hexa
May 16, 2025, 7:58am
82
Per our Python update schedule , we will bump the primary python3
attribute from 3.12 to 3.13 in the next staging cycle. We will keep recursing into python312Packages
and python313Packages
for NixOS 25.11.
The PR for python-updates
will be up shortly, and we’ll be resolving the gravest issues there and in the upcoming staging-next
branch.
staging
← python-updates
opened 10:55PM - 17 May 25 UTC
This is a bulk update run on the python package set.
- Jobset: https://hydra.… lossy.network/jobset/nixpkgs/python-updates
- Eval reports: https://shells.darmstadt.ccc.de/~hexa/742.html
Questions? Join [#python:nixos.org](https://matrix.to/#/#python:nixos.org) on Matrix.
### Backed out
- Cython 3.1.0 (too early for the ecosystem)
- pip 25.1.0 (breaks pip-tools tests, because dependency resolution complexity exception)
- beautifulsoup 4.13 break django-compressor and thereby pretalx, pretix, healthchecks, weblate, seahub
- marshmallow 4.0 (required heavy patching for dataclasses-json, breaks platformio for example) #409223
- clldutils>3.22.0 (requires bibtexparser>2.0b4, which breaks e.g. scholarly and calibre-web)
### Known issues
- LLVM versions 15 and earlier break due to `pipes` battery removal
Feel free to join #python:nixos.org if you have questions.
5 Likes
honnip
May 16, 2025, 9:43am
83
With the GNOME 48 update, gnomeExtensions
attrset will have extensions that support GNOME 46, 47, and 48, instead of 45-47.
You can still find the old extensions in gnomeXYExtensions
set. e.g., gnome45Extensions."UUID"
1 Like
Ma27
June 28, 2025, 4:04pm
84
master
← wolfgangwalther:postgresql-target
opened 03:02PM - 02 May 25 UTC
This avoids restarting the postgresql server, when only `ensureDatabases` or `en… sureUsers` have been changed. Later, it will also allow to properly wait for recovery to finish (https://github.com/NixOS/nixpkgs/issues/346886#issuecomment-2839062089).
To wait for "postgresql is ready" in other services, we now provide a `postgresql.target`.
Supersedes #400018
## Things done
- Built on platform(s)
- [x] x86_64-linux
- [ ] aarch64-linux
- [ ] x86_64-darwin
- [ ] aarch64-darwin
- [x] Tested, as applicable:
- [NixOS test(s)](https://nixos.org/manual/nixos/unstable/index.html#sec-nixos-tests) (look inside [nixos/tests](https://github.com/NixOS/nixpkgs/blob/master/nixos/tests))
- [25.05 Release Notes](https://github.com/NixOS/nixpkgs/blob/master/nixos/doc/manual/release-notes/rl-2505.section.md) (or backporting [24.11](https://github.com/NixOS/nixpkgs/blob/master/nixos/doc/manual/release-notes/rl-2411.section.md) and [25.05](https://github.com/NixOS/nixpkgs/blob/master/nixos/doc/manual/release-notes/rl-2505.section.md) Release notes)
- [x] (Module updates) Added a release notes entry if the change is significant
- [x] Fits [CONTRIBUTING.md](https://github.com/NixOS/nixpkgs/blob/master/CONTRIBUTING.md).
---
Add a :+1: [reaction] to [pull requests you find important].
[reaction]: https://github.blog/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/
[pull requests you find important]: https://github.com/NixOS/nixpkgs/pulls?q=is%3Aopen+sort%3Areactions-%2B1-desc
When using postgresql on unstable, please read the newly added sections of the 25.11 release notes. Tl;dr the code for ensureUsers et al. is now executed in its own unit, postgresql-setup.service
.
8 Likes
hexa
June 29, 2025, 9:22pm
85
We are preparing the migration of the minimal ISO installer to NetworkManager and in that process we found opportunities to meaningfully reduce its closure size.
master
← mweinelt:nm-cleanup
opened 04:25PM - 29 Jun 25 UTC
Its closure size is huge, due to a dependency on webkitgtk, and now that
we wan… t to enable networkmanager on the ISOs by default closure size
matters a lot.
Instead we now pass openconnect to the PATH of the systemd unit and pick
it up from there.
