+2
nixos/doc/manual/release-notes/rl-2311.section.md
+2
nixos/doc/manual/release-notes/rl-2311.section.md
···- Support for WiFi6 (IEEE 802.11ax) and WPA3-SAE-PK was enabled in the `hostapd` package, along with a significant rework of the hostapd module.
+20
nixos/maintainers/scripts/lxd/lxd-container-image-inner.nix
+20
nixos/maintainers/scripts/lxd/lxd-container-image-inner.nix
···
-95
nixos/maintainers/scripts/lxd/lxd-image-inner.nix
-95
nixos/maintainers/scripts/lxd/lxd-image-inner.nix
···-# vim # Do not forget to add an editor to edit configuration.nix! The Nano editor is also installed by default.
+3
-3
nixos/maintainers/scripts/lxd/lxd-image.nix
nixos/maintainers/scripts/lxd/lxd-container-image.nix
+3
-3
nixos/maintainers/scripts/lxd/lxd-image.nix
nixos/maintainers/scripts/lxd/lxd-container-image.nix
······-sed 's|../../../modules/virtualisation/lxc-container.nix|<nixpkgs/nixos/modules/virtualisation/lxc-container.nix>|g' -i /etc/nixos/configuration.nix+${lib.getExe pkgs.gnused} 's|../../../modules/virtualisation/lxc-container.nix|<nixpkgs/nixos/modules/virtualisation/lxc-container.nix>|g' -i /etc/nixos/configuration.nix
+20
nixos/maintainers/scripts/lxd/lxd-virtual-machine-image-inner.nix
+20
nixos/maintainers/scripts/lxd/lxd-virtual-machine-image-inner.nix
···
+27
nixos/maintainers/scripts/lxd/lxd-virtual-machine-image.nix
+27
nixos/maintainers/scripts/lxd/lxd-virtual-machine-image.nix
···+${lib.getExe pkgs.gnused} 's|../../../modules/virtualisation/lxd-virtual-machine.nix|<nixpkgs/nixos/modules/virtualisation/lxd-virtual-machine.nix>|g' -i /etc/nixos/configuration.nix
+6
-124
nixos/modules/virtualisation/lxc-container.nix
+6
-124
nixos/modules/virtualisation/lxc-container.nix
···-template = builtins.toFile "hostname-nix.tpl" "{ ... }: { networking.hostName = \"{{ container.name }}\"; }";-template = builtins.toFile "configuration-nix" "{{ config_get(\"user.user-data\", properties.default) }}";Whether this LXC container will be running as a privileged container or not. If set to `true` then···${config.nix.package.out}/bin/nix-env -p /nix/var/nix/profiles/system --set /run/current-system-description = "${config.system.nixos.distroName} ${config.system.nixos.codeName} ${config.system.nixos.label} ${pkgs.system}";······
+104
nixos/modules/virtualisation/lxc-image-metadata.nix
+104
nixos/modules/virtualisation/lxc-image-metadata.nix
···+template = builtins.writeFile "hostname-nix.tpl" "{ ... }: { networking.hostName = "{{ container.name }}"; }";+template = builtins.writeFile "configuration-nix" "{{ config_get(\"user.user-data\", properties.default) }}";+description = "${config.system.nixos.distroName} ${config.system.nixos.codeName} ${config.system.nixos.label} ${pkgs.system}";
+30
nixos/modules/virtualisation/lxc-instance-common.nix
+30
nixos/modules/virtualisation/lxc-instance-common.nix
···
+46
nixos/modules/virtualisation/lxd-virtual-machine.nix
+46
nixos/modules/virtualisation/lxd-virtual-machine.nix
···
+1
-1
nixos/modules/virtualisation/lxd.nix
+1
-1
nixos/modules/virtualisation/lxd.nix
···
+36
-4
nixos/release.nix
+36
-4
nixos/release.nix
·········
+5
-5
nixos/tests/lxd/container.nix
+5
-5
nixos/tests/lxd/container.nix
······
+1
nixos/tests/lxd/default.nix
+1
nixos/tests/lxd/default.nix
+64
nixos/tests/lxd/virtual-machine.nix
+64
nixos/tests/lxd/virtual-machine.nix
···+status, _ = machine.execute("lxc exec ${instance-name} --disable-stdin --force-interactive /run/current-system/sw/bin/true")+machine.succeed("lxc image import ${lxd-image-metadata}/*/*.tar.xz ${lxd-image-disk}/nixos.qcow2 --alias nixos")+machine.succeed("lxc launch nixos ${instance-name} --vm --config limits.memory=512MB --config security.secureboot=false")