Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 98640fd48212
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: fc74ba8291a8
Choose a head ref

Commits on Aug 7, 2019

  1. rocksdb: 6.1.2 -> 6.2.2

    magenbluten committed Aug 7, 2019
    Copy the full SHA
    7ea1d15 View commit details

Commits on Aug 9, 2019

  1. lib/modules: Use options apply function even if no values are defined

    This allows `apply` functions to return a valid value if they completely
    ignore their argument, which is the case for the option renaming
    functions like `mkAliasOptionModule`. Therefore this solves issue #63693
    infinisil committed Aug 9, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    infinisil Silvan Mosberger
    Copy the full SHA
    de9cb24 View commit details

Commits on Aug 19, 2019

  1. Copy the full SHA
    6d4c69e View commit details
  2. Copy the full SHA
    f71fd79 View commit details
  3. sd-image.nix: set installer.cloneConfig to false

    As SD Card images are both installation media and installation target,
    don't copy over a /etc/nixos/configuration.nix
    
    Closes #63576.
    flokli committed Aug 19, 2019
    Copy the full SHA
    0aa5e31 View commit details
  4. nixos/doc: update installation-device.nix

    This got quite outdated. We now have both the nixos and root user
    available for example.
    flokli committed Aug 19, 2019
    Copy the full SHA
    1515afe View commit details
  5. Copy the full SHA
    d6eb5b0 View commit details

Commits on Aug 20, 2019

  1. Unverified

    This user has not yet uploaded their public signing key.
    Copy the full SHA
    13d5fc4 View commit details

Commits on Aug 22, 2019

  1. nixos/xfce4-14: init

    worldofpeace committed Aug 22, 2019
    Copy the full SHA
    ae1cb0b View commit details
  2. xfce4-14.xfce4-mixer: drop

    obsoleted by xfce4-pulseaudio-plugin / dead package
    worldofpeace committed Aug 22, 2019
    Copy the full SHA
    de89ad1 View commit details
  3. nixosTests.xfce4-14: init

    This is pretty much identical to the xfce test we currently have.
    worldofpeace committed Aug 22, 2019
    Copy the full SHA
    fd7d31b View commit details

Commits on Aug 23, 2019

  1. wine{,-mono,-unstable,-staging}: update

    wine: 4.0.1 -> 4.0.2
    wine-mono: 4.9.0 -> 4.9.2
    wine-unstable: 4.12.1 -> 4.14
    wine-staging: 4.12.1 -> 4.14
    tadeokondrak committed Aug 23, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    tadeokondrak Tadeo Kondrak
    Copy the full SHA
    58d383a View commit details

Commits on Aug 24, 2019

  1. maintainers: add sgo

    stigtsp committed Aug 24, 2019
    Copy the full SHA
    441f10c View commit details

Commits on Aug 26, 2019

  1. nixos/systemd: Add suspend-then-hibernate units

    Pretty useful for laptops. I use them with:
    
    ```
    services.logind.lidSwitch = "suspend-then-hibernate";
    environment.etc."systemd/sleep.conf".text = "HibernateDelaySec=8h";
    ```
    dasJ committed Aug 26, 2019
    Copy the full SHA
    c8e863e View commit details
  2. magnetico: init at 0.8.1

    rnhmjoj committed Aug 26, 2019

    Verified

    This commit was signed with the committer’s verified signature. The key has expired.
    rnhmjoj Michele Guerini Rocco
    Copy the full SHA
    fc4ca1a View commit details
  3. mint: Fix build

    infinisil committed Aug 26, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    infinisil Silvan Mosberger
    Copy the full SHA
    8c60f67 View commit details
  4. Verified

    This commit was signed with the committer’s verified signature.
    infinisil Silvan Mosberger
    Copy the full SHA
    a3aec20 View commit details
  5. Verified

    This commit was signed with the committer’s verified signature.
    infinisil Silvan Mosberger
    Copy the full SHA
    1ffdf01 View commit details
  6. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    910a4f2 View commit details
  7. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    f163668 View commit details
  8. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    26e5988 View commit details
  9. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    f7d8e1f View commit details
  10. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    19d6869 View commit details
  11. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    b380c7c View commit details
  12. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    75fdf58 View commit details
  13. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    64e7436 View commit details
  14. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    64a7035 View commit details
  15. Verified

