treewide: fix eval without aliases after 9378fdf87e0626e8c63a90a378c38444ff54808b
This commit is contained in:
parent
5db7e33f1d
commit
c6d4dae35d
@ -266,7 +266,7 @@ in
|
|||||||
gitMinimal
|
gitMinimal
|
||||||
openssh
|
openssh
|
||||||
util-linux
|
util-linux
|
||||||
iproute
|
iproute2
|
||||||
ethtool
|
ethtool
|
||||||
thin-provisioning-tools
|
thin-provisioning-tools
|
||||||
iptables
|
iptables
|
||||||
|
@ -27,7 +27,7 @@ let
|
|||||||
text = ''
|
text = ''
|
||||||
#! /bin/sh
|
#! /bin/sh
|
||||||
|
|
||||||
export PATH=$PATH:${pkgs.iproute}/sbin
|
export PATH=$PATH:${pkgs.iproute2}/sbin
|
||||||
|
|
||||||
ip link set $IFNAME up
|
ip link set $IFNAME up
|
||||||
ip address add ${cfg.ipAddress} dev $IFNAME
|
ip address add ${cfg.ipAddress} dev $IFNAME
|
||||||
|
@ -91,7 +91,7 @@ in
|
|||||||
description = "Internet Key Exchange (IKE) Protocol Daemon for IPsec";
|
description = "Internet Key Exchange (IKE) Protocol Daemon for IPsec";
|
||||||
path = [
|
path = [
|
||||||
"${pkgs.libreswan}"
|
"${pkgs.libreswan}"
|
||||||
"${pkgs.iproute}"
|
"${pkgs.iproute2}"
|
||||||
"${pkgs.procps}"
|
"${pkgs.procps}"
|
||||||
"${pkgs.nssTools}"
|
"${pkgs.nssTools}"
|
||||||
"${pkgs.iptables}"
|
"${pkgs.iptables}"
|
||||||
@ -115,8 +115,8 @@ in
|
|||||||
ExecStart = "${libexec}/pluto --config ${configFile} --nofork \$PLUTO_OPTIONS";
|
ExecStart = "${libexec}/pluto --config ${configFile} --nofork \$PLUTO_OPTIONS";
|
||||||
ExecStop = "${libexec}/whack --shutdown";
|
ExecStop = "${libexec}/whack --shutdown";
|
||||||
ExecStopPost = [
|
ExecStopPost = [
|
||||||
"${pkgs.iproute}/bin/ip xfrm policy flush"
|
"${pkgs.iproute2}/bin/ip xfrm policy flush"
|
||||||
"${pkgs.iproute}/bin/ip xfrm state flush"
|
"${pkgs.iproute2}/bin/ip xfrm state flush"
|
||||||
"${ipsec} --stopnflog"
|
"${ipsec} --stopnflog"
|
||||||
];
|
];
|
||||||
ExecReload = "${libexec}/whack --listen";
|
ExecReload = "${libexec}/whack --listen";
|
||||||
|
@ -28,7 +28,7 @@ with lib;
|
|||||||
"systemd-resolved.service"
|
"systemd-resolved.service"
|
||||||
];
|
];
|
||||||
path = [
|
path = [
|
||||||
pkgs.iproute
|
pkgs.iproute2
|
||||||
# Needed for ping
|
# Needed for ping
|
||||||
"/run/wrappers"
|
"/run/wrappers"
|
||||||
];
|
];
|
||||||
|
@ -119,7 +119,7 @@ in
|
|||||||
path = cfg.extraPackages ++ (with pkgs; [
|
path = cfg.extraPackages ++ (with pkgs; [
|
||||||
# Client mode requires at least the following:
|
# Client mode requires at least the following:
|
||||||
coreutils
|
coreutils
|
||||||
iproute
|
iproute2
|
||||||
iptables
|
iptables
|
||||||
]);
|
]);
|
||||||
|
|
||||||
|
@ -164,7 +164,7 @@ in
|
|||||||
preStart = ''
|
preStart = ''
|
||||||
install -m 0755 -o quagga -g quagga -d /run/quagga
|
install -m 0755 -o quagga -g quagga -d /run/quagga
|
||||||
|
|
||||||
${pkgs.iproute}/bin/ip route flush proto zebra
|
${pkgs.iproute2}/bin/ip route flush proto zebra
|
||||||
'';
|
'';
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
|
@ -39,11 +39,11 @@ in {
|
|||||||
Type = "oneshot";
|
Type = "oneshot";
|
||||||
RemainAfterExit = true;
|
RemainAfterExit = true;
|
||||||
ExecStart = map ( x:
|
ExecStart = map ( x:
|
||||||
"${pkgs.iproute}/bin/rdma link add rxe_${x} type rxe netdev ${x}"
|
"${pkgs.iproute2}/bin/rdma link add rxe_${x} type rxe netdev ${x}"
|
||||||
) cfg.interfaces;
|
) cfg.interfaces;
|
||||||
|
|
||||||
ExecStop = map ( x:
|
ExecStop = map ( x:
|
||||||
"${pkgs.iproute}/bin/rdma link delete rxe_${x}"
|
"${pkgs.iproute2}/bin/rdma link delete rxe_${x}"
|
||||||
) cfg.interfaces;
|
) cfg.interfaces;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -57,7 +57,7 @@ let
|
|||||||
|
|
||||||
preUp = mkOption {
