diff options
Diffstat (limited to 'pkgs/tools/security')
61 files changed, 65 insertions, 65 deletions
diff --git a/pkgs/tools/security/aespipe/default.nix b/pkgs/tools/security/aespipe/default.nix index dcef28f2258f8..ad4cf36fa32db 100644 --- a/pkgs/tools/security/aespipe/default.nix +++ b/pkgs/tools/security/aespipe/default.nix @@ -21,7 +21,7 @@ stdenv.mkDerivation rec { meta = with lib; { description = "AES encrypting or decrypting pipe"; - homepage = "http://loop-aes.sourceforge.net/aespipe.README"; + homepage = "https://loop-aes.sourceforge.net/aespipe.README"; license = licenses.gpl2; maintainers = [ maintainers.goibhniu ]; platforms = platforms.unix; diff --git a/pkgs/tools/security/aflplusplus/default.nix b/pkgs/tools/security/aflplusplus/default.nix index 79a0779e60a1d..c25db9e2d3987 100644 --- a/pkgs/tools/security/aflplusplus/default.nix +++ b/pkgs/tools/security/aflplusplus/default.nix @@ -105,7 +105,7 @@ let wrapPythonProgramsIn $out/bin ${python.pkgs.pefile} ''; - installCheckInputs = [ perl file ]; + nativeInstallCheckInputs = [ perl file ]; doInstallCheck = true; installCheckPhase = '' # replace references to tools in build directory with references to installed locations diff --git a/pkgs/tools/security/amoco/default.nix b/pkgs/tools/security/amoco/default.nix index 88f614e4c9068..a9c182ca4cbc6 100644 --- a/pkgs/tools/security/amoco/default.nix +++ b/pkgs/tools/security/amoco/default.nix @@ -40,7 +40,7 @@ python3.pkgs.buildPythonApplication rec { ]; }; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/atomic-operator/default.nix b/pkgs/tools/security/atomic-operator/default.nix index b385cce380612..6db7f0ecdd088 100644 --- a/pkgs/tools/security/atomic-operator/default.nix +++ b/pkgs/tools/security/atomic-operator/default.nix @@ -35,7 +35,7 @@ python3.pkgs.buildPythonApplication rec { urllib3 ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/boofuzz/default.nix b/pkgs/tools/security/boofuzz/default.nix index 220a372b2e9e6..dc0179fa35e54 100644 --- a/pkgs/tools/security/boofuzz/default.nix +++ b/pkgs/tools/security/boofuzz/default.nix @@ -29,7 +29,7 @@ python3.pkgs.buildPythonApplication rec { tornado ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ mock netifaces pytest-bdd diff --git a/pkgs/tools/security/ccrypt/default.nix b/pkgs/tools/security/ccrypt/default.nix index 2972fc9ae55fd..9da5a6d42c555 100644 --- a/pkgs/tools/security/ccrypt/default.nix +++ b/pkgs/tools/security/ccrypt/default.nix @@ -14,7 +14,7 @@ stdenv.mkDerivation rec { hardeningDisable = [ "format" ]; meta = { - homepage = "http://ccrypt.sourceforge.net/"; + homepage = "https://ccrypt.sourceforge.net/"; description = "Utility for encrypting and decrypting files and streams with AES-256"; license = lib.licenses.gpl2Plus; maintainers = with lib.maintainers; [viric]; diff --git a/pkgs/tools/security/cfripper/default.nix b/pkgs/tools/security/cfripper/default.nix index 89a0188b0dcfa..da6c865dac60a 100644 --- a/pkgs/tools/security/cfripper/default.nix +++ b/pkgs/tools/security/cfripper/default.nix @@ -25,7 +25,7 @@ python3.pkgs.buildPythonApplication rec { setuptools ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ moto pytestCheckHook ]; diff --git a/pkgs/tools/security/chipsec/default.nix b/pkgs/tools/security/chipsec/default.nix index 64a4946136f09..edb10f384bdf7 100644 --- a/pkgs/tools/security/chipsec/default.nix +++ b/pkgs/tools/security/chipsec/default.nix @@ -30,7 +30,7 @@ python3.pkgs.buildPythonApplication rec { nasm ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ distro pytestCheckHook ]; diff --git a/pkgs/tools/security/clairvoyance/default.nix b/pkgs/tools/security/clairvoyance/default.nix index fd7942bdd5d3a..2ffc101eb9832 100644 --- a/pkgs/tools/security/clairvoyance/default.nix +++ b/pkgs/tools/security/clairvoyance/default.nix @@ -23,7 +23,7 @@ python3.pkgs.buildPythonApplication rec { aiohttp ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ aiounittest pytestCheckHook ]; diff --git a/pkgs/tools/security/credslayer/default.nix b/pkgs/tools/security/credslayer/default.nix index 67b0844f36147..c8e403f3b9e51 100644 --- a/pkgs/tools/security/credslayer/default.nix +++ b/pkgs/tools/security/credslayer/default.nix @@ -20,7 +20,7 @@ python3.pkgs.buildPythonApplication rec { pyshark ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ wireshark-cli pytestCheckHook ]; diff --git a/pkgs/tools/security/cve-bin-tool/default.nix b/pkgs/tools/security/cve-bin-tool/default.nix index d36c706e444f5..92405c20bb876 100644 --- a/pkgs/tools/security/cve-bin-tool/default.nix +++ b/pkgs/tools/security/cve-bin-tool/default.nix @@ -65,7 +65,7 @@ buildPythonApplication rec { packaging ]; - checkInputs = [ + nativeCheckInputs = [ pytestCheckHook ]; diff --git a/pkgs/tools/security/faraday-agent-dispatcher/default.nix b/pkgs/tools/security/faraday-agent-dispatcher/default.nix index 7b571380b3197..dc05255bc7ed5 100644 --- a/pkgs/tools/security/faraday-agent-dispatcher/default.nix +++ b/pkgs/tools/security/faraday-agent-dispatcher/default.nix @@ -34,7 +34,7 @@ python3.pkgs.buildPythonApplication rec { websockets ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest-asyncio pytestCheckHook ]; diff --git a/pkgs/tools/security/flare-floss/default.nix b/pkgs/tools/security/flare-floss/default.nix index 6416adec0ece2..c301a90a55679 100644 --- a/pkgs/tools/security/flare-floss/default.nix +++ b/pkgs/tools/security/flare-floss/default.nix @@ -55,7 +55,7 @@ py.pkgs.buildPythonPackage rec { vivisect ] ++ viv-utils.optional-dependencies.flirt; - checkInputs = with py.pkgs; [ + nativeCheckInputs = with py.pkgs; [ pytest-sugar pytestCheckHook pyyaml diff --git a/pkgs/tools/security/fprintd/default.nix b/pkgs/tools/security/fprintd/default.nix index 125cab6b3fd06..76b71e24aca60 100644 --- a/pkgs/tools/security/fprintd/default.nix +++ b/pkgs/tools/security/fprintd/default.nix @@ -67,7 +67,7 @@ stdenv.mkDerivation rec { libfprint ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ gobject-introspection # for setup hook python-dbusmock dbus-python diff --git a/pkgs/tools/security/gallia/default.nix b/pkgs/tools/security/gallia/default.nix index 785f6aae9fffd..0f5051db0a4dd 100644 --- a/pkgs/tools/security/gallia/default.nix +++ b/pkgs/tools/security/gallia/default.nix @@ -35,7 +35,7 @@ python3.pkgs.buildPythonApplication rec { zstandard ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/gitjacker/default.nix b/pkgs/tools/security/gitjacker/default.nix index 14d9ab9ccfa21..05bdb2b17339c 100644 --- a/pkgs/tools/security/gitjacker/default.nix +++ b/pkgs/tools/security/gitjacker/default.nix @@ -20,7 +20,7 @@ buildGoModule rec { propagatedBuildInputs = [ git ]; - checkInputs = [ git ]; + nativeCheckInputs = [ git ]; doCheck = !stdenv.isDarwin; diff --git a/pkgs/tools/security/gnupg-pkcs11-scd/default.nix