Skip to content

Commit

Permalink
Revert "Move TODO aliases to aliases.nix"
Browse files Browse the repository at this point in the history
  • Loading branch information
dotlambda committed Apr 5, 2021
1 parent 83c6322 commit f8a628b
Show file tree
Hide file tree
Showing 237 changed files with 515 additions and 1,074 deletions.
2 changes: 1 addition & 1 deletion nixos/modules/programs/mininet.nix
Expand Up @@ -8,7 +8,7 @@ let
cfg = config.programs.mininet;

generatedPath = with pkgs; makeSearchPath "bin" [
iperf ethtool iproute2 socat
iperf ethtool iproute socat
];

pyEnv = pkgs.python.withPackages(ps: [ ps.mininet-python ]);
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/mame.nix
Expand Up @@ -53,7 +53,7 @@ in
description = "MAME TUN/TAP Ethernet interface";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/monitoring/datadog-agent.nix
Expand Up @@ -225,7 +225,7 @@ in {
};
};
config = mkIf cfg.enable {
environment.systemPackages = [ datadogPkg pkgs.sysstat pkgs.procps pkgs.iproute2 ];
environment.systemPackages = [ datadogPkg pkgs.sysstat pkgs.procps pkgs.iproute ];

users.users.datadog = {
description = "Datadog Agent User";
Expand All @@ -239,7 +239,7 @@ in {

systemd.services = let
makeService = attrs: recursiveUpdate {
path = [ datadogPkg pkgs.python pkgs.sysstat pkgs.procps pkgs.iproute2 ];
path = [ datadogPkg pkgs.python pkgs.sysstat pkgs.procps pkgs.iproute ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
User = "datadog";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/scollector.nix
Expand Up @@ -113,7 +113,7 @@ in {
description = "scollector metrics collector (part of Bosun)";
wantedBy = [ "multi-user.target" ];

path = [ pkgs.coreutils pkgs.iproute2 ];
path = [ pkgs.coreutils pkgs.iproute ];

serviceConfig = {
User = cfg.user;
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/consul.nix
Expand Up @@ -191,7 +191,7 @@ in
ExecStop = "${cfg.package}/bin/consul leave";
});

path = with pkgs; [ iproute2 gnugrep gawk consul ];
path = with pkgs; [ iproute gnugrep gawk consul ];
preStart = ''
mkdir -m 0700 -p ${dataDir}
chown -R consul ${dataDir}
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/ircd-hybrid/default.nix
Expand Up @@ -10,7 +10,7 @@ let
name = "ircd-hybrid-service";
scripts = [ "=>/bin" ./control.in ];
substFiles = [ "=>/conf" ./ircd.conf ];
inherit (pkgs) ircdHybrid coreutils su iproute2 gnugrep procps;
inherit (pkgs) ircdHybrid coreutils su iproute gnugrep procps;

ipv6Enabled = boolToString config.networking.enableIPv6;

Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/libreswan.nix
Expand Up @@ -85,7 +85,7 @@ in

config = mkIf cfg.enable {

environment.systemPackages = [ pkgs.libreswan pkgs.iproute2 ];
environment.systemPackages = [ pkgs.libreswan pkgs.iproute ];

systemd.services.ipsec = {
description = "Internet Key Exchange (IKE) Protocol Daemon for IPsec";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/networkmanager.nix
Expand Up @@ -465,7 +465,7 @@ in {
restartTriggers = [ configFile overrideNameserversScript ];

# useful binaries for user-specified hooks
path = [ pkgs.iproute2 pkgs.util-linux pkgs.coreutils ];
path = [ pkgs.iproute pkgs.util-linux pkgs.coreutils ];
aliases = [ "dbus-org.freedesktop.nm-dispatcher.service" ];
};

Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/openvpn.nix
Expand Up @@ -63,7 +63,7 @@ let
wantedBy = optional cfg.autoStart "multi-user.target";
after = [ "network.target" ];

path = [ pkgs.iptables pkgs.iproute2 pkgs.nettools ];
path = [ pkgs.iptables pkgs.iproute pkgs.nettools ];

serviceConfig.ExecStart = "@${openvpn}/sbin/openvpn openvpn --suppress-timestamps --config ${configFile}";
serviceConfig.Restart = "always";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/sslh.nix
Expand Up @@ -132,7 +132,7 @@ in
{ table = "mangle"; command = "OUTPUT ! -o lo -p tcp -m connmark --mark 0x02/0x0f -j CONNMARK --restore-mark --mask 0x0f"; }
];
in {
path = [ pkgs.iptables pkgs.iproute2 pkgs.procps ];
path = [ pkgs.iptables pkgs.iproute pkgs.procps ];

preStart = ''
# Cleanup old iptables entries which might be still there
Expand Down
Expand Up @@ -63,7 +63,7 @@ in {
description = "strongSwan IPsec IKEv1/IKEv2 daemon using swanctl";
wantedBy = [ "multi-user.target" ];
after = [ "network-online.target" ];
path = with pkgs; [ kmod iproute2 iptables util-linux ];
path = with pkgs; [ kmod iproute iptables util-linux ];
environment = {
STRONGSWAN_CONF = pkgs.writeTextFile {
name = "strongswan.conf";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/strongswan.nix
Expand Up @@ -152,7 +152,7 @@ in
systemd.services.strongswan = {
description = "strongSwan IPSec Service";
wantedBy = [ "multi-user.target" ];
path = with pkgs; [ kmod iproute2 iptables util-linux ]; # XXX Linux
path = with pkgs; [ kmod iproute iptables util-linux ]; # XXX Linux
after = [ "network-online.target" ];
environment = {
STRONGSWAN_CONF = strongswanConf { inherit setup connections ca secretsFile managePlugins enabledPlugins; };
Expand Down
6 changes: 3 additions & 3 deletions nixos/modules/services/networking/wireguard.nix
Expand Up @@ -63,7 +63,7 @@ let

preSetup = mkOption {
example = literalExample ''
${pkgs.iproute2}/bin/ip netns add foo
${pkgs.iproute}/bin/ip netns add foo
'';
default = "";
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
Expand Down Expand Up @@ -278,7 +278,7 @@ let
wantedBy = [ "multi-user.target" "wireguard-${interfaceName}.service" ];
environment.DEVICE = interfaceName;
environment.WG_ENDPOINT_RESOLUTION_RETRIES = "infinity";
path = with pkgs; [ iproute2 wireguard-tools ];
path = with pkgs; [ iproute wireguard-tools ];

serviceConfig = {
Type = "oneshot";
Expand Down Expand Up @@ -333,7 +333,7 @@ let
after = [ "network.target" "network-online.target" ];
wantedBy = [ "multi-user.target" ];
environment.DEVICE = name;
path = with pkgs; [ kmod iproute2 wireguard-tools ];
path = with pkgs; [ kmod iproute wireguard-tools ];

serviceConfig = {
Type = "oneshot";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/security/fail2ban.nix
Expand Up @@ -243,7 +243,7 @@ in
restartTriggers = [ fail2banConf jailConf pathsConf ];
reloadIfChanged = true;

path = [ cfg.package cfg.packageFirewall pkgs.iproute2 ];
path = [ cfg.package cfg.packageFirewall pkgs.iproute ];

unitConfig.Documentation = "man:fail2ban(1)";

Expand Down
4 changes: 2 additions & 2 deletions nixos/modules/services/security/sshguard.nix
Expand Up @@ -108,8 +108,8 @@ in {
partOf = optional config.networking.firewall.enable "firewall.service";

path = with pkgs; if config.networking.nftables.enable
then [ nftables iproute2 systemd ]
else [ iptables ipset iproute2 systemd ];
then [ nftables iproute systemd ]
else [ iptables ipset iproute systemd ];

# The sshguard ipsets must exist before we invoke
# iptables. sshguard creates the ipsets after startup if
Expand Down
18 changes: 9 additions & 9 deletions nixos/modules/tasks/network-interfaces-scripted.nix
Expand Up @@ -101,7 +101,7 @@ let

unitConfig.ConditionCapability = "CAP_NET_ADMIN";

path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];