|
preUp = mkOption {
|
||||||
example = literalExample ''
|
example = literalExample ''
|
||||||
${pkgs.iproute}/bin/ip netns add foo
|
${pkgs.iproute2}/bin/ip netns add foo
|
||||||
'';
|
'';
|
||||||
default = "";
|
default = "";
|
||||||
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
|
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
|
||||||
@ -68,7 +68,7 @@ let
|
|||||||
|
|
||||||
preDown = mkOption {
|
preDown = mkOption {
|
||||||
example = literalExample ''
|
example = literalExample ''
|
||||||
${pkgs.iproute}/bin/ip netns del foo
|
${pkgs.iproute2}/bin/ip netns del foo
|
||||||
'';
|
'';
|
||||||
default = "";
|
default = "";
|
||||||
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
|
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
|
||||||
@ -79,7 +79,7 @@ let
|
|||||||
|
|
||||||
postUp = mkOption {
|
postUp = mkOption {
|
||||||
example = literalExample ''
|
example = literalExample ''
|
||||||
${pkgs.iproute}/bin/ip netns add foo
|
${pkgs.iproute2}/bin/ip netns add foo
|
||||||
'';
|
'';
|
||||||
default = "";
|
default = "";
|
||||||
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
|
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
|
||||||
@ -90,7 +90,7 @@ let
|
|||||||
|
|
||||||
postDown = mkOption {
|
postDown = mkOption {
|
||||||
example = literalExample ''
|
example = literalExample ''
|
||||||
${pkgs.iproute}/bin/ip netns del foo
|
${pkgs.iproute2}/bin/ip netns del foo
|
||||||
'';
|
'';
|
||||||
default = "";
|
default = "";
|
||||||
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
|
type = with types; coercedTo (listOf str) (concatStringsSep "\n") lines;
|
||||||
|
@ -5,7 +5,7 @@ with lib;
|
|||||||
let cfg = config.services.cloud-init;
|
let cfg = config.services.cloud-init;
|
||||||
path = with pkgs; [
|
path = with pkgs; [
|
||||||
cloud-init
|
cloud-init
|
||||||
iproute
|
iproute2
|
||||||
nettools
|
nettools
|
||||||
openssh
|
openssh
|
||||||
shadow
|
shadow
|
||||||
|
@ -55,7 +55,7 @@ in
|
|||||||
# The shared libraries are required for DNS resolution
|
# The shared libraries are required for DNS resolution
|
||||||
boot.initrd.extraUtilsCommands = ''
|
boot.initrd.extraUtilsCommands = ''
|
||||||
copy_bin_and_libs ${pkgs.openvpn}/bin/openvpn
|
copy_bin_and_libs ${pkgs.openvpn}/bin/openvpn
|
||||||
copy_bin_and_libs ${pkgs.iproute}/bin/ip
|
copy_bin_and_libs ${pkgs.iproute2}/bin/ip
|
||||||
|
|
||||||
cp -pv ${pkgs.glibc}/lib/libresolv.so.2 $out/lib
|
cp -pv ${pkgs.glibc}/lib/libresolv.so.2 $out/lib
|
||||||
cp -pv ${pkgs.glibc}/lib/libnss_dns.so.2 $out/lib
|
cp -pv ${pkgs.glibc}/lib/libnss_dns.so.2 $out/lib
|
||||||
|
@ -1144,7 +1144,7 @@ in
|
|||||||
|
|
||||||
environment.systemPackages =
|
environment.systemPackages =
|
||||||
[ pkgs.host
|
[ pkgs.host
|
||||||
pkgs.iproute
|
pkgs.iproute2
|
||||||
pkgs.iputils
|
pkgs.iputils
|
||||||
pkgs.nettools
|
pkgs.nettools
|
||||||
]
|
]
|
||||||
|
@ -43,7 +43,7 @@ import ./make-test-python.nix ({pkgs, ...}: {
|
|||||||
# Everyone on the "isp" machine will be able to add routes to the kernel.
|
# Everyone on the "isp" machine will be able to add routes to the kernel.
|
||||||
security.wrappers.add-dhcpd-lease = {
|
security.wrappers.add-dhcpd-lease = {
|
||||||
source = pkgs.writeShellScript "add-dhcpd-lease" ''
|
source = pkgs.writeShellScript "add-dhcpd-lease" ''
|
||||||
exec ${pkgs.iproute}/bin/ip -6 route replace "$1" via "$2"
|
exec ${pkgs.iproute2}/bin/ip -6 route replace "$1" via "$2"
|
||||||
'';
|
'';
|
||||||
capabilities = "cap_net_admin+ep";
|
capabilities = "cap_net_admin+ep";
|
||||||
};
|
};
|
||||||
|
Loading…
x
Reference in New Issue
Block a user