···237237 </listitem>
238238 <listitem>
239239 <para>
240240+ The DHCP server (<literal>services.dhcpd4</literal>,
241241+ <literal>services.dhcpd6</literal>) has been hardened. The
242242+ service is now using the systemd’s
243243+ <literal>DynamicUser</literal> mechanism to run as an
244244+ unprivileged dynamically-allocated user with limited
245245+ capabilities. The dhcpd state files are now always stored in
246246+ <literal>/var/lib/dhcpd{4,6}</literal> and the
247247+ <literal>services.dhcpd4.stateDir</literal> and
248248+ <literal>service.dhcpd6.stateDir</literal> options have been
249249+ removed. If you were depending on root privileges or
250250+ set{uid,gid,cap} binaries in dhcpd shell hooks, you may give
251251+ dhcpd more capabilities with e.g.
252252+ <literal>systemd.services.dhcpd6.serviceConfig.AmbientCapabilities</literal>.
253253+ </para>
254254+ </listitem>
255255+ <listitem>
256256+ <para>
240257 The <literal>mailpile</literal> email webclient
241258 (<literal>services.mailpile</literal>) has been removed due to
242259 its reliance on python2.
···433450 possible to use the providers from
434451 <link xlink:href="https://github.com/numtide/nixpkgs-terraform-providers-bin">nixpkgs-terraform-providers-bin</link>
435452 directly.
453453+ </para>
454454+ </listitem>
455455+ <listitem>
456456+ <para>
457457+ The existing <literal>pkgs.opentelemetry-collector</literal>
458458+ has been moved to
459459+ <literal>pkgs.opentelemetry-collector-contrib</literal> to
460460+ match the actual source being the <quote>contrib</quote>
461461+ edition. <literal>pkgs.opentelemetry-collector</literal> is
462462+ now the actual core release of opentelemetry-collector. If you
463463+ use the community contributions you should change the package
464464+ you refer to. If you don’t need them update your commands from
465465+ <literal>otelcontribcol</literal> to
466466+ <literal>otelcorecol</literal> and enjoy a 7x smaller binary.
436467 </para>
437468 </listitem>
438469 <listitem>
+14
nixos/doc/manual/release-notes/rl-2205.section.md
···81818282- `services.kubernetes.addons.dashboard` was removed due to it being an outdated version.
83838484+- The DHCP server (`services.dhcpd4`, `services.dhcpd6`) has been hardened.
8585+ The service is now using the systemd's `DynamicUser` mechanism to run as an unprivileged dynamically-allocated user with limited capabilities.
8686+ The dhcpd state files are now always stored in `/var/lib/dhcpd{4,6}` and the `services.dhcpd4.stateDir` and `service.dhcpd6.stateDir` options have been removed.
8787+ If you were depending on root privileges or set{uid,gid,cap} binaries in dhcpd shell hooks, you may give dhcpd more capabilities with e.g. `systemd.services.dhcpd6.serviceConfig.AmbientCapabilities`.
8888+8489- The `mailpile` email webclient (`services.mailpile`) has been removed due to its reliance on python2.
85908691- The MoinMoin wiki engine (`services.moinmoin`) has been removed, because Python 2 is being retired from nixpkgs.
···133138134139- MultiMC has been replaced with the fork PolyMC due to upstream developers being hostile to 3rd party package maintainers. PolyMC removes all MultiMC branding and is aimed at providing proper 3rd party packages like the one contained in Nixpkgs. This change affects the data folder where game instances and other save and configuration files are stored. Users with existing installations should rename `~/.local/share/multimc` to `~/.local/share/polymc`. The main config file's path has also moved from `~/.local/share/multimc/multimc.cfg` to `~/.local/share/polymc/polymc.cfg`.
135140141141+136142- The terraform 0.12 compatibility has been removed and the `terraform.withPlugins` and `terraform-providers.mkProvider` implementations simplified. Providers now need to be stored under
137143`$out/libexec/terraform-providers/<registry>/<owner>/<name>/<version>/<os>_<arch>/terraform-provider-<name>_v<version>` (which mkProvider does).
138144139145 This breaks back-compat so it's not possible to mix-and-match with previous versions of nixpkgs. In exchange, it now becomes possible to use the providers from [nixpkgs-terraform-providers-bin](https://github.com/numtide/nixpkgs-terraform-providers-bin) directly.
146146+147147+- The existing `pkgs.opentelemetry-collector` has been moved to
148148+ `pkgs.opentelemetry-collector-contrib` to match the actual source being the
149149+ "contrib" edition. `pkgs.opentelemetry-collector` is now the actual core
150150+ release of opentelemetry-collector. If you use the community contributions
151151+ you should change the package you refer to. If you don't need them update your
152152+ commands from `otelcontribcol` to `otelcorecol` and enjoy a 7x smaller binary.
153153+140154141155- `pkgs.noto-fonts-cjk` is now deprecated in favor of `pkgs.noto-fonts-cjk-sans`
142156 and `pkgs.noto-fonts-cjk-serif` because they each have different release
···3636 };
37373838 # Since we want to program the routes that we delegate to the "customer"
3939- # into our routing table we must have a way to gain the required privs.
4040- # This security wrapper will do in our test setup.
4141- #
4242- # DO NOT COPY THIS TO PRODUCTION AS IS. Think about it at least twice.
