iproute: deprecate alias

Changed files
+140 -140
nixos
pkgs
applications
misc
bashSnippets
networking
appgate-sdp
cluster
firehol
ike
remote
x2goserver
virtualization
docker
gvisor
open-vm-tools
x11docker
xen
window-managers
development
libraries
libvirt
tpm2-tss
os-specific
linux
gogoclient
hyperv-daemons
iproute
openvswitch
pipework
rdma-core
servers
http
nix-binary-cache
monitoring
fusion-inventory
mackerel-agent
tailscale
tools
admin
acme.sh
lxd
bluetooth
blueman
networking
ddclient
dhcp
gvpe
libreswan
miniupnpd
miredo
openvpn
pptp
shorewall
wicd
wireguard-tools
zerotierone
system
top-level
+1 -1
nixos/modules/programs/mininet.nix
···
cfg = config.programs.mininet;
generatedPath = with pkgs; makeSearchPath "bin" [
-
iperf ethtool iproute socat
+
iperf ethtool iproute2 socat
];
pyEnv = pkgs.python.withPackages(ps: [ ps.mininet-python ]);
+1 -1
nixos/modules/services/misc/mame.nix
···
description = "MAME TUN/TAP Ethernet interface";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
+2 -2
nixos/modules/services/monitoring/datadog-agent.nix
···
};
};
config = mkIf cfg.enable {
-
environment.systemPackages = [ datadogPkg pkgs.sysstat pkgs.procps pkgs.iproute ];
+
environment.systemPackages = [ datadogPkg pkgs.sysstat pkgs.procps pkgs.iproute2 ];
users.users.datadog = {
description = "Datadog Agent User";
···
systemd.services = let
makeService = attrs: recursiveUpdate {
-
path = [ datadogPkg pkgs.python pkgs.sysstat pkgs.procps pkgs.iproute ];
+
path = [ datadogPkg pkgs.python pkgs.sysstat pkgs.procps pkgs.iproute2 ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
User = "datadog";
+1 -1
nixos/modules/services/monitoring/scollector.nix
···
description = "scollector metrics collector (part of Bosun)";
wantedBy = [ "multi-user.target" ];
-
path = [ pkgs.coreutils pkgs.iproute ];
+
path = [ pkgs.coreutils pkgs.iproute2 ];
serviceConfig = {
User = cfg.user;
+1 -1
nixos/modules/services/networking/consul.nix
···
ExecStop = "${cfg.package}/bin/consul leave";
});
-
path = with pkgs; [ iproute gnugrep gawk consul ];
+
path = with pkgs; [ iproute2 gnugrep gawk consul ];
preStart = ''
mkdir -m 0700 -p ${dataDir}
chown -R consul ${dataDir}
+1 -1
nixos/modules/services/networking/ircd-hybrid/default.nix
···
name = "ircd-hybrid-service";
scripts = [ "=>/bin" ./control.in ];
substFiles = [ "=>/conf" ./ircd.conf ];
-
inherit (pkgs) ircdHybrid coreutils su iproute gnugrep procps;
+
inherit (pkgs) ircdHybrid coreutils su iproute2 gnugrep procps;
ipv6Enabled = boolToString config.networking.enableIPv6;
+1 -1
nixos/modules/services/networking/libreswan.nix
···
config = mkIf cfg.enable {
-
environment.systemPackages = [ pkgs.libreswan pkgs.iproute ];
+
environment.systemPackages = [ pkgs.libreswan pkgs.iproute2 ];
systemd.services.ipsec = {
description = "Internet Key Exchange (IKE) Protocol Daemon for IPsec";
+1 -1
nixos/modules/services/networking/networkmanager.nix
···
restartTriggers = [ configFile overrideNameserversScript ];
# useful binaries for user-specified hooks
-
path = [ pkgs.iproute pkgs.util-linux pkgs.coreutils ];
+
path = [ pkgs.iproute2 pkgs.util-linux pkgs.coreutils ];
aliases = [ "dbus-org.freedesktop.nm-dispatcher.service" ];
};
+1 -1
nixos/modules/services/networking/openvpn.nix
···
wantedBy = optional cfg.autoStart "multi-user.target";
after = [ "network.target" ];
-
path = [ pkgs.iptables pkgs.iproute pkgs.nettools ];
+
path = [ pkgs.iptables pkgs.iproute2 pkgs.nettools ];
serviceConfig.ExecStart = "@${openvpn}/sbin/openvpn openvpn --suppress-timestamps --config ${configFile}";
serviceConfig.Restart = "always";
+1 -1
nixos/modules/services/networking/sslh.nix
···
{ table = "mangle"; command = "OUTPUT ! -o lo -p tcp -m connmark --mark 0x02/0x0f -j CONNMARK --restore-mark --mask 0x0f"; }
];
in {
-
path = [ pkgs.iptables pkgs.iproute pkgs.procps ];
+
path = [ pkgs.iptables pkgs.iproute2 pkgs.procps ];
preStart = ''
# Cleanup old iptables entries which might be still there
+1 -1
nixos/modules/services/networking/strongswan-swanctl/module.nix
···
description = "strongSwan IPsec IKEv1/IKEv2 daemon using swanctl";
wantedBy = [ "multi-user.target" ];
after = [ "network-online.target" ];
-
path = with pkgs; [ kmod iproute iptables util-linux ];
+
path = with pkgs; [ kmod iproute2 iptables util-linux ];
environment = {
STRONGSWAN_CONF = pkgs.writeTextFile {
name = "strongswan.conf";
+1 -1
nixos/modules/services/networking/strongswan.nix
···
systemd.services.strongswan = {
description = "strongSwan IPSec Service";
wantedBy = [ "multi-user.target" ];
-
path = with pkgs; [ kmod iproute iptables util-linux ]; # XXX Linux
+
path = with pkgs; [ kmod iproute2 iptables util-linux ]; # XXX Linux
after = [ "network-online.target" ];
environment = {
STRONGSWAN_CONF = strongswanConf { inherit setup connections ca secretsFile managePlugins enabledPlugins; };
+3 -3
nixos/modules/services/networking/wireguard.nix
···
preSetup = mkOption {
example = literalExample ''
-
${pkgs.iproute}/bin/ip netns add foo
+
${pkgs.iproute2}/bin/ip netns add foo
'';
default = "";
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
···
wantedBy = [ "multi-user.target" "wireguard-${interfaceName}.service" ];
environment.DEVICE = interfaceName;
environment.WG_ENDPOINT_RESOLUTION_RETRIES = "infinity";
-
path = with pkgs; [ iproute wireguard-tools ];
+
path = with pkgs; [ iproute2 wireguard-tools ];
serviceConfig = {
Type = "oneshot";
···
after = [ "network.target" "network-online.target" ];
wantedBy = [ "multi-user.target" ];
environment.DEVICE = name;
-
path = with pkgs; [ kmod iproute wireguard-tools ];
+
path = with pkgs; [ kmod iproute2 wireguard-tools ];
serviceConfig = {
Type = "oneshot";
+1 -1
nixos/modules/services/security/fail2ban.nix
···
restartTriggers = [ fail2banConf jailConf pathsConf ];
reloadIfChanged = true;
-
path = [ cfg.package cfg.packageFirewall pkgs.iproute ];
+
path = [ cfg.package cfg.packageFirewall pkgs.iproute2 ];
unitConfig.Documentation = "man:fail2ban(1)";
+2 -2
nixos/modules/services/security/sshguard.nix
···
partOf = optional config.networking.firewall.enable "firewall.service";
path = with pkgs; if config.networking.nftables.enable
-
then [ nftables iproute systemd ]
-
else [ iptables ipset iproute systemd ];
+
then [ nftables iproute2 systemd ]
+
else [ iptables ipset iproute2 systemd ];
# The sshguard ipsets must exist before we invoke
# iptables. sshguard creates the ipsets after startup if
+9 -9
nixos/modules/tasks/network-interfaces-scripted.nix
···
unitConfig.ConditionCapability = "CAP_NET_ADMIN";
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
serviceConfig = {
Type = "oneshot";
