diff options
author | Sergei Trofimovich <slyich@gmail.com> | 2022-06-18 07:58:32 +0100 |
---|---|---|
committer | Sergei Trofimovich <slyich@gmail.com> | 2022-06-18 08:00:58 +0100 |
commit | 5ee88ab21d1d16d22b768c7b40d3b7741caeff8d (patch) | |
tree | 549c0b189b5f5a52f80f7dc18223b380d1b46134 /pkgs/tools | |
parent | ac86fdf42efe6382f9d62205d922ee3628cc24c5 (diff) | |
parent | 6b99e9620ee37b55610c7f23d3e46f2baa108d23 (diff) |
Merge master into staging-next
Diffstat (limited to 'pkgs/tools')
-rw-r--r-- | pkgs/tools/misc/alarm-clock-applet/default.nix | 77 | ||||
-rw-r--r-- | pkgs/tools/misc/mongodb-tools/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/misc/ntfy-sh/default.nix | 6 | ||||
-rw-r--r-- | pkgs/tools/misc/plocate/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/security/adenum/default.nix | 48 | ||||
-rw-r--r-- | pkgs/tools/security/fpm2/default.nix | 16 | ||||
-rw-r--r-- | pkgs/tools/security/kdigger/default.nix | 82 | ||||
-rw-r--r-- | pkgs/tools/security/kubescape/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/virtualization/awless/default.nix | 26 |
9 files changed, 145 insertions, 120 deletions
diff --git a/pkgs/tools/misc/alarm-clock-applet/default.nix b/pkgs/tools/misc/alarm-clock-applet/default.nix deleted file mode 100644 index 7bf58bb2ff399..0000000000000 --- a/pkgs/tools/misc/alarm-clock-applet/default.nix +++ /dev/null @@ -1,77 +0,0 @@ -{ lib, stdenv, fetchFromGitHub, fetchpatch -, pkg-config -, autoconf -, automake111x -, libtool - -, glib -, gtk2 -, gst_all_1 -, gnome2 -, gnome-icon-theme -, libnotify -, libxml2 -, libunique -, intltool -, gst_plugins ? with gst_all_1; [ gst-plugins-base gst-plugins-good gst-plugins-ugly ] -, wrapGAppsHook -}: - -stdenv.mkDerivation rec { - version = "0.3.4"; - pname = "alarm-clock-applet"; - - src = fetchFromGitHub { - owner = "joh"; - repo = "alarm-clock"; - rev = version; - sha256 = "18blvgy8hmw3jidz7xrv9yiiilnzcj65m6wxhw58nrnbcqbpydwn"; - }; - - patches = [ - # Pull patch pending upstream inclusion for -fno-common toolchain support: - # https://github.com/joh/alarm-clock/pull/209 - (fetchpatch { - name = "fno-common.patch"; - url = "https://github.com/joh/alarm-clock/commit/969e7ba8225610cce55b14fcb599bc6f7771bd9a.patch"; - sha256 = "0ajhir22b5ww9pkmzy9mlc9f2lr1q6wgvm9iqzjf4xsg4gm4jy1k"; - }) - ]; - - nativeBuildInputs = [ - pkg-config - intltool - automake111x - autoconf - libtool - - gnome2.gnome-common - - wrapGAppsHook - ]; - - preConfigure = "./autogen.sh"; - - buildInputs = [ - glib - gtk2 - gst_all_1.gstreamer - gnome2.GConf - gnome-icon-theme - libnotify - libxml2 - libunique - ] ++ gst_plugins; - - propagatedUserEnvPkgs = [ gnome2.GConf.out ]; - - enableParallelBuilding = true; - - meta = with lib; { - homepage = "http://alarm-clock.pseudoberries.com/"; - description = "A fully-featured alarm clock for your GNOME panel or equivalent"; - license = licenses.gpl2; - platforms = platforms.linux; - maintainers = [ maintainers.rasendubi ]; - }; -} diff --git a/pkgs/tools/misc/mongodb-tools/default.nix b/pkgs/tools/misc/mongodb-tools/default.nix index b59a466e3d17a..4ede64b83aa1a 100644 --- a/pkgs/tools/misc/mongodb-tools/default.nix +++ b/pkgs/tools/misc/mongodb-tools/default.nix @@ -17,7 +17,7 @@ let "mongofiles" "mongotop" ]; - version = "100.5.2"; + version = "100.5.3"; in buildGoPackage { pname = "mongo-tools"; @@ -30,7 +30,7 @@ in buildGoPackage { rev = version; owner = "mongodb"; repo = "mongo-tools"; - sha256 = "sha256-qYTfC7+5XWDCyQQFKmuPmDmwsekDdY6OAerxZgzf8D0="; + sha256 = "sha256-8RkpBCFVxKVsu4h2z+rhlwvYfbSDHZUg8erO4+2GRbw="; }; nativeBuildInputs = [ pkg-config ]; diff --git a/pkgs/tools/misc/ntfy-sh/default.nix b/pkgs/tools/misc/ntfy-sh/default.nix