···3344This hook can be used to setup a check phase that
55requires running a MPI application. It detects the
66-used present MPI implementaion type and exports
66+used present MPI implementation type and exports
77the neceesary environment variables to use
88`mpirun` and `mpiexec` in a Nix sandbox.
99
+1-1
doc/languages-frameworks/dotnet.section.md
···161161They can be installed either as a global tool for the entire system, or as a local tool specific to project.
162162163163The local installation is the easiest and works on NixOS in the same way as on other Linux distributions.
164164-[See dotnet documention](https://learn.microsoft.com/en-us/dotnet/core/tools/global-tools#install-a-local-tool) to learn more.
164164+[See dotnet documentation](https://learn.microsoft.com/en-us/dotnet/core/tools/global-tools#install-a-local-tool) to learn more.
165165166166[The global installation method](https://learn.microsoft.com/en-us/dotnet/core/tools/global-tools#install-a-global-tool)
167167should also work most of the time. You have to remember to update the `PATH`
+2-2
doc/languages-frameworks/haskell.section.md
···221221interested in the alternative [haskell.nix] framework, which, be warned, is
222222completely incompatible with packages from `haskellPackages`.
223223224224-<!-- TODO(@maralorn) Link to package set generation docs in the contributers guide below. -->
224224+<!-- TODO(@maralorn) Link to package set generation docs in the contributors guide below. -->
225225226226## `haskellPackages.mkDerivation` {#haskell-mkderivation}
227227···11921192Since the interrelated parts, i.e. the package set and GHC, are connected
11931193via the Nixpkgs fixpoint, we need to modify them both in a way that preserves
11941194their connection (or else we'd have to wire it up again manually). This is
11951195-achieved by changing GHC and the package set in seperate overlays to prevent
11951195+achieved by changing GHC and the package set in separate overlays to prevent
11961196the package set from pulling in GHC from `prev`.
1197119711981198The result is two overlays like the ones shown below. Adjustable parts are
+1-1
doc/languages-frameworks/php.section.md
···200200 composer repository on the filesystem containing dependencies specified in
201201 `composer.json`. This process uses the function
202202 `php.mkComposerRepository` which in turn uses the
203203- `php.composerHooks.composerRepositoryHook` hook. Internaly this function uses
203203+ `php.composerHooks.composerRepositoryHook` hook. Internally this function uses
204204 a custom
205205 [Composer plugin](https://github.com/nix-community/composer-local-repo-plugin) to
206206 generate the repository.
+1-1
nixos/doc/manual/release-notes/rl-2105.section.md
···353353354354 Another benefit of the refactoring is that we can now issue reloads via either `pkill -HUP unbound` and `systemctl reload unbound` to reload the running configuration without taking the daemon offline. A prerequisite of this was that unbound configuration is available on a well known path on the file system. We are using the path `/etc/unbound/unbound.conf` as that is the default in the CLI tooling which in turn enables us to use `unbound-control` without passing a custom configuration location.
355355356356- The module has also been reworked to be [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) compliant. As such, `sevices.unbound.extraConfig` has been removed and replaced by [services.unbound.settings](options.html#opt-services.unbound.settings). `services.unbound.interfaces` has been renamed to `services.unbound.settings.server.interface`.
356356+ The module has also been reworked to be [RFC 0042](https://github.com/NixOS/rfcs/blob/master/rfcs/0042-config-option.md) compliant. As such, `services.unbound.extraConfig` has been removed and replaced by [services.unbound.settings](options.html#opt-services.unbound.settings). `services.unbound.interfaces` has been renamed to `services.unbound.settings.server.interface`.
357357358358 `services.unbound.forwardAddresses` and `services.unbound.allowedAccess` have also been changed to use the new settings interface. You can follow the instructions when executing `nixos-rebuild` to upgrade your configuration to use the new interface.
359359
+3-3
nixos/doc/manual/release-notes/rl-2305.section.md
···87878888- [gmediarender](https://github.com/hzeller/gmrender-resurrect), a simple, headless UPnP/DLNA renderer. Available as [services.gmediarender](options.html#opt-services.gmediarender.enable).
89899090-- [go2rtc](https://github.com/AlexxIT/go2rtc), a camera streaming appliation with support for RTSP, WebRTC, HomeKit, FFMPEG, RTMP and other protocols. Available as [services.go2rtc](options.html#opt-services.go2rtc.enable).
9090+- [go2rtc](https://github.com/AlexxIT/go2rtc), a camera streaming application with support for RTSP, WebRTC, HomeKit, FFMPEG, RTMP and other protocols. Available as [services.go2rtc](options.html#opt-services.go2rtc.enable).
