{ buildGoModule , fetchFromGitHub , fetchpatch , protobuf , go-protobuf , pkg-config , libnetfilter_queue , libnfnetlink , lib , coreutils , iptables , makeWrapper , protoc-gen-go-grpc }: buildGoModule rec { pname = "opensnitch"; version = "1.5.1"; src = fetchFromGitHub { owner = "evilsocket"; repo = "opensnitch"; rev = "v${version}"; sha256 = "sha256-8IfupmQb1romGEvv/xqFkYhp0gGoY4ZEllX6rZYIkqw="; }; patches = [ # https://github.com/evilsocket/opensnitch/pull/384 don't require # a configuration file in /etc (fetchpatch { name = "dont-require-config-in-etc.patch"; url = "https://github.com/evilsocket/opensnitch/commit/8a3f63f36aa92658217bbbf46d39e6d20b2c0791.patch"; sha256 = "sha256-WkwjKTQZppR0nqvRO4xiQoKZ307NvuUwoRx+boIpuTg="; }) ]; modRoot = "daemon"; buildInputs = [ libnetfilter_queue libnfnetlink ]; nativeBuildInputs = [ pkg-config protobuf go-protobuf makeWrapper protoc-gen-go-grpc ]; vendorSha256 = "sha256-81BKMLuEXA/NeIjO7icBm48ROq6KxAxHtvP0nV5yM5A="; preBuild = '' make -C ../proto ../daemon/ui/protocol/ui.pb.go ''; postBuild = '' mv $GOPATH/bin/daemon $GOPATH/bin/opensnitchd mkdir -p $out/etc/opensnitchd $out/lib/systemd/system cp system-fw.json $out/etc/opensnitchd/ substitute default-config.json $out/etc/default-config.json \ --replace "/var/log/opensnitchd.log" "/dev/stdout" \ --replace "iptables" "nftables" \ --replace "ebpf" "proc" substitute opensnitchd.service $out/lib/systemd/system/opensnitchd.service \ --replace "/usr/local/bin/opensnitchd" "$out/bin/opensnitchd" \ --replace "/etc/opensnitchd/rules" "/var/lib/opensnitch/rules" \ --replace "/bin/mkdir" "${coreutils}/bin/mkdir" ''; postInstall = '' wrapProgram $out/bin/opensnitchd \ --prefix PATH : ${lib.makeBinPath [ iptables ]} ''; meta = with lib; { description = "An application firewall"; homepage = "https://github.com/evilsocket/opensnitch/wiki"; license = licenses.gpl3Only; maintainers = [ maintainers.raboof ]; platforms = platforms.linux; }; }