···2020### Common
21212222- arbitrary NixOS configuration
2323-- automatic or bound disk size: `diskSize` parameter, `additionalSpace` can be set when `diskSize` is `auto` to add a constant of disk space
2323+- automatic or bound disk size: `diskSize` parameter, `additionalSpace` can be set when `diskSize` is `auto` to add a constant of disk space
2424- multiple partition table layouts: EFI, legacy, legacy + GPT, hybrid, none through `partitionTableType` parameter
2525- OVMF or EFI firmwares and variables templates can be customized
2626- root filesystem `fsType` can be customized to whatever `mkfs.${fsType}` exist during operations
+1-1
doc/builders/testers.chapter.md
···6262'';
6363```
64646565-While `testBuildFailure` is designed to keep changes to the original builder's
6565+While `testBuildFailure` is designed to keep changes to the original builder's
6666environment to a minimum, some small changes are inevitable.
67676868 - The file `$TMPDIR/testBuildFailure.log` is present. It should not be deleted.
+2-1
doc/languages-frameworks/go.section.md
···1616 `vendorHash` can also be set to `null`.
1717 In that case, rather than fetching the dependencies and vendoring them, the dependencies vendored in the source repo will be used.
18181919- To avoid updating this field when dependencies change, run `go mod vendor` in your source repo and set `vendorHash = null;`
1919+ To avoid updating this field when dependencies change, run `go mod vendor` in your source repo and set `vendorHash = null;`
2020+2021 To obtain the actual hash, set `vendorHash = lib.fakeSha256;` and run the build ([more details here](#sec-source-hashes)).
2122- `proxyVendor`: Fetches (go mod download) and proxies the vendor directory. This is useful if your code depends on c code and go mod tidy does not include the needed sources to build or if any dependency has case-insensitive conflicts which will produce platform dependant `vendorHash` checksums.
2223
···1616 </para>
1717 <itemizedlist>
1818 <listitem>
1919-<literallayout>Nix has been updated from 2.3 to 2.8. This mainly brings experimental support for Flakes, but also marks the <literal>nix</literal> command as experimental which now has to be enabled via the configuration explicitly. For more information and instructions for upgrades, see the relase notes for <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.4.html">nix-2.4</link>,
2020-<link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.5.html">nix-2.5</link>, <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.6.html">nix-2.6</link>, <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.7.html">nix-2.7</link> and <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.8.html">nix-2.8</link></literallayout>
1919+ <para>
2020+ Nix has been updated from 2.3 to 2.8. This mainly brings
2121+ experimental support for Flakes, but also marks the
2222+ <literal>nix</literal> command as experimental which now has
2323+ to be enabled via the configuration explicitly. For more
2424+ information and instructions for upgrades, see the relase
2525+ notes for
2626+ <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.4.html">nix-2.4</link>,
2727+ <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.5.html">nix-2.5</link>,
2828+ <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.6.html">nix-2.6</link>,
2929+ <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.7.html">nix-2.7</link>
3030+ and
3131+ <link xlink:href="https://nixos.org/manual/nix/stable/release-notes/rl-2.8.html">nix-2.8</link>
3232+ </para>
2133 </listitem>
2234 <listitem>
2335 <para>
+12-12
nixos/doc/manual/release-notes/rl-2205.section.md
···99- Nix has been updated from 2.3 to 2.8. This mainly brings experimental support
1010 for Flakes, but also marks the `nix` command as experimental which now has to
1111 be enabled via the configuration explicitly. For more information and
1212- instructions for upgrades, see the
1313- relase notes for [nix-2.4](https://nixos.org/manual/nix/stable/release-notes/rl-2.4.html),
1212+ instructions for upgrades, see the
1313+ relase notes for [nix-2.4](https://nixos.org/manual/nix/stable/release-notes/rl-2.4.html),
1414 [nix-2.5](https://nixos.org/manual/nix/stable/release-notes/rl-2.5.html),
1515 [nix-2.6](https://nixos.org/manual/nix/stable/release-notes/rl-2.6.html),
1616 [nix-2.7](https://nixos.org/manual/nix/stable/release-notes/rl-2.7.html) and
···30303131- Systemd has been upgraded to the version 250.
32323333-- Pulseaudio has been updated to version 15.0 and now optionally
3333+- Pulseaudio has been updated to version 15.0 and now optionally
3434 [supports additional Bluetooth audio codecs](https://www.freedesktop.org/wiki/Software/PulseAudio/Notes/15.0/#supportforldacandaptxbluetoothcodecsplussbcxqsbcwithhigher-qualityparameters)
3535 such as aptX or LDAC, with codec switching available in `pavucontrol`. This
3636 feature is disabled by default, but can be enabled with the option
···5050 settings for many certificates at once. This also opens up the option to use
5151 DNS-01 validation when using `enableACME` web server virtual hosts (e.g.
5252 `services.nginx.virtualHosts.*.enableACME`).
5353-5353+5454## New Services {#sec-release-22.05-new-services}
55555656- [1password](https://1password.com/), command-lines and graphic interface for 1Password. Available as [programs._1password](#opt-programs._1password.enable) and [programs._1password-gui](#opt-programs._1password.enable).
···743743- The configuration portion of the `nix-daemon` module has been reworked and exposed as [nix.settings](options.html#opt-nix-settings):
744744 * Legacy options have been mapped to the corresponding options under under [nix.settings](options.html#opt-nix.settings) and will be deprecated when NixOS 21.11 reaches end of life.
