nixpkgs/pkgs/by-name/me/meek/package.nix
aleksana 571c71e6f7 treewide: migrate packages to pkgs/by-name, take 1
We are migrating packages that meet below requirements:

1. using `callPackage`
2. called path is a directory
3. overriding set is empty (`{ }`)
4. not containing path expressions other than relative path (to
makenixpkgs-vet happy)
5. not referenced by nix files outside of the directory, other
than`pkgs/top-level/all-packages.nix`
6. not referencing nix files outside of the directory
7. not referencing `default.nix` (since it's changed to `package.nix`)
8. `outPath` doesn't change after migration

The tool is here: https://github.com/Aleksanaa/by-name-migrate.
2024-11-09 20:04:51 +08:00

48 lines
1.3 KiB
Nix

{ lib
, buildGoModule
, fetchFromGitLab
, installShellFiles
}:
buildGoModule rec {
pname = "meek";
version = "0.38.0";
src = fetchFromGitLab {
domain = "gitlab.torproject.org";
group = "tpo";
owner = "anti-censorship/pluggable-transports";
repo = "meek";
rev = "v${version}";
sha256 = "sha256-zmIRXrHWrEzR+RcX/gkuqw2oBmyGoXDQ45ZjA4vwGSs=";
};
vendorHash = "sha256-eAO6vEPKqWWZkmJXmOCeTa7TE8opynYvvxzPDSe9p+I=";
subPackages = [
"meek-client"
"meek-server"
];
nativeBuildInputs = [ installShellFiles ];
postInstall = ''
installManPage doc/meek-client.1
installManPage doc/meek-server.1
'';
meta = with lib; {
description = "Blocking-resistant pluggable transport for Tor";
longDescription = ''
meek is a blocking-resistant pluggable transport for Tor. It encodes a
data stream as a sequence of HTTPS requests and responses. Requests are
reflected through a hard-to-block third-party web server in order to
avoid talking directly to a Tor bridge. HTTPS encryption hides
fingerprintable byte patterns in Tor traffic.
'';
homepage = "https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/meek";
maintainers = with maintainers; [ doronbehar ];
license = licenses.cc0;
};
}