<del>:warning: I did not test the openconnect plugin, not sure I can reasonably do that.</del>
:heavy_check_mark: I tested an openconnect connection and it worked the same as before with the patch applied.
---
Since opening this PR I also redid the plugin requirement handling and dropped options that I felt were a mistake. Thanks for the inspiration and review by the #network:nixos.org folks.
---
cc #420923
## Things done
- Built on platform(s)
- [x] x86_64-linux
- [ ] aarch64-linux
- [ ] x86_64-darwin
- [ ] aarch64-darwin
- For non-Linux: Is sandboxing enabled in `nix.conf`? (See [Nix manual](https://nixos.org/manual/nix/stable/command-ref/conf-file.html))
- [ ] `sandbox = relaxed`
- [ ] `sandbox = true`
- [x] Tested, as applicable:
- [NixOS test(s)](https://nixos.org/manual/nixos/unstable/index.html#sec-nixos-tests) (look inside [nixos/tests](https://github.com/NixOS/nixpkgs/blob/master/nixos/tests))
- and/or [package tests](https://github.com/NixOS/nixpkgs/blob/master/pkgs/README.md#package-tests)
- or, for functions and "core" functionality, tests in [lib/tests](https://github.com/NixOS/nixpkgs/blob/master/lib/tests) or [pkgs/test](https://github.com/NixOS/nixpkgs/blob/master/pkgs/test)
- made sure NixOS tests are [linked](https://github.com/NixOS/nixpkgs/blob/master/pkgs/README.md#linking-nixos-module-tests-to-a-package) to the relevant packages
- [ ] Tested compilation of all packages that depend on this change using `nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"`. Note: all changes have to be committed, also see [nixpkgs-review usage](https://github.com/Mic92/nixpkgs-review#usage)
- [ ] Tested basic functionality of all binary files (usually in `./result/bin/`)
- [Nixpkgs 25.11 Release Notes](https://github.com/NixOS/nixpkgs/blob/master/doc/release-notes/rl-2511.section.md) (or backporting [24.11](https://github.com/NixOS/nixpkgs/blob/master/nixos/doc/release-notes/rl-2411.section.md) and [25.05](https://github.com/NixOS/nixpkgs/blob/master/doc/manual/release-notes/rl-2505.section.md) Nixpkgs Release notes)
- [ ] (Package updates) Added a release notes entry if the change is major or breaking
- [NixOS 25.11 Release Notes](https://github.com/NixOS/nixpkgs/blob/master/nixos/doc/manual/release-notes/rl-2511.section.md) (or backporting [24.11](https://github.com/NixOS/nixpkgs/blob/master/nixos/doc/manual/release-notes/rl-2411.section.md) and [25.05](https://github.com/NixOS/nixpkgs/blob/master/nixos/doc/manual/release-notes/rl-2505.section.md) NixOS Release notes)
- [ ] (Module updates) Added a release notes entry if the change is significant
- [ ] (Module addition) Added a release notes entry if adding a new NixOS module
- [x] Fits [CONTRIBUTING.md](https://github.com/NixOS/nixpkgs/blob/master/CONTRIBUTING.md), [pkgs/README.md](https://github.com/NixOS/nixpkgs/blob/master/pkgs/README.md), [maintainers/README.md](https://github.com/NixOS/nixpkgs/blob/master/maintainers/README.md) and other contributing documentation in corresponding paths.
---
Add a :+1: [reaction] to [pull requests you find important].
[reaction]: https://github.blog/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/
[pull requests you find important]: https://github.com/NixOS/nixpkgs/pulls?q=is%3Aopen+sort%3Areactions-%2B1-desc
The cliff notes are this:
NetworkManager will not ship with VPN plugins by default any more
All required VPN plugins need to be specified in networking.networkmanager.plugins
How to find the plugins you need?
The worst thing that can happen is that you update and NetworkManager will not be able to start or edit the VPN configuration. The configuration will not be lost and installing the relevant plugin will make it work again.
39 Likes
Downstream users of the pnpm tooling in nixpkgs (as well as authors of open PRs to nixpkgs) have to define fetcherVersion
when calling pnpm.fetchDeps
now.
See pnpm.fetchDeps: ensure consistent permissions, add versioning by gepbird · Pull Request #422975 · NixOS/nixpkgs · GitHub
6 Likes