    This commit was signed with the committer’s verified signature.
    eadwu Edmund Wu
    Copy the full SHA
    34d44f3 View commit details
  16. Verified

    This commit was signed with the committer’s verified signature.
    infinisil Silvan Mosberger
    Copy the full SHA
    2f92cd6 View commit details
  17. Verified

    This commit was signed with the committer’s verified signature.
    infinisil Silvan Mosberger
    Copy the full SHA
    1d07491 View commit details
  18. sortmerna: init at 3.0.3

    This is a useful package in bioinformatics, namely in processing
    short-read sequencing data from metagenomes
    luispedro committed Aug 26, 2019
    Copy the full SHA
    bc22c2e View commit details

Commits on Aug 27, 2019

  1. gnome3.gnome-control-center: add optional sharing deps

    It appears that if gnome-control-center isn't wrapped with their
    schemas they won't be added to the panel.
    worldofpeace committed Aug 27, 2019
    Copy the full SHA
    f1ce41d View commit details
  2. claws: init at 0.3.2

    Milan Pässler committed Aug 27, 2019
    Copy the full SHA
    27977f0 View commit details
  3. nixos/gnome-user-share: cleanup

    * No sessionPath!
    
    * add to systemd.packages
      This is for the gnome-user-share-webdav.service.
    
    * Update option description
    worldofpeace committed Aug 27, 2019
    Copy the full SHA
    8a24bc2 View commit details
  4. Copy the full SHA
    821daf6 View commit details
  5. oil: 0.6.0 -> 0.7.pre3

    suhr committed Aug 27, 2019
    Copy the full SHA
    2c23a35 View commit details
  6. rclone: 1.48.0 -> 1.49.0

    dywedir committed Aug 27, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    dywedir Vlad M.
    Copy the full SHA
    b3899e3 View commit details
  7. jameica: 2.8.2 -> 2.8.4

    flokli committed Aug 27, 2019
    Copy the full SHA
    1d6005e View commit details
  8. Copy the full SHA
    4150596 View commit details
  9. Copy the full SHA
    eee23c1 View commit details
  10. Merge pull request #67561 from dywedir/rclone

    rclone: 1.48.0 -> 1.49.0
    mmahut authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    a280376 View commit details
  11. Merge pull request #67562 from flokli/jameica-2.8.4

    jameica: 2.8.2 -> 2.8.4
    mmahut authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    4d739ce View commit details
  12. zsh: remove unfunction on TERM=dumb

    Unfortunately this gives an error when precmd or preexec exists. Removing to avoid that.
    matthewbauer authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    4081bec View commit details
  13. Merge pull request #67539 from eadwu/jetbrains/update-1

    jetbrains: 2019.2.*
    mmahut authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    4018166 View commit details
  14. Merge pull request #64669 from luispedro/add_sortmerna

    sortmerna: init at 3.0.3
    Ekleog authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    8a4721d View commit details
  15. Merge pull request #67558 from suhr/oil

    oil: 0.6.0 -> 0.7.pre3
    mmahut authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    743be07 View commit details
  16. Merge pull request #67567 from mmahut/gitlab-ci-pipelines-exporter

    prometheus-gitlab-ci-pipelines-exporter: init at 0.2.5
    WilliButz authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    8867b24 View commit details
  17. Merge pull request #64549 from petabyteboy/feature/claws

    claws: init at 0.3.2
    aanderse authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    3c3f198 View commit details
  18. mkgmap: init at 4289

    sikmir committed Aug 27, 2019

    Verified

    This commit was signed with the committer’s verified signature.
    sikmir Nikolay Korotkiy
    Copy the full SHA
    98a283a View commit details
  19. Merge pull request #67557 from toonn/wire-desktop-bump

    wire-desktop: 3.9.2895 -> 3.10.2904, mac 3.9.2943 -> 3.10.3133
    mmahut authored Aug 27, 2019