b/pkgs/tools/security/gnupg-pkcs11-scd/default.nix index 22c11b3f2b1f9..f7c22cddb5cbf 100644 --- a/pkgs/tools/security/gnupg-pkcs11-scd/default.nix +++ b/pkgs/tools/security/gnupg-pkcs11-scd/default.nix @@ -25,7 +25,7 @@ stdenv.mkDerivation rec { gnupg-pkcs11 is a project to implement a BSD-licensed smart-card daemon to enable the use of PKCS#11 tokens with GnuPG. ''; - homepage = "http://gnupg-pkcs11.sourceforge.net/"; + homepage = "https://gnupg-pkcs11.sourceforge.net/"; license = licenses.bsd3; maintainers = with maintainers; [ matthiasbeyer philandstuff ]; platforms = platforms.unix; diff --git a/pkgs/tools/security/gotrue/supabase.nix b/pkgs/tools/security/gotrue/supabase.nix index 64e454b22d5e8..a70c3a8ca6442 100644 --- a/pkgs/tools/security/gotrue/supabase.nix +++ b/pkgs/tools/security/gotrue/supabase.nix @@ -2,13 +2,13 @@ buildGoModule rec { pname = "gotrue"; - version = "2.41.0"; + version = "2.41.4"; src = fetchFromGitHub { owner = "supabase"; repo = pname; rev = "v${version}"; - hash = "sha256-LqVFKpDlUqkjurFmeZ2YCuF3W1V3R5Dnw/5k1O0qjSc="; + hash = "sha256-wHsjCf9TdRZ80l4nGEsLlB4J7pXv65fOv4pfFy3Wp/0="; }; vendorHash = "sha256-3dXfg9tblPx9V5LzzVm3UtCwGcPIAm2MaKm9JQi69mU="; diff --git a/pkgs/tools/security/graphinder/default.nix b/pkgs/tools/security/graphinder/default.nix index ce9ccc7079caa..f0256dff7cbe3 100644 --- a/pkgs/tools/security/graphinder/default.nix +++ b/pkgs/tools/security/graphinder/default.nix @@ -26,7 +26,7 @@ python3.pkgs.buildPythonApplication rec { setuptools ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest-asyncio pytest-mock pytestCheckHook diff --git a/pkgs/tools/security/grype/default.nix b/pkgs/tools/security/grype/default.nix index 862cde157a2f4..f745a2374ff32 100644 --- a/pkgs/tools/security/grype/default.nix +++ b/pkgs/tools/security/grype/default.nix @@ -55,7 +55,7 @@ buildGoModule rec { ldflags+=" -X github.com/anchore/grype/internal/version.buildDate=$(cat SOURCE_DATE_EPOCH)" ''; - checkInputs = [ openssl ]; + nativeCheckInputs = [ openssl ]; preCheck = '' # test all dirs (except excluded) unset subPackages diff --git a/pkgs/tools/security/ioccheck/default.nix b/pkgs/tools/security/ioccheck/default.nix index fb5c887a8bf91..be50d6483228a 100644 --- a/pkgs/tools/security/ioccheck/default.nix +++ b/pkgs/tools/security/ioccheck/default.nix @@ -66,7 +66,7 @@ buildPythonApplication rec { vt-py ]; - checkInputs = with py.pkgs; [ + nativeCheckInputs = with py.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/kube-hunter/default.nix b/pkgs/tools/security/kube-hunter/default.nix index e082b3d217e8b..823f3db9b432e 100644 --- a/pkgs/tools/security/kube-hunter/default.nix +++ b/pkgs/tools/security/kube-hunter/default.nix @@ -31,7 +31,7 @@ python3.pkgs.buildPythonApplication rec { kubernetes ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook requests-mock ]; diff --git a/pkgs/tools/security/lesspass-cli/default.nix b/pkgs/tools/security/lesspass-cli/default.nix index ce64b6847fe2a..a7b266c34ecef 100644 --- a/pkgs/tools/security/lesspass-cli/default.nix +++ b/pkgs/tools/security/lesspass-cli/default.nix @@ -24,7 +24,7 @@ buildPythonApplication rec { done ''; - checkInputs = [ pytest mock pexpect ]; + nativeCheckInputs = [ pytest mock pexpect ]; checkPhase = '' mv lesspass lesspass.hidden # ensure we're testing against *installed* package pytest tests diff --git a/pkgs/tools/security/log4j-sniffer/default.nix