+3
-3
pkgs/README.md
+3
-3
pkgs/README.md
······This can be the package submitter or a community member that accepts taking up maintainership of the package.-- Ensure any special packaging choices and required context are documented in i.e. the name of a patch or in a comment.- If a special version of a package is pinned, document why, so others know if/when it can be unpinned.···[github.com/NixOS/nixpkgs/issues?q=is:issue+is:open+"Vulnerability+roundup"](https://github.com/NixOS/nixpkgs/issues?q=is%3Aissue+is%3Aopen+%22Vulnerability+roundup%22)
······This can be the package submitter or a community member that accepts taking up maintainership of the package.+- Ensure any special packaging choices and required context are documented in, i.e., the name of a patch or in a comment.- If a special version of a package is pinned, document why, so others know if/when it can be unpinned.···[github.com/NixOS/nixpkgs/issues?q=is:issue+is:open+"Vulnerability+roundup"](https://github.com/NixOS/nixpkgs/issues?q=is%3Aissue+is%3Aopen+%22Vulnerability+roundup%22)
+1
-1
pkgs/applications/networking/browsers/chromium/README.md
+1
-1
pkgs/applications/networking/browsers/chromium/README.md
···- `ungoogled-chromium`: A patch set for Chromium, that has its own entry in Chromium's `upstream-info.nix`.
···- `ungoogled-chromium`: A patch set for Chromium, that has its own entry in Chromium's `upstream-info.nix`.
+1
-1
pkgs/applications/networking/cluster/k3s/README.md
+1
-1
pkgs/applications/networking/cluster/k3s/README.md
+1
-1
pkgs/applications/networking/cluster/rke2/README.md
+1
-1
pkgs/applications/networking/cluster/rke2/README.md
···Nixpkgs follows active minor version release channels (typically 4 at a time) and sets aliases for
···Nixpkgs follows active minor version release channels (typically 4 at a time) and sets aliases for
+1
-1
pkgs/build-support/go/README.md
+1
-1
pkgs/build-support/go/README.md
···When an end-of-life toolchain is removed, builders that pin the EOL version (according to 3.) will automatically be bumped to the then oldest pinned builder (e.g. Go 1.22 is EOL, `buildGo122Module` is bumped to `buildGo123Module`).It is the package maintainers responsibility to fix the package and get it working with a supported Go toolchain.
···When an end-of-life toolchain is removed, builders that pin the EOL version (according to 3.) will automatically be bumped to the then oldest pinned builder (e.g. Go 1.22 is EOL, `buildGo122Module` is bumped to `buildGo123Module`).It is the package maintainers responsibility to fix the package and get it working with a supported Go toolchain.
+1
-1
pkgs/by-name/README.md
+1
-1
pkgs/by-name/README.md
+1
-1
pkgs/by-name/az/azure-cli/README.md
+1
-1
pkgs/by-name/az/azure-cli/README.md
+1
-1
pkgs/by-name/fr/freecad/README.md
+1
-1
pkgs/by-name/fr/freecad/README.md
···
···
+1
-1
pkgs/by-name/ka/kanidm/README.md
+1
-1
pkgs/by-name/ka/kanidm/README.md
···-Kanidm versions are supported for 30 days after the release of new versions. Following the example above, 1.5.x superseding 1.4.x in 30 days, do the following near the end of the 30 day window1. Update `pkgs/top-level/release.nix` and add `kanidm_1_4-1.4.6` and `kanidmWithSecretProvisioning_1_4-1.4.6` to `permittedInsecurePackages`
···+Kanidm versions are supported for 30 days after the release of new versions. Following the example above, 1.5.x superseding 1.4.x in 30 days, do the following near the end of the 30-day window1. Update `pkgs/top-level/release.nix` and add `kanidm_1_4-1.4.6` and `kanidmWithSecretProvisioning_1_4-1.4.6` to `permittedInsecurePackages`
+5
-5
pkgs/by-name/ni/nixos-rebuild-ng/README.md
+5
-5
pkgs/by-name/ni/nixos-rebuild-ng/README.md
···············
···············
+1
-1
pkgs/by-name/ni/nixos-render-docs/README.md
+1
-1
pkgs/by-name/ni/nixos-render-docs/README.md
···- It would also require keeping an impure or otherwise continuously updated reference to those other revisions.- The static mapping acts like a semi-automatically updated cache that we drag along with version history.- Other setups, such as a dedicated service to cache a history of moved content, are more complicated and would still be impure.-- Checking in large amounts of data that is touched often, bears a risk of more merge conflicts or related build failures.The solution picked here is to have a static mapping of the historical locations checked into the Git tree, such that it can be read during the build process.This also ensures that an improper redirect mapping will cause `nixos-render-docs` to fail the build and thus enforce that redirects stay up-to-date with every commit.