91919292- [goeland](https://github.com/slurdge/goeland), an alternative to rss2email written in Golang with many filters. Available as [services.goeland](#opt-services.goeland.enable).
9393···203203204204- `graylog` has been updated to version 5, which can not be updated directly from the previously packaged version 3.3. If you had installed the previously packaged version 3.3, please follow the [upgrade path](https://go2docs.graylog.org/5-0/upgrading_graylog/upgrade_path.htm) from 3.3 to 4.0 to 4.3 to 5.0.
205205206206-- `buildFHSUserEnv` is now called `buildFHSEnv` and uses FlatPak's Bubblewrap sandboxing tool rather than Nixpkgs' own chrootenv. The old chrootenv-based implemenation is still available via `buildFHSEnvChroot` but is considered deprecated and will be removed when the remaining uses inside Nixpkgs have been migrated. If your FHSEnv-wrapped application misbehaves when using the new bubblewrap implementation, please create an issue in Nixpkgs.
206206+- `buildFHSUserEnv` is now called `buildFHSEnv` and uses FlatPak's Bubblewrap sandboxing tool rather than Nixpkgs' own chrootenv. The old chrootenv-based implementation is still available via `buildFHSEnvChroot` but is considered deprecated and will be removed when the remaining uses inside Nixpkgs have been migrated. If your FHSEnv-wrapped application misbehaves when using the new bubblewrap implementation, please create an issue in Nixpkgs.
207207208208- `nushell` has been updated to at least version 0.77.0, which includes potential breaking changes in aliases. The old aliases are now available as `old-alias` but it is recommended you migrate to the new format. See [Reworked aliases](https://www.nushell.sh/blog/2023-03-14-nushell_0_77.html#reworked-aliases-breaking-changes-kubouch).
209209···555555556556- `buildDunePackage` now defaults to `strictDeps = true` which means that any library should go into `buildInputs` or `checkInputs`. Any executable that is run on the building machine should go into `nativeBuildInputs` or `nativeCheckInputs` respectively. Example of executables are `ocaml`, `findlib` and `menhir`. PPXs are libraries which are built by dune and should therefore not go into `nativeBuildInputs`.
557557558558-- `buildFHSUserEnv` is now called `buildFHSEnv` and uses FlatPak's Bubblewrap sandboxing tool rather than Nixpkgs' own chrootenv. The old chrootenv-based implemenation is still available via `buildFHSEnvChroot` but is considered deprecated and will be removed when the remaining uses inside Nixpkgs have been migrated. If your FHSEnv-wrapped application misbehaves when using the new bubblewrap implementation, please create an issue in Nixpkgs.
558558+- `buildFHSUserEnv` is now called `buildFHSEnv` and uses FlatPak's Bubblewrap sandboxing tool rather than Nixpkgs' own chrootenv. The old chrootenv-based implementation is still available via `buildFHSEnvChroot` but is considered deprecated and will be removed when the remaining uses inside Nixpkgs have been migrated. If your FHSEnv-wrapped application misbehaves when using the new bubblewrap implementation, please create an issue in Nixpkgs.
559559560560- Top-level `buildPlatform`, `hostPlatform`, `targetPlatform` have been deprecated, use `stdenv.X` instead.
561561
+3-3
nixos/doc/manual/release-notes/rl-2311.section.md
···293293294294- `services.nginx` gained a `defaultListen` option at server-level with support for PROXY protocol listeners, also `proxyProtocol` is now exposed in `services.nginx.virtualHosts.<name>.listen` option. It is now possible to run PROXY listeners and non-PROXY listeners at a server-level, see [#213510](https://github.com/NixOS/nixpkgs/pull/213510/) for more details.
295295296296-- `services.restic.backups` now adds wrapper scripts to your system path, which set the same environment variables as the service, so restic operations can easly be run from the command line. This behavior can be disabled by setting `createWrapper` to `false`, per backup configuration.
296296+- `services.restic.backups` now adds wrapper scripts to your system path, which set the same environment variables as the service, so restic operations can easily be run from the command line. This behavior can be disabled by setting `createWrapper` to `false`, per backup configuration.
297297298298- `services.prometheus.exporters` has a new exporter to monitor electrical power consumption based on PowercapRAPL sensor called [Scaphandre](https://github.com/hubblo-org/scaphandre), see [#239803](https://github.com/NixOS/nixpkgs/pull/239803) for more details.
