nixos/rosetta: add release notes

This commit is contained in:
sandydoo 2022-11-25 12:36:33 +00:00
parent 624ebdc10d
commit 11fbf96e2b
No known key found for this signature in database
GPG key ID: D1A763BC84F34603
2 changed files with 16 additions and 1 deletions

View file

@ -82,7 +82,7 @@
</section> </section>
<section xml:id="sec-release-23.05-notable-changes"> <section xml:id="sec-release-23.05-notable-changes">
<title>Other Notable Changes</title> <title>Other Notable Changes</title>
<itemizedlist spacing="compact"> <itemizedlist>
<listitem> <listitem>
<para> <para>
The module for the application firewall The module for the application firewall
@ -91,6 +91,19 @@
<link linkend="opt-services.opensnitch.rules">services.opensnitch.rules</link> <link linkend="opt-services.opensnitch.rules">services.opensnitch.rules</link>
</para> </para>
</listitem> </listitem>
<listitem>
<para>
A new <literal>virtualisation.rosetta</literal> module was
added to allow running <literal>x86_64</literal> binaries
through
<link xlink:href="https://developer.apple.com/documentation/apple-silicon/about-the-rosetta-translation-environment">Rosetta</link>
inside virtualised NixOS guests on Apple silicon. This feature
works by default with the
<link xlink:href="https://docs.getutm.app/">UTM</link>
virtualisation
<link xlink:href="https://search.nixos.org/packages?channel=unstable&amp;show=utm&amp;from=0&amp;size=1&amp;sort=relevance&amp;type=packages&amp;query=utm">package</link>.
</para>
</listitem>
</itemizedlist> </itemizedlist>
</section> </section>
</section> </section>

View file

@ -34,3 +34,5 @@ In addition to numerous new and upgraded packages, this release has the followin
<!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. --> <!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
- The module for the application firewall `opensnitch` got the ability to configure rules. Available as [services.opensnitch.rules](#opt-services.opensnitch.rules) - The module for the application firewall `opensnitch` got the ability to configure rules. Available as [services.opensnitch.rules](#opt-services.opensnitch.rules)
- A new `virtualisation.rosetta` module was added to allow running `x86_64` binaries through [Rosetta](https://developer.apple.com/documentation/apple-silicon/about-the-rosetta-translation-environment) inside virtualised NixOS guests on Apple silicon. This feature works by default with the [UTM](https://docs.getutm.app/) virtualisation [package](https://search.nixos.org/packages?channel=unstable&show=utm&from=0&size=1&sort=relevance&type=packages&query=utm).