b/pkgs/tools/security/log4j-sniffer/default.nix index d894e39d7faaf..72cf2fb851b3c 100644 --- a/pkgs/tools/security/log4j-sniffer/default.nix +++ b/pkgs/tools/security/log4j-sniffer/default.nix @@ -17,7 +17,7 @@ buildGoModule rec { vendorSha256 = null; - checkInputs = [ + nativeCheckInputs = [ git ]; diff --git a/pkgs/tools/security/log4shell-detector/default.nix b/pkgs/tools/security/log4shell-detector/default.nix index 6c51c5bcd6e9c..76fc657284385 100644 --- a/pkgs/tools/security/log4shell-detector/default.nix +++ b/pkgs/tools/security/log4shell-detector/default.nix @@ -19,7 +19,7 @@ python3.pkgs.buildPythonApplication rec { zstandard ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/maigret/default.nix b/pkgs/tools/security/maigret/default.nix index 0b9b37225016c..a8d7f4c6b5321 100644 --- a/pkgs/tools/security/maigret/default.nix +++ b/pkgs/tools/security/maigret/default.nix @@ -57,7 +57,7 @@ python3.pkgs.buildPythonApplication rec { yarl ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest-httpserver pytest-asyncio pytestCheckHook diff --git a/pkgs/tools/security/minica/default.nix b/pkgs/tools/security/minica/default.nix index b984221bec36d..902961e049f7f 100644 --- a/pkgs/tools/security/minica/default.nix +++ b/pkgs/tools/security/minica/default.nix @@ -14,7 +14,7 @@ buildGoModule rec { sha256 = "sha256-3p6rUFFiWXhX9BBbxqWxRoyRceexvNnqcFCyNi5HoaA="; }; - vendorSha256 = "sha256-pQpattmS9VmO3ZIQUFn66az8GSmB4IvYhTTCFn6SUmo="; + vendorSha256 = null; ldflags = [ "-s" "-w" ]; diff --git a/pkgs/tools/security/modsecurity/default.nix b/pkgs/tools/security/modsecurity/default.nix index be9b2f8c28d26..0d3b287167120 100644 --- a/pkgs/tools/security/modsecurity/default.nix +++ b/pkgs/tools/security/modsecurity/default.nix @@ -42,7 +42,7 @@ stdenv.mkDerivation rec { patches = [ ./Makefile.am.patch ]; doCheck = true; - checkInputs = [ perl ]; + nativeCheckInputs = [ perl ]; postInstall = '' mkdir -p $nginx diff --git a/pkgs/tools/security/mongoaudit/default.nix b/pkgs/tools/security/mongoaudit/default.nix index 4c15d1cfe9487..3ba19256ec34e 100644 --- a/pkgs/tools/security/mongoaudit/default.nix +++ b/pkgs/tools/security/mongoaudit/default.nix @@ -22,7 +22,7 @@ python3.pkgs.buildPythonApplication rec { urwid ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/offensive-azure/default.nix b/pkgs/tools/security/offensive-azure/default.nix index 78d254fbbca0d..fb5dce6798dcd 100644 --- a/pkgs/tools/security/offensive-azure/default.nix +++ b/pkgs/tools/security/offensive-azure/default.nix @@ -31,7 +31,7 @@ python3.pkgs.buildPythonApplication rec { requests ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/pamtester/default.nix b/pkgs/tools/security/pamtester/default.nix index face92a00af36..d9e59290d676b 100644 --- a/pkgs/tools/security/pamtester/default.nix +++ b/pkgs/tools/security/pamtester/default.nix @@ -13,7 +13,7 @@ stdenv.mkDerivation rec { meta = with lib; { description = "Utility program to test the PAM facility"; - homepage = "http://pamtester.sourceforge.net/"; + homepage = "https://pamtester.sourceforge.net/"; license = licenses.bsd3; platforms = platforms.linux; maintainers = with maintainers; [ abbradar ]; diff --git a/pkgs/tools/security/pass/default.nix b/pkgs/tools/security/pass/default.nix index afb6d2e0dc318..c856c020d696f 100644 --- a/pkgs/tools/security/pass/default.nix +++ b/pkgs/tools/security/pass/default.nix @@ -145,7 +145,7 @@ stdenv.mkDerivation