net-tools: rename from nettools (#416056)

authored by Wolfgang Walther and committed by GitHub e80ca91f 7ca18ff1

+266 -282
+2 -2
nixos/modules/services/cluster/spark/default.nix
··· 104 path = with pkgs; [ 105 procps 106 openssh 107 - nettools 108 ]; 109 description = "spark master service."; 110 after = [ "network.target" ]; ··· 131 path = with pkgs; [ 132 procps 133 openssh 134 - nettools 135 rsync 136 ]; 137 description = "spark master service.";
··· 104 path = with pkgs; [ 105 procps 106 openssh 107 + net-tools 108 ]; 109 description = "spark master service."; 110 after = [ "network.target" ]; ··· 131 path = with pkgs; [ 132 procps 133 openssh 134 + net-tools 135 rsync 136 ]; 137 description = "spark master service.";
+2 -2
nixos/modules/services/continuous-integration/hydra/default.nix
··· 424 ]; 425 path = [ 426 hydra-package 427 - pkgs.nettools 428 pkgs.openssh 429 pkgs.bzip2 430 config.nix.package ··· 459 ]; 460 path = with pkgs; [ 461 hydra-package 462 - nettools 463 jq 464 ]; 465 restartTriggers = [ hydraConf ];
··· 424 ]; 425 path = [ 426 hydra-package 427 + pkgs.net-tools 428 pkgs.openssh 429 pkgs.bzip2 430 config.nix.package ··· 459 ]; 460 path = with pkgs; [ 461 hydra-package 462 + net-tools 463 jq 464 ]; 465 restartTriggers = [ hydraConf ];
+1 -1
nixos/modules/services/databases/mysql.nix
··· 525 [ 526 # Needed for the mysql_install_db command in the preStart script 527 # which calls the hostname command. 528 - pkgs.nettools 529 ] 530 # tools 'wsrep_sst_rsync' needs 531 ++ lib.optionals cfg.galeraCluster.enable [
··· 525 [ 526 # Needed for the mysql_install_db command in the preStart script 527 # which calls the hostname command. 528 + pkgs.net-tools 529 ] 530 # tools 'wsrep_sst_rsync' needs 531 ++ lib.optionals cfg.galeraCluster.enable [
+2 -2
nixos/modules/services/desktops/profile-sync-daemon.nix
··· 43 rsync 44 kmod 45 gawk 46 - nettools 47 util-linux 48 profile-sync-daemon 49 ]; ··· 69 rsync 70 kmod 71 gawk 72 - nettools 73 util-linux 74 profile-sync-daemon 75 ];
··· 43 rsync 44 kmod 45 gawk 46 + net-tools 47 util-linux 48 profile-sync-daemon 49 ]; ··· 69 rsync 70 kmod 71 gawk 72 + net-tools 73 util-linux 74 profile-sync-daemon 75 ];
+1 -1
nixos/modules/services/misc/zoneminder.nix
··· 45 defaultsFile = pkgs.writeText "60-defaults.conf" '' 46 # 01-system-paths.conf 47 ${dirStanzas home} 48 - ZM_PATH_ARP=${lib.getBin pkgs.nettools}/bin/arp 49 ZM_PATH_LOGS=/var/log/${dirName} 50 ZM_PATH_MAP=/dev/shm 51 ZM_PATH_SOCKS=/run/${dirName}
··· 45 defaultsFile = pkgs.writeText "60-defaults.conf" '' 46 # 01-system-paths.conf 47 ${dirStanzas home} 48 + ZM_PATH_ARP=${lib.getBin pkgs.net-tools}/bin/arp 49 ZM_PATH_LOGS=/var/log/${dirName} 50 ZM_PATH_MAP=/dev/shm 51 ZM_PATH_SOCKS=/run/${dirName}
+3 -3
nixos/modules/services/monitoring/zabbix-agent.nix
··· 59 60 extraPackages = mkOption { 61 type = types.listOf types.package; 62 - default = with pkgs; [ nettools ]; 63 - defaultText = literalExpression "with pkgs; [ nettools ]"; 64 - example = literalExpression "with pkgs; [ nettools mysql ]"; 65 description = '' 66 Packages to be added to the Zabbix {env}`PATH`. 67 Typically used to add executables for scripts, but can be anything.
··· 59 60 extraPackages = mkOption { 61 type = types.listOf types.package; 62 + default = with pkgs; [ net-tools ]; 63 + defaultText = literalExpression "with pkgs; [ net-tools ]"; 64 + example = literalExpression "with pkgs; [ net-tools mysql ]"; 65 description = '' 66 Packages to be added to the Zabbix {env}`PATH`. 67 Typically used to add executables for scripts, but can be anything.
+2 -2
nixos/modules/services/monitoring/zabbix-proxy.nix
··· 91 extraPackages = mkOption { 92 type = types.listOf types.package; 93 default = with pkgs; [ 94 - nettools 95 nmap 96 traceroute 97 ]; 98 - defaultText = literalExpression "[ nettools nmap traceroute ]"; 99 description = '' 100 Packages to be added to the Zabbix {env}`PATH`. 101 Typically used to add executables for scripts, but can be anything.
··· 91 extraPackages = mkOption { 92 type = types.listOf types.package; 93 default = with pkgs; [ 94 + net-tools 95 nmap 96 traceroute 97 ]; 98 + defaultText = literalExpression "[ net-tools nmap traceroute ]"; 99 description = '' 100 Packages to be added to the Zabbix {env}`PATH`. 101 Typically used to add executables for scripts, but can be anything.
+2 -2
nixos/modules/services/monitoring/zabbix-server.nix
··· 88 extraPackages = mkOption { 89 type = types.listOf types.package; 90 default = with pkgs; [ 91 - nettools 92 nmap 93 traceroute 94 ]; 95 - defaultText = literalExpression "[ nettools nmap traceroute ]"; 96 description = '' 97 Packages to be added to the Zabbix {env}`PATH`. 98 Typically used to add executables for scripts, but can be anything.
··· 88 extraPackages = mkOption { 89 type = types.listOf types.package; 90 default = with pkgs; [ 91 + net-tools 92 nmap 93 traceroute 94 ]; 95 + defaultText = literalExpression "[ net-tools nmap traceroute ]"; 96 description = '' 97 Packages to be added to the Zabbix {env}`PATH`. 98 Typically used to add executables for scripts, but can be anything.
+1 -1
nixos/modules/services/networking/libreswan.nix
··· 165 procps 166 nssTools 167 iptables 168 - nettools 169 ]; 170 preStart = lib.optionalString cfg.disableRedirects '' 171 # Disable send/receive redirects
··· 165 procps 166 nssTools 167 iptables 168 + net-tools 169 ]; 170 preStart = lib.optionalString cfg.disableRedirects '' 171 # Disable send/receive redirects
+1 -1
nixos/modules/services/networking/openvpn.nix
··· 74 path = [ 75 pkgs.iptables 76 pkgs.iproute2 77 - pkgs.nettools 78 ]; 79 80 serviceConfig.ExecStart = "@${openvpn}/sbin/openvpn openvpn --suppress-timestamps --config ${configFile}";
··· 74 path = [ 75 pkgs.iptables 76 pkgs.iproute2 77 + pkgs.net-tools 78 ]; 79 80 serviceConfig.ExecStart = "@${openvpn}/sbin/openvpn openvpn --suppress-timestamps --config ${configFile}";
+2 -2
nixos/modules/services/networking/tetrd.nix
··· 80 builtins.storeDir 81 "/etc/ssl" 82 "/etc/static/ssl" 83 - "${pkgs.nettools}/bin/route:/usr/bin/route" 84 - "${pkgs.nettools}/bin/ifconfig:/usr/bin/ifconfig" 85 ]; 86 87 BindPaths = [
··· 80 builtins.storeDir 81 "/etc/ssl" 82 "/etc/static/ssl" 83 + "${pkgs.net-tools}/bin/route:/usr/bin/route" 84 + "${pkgs.net-tools}/bin/ifconfig:/usr/bin/ifconfig" 85 ]; 86 87 BindPaths = [
+1 -1
nixos/modules/services/system/cloud-init.nix
··· 11 [ 12 cloud-init 13 iproute2 14 - nettools 15 openssh 16 shadow 17 util-linux
··· 11 [ 12 cloud-init 13 iproute2 14 + net-tools 15 openssh 16 shadow 17 util-linux
+1 -1
nixos/modules/services/x11/terminal-server.nix
··· 36 pkgs.which 37 pkgs.openssl 38 pkgs.xorg.xauth 39 - pkgs.nettools 40 pkgs.shadow 41 pkgs.procps 42 pkgs.util-linux
··· 36 pkgs.which 37 pkgs.openssl 38 pkgs.xorg.xauth 39 + pkgs.net-tools 40 pkgs.shadow 41 pkgs.procps 42 pkgs.util-linux
+1 -1
nixos/modules/system/activation/activation-script.nix
··· 90 getent 91 stdenv.cc.libc # nscd in update-users-groups.pl 92 shadow 93 - nettools # needed for hostname 94 util-linux # needed for mount and mountpoint 95 ]; 96
··· 90 getent 91 stdenv.cc.libc # nscd in update-users-groups.pl 92 shadow 93 + net-tools # needed for hostname 94 util-linux # needed for mount and mountpoint 95 ]; 96
+1 -1
nixos/modules/tasks/filesystems/zfs.nix
··· 832 pkgs.gawk 833 pkgs.gnugrep 834 pkgs.gnused 835 - pkgs.nettools 836 pkgs.util-linux 837 ]; 838 };
··· 832 pkgs.gawk 833 pkgs.gnugrep 834 pkgs.gnused 835 + pkgs.net-tools 836 pkgs.util-linux 837 ]; 838 };
+2 -2
nixos/modules/tasks/network-interfaces.nix
··· 1625 ]; 1626 conflicts = [ "shutdown.target" ]; 1627 unitConfig.DefaultDependencies = false; 1628 - serviceConfig.ExecStart = ''${pkgs.nettools}/bin/domainname "${cfg.domain}"''; 1629 serviceConfig.Type = "oneshot"; 1630 }; 1631 ··· 1643 pkgs.host 1644 pkgs.iproute2 1645 pkgs.iputils 1646 - pkgs.nettools 1647 ] 1648 ++ optionals config.networking.wireless.enable [ 1649 pkgs.wirelesstools # FIXME: obsolete?