serviceConfig = {
Type = "oneshot";
Expand Down Expand Up @@ -185,7 +185,7 @@ let
# Restart rather than stop+start this unit to prevent the
# network from dying during switch-to-configuration.
stopIfChanged = false;
path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];
script =
''
state="/run/nixos/network/addresses/${i.name}"
Expand Down Expand Up @@ -258,7 +258,7 @@ let
wantedBy = [ "network-setup.service" (subsystemDevice i.name) ];
partOf = [ "network-setup.service" ];
before = [ "network-setup.service" ];
path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
Expand All @@ -284,7 +284,7 @@ let
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];
script = ''
# Remove Dead Interfaces
echo "Removing old bridge ${n}..."
Expand Down Expand Up @@ -372,7 +372,7 @@ let
wants = deps; # if one or more interface fails, the switch should continue to run
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
path = [ pkgs.iproute2 config.virtualisation.vswitch.package ];
path = [ pkgs.iproute config.virtualisation.vswitch.package ];
preStart = ''
echo "Resetting Open vSwitch ${n}..."
ovs-vsctl --if-exists del-br ${n} -- add-br ${n} \
Expand Down Expand Up @@ -413,7 +413,7 @@ let
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
path = [ pkgs.iproute2 pkgs.gawk ];
path = [ pkgs.iproute pkgs.gawk ];
script = ''
echo "Destroying old bond ${n}..."
${destroyBond n}
Expand Down Expand Up @@ -451,7 +451,7 @@ let
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];
script = ''
# Remove Dead Interfaces
ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}"
Expand All @@ -476,7 +476,7 @@ let
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];
script = ''
# Remove Dead Interfaces
ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}"
Expand Down Expand Up @@ -504,7 +504,7 @@ let
before = [ "network-setup.service" ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];
script = ''
# Remove Dead Interfaces
ip link show "${n}" >/dev/null 2>&1 && ip link delete "${n}"
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/tasks/network-interfaces-systemd.nix
Expand Up @@ -259,7 +259,7 @@ in
wants = deps; # if one or more interface fails, the switch should continue to run
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
path = [ pkgs.iproute2 config.virtualisation.vswitch.package ];
path = [ pkgs.iproute config.virtualisation.vswitch.package ];
preStart = ''
echo "Resetting Open vSwitch ${n}..."
ovs-vsctl --if-exists del-br ${n} -- add-br ${n} \
Expand Down
6 changes: 3 additions & 3 deletions nixos/modules/tasks/network-interfaces.nix
Expand Up @@ -1171,7 +1171,7 @@ in
wantedBy = [ "network.target" ];
after = [ "network-pre.target" ];
unitConfig.ConditionCapability = "CAP_NET_ADMIN";
path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];
serviceConfig.Type = "oneshot";
serviceConfig.RemainAfterExit = true;
script = ''
Expand Down Expand Up @@ -1249,7 +1249,7 @@ in
${optionalString (current.type == "mesh" && current.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${current.meshID}"}
${optionalString (current.type == "monitor" && current.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${current.flags}"}
${optionalString (current.type == "managed" && current.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if current.fourAddr then "on" else "off"}"}
${optionalString (current.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${current.mac}"}
${optionalString (current.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${current.mac}"}
'';

# Udev script to execute for a new WLAN interface. The script configures the new WLAN interface.
Expand All @@ -1260,7 +1260,7 @@ in
${optionalString (new.type == "mesh" && new.meshID!=null) "${pkgs.iw}/bin/iw dev ${device} set meshid ${new.meshID}"}
${optionalString (new.type == "monitor" && new.flags!=null) "${pkgs.iw}/bin/iw dev ${device} set monitor ${new.flags}"}
${optionalString (new.type == "managed" && new.fourAddr!=null) "${pkgs.iw}/bin/iw dev ${device} set 4addr ${if new.fourAddr then "on" else "off"}"}
${optionalString (new.mac != null) "${pkgs.iproute2}/bin/ip link set dev ${device} address ${new.mac}"}
${optionalString (new.mac != null) "${pkgs.iproute}/bin/ip link set dev ${device} address ${new.mac}"}
'';

