1<section xmlns="http://docbook.org/ns/docbook"
2 xmlns:xlink="http://www.w3.org/1999/xlink"
3 xmlns:xi="http://www.w3.org/2001/XInclude"
4 version="5.0"
5 xml:id="sec-release-14.04">
6
7<title>Release 14.04 (“Baboon”, 2014/04/30)</title>
8
9<para>This is the second stable release branch of NixOS. In addition
10to numerous new and upgraded packages and modules, this release has
11the following highlights:
12
13<itemizedlist>
14
15 <listitem><para>Installation on UEFI systems is now supported. See
16 <xref linkend="sec-uefi-installation"/> for
17 details.</para></listitem>
18
19 <listitem><para>Systemd has been updated to version 212, which has
20 <link xlink:href="http://cgit.freedesktop.org/systemd/systemd/plain/NEWS?id=v212">numerous
21 improvements</link>. NixOS now automatically starts systemd user
22 instances when you log in. You can define global user units through
23 the <option>systemd.unit.*</option> options.</para></listitem>
24
25 <listitem><para>NixOS is now based on Glibc 2.19 and GCC
26 4.8.</para></listitem>
27
28 <listitem><para>The default Linux kernel has been updated to
29 3.12.</para></listitem>
30
31 <listitem><para>KDE has been updated to 4.12.</para></listitem>
32
33 <listitem><para>GNOME 3.10 experimental support has been added.</para></listitem>
34
35 <listitem><para>Nix has been updated to 1.7 (<link
36 xlink:href="http://nixos.org/nix/manual/#ssec-relnotes-1.7">details</link>).</para></listitem>
37
38 <listitem><para>NixOS now supports fully declarative management of
39 users and groups. If you set <option>users.mutableUsers</option> to
40 <literal>false</literal>, then the contents of
41 <filename>/etc/passwd</filename> and <filename>/etc/group</filename>
42 will be <link
43 xlink:href="https://www.usenix.org/legacy/event/lisa02/tech/full_papers/traugott/traugott_html/">congruent</link>
44 to your NixOS configuration. For instance, if you remove a user from
45 <option>users.extraUsers</option> and run
46 <command>nixos-rebuild</command>, the user account will cease to
47 exist. Also, imperative commands for managing users and groups, such
48 as <command>useradd</command>, are no longer available. If
49 <option>users.mutableUsers</option> is <literal>true</literal> (the
50 default), then behaviour is unchanged from NixOS
51 13.10.</para></listitem>
52
53 <listitem><para>NixOS now has basic container support, meaning you
54 can easily run a NixOS instance as a container in a NixOS host
55 system. These containers are suitable for testing and
56 experimentation but not production use, since they’re not fully
57 isolated from the host. See <xref linkend="ch-containers"/> for
58 details.</para></listitem>
59
60 <listitem><para>Systemd units provided by packages can now be
61 overridden from the NixOS configuration. For instance, if a package
62 <literal>foo</literal> provides systemd units, you can say:
63
64<programlisting>
65systemd.packages = [ pkgs.foo ];
66</programlisting>
67
68 to enable those units. You can then set or override unit options in
69 the usual way, e.g.
70
71<programlisting>
72systemd.services.foo.wantedBy = [ "multi-user.target" ];
73systemd.services.foo.serviceConfig.MemoryLimit = "512M";
74</programlisting>
75
76 </para></listitem>
77
78</itemizedlist>
79
80</para>
81
82<para>When upgrading from a previous release, please be aware of the
83following incompatible changes:
84
85<itemizedlist>
86
87 <listitem><para>Nixpkgs no longer exposes unfree packages by
88 default. If your NixOS configuration requires unfree packages from
89 Nixpkgs, you need to enable support for them explicitly by setting:
90
91<programlisting>
92nixpkgs.config.allowUnfree = true;
93</programlisting>
94
95 Otherwise, you get an error message such as:
96
97<screen>
98error: package ‘nvidia-x11-331.49-3.12.17’ in ‘…/nvidia-x11/default.nix:56’
99 has an unfree license, refusing to evaluate
100</screen>
101
102 </para></listitem>
103
104 <listitem><para>The Adobe Flash player is no longer enabled by
105 default in the Firefox and Chromium wrappers. To enable it, you must
106 set:
107
108<programlisting>
109nixpkgs.config.allowUnfree = true;
110nixpkgs.config.firefox.enableAdobeFlash = true; # for Firefox
111nixpkgs.config.chromium.enableAdobeFlash = true; # for Chromium
112</programlisting>
113
114 </para></listitem>
115
116 <listitem><para>The firewall is now enabled by default. If you don’t
117 want this, you need to disable it explicitly:
118
119<programlisting>
120networking.firewall.enable = false;
121</programlisting>
122
123 </para></listitem>
124
125 <listitem><para>The option
126 <option>boot.loader.grub.memtest86</option> has been renamed to
127 <option>boot.loader.grub.memtest86.enable</option>.</para></listitem>
128
129 <listitem><para>The <literal>mysql55</literal> service has been
130 merged into the <literal>mysql</literal> service, which no longer
131 sets a default for the option
132 <option>services.mysql.package</option>.</para></listitem>
133
134 <listitem><para>Package variants are now differentiated by suffixing
135 the name, rather than the version. For instance,
136 <filename>sqlite-3.8.4.3-interactive</filename> is now called
137 <filename>sqlite-interactive-3.8.4.3</filename>. This ensures that
138 <literal>nix-env -i sqlite</literal> is unambiguous, and that
139 <literal>nix-env -u</literal> won’t “upgrade”
140 <literal>sqlite</literal> to <literal>sqlite-interactive</literal>
141 or vice versa. Notably, this change affects the Firefox wrapper
142 (which provides plugins), as it is now called
143 <literal>firefox-wrapper</literal>. So when using
144 <command>nix-env</command>, you should do <literal>nix-env -e
145 firefox; nix-env -i firefox-wrapper</literal> if you want to keep
146 using the wrapper. This change does not affect declarative package
147 management, since attribute names like
148 <literal>pkgs.firefoxWrapper</literal> were already
149 unambiguous.</para></listitem>
150
151 <listitem><para>The symlink <filename>/etc/ca-bundle.crt</filename>
152 is gone. Programs should instead use the environment variable
153 <envar>OPENSSL_X509_CERT_FILE</envar> (which points to
154 <filename>/etc/ssl/certs/ca-bundle.crt</filename>).</para></listitem>
155
156</itemizedlist>
157
158</para>
159
160</section>