mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-01-02 11:03:57 +00:00
571c71e6f7
We are migrating packages that meet below requirements: 1. using `callPackage` 2. called path is a directory 3. overriding set is empty (`{ }`) 4. not containing path expressions other than relative path (to makenixpkgs-vet happy) 5. not referenced by nix files outside of the directory, other than`pkgs/top-level/all-packages.nix` 6. not referencing nix files outside of the directory 7. not referencing `default.nix` (since it's changed to `package.nix`) 8. `outPath` doesn't change after migration The tool is here: https://github.com/Aleksanaa/by-name-migrate.
31 lines
1000 B
Nix
31 lines
1000 B
Nix
{ lib, stdenv, fetchurl, autoreconfHook, bison, flex}:
|
|
|
|
stdenv.mkDerivation rec {
|
|
version = "2.4.3";
|
|
pname = "sshguard";
|
|
|
|
src = fetchurl {
|
|
url = "mirror://sourceforge/sshguard/${pname}-${version}.tar.gz";
|
|
sha256 = "sha256-ZAKd7/bekP3u+x9JfUFPDkBFB2aTqR2hpw63WV6X7+s=";
|
|
};
|
|
|
|
doCheck = true;
|
|
|
|
nativeBuildInputs = [ autoreconfHook bison flex ];
|
|
|
|
configureFlags = [ "--sysconfdir=/etc" ];
|
|
|
|
meta = with lib; {
|
|
description = "Protects hosts from brute-force attacks";
|
|
mainProgram = "sshguard";
|
|
longDescription = ''
|
|
SSHGuard can read log messages from various input sources. Log messages are parsed, line-by-line, for recognized patterns.
|
|
If an attack, such as several login failures within a few seconds, is detected, the offending IP is blocked.
|
|
'';
|
|
homepage = "https://sshguard.net";
|
|
license = licenses.bsd3;
|
|
maintainers = with maintainers; [ sargon ];
|
|
platforms = with platforms; linux ++ darwin ++ freebsd ++ netbsd ++ openbsd;
|
|
};
|
|
}
|