···
# Restart rather than stop+start this unit to prevent the
# network from dying during switch-to-configuration.
stopIfChanged = false;
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
script =
''
state="/run/nixos/network/addresses/${i.name}"
···
wantedBy = [ "network-setup.service" (subsystemDevice i.name) ];
partOf = [ "network-setup.service" ];
before = [ "network-setup.service" ];
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
···
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
script = ''
# Remove Dead Interfaces
echo "Removing old bridge ${n}..."
···
wants = deps; # if one or more interface fails, the switch should continue to run
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
-
path = [ pkgs.iproute config.virtualisation.vswitch.package ];
+
path = [ pkgs.iproute2 config.virtualisation.vswitch.package ];
preStart = ''
echo "Resetting Open vSwitch ${n}..."
ovs-vsctl --if-exists del-br ${n} -- add-br ${n} \
···
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
-
path = [ pkgs.iproute pkgs.gawk ];
+
path = [ pkgs.iproute2 pkgs.gawk ];
script = ''
echo "Destroying old bond ${n}..."
${destroyBond n}
···
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
script = ''
# Remove Dead Interfaces
ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}"
···
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
script = ''
# Remove Dead Interfaces
ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}"
···
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
script = ''
# Remove Dead Interfaces
ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}"
+1 -1
nixos/modules/tasks/network-interfaces-systemd.nix
···
wants = deps; # if one or more interface fails, the switch should continue to run
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
-
path = [ pkgs.iproute config.virtualisation.vswitch.package ];
+
path = [ pkgs.iproute2 config.virtualisation.vswitch.package ];
preStart = ''
echo "Resetting Open vSwitch ${n}..."
ovs-vsctl --if-exists del-br ${n} -- add-br ${n} \
+3 -3
nixos/modules/tasks/network-interfaces.nix
···
wantedBy = [ "network.target" ];
after = [ "network-pre.target" ];
unitConfig.ConditionCapability = "CAP_NET_ADMIN";
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
script = ''
···
${optionalString (current.type == "mesh" && current.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${current.meshID}"}
${optionalString (current.type == "monitor" && current.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${current.flags}"}
${optionalString (current.type == "managed" && current.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if current.fourAddr then "on" else "off"}"}
-
${optionalString (current.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${current.mac}"}
+
${optionalString (current.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${current.mac}"}
'';
# Udev script to execute for a new WLAN interface. The script configures the new WLAN interface.
···
${optionalString (new.type == "mesh" && new.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${new.meshID}"}
${optionalString (new.type == "monitor" && new.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${new.flags}"}
${optionalString (new.type == "managed" && new.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if new.fourAddr then "on" else "off"}"}
-
${optionalString (new.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${new.mac}"}
+
${optionalString (new.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${new.mac}"}
'';
# Udev attributes for systemd to name the device and to create a .device target.
+1 -1
nixos/modules/virtualisation/brightbox-image.nix
···
wants = [ "network-online.target" ];
after = [ "network-online.target" ];
-
path = [ pkgs.wget pkgs.iproute ];
+
path = [ pkgs.wget pkgs.iproute2 ];
script =
''
+1 -1
nixos/modules/virtualisation/ec2-data.nix
···
wantedBy = [ "multi-user.target" "sshd.service" ];
before = [ "sshd.service" ];
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
script =
''
+1 -1
nixos/modules/virtualisation/google-compute-config.nix
···
systemd.services.google-network-daemon = {
description = "Google Compute Engine Network Daemon";
after = [ "network-online.target" "network.target" "google-instance-setup.service" ];
-
path = with pkgs; [ iproute ];
+
path = with pkgs; [ iproute2 ];
serviceConfig = {
ExecStart = "${gce}/bin/google_network_daemon";
StandardOutput="journal+console";
+1 -1
nixos/modules/virtualisation/nixos-containers.nix
···
unitConfig.RequiresMountsFor = "/var/lib/containers/%i";
-
path = [ pkgs.iproute ];
+
path = [ pkgs.iproute2 ];
environment = {
root = "/var/lib/containers/%i";
+1 -1
nixos/modules/virtualisation/xe-guest-utilities.nix
···
wantedBy = [ "multi-user.target" ];
after = [ "xe-linux-distribution.service" ];
requires = [ "proc-xen.mount" ];
-
path = [ pkgs.coreutils pkgs.iproute ];
+
path = [ pkgs.coreutils pkgs.iproute2 ];
serviceConfig = {
PIDFile = "/run/xe-daemon.pid";
ExecStart = "${pkgs.xe-guest-utilities}/bin/xe-daemon -p /run/xe-daemon.pid";