··· 1625 ]; 1626 conflicts = [ "shutdown.target" ]; 1627 unitConfig.DefaultDependencies = false; 1628 + serviceConfig.ExecStart = ''${pkgs.net-tools}/bin/domainname "${cfg.domain}"''; 1629 serviceConfig.Type = "oneshot"; 1630 }; 1631 ··· 1643 pkgs.host 1644 pkgs.iproute2 1645 pkgs.iputils 1646 + pkgs.net-tools 1647 ] 1648 ++ optionals config.networking.wireless.enable [ 1649 pkgs.wirelesstools # FIXME: obsolete?
+1 -1
nixos/modules/virtualisation/digital-ocean-config.nix
··· 144 systemd.services.digitalocean-set-hostname = mkIf (hostName == "") { 145 path = [ 146 pkgs.curl 147 - pkgs.nettools 148 ]; 149 description = "Set hostname provided by Digitalocean"; 150 wantedBy = [ "network.target" ];
··· 144 systemd.services.digitalocean-set-hostname = mkIf (hostName == "") { 145 path = [ 146 pkgs.curl 147 + pkgs.net-tools 148 ]; 149 description = "Set hostname provided by Digitalocean"; 150 wantedBy = [ "network.target" ];
+1 -1
nixos/modules/virtualisation/ec2-data.nix
··· 34 ${optionalString (config.networking.hostName == "") '' 35 echo "setting host name..." 36 if [ -s /etc/ec2-metadata/hostname ]; then 37 - ${pkgs.nettools}/bin/hostname $(cat /etc/ec2-metadata/hostname) 38 fi 39 ''} 40
··· 34 ${optionalString (config.networking.hostName == "") '' 35 echo "setting host name..." 36 if [ -s /etc/ec2-metadata/hostname ]; then 37 + ${pkgs.net-tools}/bin/hostname $(cat /etc/ec2-metadata/hostname) 38 fi 39 ''} 40
+1 -1
nixos/modules/virtualisation/vagrant-guest.nix
··· 23 environment.systemPackages = with pkgs; [ 24 findutils 25 iputils 26 - nettools 27 netcat 28 nfs-utils 29 rsync
··· 23 environment.systemPackages = with pkgs; [ 24 findutils 25 iputils 26 + net-tools 27 netcat 28 nfs-utils 29 rsync
+1 -1
nixos/modules/virtualisation/waagent.nix
··· 351 parted 352 353 # for hostname 354 - nettools 355 # for pidof 356 procps 357 # for useradd, usermod
··· 351 parted 352 353 # for hostname 354 + net-tools 355 # for pidof 356 procps 357 # for useradd, usermod
+2 -2
pkgs/applications/networking/firehol/default.nix
··· 10 iptables, 11 iputils, 12 kmod, 13 - nettools, 14 procps, 15 tcpdump, 16 traceroute, ··· 59 iptables 60 iputils 61 kmod 62 - nettools 63 procps 64 tcpdump 65 traceroute
··· 10 iptables, 11 iputils, 12 kmod, 13 + net-tools, 14 procps, 15 tcpdump, 16 traceroute, ··· 59 iptables 60 iputils 61 kmod 62 + net-tools 63 procps 64 tcpdump 65 traceroute
+2 -2
pkgs/applications/virtualization/virtualbox/default.nix
··· 35 alsa-lib, 36 curl, 37 libvpx, 38 - nettools, 39 dbus, 40 replaceVars, 41 gsoap, ··· 263 ]; 264 265 postPatch = '' 266 - sed -i -e 's|/sbin/ifconfig|${nettools}/bin/ifconfig|' \ 267 src/VBox/HostDrivers/adpctl/VBoxNetAdpCtl.cpp 268 ''; 269
··· 35 alsa-lib, 36 curl, 37 libvpx, 38 + net-tools, 39 dbus, 40 replaceVars, 41 gsoap, ··· 263 ]; 264 265 postPatch = '' 266 + sed -i -e 's|/sbin/ifconfig|${net-tools}/bin/ifconfig|' \ 267 src/VBox/HostDrivers/adpctl/VBoxNetAdpCtl.cpp 268 ''; 269
+2 -2
pkgs/applications/window-managers/awesome/default.nix
··· 20 gobject-introspection, 21 which, 22 dbus, 23 - nettools, 24 git, 25 doxygen, 26 xmlto, ··· 105 libstartup_notification 106 libxdg_basedir 107 lua 108 - nettools 109 pango 110 xcb-util-cursor 111 xorg.libXau
··· 20 gobject-introspection, 21 which, 22 dbus, 23 + net-tools, 24 git, 25 doxygen, 26 xmlto, ··· 105 libstartup_notification 106 libxdg_basedir 107 lua 108 + net-tools 109 pango 110 xcb-util-cursor 111 xorg.libXau
+2 -2
pkgs/by-name/am/amazon-ssm-agent/package.nix
··· 6 darwin, 7 fetchFromGitHub, 8 coreutils, 9 - nettools, 10 util-linux, 11 stdenv, 12 dmidecode, ··· 92 93 substituteInPlace agent/platform/platform_unix.go \ 94 --replace-fail "/usr/bin/uname" "${coreutils}/bin/uname" \ 95 - --replace-fail '"/bin", "hostname"' '"${nettools}/bin/hostname"' \ 96 --replace-fail '"lsb_release"' '"${fake-lsb-release}/bin/lsb_release"' 97 98 substituteInPlace agent/session/shell/shell_unix.go \
··· 6 darwin, 7 fetchFromGitHub, 8 coreutils, 9 + net-tools, 10 util-linux, 11 stdenv, 12 dmidecode, ··· 92 93 substituteInPlace agent/platform/platform_unix.go \ 94 --replace-fail "/usr/bin/uname" "${coreutils}/bin/uname" \ 95 + --replace-fail '"/bin", "hostname"' '"${net-tools}/bin/hostname"' \ 96 --replace-fail '"lsb_release"' '"${fake-lsb-release}/bin/lsb_release"' 97 98 substituteInPlace agent/session/shell/shell_unix.go \
+7 -7
pkgs/by-name/cv/cvsq/package.nix
··· 5 makeWrapper, 6 cvs, 7 perl, 8 - nettools, 9 findutils, 10 rsync, 11 coreutils, ··· 25 buildInputs = [ 26 cvs 27 perl 28 - nettools 29 findutils 30 rsync 31 coreutils ··· 40 wrapProgram $out/bin/cvsq --prefix PATH : ${ 41 lib.makeBinPath [ 42 cvs 43 - nettools 44 findutils 45 rsync 46 coreutils ··· 50 wrapProgram $out/bin/cvsq-branch --prefix PATH : ${ 51 lib.makeBinPath [ 52 cvs 53 - nettools 54 findutils 55 rsync 56 coreutils ··· 60 wrapProgram $out/bin/cvsq-merge --prefix PATH : ${ 61 lib.makeBinPath [ 62 cvs 63 - nettools 64 findutils 65 rsync 66 coreutils ··· 70 wrapProgram $out/bin/cvsq-switch --prefix PATH : ${ 71 lib.makeBinPath [ 72 cvs 73 - nettools 74 findutils 75 rsync 76 coreutils ··· 80 wrapProgram $out/bin/lcvs --prefix PATH : ${ 81 lib.makeBinPath [ 82 cvs 83 - nettools 84 findutils 85 rsync 86 coreutils
··· 5 makeWrapper, 6 cvs, 7 perl, 8 + net-tools, 9 findutils, 10 rsync, 11 coreutils, ··· 25 buildInputs = [ 26 cvs 27 perl 28 + net-tools 29 findutils 30 rsync 31 coreutils ··· 40 wrapProgram $out/bin/cvsq --prefix PATH : ${ 41 lib.makeBinPath [ 42 cvs 43 + net-tools 44 findutils 45 rsync 46 coreutils ··· 50 wrapProgram $out/bin/cvsq-branch --prefix PATH : ${ 51 lib.makeBinPath [ 52 cvs 53 + net-tools 54 findutils 55 rsync 56 coreutils ··· 60 wrapProgram $out/bin/cvsq-merge --prefix PATH : ${ 61 lib.makeBinPath [ 62 cvs 63 + net-tools 64 findutils 65 rsync 66 coreutils ··· 70 wrapProgram $out/bin/cvsq-switch --prefix PATH : ${ 71 lib.makeBinPath [ 72 cvs 73 + net-tools 74 findutils 75 rsync 76 coreutils ··· 80 wrapProgram $out/bin/lcvs --prefix PATH : ${ 81 lib.makeBinPath [ 82 cvs 83 + net-tools 84 findutils 85 rsync 86 coreutils