index 29e09c25b43ef..fe5c8f56168e9 100644 --- a/pkgs/tools/misc/ntfy-sh/default.nix +++ b/pkgs/tools/misc/ntfy-sh/default.nix @@ -2,16 +2,16 @@ buildGoModule rec { pname = "ntfy-sh"; - version = "1.25.2"; + version = "1.26.0"; src = fetchFromGitHub { owner = "binwiederhier"; repo = "ntfy"; rev = "v${version}"; - sha256 = "sha256-xf0hk2GpBbjovZ1DIG6unnKQ297p8fjKZmgk/23IKdY="; + sha256 = "sha256-LR3orzh/xwmxt5RhmjOacFs8NUp6tKPUwYDdzVFhx4k="; }; - vendorSha256 = "sha256-ZZdGve6+g0bhE+iqemWl9XtLRfUn4V3hbdVz/UhrxCA="; + vendorSha256 = "sha256-16S3Up1D4PycBY2Wk11cm0F4z5PkQL2reXj1mGpsOv4="; doCheck = false; diff --git a/pkgs/tools/misc/plocate/default.nix b/pkgs/tools/misc/plocate/default.nix index f4504a73637e1..468b2ca7842b2 100644 --- a/pkgs/tools/misc/plocate/default.nix +++ b/pkgs/tools/misc/plocate/default.nix @@ -14,12 +14,12 @@ let in stdenv.mkDerivation rec { pname = "plocate"; - version = "1.1.15"; + version = "1.1.16"; src = fetchgit { url = "https://git.sesse.net/plocate"; rev = version; - sha256 = "sha256-r8/LivQhJkMTE8ejznr+eGplXFrQl4xwCgXOwbR4wlw="; + sha256 = "sha256-rwvzDr3leve8BQ30+c3l1+q/7+u7FhPQ7iFcvbx/HjM="; }; postPatch = '' diff --git a/pkgs/tools/security/adenum/default.nix b/pkgs/tools/security/adenum/default.nix new file mode 100644 index 0000000000000..8bcac264d95de --- /dev/null +++ b/pkgs/tools/security/adenum/default.nix @@ -0,0 +1,48 @@ +{ lib +, stdenv +, fetchFromGitHub +, john +, python3 +}: + +python3.pkgs.buildPythonApplication rec { + pname = "adenum"; + version = "unstable-2022-04-01"; + format = "other"; + + src = fetchFromGitHub { + owner = "SecuProject"; + repo = "ADenum"; + rev = "0e3576eca1d987d3ef22d53fc725189bb301e804"; + hash = "sha256-8s4Kmt4ZjYbQGGVDWKfuRZ6kthcL8FiQytoq9Koy7Kc="; + }; + + propagatedBuildInputs = with python3.pkgs; [ + impacket + pwntools + ldap + ] ++ [ + john + ]; + + installPhase = '' + runHook preInstall + + # Add shebang so we can patch it + sed -i -e '1i#!/usr/bin/python' ADenum.py + patchShebangs ADenum.py + install -vD ADenum.py $out/bin/adenum + + runHook postInstall + ''; + + # Project has no tests + doCheck = false; + + meta = with lib; { + description = "Tool to find misconfiguration through LDAP"; + homepage = "https://github.com/SecuProject/ADenum"; + license = with licenses; [ gpl3Only ]; + maintainers = with maintainers; [ fab ]; + }; +} diff --git a/pkgs/tools/security/fpm2/default.nix b/pkgs/tools/security/fpm2/default.nix index 0ca45957d695f..15d5a5adcffb2 100644 --- a/pkgs/tools/security/fpm2/default.nix +++ b/pkgs/tools/security/fpm2/default.nix @@ -1,22 +1,20 @@ -{ lib, stdenv, fetchurl, pkg-config, gnupg, gtk2 -, libxml2, intltool +{ lib, stdenv, fetchurl, pkg-config, gnupg, gtk3 +, libxml2, intltool, nettle }: -with lib; - stdenv.mkDerivation rec { pname = "fpm2"; - version = "0.79"; + version = "0.90"; src = fetchurl { - url = "https://als.regnet.cz/fpm2/download/fpm2-${version}.tar.bz2"; - sha256 = "d55e9ce6be38a44fc1053d82db2d117cf3991a51898bd86d7913bae769f04da7"; + url = "https://als.regnet.cz/fpm2/download/fpm2-${version}.tar.xz"; + sha256 = "1lfzja3vzd6l6hfvw8gvg4qkl5iy6gra5pa8gjlps9l63k2bjfhz"; }; nativeBuildInputs = [ pkg-config ]; - buildInputs = [ gnupg gtk2 libxml2 intltool ]; + buildInputs = [ gnupg gtk3 libxml2 intltool nettle ]; - meta = { + meta = with lib; { description = "GTK2 port from Figaro's Password Manager originally developed by John Conneely, with some new enhancements"; homepage = "https://als.regnet.cz/fpm2/"; license = licenses.gpl2; diff --git a/pkgs/tools/security/kdigger/default.nix b/pkgs/tools/security/kdigger/default.nix new file mode 100644 index 0000000000000..5067d4003274a --- /dev/null +++ b/pkgs/tools/security/kdigger/default.nix @@ -0,0 +1,82 @@ +{ lib +, stdenv +, buildGoModule +, fetchFromGitHub +, installShellFiles +, fetchpatch +}: + +buildGoModule rec { + pname = "kdigger"; + version = "1.2.0"; + + src = fetchFromGitHub { + owner = "quarkslab"; + repo = pname; + rev = "v${version}"; + sha256 = "sha256-j4HIwfRIUpV25DmbQ+9go8aJMEYaFDPxrdr/zGWBeVU="; + # populate values that require us to use git. By doing this in postFetch we + # can delete .git afterwards and maintain better reproducibility of the src. + leaveDotGit = true; + postFetch = '' + cd "$out" + git rev-parse HEAD > $out/COMMIT + find "$out" -name .git -print0 | xargs -0 rm -rf + ''; + }; + vendorSha256 = "sha256-3vn3MsE/4lBw89wgYgzm0RuJJ5RQTkgS6O74PpfFcUk="; + + patches = [ + (fetchpatch { + name = "simplify-ldflags.patch"; + url = "https://github.com/quarkslab/kdigger/pull/2.patch"; + sha256 = "sha256-d/NdoAdnheVgdqr2EF2rNn3gJvbjRZtOKFw2DqWR8TY="; + }) + ]; + + nativeBuildInputs = [ installShellFiles ]; + + CGO_ENABLED = 0; + ldflags = [ + "-s" + "-w" + "-X github.com/quarkslab/kdigger/commands.VERSION=v${version}" + "-X github.com/quarkslab/kdigger/commands.BUILDERARCH=${stdenv.hostPlatform.linuxArch}" + ]; + + preBuild = '' + ldflags+=" -X github.com/quarkslab/kdigger/commands.GITCOMMIT=$(cat COMMIT)" + ''; + + postInstall = '' + installShellCompletion --cmd kdigger \ + --bash <($out/bin/kdigger completion bash) \ + --fish <($out/bin/kdigger completion fish) \ + --zsh <($out/bin/kdigger completion zsh) + ''; + + doInstallCheck = true; + installCheckPhase = '' + runHook preInstallCheck + + $out/bin/kdigger --help + + runHook postInstallCheck + ''; + + meta = with lib; { + homepage = "https://github.com/quarkslab/kdigger"; + changelog = "https://github.com/quarkslab/kdigger/releases/tag/v${version}"; + description = "An in-pod context discovery tool for Kubernetes penetration testing"; + longDescription = '' + kdigger, short for "Kubernetes digger", is a context discovery tool for + Kubernetes penetration testing. This tool is a compilation of various + plugins called buckets to facilitate pentesting Kubernetes from inside a + pod. + ''; + license = licenses.asl20; + maintainers = with maintainers; [ jk ]; + # aarch64-linux support progress - https://github.com/quarkslab/kdigger/issues/3 + platforms = [ "x86_64-linux" ]; + }; +} diff --git a/pkgs/tools/security/kubescape/default.nix b/pkgs/tools/security/kubescape/default.nix index e1d05a632dc30..a4a6969b34a59 100644 --- a/pkgs/tools/security/kubescape/default.nix +++ b/pkgs/tools/security/kubescape/default.nix @@ -6,7 +6,7 @@ buildGoModule rec { pname = "kubescape"; - version = "2.0.156"; + version = "2.0.158"; src = fetchFromGitHub { owner = "armosec"; diff --git a/pkgs/tools/virtualization/awless/default.nix b/pkgs/tools/virtualization/awless/default.nix deleted file mode 100644 index 97b3fbd1b7a67..0000000000000 --- a/pkgs/tools/virtualization/awless/default.nix +++ /dev/null @@ -1,26 +0,0 @@ -{ stdenv, lib, buildGoPackage, fetchFromGitHub }: - -buildGoPackage rec { - pname = "awless"; - version = "0.1.11"; - - goPackagePath = "github.com/wallix/awless"; - - src = fetchFromGitHub { - owner = "wallix"; - repo = "awless"; - rev = "v${version}"; - sha256 = "187i21yrm10r3f5naj3jl0rmydr5dkhmdhxs90hhf8hjp59a89kg"; - }; - - meta = with lib; { - homepage = "https://github.com/wallix/awless/"; - description = "A Mighty CLI for AWS"; - platforms = with platforms; linux ++ darwin; - license = licenses.asl20; - maintainers = with maintainers; [ pradeepchhetri swdunlop ]; - # asm: InitTextSym double init for "".Syscall - # panic: invalid use of LSym - NewFuncInfo with Extra of type *obj.FuncInfo - broken = (stdenv.isLinux && stdenv.isAarch64); - }; -} |