"; }; python = if useGtk3 then python3 else python2; @@ -125,7 +124,19 @@ in stdenv.mkDerivation rec { outputs = [ "out" "dev" ]; - patches = [ ./mime.patch ]; + patches = [ + ./mime.patch + + # Fixes a bug with the automatic authentication method, resulting in errors + # with certain mail providers. + # + # This MUST be removed for the next release. + (fetchpatch { + name = "fix-automatic-auth.patch"; + url = "https://git.claws-mail.org/?p=claws.git;a=patch;h=9c2585c58b49815a0eab8d683f0a94f75cbbe64e"; + sha256 = "0v8v5q2p4h93lp7yq3gnlvarsrcssv96aks1wqy3187vsr4kdw7a"; + }) + ]; preConfigure = '' # autotools check tries to dlopen libpython as a requirement for the python plugin diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index 0df082ff35c..2bc734dc48f 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -129,6 +129,7 @@ mapAliases ({ clang12Stdenv = lowPrio llvmPackages_12.stdenv; clangAnalyzer = clang-analyzer; # added 2015-02-20 + claws-mail-gtk3 = claws-mail; # added 2021-07-10 clawsMail = claws-mail; # added 2016-04-29 clutter_gtk = clutter-gtk; # added 2018-02-25 cmakeWithQt4Gui = throw "cmakeWithQt4Gui has been removed in favor of cmakeWithGui (Qt 5)"; # added 2021-05 diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 6d6b95e8f4a..dddd0b4150f 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -23280,10 +23280,11 @@ in cipher = callPackage ../applications/misc/cipher { }; - claws-mail = callPackage ../applications/networking/mailreaders/claws-mail { + claws-mail-gtk2 = callPackage ../applications/networking/mailreaders/claws-mail { inherit (xorg) libSM; + useGtk3 = false; }; - claws-mail-gtk3 = callPackage ../applications/networking/mailreaders/claws-mail { + claws-mail = callPackage ../applications/networking/mailreaders/claws-mail { inherit (xorg) libSM; useGtk3 = true; }; -- cgit 1.4.1 From 6d203a68c624bbedaa7995f88d2e1e091bdb97f4 Mon Sep 17 00:00:00 2001 From: Janne Heß Date: Tue, 13 Jul 2021 18:22:28 +0200 Subject: nixos/icingaweb2: Add ipl and thirdparty libraries These are required since 2.9.0 --- .../manual/from_md/release-notes/rl-2111.section.xml | 10 +++++++++- nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ .../services/web-apps/icingaweb2/icingaweb2.nix | 18 ++++++++++++++++++ 3 files changed, 29 insertions(+), 1 deletion(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 53c1a18a507..66a3f908129 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -479,7 +479,7 @@ - + yggdrasil was upgraded to a new major @@ -488,6 +488,14 @@ changelog. + + + icingaweb2 was upgraded to a new release + which requires a manual database upgrade, see + upstream + changelog. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index ad56b5cd7d7..d270a362079 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -120,6 +120,8 @@ In addition to numerous new and upgraded packages, this release has the followin - `yggdrasil` was upgraded to a new major release with breaking changes, see [upstream changelog](https://github.com/yggdrasil-network/yggdrasil-go/releases/tag/v0.4.0). +- `icingaweb2` was upgraded to a new release which requires a manual database upgrade, see [upstream changelog](https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0). + ## Other Notable Changes {#sec-release-21.11-notable-changes} - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets. diff --git a/nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix b/nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix index eea49bda283..f8f0854f1bc 100644 --- a/nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix +++ b/nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix @@ -23,6 +23,16 @@ in { ''; }; + libraryPaths = mkOption { + type = attrsOf package; + default = { }; + description = '' + Libraries to add to the Icingaweb2 library path. + The name of the attribute is the name of the library, the value + is the package to add. + ''; + }; + virtualHost = mkOption { type = nullOr str; default = "icingaweb2"; @@ -167,6 +177,9 @@ in { services.phpfpm.pools = mkIf (cfg.pool == "${poolName}") { ${poolName} = { user = "icingaweb2"; + phpEnv = { + ICINGAWEB_LIBDIR = toString (pkgs.linkFarm "icingaweb2-libdir" (mapAttrsToList (name: path: { inherit name path; }) cfg.libraryPaths)); + }; phpPackage = pkgs.php.withExtensions ({ enabled, all }: [ all.imagick ] ++ enabled); phpOptions = '' date.timezone = "${cfg.timezone}" @@ -184,6 +197,11 @@ in { }; }; + services.icingaweb2.libraryPaths = { + ipl = pkgs.icingaweb2-ipl; + thirdparty = pkgs.icingaweb2-thirdparty; + }; + systemd.services."phpfpm-${poolName}".serviceConfig.ReadWritePaths = [ "/etc/icingaweb2" ]; services.nginx = { -- cgit 1.4.1 From 2ea5a4ce6d7b67902e76a3423e493d603c3ad3f0 Mon Sep 17 00:00:00 2001 From: Martin Weinelt Date: Wed, 14 Jul 2021 01:11:18 +0200 Subject: nixos/doc: add release note entry for kea module --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 7 +++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ 2 files changed, 9 insertions(+) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 53c1a18a507..91acaf728e2 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -47,6 +47,13 @@ services.geoipupdate. + + + Kea, ISCs + 2nd generation DHCP and DDNS server suite. Available at + services.kea. + + sourcehut, a diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index ad56b5cd7d7..1cef74510db 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -15,6 +15,8 @@ In addition to numerous new and upgraded packages, this release has the followin - [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP database updater from MaxMind. Available as [services.geoipupdate](options.html#opt-services.geoipupdate.enable). +- [Kea](https://www.isc.org/kea/), ISCs 2nd generation DHCP and DDNS server suite. Available at [services.kea](options.html#opt-services.kea). + - [sourcehut](https://sr.ht), a collection of tools useful for software development. Available as [services.sourcehut](options.html#opt-services.sourcehut.enable). - [ucarp](https://download.pureftpd.org/pub/ucarp/README), an userspace implementation of the Common Address Redundancy Protocol (CARP). Available as [networking.ucarp](options.html#opt-networking.ucarp.enable). -- cgit 1.4.1 From 145a3d084af985c7c39d4de8fc5630f8c0b9da1c Mon Sep 17 00:00:00 2001 From: lunik1 Date: Wed, 14 Jul 2021 17:40:05 +0100 Subject: nixos/snapraid: init --- .../from_md/release-notes/rl-2111.section.xml | 7 + nixos/doc/manual/release-notes/rl-2111.section.md | 4 + nixos/modules/module-list.nix | 1 + nixos/modules/tasks/snapraid.nix | 230 +++++++++++++++++++++ 4 files changed, 242 insertions(+) create mode 100644 nixos/modules/tasks/snapraid.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 53c1a18a507..6f2a7fd8dd5 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -78,6 +78,13 @@ services.vikunja. + + + snapraid, a + backup program for disk arrays. Available as + snapraid. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index ad56b5cd7d7..5a1a29c270a 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -23,6 +23,10 @@ In addition to numerous new and upgraded packages, this release has the followin - [vikunja](https://vikunja.io), a to-do list app. Available as [services.vikunja](#opt-services.vikunja.enable). +- [snapraid](https://www.snapraid.it/), a backup program for disk arrays. + Available as [snapraid](#opt-snapraid.enable). + + ## Backward Incompatibilities {#sec-release-21.11-incompatibilities} - The `staticjinja` package has been upgraded from 1.0.4 to 3.0.1 diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 69616716c92..3474c6e99d2 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -1104,6 +1104,7 @@ ./tasks/network-interfaces-systemd.nix ./tasks/network-interfaces-scripted.nix ./tasks/scsi-link-power-management.nix + ./tasks/snapraid.nix ./tasks/swraid.nix ./tasks/trackpoint.nix ./tasks/powertop.nix diff --git a/nixos/modules/tasks/snapraid.nix b/nixos/modules/tasks/snapraid.nix new file mode 100644 index 00000000000..4529009930f --- /dev/null +++ b/nixos/modules/tasks/snapraid.nix @@ -0,0 +1,230 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let cfg = config.snapraid; +in +{ + options.snapraid = with types; { + enable = mkEnableOption "SnapRAID"; + dataDisks = mkOption { + default = { }; + example = { + d1 = "/mnt/disk1/"; + d2 = "/mnt/disk2/"; + d3 = "/mnt/disk3/"; + }; + description = "SnapRAID data disks."; + type = attrsOf str; + }; + parityFiles = mkOption { + default = [ ]; + example = [ + "/mnt/diskp/snapraid.parity" + "/mnt/diskq/snapraid.2-parity" + "/mnt/diskr/snapraid.3-parity" + "/mnt/disks/snapraid.4-parity" + "/mnt/diskt/snapraid.5-parity" + "/mnt/disku/snapraid.6-parity" + ]; + description = "SnapRAID parity files."; + type = listOf str; + }; + contentFiles = mkOption { + default = [ ]; + example = [ + "/var/snapraid.content" + "/mnt/disk1/snapraid.content" + "/mnt/disk2/snapraid.content" + ]; + description = "SnapRAID content list files."; + type = listOf str; + }; + exclude = mkOption { + default = [ ]; + example = [ "*.unrecoverable" "/tmp/" "/lost+found/" ]; + description = "SnapRAID exclude directives."; + type = listOf str; + }; + touchBeforeSync = mkOption { + default = true; + example = false; + description = + "Whether snapraid touch should be run before snapraid sync."; + type = bool; + }; + sync.interval = mkOption { + default = "01:00"; + example = "daily"; + description = "How often to run snapraid sync."; + type = str; + }; + scrub = { + interval = mkOption { + default = "Mon *-*-* 02:00:00"; + example = "weekly"; + description = "How often to run snapraid scrub."; + type = str; + }; + plan = mkOption { + default = 8; + example = 5; + description = + "Percent of the array that should be checked by snapraid scrub."; + type = int; + }; + olderThan = mkOption { + default = 10; + example = 20; + description = + "Number of days since data was last scrubbed before it can be scrubbed again."; + type = int; + }; + }; + extraConfig = mkOption { + default = ""; + example = '' + nohidden + blocksize 256 + hashsize 16 + autosave 500 + pool /pool + ''; + description = "Extra config options for SnapRAID."; + type = lines; + }; + }; + + config = + let + nParity = builtins.length cfg.parityFiles; + mkPrepend = pre: s: pre + s; + in + mkIf cfg.enable { + assertions = [ + { + assertion = nParity <= 6; + message = "You can have no more than six SnapRAID parity files."; + } + { + assertion = builtins.length cfg.contentFiles >= nParity + 1; + message = + "There must be at least one SnapRAID content file for each SnapRAID parity file plus one."; + } + ]; + + environment = { + systemPackages = with pkgs; [ snapraid ]; + + etc."snapraid.conf" = { + text = with cfg; + let + prependData = mkPrepend "data "; + prependContent = mkPrepend "content "; + prependExclude = mkPrepend "exclude "; + in + concatStringsSep "\n" + (map prependData + ((mapAttrsToList (name: value: name + " " + value)) dataDisks) + ++ zipListsWith (a: b: a + b) + ([ "parity " ] ++ map (i: toString i + "-parity ") (range 2 6)) + parityFiles ++ map prependContent contentFiles + ++ map prependExclude exclude) + "\n" + extraConfig; + }; + }; + + systemd.services = with cfg; { + snapraid-scrub = { + description = "Scrub the SnapRAID array"; + startAt = scrub.interval; + serviceConfig = { + Type = "oneshot"; + ExecStart = "${pkgs.snapraid}/bin/snapraid scrub -p ${ + toString scrub.plan + } -o ${toString scrub.olderThan}"; + Nice = 19; + IOSchedulingPriority = 7; + CPUSchedulingPolicy = "batch"; + + LockPersonality = true; + MemoryDenyWriteExecute = true; + NoNewPrivileges = true; + PrivateDevices = true; + PrivateTmp = true; + ProtectClock = true; + ProtectControlGroups = true; + ProtectHostname = true; + ProtectKernelLogs = true; + ProtectKernelModules = true; + ProtectKernelTunables = true; + RestrictAddressFamilies = "none"; + RestrictNamespaces = true; + RestrictRealtime = true; + RestrictSUIDSGID = true; + SystemCallArchitectures = "native"; + SystemCallFilter = "@system-service"; + SystemCallErrorNumber = "EPERM"; + CapabilityBoundingSet = "CAP_DAC_OVERRIDE"; + + ProtectSystem = "strict"; + ProtectHome = "read-only"; + ReadWritePaths = + # scrub requires access to directories containing content files + # to remove them if they are stale + let + contentDirs = map dirOf contentFiles; + in + unique ( + attrValues dataDisks ++ contentDirs + ); + }; + unitConfig.After = "snapraid-sync.service"; + }; + snapraid-sync = { + description = "Synchronize the state of the SnapRAID array"; + startAt = sync.interval; + serviceConfig = { + Type = "oneshot"; + ExecStart = "${pkgs.snapraid}/bin/snapraid sync"; + Nice = 19; + IOSchedulingPriority = 7; + CPUSchedulingPolicy = "batch"; + + LockPersonality = true; + MemoryDenyWriteExecute = true; + NoNewPrivileges = true; + PrivateDevices = true; + PrivateTmp = true; + ProtectClock = true; + ProtectControlGroups = true; + ProtectHostname = true; + ProtectKernelLogs = true; + ProtectKernelModules = true; + ProtectKernelTunables = true; + RestrictAddressFamilies = "none"; + RestrictNamespaces = true; + RestrictRealtime = true; + RestrictSUIDSGID = true; + SystemCallArchitectures = "native"; + SystemCallFilter = "@system-service"; + SystemCallErrorNumber = "EPERM"; + CapabilityBoundingSet = "CAP_DAC_OVERRIDE"; + + ProtectSystem = "strict"; + ProtectHome = "read-only"; + ReadWritePaths = + # sync requires access to directories containing content files + # to remove them if they are stale + let + contentDirs = map dirOf contentFiles; + in + unique ( + attrValues dataDisks ++ parityFiles ++ contentDirs + ); + } // optionalAttrs touchBeforeSync { + ExecStartPre = "${pkgs.snapraid}/bin/snapraid touch"; + }; + }; + }; + }; +} -- cgit 1.4.1 From d4eca42de4ce49c3af02e790a72239506087b210 Mon Sep 17 00:00:00 2001 From: Jean-Philippe Braun Date: Mon, 6 Apr 2020 09:25:07 +0200 Subject: nixos/wordpress: nginx support --- .../from_md/release-notes/rl-2111.section.xml | 16 +++ nixos/doc/manual/release-notes/rl-2111.section.md | 4 + nixos/modules/services/web-apps/wordpress.nix | 126 ++++++++++++++++++--- nixos/tests/wordpress.nix | 66 +++++++---- 4 files changed, 173 insertions(+), 39 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index b9967ffb982..fcaac9e8bec 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -546,6 +546,22 @@ claws-mail-gtk2 package. + + + The wordpress module provides a new interface which allows to + use different webservers with the new option + services.wordpress.webserver. + Currently httpd and + nginx are supported. The definitions of + wordpress sites should now be set in + services.wordpress.sites. + + + Sites definitions that use the old interface are automatically + migrated in the new option. This backward compatibility will + be removed in 22.05. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 377dbf598d9..030f1d21818 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -135,3 +135,7 @@ In addition to numerous new and upgraded packages, this release has the followin - Sway: The terminal emulator `rxvt-unicode` is no longer installed by default via `programs.sway.extraPackages`. The current default configuration uses `alacritty` (and soon `foot`) so this is only an issue when using a customized configuration and not installing `rxvt-unicode` explicitly. - The `claws-mail` package now references the new GTK+ 3 release branch, major version 4. To use the GTK+ 2 releases, one can install the `claws-mail-gtk2` package. + +- The wordpress module provides a new interface which allows to use different webservers with the new option [`services.wordpress.webserver`](options.html#opt-services.wordpress.webserver). Currently `httpd` and `nginx` are supported. The definitions of wordpress sites should now be set in [`services.wordpress.sites`](options.html#opt-services.wordpress.sites). + + Sites definitions that use the old interface are automatically migrated in the new option. This backward compatibility will be removed in 22.05. diff --git a/nixos/modules/services/web-apps/wordpress.nix b/nixos/modules/services/web-apps/wordpress.nix index 775ecb3acaf..6f1ef815bc4 100644 --- a/nixos/modules/services/web-apps/wordpress.nix +++ b/nixos/modules/services/web-apps/wordpress.nix @@ -3,13 +3,18 @@ let inherit (lib) mkDefault mkEnableOption mkForce mkIf mkMerge mkOption types; inherit (lib) any attrValues concatMapStringsSep flatten literalExample; - inherit (lib) mapAttrs mapAttrs' mapAttrsToList nameValuePair optional optionalAttrs optionalString; + inherit (lib) filterAttrs mapAttrs mapAttrs' mapAttrsToList nameValuePair optional optionalAttrs optionalString; - eachSite = config.services.wordpress; + cfg = migrateOldAttrs config.services.wordpress; + eachSite = cfg.sites; user = "wordpress"; - group = config.services.httpd.group; + webserver = config.services.${cfg.webserver}; stateDir = hostName: "/var/lib/wordpress/${hostName}"; + # Migrate config.services.wordpress. to config.services.wordpress.sites. + oldSites = filterAttrs (o: _: o != "sites" && o != "webserver"); + migrateOldAttrs = cfg: cfg // { sites = cfg.sites // oldSites cfg; }; + pkg = hostName: cfg: pkgs.stdenv.mkDerivation rec { pname = "wordpress-${hostName}"; version = src.version; @@ -261,21 +266,48 @@ in # interface options = { services.wordpress = mkOption { - type = types.attrsOf (types.submodule siteOpts); + type = types.submodule { + # Used to support old interface + freeformType = types.attrsOf (types.submodule siteOpts); + + # New interface + options.sites = mkOption { + type = types.attrsOf (types.submodule siteOpts); + default = {}; + description = "Specification of one or more WordPress sites to serve"; + }; + + options.webserver = mkOption { + type = types.enum [ "httpd" "nginx" ]; + default = "httpd"; + description = '' + Whether to use apache2 or nginx for virtual host management. + + Further nginx configuration can be done by adapting services.nginx.virtualHosts.<name>. + See for further information. + + Further apache2 configuration can be done by adapting services.httpd.virtualHosts.<name>. + See for further information. + ''; + }; + }; default = {}; - description = "Specification of one or more WordPress sites to serve via Apache."; + description = "Wordpress configuration"; }; + }; # implementation - config = mkIf (eachSite != {}) { + config = mkIf (eachSite != {}) (mkMerge [{ assertions = mapAttrsToList (hostName: cfg: { assertion = cfg.database.createLocally -> cfg.database.user == user; - message = "services.wordpress.${hostName}.database.user must be ${user} if the database is to be automatically provisioned"; + message = ''services.wordpress.sites."${hostName}".database.user must be ${user} if the database is to be automatically provisioned''; } ) eachSite; + warnings = mapAttrsToList (hostName: _: ''services.wordpress."${hostName}" is deprecated use services.wordpress.sites."${hostName}"'') (oldSites cfg); + services.mysql = mkIf (any (v: v.database.createLocally) (attrValues eachSite)) { enable = true; package = mkDefault pkgs.mariadb; @@ -289,14 +321,18 @@ in services.phpfpm.pools = mapAttrs' (hostName: cfg: ( nameValuePair "wordpress-${hostName}" { - inherit user group; + inherit user; + group = webserver.group; settings = { - "listen.owner" = config.services.httpd.user; - "listen.group" = config.services.httpd.group; + "listen.owner" = webserver.user; + "listen.group" = webserver.group; } // cfg.poolConfig; } )) eachSite; + } + + (mkIf (cfg.webserver == "httpd") { services.httpd = { enable = true; extraModules = [ "proxy_fcgi" ]; @@ -332,11 +368,13 @@ in ''; } ]) eachSite; }; + }) + { systemd.tmpfiles.rules = flatten (mapAttrsToList (hostName: cfg: [ - "d '${stateDir hostName}' 0750 ${user} ${group} - -" - "d '${cfg.uploadsDir}' 0750 ${user} ${group} - -" - "Z '${cfg.uploadsDir}' 0750 ${user} ${group} - -" + "d '${stateDir hostName}' 0750 ${user} ${webserver.group} - -" + "d '${cfg.uploadsDir}' 0750 ${user} ${webserver.group} - -" + "Z '${cfg.uploadsDir}' 0750 ${user} ${webserver.group} - -" ]) eachSite); systemd.services = mkMerge [ @@ -350,7 +388,7 @@ in serviceConfig = { Type = "oneshot"; User = user; - Group = group; + Group = webserver.group; }; })) eachSite) @@ -360,9 +398,65 @@ in ]; users.users.${user} = { - group = group; + group = webserver.group; isSystemUser = true; }; + } - }; + (mkIf (cfg.webserver == "nginx") { + services.nginx = { + enable = true; + virtualHosts = mapAttrs (hostName: cfg: { + serverName = mkDefault hostName; + root = "${pkg hostName cfg}/share/wordpress"; + extraConfig = '' + index index.php; + ''; + locations = { + "/" = { + priority = 200; + extraConfig = '' + try_files $uri $uri/ /index.php$is_args$args; + ''; + }; + "~ \\.php$" = { + priority = 500; + extraConfig = '' + fastcgi_split_path_info ^(.+\.php)(/.