+2 -2
pkgs/by-name/fa/facter/package.nix
··· 7 iproute2, 8 lib, 9 makeWrapper, 10 - nettools, 11 pciutils, 12 procps, 13 stdenv, ··· 30 [ 31 coreutils 32 gnugrep 33 - nettools 34 pciutils 35 procps 36 util-linux
··· 7 iproute2, 8 lib, 9 makeWrapper, 10 + net-tools, 11 pciutils, 12 procps, 13 stdenv, ··· 30 [ 31 coreutils 32 gnugrep 33 + net-tools 34 pciutils 35 procps 36 util-linux
+2 -2
pkgs/by-name/fr/frr/package.nix
··· 34 zeromq, 35 36 # tests 37 - nettools, 38 nixosTests, 39 40 # general options ··· 218 doCheck = true; 219 220 nativeCheckInputs = [ 221 - nettools 222 python3.pkgs.pytest 223 ]; 224
··· 34 zeromq, 35 36 # tests 37 + net-tools, 38 nixosTests, 39 40 # general options ··· 218 doCheck = true; 219 220 nativeCheckInputs = [ 221 + net-tools 222 python3.pkgs.pytest 223 ]; 224
+2 -2
pkgs/by-name/fu/fusionInventory/package.nix
··· 6 pciutils, 7 usbutils, 8 iproute2, 9 - nettools, 10 fetchFromGitHub, 11 makeWrapper, 12 }: ··· 86 dmidecode 87 pciutils 88 usbutils 89 - nettools 90 iproute2 91 ] 92 }
··· 6 pciutils, 7 usbutils, 8 iproute2, 9 + net-tools, 10 fetchFromGitHub, 11 makeWrapper, 12 }: ··· 86 dmidecode 87 pciutils 88 usbutils 89 + net-tools 90 iproute2 91 ] 92 }
+2 -2
pkgs/by-name/gi/gitlab/package.nix
··· 9 gitlabEnterprise ? false, 10 lib, 11 makeWrapper, 12 - nettools, 13 nixosTests, 14 nodejs_20, 15 replace, ··· 220 rubyEnv.bundler 221 tzdata 222 git 223 - nettools 224 ]; 225 226 patches = [
··· 9 gitlabEnterprise ? false, 10 lib, 11 makeWrapper, 12 + net-tools, 13 nixosTests, 14 nodejs_20, 15 replace, ··· 220 rubyEnv.bundler 221 tzdata 222 git 223 + net-tools 224 ]; 225 226 patches = [
+3 -3
pkgs/by-name/gi/gitolite/package.nix
··· 5 git, 6 lib, 7 makeWrapper, 8 - nettools, 9 perl, 10 nixosTests, 11 }: ··· 22 }; 23 24 buildInputs = [ 25 - nettools 26 perl 27 ]; 28 nativeBuildInputs = [ makeWrapper ]; ··· 37 substituteInPlace src/lib/Gitolite/Hooks/Update.pm \ 38 --replace /usr/bin/perl "${perl}/bin/perl" 39 substituteInPlace src/lib/Gitolite/Setup.pm \ 40 - --replace hostname "${nettools}/bin/hostname" 41 substituteInPlace src/commands/sskm \ 42 --replace /bin/rm "${coreutils}/bin/rm" 43 '';
··· 5 git, 6 lib, 7 makeWrapper, 8 + net-tools, 9 perl, 10 nixosTests, 11 }: ··· 22 }; 23 24 buildInputs = [ 25 + net-tools 26 perl 27 ]; 28 nativeBuildInputs = [ makeWrapper ]; ··· 37 substituteInPlace src/lib/Gitolite/Hooks/Update.pm \ 38 --replace /usr/bin/perl "${perl}/bin/perl" 39 substituteInPlace src/lib/Gitolite/Setup.pm \ 40 + --replace hostname "${net-tools}/bin/hostname" 41 substituteInPlace src/commands/sskm \ 42 --replace /bin/rm "${coreutils}/bin/rm" 43 '';
+2 -2
pkgs/by-name/gl/glpi-agent/package.nix
··· 6 pciutils, 7 usbutils, 8 iproute2, 9 - nettools, 10 fetchFromGitHub, 11 makeWrapper, 12 versionCheckHook, ··· 105 dmidecode 106 pciutils 107 usbutils 108 - nettools 109 iproute2 110 ] 111 }
··· 6 pciutils, 7 usbutils, 8 iproute2, 9 + net-tools, 10 fetchFromGitHub, 11 makeWrapper, 12 versionCheckHook, ··· 105 dmidecode 106 pciutils 107 usbutils 108 + net-tools 109 iproute2 110 ] 111 }
+2 -2
pkgs/by-name/gv/gvpe/package.nix
··· 6 gmp, 7 zlib, 8 iproute2, 9 - nettools, 10 pkg-config, 11 }: 12 ··· 34 35 postPatch = '' 36 sed -e 's@"/sbin/ifconfig.*"@"${iproute2}/sbin/ip link set dev $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C 37 - sed -e 's@/sbin/ifconfig@${nettools}/sbin/ifconfig@g' -i src/device-*.C 38 ''; 39 40 meta = with lib; {
··· 6 gmp, 7 zlib, 8 iproute2, 9 + net-tools, 10 pkg-config, 11 }: 12 ··· 34 35 postPatch = '' 36 sed -e 's@"/sbin/ifconfig.*"@"${iproute2}/sbin/ip link set dev $IFNAME address $MAC mtu $MTU"@' -i src/device-linux.C 37 + sed -e 's@/sbin/ifconfig@${net-tools}/sbin/ifconfig@g' -i src/device-*.C 38 ''; 39 40 meta = with lib; {
+3 -3
pkgs/by-name/ha/hans/package.nix
··· 2 lib, 3 stdenv, 4 fetchFromGitHub, 5 - nettools, 6 }: 7 8 stdenv.mkDerivation rec { ··· 16 owner = "friedrich"; 17 }; 18 19 - buildInputs = [ nettools ]; 20 21 postPatch = '' 22 - substituteInPlace src/tun.cpp --replace "/sbin/" "${nettools}/bin/" 23 ''; 24 25 enableParallelBuilding = true;
··· 2 lib, 3 stdenv, 4 fetchFromGitHub, 5 + net-tools, 6 }: 7 8 stdenv.mkDerivation rec { ··· 16 owner = "friedrich"; 17 }; 18 19 + buildInputs = [ net-tools ]; 20 21 postPatch = '' 22 + substituteInPlace src/tun.cpp --replace "/sbin/" "${net-tools}/bin/" 23 ''; 24 25 enableParallelBuilding = true;
+1 -1
pkgs/by-name/he/heroic/package.nix
··· 28 zenity 29 kdePackages.kdialog 30 mangohud 31 - nettools 32 opencl-headers 33 p7zip 34 pciutils
··· 28 zenity 29 kdePackages.kdialog 30 mangohud 31 + net-tools 32 opencl-headers 33 p7zip 34 pciutils
+1 -1
pkgs/by-name/ho/houdini/package.nix
··· 38 tbb 39 xwayland 40 qt5.qtwayland 41 - nettools # needed by licensing tools 42 bintools # needed for ld and other tools, so ctypes can find/load sos from python 43 ocl-icd # needed for opencl 44 numactl # needed by hfs ocl backend
··· 38 tbb 39 xwayland 40 qt5.qtwayland 41 + net-tools # needed by licensing tools 42 bintools # needed for ld and other tools, so ctypes can find/load sos from python 43 ocl-icd # needed for opencl 44 numactl # needed by hfs ocl backend
+2 -2
pkgs/by-name/hp/hplip/package.nix
··· 20 net-snmp, 21 openssl, 22 perl, 23 - nettools, 24 avahi, 25 bash, 26 util-linux, ··· 141 "--prefix" 142 "PATH" 143 ":" 144 - "${nettools}/bin" 145 ]; 146 147 patches = [
··· 20 net-snmp, 21 openssl, 22 perl, 23 + net-tools, 24 avahi, 25 bash, 26 util-linux, ··· 141 "--prefix" 142 "PATH" 143 ":" 144 + "${net-tools}/bin" 145 ]; 146 147 patches = [
+2 -2
pkgs/by-name/io/iodine/package.nix
