+1
-1
nixos/modules/programs/mininet.nix
+1
-1
nixos/modules/programs/mininet.nix
+1
-1
nixos/modules/services/misc/mame.nix
+1
-1
nixos/modules/services/misc/mame.nix
+2
-2
nixos/modules/services/monitoring/datadog-agent.nix
+2
-2
nixos/modules/services/monitoring/datadog-agent.nix
······
+1
-1
nixos/modules/services/monitoring/scollector.nix
+1
-1
nixos/modules/services/monitoring/scollector.nix
+1
-1
nixos/modules/services/networking/consul.nix
+1
-1
nixos/modules/services/networking/consul.nix
+1
-1
nixos/modules/services/networking/ircd-hybrid/default.nix
+1
-1
nixos/modules/services/networking/ircd-hybrid/default.nix
···
+1
-1
nixos/modules/services/networking/libreswan.nix
+1
-1
nixos/modules/services/networking/libreswan.nix
+1
-1
nixos/modules/services/networking/networkmanager.nix
+1
-1
nixos/modules/services/networking/networkmanager.nix
···
+1
-1
nixos/modules/services/networking/openvpn.nix
+1
-1
nixos/modules/services/networking/openvpn.nix
···serviceConfig.ExecStart = "@${openvpn}/sbin/openvpn openvpn --suppress-timestamps --config ${configFile}";
+1
-1
nixos/modules/services/networking/sslh.nix
+1
-1
nixos/modules/services/networking/sslh.nix
···{ table = "mangle"; command = "OUTPUT ! -o lo -p tcp -m connmark --mark 0x02/0x0f -j CONNMARK --restore-mark --mask 0x0f"; }
+1
-1
nixos/modules/services/networking/strongswan-swanctl/module.nix
+1
-1
nixos/modules/services/networking/strongswan-swanctl/module.nix
···
+1
-1
nixos/modules/services/networking/strongswan.nix
+1
-1
nixos/modules/services/networking/strongswan.nix
···
+3
-3
nixos/modules/services/networking/wireguard.nix
+3
-3
nixos/modules/services/networking/wireguard.nix
·········
+1
-1
nixos/modules/services/security/fail2ban.nix
+1
-1
nixos/modules/services/security/fail2ban.nix
···
+2
-2
nixos/modules/services/security/sshguard.nix
+2
-2
nixos/modules/services/security/sshguard.nix
···
+9
-9
nixos/modules/tasks/network-interfaces-scripted.nix
+9
-9
nixos/modules/tasks/network-interfaces-scripted.nix
···························
+1
-1
nixos/modules/tasks/network-interfaces-systemd.nix
+1
-1
nixos/modules/tasks/network-interfaces-systemd.nix
···
+3
-3
nixos/modules/tasks/network-interfaces.nix
+3
-3
nixos/modules/tasks/network-interfaces.nix
······${optionalString (current.type == "mesh" && current.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${current.meshID}"}${optionalString (current.type == "monitor" && current.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${current.flags}"}${optionalString (current.type == "managed" && current.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if current.fourAddr then "on" else "off"}"}-${optionalString (current.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${current.mac}"}+${optionalString (current.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${current.mac}"}# Udev script to execute for a new WLAN interface. The script configures the new WLAN interface.···${optionalString (new.type == "mesh" && new.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${new.meshID}"}${optionalString (new.type == "monitor" && new.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${new.flags}"}${optionalString (new.type == "managed" && new.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if new.fourAddr then "on" else "off"}"}-${optionalString (new.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${new.mac}"}+${optionalString (new.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${new.mac}"}
