mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-13 17:23:08 +00:00
571c71e6f7
We are migrating packages that meet below requirements: 1. using `callPackage` 2. called path is a directory 3. overriding set is empty (`{ }`) 4. not containing path expressions other than relative path (to makenixpkgs-vet happy) 5. not referenced by nix files outside of the directory, other than`pkgs/top-level/all-packages.nix` 6. not referencing nix files outside of the directory 7. not referencing `default.nix` (since it's changed to `package.nix`) 8. `outPath` doesn't change after migration The tool is here: https://github.com/Aleksanaa/by-name-migrate.
42 lines
1.2 KiB
Nix
42 lines
1.2 KiB
Nix
{ lib, stdenv, rustPlatform, fetchFromGitHub, darwin }:
|
|
|
|
let
|
|
inherit (darwin.apple_sdk.frameworks) Security;
|
|
in
|
|
rustPlatform.buildRustPackage rec {
|
|
pname = "diswall";
|
|
version = "0.6.0";
|
|
|
|
src = fetchFromGitHub {
|
|
owner = "dis-works";
|
|
repo = "diswall-rs";
|
|
rev = "v${version}";
|
|
sha256 = "sha256-jrifO6LRxVhgPoUOAm+7RT+LIhjsw/mEDFBZSJYMv/w=";
|
|
};
|
|
|
|
buildInputs = lib.optionals stdenv.hostPlatform.isDarwin [
|
|
Security
|
|
];
|
|
|
|
cargoHash = "sha256-1HxuVZ4J/Ds1aOIIcNa/XGi7PhKgB+iAESMa1muTL48=";
|
|
|
|
doCheck = false;
|
|
|
|
meta = with lib; {
|
|
description = "Distributed firewall";
|
|
longDescription = ''
|
|
Diswall (distributed firewall) - a client of distributed firewall
|
|
working on many servers and using NATS for the transport level.
|
|
Its purpose - blocking IPs with a blink of the eye on all servers
|
|
in any infrastructure when some IP checks any of the closed ports
|
|
of anyone of these servers. Therefore, diswall provides good
|
|
protection of whole infrastructure (as anti-shodan) preventing
|
|
intruder to get any system information.
|
|
'';
|
|
homepage = "https://www.diswall.stream";
|
|
license = with licenses; [ gpl3 ];
|
|
maintainers = with maintainers; [ izorkin ];
|
|
mainProgram = "diswall";
|
|
};
|
|
}
|