··· 3 stdenv, 4 fetchFromGitHub, 5 zlib, 6 - nettools, 7 nixosTests, 8 }: 9 ··· 20 21 buildInputs = [ zlib ]; 22 23 - env.NIX_CFLAGS_COMPILE = ''-DIFCONFIGPATH="${nettools}/bin/" -DROUTEPATH="${nettools}/bin/"''; 24 25 installFlags = [ "prefix=\${out}" ]; 26
··· 3 stdenv, 4 fetchFromGitHub, 5 zlib, 6 + net-tools, 7 nixosTests, 8 }: 9 ··· 20 21 buildInputs = [ zlib ]; 22 23 + env.NIX_CFLAGS_COMPILE = ''-DIFCONFIGPATH="${net-tools}/bin/" -DROUTEPATH="${net-tools}/bin/"''; 24 25 installFlags = [ "prefix=\${out}" ]; 26
+2 -2
pkgs/by-name/is/isabelle/package.nix
··· 4 fetchurl, 5 fetchFromGitHub, 6 coreutils, 7 - nettools, 8 java, 9 scala_3, 10 polyml, ··· 84 veriT 85 vampire' 86 eprover-ho 87 - nettools 88 ]; 89 90 propagatedBuildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ procps ];
··· 4 fetchurl, 5 fetchFromGitHub, 6 coreutils, 7 + net-tools, 8 java, 9 scala_3, 10 polyml, ··· 84 veriT 85 vampire' 86 eprover-ho 87 + net-tools 88 ]; 89 90 propagatedBuildInputs = lib.optionals stdenv.hostPlatform.isDarwin [ procps ];
+2 -2
pkgs/by-name/ju/jumpapp/package.nix
··· 7 xdotool, 8 wmctrl, 9 xprop, 10 - nettools, 11 }: 12 13 stdenv.mkDerivation rec { ··· 30 xdotool 31 wmctrl 32 xprop 33 - nettools 34 perl 35 ]; 36 postFixup =
··· 7 xdotool, 8 wmctrl, 9 xprop, 10 + net-tools, 11 }: 12 13 stdenv.mkDerivation rec { ··· 30 xdotool 31 wmctrl 32 xprop 33 + net-tools 34 perl 35 ]; 36 postFixup =
+1 -1
pkgs/by-name/li/libbladeRF/package.nix
··· 49 # Fixup shebang 50 prePatch = "patchShebangs host/utilities/bladeRF-cli/src/cmd/doc/generate.bash"; 51 52 - # Let us avoid nettools as a dependency. 53 postPatch = '' 54 sed -i 's/$(hostname)/hostname/' host/utilities/bladeRF-cli/src/cmd/doc/generate.bash 55 '';
··· 49 # Fixup shebang 50 prePatch = "patchShebangs host/utilities/bladeRF-cli/src/cmd/doc/generate.bash"; 51 52 + # Let us avoid net-tools as a dependency. 53 postPatch = '' 54 sed -i 's/$(hostname)/hostname/' host/utilities/bladeRF-cli/src/cmd/doc/generate.bash 55 '';
+2 -2
pkgs/by-name/ma/mackerel-agent/package.nix
··· 5 fetchFromGitHub, 6 makeWrapper, 7 iproute2, 8 - nettools, 9 }: 10 11 buildGoModule rec { ··· 20 }; 21 22 nativeBuildInputs = [ makeWrapper ]; 23 - nativeCheckInputs = lib.optionals (!stdenv.hostPlatform.isDarwin) [ nettools ]; 24 buildInputs = lib.optionals (!stdenv.hostPlatform.isDarwin) [ iproute2 ]; 25 26 vendorHash = "sha256-Q3HsfLA6xqzwXVfRc0bOb15kW2tdwj14DvJEZoRy0/4=";
··· 5 fetchFromGitHub, 6 makeWrapper, 7 iproute2, 8 + net-tools, 9 }: 10 11 buildGoModule rec { ··· 20 }; 21 22 nativeBuildInputs = [ makeWrapper ]; 23 + nativeCheckInputs = lib.optionals (!stdenv.hostPlatform.isDarwin) [ net-tools ]; 24 buildInputs = lib.optionals (!stdenv.hostPlatform.isDarwin) [ iproute2 ]; 25 26 vendorHash = "sha256-Q3HsfLA6xqzwXVfRc0bOb15kW2tdwj14DvJEZoRy0/4=";
+2 -2
pkgs/by-name/ma/mattermost/tests.nix
··· 8 mariadb, 9 redis, 10 curl, 11 - nettools, 12 runtimeShell, 13 }: 14 ··· 30 mariadb 31 redis 32 curl 33 - nettools 34 gotestsum 35 ]; 36
··· 8 mariadb, 9 redis, 10 curl, 11 + net-tools, 12 runtimeShell, 13 }: 14 ··· 30 mariadb 31 redis 32 curl 33 + net-tools 34 gotestsum 35 ]; 36
+2 -2
pkgs/by-name/mi/mininet/package.nix
··· 11 inetutils, 12 iperf, 13 iproute2, 14 - nettools, 15 socat, 16 }: 17 ··· 34 socat 35 # mn errors out without a telnet binary 36 # pkgs.inetutils brings an undesired ifconfig into PATH see #43105 37 - nettools 38 telnet 39 ]; 40
··· 11 inetutils, 12 iperf, 13 iproute2, 14 + net-tools, 15 socat, 16 }: 17 ··· 34 socat 35 # mn errors out without a telnet binary 36 # pkgs.inetutils brings an undesired ifconfig into PATH see #43105 37 + net-tools 38 telnet 39 ]; 40
+3 -3
pkgs/by-name/mi/miredo/package.nix
··· 2 lib, 3 stdenv, 4 fetchurl, 5 - nettools, 6 iproute2, 7 judy, 8 }: ··· 20 21 postPatch = '' 22 substituteInPlace misc/client-hook.bsd \ 23 - --replace '/sbin/route' '${nettools}/bin/route' \ 24 - --replace '/sbin/ifconfig' '${nettools}/bin/ifconfig' 25 substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute2}/bin/ip' 26 ''; 27
··· 2 lib, 3 stdenv, 4 fetchurl, 5 + net-tools, 6 iproute2, 7 judy, 8 }: ··· 20 21 postPatch = '' 22 substituteInPlace misc/client-hook.bsd \ 23 + --replace '/sbin/route' '${net-tools}/bin/route' \ 24 + --replace '/sbin/ifconfig' '${net-tools}/bin/ifconfig' 25 substituteInPlace misc/client-hook.iproute --replace '/sbin/ip' '${iproute2}/bin/ip' 26 ''; 27
+2 -2
pkgs/by-name/mu/munin/package.nix
··· 10 python3, 11 ruby, 12 jre8, 13 - nettools, 14 bc, 15 nixosTests, 16 }: ··· 34 which 35 coreutils 36 rrdtool 37 - nettools 38 perlPackages.perl 39 perlPackages.ModuleBuild 40 perlPackages.HTMLTemplate
··· 10 python3, 11 ruby, 12 jre8, 13 + net-tools, 14 bc, 15 nixosTests, 16 }: ··· 34 which 35 coreutils 36 rrdtool 37 + net-tools 38 perlPackages.perl 39 perlPackages.ModuleBuild 40 perlPackages.HTMLTemplate
+3 -3
pkgs/by-name/ne/net-snmp/package.nix
··· 6 file, 7 openssl, 8 perl, 9 - nettools, 10 autoreconfHook, 11 withPerlTools ? false, 12 }: ··· 68 ] ++ lib.optional stdenv.hostPlatform.isLinux "--with-mnttab=/proc/mounts"; 69 70 postPatch = '' 71 - substituteInPlace testing/fulltests/support/simple_TESTCONF.sh --replace "/bin/netstat" "${nettools}/bin/netstat" 72 ''; 73 74 postConfigure = '' ··· 79 ''; 80 81 nativeBuildInputs = [ 82 - nettools 83 file 84 autoreconfHook 85 ];
··· 6 file, 7 openssl, 8 perl, 9 + net-tools, 10 autoreconfHook, 11 withPerlTools ? false, 12 }: ··· 68 ] ++ lib.optional stdenv.hostPlatform.isLinux "--with-mnttab=/proc/mounts"; 69 70 postPatch = '' 71 + substituteInPlace testing/fulltests/support/simple_TESTCONF.sh --replace "/bin/netstat" "${net-tools}/bin/netstat" 72 ''; 73 74 postConfigure = '' ··· 79 ''; 80 81 nativeBuildInputs = [ 82 + net-tools 83 file 84 autoreconfHook 85 ];
+2 -2
pkgs/by-name/op/opentsdb/package.nix
··· 10 git, 11 jdk8, 12 makeWrapper, 13 - nettools, 14 python3, 15 }: 16 ··· 324 buildInputs = [ 325 curl 326 jdk 327 - nettools 328 python3 329 git 330 ];