+1 -1
nixos/modules/virtualisation/xen-dom0.nix
···
# Xen provides udev rules.
services.udev.packages = [ cfg.package ];
-
services.udev.path = [ pkgs.bridge-utils pkgs.iproute ];
+
services.udev.path = [ pkgs.bridge-utils pkgs.iproute2 ];
systemd.services.xen-store = {
description = "Xen Store Daemon";
+1 -1
nixos/tests/mysql/mariadb-galera-mariabackup.nix
···
let
mysqlenv-common = pkgs.buildEnv { name = "mysql-path-env-common"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ bash gawk gnutar inetutils which ]; };
-
mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute netcat procps pv socat ]; };
+
mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute2 netcat procps pv socat ]; };
in {
name = "mariadb-galera-mariabackup";
+3 -3
nixos/tests/wireguard/basic.nix
···
inherit (wg-snakeoil-keys.peer0) publicKey;
};
-
postSetup = let inherit (pkgs) iproute; in ''
-
${iproute}/bin/ip route replace 10.23.42.1/32 dev wg0
-
${iproute}/bin/ip route replace fc00::1/128 dev wg0
+
postSetup = let inherit (pkgs) iproute2; in ''
+
${iproute2}/bin/ip route replace 10.23.42.1/32 dev wg0
+
${iproute2}/bin/ip route replace fc00::1/128 dev wg0
'';
};
};
+2 -2
pkgs/applications/misc/bashSnippets/default.nix
···
{ stdenv, lib, fetchFromGitHub, makeWrapper
-
, curl, python3, bind, iproute, bc, gitMinimal }:
+
, curl, python3, bind, iproute2, bc, gitMinimal }:
let
version = "1.23.0";
deps = lib.makeBinPath [
curl
python3
bind.dnsutils
-
iproute
+
iproute2
bc
gitMinimal
];
+2 -2
pkgs/applications/networking/appgate-sdp/default.nix
···
, glib
, gtk3
, icu
-
, iproute
+
, iproute2
, krb5
, lib
, mesa
···
patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" --set-rpath "$ORIGIN:$out/opt/appgate/service/:$out/opt/appgate/:${rpath}" $binary
done
-
wrapProgram $out/opt/appgate/appgate-driver --prefix PATH : ${lib.makeBinPath [ iproute networkmanager dnsmasq ]}
+
wrapProgram $out/opt/appgate/appgate-driver --prefix PATH : ${lib.makeBinPath [ iproute2 networkmanager dnsmasq ]}
wrapProgram $out/opt/appgate/linux/set_dns --set PYTHONPATH $PYTHONPATH
'';
meta = with lib; {
+2 -2
pkgs/applications/networking/cluster/k3s/default.nix
···
, makeWrapper
, socat
, iptables
-
, iproute
+
, iproute2
, bridge-utils
, conntrack-tools
, buildGoPackage
···
kmod
socat
iptables
-
iproute
+
iproute2
bridge-utils
ethtool
util-linux
+2 -2
pkgs/applications/networking/firehol/default.nix
···
{ stdenv, lib, fetchFromGitHub, pkgs
-
, autoconf, automake, curl, iprange, iproute, ipset, iptables, iputils
+
, autoconf, automake, curl, iprange, iproute2, ipset, iptables, iputils
, kmod, nettools, procps, tcpdump, traceroute, util-linux, whois
# If true, just install FireQOS without FireHOL
···
nativeBuildInputs = [ autoconf automake ];
buildInputs = [
-
curl iprange iproute ipset iptables iputils kmod
+
curl iprange iproute2 ipset iptables iputils kmod
nettools procps tcpdump traceroute util-linux whois
];
+2 -2
pkgs/applications/networking/ike/default.nix
···
{ lib, stdenv, fetchurl, fetchpatch, cmake, openssl, libedit, flex, bison, qt4, makeWrapper
-
, gcc, nettools, iproute, linuxHeaders }:
+
, gcc, nettools, iproute2, linuxHeaders }:
# NOTE: use $out/etc/iked.conf as sample configuration and also set: dhcp_file "/etc/iked.dhcp";
# launch with "iked -f /etc/iked.conf"
···
];
nativeBuildInputs = [ cmake flex bison makeWrapper ];
-
buildInputs = [ openssl libedit qt4 nettools iproute ];
+
buildInputs = [ openssl libedit qt4 nettools iproute2 ];
postPatch = ''
# fix build with bison3
+2 -2
pkgs/applications/networking/remote/x2goserver/default.nix
···
{ stdenv, lib, fetchurl, perlPackages, makeWrapper, perl, which, nx-libs
, util-linux, coreutils, glibc, gawk, gnused, gnugrep, findutils, xorg
-
, nettools, iproute, bc, procps, psmisc, lsof, pwgen, openssh, sshfs, bash
+
, nettools, iproute2, bc, procps, psmisc, lsof, pwgen, openssh, sshfs, bash
}:
let
···
binaryDeps = [
perlEnv which nx-libs util-linux coreutils glibc.bin gawk gnused gnugrep
-
findutils nettools iproute bc procps psmisc lsof pwgen openssh sshfs
+
findutils nettools iproute2 bc procps psmisc lsof pwgen openssh sshfs
xorg.xauth xorg.xinit xorg.xrandr xorg.xmodmap xorg.xwininfo xorg.fontutil
xorg.xkbcomp xorg.setxkbmap
];
+2 -2
pkgs/applications/virtualization/docker/default.nix
···
, stdenv, fetchFromGitHub, fetchpatch, buildGoPackage
, makeWrapper, installShellFiles, pkg-config
, go-md2man, go, containerd, runc, docker-proxy, tini, libtool
-
, sqlite, iproute, lvm2, systemd, docker-buildx
+
, sqlite, iproute2, lvm2, systemd, docker-buildx
, btrfs-progs, iptables, e2fsprogs, xz, util-linux, xfsprogs, git
, procps, libseccomp
, nixosTests
···
nativeBuildInputs = [ makeWrapper pkg-config go-md2man go libtool installShellFiles ];
buildInputs = [ sqlite lvm2 btrfs-progs systemd libseccomp ];
-
extraPath = optionals (stdenv.isLinux) (makeBinPath [ iproute iptables e2fsprogs xz xfsprogs procps util-linux git ]);
+
extraPath = optionals (stdenv.isLinux) (makeBinPath [ iproute2 iptables e2fsprogs xz xfsprogs procps util-linux git ]);
buildPhase = ''