rec { doCheck = false; doInstallCheck = true; - installCheckInputs = [ git ]; + nativeInstallCheckInputs = [ git ]; installCheckTarget = "test"; passthru = { diff --git a/pkgs/tools/security/pass/extensions/audit/default.nix b/pkgs/tools/security/pass/extensions/audit/default.nix index c4c16b8ff8486..c9bbabd5fb2f8 100644 --- a/pkgs/tools/security/pass/extensions/audit/default.nix +++ b/pkgs/tools/security/pass/extensions/audit/default.nix @@ -33,7 +33,7 @@ in stdenv.mkDerivation rec { # Tests freeze on darwin with: pass-audit-1.1 (checkPhase): EOFError doCheck = !stdenv.isDarwin; - checkInputs = [ pythonPackages.green pass gnupg ]; + nativeCheckInputs = [ pythonPackages.green pass gnupg ]; checkPhase = '' ${pythonEnv}/bin/python3 setup.py green -q ''; diff --git a/pkgs/tools/security/pass/extensions/import.nix b/pkgs/tools/security/pass/extensions/import.nix index d543ef9b25752..ad2d2a7156aeb 100644 --- a/pkgs/tools/security/pass/extensions/import.nix +++ b/pkgs/tools/security/pass/extensions/import.nix @@ -35,7 +35,7 @@ python3Packages.buildPythonApplication rec { secretstorage ]; - checkInputs = [ + nativeCheckInputs = [ gnupg pass python3Packages.pytestCheckHook diff --git a/pkgs/tools/security/pdfcrack/default.nix b/pkgs/tools/security/pdfcrack/default.nix index 0aa94c4e8ab94..d4930b023b6f2 100644 --- a/pkgs/tools/security/pdfcrack/default.nix +++ b/pkgs/tools/security/pdfcrack/default.nix @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { ''; meta = with lib; { - homepage = "http://pdfcrack.sourceforge.net/"; + homepage = "https://pdfcrack.sourceforge.net/"; description = "Small command line driven tool for recovering passwords and content from PDF files"; license = with licenses; [ gpl2Plus ]; platforms = platforms.all; diff --git a/pkgs/tools/security/radamsa/default.nix b/pkgs/tools/security/radamsa/default.nix index c8b084e1e3122..ebcd2a42191df 100644 --- a/pkgs/tools/security/radamsa/default.nix +++ b/pkgs/tools/security/radamsa/default.nix @@ -30,7 +30,7 @@ stdenv.mkDerivation rec { makeFlags = [ "PREFIX=${placeholder "out"}" "BINDIR=" ]; - checkInputs = [ bash ]; + nativeCheckInputs = [ bash ]; doCheck = true; meta = { diff --git a/pkgs/tools/security/regexploit/default.nix b/pkgs/tools/security/regexploit/default.nix index be09c34254bb0..b921cbcc3b3c0 100644 --- a/pkgs/tools/security/regexploit/default.nix +++ b/pkgs/tools/security/regexploit/default.nix @@ -20,7 +20,7 @@ python3.pkgs.buildPythonApplication rec { pyyaml ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/rhash/default.nix b/pkgs/tools/security/rhash/default.nix index 4b4103ff9fb14..6e73375be208e 100644 --- a/pkgs/tools/security/rhash/default.nix +++ b/pkgs/tools/security/rhash/default.nix @@ -42,7 +42,7 @@ stdenv.mkDerivation rec { ]; meta = with lib; { - homepage = "http://rhash.sourceforge.net/"; + homepage = "https://rhash.sourceforge.net/"; description = "Console utility and library for computing and verifying hash sums of files"; license = licenses.bsd0; platforms = platforms.all; diff --git a/pkgs/tools/security/rng-tools/default.nix b/pkgs/tools/security/rng-tools/default.nix index 0795f84337207..d4fb4676e4aec 100644 --- a/pkgs/tools/security/rng-tools/default.nix +++ b/pkgs/tools/security/rng-tools/default.nix @@ -52,7 +52,7 @@ stdenv.mkDerivation rec { doCheck = true; preCheck = "patchShebangs tests/*.sh"; - checkInputs = [ psmisc ]; # rngtestjitter.sh needs