+1
-1
nixos/modules/virtualisation/brightbox-image.nix
+1
-1
nixos/modules/virtualisation/brightbox-image.nix
+1
-1
nixos/modules/virtualisation/ec2-data.nix
+1
-1
nixos/modules/virtualisation/ec2-data.nix
+1
-1
nixos/modules/virtualisation/google-compute-config.nix
+1
-1
nixos/modules/virtualisation/google-compute-config.nix
···
+1
-1
nixos/modules/virtualisation/nixos-containers.nix
+1
-1
nixos/modules/virtualisation/nixos-containers.nix
+1
-1
nixos/modules/virtualisation/xe-guest-utilities.nix
+1
-1
nixos/modules/virtualisation/xe-guest-utilities.nix
···
+1
-1
nixos/modules/virtualisation/xen-dom0.nix
+1
-1
nixos/modules/virtualisation/xen-dom0.nix
···
+1
-1
nixos/tests/mysql/mariadb-galera-mariabackup.nix
+1
-1
nixos/tests/mysql/mariadb-galera-mariabackup.nix
···mysqlenv-common = pkgs.buildEnv { name = "mysql-path-env-common"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ bash gawk gnutar inetutils which ]; };-mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute netcat procps pv socat ]; };+mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute2 netcat procps pv socat ]; };
+3
-3
nixos/tests/wireguard/basic.nix
+3
-3
nixos/tests/wireguard/basic.nix
···
+2
-2
pkgs/applications/misc/bashSnippets/default.nix
+2
-2
pkgs/applications/misc/bashSnippets/default.nix
···
+2
-2
pkgs/applications/networking/appgate-sdp/default.nix
+2
-2
pkgs/applications/networking/appgate-sdp/default.nix
······patchelf --set-interpreter "$(cat $NIX_CC/nix-support/dynamic-linker)" --set-rpath "$ORIGIN:$out/opt/appgate/service/:$out/opt/appgate/:${rpath}" $binary-wrapProgram $out/opt/appgate/appgate-driver --prefix PATH : ${lib.makeBinPath [ iproute networkmanager dnsmasq ]}+wrapProgram $out/opt/appgate/appgate-driver --prefix PATH : ${lib.makeBinPath [ iproute2 networkmanager dnsmasq ]}
+2
-2
pkgs/applications/networking/cluster/k3s/default.nix
+2
-2
pkgs/applications/networking/cluster/k3s/default.nix
+2
-2
pkgs/applications/networking/firehol/default.nix
+2
-2
pkgs/applications/networking/firehol/default.nix
······
+2
-2
pkgs/applications/networking/ike/default.nix
+2
-2
pkgs/applications/networking/ike/default.nix
···# NOTE: use $out/etc/iked.conf as sample configuration and also set: dhcp_file "/etc/iked.dhcp";···
+2
-2
pkgs/applications/networking/remote/x2goserver/default.nix
+2
-2
pkgs/applications/networking/remote/x2goserver/default.nix
······
+2
-2
pkgs/applications/virtualization/docker/default.nix
+2
-2
pkgs/applications/virtualization/docker/default.nix
······-extraPath = optionals (stdenv.isLinux) (makeBinPath [ iproute iptables e2fsprogs xz xfsprogs procps util-linux git ]);+extraPath = optionals (stdenv.isLinux) (makeBinPath [ iproute2 iptables e2fsprogs xz xfsprogs procps util-linux git ]);
+2
-2
pkgs/applications/virtualization/gvisor/default.nix
+2
-2
pkgs/applications/virtualization/gvisor/default.nix
······
+2
-2
pkgs/applications/virtualization/open-vm-tools/default.nix
+2
-2
pkgs/applications/virtualization/open-vm-tools/default.nix
······
+2
-2
pkgs/applications/virtualization/x11docker/default.nix
+2
-2
pkgs/applications/virtualization/x11docker/default.nix
