mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-23 15:33:13 +00:00
securefs: init at 0.3.1
Caveat, as always with such things, emptor.
This commit is contained in:
parent
48b739cc25
commit
1249a4d750
42
pkgs/tools/filesystems/securefs/default.nix
Normal file
42
pkgs/tools/filesystems/securefs/default.nix
Normal file
@ -0,0 +1,42 @@
|
||||
{ stdenv, fetchFromGitHub
|
||||
, fuse }:
|
||||
|
||||
stdenv.mkDerivation rec {
|
||||
name = "securefs-${version}";
|
||||
version = "0.3.1";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
sha256 = "1n9kgrvc600lfclrk8cj2zy8md1brqhs8kvzdwfxgxavdh0wakkc";
|
||||
rev = version;
|
||||
repo = "securefs";
|
||||
owner = "netheril96";
|
||||
};
|
||||
|
||||
buildInputs = [ fuse ];
|
||||
|
||||
enableParallelBuilding = true;
|
||||
|
||||
doCheck = false; # tests require the fuse module to be loaded
|
||||
|
||||
installPhase = ''
|
||||
install -D -m0755 {.,$out/bin}/securefs
|
||||
'';
|
||||
|
||||
meta = with stdenv.lib; {
|
||||
inherit (src.meta) homepage;
|
||||
description = "Transparent encryption filesystem";
|
||||
longDescription = ''
|
||||
Securefs is a filesystem in userspace (FUSE) that transparently encrypts
|
||||
and authenticates data stored. It is particularly designed to secure
|
||||
data stored in the cloud.
|
||||
Securefs mounts a regular directory onto a mount point. The mount point
|
||||
appears as a regular filesystem, where one can read/write/create files,
|
||||
directories and symbolic links. The underlying directory will be
|
||||
automatically updated to contain the encrypted and authenticated
|
||||
contents.
|
||||
'';
|
||||
license = with licenses; [ bsd2 mit ];
|
||||
platforms = platforms.linux;
|
||||
maintainers = with maintainers; [ nckx ];
|
||||
};
|
||||
}
|
@ -3191,6 +3191,8 @@ in
|
||||
|
||||
seccure = callPackage ../tools/security/seccure { };
|
||||
|
||||
securefs = callPackage ../tools/filesystems/securefs { };
|
||||
|
||||
setroot = callPackage ../tools/X11/setroot { };
|
||||
|
||||
setserial = callPackage ../tools/system/setserial { };
|
||||
|
Loading…
Reference in New Issue
Block a user