3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/pkgs/tools/networking/opensnitch/daemon.nix

64 lines
1.7 KiB
Nix
Raw Normal View History

{ buildGoModule
, fetchFromGitHub
, fetchpatch
, pkg-config
, libnetfilter_queue
, libnfnetlink
, lib
2021-09-13 19:47:32 +01:00
, coreutils
, iptables
, makeWrapper
}:
buildGoModule rec {
pname = "opensnitch";
version = "1.3.6";
src = fetchFromGitHub {
owner = "evilsocket";
repo = "opensnitch";
rev = "v${version}";
sha256 = "sha256-Cgo+bVQQeUZuYYhA1WSqlLyQQGAeXbbNno9LS7oNvhI=";
};
patches = [
# https://github.com/evilsocket/opensnitch/pull/384 don't require
# a configuration file in /etc
(fetchpatch {
name = "dont-require-config-in-etc.patch";
url = "https://github.com/evilsocket/opensnitch/commit/8a3f63f36aa92658217bbbf46d39e6d20b2c0791.patch";
sha256 = "sha256-WkwjKTQZppR0nqvRO4xiQoKZ307NvuUwoRx+boIpuTg=";
})
];
modRoot = "daemon";
vendorSha256 = "sha256-LMwQBFkHg1sWIUITLOX2FZi5QUfOivvrkcl9ELO3Trk=";
nativeBuildInputs = [ pkg-config makeWrapper ];
buildInputs = [ libnetfilter_queue libnfnetlink ];
postBuild = ''
mv $GOPATH/bin/daemon $GOPATH/bin/opensnitchd
2021-09-13 19:47:32 +01:00
mkdir -p $out/lib/systemd/system
substitute opensnitchd.service $out/lib/systemd/system/opensnitchd.service \
--replace "/usr/local/bin/opensnitchd" "$out/bin/opensnitchd" \
2021-09-13 19:47:32 +01:00
--replace "/etc/opensnitchd/rules" "/var/lib/opensnitch/rules" \
--replace "/bin/mkdir" "${coreutils}/bin/mkdir"
'';
postInstall = ''
wrapProgram $out/bin/opensnitchd \
--prefix PATH : ${lib.makeBinPath [ iptables ]}
'';
meta = with lib; {
description = "An application firewall";
homepage = "https://github.com/evilsocket/opensnitch/wiki";
license = licenses.gpl3Only;
maintainers = [ maintainers.raboof ];
platforms = platforms.linux;
};
}