···-{ lib, stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg, getopt, gnugrep, gawk, ps, mount, iproute }:+{ lib, stdenv, fetchFromGitHub, makeWrapper, nx-libs, xorg, getopt, gnugrep, gawk, ps, mount, iproute2 }:···---prefix PATH : "${lib.makeBinPath [ getopt gnugrep gawk ps mount iproute nx-libs xorg.xdpyinfo xorg.xhost xorg.xinit ]}"+--prefix PATH : "${lib.makeBinPath [ getopt gnugrep gawk ps mount iproute2 nx-libs xorg.xdpyinfo xorg.xhost xorg.xinit ]}"
+2
-2
pkgs/applications/virtualization/xen/generic.nix
+2
-2
pkgs/applications/virtualization/xen/generic.nix
······
+2
-2
pkgs/applications/window-managers/dwm/dwm-status.nix
+2
-2
pkgs/applications/window-managers/dwm/dwm-status.nix
···{ lib, rustPlatform, fetchFromGitHub, dbus, gdk-pixbuf, libnotify, makeWrapper, pkg-config, xorg
+3
-3
pkgs/applications/window-managers/i3/blocks-gaps.nix
+3
-3
pkgs/applications/window-managers/i3/blocks-gaps.nix
······
+3
-3
pkgs/development/libraries/libvirt/5.9.0.nix
+3
-3
pkgs/development/libraries/libvirt/5.9.0.nix
······-PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute iptables ebtables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH+PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH···-binPath = [ iptables iproute pmutils numad numactl bridge-utils dmidecode dnsmasq ebtables ] ++ optionals enableIscsi [ openiscsi ];+binPath = [ iptables iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ebtables ] ++ optionals enableIscsi [ openiscsi ];
+3
-3
pkgs/development/libraries/libvirt/default.nix
+3
-3
pkgs/development/libraries/libvirt/default.nix
···, curl, libiconv, gmp, zfs, parted, bridge-utils, dmidecode, dbus, libtirpc, rpcsvc-proto, darwin···-PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH+PATH=${lib.makeBinPath ([ dnsmasq ] ++ optionals stdenv.isLinux [ iproute2 iptables ebtables-compat lvm2 systemd numad ] ++ optionals enableIscsi [ openiscsi ])}:$PATH···-binPath = [ iptables ebtables-compat iproute pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ];+binPath = [ iptables ebtables-compat iproute2 pmutils numad numactl bridge-utils dmidecode dnsmasq ] ++ optionals enableIscsi [ openiscsi ];
+2
-2
pkgs/development/libraries/tpm2-tss/default.nix
+2
-2
pkgs/development/libraries/tpm2-tss/default.nix
······
+2
-2
pkgs/os-specific/linux/gogoclient/default.nix
+2
-2
pkgs/os-specific/linux/gogoclient/default.nix
······
+2
-2
pkgs/os-specific/linux/hyperv-daemons/default.nix
+2
-2
pkgs/os-specific/linux/hyperv-daemons/default.nix
······
+2
-2
pkgs/os-specific/linux/iproute/mptcp.nix
+2
-2
pkgs/os-specific/linux/iproute/mptcp.nix
+1
-1
pkgs/os-specific/linux/openvswitch/lts.nix
+1
-1
pkgs/os-specific/linux/openvswitch/lts.nix
+2
-2
pkgs/os-specific/linux/pipework/default.nix
+2
-2
pkgs/os-specific/linux/pipework/default.nix
······
+2
-2
pkgs/os-specific/linux/rdma-core/default.nix
+2
-2
pkgs/os-specific/linux/rdma-core/default.nix
······
+3
-3
pkgs/servers/http/nix-binary-cache/default.nix
+3
-3
pkgs/servers/http/nix-binary-cache/default.nix
·········
+4
-4
pkgs/servers/monitoring/fusion-inventory/default.nix
+4
-4
pkgs/servers/monitoring/fusion-inventory/default.nix
·········-wrapProgram "$cur" --prefix PATH : ${lib.makeBinPath [nix dmidecode pciutils usbutils nettools iproute]}+wrapProgram "$cur" --prefix PATH : ${lib.makeBinPath [nix dmidecode pciutils usbutils nettools iproute2]}
+2
-2
pkgs/servers/monitoring/mackerel-agent/default.nix
+2
-2
pkgs/servers/monitoring/mackerel-agent/default.nix
······
+2
-2
pkgs/servers/tailscale/default.nix
+2
-2