299299300300-- The MariaDB C client library was upgraded from 3.2.x to 3.3.x. It is recomended to review the [upstream release notes](https://mariadb.com/kb/en/mariadb-connector-c-33-release-notes/).
300300+- The MariaDB C client library was upgraded from 3.2.x to 3.3.x. It is recommended to review the [upstream release notes](https://mariadb.com/kb/en/mariadb-connector-c-33-release-notes/).
301301302302- The module `services.calibre-server` has new options to configure the `host`, `port`, `auth.enable`, `auth.mode` and `auth.userDb` path, see [#216497](https://github.com/NixOS/nixpkgs/pull/216497/) for more details.
303303···381381382382- The `qemu-vm.nix` module by default now identifies block devices via
383383 persistent names available in `/dev/disk/by-*`. Because the rootDevice is
384384- identfied by its filesystem label, it needs to be formatted before the VM is
384384+ identified by its filesystem label, it needs to be formatted before the VM is
385385 started. The functionality of automatically formatting the rootDevice in the
386386 initrd is removed from the QEMU module. However, for tests that depend on
387387 this functionality, a test utility for the scripted initrd is added
+1-1
pkgs/README.md
···2929Before adding a new package, please consider the following questions:
30303131* Is the package ready for general use? We don't want to include projects that are too immature or are going to be abandoned immediately. In case of doubt, check with upstream.
3232-* Does the project have a clear license statement? Remember that softwares are unfree by default (all rights reserved), and merely providing access to the source code does not imply its redistribution. In case of doubt, ask upstream.
3232+* Does the project have a clear license statement? Remember that software is unfree by default (all rights reserved), and merely providing access to the source code does not imply its redistribution. In case of doubt, ask upstream.
3333* How realistic is it that it will be used by other people? It's good that nixpkgs caters to various niches, but if it's a niche of 5 people it's probably too small.
3434* Are you willing to maintain the package? You should care enough about the package to be willing to keep it up and running for at least one complete Nixpkgs' release life-cycle.
3535
···25252626As such, we would like to have only the newest K3s version in each NixOS
2727release at the time the release branch is branched off, which will ensure the
2828-K3s version in that release will receieve updates for the longest duration
2828+K3s version in that release will receive updates for the longest duration
2929possible.
30303131However, this conflicts with another desire: we would like people to be able to upgrade between NixOS stable releases without needing to make a large enough k3s version jump that they violate the Kubernetes version skew policy.
+1-1
pkgs/applications/science/math/sage/README.md
···2233Sage is a pretty complex package that depends on many other complex packages and patches some of those. As a result, the sage nix package is also quite complex.
4455-Don't feel discouraged to fix, simplify or improve things though. The individual files have comments explaining their purpose. The most importent ones are `default.nix` linking everything together, `sage-src.nix` adding patches and `sagelib.nix` building the actual sage package.
55+Don't feel discouraged to fix, simplify or improve things though. The individual files have comments explaining their purpose. The most important ones are `default.nix` linking everything together, `sage-src.nix` adding patches and `sagelib.nix` building the actual sage package.
6677## The sage build is broken
88
+1-1
pkgs/development/haskell-modules/HACKING.md
···137137 This is a list of Haskell packages that are known to be broken.
138138139139- [`hackage-packages.nix`](hackage-packages.nix) will be regenerated. This
140140- will mark all Haskell pacakges in `configuration-hackage2nix/broken.yaml`
140140+ will mark all Haskell packages in `configuration-hackage2nix/broken.yaml`
141141 as `broken`.
142142143143- The
···7676to the Nix store. This prevents ASDF from referring to uncompiled
7777systems on run time.
78787979-Also useful when the `pname` is differrent than the system name, such
7979+Also useful when the `pname` is different than the system name, such
8080as when using [reverse domain naming]. (see `jzon` ->
8181`com.inuoe.jzon`)
8282
···31313232## Using libraries not available in repositories
33333434-There are useful and working libraries out there, that are nontheless
3434+There are useful and working libraries out there, that are nonetheless
3535unavailable to users of package managers such as Quicklisp or
3636Ultralisp. Two real-world examples are [jzon] and [cl-tar].
3737
+1-1
pkgs/development/misc/resholve/README.md
···203203add more at this early date will only ensure that I spend more time updating
204204docs and less time filling in feature gaps.
205205206206-Full documentation may be greatly accellerated if someone can help me sort out
206206+Full documentation may be greatly accelerated if someone can help me sort out
207207single-sourcing. See: https://github.com/abathur/resholve/issues/19
208208-->
209209