export GOCACHE="$TMPDIR/go-cache"
+2 -2
pkgs/applications/virtualization/gvisor/default.nix
···
, git
, glibcLocales
, go
-
, iproute
+
, iproute2
, iptables
, makeWrapper
, procps
···
# Needed for the 'runsc do' subcomand
wrapProgram $out/bin/runsc \
-
--prefix PATH : ${lib.makeBinPath [ iproute iptables procps ]}
+
--prefix PATH : ${lib.makeBinPath [ iproute2 iptables procps ]}
'';
};
+2 -2
pkgs/applications/virtualization/open-vm-tools/default.nix
···
{ stdenv, lib, fetchFromGitHub, makeWrapper, autoreconfHook,
fuse, libmspack, openssl, pam, xercesc, icu, libdnet, procps, libtirpc, rpcsvc-proto,
libX11, libXext, libXinerama, libXi, libXrender, libXrandr, libXtst,
-
pkg-config, glib, gdk-pixbuf-xlib, gtk3, gtkmm3, iproute, dbus, systemd, which,
+
pkg-config, glib, gdk-pixbuf-xlib, gtk3, gtkmm3, iproute2, dbus, systemd, which,
withX ? true }:
stdenv.mkDerivation rec {
···
postInstall = ''
wrapProgram "$out/etc/vmware-tools/scripts/vmware/network" \
-
--prefix PATH ':' "${lib.makeBinPath [ iproute dbus systemd which ]}"
+
--prefix PATH ':' "${lib.makeBinPath [ iproute2 dbus systemd which ]}"
'';
meta = with lib; {
+2 -2
pkgs/applications/virtualization/x11docker/default.nix
···
-
{ lib, stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg, getopt, gnugrep, gawk, ps, mount, iproute }:
+
{ lib, stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg, getopt, gnugrep, gawk, ps, mount, iproute2 }:
stdenv.mkDerivation rec {
pname = "x11docker";
version = "6.6.2";
···
installPhase = ''
install -D x11docker "$out/bin/x11docker";
wrapProgram "$out/bin/x11docker" \
-
--prefix PATH : "${lib.makeBinPath [ getopt gnugrep gawk ps mount iproute nx-libs xorg.xdpyinfo xorg.xhost xorg.xinit ]}"
+
--prefix PATH : "${lib.makeBinPath [ getopt gnugrep gawk ps mount iproute2 nx-libs xorg.xdpyinfo xorg.xhost xorg.xinit ]}"
'';
meta = {
+2 -2
pkgs/applications/virtualization/xen/generic.nix
···
# Scripts
, coreutils, gawk, gnused, gnugrep, diffutils, multipath-tools
-
, iproute, inetutils, iptables, bridge-utils, openvswitch, nbd, drbd
+
, iproute2, inetutils, iptables, bridge-utils, openvswitch, nbd, drbd
, lvm2, util-linux, procps, systemd
# Documentation
···
scriptEnvPath = concatMapStringsSep ":" (x: "${x}/bin") [
which perl
coreutils gawk gnused gnugrep diffutils util-linux multipath-tools
-
iproute inetutils iptables bridge-utils openvswitch nbd drbd
+
iproute2 inetutils iptables bridge-utils openvswitch nbd drbd
];
withXenfiles = f: concatStringsSep "\n" (mapAttrsToList f config.xenfiles);
+2 -2
pkgs/applications/window-managers/dwm/dwm-status.nix
···
{ lib, rustPlatform, fetchFromGitHub, dbus, gdk-pixbuf, libnotify, makeWrapper, pkg-config, xorg
, enableAlsaUtils ? true, alsaUtils, coreutils
-
, enableNetwork ? true, dnsutils, iproute, wirelesstools }:
+
, enableNetwork ? true, dnsutils, iproute2, wirelesstools }:
let
bins = lib.optionals enableAlsaUtils [ alsaUtils coreutils ]
-
++ lib.optionals enableNetwork [ dnsutils iproute wirelesstools ];
+
++ lib.optionals enableNetwork [ dnsutils iproute2 wirelesstools ];
in
rustPlatform.buildRustPackage rec {
+3 -3
pkgs/applications/window-managers/i3/blocks-gaps.nix
···
{ fetchFromGitHub, lib, stdenv, perl, makeWrapper
-
, iproute, acpi, sysstat, alsaUtils
+
, iproute2, acpi, sysstat, alsaUtils
, scripts ? [ "bandwidth" "battery" "cpu_usage" "disk" "iface"
"load_average" "memory" "volume" "wifi" ]
}:
···
postFixup = ''
wrapProgram $out/libexec/i3blocks/bandwidth \
-
--prefix PATH : ${makeBinPath (optional (elem "bandwidth" scripts) iproute)}
+
--prefix PATH : ${makeBinPath (optional (elem "bandwidth" scripts) iproute2)}
wrapProgram $out/libexec/i3blocks/battery \
--prefix PATH : ${makeBinPath (optional (elem "battery" scripts) acpi)}
wrapProgram $out/libexec/i3blocks/cpu_usage \
--prefix PATH : ${makeBinPath (optional (elem "cpu_usage" scripts) sysstat)}
wrapProgram $out/libexec/i3blocks/iface \
-
--prefix PATH : ${makeBinPath (optional (elem "iface" scripts) iproute)}
+
--prefix PATH : ${makeBinPath (optional (elem "iface" scripts) iproute2)}
wrapProgram $out/libexec/i3blocks/volume \
--prefix PATH : ${makeBinPath (optional (elem "volume" scripts) alsaUtils)}
'';
+3 -3
pkgs/development/libraries/libvirt/5.9.0.nix
···
{ lib, stdenv, fetchurl, fetchgit
, pkg-config, makeWrapper, libtool, autoconf, automake, fetchpatch
, coreutils, libxml2, gnutls, perl, python2, attr
-
, iproute, iptables, readline, lvm2, util-linux, systemd, libpciaccess, gettext
+
, iproute2, iptables, readline, lvm2, util-linux, systemd, libpciaccess, gettext
, libtasn1, ebtables, libgcrypt, yajl, pmutils, libcap_ng, libapparmor
, dnsmasq, libnl, libpcap, libxslt, xhtml1, numad, numactl, perlPackages
, curl, libiconv, gmp, zfs, parted, bridge-utils, dmidecode, glib, rpcsvc-proto, libtirpc
···
preConfigure = ''
${ optionalString (!buildFromTarball) "./bootstrap --no-git --gnulib-srcdir=$(pwd)/.gnulib" }
-
PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute iptables ebtables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH
+
PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH
# the path to qemu-kvm will be stored in VM's .xml and .save files
# do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations
substituteInPlace src/lxc/lxc_conf.c \
···
postInstall = let
-
binPath = [ iptables iproute pmutils numad numactl bridge-utils dmidecode dnsmasq ebtables ] ++ optionals enableIscsi [ openiscsi ];
+
binPath = [ iptables iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ebtables ] ++ optionals enableIscsi [ openiscsi ];
in ''
substituteInPlace $out/libexec/libvirt-guests.sh \
--replace 'ON_BOOT=start' 'ON_BOOT=''${ON_BOOT:-start}' \
+3 -3
pkgs/development/libraries/libvirt/default.nix
···
{ lib, stdenv, fetchurl, fetchgit
, makeWrapper, autoreconfHook, fetchpatch
, coreutils, libxml2, gnutls, perl, python3, attr, glib, docutils
-
, iproute, readline, lvm2, util-linux, systemd, libpciaccess, gettext
+
, iproute2, readline, lvm2, util-linux, systemd, libpciaccess, gettext
, libtasn1, iptables, ebtables, libgcrypt, yajl, pmutils, libcap_ng, libapparmor
, dnsmasq, libnl, libpcap, libxslt, xhtml1, numad, numactl, perlPackages
, curl, libiconv, gmp, zfs, parted, bridge-utils, dmidecode, dbus, libtirpc, rpcsvc-proto, darwin
···
sed -i meson.build -e "s|conf.set_quoted('${var}',.*|conf.set_quoted('${var}','${value}')|"
'';
in ''
-
PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH
+
PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH
# the path to qemu-kvm will be stored in VM's .xml and .save files
# do not use "''${qemu_kvm}/bin/qemu-kvm" to avoid bound VMs to particular qemu derivations
substituteInPlace src/lxc/lxc_conf.c \
···
postInstall = let
# Keep the legacy iptables binary for now for backwards compatibility (comment on #109332)
-
binPath = [ iptables ebtables-compat iproute pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ];
+
binPath = [ iptables ebtables-compat iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ];
in ''
substituteInPlace $out/libexec/libvirt-guests.sh \
--replace 'ON_BOOT="start"' 'ON_BOOT=''${ON_BOOT:-start}' \
+2 -2
pkgs/development/libraries/tpm2-tss/default.nix
···
{ stdenv, lib, fetchFromGitHub
, autoreconfHook, autoconf-archive, pkg-config, doxygen, perl
, openssl, json_c, curl, libgcrypt
-
, cmocka, uthash, ibm-sw-tpm2, iproute, procps, which
+
, cmocka, uthash, ibm-sw-tpm2, iproute2, procps, which
}:
stdenv.mkDerivation rec {
···
];
buildInputs = [ openssl json_c curl libgcrypt ];
checkInputs = [
-
cmocka uthash ibm-sw-tpm2 iproute procps which
+
cmocka uthash ibm-sw-tpm2 iproute2 procps which
];
preAutoreconf = "./bootstrap";
+2 -2
pkgs/os-specific/linux/gogoclient/default.nix
···
-
{lib, stdenv, fetchurl, openssl, nettools, iproute, sysctl}:
+
{lib, stdenv, fetchurl, openssl, nettools, iproute2, sysctl}:
let baseName = "gogoclient";
version = "1.2";
···
substituteInPlace "$out/template/linux.sh" \
--replace "/sbin/ifconfig" "${nettools}/bin/ifconfig" \
--replace "/sbin/route" "${nettools}/bin/route" \
-
--replace "/sbin/ip" "${iproute}/sbin/ip" \
+
--replace "/sbin/ip" "${iproute2}/sbin/ip" \
--replace "/sbin/sysctl" "${sysctl}/bin/sysctl"
sed -i -e 's/^.*Exec \$route -A.*$/& metric 128/' $out/template/linux.sh
'';
+2 -2
pkgs/os-specific/linux/hyperv-daemons/default.nix
···
{ stdenv, lib, python, kernel, makeWrapper, writeText
-
, gawk, iproute }:
+
, gawk, iproute2 }:
let
libexec = "libexec/hypervkvpd";
···
postFixup = ''
wrapProgram $out/bin/hv_kvp_daemon \
-
--prefix PATH : $out/bin:${lib.makeBinPath [ gawk iproute ]}
+
--prefix PATH : $out/bin:${lib.makeBinPath [ gawk iproute2 ]}
'';
};
+2 -2
pkgs/os-specific/linux/iproute/mptcp.nix
···
-
{ lib, iproute, fetchFromGitHub }:
+
{ lib, iproute2, fetchFromGitHub }:
-
iproute.overrideAttrs (oa: rec {
+
iproute2.overrideAttrs (oa: rec {
pname = "iproute_mptcp";
version = "0.95";
+1 -1
pkgs/os-specific/linux/openvswitch/lts.nix
···
{ lib, stdenv, fetchurl, makeWrapper, pkg-config, util-linux, which
-
, procps, libcap_ng, openssl, python2, iproute , perl
+
, procps, libcap_ng, openssl, python2, perl
, automake, autoconf, libtool, kernel ? null }:
with lib;
+2 -2
pkgs/os-specific/linux/pipework/default.nix
···
{ stdenv, lib, fetchFromGitHub, makeWrapper
-
, bridge-utils, iproute, lxc, openvswitch, docker, busybox, dhcpcd, dhcp
+
, bridge-utils, iproute2, lxc, openvswitch, docker, busybox, dhcpcd, dhcp
}:
stdenv.mkDerivation {
···
installPhase = ''
install -D pipework $out/bin/pipework
wrapProgram $out/bin/pipework --prefix PATH : \
-
${lib.makeBinPath [ bridge-utils iproute lxc openvswitch docker busybox dhcpcd dhcp ]};
+
${lib.makeBinPath [ bridge-utils iproute2 lxc openvswitch docker busybox dhcpcd dhcp ]};
'';
meta = with lib; {
description = "Software-Defined Networking tools for LXC";
+2 -2
pkgs/os-specific/linux/rdma-core/default.nix
···
{ lib, stdenv, fetchFromGitHub, cmake, pkg-config, docutils
-
, pandoc, ethtool, iproute, libnl, udev, python3, perl
+
, pandoc, ethtool, iproute2, libnl, udev, python3, perl
, makeWrapper
} :
···
};
nativeBuildInputs = [ cmake pkg-config pandoc docutils makeWrapper ];
-