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    b31d5fe View commit details
Showing 364 changed files with 8,970 additions and 6,858 deletions.
11 changes: 11 additions & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -139,3 +139,14 @@

# Bazel
/pkgs/development/tools/build-managers/bazel @mboes @Profpatsch

# NixOS modules for e-mail and dns services
/nixos/modules/services/mail/mailman.nix @peti
/nixos/modules/services/mail/postfix.nix @peti
/nixos/modules/services/networking/bind.nix @peti
/nixos/modules/services/mail/rspamd.nix @peti

# Emacs
/pkgs/applications/editors/emacs-modes @adisbladis
/pkgs/applications/editors/emacs @adisbladis
/pkgs/top-level/emacs-packages.nix @adisbladis
71 changes: 71 additions & 0 deletions doc/languages-frameworks/crystal.section.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
# Crystal

## Building a Crystal package

This section uses [Mint](https://github.com/mint-lang/mint) as an example for how to build a Crystal package.

If the Crystal project has any dependencies, the first step is to get a `shards.nix` file encoding those. Get a copy of the project and go to its root directory such that its `shard.lock` file is in the current directory, then run `crystal2nix` in it
```bash
$ git clone https://github.com/mint-lang/mint
$ cd mint
$ git checkout 0.5.0
$ nix-shell -p crystal2nix --run crystal2nix
```

This should have generated a `shards.nix` file.

Next create a Nix file for your derivation and use `pkgs.crystal.buildCrystalPackage` as follows:
```nix
with import <nixpkgs> {};
crystal.buildCrystalPackage rec {
pname = "mint";
version = "0.5.0";
src = fetchFromGitHub {
owner = "mint-lang";
repo = "mint";
rev = version;
sha256 = "0vxbx38c390rd2ysvbwgh89v2232sh5rbsp3nk9wzb70jybpslvl";
};
# Insert the path to your shards.nix file here
shardsFile = ./shards.nix;
...
}
```

This won't build anything yet, because we haven't told it what files build. We can specify a mapping from binary names to source files with the `crystalBinaries` attribute. The project's compilation instructions should show this. For Mint, the binary is called "mint", which is compiled from the source file `src/mint.cr`, so we'll specify this as follows:

```nix
crystalBinaries.mint.src = "src/mint.cr";
# ...
```

Additionally you can override the default `crystal build` options (which are currently `--release --progress --no-debug --verbose`) with

```nix
crystalBinaries.mint.options = [ "--release" "--verbose" ];
```

Depending on the project, you might need additional steps to get it to compile successfully. In Mint's case, we need to link against openssl, so in the end the Nix file looks as follows:

```nix
with import <nixpkgs> {};
crystal.buildCrystalPackage rec {
version = "0.5.0";
pname = "mint";
src = fetchFromGitHub {
owner = "mint-lang";
repo = "mint";
rev = version;
sha256 = "0vxbx38c390rd2ysvbwgh89v2232sh5rbsp3nk9wzb70jybpslvl";
};
shardsFile = ./shards.nix;
crystalBinaries.mint.src = "src/mint.cr";
buildInputs = [ openssl_1_0_2 ];
}
```
1 change: 1 addition & 0 deletions doc/languages-frameworks/index.xml
Original file line number Diff line number Diff line change
@@ -32,4 +32,5 @@
<xi:include href="titanium.section.xml" />
<xi:include href="vim.section.xml" />
<xi:include href="emscripten.section.xml" />
<xi:include href="crystal.section.xml" />
</chapter>
4 changes: 2 additions & 2 deletions doc/package-specific-user-notes.xml
Original file line number Diff line number Diff line change
@@ -6,7 +6,7 @@
answer some of the frequently asked questions
related to Nixpkgs use.

Some useful information related to package use
Some useful information related to package use
can be found in <link linkend="chap-package-notes">package-specific development notes</link>.