745745 * [nix.buildMachines.publicHostKey](options.html#opt-nix.buildMachines.publicHostKey) has been added.
746746-746746+747747- [`kops`](https://kops.sigs.k8s.io) defaults to 1.23.2, which will enable [Instance Metadata Service Version 2](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html) and require tokens on new clusters with Kubernetes >= 1.22. This will increase security by default, but may break some types of workloads. The default behaviour for `spec.kubeDNS.nodeLocalDNS.forwardToKubeDNS` has changed from `true` to `false`. Cilium now has `disable-cnp-status-updates: true` by default. Set this to false if you rely on the CiliumNetworkPolicy status fields. Support for Kubernetes 1.17, the Lyft CNI, Weave CNI on Kubernetes >= 1.23, CentOS 7 and 8, Debian 9, RHEL 7, and Ubuntu 16.05 (Xenial) has been removed. See the [1.22 release notes](https://kops.sigs.k8s.io/releases/1.22-notes/) and [1.23 release notes](https://kops.sigs.k8s.io/releases/1.23-notes/) for more details, including other significant changes.
748748749749- Mattermost has been upgraded to extended support version 6.3 as the previously
750750- packaged extended support version 5.37 is [reaching end of life](https://docs.mattermost.com/upgrade/extended-support-release.html).
750750+ packaged extended support version 5.37 is [reaching end of life](https://docs.mattermost.com/upgrade/extended-support-release.html).
751751 Migration may take some time, see the [changelog](https://docs.mattermost.com/install/self-managed-changelog.html#release-v6-3-extended-support-release)
752752 and [important upgrade notes](https://docs.mattermost.com/upgrade/important-upgrade-notes.html).
753753···762762 By default auto-upgrade will now run immediately if it would have been triggered at least
763763 once during the time when the timer was inactive.
764764765765-- Mastodon now uses `services.redis.servers` to start a new redis server, instead of using a global redis server.
765765+- Mastodon now uses `services.redis.servers` to start a new redis server, instead of using a global redis server.
766766 This improves compatibility with other services that use redis.
767767-768768- Note that this will recreate the redis database, although according to the [Mastodon docs](https://docs.joinmastodon.org/admin/backups/),
767767+768768+ Note that this will recreate the redis database, although according to the [Mastodon docs](https://docs.joinmastodon.org/admin/backups/),
769769 this is almost harmless:
770770- > Losing the Redis database is almost harmless: The only irrecoverable data will be the contents of the Sidekiq queues and scheduled retries of previously failed jobs.
770770+ > Losing the Redis database is almost harmless: The only irrecoverable data will be the contents of the Sidekiq queues and scheduled retries of previously failed jobs.
771771 > The home and list feeds are stored in Redis, but can be regenerated with tootctl.
772772-772772+773773 If you do want to save the redis database, you can use the following commands:
774774 ```bash
775775 redis-cli save
···980980 or `wl*` with priority 99 (which means that it doesn't have any effect if such an interface is matched
981981 by a `.network-`unit with a lower priority). In case of scripted networking, no behavior
982982 was changed.
983983-983983+984984- The new [`postgresqlTestHook`](https://nixos.org/manual/nixpkgs/stable/#sec-postgresqlTestHook) runs a PostgreSQL server for the duration of package checks.
985985986986- `zfs` was updated from 2.1.4 to 2.1.5, enabling it to be used with Linux kernel 5.18.
+1-1
nixos/doc/manual/release-notes/rl-2305.section.md
···34343535- `carnix` and `cratesIO` has been removed due to being unmaintained, use alternatives such as [naersk](https://github.com/nix-community/naersk) and [crate2nix](https://github.com/kolloch/crate2nix) instead.
36363737-- `borgbackup` module now has an option for inhibiting system sleep while backups are running, defaulting to off (not inhibiting sleep), available as [`services.borgbackup.jobs.<name>.inhibitsSleep`](#opt-services.borgbackup.jobs._name_.inhibitsSleep).
3737+- `borgbackup` module now has an option for inhibiting system sleep while backups are running, defaulting to off (not inhibiting sleep), available as [`services.borgbackup.jobs.<name>.inhibitsSleep`](#opt-services.borgbackup.jobs._name_.inhibitsSleep).
38383939- The EC2 image module no longer fetches instance metadata in stage-1. This results in a significantly smaller initramfs, since network drivers no longer need to be included, and faster boots, since metadata fetching can happen in parallel with startup of other services.
4040 This breaks services which rely on metadata being present by the time stage-2 is entered. Anything which reads EC2 metadata from `/etc/ec2-metadata` should now have an `after` dependency on `fetch-ec2-metadata.service`
+2-2
pkgs/servers/nextcloud/packages/README.md
···13131414To regenerate the nixpkgs nextcloudPackages set, run:
15151616-```
1616+```
1717./generate.sh
1818-```
1818+```
19192020After that you can commit and submit the changes.
2121
···18181919To regenerate the nixpkgs wordpressPackages set, run:
20202121-```
2121+```
2222./generate.sh
2323-```
2323+```
24242525After that you can commit and submit the changes.
2626···2929The plugins will be available in the namespace `wordpressPackages.plugins`.
3030Using it together with the Wordpress module could look like this:
31313232-```
3232+```
3333services.wordpress = {
3434 sites."blog.${config.networking.domain}" = {
3535 plugins = with pkgs.wordpressPackages.plugins; [