buildInputs = [ libnl ethtool iproute udev python3 perl ];
+
buildInputs = [ libnl ethtool iproute2 udev python3 perl ];
cmakeFlags = [
"-DCMAKE_INSTALL_RUNDIR=/run"
+3 -3
pkgs/servers/http/nix-binary-cache/default.nix
···
{lib, stdenv
, coreutils, findutils, nix, xz, bzip2, gnused, gnugrep, openssl
-
, lighttpd, iproute }:
+
, lighttpd, iproute2 }:
stdenv.mkDerivation rec {
version = "2014-06-29-1";
pname = "nix-binary-cache";
···
--replace @gnugrep@ "${gnugrep}/bin" \
--replace @openssl@ "${openssl.bin}/bin" \
--replace @lighttpd@ "${lighttpd}/sbin" \
-
--replace @iproute@ "${iproute}/sbin" \
+
--replace @iproute@ "${iproute2}/sbin" \
--replace "xXxXx" "xXxXx"
chmod a+x "$out/bin/nix-binary-cache.cgi"
···
--replace @gnugrep@ "${gnugrep}/bin" \
--replace @openssl@ "${openssl.bin}/bin" \
--replace @lighttpd@ "${lighttpd}/sbin" \
-
--replace @iproute@ "${iproute}/sbin" \
+
--replace @iproute@ "${iproute2}/sbin" \
--replace "xXxXx" "xXxXx"
chmod a+x "$out/bin/nix-binary-cache-start"
+4 -4
pkgs/servers/monitoring/fusion-inventory/default.nix
···
-
{ lib, perlPackages, nix, dmidecode, pciutils, usbutils, iproute, nettools
+
{ lib, perlPackages, nix, dmidecode, pciutils, usbutils, iproute2, nettools
, fetchFromGitHub, makeWrapper
}:
···
patchShebangs bin
substituteInPlace "lib/FusionInventory/Agent/Tools/Linux.pm" \
-
--replace /sbin/ip ${iproute}/sbin/ip
+
--replace /sbin/ip ${iproute2}/sbin/ip
substituteInPlace "lib/FusionInventory/Agent/Task/Inventory/Linux/Networks.pm" \
-
--replace /sbin/ip ${iproute}/sbin/ip
+
--replace /sbin/ip ${iproute2}/sbin/ip
'';
buildTools = [];
···
for cur in $out/bin/*; do
if [ -x "$cur" ]; then
sed -e "s|./lib|$out/lib|" -i "$cur"
-
wrapProgram "$cur" --prefix PATH : ${lib.makeBinPath [nix dmidecode pciutils usbutils nettools iproute]}
+
wrapProgram "$cur" --prefix PATH : ${lib.makeBinPath [nix dmidecode pciutils usbutils nettools iproute2]}
fi
done
'';
+2 -2
pkgs/servers/monitoring/mackerel-agent/default.nix
···
-
{ stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, iproute, nettools }:
+
{ stdenv, lib, buildGoModule, fetchFromGitHub, makeWrapper, iproute2, nettools }:
buildGoModule rec {
pname = "mackerel-agent";
···
nativeBuildInputs = [ makeWrapper ];
checkInputs = lib.optionals (!stdenv.isDarwin) [ nettools ];
-
buildInputs = lib.optionals (!stdenv.isDarwin) [ iproute ];
+
buildInputs = lib.optionals (!stdenv.isDarwin) [ iproute2 ];
vendorSha256 = "sha256-yomxALecP+PycelOmwrteK/LoW7wsst7os+jcbF46Bs=";
+2 -2
pkgs/servers/tailscale/default.nix
···
-
{ lib, buildGoModule, fetchFromGitHub, makeWrapper, iptables, iproute }:
+
{ lib, buildGoModule, fetchFromGitHub, makeWrapper, iptables, iproute2 }:
buildGoModule rec {
pname = "tailscale";
···
postInstall = ''
wrapProgram $out/bin/tailscaled --prefix PATH : ${
-
lib.makeBinPath [ iproute iptables ]
+
lib.makeBinPath [ iproute2 iptables ]
}
sed -i -e "s#/usr/sbin#$out/bin#" -e "/^EnvironmentFile/d" ./cmd/tailscaled/tailscaled.service
install -D -m0444 -t $out/lib/systemd/system ./cmd/tailscaled/tailscaled.service
+2 -2
pkgs/tools/admin/acme.sh/default.nix
···
-
{ stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute, unixtools, dnsutils }:
+
{ stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute2, unixtools, dnsutils }:
stdenv.mkDerivation rec {
pname = "acme.sh";
version = "2.8.8";
···
openssl
curl
dnsutils
-
(if stdenv.isLinux then iproute else unixtools.netstat)
+
(if stdenv.isLinux then iproute2 else unixtools.netstat)
]
}"
'';
+2 -2
pkgs/tools/admin/lxd/default.nix
···
{ lib, hwdata, pkg-config, lxc, buildGoPackage, fetchurl
, makeWrapper, acl, rsync, gnutar, xz, btrfs-progs, gzip, dnsmasq
-
, squashfsTools, iproute, iptables, ebtables, iptables-nftables-compat, libcap
+
, squashfsTools, iproute2, iptables, ebtables, iptables-nftables-compat, libcap
, libco-canonical, dqlite, raft-canonical, sqlite-replication, udev
, writeShellScriptBin, apparmor-profiles, apparmor-parser
, criu
···
wrapProgram $out/bin/lxd --prefix PATH : ${lib.makeBinPath (
networkPkgs
-
++ [ acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute bash criu ]
+
++ [ acl rsync gnutar xz btrfs-progs gzip dnsmasq squashfsTools iproute2 bash criu ]
++ [ (writeShellScriptBin "apparmor_parser" ''
exec '${apparmor-parser}/bin/apparmor_parser' -I '${apparmor-profiles}/etc/apparmor.d' "$@"
'') ]
+3 -3
pkgs/tools/bluetooth/blueman/default.nix
···
{ config, stdenv, lib, fetchurl, intltool, pkg-config, python3Packages, bluez, gtk3
-
, obex_data_server, xdg-utils, dnsmasq, dhcp, libappindicator, iproute
+
, obex_data_server, xdg-utils, dnsmasq, dhcp, libappindicator, iproute2
, gnome3, librsvg, wrapGAppsHook, gobject-introspection, autoreconfHook
, networkmanager, withPulseAudio ? config.pulseaudio or stdenv.isLinux, libpulseaudio, fetchpatch }:
let
pythonPackages = python3Packages;
-
binPath = lib.makeBinPath [ xdg-utils dnsmasq dhcp iproute ];
+
binPath = lib.makeBinPath [ xdg-utils dnsmasq dhcp iproute2 ];
in stdenv.mkDerivation rec {
pname = "blueman";
···
];
buildInputs = [ bluez gtk3 pythonPackages.python librsvg