</para>
@@ -196,7 +196,7 @@ overrides = self: super: rec {
haskell-mode = self.melpaPackages.haskell-mode;
...
};
((emacsPackagesNgGen emacs).overrideScope' overrides).emacsWithPackages (p: with p; [
((emacsPackagesGen emacs).overrideScope' overrides).emacsWithPackages (p: with p; [
# here both these package will use haskell-mode of our own choice
ghc-mod
dante
18 changes: 8 additions & 10 deletions lib/modules.nix
Original file line number Diff line number Diff line change
@@ -323,16 +323,14 @@ rec {
else
mergeDefinitions loc opt.type defs';

# Check whether the option is defined, and apply the ‘apply’
# function to the merged value. This allows options to yield a
# value computed from the definitions.
value =
if !res.isDefined then
throw "The option `${showOption loc}' is used but not defined."
else if opt ? apply then
opt.apply res.mergedValue
else
res.mergedValue;

# The value with a check that it is defined
valueDefined = if res.isDefined then res.mergedValue else
throw "The option `${showOption loc}' is used but not defined.";

# Apply the 'apply' function to the merged value. This allows options to
# yield a value computed from the definitions
value = if opt ? apply then opt.apply valueDefined else valueDefined;

in opt //
{ value = builtins.addErrorContext "while evaluating the option `${showOption loc}':" value;
26 changes: 24 additions & 2 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -478,7 +478,7 @@
name = "Stanislas Lange";
};
ankhers = {
email = "justin.k.wood@gmail.com";
email = "me@ankhers.dev";
github = "ankhers";
githubId = 750786;
name = "Justin Wood";
@@ -5340,10 +5340,16 @@
name = "Richard Lupton";
};
rnhmjoj = {
email = "micheleguerinirocco@me.com";
email = "rnhmjoj@inventati.org";
github = "rnhmjoj";
githubId = 2817565;
name = "Michele Guerini Rocco";
keys =
[
{ longkeyid = "ed25519/0xBFBAF4C975F76450";
fingerprint = "92B2 904F D293 C94D C4C9 3E6B BFBA F4C9 75F7 6450";
}
];
};
rob = {
email = "rob.vermaas@gmail.com";
@@ -5686,6 +5692,12 @@
githubId = 918365;
name = "Stefan Frijters";
};
sgo = {
email = "stig@stig.io";
github = "stigtsp";
githubId = 75371;
name = "Stig Palmquist";
};
sgraf = {
email = "sgraf1337@gmail.com";
github = "sgraf812";
@@ -6655,6 +6667,16 @@
githubId = 5837359;
name = "Adrian Pistol";
};
vika_nezrimaya = {
email = "vika@fireburn.ru";
github = "kisik21";
githubId = 7953163;
name = "Vika Shleina";
keys = [{
longkeyid = "rsa4096/0x5402B9B5497BACDB";
fingerprint = "A03C D09C 36CF D9F6 1ADF AF11 5402 B9B5 497B ACDB";
}];
};
vinymeuh = {
email = "vinymeuh@gmail.com";
github = "vinymeuh";
1 change: 1 addition & 0 deletions maintainers/scripts/luarocks-packages.csv
Original file line number Diff line number Diff line change
@@ -18,6 +18,7 @@ http,,,,,vcunat
inspect,,,,,
ldoc,,,,,
lgi,,,,,
ljsyscall,,,,lua5_1,lblasc
lpeg,,,,,vyp
lpeg_patterns,,,,,
lpeglabel,,,,,
7 changes: 7 additions & 0 deletions nixos/doc/manual/configuration/profiles/clone-config.xml
Original file line number Diff line number Diff line change
@@ -11,4 +11,11 @@
creating the image in the first place. As a result it allows users to edit
and rebuild the live-system.
</para>

<para>
On images where the installation media also becomes an installation target,
copying over <literal>configuration.nix</literal> should be disabled by
setting <literal>installer.cloneConfig</literal> to <literal>false</literal>.
This is already done in <literal>sd-image.nix</literal>.
</para>
</section>
38 changes: 18 additions & 20 deletions nixos/doc/manual/configuration/profiles/installation-device.xml
Original file line number Diff line number Diff line change
@@ -6,33 +6,31 @@
<title>Installation Device</title>