+)$; + fastcgi_pass unix:${config.services.phpfpm.pools."wordpress-${hostName}".socket}; + fastcgi_index index.php; + include "${config.services.nginx.package}/conf/fastcgi.conf"; + fastcgi_param PATH_INFO $fastcgi_path_info; + fastcgi_param PATH_TRANSLATED $document_root$fastcgi_path_info; + # Mitigate https://httpoxy.org/ vulnerabilities + fastcgi_param HTTP_PROXY ""; + fastcgi_intercept_errors off; + fastcgi_buffer_size 16k; + fastcgi_buffers 4 16k; + fastcgi_connect_timeout 300; + fastcgi_send_timeout 300; + fastcgi_read_timeout 300; + ''; + }; + "~ /\\." = { + priority = 800; + extraConfig = "deny all;"; + }; + "~* /(?:uploads|files)/.*\\.php$" = { + priority = 900; + extraConfig = "deny all;"; + }; + "~* \\.(js|css|png|jpg|jpeg|gif|ico)$" = { + priority = 1000; + extraConfig = '' + expires max; + log_not_found off; + ''; + }; + }; + }) eachSite; + }; + }) + + ]); } diff --git a/nixos/tests/wordpress.nix b/nixos/tests/wordpress.nix index a5c10c2de74..45c58b5b65c 100644 --- a/nixos/tests/wordpress.nix +++ b/nixos/tests/wordpress.nix @@ -10,48 +10,68 @@ import ./make-test-python.nix ({ pkgs, ... }: ]; }; - machine = - { ... }: - { services.httpd.adminAddr = "webmaster@site.local"; + nodes = { + wp_httpd = { ... }: { + services.httpd.adminAddr = "webmaster@site.local"; services.httpd.logPerVirtualHost = true; - services.wordpress."site1.local" = { - database.tablePrefix = "site1_"; + services.wordpress = { + # Test support for old interface + "site1.local" = { + database.tablePrefix = "site1_"; + }; + sites = { + "site2.local" = { + database.tablePrefix = "site2_"; + }; + }; }; - services.wordpress."site2.local" = { - database.tablePrefix = "site2_"; + networking.firewall.allowedTCPPorts = [ 80 ]; + networking.hosts."127.0.0.1" = [ "site1.local" "site2.local" ]; + }; + + wp_nginx = { ... }: { + services.wordpress.webserver = "nginx"; + services.wordpress.sites = { + "site1.local" = { + database.tablePrefix = "site1_"; + }; + "site2.local" = { + database.tablePrefix = "site2_"; + }; }; + networking.firewall.allowedTCPPorts = [ 80 ]; networking.hosts."127.0.0.1" = [ "site1.local" "site2.local" ]; }; + }; testScript = '' import re start_all() - machine.wait_for_unit("httpd") - - machine.wait_for_unit("phpfpm-wordpress-site1.local") - machine.wait_for_unit("phpfpm-wordpress-site2.local") + wp_httpd.wait_for_unit("httpd") + wp_nginx.wait_for_unit("nginx") site_names = ["site1.local", "site2.local"] - with subtest("website returns welcome screen"): + for machine in (wp_httpd, wp_nginx): for site_name in site_names: - assert "Welcome to the famous" in machine.succeed(f"curl -fL {site_name}") + machine.wait_for_unit(f"phpfpm-wordpress-{site_name}") - with subtest("wordpress-init went through"): - for site_name in site_names: - info = machine.get_unit_info(f"wordpress-init-{site_name}") - assert info["Result"] == "success" + with subtest("website returns welcome screen"): + assert "Welcome to the famous" in machine.succeed(f"curl -L {site_name}") - with subtest("secret keys are set"): - pattern = re.compile(r"^define.*NONCE_SALT.{64,};$", re.MULTILINE) - for site_name in site_names: - assert pattern.search( - machine.succeed(f"cat /var/lib/wordpress/{site_name}/secret-keys.php") - ) + with subtest("wordpress-init went through"): + info = machine.get_unit_info(f"wordpress-init-{site_name}") + assert info["Result"] == "success" + + with subtest("secret keys are set"): + pattern = re.compile(r"^define.*NONCE_SALT.{64,};$", re.MULTILINE) + assert pattern.search( + machine.succeed(f"cat /var/lib/wordpress/{site_name}/secret-keys.php") + ) ''; }) -- cgit 1.4.1 From c1536f5c78ead2fdcb0ec11824d673638fa6a5f4 Mon Sep 17 00:00:00 2001 From: Florian Klink Date: Sat, 17 Jul 2021 19:41:45 +0200 Subject: nixos/systemd: fix NSS database ordering - The order of NSS (host) modules has been brought in line with upstream recommendations: - The `myhostname` module is placed before the `resolve` (optional) and `dns` entries, but after `file` (to allow overriding via `/etc/hosts` / `networking.extraHosts`, and prevent ISPs with catchall-DNS resolvers from hijacking `.localhost` domains) - The `mymachines` module, which provides hostname resolution for local containers (registered with `systemd-machined`) is placed to the front, to make sure its mappings are preferred over other resolvers. - If systemd-networkd is enabled, the `resolve` module is placed before `files` and `myhostname`, as it provides the same logic internally, with caching. - The `mdns(_minimal)` module has been updated to the new priorities. If you use your own NSS host modules, make sure to update your priorities according to these rules: - NSS modules which should be queried before `resolved` DNS resolution should use mkBefore. - NSS modules which should be queried after `resolved`, `files` and `myhostname`, but before `dns` should use the default priority - NSS modules which should come after `dns` should use mkAfter. --- .../from_md/release-notes/rl-2111.section.xml | 71 ++++++++++++++++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 24 ++++++++ nixos/modules/config/nsswitch.nix | 4 +- nixos/modules/services/networking/avahi-daemon.nix | 4 +- nixos/modules/system/boot/resolved.nix | 3 +- nixos/modules/system/boot/systemd.nix | 5 +- 6 files changed, 103 insertions(+), 8 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index fcaac9e8bec..e923a289442 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -562,6 +562,77 @@ be removed in 22.05. + + + The order of NSS (host) modules has been brought in line with + upstream recommendations: + + + + + The myhostname module is placed before + the resolve (optional) and + dns entries, but after + file (to allow overriding via + /etc/hosts / + networking.extraHosts, and prevent ISPs + with catchall-DNS resolvers from hijacking + .localhost domains) + + + + + The mymachines module, which provides + hostname resolution for local containers (registered with + systemd-machined) is placed to the + front, to make sure its mappings are preferred over other + resolvers. + + + + + If systemd-networkd is enabled, the + resolve module is placed before + files and + myhostname, as it provides the same + logic internally, with caching. + + + + + The mdns(_minimal) module has been + updated to the new priorities. + + + + + If you use your own NSS host modules, make sure to update your + priorities according to these rules: + + + + + NSS modules which should be queried before + resolved DNS resolution should use + mkBefore. + + + + + NSS modules which should be queried after + resolved, files and + myhostname, but before + dns should use the default priority + + + + + NSS modules which should come after dns + should use mkAfter. + + + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 030f1d21818..4409ad7b436 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -139,3 +139,27 @@ In addition to numerous new and upgraded packages, this release has the followin - The wordpress module provides a new interface which allows to use different webservers with the new option [`services.wordpress.webserver`](options.html#opt-services.wordpress.webserver). Currently `httpd` and `nginx` are supported. The definitions of wordpress sites should now be set in [`services.wordpress.sites`](options.html#opt-services.wordpress.sites). Sites definitions that use the old interface are automatically migrated in the new option. This backward compatibility will be removed in 22.05. + +- The order of NSS (host) modules has been brought in line with upstream + recommendations: + + - The `myhostname` module is placed before the `resolve` (optional) and `dns` + entries, but after `file` (to allow overriding via `/etc/hosts` / + `networking.extraHosts`, and prevent ISPs with catchall-DNS resolvers from + hijacking `.localhost` domains) + - The `mymachines` module, which provides hostname resolution for local + containers (registered with `systemd-machined`) is placed to the front, to + make sure its mappings are preferred over other resolvers. + - If systemd-networkd is enabled, the `resolve` module is placed before + `files` and `myhostname`, as it provides the same logic internally, with + caching. + - The `mdns(_minimal)` module has been updated to the new priorities. + + If you use your own NSS host modules, make sure to update your priorities + according to these rules: + + - NSS modules which should be queried before `resolved` DNS resolution should + use mkBefore. + - NSS modules which should be queried after `resolved`, `files` and + `myhostname`, but before `dns` should use the default priority + - NSS modules which should come after `dns` should use mkAfter. diff --git a/nixos/modules/config/nsswitch.nix b/nixos/modules/config/nsswitch.nix index d19d35a4890..91a36cef10e 100644 --- a/nixos/modules/config/nsswitch.nix +++ b/nixos/modules/config/nsswitch.nix @@ -124,8 +124,8 @@ with lib; group = mkBefore [ "files" ]; shadow = mkBefore [ "files" ]; hosts = mkMerge [ - (mkBefore [ "files" ]) - (mkAfter [ "dns" ]) + (mkOrder 998 [ "files" ]) + (mkOrder 1499 [ "dns" ]) ]; services = mkBefore [ "files" ]; }; diff --git a/nixos/modules/services/networking/avahi-daemon.nix b/nixos/modules/services/networking/avahi-daemon.nix index 0b7d5575c11..020a817f259 100644 --- a/nixos/modules/services/networking/avahi-daemon.nix +++ b/nixos/modules/services/networking/avahi-daemon.nix @@ -240,8 +240,8 @@ in system.nssModules = optional cfg.nssmdns pkgs.nssmdns; system.nssDatabases.hosts = optionals cfg.nssmdns (mkMerge [ - (mkOrder 900 [ "mdns_minimal [NOTFOUND=return]" ]) # must be before resolve - (mkOrder 1501 [ "mdns" ]) # 1501 to ensure it's after dns + (mkBefore [ "mdns_minimal [NOTFOUND=return]" ]) # before resolve + (mkAfter [ "mdns" ]) # after dns ]); environment.systemPackages = [ pkgs.avahi ]; diff --git a/nixos/modules/system/boot/resolved.nix b/nixos/modules/system/boot/resolved.nix index 84bc9b78076..a6fc07da0ab 100644 --- a/nixos/modules/system/boot/resolved.nix +++ b/nixos/modules/system/boot/resolved.nix @@ -140,7 +140,8 @@ in # add resolve to nss hosts database if enabled and nscd enabled # system.nssModules is configured in nixos/modules/system/boot/systemd.nix - system.nssDatabases.hosts = optional config.services.nscd.enable "resolve [!UNAVAIL=return]"; + # added with order 501 to allow modules to go before with mkBefore + system.nssDatabases.hosts = (mkOrder 501 ["resolve [!UNAVAIL=return]"]); systemd.additionalUpstreamSystemUnits = [ "systemd-resolved.service" diff --git a/nixos/modules/system/boot/systemd.nix b/nixos/modules/system/boot/systemd.nix index abd8ab29cae..58064e5de86 100644 --- a/nixos/modules/system/boot/systemd.nix +++ b/nixos/modules/system/boot/systemd.nix @@ -925,9 +925,8 @@ in system.nssModules = [ systemd.out ]; system.nssDatabases = { hosts = (mkMerge [ - [ "mymachines" ] - (mkOrder 1600 [ "myhostname" ] # 1600 to ensure it's always the last - ) + (mkOrder 400 ["mymachines"]) # 400 to ensure it comes before resolve (which is mkBefore'd) + (mkOrder 999 ["myhostname"]) # after files (which is 998), but before regular nss modules ]); passwd = (mkMerge [ (mkAfter [ "systemd" ]) -- cgit 1.4.1 From 1bc6f380003de4985ec6c77f86c5743b41773e74 Mon Sep 17 00:00:00 2001 From: Maxine Aubrey Date: Sun, 18 Jul 2021 15:52:29 +0200 Subject: nixos/doc: update EOL of 21.11 --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 2 +- nixos/doc/manual/release-notes/rl-2111.section.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 7ebf6c0187a..0d3c3f2a0da 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -7,7 +7,7 @@ - Support is planned until the end of April 2022, handing over to + Support is planned until the end of June 2022, handing over to 22.05. diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index a0ca0ca3d0e..1d037e2c5ca 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -2,7 +2,7 @@ In addition to numerous new and upgraded packages, this release has the following highlights: -- Support is planned until the end of April 2022, handing over to 22.05. +- Support is planned until the end of June 2022, handing over to 22.05. ## Highlights {#sec-release-21.11-highlights} -- cgit 1.4.1 From 9111bd40b2411bc9cfdf6a7ab981e83005788837 Mon Sep 17 00:00:00 2001 From: Jan van Brügge Date: Sun, 18 Jul 2021 23:49:43 +0200 Subject: isabelle: 2020 -> 2021 --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 6 ++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ pkgs/applications/science/logic/isabelle/default.nix | 8 +++++--- 3 files changed, 13 insertions(+), 3 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 0d3c3f2a0da..9fae164c93f 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -510,6 +510,12 @@ changelog. + + + The isabelle package has been upgraded from + 2020 to 2021 + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 1d037e2c5ca..94d203b35b2 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -128,6 +128,8 @@ In addition to numerous new and upgraded packages, this release has the followin - `icingaweb2` was upgraded to a new release which requires a manual database upgrade, see [upstream changelog](https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0). +- The `isabelle` package has been upgraded from 2020 to 2021 + ## Other Notable Changes {#sec-release-21.11-notable-changes} - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets. diff --git a/pkgs/applications/science/logic/isabelle/default.nix b/pkgs/applications/science/logic/isabelle/default.nix index 600ae83ff91..b24c452cd18 100644 --- a/pkgs/applications/science/logic/isabelle/default.nix +++ b/pkgs/applications/science/logic/isabelle/default.nix @@ -3,18 +3,18 @@ stdenv.mkDerivation rec { pname = "isabelle"; - version = "2020"; + version = "2021"; dirname = "Isabelle${version}"; src = if stdenv.isDarwin then fetchurl { url = "https://isabelle.in.tum.de/website-${dirname}/dist/${dirname}_macos.tar.gz"; - sha256 = "1sfr5filsaqj93g5y4p9n8g5652dhr4whj25x4lifdxr2pp560xx"; + sha256 = "1c2qm2ksmpyxyccyyn4lyj2wqj5m74nz2i0c5abrd1hj45zcnh1m"; } else fetchurl { url = "https://isabelle.in.tum.de/website-${dirname}/dist/${dirname}_linux.tar.gz"; - sha256 = "1bibabhlsvf6qsjjkgxcpq3cvl1z7r8yfcgqbhbvsiv69n3gyfk3"; + sha256 = "1isgc9w4q95638dcag9gxz1kmf97pkin3jz1dm2lhd64b2k12y2x"; }; nativeBuildInputs = [ makeWrapper ]; @@ -48,6 +48,8 @@ stdenv.mkDerivation rec { ISABELLE_JDK_HOME=${java} EOF + sed -i -e 's/naproche_server : bool = true/naproche_server : bool = false/' contrib/naproche-*/etc/options + echo ISABELLE_LINE_EDITOR=${rlwrap}/bin/rlwrap >>etc/settings for comp in contrib/jdk* contrib/polyml-* contrib/z3-*; do -- cgit 1.4.1 From 09a49354b6dab9ea9807359ec3f7434b54730eab Mon Sep 17 00:00:00 2001 From: Elis Hirwing Date: Sun, 18 Jul 2021 08:49:36 +0200 Subject: nixos/hockeypuck: Add service for hockeypuck --- .../from_md/release-notes/rl-2111.section.xml | 7 ++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 + nixos/modules/module-list.nix | 1 + nixos/modules/services/security/hockeypuck.nix | 104 +++++++++++++++++++++ 4 files changed, 114 insertions(+) create mode 100644 nixos/modules/services/security/hockeypuck.