··· 10 git, 11 jdk8, 12 makeWrapper, 13 + net-tools, 14 python3, 15 }: 16 ··· 324 buildInputs = [ 325 curl 326 jdk 327 + net-tools 328 python3 329 git 330 ];
+1 -1
pkgs/by-name/ot/otpw/package.nix
··· 27 --replace "ls -lu /etc/. /tmp/. / /usr/. /bin/. /usr/bin/." "${coreutils}/bin/ls -lu /etc/. /tmp/. / /usr/. /bin/. /usr/bin/." \ 28 --replace "PATH=/usr/ucb:/bin:/usr/bin;ps lax" "PATH=/usr/ucb:/bin:/usr/bin;${unixtools.procps}/bin/ps lax" \ 29 --replace "last | head -50" "${util-linux}/bin/last | ${coreutils}/bin/head -50" \ 30 - --replace "uptime;netstat -n;hostname;date;w" "${coreutils}/bin/uptime; ${unixtools.nettools}/bin/netstat -n; ${unixtools.nettools}/bin/hostname; ${coreutils}/bin/date; ${procps}/bin/w" 31 ''; 32 33 buildInputs = [
··· 27 --replace "ls -lu /etc/. /tmp/. / /usr/. /bin/. /usr/bin/." "${coreutils}/bin/ls -lu /etc/. /tmp/. / /usr/. /bin/. /usr/bin/." \ 28 --replace "PATH=/usr/ucb:/bin:/usr/bin;ps lax" "PATH=/usr/ucb:/bin:/usr/bin;${unixtools.procps}/bin/ps lax" \ 29 --replace "last | head -50" "${util-linux}/bin/last | ${coreutils}/bin/head -50" \ 30 + --replace "uptime;netstat -n;hostname;date;w" "${coreutils}/bin/uptime; ${unixtools.net-tools}/bin/netstat -n; ${unixtools.net-tools}/bin/hostname; ${coreutils}/bin/date; ${procps}/bin/w" 31 ''; 32 33 buildInputs = [
+2 -2
pkgs/by-name/pi/pihole/package.nix
··· 19 locale, 20 ncurses, 21 netcat, 22 - nettools, 23 pihole-ftl, 24 procps, 25 resholve, ··· 119 locale 120 ncurses 121 netcat 122 - nettools 123 pihole-ftl 124 procps 125 sqlite
··· 19 locale, 20 ncurses, 21 netcat, 22 + net-tools, 23 pihole-ftl, 24 procps, 25 resholve, ··· 119 locale 120 ncurses 121 netcat 122 + net-tools 123 pihole-ftl 124 procps 125 sqlite
+2 -2
pkgs/by-name/rc/rcu/package.nix
··· 11 gnutar, 12 libsForQt5, 13 makeDesktopItem, 14 - nettools, 15 protobuf, 16 python312Packages, 17 system-config-printer, ··· 156 + lib.optionalString stdenv.hostPlatform.isLinux '' 157 --prefix PATH : ${ 158 lib.makeBinPath [ 159 - nettools 160 system-config-printer 161 ] 162 }
··· 11 gnutar, 12 libsForQt5, 13 makeDesktopItem, 14 + net-tools, 15 protobuf, 16 python312Packages, 17 system-config-printer, ··· 156 + lib.optionalString stdenv.hostPlatform.isLinux '' 157 --prefix PATH : ${ 158 lib.makeBinPath [ 159 + net-tools 160 system-config-printer 161 ] 162 }
+2 -2
pkgs/by-name/si/signing-party/package.nix
··· 13 which, 14 getopt, 15 libpaper, 16 - nettools, 17 qprint, 18 sendmailPath ? "/run/wrappers/bin/sendmail", 19 }: ··· 178 --prefix PATH ":" \ 179 "${ 180 lib.makeBinPath [ 181 - nettools 182 gnupg 183 ] 184 }"
··· 13 which, 14 getopt, 15 libpaper, 16 + net-tools, 17 qprint, 18 sendmailPath ? "/run/wrappers/bin/sendmail", 19 }: ··· 178 --prefix PATH ":" \ 179 "${ 180 lib.makeBinPath [ 181 + net-tools 182 gnupg 183 ] 184 }"
+2 -2
pkgs/by-name/so/socat/package.nix
··· 1 { 2 lib, 3 fetchurl, 4 - nettools, 5 openssl, 6 readline, 7 stdenv, ··· 44 45 nativeCheckInputs = [ 46 which 47 - nettools 48 ]; 49 doCheck = false; # fails a bunch, hangs 50
··· 1 { 2 lib, 3 fetchurl, 4 + net-tools, 5 openssl, 6 readline, 7 stdenv, ··· 44 45 nativeCheckInputs = [ 46 which 47 + net-tools 48 ]; 49 doCheck = false; # fails a bunch, hangs 50
+2 -2
pkgs/by-name/ss/sshuttle/package.nix
··· 8 sphinx, 9 coreutils, 10 iptables, 11 - nettools, 12 openssh, 13 procps, 14 }: ··· 55 ] 56 ++ lib.optionals stdenv.hostPlatform.isLinux [ 57 iptables 58 - nettools 59 ] 60 ) 61 }" \
··· 8 sphinx, 9 coreutils, 10 iptables, 11 + net-tools, 12 openssh, 13 procps, 14 }: ··· 55 ] 56 ++ lib.optionals stdenv.hostPlatform.isLinux [ 57 iptables 58 + net-tools 59 ] 60 ) 61 }" \
+2 -2
pkgs/by-name/te/testssl/package.nix
··· 6 dnsutils, 7 coreutils, 8 openssl, 9 - nettools, 10 util-linux, 11 procps, 12 }: ··· 26 buildInputs = [ 27 coreutils # for printf 28 dnsutils # for dig 29 - nettools # for hostname 30 openssl # for openssl 31 procps # for ps 32 util-linux # for hexdump
··· 6 dnsutils, 7 coreutils, 8 openssl, 9 + net-tools, 10 util-linux, 11 procps, 12 }: ··· 26 buildInputs = [ 27 coreutils # for printf 28 dnsutils # for dig 29 + net-tools # for hostname 30 openssl # for openssl 31 procps # for ps 32 util-linux # for hexdump
+2 -2
pkgs/by-name/un/unhide/package.nix
··· 6 cmake, 7 iproute2, 8 lsof, 9 - nettools, 10 pkg-config, 11 procps, 12 psmisc, ··· 47 buildInputs = [ 48 iproute2 49 lsof 50 - nettools 51 procps 52 psmisc 53 ];
··· 6 cmake, 7 iproute2, 8 lsof, 9 + net-tools, 10 pkg-config, 11 procps, 12 psmisc, ··· 47 buildInputs = [ 48 iproute2 49 lsof 50 + net-tools 51 procps 52 psmisc 53 ];
+2 -2
pkgs/by-name/un/unix-privesc-check/package.nix
··· 11 glibc, 12 gnugrep, 13 gnused, 14 - nettools, 15 openssh, 16 postgresql, 17 ps, ··· 48 glibc # for ldd command 49 gnugrep 50 gnused 51 - nettools 52 openssh 53 postgresql # for psql command 54 ps
··· 11 glibc, 12 gnugrep, 13 gnused, 14 + net-tools, 15 openssh, 16 postgresql, 17 ps, ··· 48 glibc # for ldd command 49 gnugrep 50 gnused 51 + net-tools 52 openssh 53 postgresql # for psql command 54 ps
+1 -1
pkgs/by-name/un/unixbench/package.nix
··· 59 runtimeDependencies = 60 [ 61 coreutils 62 - unixtools.nettools 63 unixtools.locale 64 targetPackages.stdenv.cc 65 gnugrep
··· 59 runtimeDependencies = 60 [ 61 coreutils 62 + unixtools.net-tools 63 unixtools.locale 64 targetPackages.stdenv.cc 65 gnugrep
+2 -2
pkgs/by-name/vp/vpnc-scripts/package.nix
··· 7 gnugrep, 8 iproute2, 9 makeWrapper, 10 - nettools, 11 openresolv, 12 systemd, 13 withSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd, ··· 48 --prefix PATH : "${ 49 lib.makeBinPath ( 50 [ 51 - nettools 52 gawk 53 coreutils 54 gnugrep
··· 7 gnugrep, 8 iproute2, 9 makeWrapper, 10 + net-tools, 11 openresolv, 12 systemd, 13 withSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd, ··· 48 --prefix PATH : "${ 49 lib.makeBinPath ( 50 [ 51 + net-tools 52 gawk 53 coreutils 54 gnugrep