pkgs/servers/tailscale/default.nix
······sed -i -e "s#/usr/sbin#$out/bin#" -e "/^EnvironmentFile/d" ./cmd/tailscaled/tailscaled.service
+2
-2
pkgs/tools/admin/acme.sh/default.nix
+2
-2
pkgs/tools/admin/acme.sh/default.nix
···-{ stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute, unixtools, dnsutils }:+{ stdenv, lib, fetchFromGitHub, makeWrapper, curl, openssl, socat, iproute2, unixtools, dnsutils }:···
+2
-2
pkgs/tools/admin/lxd/default.nix
+2
-2
pkgs/tools/admin/lxd/default.nix
······
+3
-3
pkgs/tools/bluetooth/blueman/default.nix
+3
-3
pkgs/tools/bluetooth/blueman/default.nix
···, networkmanager, withPulseAudio ? config.pulseaudio or stdenv.isLinux, libpulseaudio, fetchpatch }:···
+3
-3
pkgs/tools/networking/ddclient/default.nix
+3
-3
pkgs/tools/networking/ddclient/default.nix
······--replace '/usr/bin/perl' '${perl}/bin/perl' # Until we get the patchShebangs fixed (issue #55786) we need to patch this manually
+2
-2
pkgs/tools/networking/dhcp/default.nix
+2
-2
pkgs/tools/networking/dhcp/default.nix
······
+2
-2
pkgs/tools/networking/gvpe/default.nix
+2
-2
pkgs/tools/networking/gvpe/default.nix
······-sed -e 's@"/sbin/ifconfig.*"@"${iproute}/sbin/ip link set $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C+sed -e 's@"/sbin/ifconfig.*"@"${iproute2}/sbin/ip link set $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C
+3
-3
pkgs/tools/networking/libreswan/default.nix
+3
-3
pkgs/tools/networking/libreswan/default.nix
······
+2
-2
pkgs/tools/networking/miniupnpd/default.nix
+2
-2
pkgs/tools/networking/miniupnpd/default.nix
···
+2
-2
pkgs/tools/networking/miredo/default.nix
+2
-2
pkgs/tools/networking/miredo/default.nix
······
+4
-4
pkgs/tools/networking/openvpn/default.nix
+4
-4
pkgs/tools/networking/openvpn/default.nix
·········
+2
-2
pkgs/tools/networking/openvpn/update-systemd-resolved.nix
+2
-2
pkgs/tools/networking/openvpn/update-systemd-resolved.nix
······
+2
-2
pkgs/tools/networking/pptp/default.nix
+2
-2
pkgs/tools/networking/pptp/default.nix
······
+3
-3
pkgs/tools/networking/shorewall/default.nix
+3
-3
pkgs/tools/networking/shorewall/default.nix
·········
+2
-2
pkgs/tools/networking/wicd/default.nix
+2
-2
pkgs/tools/networking/wicd/default.nix
······substituteInPlace in/scripts=wicd.in --subst-var-by TEMPLATE-DEFAULT $out/share/other/dhclient.conf.template.default-sed -i "2iexport PATH=${lib.makeBinPath [ python wpa_supplicant dhcpcd dhcp wirelesstools nettools nettools iputils openresolv iproute ]}\$\{PATH:+:\}\$PATH" in/scripts=wicd.in+sed -i "2iexport PATH=${lib.makeBinPath [ python wpa_supplicant dhcpcd dhcp wirelesstools nettools nettools iputils openresolv iproute2 ]}\$\{PATH:+:\}\$PATH" in/scripts=wicd.insed -i "3iexport PYTHONPATH=$(toPythonPath $out):$(toPythonPath ${pygobject2}):$(toPythonPath ${dbus-python})\$\{PYTHONPATH:+:\}\$PYTHONPATH" in/scripts=wicd.in
+2
-2
pkgs/tools/networking/wireguard-tools/default.nix
+2
-2
pkgs/tools/networking/wireguard-tools/default.nix
······
+2
-2
pkgs/tools/networking/zerotierone/default.nix
+2
-2
pkgs/tools/networking/zerotierone/default.nix
······
+2
-2
pkgs/tools/system/inxi/default.nix
+2
-2
pkgs/tools/system/inxi/default.nix
······
+1
pkgs/top-level/aliases.nix
+1
pkgs/top-level/aliases.nix
···
-1
pkgs/top-level/all-packages.nix
-1
pkgs/top-level/all-packages.nix
···-iproute = iproute2; # Alias added 2020-11-15 (TODO: deprecate and move to pkgs/top-level/aliases.nix)