<para>
Provides a basic configuration for installation devices like CDs. This means
enabling hardware scans, using the <link linkend="sec-profile-clone-config">
Clone Config profile</link> to guarantee
<filename>/etc/nixos/configuration.nix</filename> exists (for
<command>nixos-rebuild</command> to work), a copy of the Nixpkgs channel
snapshot used to create the install media.
Provides a basic configuration for installation devices like CDs.
This enables redistributable firmware, includes the
<link linkend="sec-profile-clone-config">Clone Config profile</link>
and a copy of the Nixpkgs channel, so <command>nixos-install</command>
works out of the box.
</para>

<para>
Additionally, documentation for <link linkend="opt-documentation.enable">
Nixpkgs</link> and <link linkend="opt-documentation.nixos.enable">NixOS
</link> are forcefully enabled (to override the
Documentation for <link linkend="opt-documentation.enable">Nixpkgs</link>
and <link linkend="opt-documentation.nixos.enable">NixOS</link> are
forcefully enabled (to override the
<link linkend="sec-profile-minimal">Minimal profile</link> preference); the
NixOS manual is shown automatically on TTY 8, sudo and udisks are disabled.
Autologin is enabled as root.
NixOS manual is shown automatically on TTY 8, udisks is disabled.
Autologin is enabled as <literal>nixos</literal> user, while passwordless
login as both <literal>root</literal> and <literal>nixos</literal> is possible.
Passwordless <command>sudo</command> is enabled too.
<link linkend="opt-networking.wireless.enable">wpa_supplicant</link> is
enabled, but configured to not autostart.
</para>

<para>
A message is shown to the user to start a display manager if needed, ssh with
<xref linkend="opt-services.openssh.permitRootLogin"/> are enabled (but
doesn't autostart). WPA Supplicant is also enabled without autostart.
It is explained how to login, start the ssh server, and if available,
how to start the display manager.
</para>

<para>
Finally, vim is installed, root is set to not have a password, the kernel is
made more silent for remote public IP installs, and several settings are
tweaked so that the installer has a better chance of succeeding under
low-memory environments.
Several settings are tweaked so that the installer has a better chance of
succeeding under low-memory environments.
</para>
</section>
106 changes: 85 additions & 21 deletions nixos/doc/manual/release-notes/rl-1909.xml
Original file line number Diff line number Diff line change
@@ -48,6 +48,15 @@
To gain root privileges use <literal>sudo -i</literal> without a password.
</para>
</listitem>
<listitem>
<para>
We've updated to Xfce 4.14, which brings a new module <option>services.xserver.desktopManager.xfce4-14</option>.
If you'd like to upgrade, please switch from the <option>services.xserver.desktopManager.xfce</option> module as it
will be deprecated in a future release. They're incompatibilities with the current Xfce module; it doesn't support
<option>thunarPlugins</option> and it isn't recommended to use <option>services.xserver.desktopManager.xfce</option>
and <option>services.xserver.desktopManager.xfce4-14</option> simultaneously or to downgrade from Xfce 4.14 after upgrading.
</para>
</listitem>
</itemizedlist>
</section>