+2 -2
pkgs/by-name/x2/x2goserver/package.nix
··· 15 gnugrep, 16 findutils, 17 xorg, 18 - nettools, 19 iproute2, 20 bc, 21 procps, ··· 77 gnused 78 gnugrep 79 findutils 80 - nettools 81 iproute2 82 bc 83 procps
··· 15 gnugrep, 16 findutils, 17 xorg, 18 + net-tools, 19 iproute2, 20 bc, 21 procps, ··· 77 gnused 78 gnugrep 79 findutils 80 + net-tools 81 iproute2 82 bc 83 procps
+3 -3
pkgs/by-name/xd/xdg-utils/package.nix
··· 22 gnugrep, 23 gnused, 24 jq, 25 - nettools, 26 procps, 27 which, 28 xdg-user-dirs, ··· 166 scripts = [ "bin/xdg-open" ]; 167 interpreter = "${bash}/bin/bash"; 168 inputs = commonDeps ++ [ 169 - nettools 170 glib.bin 171 "${placeholder "out"}/bin" 172 ]; ··· 206 scripts = [ "bin/xdg-screensaver" ]; 207 interpreter = "${bash}/bin/bash"; 208 inputs = commonDeps ++ [ 209 - nettools 210 perl 211 procps 212 ];
··· 22 gnugrep, 23 gnused, 24 jq, 25 + net-tools, 26 procps, 27 which, 28 xdg-user-dirs, ··· 166 scripts = [ "bin/xdg-open" ]; 167 interpreter = "${bash}/bin/bash"; 168 inputs = commonDeps ++ [ 169 + net-tools 170 glib.bin 171 "${placeholder "out"}/bin" 172 ]; ··· 206 scripts = [ "bin/xdg-screensaver" ]; 207 interpreter = "${bash}/bin/bash"; 208 inputs = commonDeps ++ [ 209 + net-tools 210 perl 211 procps 212 ];
+5 -5
pkgs/development/haskell-modules/cabal2nix-unstable.nix
··· 3 mkDerivation, 4 aeson, 5 ansi-terminal, 6 - ansi-wl-pprint, 7 base, 8 bytestring, 9 Cabal, ··· 24 mtl, 25 optparse-applicative, 26 pretty, 27 process, 28 split, 29 tasty, ··· 35 }: 36 mkDerivation { 37 pname = "cabal2nix"; 38 - version = "unstable-2025-04-30"; 39 src = fetchzip { 40 - url = "https://github.com/NixOS/cabal2nix/archive/fbe593fe71b916861b97117dfb91f7aae9c4fcce.tar.gz"; 41 - sha256 = "0sdyyawsz5zl2ffg4h4r3xcf73gfz9v0vgahccbp01if3m2g7p0y"; 42 }; 43 postUnpack = "sourceRoot+=/cabal2nix; echo source root reset to $sourceRoot"; 44 isLibrary = true; ··· 46 libraryHaskellDepends = [ 47 aeson 48 ansi-terminal 49 - ansi-wl-pprint 50 base 51 bytestring 52 Cabal ··· 62 lens 63 optparse-applicative 64 pretty 65 process 66 split 67 text
··· 3 mkDerivation, 4 aeson, 5 ansi-terminal, 6 base, 7 bytestring, 8 Cabal, ··· 23 mtl, 24 optparse-applicative, 25 pretty, 26 + prettyprinter, 27 process, 28 split, 29 tasty, ··· 35 }: 36 mkDerivation { 37 pname = "cabal2nix"; 38 + version = "unstable-2025-06-14"; 39 src = fetchzip { 40 + url = "https://github.com/NixOS/cabal2nix/archive/e9e2ebd9ab5c89c6cd55dd2c568dd46086f2addb.tar.gz"; 41 + sha256 = "0in0vab4vihamdhf0zs8y22dwm7h4fqzryq47cxb48cxg29rfz9y"; 42 }; 43 postUnpack = "sourceRoot+=/cabal2nix; echo source root reset to $sourceRoot"; 44 isLibrary = true; ··· 46 libraryHaskellDepends = [ 47 aeson 48 ansi-terminal 49 base 50 bytestring 51 Cabal ··· 61 lens 62 optparse-applicative 63 pretty 64 + prettyprinter 65 process 66 split 67 text
+119 -136
pkgs/development/haskell-modules/hackage-packages.nix
··· 420936 } 420937 ) { }; 420938 420939 - "liquid-fixpoint" = 420940 - callPackage 420941 - ( 420942 - { 420943 - mkDerivation, 420944 - aeson, 420945 - ansi-terminal, 420946 - array, 420947 - ascii-progress, 420948 - async, 420949 - attoparsec, 420950 - base, 420951 - binary, 420952 - boxes, 420953 - bytestring, 420954 - cereal, 420955 - cmdargs, 420956 - containers, 420957 - deepseq, 420958 - directory, 420959 - fgl, 420960 - filepath, 420961 - git, 420962 - hashable, 420963 - intern, 420964 - lens-family, 420965 - megaparsec, 420966 - mtl, 420967 - nettools, 420968 - optparse-applicative, 420969 - parallel, 420970 - parser-combinators, 420971 - pretty, 420972 - process, 420973 - rest-rewrite, 420974 - smtlib-backends, 420975 - smtlib-backends-process, 420976 - stm, 420977 - store, 420978 - syb, 420979 - tagged, 420980 - tasty, 420981 - tasty-ant-xml, 420982 - tasty-hunit, 420983 - tasty-quickcheck, 420984 - tasty-rerun, 420985 - text, 420986 - transformers, 420987 - unordered-containers, 420988 - vector, 420989 - z3, 420990 - }: 420991 - mkDerivation { 420992 - pname = "liquid-fixpoint"; 420993 - version = "0.9.6.3.3"; 420994 - sha256 = "07dpgi5iwi1kf182vpcy5h3xq3bjxsvp16ayafbr0wv8wxg6l5ib"; 420995 - configureFlags = [ "-fbuild-external" ]; 420996 - isLibrary = true; 420997 - isExecutable = true; 420998 - libraryHaskellDepends = [ 420999 - aeson 421000 - ansi-terminal 421001 - array 421002 - ascii-progress 421003 - async 421004 - attoparsec 421005 - base 421006 - binary 421007 - boxes 421008 - bytestring 421009 - cereal 421010 - cmdargs 421011 - containers 421012 - deepseq 421013 - directory 421014 - fgl 421015 - filepath 421016 - hashable 421017 - intern 421018 - lens-family 421019 - megaparsec 421020 - mtl 421021 - parallel 421022 - parser-combinators 421023 - pretty 421024 - process 421025 - rest-rewrite 421026 - smtlib-backends 421027 - smtlib-backends-process 421028 - stm 421029 - store 421030 - syb 421031 - text 421032 - transformers 421033 - unordered-containers 421034 - vector 421035 - ]; 421036 - executableHaskellDepends = [ base ]; 421037 - testHaskellDepends = [ 421038 - base 421039 - containers 421040 - directory 421041 - filepath 421042 - hashable 421043 - mtl 421044 - optparse-applicative 421045 - process 421046 - stm 421047 - tagged 421048 - tasty 421049 - tasty-ant-xml 421050 - tasty-hunit 421051 - tasty-quickcheck 421052 - tasty-rerun 421053 - text 421054 - transformers 421055 - unordered-containers 421056 - ]; 421057 - testSystemDepends = [ 421058 - git 421059 - nettools 421060 - z3 421061 - ]; 421062 - doCheck = false; 421063 - description = "Predicate Abstraction-based Horn-Clause/Implication Constraint Solver"; 421064 - license = lib.licenses.bsd3; 421065 - hydraPlatforms = lib.platforms.none; 421066 - mainProgram = "fixpoint"; 421067 - broken = true; 421068 - } 421069 - ) 421070 - { 421071 - inherit (pkgs) git; 421072 - inherit (pkgs) nettools; 421073 - inherit (pkgs) z3; 421074 - }; 421075 421076 "liquid-ghc-prim" = callPackage ( 421077 {
