forked from mirrors/nixpkgs
diswall: init at 0.2.0
This commit is contained in:
parent
b39fd6e4ed
commit
2072485ad9
33
pkgs/applications/networking/diswall/default.nix
Normal file
33
pkgs/applications/networking/diswall/default.nix
Normal file
|
@ -0,0 +1,33 @@
|
|||
{ lib, rustPlatform, fetchFromGitHub }:
|
||||
|
||||
rustPlatform.buildRustPackage rec {
|
||||
pname = "diswall";
|
||||
version = "0.2.0";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "dis-works";
|
||||
repo = "diswall-rs";
|
||||
rev = "v${version}";
|
||||
sha256 = "sha256-zT8RRg+Ver7dYtJL9htrZ8nXoD0V7IvdIqHTKDmbZ7c=";
|
||||
};
|
||||
|
||||
cargoSha256 = "sha256-N+w1OiCy3scahFdYI49GpL301t1qNd/X4fdLMoQE/2s=";
|
||||
|
||||
doCheck = false;
|
||||
|
||||
meta = with lib; {
|
||||
description = "Distributed firewall";
|
||||
longDescription = ''
|
||||
Diswall (distributed firewall) - a client of distributed firewall
|
||||
working on many servers and using NATS for the transport level.
|
||||
Its purpose - blocking IPs with a blink of the eye on all servers
|
||||
in any infrastructure when some IP checks any of the closed ports
|
||||
of anyone of these servers. Therefore, diswall provides good
|
||||
protection of whole infrastructure (as anti-shodan) preventing
|
||||
intruder to get any system information.
|
||||
'';
|
||||
homepage = "https://www.diswall.stream";
|
||||
license = with licenses; [ gpl3 ];
|
||||
maintainers = with maintainers; [ izorkin ];
|
||||
};
|
||||
}
|
|
@ -678,6 +678,8 @@ with pkgs;
|
|||
|
||||
dispad = callPackage ../tools/X11/dispad { };
|
||||
|
||||
diswall = callPackage ../applications/networking/diswall { };
|
||||
|
||||
dupeguru = callPackage ../applications/misc/dupeguru { };
|
||||
|
||||
dump1090 = callPackage ../applications/radio/dump1090 { };
|
||||
|
|
Loading…
Reference in a new issue