···- It would also require keeping an impure or otherwise continuously updated reference to those other revisions.- The static mapping acts like a semi-automatically updated cache that we drag along with version history.- Other setups, such as a dedicated service to cache a history of moved content, are more complicated and would still be impure.+- Checking in large amounts of data that is touched often bears a risk of more merge conflicts or related build failures.The solution picked here is to have a static mapping of the historical locations checked into the Git tree, such that it can be read during the build process.This also ensures that an improper redirect mapping will cause `nixos-render-docs` to fail the build and thus enforce that redirects stay up-to-date with every commit.
+1
-1
pkgs/by-name/sw/switch-to-configuration-ng/README.md
+1
-1
pkgs/by-name/sw/switch-to-configuration-ng/README.md
···-This program implements the switching/updating of NixOS systems. It starts with the exising running configuration at `/run/current-system` and handles the migration to a new configuration, built from a NixOS configuration's `config.system.build.toplevel` derivation.For more information on what happens during a switch, see [what-happens-during-a-system-switch](../../../../nixos/doc/manual/development/what-happens-during-a-system-switch.chapter.md).
···+This program implements the switching/updating of NixOS systems. It starts with the existing running configuration at `/run/current-system` and handles the migration to a new configuration, built from a NixOS configuration's `config.system.build.toplevel` derivation.For more information on what happens during a switch, see [what-happens-during-a-system-switch](../../../../nixos/doc/manual/development/what-happens-during-a-system-switch.chapter.md).
+1
-1
pkgs/development/compilers/elm/README.md
+1
-1
pkgs/development/compilers/elm/README.md
···
···
+1
-1
pkgs/development/compilers/julia/README.md
+1
-1
pkgs/development/compilers/julia/README.md
···
···
+3
-3
pkgs/development/compilers/llvm/README.md
+3
-3
pkgs/development/compilers/llvm/README.md
···This will set the github revision and sha256 for `llvmPackages_git.llvm` to whatever the latest chromium build is using.···-This is fine for small corrections, but when more serious changes are needed its better to use git.···Use CMake's [`GNUInstallDirs`](https://cmake.org/cmake/help/latest/module/GNUInstallDirs.html) to support multiple outputs.For the older LLVM versions, these patches live in https://github.com/Ericson2314/llvm-project branches `split-prefix`.
···This will set the github revision and sha256 for `llvmPackages_git.llvm` to whatever the latest chromium build is using.···+This is fine for small corrections, but when more serious changes are needed, it's better to use git.···Use CMake's [`GNUInstallDirs`](https://cmake.org/cmake/help/latest/module/GNUInstallDirs.html) to support multiple outputs.For the older LLVM versions, these patches live in https://github.com/Ericson2314/llvm-project branches `split-prefix`.
+9
-9
pkgs/development/cuda-modules/README.md
+9
-9
pkgs/development/cuda-modules/README.md
·········
·········
+1
-1
pkgs/development/mobile/androidenv/README.md
+1
-1
pkgs/development/mobile/androidenv/README.md
+8
-8
pkgs/development/tools/build-managers/gradle/README.md
+8
-8
pkgs/development/tools/build-managers/gradle/README.md
···············-"!comment": "This is a nixpkgs Gradle dependency lockfile. For more details, refer to the Gradle section in the nixpkgs manual.",······
···············+"!comment": "This is a Nixpkgs Gradle dependency lockfile. For more details, refer to the Gradle section in the Nixpkgs manual.",······
+1
-1
pkgs/stdenv/darwin/README.md
+1
-1
pkgs/stdenv/darwin/README.md
···
···+llvmPackages.latest in `all-packages.nix`. Timing-wise, this is done currently using the spring
+1
-1
pkgs/tools/package-management/nix/README.md
+1
-1
pkgs/tools/package-management/nix/README.md
···If you're updating `nixVersions.stable`, follow all the steps mentioned above, but use the **staging** branch for your pull request (or **staging-next** after coordinating with the people in matrix `#staging:nixos.org`)This is necessary because, at the end of the staging-next cycle, the NixOS tests are built through the [staging-next-small](https://hydra.nixos.org/jobset/nixos/staging-next-small) jobset.
···If you're updating `nixVersions.stable`, follow all the steps mentioned above, but use the **staging** branch for your pull request (or **staging-next** after coordinating with the people in matrix `#staging:nixos.org`)This is necessary because, at the end of the staging-next cycle, the NixOS tests are built through the [staging-next-small](https://hydra.nixos.org/jobset/nixos/staging-next-small) jobset.
+1
-1
pkgs/tools/package-management/nix/modular/README.md
+1
-1
pkgs/tools/package-management/nix/modular/README.md