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 7ebf6c0187a..5b5f8514861 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -92,6 +92,13 @@ snapraid. + + + Hockeypuck, + a OpenPGP Key Server. Available as + services.hockeypuck. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index a0ca0ca3d0e..c1e2dadd640 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -28,6 +28,8 @@ In addition to numerous new and upgraded packages, this release has the followin - [snapraid](https://www.snapraid.it/), a backup program for disk arrays. Available as [snapraid](#opt-snapraid.enable). +- [Hockeypuck](https://github.com/hockeypuck/hockeypuck), a OpenPGP Key Server. Available as [services.hockeypuck](#opt-services.hockeypuck.enable). + ## Backward Incompatibilities {#sec-release-21.11-incompatibilities} diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index ad1bccd5428..13463359a66 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -886,6 +886,7 @@ ./services/security/fprot.nix ./services/security/haka.nix ./services/security/haveged.nix + ./services/security/hockeypuck.nix ./services/security/hologram-server.nix ./services/security/hologram-agent.nix ./services/security/munge.nix diff --git a/nixos/modules/services/security/hockeypuck.nix b/nixos/modules/services/security/hockeypuck.nix new file mode 100644 index 00000000000..686634c8add --- /dev/null +++ b/nixos/modules/services/security/hockeypuck.nix @@ -0,0 +1,104 @@ +{ config, lib, pkgs, ... }: + +let + cfg = config.services.hockeypuck; + settingsFormat = pkgs.formats.toml { }; +in { + meta.maintainers = with lib.maintainers; [ etu ]; + + options.services.hockeypuck = { + enable = lib.mkEnableOption "Hockeypuck OpenPGP Key Server"; + + port = lib.mkOption { + default = 11371; + type = lib.types.port; + description = "HKP port to listen on."; + }; + + settings = lib.mkOption { + type = settingsFormat.type; + default = { }; + example = lib.literalExample '' + { + hockeypuck = { + loglevel = "INFO"; + logfile = "/var/log/hockeypuck/hockeypuck.log"; + indexTemplate = "''${pkgs.hockeypuck-web}/share/templates/index.html.tmpl"; + vindexTemplate = "''${pkgs.hockeypuck-web}/share/templates/index.html.tmpl"; + statsTemplate = "''${pkgs.hockeypuck-web}/share/templates/stats.html.tmpl"; + webroot = "''${pkgs.hockeypuck-web}/share/webroot"; + + hkp.bind = ":''${toString cfg.port}"; + + openpgp.db = { + driver = "postgres-jsonb"; + dsn = "database=hockeypuck host=/var/run/postgresql sslmode=disable"; + }; + }; + } + ''; + description = '' + Configuration file for hockeypuck, here you can override + certain settings (loglevel and + openpgp.db.dsn) by just setting those values. + + For other settings you need to use lib.mkForce to override them. + + This service doesn't provision or enable postgres on your + system, it rather assumes that you enable postgres and create + the database yourself. + + Example: + + services.postgresql = { + enable = true; + ensureDatabases = [ "hockeypuck" ]; + ensureUsers = [{ + name = "hockeypuck"; + ensurePermissions."DATABASE hockeypuck" = "ALL PRIVILEGES"; + }]; + }; + + ''; + }; + }; + + config = lib.mkIf cfg.enable { + services.hockeypuck.settings.hockeypuck = { + loglevel = lib.mkDefault "INFO"; + logfile = "/var/log/hockeypuck/hockeypuck.log"; + indexTemplate = "${pkgs.hockeypuck-web}/share/templates/index.html.tmpl"; + vindexTemplate = "${pkgs.hockeypuck-web}/share/templates/index.html.tmpl"; + statsTemplate = "${pkgs.hockeypuck-web}/share/templates/stats.html.tmpl"; + webroot = "${pkgs.hockeypuck-web}/share/webroot"; + + hkp.bind = ":${toString cfg.port}"; + + openpgp.db = { + driver = "postgres-jsonb"; + dsn = lib.mkDefault "database=hockeypuck host=/var/run/postgresql sslmode=disable"; + }; + }; + + users.users.hockeypuck = { + isSystemUser = true; + description = "Hockeypuck user"; + }; + + systemd.services.hockeypuck = { + description = "Hockeypuck OpenPGP Key Server"; + after = [ "network.target" "postgresql.target" ]; + wantedBy = [ "multi-user.target" ]; + serviceConfig = { + WorkingDirectory = "/var/lib/hockeypuck"; + User = "hockeypuck"; + ExecStart = "${pkgs.hockeypuck}/bin/hockeypuck -config ${settingsFormat.generate "config.toml" cfg.settings}"; + Restart = "always"; + RestartSec = "5s"; + LogsDirectory = "hockeypuck"; + LogsDirectoryMode = "0755"; + StateDirectory = "hockeypuck"; + }; + }; + }; +} -- cgit 1.4.1 From 88fb6d25d87f5ff6e75d471809bb61463e1c5cc6 Mon Sep 17 00:00:00 2001 From: Cole Helbling Date: Thu, 15 Jul 2021 10:37:54 -0700 Subject: nixos/prometheus-buildkite-agent-exporter: init --- .../from_md/release-notes/rl-2111.section.xml | 8 +++ nixos/doc/manual/release-notes/rl-2111.section.md | 1 + .../services/monitoring/prometheus/exporters.nix | 1 + .../prometheus/exporters/buildkite-agent.nix | 64 ++++++++++++++++++++++ 4 files changed, 74 insertions(+) create mode 100644 nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 88d075a9a48..fc1cec16ef9 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -99,6 +99,14 @@ services.hockeypuck. + + + buildkite-agent-metrics, + a command-line tool for collecting Buildkite agent metrics, + now has a Prometheus exporter available as + services.prometheus.exporters.buildkite-agent. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index f7275480ff8..9303393aba3 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -30,6 +30,7 @@ In addition to numerous new and upgraded packages, this release has the followin - [Hockeypuck](https://github.com/hockeypuck/hockeypuck), a OpenPGP Key Server. Available as [services.hockeypuck](#opt-services.hockeypuck.enable). +- [buildkite-agent-metrics](https://github.com/buildkite/buildkite-agent-metrics), a command-line tool for collecting Buildkite agent metrics, now has a Prometheus exporter available as [services.prometheus.exporters.buildkite-agent](#opt-services.prometheus.exporters.buildkite-agent.enable). ## Backward Incompatibilities {#sec-release-21.11-incompatibilities} diff --git a/nixos/modules/services/monitoring/prometheus/exporters.nix b/nixos/modules/services/monitoring/prometheus/exporters.nix index 6bd075697fa..d648de6a414 100644 --- a/nixos/modules/services/monitoring/prometheus/exporters.nix +++ b/nixos/modules/services/monitoring/prometheus/exporters.nix @@ -27,6 +27,7 @@ let "bird" "bitcoin" "blackbox" + "buildkite-agent" "collectd" "dnsmasq" "domain" diff --git a/nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix b/nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix new file mode 100644 index 00000000000..7557480ac06 --- /dev/null +++ b/nixos/modules/services/monitoring/prometheus/exporters/buildkite-agent.nix @@ -0,0 +1,64 @@ +{ config, lib, pkgs, options }: + +with lib; + +let + cfg = config.services.prometheus.exporters.buildkite-agent; +in +{ + port = 9876; + extraOpts = { + tokenPath = mkOption { + type = types.nullOr types.path; + apply = final: if final == null then null else toString final; + description = '' + The token from your Buildkite "Agents" page. + + A run-time path to the token file, which is supposed to be provisioned + outside of Nix store. + ''; + }; + interval = mkOption { + type = types.str; + default = "30s"; + example = "1min"; + description = '' + How often to update metrics. + ''; + }; + endpoint = mkOption { + type = types.str; + default = "https://agent.buildkite.com/v3"; + description = '' + The Buildkite Agent API endpoint. + ''; + }; + queues = mkOption { + type = with types; nullOr (listOf str); + default = null; + example = literalExample ''[ "my-queue1" "my-queue2" ]''; + description = '' + Which specific queues to process. + ''; + }; + }; + serviceOpts = { + script = + let + queues = concatStringsSep " " (map (q: "-queue ${q}") cfg.queues); + in + '' + export BUILDKITE_AGENT_TOKEN="$(cat ${toString cfg.tokenPath})" + exec ${pkgs.buildkite-agent-metrics}/bin/buildkite-agent-metrics \ + -backend prometheus \ + -interval ${cfg.interval} \ + -endpoint ${cfg.endpoint} \ + ${optionalString (cfg.queues != null) queues} \ + -prometheus-addr "${cfg.listenAddress}:${toString cfg.port}" ${concatStringsSep " " cfg.extraFlags} + ''; + serviceConfig = { + DynamicUser = false; + RuntimeDirectory = "buildkite-agent-metrics"; + }; + }; +} -- cgit 1.4.1 From d3c568e16a5e4e0f4620eea46e14ae9a13a590ba Mon Sep 17 00:00:00 2001 From: Gürkan Gür Date: Tue, 20 Jul 2021 21:37:49 +0200 Subject: nixos/clipcat: add user service module --- .../from_md/release-notes/rl-2111.section.xml | 7 +++++ nixos/doc/manual/release-notes/rl-2111.section.md | 3 +++ nixos/modules/module-list.nix | 1 + nixos/modules/services/misc/clipcat.nix | 31 ++++++++++++++++++++++ 4 files changed, 42 insertions(+) create mode 100644 nixos/modules/services/misc/clipcat.nix (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index fc1cec16ef9..e69b8ccad30 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -40,6 +40,13 @@ services.btrbk. + + + clipcat, + an X11 clipboard manager written in Rust. Available at + [services.clipcat](options.html#o pt-services.clipcat.enable). + + geoipupdate, diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 9303393aba3..44a63cb9b86 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -13,6 +13,9 @@ In addition to numerous new and upgraded packages, this release has the followin - [btrbk](https://digint.ch/btrbk/index.html), a backup tool for btrfs subvolumes, taking advantage of btrfs specific capabilities to create atomic snapshots and transfer them incrementally to your backup locations. Available as [services.btrbk](options.html#opt-services.brtbk.instances). +- [clipcat](https://github.com/xrelkd/clipcat/), an X11 clipboard manager written in Rust. Available at [services.clipcat](options.html#o +pt-services.clipcat.enable). + - [geoipupdate](https://github.com/maxmind/geoipupdate), a GeoIP database updater from MaxMind. Available as [services.geoipupdate](options.html#opt-services.geoipupdate.enable). - [Kea](https://www.isc.org/kea/), ISCs 2nd generation DHCP and DDNS server suite. Available at [services.kea](options.html#opt-services.kea). diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index 13463359a66..4d1700ed99a 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -475,6 +475,7 @@ ./services/misc/calibre-server.nix ./services/misc/cfdyndns.nix ./services/misc/clipmenu.nix + ./services/misc/clipcat.nix ./services/misc/cpuminer-cryptonight.nix ./services/misc/cgminer.nix ./services/misc/confd.nix diff --git a/nixos/modules/services/misc/clipcat.nix b/nixos/modules/services/misc/clipcat.nix new file mode 100644 index 00000000000..128bb9a89d6 --- /dev/null +++ b/nixos/modules/services/misc/clipcat.nix @@ -0,0 +1,31 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.services.clipcat; +in { + + options.services.clipcat= { + enable = mkEnableOption "Clipcat clipboard daemon"; + + package = mkOption { + type = types.package; + default = pkgs.clipcat; + defaultText = "pkgs.clipcat"; + description = "clipcat derivation to use."; + }; + }; + + config = mkIf cfg.enable { + systemd.user.services.clipcat = { + enable = true; + description = "clipcat daemon"; + wantedBy = [ "graphical-session.target" ]; + after = [ "graphical-session.target" ]; + serviceConfig.ExecStart = "${cfg.package}/bin/clipcatd --no-daemon"; + }; + + environment.systemPackages = [ cfg.package ]; + }; +} -- cgit 1.4.1 From c60a0b044747037b87e7ec24b60d221e261b8a6b Mon Sep 17 00:00:00 2001 From: Philipp Date: Tue, 20 Jul 2021 22:21:36 +0200 Subject: mingw-64: 6.0.0 -> 9.0.0 --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 6 ++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ pkgs/os-specific/windows/mingw-w64/default.nix | 4 ++-- 3 files changed, 10 insertions(+), 2 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 88d075a9a48..4525706f826 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -523,6 +523,12 @@ 2020 to 2021 + + + the mingw-64 package has been upgraded from + 6.0.0 to 9.0.0 + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index f7275480ff8..e3afb1bb1b5 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -132,6 +132,8 @@ In addition to numerous new and upgraded packages, this release has the followin - The `isabelle` package has been upgraded from 2020 to 2021 +- the `mingw-64` package has been upgraded from 6.0.0 to 9.0.0 + ## Other Notable Changes {#sec-release-21.11-notable-changes} - The setting [`services.openssh.logLevel`](options.html#opt-services.openssh.logLevel) `"VERBOSE"` `"INFO"`. This brings NixOS in line with upstream and other Linux distributions, and reduces log spam on servers due to bruteforcing botnets. diff --git a/pkgs/os-specific/windows/mingw-w64/default.nix b/pkgs/os-specific/windows/mingw-w64/default.nix index 0a342997530..38293e65f70 100644 --- a/pkgs/os-specific/windows/mingw-w64/default.nix +++ b/pkgs/os-specific/windows/mingw-w64/default.nix @@ -1,14 +1,14 @@ { lib, stdenv, windows, fetchurl }: let - version = "6.0.0"; + version = "9.0.0"; in stdenv.mkDerivation { pname = "mingw-w64"; inherit version; src = fetchurl { url = "mirror://sourceforge/mingw-w64/mingw-w64-v${version}.tar.bz2"; - sha256 = "1w28mynv500y03h92nh87rgw3fnp82qwnjbxrrzqkmr63q812pl0"; + sha256 = "10a15bi4lyfi0k0haj0klqambicwma6yi7vssgbz8prg815vja8r"; }; outputs = [ "out" "dev" ]; -- cgit 1.4.1 From 6ea6734f7152793bf5fc06bf78220c682f5f7b46 Mon Sep 17 00:00:00 2001 From: fortuneteller2k Date: Thu, 20 May 2021 07:59:34 +0800 Subject: nixos/iwd: add settings option --- .../from_md/release-notes/rl-2111.section.xml | 9 ++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ nixos/modules/services/networking/iwd.nix | 32 ++++++++++++++++++++-- 3 files changed, 41 insertions(+), 2 deletions(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 3695997f717..ac38a13bb3d 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -688,6 +688,15 @@ + + + The + networking.wireless.iwd + module has a new + networking.wireless.iwd.settings + option. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index cc5b6bf81ee..5dbcf3631de 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -179,3 +179,5 @@ pt-services.clipcat.enable). - NSS modules which should be queried after `resolved`, `files` and `myhostname`, but before `dns` should use the default priority - NSS modules which should come after `dns` should use mkAfter. + +- The [networking.wireless.iwd](options.html#opt-networking.wireless.iwd.enable) module has a new [networking.wireless.iwd.settings](options.html#opt-networking.wireless.iwd.settings) option. diff --git a/nixos/modules/services/networking/iwd.nix b/nixos/modules/services/networking/iwd.nix index 99e5e78badd..8835f7f9372 100644 --- a/nixos/modules/services/networking/iwd.nix +++ b/nixos/modules/services/networking/iwd.nix @@ -4,8 +4,31 @@ with lib; let cfg = config.networking.wireless.iwd; + ini = pkgs.formats.ini { }; + configFile = ini.generate "main.conf" cfg.settings; in { - options.networking.wireless.iwd.enable = mkEnableOption "iwd"; + options.networking.wireless.iwd = { + enable = mkEnableOption "iwd"; + + settings = mkOption { + type = ini.type; + default = { }; + + example = { + Settings.AutoConnect = true; + + Network = { + EnableIPv6 = true; + RoutePriorityOffset = 300; + }; + }; + + description = '' + Options passed to iwd. + See here for supported options. + ''; + }; + }; config = mkIf cfg.enable { assertions = [{ @@ -15,6 +38,8 @@ in { ''; }]; + environment.etc."iwd/main.conf".source = configFile; + # for iwctl environment.systemPackages = [ pkgs.iwd ]; @@ -27,7 +52,10 @@ in { linkConfig.NamePolicy = "keep kernel"; }; - systemd.services.iwd.wantedBy = [ "multi-user.target" ]; + systemd.services.iwd = { + wantedBy = [ "multi-user.target" ]; + restartTriggers = [ configFile ]; + }; }; meta.maintainers = with lib.maintainers; [ mic92 dtzWill ]; -- cgit 1.4.1 From 7d24d06c71d3abd72c25caaea86305aa46d44a08 Mon Sep 17 00:00:00 2001 From: Yuka Date: Sat, 24 Jul 2021 19:12:08 +0200 Subject: nixos/postgresql: use postgres 13 for 21.11 (#131018) Co-authored-by: Kim Lindberger --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 5 +++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ nixos/modules/services/databases/postgresql.nix | 3 ++- 3 files changed, 9 insertions(+), 1 deletion(-) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index 3695997f717..cc3b5cbd29e 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -32,6 +32,11 @@ from Python 3.8. + + + PostgreSQL now defaults to major version 13. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index cc5b6bf81ee..5c27dba5fe0 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -11,6 +11,8 @@ In addition to numerous new and upgraded packages, this release has the followin - `python3` now defaults to Python 3.9, updated from Python 3.8. +- PostgreSQL now defaults to major version 13. + ## New Services {#sec-release-21.11-new-services} - [btrbk](https://digint.ch/btrbk/index.html), a backup tool for btrfs subvolumes, taking advantage of btrfs specific capabilities to create atomic snapshots and transfer them incrementally to your backup locations. Available as [services.btrbk](options.html#opt-services.brtbk.instances). diff --git a/nixos/modules/services/databases/postgresql.nix b/nixos/modules/services/databases/postgresql.nix index effc9182472..fd4a195787f 100644 --- a/nixos/modules/services/databases/postgresql.nix +++ b/nixos/modules/services/databases/postgresql.nix @@ -293,7 +293,8 @@ in # Note: when changing the default, make it conditional on # ‘system.stateVersion’ to maintain compatibility with existing # systems! - mkDefault (if versionAtLeast config.system.stateVersion "20.03" then pkgs.postgresql_11 + mkDefault (if versionAtLeast config.system.stateVersion "21.11" then pkgs.postgresql_13 + else if versionAtLeast config.system.stateVersion "20.03" then pkgs.postgresql_11 else if versionAtLeast config.system.stateVersion "17.09" then pkgs.postgresql_9_6 else throw "postgresql_9_5 was removed, please upgrade your postgresql version."); -- cgit 1.4.1 From bd263441e227e9fa3022abc518504c7b6086b413 Mon Sep 17 00:00:00 2001 From: Elis Hirwing Date: Mon, 26 Jul 2021 09:26:02 +0200 Subject: nixos/rl-notes/21.11: Add note about remaining syncoid permissions --- nixos/doc/manual/from_md/release-notes/rl-2111.section.xml | 13 +++++++++++++ nixos/doc/manual/release-notes/rl-2111.section.md | 2 ++ 2 files changed, 15 insertions(+) (limited to 'nixos/doc/manual/from_md/release-notes') diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml index f573f731365..9dd98a5262f 100644 --- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml +++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml @@ -702,6 +702,19 @@ option. + + + The + services.syncoid.enable + module now properly drops ZFS permissions after usage. Before + it delegated permissions to whole pools instead of datasets + and didn’t clean up after execution. You can manually look + this up for your pools by running + zfs allow your-pool-name and use + zfs unallow syncoid your-pool-name to clean + this up. + +
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md index 5e379ad6fd1..12e1a938433 100644 --- a/nixos/doc/manual/release-notes/rl-2111.section.md +++ b/nixos/doc/manual/release-notes/rl-2111.section.md @@ -183,3 +183,5 @@ pt-services.clipcat.enable). - NSS modules which should come after `dns` should use mkAfter. - The [networking.wireless.iwd](options.html#opt-networking.wireless.iwd.enable) module has a new [networking.wireless.iwd.settings](options.html#opt-networking.wireless.iwd.settings) option. + +- The [services.syncoid.enable](options.html#opt-services.syncoid.enable) module now properly drops ZFS permissions after usage. Before it delegated permissions to whole pools instead of datasets and didn't clean up after execution. You can manually look this up for your pools by running `zfs allow your-pool-name` and use `zfs unallow syncoid your-pool-name` to clean this up. -- cgit 1.4.1