··· 420936 } 420937 ) { }; 420938 420939 + "liquid-fixpoint" = callPackage ( 420940 + { 420941 + mkDerivation, 420942 + aeson, 420943 + ansi-terminal, 420944 + array, 420945 + ascii-progress, 420946 + async, 420947 + attoparsec, 420948 + base, 420949 + binary, 420950 + boxes, 420951 + bytestring, 420952 + cereal, 420953 + cmdargs, 420954 + containers, 420955 + deepseq, 420956 + directory, 420957 + fgl, 420958 + filepath, 420959 + hashable, 420960 + intern, 420961 + lens-family, 420962 + megaparsec, 420963 + mtl, 420964 + optparse-applicative, 420965 + parallel, 420966 + parser-combinators, 420967 + pretty, 420968 + process, 420969 + rest-rewrite, 420970 + smtlib-backends, 420971 + smtlib-backends-process, 420972 + stm, 420973 + store, 420974 + syb, 420975 + tagged, 420976 + tasty, 420977 + tasty-ant-xml, 420978 + tasty-hunit, 420979 + tasty-quickcheck, 420980 + tasty-rerun, 420981 + text, 420982 + transformers, 420983 + unordered-containers, 420984 + vector, 420985 + }: 420986 + mkDerivation { 420987 + pname = "liquid-fixpoint"; 420988 + version = "0.9.6.3.3"; 420989 + sha256 = "07dpgi5iwi1kf182vpcy5h3xq3bjxsvp16ayafbr0wv8wxg6l5ib"; 420990 + isLibrary = true; 420991 + isExecutable = true; 420992 + libraryHaskellDepends = [ 420993 + aeson 420994 + ansi-terminal 420995 + array 420996 + ascii-progress 420997 + async 420998 + attoparsec 420999 + base 421000 + binary 421001 + boxes 421002 + bytestring 421003 + cereal 421004 + cmdargs 421005 + containers 421006 + deepseq 421007 + directory 421008 + fgl 421009 + filepath 421010 + hashable 421011 + intern 421012 + lens-family 421013 + megaparsec 421014 + mtl 421015 + parallel 421016 + parser-combinators 421017 + pretty 421018 + process 421019 + rest-rewrite 421020 + smtlib-backends 421021 + smtlib-backends-process 421022 + stm 421023 + store 421024 + syb 421025 + text 421026 + transformers 421027 + unordered-containers 421028 + vector 421029 + ]; 421030 + executableHaskellDepends = [ base ]; 421031 + testHaskellDepends = [ 421032 + base 421033 + containers 421034 + directory 421035 + filepath 421036 + hashable 421037 + mtl 421038 + optparse-applicative 421039 + process 421040 + stm 421041 + tagged 421042 + tasty 421043 + tasty-ant-xml 421044 + tasty-hunit 421045 + tasty-quickcheck 421046 + tasty-rerun 421047 + text 421048 + transformers 421049 + unordered-containers 421050 + ]; 421051 + description = "Predicate Abstraction-based Horn-Clause/Implication Constraint Solver"; 421052 + license = lib.licenses.bsd3; 421053 + hydraPlatforms = lib.platforms.none; 421054 + mainProgram = "fixpoint"; 421055 + broken = true; 421056 + } 421057 + ) { }; 421058 421059 "liquid-ghc-prim" = callPackage ( 421060 {
+2 -2
pkgs/development/libraries/gnutls/default.nix
··· 21 tpmSupport ? false, 22 trousers, 23 which, 24 - nettools, 25 libunistring, 26 withP11-kit ? !stdenv.hostPlatform.isStatic, 27 p11-kit, ··· 163 ] 164 ++ lib.optionals doCheck [ 165 which 166 - nettools 167 util-linux 168 ]; 169
··· 21 tpmSupport ? false, 22 trousers, 23 which, 24 + net-tools, 25 libunistring, 26 withP11-kit ? !stdenv.hostPlatform.isStatic, 27 p11-kit, ··· 163 ] 164 ++ lib.optionals doCheck [ 165 which 166 + net-tools 167 util-linux 168 ]; 169
+2 -2
pkgs/development/python-modules/django-cacheops/default.nix
··· 14 jinja2, 15 before-after, 16 pythonOlder, 17 - nettools, 18 pkgs, 19 setuptools, 20 }: ··· 52 dill 53 jinja2 54 before-after 55 - nettools 56 pkgs.valkey 57 redisTestHook 58 ];
··· 14 jinja2, 15 before-after, 16 pythonOlder, 17 + net-tools, 18 pkgs, 19 setuptools, 20 }: ··· 52 dill 53 jinja2 54 before-after 55 + net-tools 56 pkgs.valkey 57 redisTestHook 58 ];
+3 -3
pkgs/development/python-modules/ethtool/default.nix
··· 6 setuptools, 7 pkg-config, 8 libnl, 9 - nettools, 10 pytestCheckHook, 11 }: 12 ··· 32 33 postPatch = '' 34 substituteInPlace tests/parse_ifconfig.py \ 35 - --replace-fail "Popen('ifconfig'," "Popen('${lib.getExe' nettools "ifconfig"}'," 36 ''; 37 38 build-system = [ setuptools ]; ··· 44 pythonImportsCheck = [ "ethtool" ]; 45 46 nativeCheckInputs = [ 47 - nettools 48 pytestCheckHook 49 ]; 50
··· 6 setuptools, 7 pkg-config, 8 libnl, 9 + net-tools, 10 pytestCheckHook, 11 }: 12 ··· 32 33 postPatch = '' 34 substituteInPlace tests/parse_ifconfig.py \ 35 + --replace-fail "Popen('ifconfig'," "Popen('${lib.getExe' net-tools "ifconfig"}'," 36 ''; 37 38 build-system = [ setuptools ]; ··· 44 pythonImportsCheck = [ "ethtool" ]; 45 46 nativeCheckInputs = [ 47 + net-tools 48 pytestCheckHook 49 ]; 50
+2 -2
pkgs/development/python-modules/jaraco-net/default.nix
··· 28 importlib-resources, 29 pyparsing, 30 pytest-responses, 31 - nettools, 32 }: 33 34 buildPythonPackage rec { ··· 76 importlib-resources 77 pyparsing 78 pytest-responses 79 - ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ nettools ]; 80 81 disabledTestPaths = [ 82 # require networking
··· 28 importlib-resources, 29 pyparsing, 30 pytest-responses, 31 + net-tools, 32 }: 33 34 buildPythonPackage rec { ··· 76 importlib-resources 77 pyparsing 78 pytest-responses 79 + ] ++ lib.optionals stdenv.hostPlatform.isDarwin [ net-tools ]; 80 81 disabledTestPaths = [ 82 # require networking
+2 -2
pkgs/development/python-modules/magic-wormhole/default.nix
··· 29 noiseprotocol, 30 31 # tests 32 - nettools, 33 unixtools, 34 magic-wormhole-transit-relay, 35 magic-wormhole-mailbox-server, ··· 60 '' 61 # fix the location of the ifconfig binary 62 + lib.optionalString stdenv.hostPlatform.isLinux '' 63 - sed -i -e "s|'ifconfig'|'${nettools}/bin/ifconfig'|" src/wormhole/ipaddrs.py 64 ''; 65 66 build-system = [
··· 29 noiseprotocol, 30 31 # tests 32 + net-tools, 33 unixtools, 34 magic-wormhole-transit-relay, 35 magic-wormhole-mailbox-server, ··· 60 '' 61 # fix the location of the ifconfig binary 62 + lib.optionalString stdenv.hostPlatform.isLinux '' 63 + sed -i -e "s|'ifconfig'|'${net-tools}/bin/ifconfig'|" src/wormhole/ipaddrs.py 64 ''; 65 66 build-system = [