-
gnome3.adwaita-icon-theme iproute libappindicator networkmanager ]
+
gnome3.adwaita-icon-theme iproute2 libappindicator networkmanager ]
++ pythonPath
++ lib.optional withPulseAudio libpulseaudio;
+3 -3
pkgs/tools/networking/ddclient/default.nix
···
-
{ lib, fetchurl, perlPackages, iproute, perl }:
+
{ lib, fetchurl, perlPackages, iproute2, perl }:
perlPackages.buildPerlPackage rec {
pname = "ddclient";
···
touch Makefile.PL
substituteInPlace ddclient \
--replace 'in the output of ifconfig' 'in the output of ip addr show' \
-
--replace 'ifconfig -a' '${iproute}/sbin/ip addr show' \
-
--replace 'ifconfig $arg' '${iproute}/sbin/ip addr show $arg' \
+
--replace 'ifconfig -a' '${iproute2}/sbin/ip addr show' \
+
--replace 'ifconfig $arg' '${iproute2}/sbin/ip addr show $arg' \
--replace '/usr/bin/perl' '${perl}/bin/perl' # Until we get the patchShebangs fixed (issue #55786) we need to patch this manually
'';
+2 -2
pkgs/tools/networking/dhcp/default.nix
···
-
{ stdenv, fetchurl, perl, file, nettools, iputils, iproute, makeWrapper
+
{ stdenv, fetchurl, perl, file, nettools, iputils, iproute2, makeWrapper
, coreutils, gnused, openldap ? null
, buildPackages, lib
}:
···
cp client/scripts/linux $out/sbin/dhclient-script
substituteInPlace $out/sbin/dhclient-script \
-
--replace /sbin/ip ${iproute}/sbin/ip
+
--replace /sbin/ip ${iproute2}/sbin/ip
wrapProgram "$out/sbin/dhclient-script" --prefix PATH : \
"${nettools}/bin:${nettools}/sbin:${iputils}/bin:${coreutils}/bin:${gnused}/bin"
'';
+2 -2
pkgs/tools/networking/gvpe/default.nix
···
-
{ lib, stdenv, fetchurl, openssl, gmp, zlib, iproute, nettools }:
+
{ lib, stdenv, fetchurl, openssl, gmp, zlib, iproute2, nettools }:
stdenv.mkDerivation rec {
pname = "gvpe";
···
];
preBuild = ''
-
sed -e 's@"/sbin/ifconfig.*"@"${iproute}/sbin/ip link set $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C
+
sed -e 's@"/sbin/ifconfig.*"@"${iproute2}/sbin/ip link set $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C
sed -e 's@/sbin/ifconfig@${nettools}/sbin/ifconfig@g' -i src/device-*.C
'';
+3 -3
pkgs/tools/networking/libreswan/default.nix
···
{ lib, stdenv, fetchurl, makeWrapper,
pkg-config, systemd, gmp, unbound, bison, flex, pam, libevent, libcap_ng, curl, nspr,
-
bash, iproute, iptables, procps, coreutils, gnused, gawk, nss, which, python3,
+
bash, iproute2, iptables, procps, coreutils, gnused, gawk, nss, which, python3,
docs ? false, xmlto, libselinux, ldns
}:
let
binPath = lib.makeBinPath [
-
bash iproute iptables procps coreutils gnused gawk nss.tools which python3
+
bash iproute2 iptables procps coreutils gnused gawk nss.tools which python3
];
in
···
pkg-config
];
-
buildInputs = [ bash iproute iptables systemd coreutils gnused gawk gmp unbound pam libevent
+
buildInputs = [ bash iproute2 iptables systemd coreutils gnused gawk gmp unbound pam libevent
libcap_ng curl nspr nss python3 ldns ]
++ lib.optional docs xmlto
++ lib.optional stdenv.isLinux libselinux;
+2 -2
pkgs/tools/networking/miniupnpd/default.nix
···
{ stdenv, lib, fetchurl, iptables, libuuid, pkg-config
-
, which, iproute, gnused, coreutils, gawk, makeWrapper
+
, which, iproute2, gnused, coreutils, gawk, makeWrapper
}:
let
-
scriptBinEnv = lib.makeBinPath [ which iproute iptables gnused coreutils gawk ];
+
scriptBinEnv = lib.makeBinPath [ which iproute2 iptables gnused coreutils gawk ];
in
stdenv.mkDerivation rec {
name = "miniupnpd-2.1.20190502";
+2 -2
pkgs/tools/networking/miredo/default.nix
···
-
{ lib, stdenv, fetchurl, nettools, iproute, judy }:
+
{ lib, stdenv, fetchurl, nettools, iproute2, judy }:
stdenv.mkDerivation rec {
version = "1.2.6";
···
substituteInPlace misc/client-hook.bsd \
--replace '/sbin/route' '${nettools}/bin/route' \
--replace '/sbin/ifconfig' '${nettools}/bin/ifconfig'
-
substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute}/bin/ip'
+
substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute2}/bin/ip'
'';
configureFlags = [ "--with-Judy" ];
+4 -4
pkgs/tools/networking/openvpn/default.nix
···
, pkg-config
, makeWrapper
, runtimeShell
-
, iproute
+
, iproute2
, lzo
, openssl
, pam
···
buildInputs = [ lzo openssl ]
++ optional stdenv.isLinux pam
-
++ optional withIpRoute iproute
+
++ optional withIpRoute iproute2
++ optional useSystemd systemd
++ optional pkcs11Support pkcs11helper;
configureFlags = optionals withIpRoute [
"--enable-iproute2"
-
"IPROUTE=${iproute}/sbin/ip"
+
"IPROUTE=${iproute2}/sbin/ip"
]
++ optional useSystemd "--enable-systemd"
++ optional pkcs11Support "--enable-pkcs11"
···
'' + optionalString useSystemd ''
install -Dm555 ${update-resolved} $out/libexec/update-systemd-resolved
wrapProgram $out/libexec/update-systemd-resolved \
-
--prefix PATH : ${makeBinPath [ runtimeShell iproute systemd util-linux ]}
+
--prefix PATH : ${makeBinPath [ runtimeShell iproute2 systemd util-linux ]}
'';
enableParallelBuilding = true;
+2 -2
pkgs/tools/networking/openvpn/update-systemd-resolved.nix
···
{ lib, stdenv, fetchFromGitHub
, makeWrapper
-
, iproute, systemd, coreutils, util-linux }:
+
, iproute2, systemd, coreutils, util-linux }:
stdenv.mkDerivation rec {
pname = "update-systemd-resolved";
···
installPhase = ''
wrapProgram $out/libexec/openvpn/update-systemd-resolved \
-
--prefix PATH : ${lib.makeBinPath [ iproute systemd coreutils util-linux ]}
+
--prefix PATH : ${lib.makeBinPath [ iproute2 systemd coreutils util-linux ]}
'';
meta = with lib; {
+2 -2
pkgs/tools/networking/pptp/default.nix
···
-
{ lib, stdenv, fetchurl, perl, ppp, iproute }:
+
{ lib, stdenv, fetchurl, perl, ppp, iproute2 }:
stdenv.mkDerivation rec {
pname = "pptp";
···
'';
preConfigure = ''
-
makeFlagsArray=( IP=${iproute}/bin/ip PPPD=${ppp}/sbin/pppd \
+
makeFlagsArray=( IP=${iproute2}/bin/ip PPPD=${ppp}/sbin/pppd \
BINDIR=$out/sbin MANDIR=$out/share/man/man8 \
PPPDIR=$out/etc/ppp )
'';
+3 -3
pkgs/tools/networking/shorewall/default.nix
···
, fetchurl
, gnugrep
, gnused
-
, iproute
+
, iproute2
, ipset
, iptables
, perl
···
let
PATH = lib.concatStringsSep ":"
[ "${coreutils}/bin"
-
"${iproute}/bin"
+
"${iproute2}/bin"
"${iptables}/bin"
"${ipset}/bin"
"${ebtables}/bin"
···
buildInputs = [
coreutils
-
iproute
+
iproute2
ipset
iptables
ebtables
+2 -2
pkgs/tools/networking/wicd/default.nix
···
{ lib, stdenv, fetchurl, python2Packages
, wpa_supplicant, dhcp, dhcpcd, wirelesstools
-
, nettools, openresolv, iproute, iputils }:
+
, nettools, openresolv, iproute2, iputils }:
let
inherit (python2Packages) python pygobject2 dbus-python pyGtkGlade pycairo;
···
substituteInPlace in/scripts=wicd.in --subst-var-by TEMPLATE-DEFAULT $out/share/other/dhclient.conf.template.default
-
sed -i "2iexport PATH=${lib.makeBinPath [ python wpa_supplicant dhcpcd dhcp wirelesstools nettools nettools iputils openresolv iproute ]}\$\{PATH:+:\}\$PATH" in/scripts=wicd.in
+
sed -i "2iexport PATH=${lib.makeBinPath [ python wpa_supplicant dhcpcd dhcp wirelesstools nettools nettools iputils openresolv iproute2 ]}\$\{PATH:+:\}\$PATH" in/scripts=wicd.in
sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pygobject2}):$(toPythonPath ${dbus-python})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd.in
sed -i "2iexport PATH=${python}/bin\$\{PATH:+:\}\$PATH" in/scripts=wicd-client.in
sed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pyGtkGlade})/gtk-2.0:$(toPythonPath ${pygobject2}):$(toPythonPath ${pygobject2})/gtk-2.0:$(toPythonPath ${pycairo}):$(toPythonPath ${dbus-python})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd-client.in
+2 -2
pkgs/tools/networking/wireguard-tools/default.nix
···
, fetchzip
, nixosTests
, iptables
-
, iproute
+
, iproute2
, makeWrapper
, openresolv
, procps
···
--replace /usr/bin $out/bin
'' + lib.optionalString stdenv.isLinux ''
for f in $out/bin/*; do
-
wrapProgram $f --prefix PATH : ${lib.makeBinPath [ procps iproute iptables openresolv ]}
+
wrapProgram $f --prefix PATH : ${lib.makeBinPath [ procps iproute2 iptables openresolv ]}
done
'' + lib.optionalString stdenv.isDarwin ''
for f in $out/bin/*; do
+2 -2
pkgs/tools/networking/zerotierone/default.nix
···
-
{ lib, stdenv, buildPackages, fetchFromGitHub, openssl, lzo, zlib, iproute, ronn }:
+
{ lib, stdenv, buildPackages, fetchFromGitHub, openssl, lzo, zlib, iproute2, ronn }:
stdenv.mkDerivation rec {
pname = "zerotierone";
···
nativeBuildInputs = [ ronn ];
-
buildInputs = [ openssl lzo zlib iproute ];
+
buildInputs = [ openssl lzo zlib iproute2 ];
enableParallelBuilding = true;
+2 -2
pkgs/tools/system/inxi/default.nix
···
, ps, dnsutils # dig is recommended for multiple categories
, withRecommends ? false # Install (almost) all recommended tools (see --recommends)
, withRecommendedSystemPrograms ? withRecommends, util-linuxMinimal, dmidecode
-
, file, hddtemp, iproute, ipmitool, usbutils, kmod, lm_sensors, smartmontools
+
, file, hddtemp, iproute2, ipmitool, usbutils, kmod, lm_sensors, smartmontools
, binutils, tree, upower, pciutils
, withRecommendedDisplayInformationPrograms ? withRecommends, glxinfo, xorg
}:
···
prefixPath = programs:
"--prefix PATH ':' '${lib.makeBinPath programs}'";
recommendedSystemPrograms = lib.optionals withRecommendedSystemPrograms [
-
util-linuxMinimal dmidecode file hddtemp iproute ipmitool usbutils kmod
+
util-linuxMinimal dmidecode file hddtemp iproute2 ipmitool usbutils kmod
lm_sensors smartmontools binutils tree upower pciutils
];
recommendedDisplayInformationPrograms = lib.optionals
+1
pkgs/top-level/aliases.nix
···
infiniband-diags = rdma-core; # added 2019-08-09
inotifyTools = inotify-tools;
inter-ui = inter; # added 2021-03-27
+
iproute = iproute2; # moved from top-level 2021-03-14
i-score = throw "i-score has been removed: abandoned upstream."; # added 2020-11-21
jack2Full = jack2; # moved from top-level 2021-03-14
jamomacore = throw "jamomacore has been removed: abandoned upstream."; # added 2020-11-21
-1
pkgs/top-level/all-packages.nix
···
iotop = callPackage ../os-specific/linux/iotop { };
iproute2 = callPackage ../os-specific/linux/iproute { };
-
iproute = iproute2; # Alias added 2020-11-15 (TODO: deprecate and move to pkgs/top-level/aliases.nix)
iproute_mptcp = callPackage ../os-specific/linux/iproute/mptcp.nix { };