4343- # Everyone on the "isp" machine will be able to add routes to the kernel.
4444- security.wrappers.add-dhcpd-lease = {
4545- owner = "root";
4646- group = "root";
4747- source = pkgs.writeShellScript "add-dhcpd-lease" ''
4848- exec ${pkgs.iproute2}/bin/ip -6 route replace "$1" via "$2"
4949- '';
5050- capabilities = "cap_net_admin+ep";
5151- };
3939+ # into our routing table we must give dhcpd the required privs.
4040+ systemd.services.dhcpd6.serviceConfig.AmbientCapabilities =
4141+ [ "CAP_NET_ADMIN" ];
4242+5243 services = {
5344 # Configure the DHCPv6 server
5445 #
···8071 set Prefix = pick-first-value(binary-to-ascii(16, 16, ":", suffix(option dhcp6.ia-pd, 16)), "n/a");
8172 set PrefixLength = pick-first-value(binary-to-ascii(10, 8, ":", substring(suffix(option dhcp6.ia-pd, 17), 0, 1)), "n/a");
8273 log(concat(IP, " ", Prefix, " ", PrefixLength));
8383- execute("/run/wrappers/bin/add-dhcpd-lease", concat(Prefix,"/",PrefixLength), IP);
7474+ execute("${pkgs.iproute2}/bin/ip", "-6", "route", "replace", concat(Prefix,"/",PrefixLength), "via", IP);
8475 }
8576 '';
8677 };
+1-1
pkgs/applications/blockchains/erigon.nix
···1111 sha256 = "0l0w1badhvlh1rgqzvlmy5k7xhb1nf4f5dmhkl935a5ila08aak3";
1212 };
13131414- vendorSha256 = "sha256-kA7pOSP4wkzKuFmUqhZmjXJ0ao64cIgZMrQtQ0bQ++U=";
1414+ vendorSha256 = "sha256-i8BaT9C39tmHU3GGgd0hUB1PHXnoAdNYRIqZA1ggbjQ=";
1515 proxyVendor = true;
16161717 # Build errors in mdbx when format hardening is enabled:
+1-1
pkgs/applications/misc/expenses/default.nix
···1616 sha256 = "sha256-sqsogF2swMvYZL7Kj+ealrB1AAgIe7ZXXDLRdHL6Q+0=";
1717 };
18181919- vendorSha256 = "sha256-Ac3f17Ws3Ne8Zo0vT+qlaMm/rhak9ua2jh5jlT6jF2Y=";
1919+ vendorSha256 = "sha256-rIcwZUOi6bdfiWZEsRF4kl1reNPPQNuBPHDOo7RQgYo=";
20202121 # package does not contain any tests as of v0.2.3
2222 doCheck = false;
···827827 # this on, but tooling may disable this to insert the store paths more
828828 # efficiently via other means, such as bind mounting the host store.
829829 includeStorePaths ? true
830830+ , # Passthru arguments for the underlying derivation.
831831+ passthru ? {}
830832 ,
831833 }:
832834 assert
···987989 result = runCommand "stream-${baseName}"
988990 {
989991 inherit (conf) imageName;
990990- passthru = {
992992+ passthru = passthru // {
991993 inherit (conf) imageTag;
992994993995 # Distinguish tarballs and exes at the Nix level so functions that
···11+{ buildGoModule
22+, fetchFromGitHub
33+, lib
44+}:
55+66+buildGoModule rec {
77+ pname = "opentelemetry-collector-contrib";
88+ version = "0.43.0";
99+1010+ src = fetchFromGitHub {
1111+ owner = "open-telemetry";
1212+ repo = "opentelemetry-collector-contrib";
1313+ rev = "v${version}";
1414+ sha256 = "sha256-ktzP+ugG2sa0v8B1Zp47o8Bmpxv98zQyFyWf9QfQRoQ=";
1515+ };
1616+ # proxy vendor to avoid hash missmatches between linux and macOS
1717+ proxyVendor = true;
1818+ vendorSha256 = "sha256-0E52YSWlq1ebHA3kR9Qo/6ufug9R+z1cSD9AfbN/Mi0=";
1919+2020+ subPackages = [ "cmd/otelcontribcol" ];
2121+2222+ ldflags = [
2323+ "-s"
2424+ "-w"
2525+ "-X github.com/open-telemetry/opentelemetry-collector-contrib/internal/version.Version=v${version}"
2626+ ];
2727+2828+ meta = with lib; {
2929+ homepage = "https://github.com/open-telemetry/opentelemetry-collector-contrib";
3030+ changelog = "https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/v${version}/CHANGELOG.md";
3131+ description = "OpenTelemetry Collector superset with additional community collectors";
3232+ longDescription = ''
3333+ The OpenTelemetry Collector offers a vendor-agnostic implementation on how
3434+ to receive, process and export telemetry data. In addition, it removes the
3535+ need to run, operate and maintain multiple agents/collectors in order to
3636+ support open-source telemetry data formats (e.g. Jaeger, Prometheus, etc.)
3737+ sending to multiple open-source or commercial back-ends. The Contrib
3838+ edition provides aditional vendor specific receivers/exporters and/or
3939+ components that are only useful to a relatively small number of users and
4040+ is multiple times larger as a result.
4141+ '';
4242+ license = licenses.asl20;
4343+ maintainers = with maintainers; [ uri-canva jk ];
4444+ };
4545+}