···17 <itemizedlist>
18 <listitem>
19 <para>
00000020 PHP now defaults to PHP 8.0, updated from 7.4.
21 </para>
22 </listitem>
···364 that before NixOS 21.11, specifying either setuid or setgid
365 but not owner/group resulted in wrappers owned by
366 nobody/nogroup, which is unsafe.
00000000367 </para>
368 </listitem>
369 <listitem>
···17 <itemizedlist>
18 <listitem>
19 <para>
20+ <literal>iptables</literal> now uses
21+ <literal>nf_tables</literal> backend.
22+ </para>
23+ </listitem>
24+ <listitem>
25+ <para>
26 PHP now defaults to PHP 8.0, updated from 7.4.
27 </para>
28 </listitem>
···370 that before NixOS 21.11, specifying either setuid or setgid
371 but not owner/group resulted in wrappers owned by
372 nobody/nogroup, which is unsafe.
373+ </para>
374+ </listitem>
375+ <listitem>
376+ <para>
377+ Since <literal>iptables</literal> now uses
378+ <literal>nf_tables</literal> backend and
379+ <literal>ipset</literal> doesn’t support it, some applications
380+ (ferm, shorewall, firehol) may have limited functionality.
381 </para>
382 </listitem>
383 <listitem>
+4
nixos/doc/manual/release-notes/rl-2111.section.md
···67## Highlights {#sec-release-21.11-highlights}
8009- PHP now defaults to PHP 8.0, updated from 7.4.
1011- kOps now defaults to 1.21.1, which uses containerd as the default runtime.
···111112- The `security.wrappers` option now requires to always specify an owner, group and whether the setuid/setgid bit should be set.
113 This is motivated by the fact that before NixOS 21.11, specifying either setuid or setgid but not owner/group resulted in wrappers owned by nobody/nogroup, which is unsafe.
00114115- The `paperless` module and package have been removed. All users should migrate to the
116 successor `paperless-ng` instead. The Paperless project [has been
···67## Highlights {#sec-release-21.11-highlights}
89+- `iptables` now uses `nf_tables` backend.
10+11- PHP now defaults to PHP 8.0, updated from 7.4.
1213- kOps now defaults to 1.21.1, which uses containerd as the default runtime.
···113114- The `security.wrappers` option now requires to always specify an owner, group and whether the setuid/setgid bit should be set.
115 This is motivated by the fact that before NixOS 21.11, specifying either setuid or setgid but not owner/group resulted in wrappers owned by nobody/nogroup, which is unsafe.
116+117+- Since `iptables` now uses `nf_tables` backend and `ipset` doesn't support it, some applications (ferm, shorewall, firehol) may have limited functionality.
118119- The `paperless` module and package have been removed. All users should migrate to the
120 successor `paperless-ng` instead. The Paperless project [has been
···22, gettext
23, libtasn1
24, iptables
25-, ebtables
26, libgcrypt
27, yajl
28, pmutils
···68# if you update, also bump <nixpkgs/pkgs/development/python-modules/libvirt/default.nix> and SysVirt in <nixpkgs/pkgs/top-level/perl-packages.nix>
69let
70 buildFromTarball = stdenv.isDarwin;
71- # libvirt hardcodes the binary name 'ebtables', but in nixpkgs the ebtables
72- # binary we want to use is named 'ebtables-legacy'.
73- # Create a derivation to alias the binary name so that libvirt can find the right one, and use that below.
74- ebtables-compat = stdenv.mkDerivation {
75- pname = "ebtables-compat";
76- version = ebtables.version;
77- src = null;
78- buildInputs = [ ebtables ];
79- buildCommand = ''
80- mkdir -p $out/bin
81- ln -sf ${ebtables}/bin/ebtables-legacy $out/bin/ebtables
82- '';
83- };
84in
85stdenv.mkDerivation rec {
86 pname = "libvirt";
···178 '';
179 in
180 ''
181- PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH
182 # the path to qemu-kvm will be stored in VM's .xml and .save files
183 # do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations
184 substituteInPlace src/lxc/lxc_conf.c \
···226227 postInstall =
228 let
229- # Keep the legacy iptables binary for now for backwards compatibility (comment on #109332)
230- binPath = [ iptables ebtables-compat iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ];
231 in
232 ''
233 substituteInPlace $out/libexec/libvirt-guests.sh \
···22, gettext
23, libtasn1
24, iptables
025, libgcrypt
26, yajl
27, pmutils
···67# if you update, also bump <nixpkgs/pkgs/development/python-modules/libvirt/default.nix> and SysVirt in <nixpkgs/pkgs/top-level/perl-packages.nix>
68let
69 buildFromTarball = stdenv.isDarwin;
000000000000070in
71stdenv.mkDerivation rec {
72 pname = "libvirt";
···164 '';
165 in
166 ''
167+ PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH
168 # the path to qemu-kvm will be stored in VM's .xml and .save files
169 # do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations
170 substituteInPlace src/lxc/lxc_conf.c \
···212213 postInstall =
214 let
215+ binPath = [ iptables iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ];
0216 in
217 ''
218 substituteInPlace $out/libexec/libvirt-guests.sh \