killall + nativeCheckInputs = [ psmisc ]; # rngtestjitter.sh needs killall doInstallCheck = true; installCheckPhase = '' diff --git a/pkgs/tools/security/rnp/default.nix b/pkgs/tools/security/rnp/default.nix index 7d96c4f60e260..e7cb9d7637799 100644 --- a/pkgs/tools/security/rnp/default.nix +++ b/pkgs/tools/security/rnp/default.nix @@ -36,9 +36,9 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ asciidoctor cmake gnupg gtest pkg-config python3 ]; - # NOTE: check-only inputs should ideally be moved to checkInputs, but it + # NOTE: check-only inputs should ideally be moved to nativeCheckInputs, but it # would fail during buildPhase. - # checkInputs = [ gtest python3 ]; + # nativeCheckInputs = [ gtest python3 ]; outputs = [ "out" "lib" "dev" ]; diff --git a/pkgs/tools/security/routersploit/default.nix b/pkgs/tools/security/routersploit/default.nix index e2a511c811b1e..e147e8feac0b4 100644 --- a/pkgs/tools/security/routersploit/default.nix +++ b/pkgs/tools/security/routersploit/default.nix @@ -24,7 +24,7 @@ python3.pkgs.buildPythonApplication rec { setuptools ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest-xdist pytestCheckHook threat9-test-bed diff --git a/pkgs/tools/security/rustscan/default.nix b/pkgs/tools/security/rustscan/default.nix index 849a921898a7d..099e685fec036 100644 --- a/pkgs/tools/security/rustscan/default.nix +++ b/pkgs/tools/security/rustscan/default.nix @@ -19,7 +19,7 @@ rustPlatform.buildRustPackage rec { buildInputs = lib.optional stdenv.isDarwin Security; - checkInputs = [ perl python3 ]; + nativeCheckInputs = [ perl python3 ]; # these tests require network access checkFlags = [ diff --git a/pkgs/tools/security/scrypt/default.nix b/pkgs/tools/security/scrypt/default.nix index 5a3ab9cb68b4f..aad2873d4aca0 100644 --- a/pkgs/tools/security/scrypt/default.nix +++ b/pkgs/tools/security/scrypt/default.nix @@ -33,7 +33,7 @@ stdenv.mkDerivation rec { doCheck = true; checkTarget = "test"; - checkInputs = lib.optionals stdenv.isLinux [ util-linux ]; + nativeCheckInputs = lib.optionals stdenv.isLinux [ util-linux ]; meta = with lib; { description = "Encryption utility"; diff --git a/pkgs/tools/security/semgrep/default.nix b/pkgs/tools/security/semgrep/default.nix index c97d877b483e9..8a2b8f0273ffa 100644 --- a/pkgs/tools/security/semgrep/default.nix +++ b/pkgs/tools/security/semgrep/default.nix @@ -64,7 +64,7 @@ buildPythonApplication rec { ]; doCheck = true; - checkInputs = [ git pytestCheckHook ] ++ (with pythonPackages; [ + nativeCheckInputs = [ git pytestCheckHook ] ++ (with pythonPackages; [ pytest-snapshot pytest-mock pytest-freezegun diff --git a/pkgs/tools/security/sequoia/default.nix b/pkgs/tools/security/sequoia/default.nix index edeaec56daf2d..f7f63f126bedd 100644 --- a/pkgs/tools/security/sequoia/default.nix +++ b/pkgs/tools/security/sequoia/default.nix @@ -58,7 +58,7 @@ rustPlatform.buildRustPackage rec { lib.optionals pythonSupport [ pythonPackages.setuptools ] ; - checkInputs = lib.optionals pythonSupport [ + nativeCheckInputs = lib.optionals pythonSupport [ pythonPackages.pytest pythonPackages.pytest-runner ]; diff --git a/pkgs/tools/security/sigma-cli/default.nix b/pkgs/tools/security/sigma-cli/default.nix index c0a21ef5440ab..d039234f37c9c 100644 --- a/pkgs/tools/security/sigma-cli/default.nix +++ b/pkgs/tools/security/sigma-cli/default.nix @@ -33,7 +33,7 @@ python3.pkgs.buildPythonApplication rec { pysigma-pipeline-windows ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/snallygaster/default.nix b/pkgs/tools/security/snallygaster/default.nix index e469e4b004e62..2f7f5d12192aa 100644 --- a/pkgs/tools/security/snallygaster/default.nix +++ b/pkgs/tools/security/snallygaster/default.nix @@ -20,7 +20,7 @@ python3Packages.buildPythonApplication rec { dnspython ]; - checkInputs = with python3Packages; [ + nativeCheckInputs = with python3Packages; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/solo2-cli/default.nix b/pkgs/tools/security/solo2-cli/default.nix index ad3df92873a8d..ea4b05b79a03c 100644 --- a/pkgs/tools/security/solo2-cli/default.nix +++ b/pkgs/tools/security/solo2-cli/default.nix @@ -14,16 +14,16 @@ rustPlatform.buildRustPackage rec { pname = "solo2-cli"; - version = "0.2.1"; + version = "0.2.2"; src = fetchFromGitHub { owner = "solokeys"; repo = pname; rev = "v${version}"; - sha256 = "sha256-+n+tc3BDHr93yc2TzvI1Xqpcl8fM+bF/KZdv0rWfIZ8="; + sha256 = "sha256-7tpO5ir42mIKJXD0NJzEPXi/Xe6LdyEeBQWNfOdgX5I="; }; - cargoSha256 = "sha256-2bBo5HXLYQj+R47exPyMbx/RIrykDHjRkLRNMjVAzEI="; + cargoHash = "sha256-X+IEeztSL312Yq9Loi3cNJuVfSGk/tRRBCsy0Juji7Y="; nativeBuildInputs = [ installShellFiles pkg-config ]; diff --git a/pkgs/tools/security/ssh-audit/default.nix b/pkgs/tools/security/ssh-audit/default.nix index 34d39390b4384..8a2ad022cef1d 100644 --- a/pkgs/tools/security/ssh-audit/default.nix +++ b/pkgs/tools/security/ssh-audit/default.nix @@ -11,7 +11,7 @@ python3Packages.buildPythonApplication rec { sha256 = "0ks1zr0ksma285sm2dyy0nsbrkpssdk4mdzc3srr4mcyd6v927jd"; }; - checkInputs = with python3Packages; [ + nativeCheckInputs = with python3Packages; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/ssh-to-pgp/default.nix b/pkgs/tools/security/ssh-to-pgp/default.nix index fc07714b55b06..1d364fb0ad71e 100644 --- a/pkgs/tools/security/ssh-to-pgp/default.nix +++ b/pkgs/tools/security/ssh-to-pgp/default.nix @@ -13,7 +13,7 @@ buildGoModule rec { vendorSha256 = "sha256-OMWiJ1n8ynvIGcmotjuGGsRuAidYgVo5Y5JjrAw8fpc="; - checkInputs = [ gnupg ]; + nativeCheckInputs = [ gnupg ]; checkPhase = '' HOME=$TMPDIR go test . ''; diff --git a/pkgs/tools/security/sshuttle/default.nix b/pkgs/tools/security/sshuttle/default.nix index 686e9eeffc693..f109886c9ca8e 100644 --- a/pkgs/tools/security/sshuttle/default.nix +++ b/pkgs/tools/security/sshuttle/default.nix @@ -27,7 +27,7 @@ python3Packages.buildPythonApplication rec { nativeBuildInputs = [ makeWrapper python3Packages.setuptools-scm ]; - checkInputs = with python3Packages; [ pytestCheckHook ]; + nativeCheckInputs = with python3Packages; [ pytestCheckHook ]; postInstall = '' wrapProgram $out/bin/sshuttle \ diff --git a/pkgs/tools/security/stacs/default.nix b/pkgs/tools/security/stacs/default.nix index 352c217b76a4b..672cd082849cf 100644 --- a/pkgs/tools/security/stacs/default.nix +++ b/pkgs/tools/security/stacs/default.nix @@ -25,7 +25,7 @@ python3.pkgs.buildPythonApplication rec { yara-python ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/swtpm/default.nix b/pkgs/tools/security/swtpm/default.nix index 635fccc006325..e71b88c8c3b9a 100644 --- a/pkgs/tools/security/swtpm/default.nix +++ b/pkgs/tools/security/swtpm/default.nix @@ -32,7 +32,7 @@ stdenv.mkDerivation rec { autoreconfHook ]; - checkInputs = [ + nativeCheckInputs = [ which ]; diff --git a/pkgs/tools/security/theharvester/default.nix b/pkgs/tools/security/theharvester/default.nix