@@ -291,6 +300,55 @@
configuration while being better type-checked and mergeable.
</para>
</listitem>
<listitem>
<para>
No service depends on <literal>keys.target</literal> anymore which is a systemd
target that indicates if all <link xlink:href="https://nixos.org/nixops/manual/#idm140737322342384">NixOps keys</link> were successfully uploaded.
Instead, <literal>&lt;key-name&gt;-key.service</literal> should be used to define
a dependency of a key in a service. The full issue behind the <literal>keys.target</literal>
dependency is described at <link xlink:href="https://github.com/NixOS/nixpkgs/issues/67265">NixOS/nixpkgs#67265</link>.
</para>
<para>
The following services are affected by this:
<itemizedlist>
<listitem><para><link linkend="opt-services.dovecot2.enable"><literal>services.dovecot2</literal></link></para></listitem>
<listitem><para><link linkend="opt-services.nsd.enable"><literal>services.nsd</literal></link></para></listitem>
<listitem><para><link linkend="opt-services.softether.enable"><literal>services.softether</literal></link></para></listitem>
<listitem><para><link linkend="opt-services.strongswan.enable"><literal>services.strongswan</literal></link></para></listitem>
<listitem><para><link linkend="opt-services.strongswan-swanctl.enable"><literal>services.strongswan-swanctl</literal></link></para></listitem>
<listitem><para><link linkend="opt-services.httpd.enable"><literal>services.httpd</literal></link></para></listitem>
</itemizedlist>
</para>
</listitem>
<listitem>
<para>
The <option>security.acme.directory</option> option has been replaced by a read-only <option>security.acme.certs.&lt;cert&gt;.directory</option> option for each certificate you define. This will be
a subdirectory of <literal>/var/lib/acme</literal>. You can use this read-only option to figure out where the certificates are stored for a specific certificate. For example,
the <option>services.nginx.virtualhosts.&lt;name&gt;.enableACME</option> option will use this directory option to find the certs for the virtual host.
</para>
<para>
<option>security.acme.preDelay</option> and <option>security.acme.activationDelay</option> options have been removed. To execute a service before certificates
are provisioned or renewed add a <literal>RequiredBy=acme-${cert}.service</literal> to any service.
</para>
<para>
Furthermore, the acme module will not automatically add a dependency on <literal>lighttpd.service</literal> anymore. If you are using certficates provided by letsencrypt
for lighttpd, then you should depend on the certificate service <literal>acme-${cert}.service></literal> manually.
</para>
<para>
For nginx, the dependencies are still automatically managed when <option>services.nginx.virtualhosts.&lt;name&gt;.enableACME</option> is enabled just like before. What changed is that nginx now directly depends on the specific certificates that it needs,
instead of depending on the catch-all <literal>acme-certificates.target</literal>. This target unit was also removed from the codebase.
This will mean nginx will no longer depend on certificates it isn't explicitly managing and fixes a bug with certificate renewal
ordering racing with nginx restarting which could lead to nginx getting in a broken state as described at
<link xlink:href="https://github.com/NixOS/nixpkgs/issues/60180">NixOS/nixpkgs#60180</link>.
</para>
</listitem>
<listitem>
<para>
The old deprecated <literal>emacs</literal> package sets have been dropped.
What used to be called <literal>emacsPackagesNg</literal> is now simply called <literal>emacsPackages</literal>.
</para>
</listitem>

</itemizedlist>
</section>

@@ -506,27 +564,33 @@
<option>boot.kernel.sysctl."kernel.core_pattern"</option> to <literal>"core"</literal>.
</para>
</listitem>
<listitem>
<para>
<literal>systemd.packages</literal> option now also supports generators and
shutdown scripts. Old <literal>systemd.generator-packages</literal> option has
been removed.
</para>
</listitem>
<listitem>
<para>
The <literal>rmilter</literal> package was removed with associated module and options due deprecation by upstream developer.
Use <literal>rspamd</literal> in proxy mode instead.
</para>
</listitem>
<listitem>
<para>
systemd cgroup accounting via the
<link linkend="opt-systemd.enableCgroupAccounting">systemd.enableCgroupAccounting</link>
option is now enabled by default. It now also enables the more recent Block IO and IP accounting
features.
</para>
</listitem>
<listitem>
<para>
<literal>systemd.packages</literal> option now also supports generators and
shutdown scripts. Old <literal>systemd.generator-packages</literal> option has
been removed.
</para>
</listitem>
<listitem>
<para>
The <literal>rmilter</literal> package was removed with associated module and options due deprecation by upstream developer.
Use <literal>rspamd</literal> in proxy mode instead.
</para>
</listitem>
<listitem>
<para>
systemd cgroup accounting via the
<link linkend="opt-systemd.enableCgroupAccounting">systemd.enableCgroupAccounting</link>
option is now enabled by default. It now also enables the more recent Block IO and IP accounting
features.
</para>
</listitem>
<listitem>
<para>
We no longer enable custom font rendering settings with <option>fonts.fontconfig.penultimate.enable</option> by default.
The defaults from fontconfig are sufficient.
</para>
</listitem>
</itemizedlist>
</section>
</section>
Loading