# Udev attributes for systemd to name the device and to create a .device target.
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/virtualisation/brightbox-image.nix
Expand Up @@ -119,7 +119,7 @@ in
wants = [ "network-online.target" ];
after = [ "network-online.target" ];

path = [ pkgs.wget pkgs.iproute2 ];
path = [ pkgs.wget pkgs.iproute ];

script =
''
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/virtualisation/ec2-data.nix
Expand Up @@ -19,7 +19,7 @@ with lib;
wantedBy = [ "multi-user.target" "sshd.service" ];
before = [ "sshd.service" ];

path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];

script =
''
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/virtualisation/google-compute-config.nix
Expand Up @@ -110,7 +110,7 @@ in
systemd.services.google-network-daemon = {
description = "Google Compute Engine Network Daemon";
after = [ "network-online.target" "network.target" "google-instance-setup.service" ];
path = with pkgs; [ iproute2 ];
path = with pkgs; [ iproute ];
serviceConfig = {
ExecStart = "${gce}/bin/google_network_daemon";
StandardOutput="journal+console";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/virtualisation/nixos-containers.nix
Expand Up @@ -739,7 +739,7 @@ in

unitConfig.RequiresMountsFor = "/var/lib/containers/%i";

path = [ pkgs.iproute2 ];
path = [ pkgs.iproute ];

environment = {
root = "/var/lib/containers/%i";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/virtualisation/xe-guest-utilities.nix
Expand Up @@ -17,7 +17,7 @@ in {
wantedBy = [ "multi-user.target" ];
after = [ "xe-linux-distribution.service" ];
requires = [ "proc-xen.mount" ];
path = [ pkgs.coreutils pkgs.iproute2 ];
path = [ pkgs.coreutils pkgs.iproute ];
serviceConfig = {
PIDFile = "/run/xe-daemon.pid";
ExecStart = "${pkgs.xe-guest-utilities}/bin/xe-daemon -p /run/xe-daemon.pid";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/virtualisation/xen-dom0.nix
Expand Up @@ -248,7 +248,7 @@ in
# Xen provides udev rules.
services.udev.packages = [ cfg.package ];

services.udev.path = [ pkgs.bridge-utils pkgs.iproute2 ];
services.udev.path = [ pkgs.bridge-utils pkgs.iproute ];

systemd.services.xen-store = {
description = "Xen Store Daemon";
Expand Down
2 changes: 1 addition & 1 deletion nixos/tests/mysql/mariadb-galera-mariabackup.nix
Expand Up @@ -2,7 +2,7 @@ import ./../make-test-python.nix ({ pkgs, ...} :

let
mysqlenv-common = pkgs.buildEnv { name = "mysql-path-env-common"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ bash gawk gnutar inetutils which ]; };
mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute2 netcat procps pv socat ]; };
mysqlenv-mariabackup = pkgs.buildEnv { name = "mysql-path-env-mariabackup"; pathsToLink = [ "/bin" ]; paths = with pkgs; [ gzip iproute netcat procps pv socat ]; };

in {
name = "mariadb-galera-mariabackup";
Expand Down
6 changes: 3 additions & 3 deletions nixos/tests/wireguard/basic.nix
Expand Up @@ -52,9 +52,9 @@ import ../make-test-python.nix ({ pkgs, lib, ...} :
inherit (wg-snakeoil-keys.peer0) publicKey;
};

postSetup = let inherit (pkgs) iproute2; in ''
${iproute2}/bin/ip route replace 10.23.42.1/32 dev wg0
${iproute2}/bin/ip route replace fc00::1/128 dev wg0
postSetup = let inherit (pkgs) iproute; in ''
${iproute}/bin/ip route replace 10.23.42.1/32 dev wg0
${iproute}/bin/ip route replace fc00::1/128 dev wg0
'';
};
};
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/audio/aj-snapshot/default.nix
@@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, alsaLib, jack2, minixml, pkg-config }:
{ lib, stdenv, fetchurl, alsaLib, jack2Full, minixml, pkg-config }:

stdenv.mkDerivation rec {
name = packageName + "-" + version ;
Expand All @@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
doCheck = false;

nativeBuildInputs = [ pkg-config ];
buildInputs = [ alsaLib minixml jack2 ];
buildInputs = [ alsaLib minixml jack2Full ];

meta = with lib; {
description = "Tool for storing/restoring JACK and/or ALSA connections to/from cml files";
Expand Down
4 changes: 2 additions & 2 deletions pkgs/applications/audio/faust/faust2jack.nix
@@ -1,6 +1,6 @@
{ faust
, gtk2
, jack2
, jack2Full
, alsaLib
, opencv
, libsndfile
Expand All @@ -18,7 +18,7 @@ faust.wrapWithBuildEnv {

propagatedBuildInputs = [
gtk2
jack2
jack2Full
alsaLib
opencv
libsndfile
Expand Down

0 comments on commit f8a628b

Please sign in to comment.