+2 -2
pkgs/development/python-modules/pytap2/default.nix
··· 1 { 2 lib, 3 buildPythonPackage, 4 - nettools, 5 fetchFromGitHub, 6 pytestCheckHook, 7 pythonOlder, ··· 21 hash = "sha256-GN8yFnS7HVgIP73/nVtYnwwhCBI9doGHLGSOaFiWIdw="; 22 }; 23 24 - propagatedBuildInputs = [ nettools ]; 25 26 nativeCheckInputs = [ pytestCheckHook ]; 27
··· 1 { 2 lib, 3 buildPythonPackage, 4 + net-tools, 5 fetchFromGitHub, 6 pytestCheckHook, 7 pythonOlder, ··· 21 hash = "sha256-GN8yFnS7HVgIP73/nVtYnwwhCBI9doGHLGSOaFiWIdw="; 22 }; 23 24 + propagatedBuildInputs = [ net-tools ]; 25 26 nativeCheckInputs = [ pytestCheckHook ]; 27
+2 -2
pkgs/os-specific/linux/kernel/manual-config.nix
··· 3 stdenv, 4 buildPackages, 5 runCommand, 6 - nettools, 7 bc, 8 bison, 9 flex, ··· 214 flex 215 perl 216 bc 217 - nettools 218 openssl 219 rsync 220 gmp
··· 3 stdenv, 4 buildPackages, 5 runCommand, 6 + net-tools, 7 bc, 8 bison, 9 flex, ··· 214 flex 215 perl 216 bc 217 + net-tools 218 openssl 219 rsync 220 gmp
+2 -2
pkgs/servers/web-apps/discourse/default.nix
··· 17 cacert, 18 util-linux, 19 gawk, 20 - nettools, 21 imagemagick, 22 optipng, 23 pngquant, ··· 72 procps # For ps and kill 73 util-linux # For renice 74 gawk 75 - nettools # For hostname 76 77 # Image optimization 78 imagemagick
··· 17 cacert, 18 util-linux, 19 gawk, 20 + net-tools, 21 imagemagick, 22 optipng, 23 pngquant, ··· 72 procps # For ps and kill 73 util-linux # For renice 74 gawk 75 + net-tools # For hostname 76 77 # Image optimization 78 imagemagick
+2 -2
pkgs/tools/networking/mailutils/default.nix
··· 16 guile_2_2, 17 libmysqlclient, 18 mailcap, 19 - nettools, 20 pam, 21 readline, 22 ncurses, ··· 70 sasl 71 libxcrypt 72 ] 73 - ++ lib.optionals stdenv.hostPlatform.isLinux [ nettools ] 74 ++ lib.optionals pythonSupport [ python3 ] 75 ++ lib.optionals guileSupport [ guile_2_2 ]; 76
··· 16 guile_2_2, 17 libmysqlclient, 18 mailcap, 19 + net-tools, 20 pam, 21 readline, 22 ncurses, ··· 70 sasl 71 libxcrypt 72 ] 73 + ++ lib.optionals stdenv.hostPlatform.isLinux [ net-tools ] 74 ++ lib.optionals pythonSupport [ python3 ] 75 ++ lib.optionals guileSupport [ guile_2_2 ]; 76
+1
pkgs/top-level/aliases.nix
··· 1323 netbox_3_3 = throw "netbox 3.3 series has been removed as it was EOL"; # Added 2023-09-02 1324 netbox_3_5 = throw "netbox 3.5 series has been removed as it was EOL"; # Added 2024-01-22 1325 netbox_3_7 = throw "netbox 3.7 series has been removed as it was EOL"; # Added 2025-04-23 1326 nextcloud29 = throw '' 1327 Nextcloud v29 has been removed from `nixpkgs` as the support for is dropped 1328 by upstream in 2025-04. Please upgrade to at least Nextcloud v30 by declaring
··· 1323 netbox_3_3 = throw "netbox 3.3 series has been removed as it was EOL"; # Added 2023-09-02 1324 netbox_3_5 = throw "netbox 3.5 series has been removed as it was EOL"; # Added 2024-01-22 1325 netbox_3_7 = throw "netbox 3.7 series has been removed as it was EOL"; # Added 2025-04-23 1326 + nettools = net-tools; # Added 2025-06-11 1327 nextcloud29 = throw '' 1328 Nextcloud v29 has been removed from `nixpkgs` as the support for is dropped 1329 by upstream in 2025-04. Please upgrade to at least Nextcloud v30 by declaring
+2 -2
pkgs/top-level/all-packages.nix
··· 11213 } 11214 ); 11215 11216 - nettools = 11217 if stdenv.hostPlatform.isLinux then 11218 callPackage ../os-specific/linux/net-tools { } 11219 else 11220 - unixtools.nettools; 11221 11222 nftables = callPackage ../os-specific/linux/nftables { }; 11223
··· 11213 } 11214 ); 11215 11216 + net-tools = 11217 if stdenv.hostPlatform.isLinux then 11218 callPackage ../os-specific/linux/net-tools { } 11219 else 11220 + unixtools.net-tools; 11221 11222 nftables = callPackage ../os-specific/linux/nftables { }; 11223
+6 -6
pkgs/top-level/unixtools.nix
··· 79 bins = mapAttrs singleBinary { 80 # singular binaries 81 arp = { 82 - linux = pkgs.nettools; 83 darwin = pkgs.darwin.network_cmds; 84 freebsd = pkgs.freebsd.arp; 85 }; ··· 126 darwin = pkgs.darwin.shell_cmds; 127 }; 128 hostname = { 129 - linux = pkgs.nettools; 130 darwin = pkgs.darwin.shell_cmds; 131 freebsd = pkgs.freebsd.bin; 132 openbsd = pkgs.openbsd.hostname; 133 }; 134 ifconfig = { 135 - linux = pkgs.nettools; 136 darwin = pkgs.darwin.network_cmds; 137 freebsd = pkgs.freebsd.ifconfig; 138 openbsd = pkgs.openbsd.ifconfig; ··· 172 ''; 173 }; 174 netstat = { 175 - linux = pkgs.nettools; 176 darwin = pkgs.darwin.network_cmds; 177 freebsd = pkgs.freebsd.netstat; 178 }; ··· 198 darwin = pkgs.darwin.diskdev_cmds; 199 }; 200 route = { 201 - linux = pkgs.nettools; 202 darwin = pkgs.darwin.network_cmds; 203 freebsd = pkgs.freebsd.route; 204 openbsd = pkgs.openbsd.route; ··· 288 col 289 column 290 ]; 291 - nettools = [ 292 arp 293 hostname 294 ifconfig
··· 79 bins = mapAttrs singleBinary { 80 # singular binaries 81 arp = { 82 + linux = pkgs.net-tools; 83 darwin = pkgs.darwin.network_cmds; 84 freebsd = pkgs.freebsd.arp; 85 }; ··· 126 darwin = pkgs.darwin.shell_cmds; 127 }; 128 hostname = { 129 + linux = pkgs.net-tools; 130 darwin = pkgs.darwin.shell_cmds; 131 freebsd = pkgs.freebsd.bin; 132 openbsd = pkgs.openbsd.hostname; 133 }; 134 ifconfig = { 135 + linux = pkgs.net-tools; 136 darwin = pkgs.darwin.network_cmds; 137 freebsd = pkgs.freebsd.ifconfig; 138 openbsd = pkgs.openbsd.ifconfig; ··· 172 ''; 173 }; 174 netstat = { 175 + linux = pkgs.net-tools; 176 darwin = pkgs.darwin.network_cmds; 177 freebsd = pkgs.freebsd.netstat; 178 }; ··· 198 darwin = pkgs.darwin.diskdev_cmds; 199 }; 200 route = { 201 + linux = pkgs.net-tools; 202 darwin = pkgs.darwin.network_cmds; 203 freebsd = pkgs.freebsd.route; 204 openbsd = pkgs.openbsd.route; ··· 288 col 289 column 290 ]; 291 + net-tools = [ 292 arp 293 hostname 294 ifconfig