index a78d9a23c1879..b267cab354a02 100644 --- a/pkgs/tools/security/theharvester/default.nix +++ b/pkgs/tools/security/theharvester/default.nix @@ -40,7 +40,7 @@ python3.pkgs.buildPythonApplication rec { uvloop ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytest pytest-asyncio ]; diff --git a/pkgs/tools/security/tpm2-abrmd/default.nix b/pkgs/tools/security/tpm2-abrmd/default.nix index b3efb6c542e9d..cd3504b45f4cc 100644 --- a/pkgs/tools/security/tpm2-abrmd/default.nix +++ b/pkgs/tools/security/tpm2-abrmd/default.nix @@ -17,7 +17,7 @@ stdenv.mkDerivation rec { nativeBuildInputs = [ pkg-config makeWrapper autoreconfHook autoconf-archive which ]; buildInputs = [ tpm2-tss glib dbus ]; - checkInputs = [ cmocka ]; + nativeCheckInputs = [ cmocka ]; enableParallelBuilding = true; diff --git a/pkgs/tools/security/trousers/default.nix b/pkgs/tools/security/trousers/default.nix index 16536409b5e6f..bec2084fd140a 100644 --- a/pkgs/tools/security/trousers/default.nix +++ b/pkgs/tools/security/trousers/default.nix @@ -21,7 +21,7 @@ stdenv.mkDerivation rec { meta = with lib; { description = "Trusted computing software stack"; - homepage = "http://trousers.sourceforge.net/"; + homepage = "https://trousers.sourceforge.net/"; license = licenses.bsd3; maintainers = [ maintainers.ak ]; platforms = platforms.linux; diff --git a/pkgs/tools/security/uddup/default.nix b/pkgs/tools/security/uddup/default.nix index 5cde218bacfea..3516b4dcff8d5 100644 --- a/pkgs/tools/security/uddup/default.nix +++ b/pkgs/tools/security/uddup/default.nix @@ -19,7 +19,7 @@ python3.pkgs.buildPythonApplication rec { colorama ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ pytestCheckHook ]; diff --git a/pkgs/tools/security/vulnix/default.nix b/pkgs/tools/security/vulnix/default.nix index c3eb53c3b2075..a698a0a1527ed 100644 --- a/pkgs/tools/security/vulnix/default.nix +++ b/pkgs/tools/security/vulnix/default.nix @@ -21,7 +21,7 @@ python3Packages.buildPythonApplication rec { outputs = [ "out" "doc" "man" ]; nativeBuildInputs = [ ronn ]; - checkInputs = with python3Packages; [ + nativeCheckInputs = with python3Packages; [ freezegun pytest pytest-cov diff --git a/pkgs/tools/security/wad/default.nix b/pkgs/tools/security/wad/default.nix index 9b284a42a0186..5dc81a7f56df9 100644 --- a/pkgs/tools/security/wad/default.nix +++ b/pkgs/tools/security/wad/default.nix @@ -19,7 +19,7 @@ python3.pkgs.buildPythonApplication rec { six ]; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ mock pytestCheckHook ]; diff --git a/pkgs/tools/security/wapiti/default.nix b/pkgs/tools/security/wapiti/default.nix index 4769db4816efd..6aec3dd105f28 100644 --- a/pkgs/tools/security/wapiti/default.nix +++ b/pkgs/tools/security/wapiti/default.nix @@ -38,7 +38,7 @@ python3.pkgs.buildPythonApplication rec { ] ++ httpx.optional-dependencies.brotli ++ httpx.optional-dependencies.socks; - checkInputs = with python3.pkgs; [ + nativeCheckInputs = with python3.pkgs; [ respx pytest-asyncio pytestCheckHook diff --git a/pkgs/tools/security/wipe/default.nix b/pkgs/tools/security/wipe/default.nix index 5b0f079e5a602..5ced99060fb74 100644 --- a/pkgs/tools/security/wipe/default.nix +++ b/pkgs/tools/security/wipe/default.nix @@ -13,7 +13,7 @@ stdenv.mkDerivation rec { meta = with lib; { description = "Secure file wiping utility"; - homepage = "http://wipe.sourceforge.net/"; + homepage = "https://wipe.sourceforge.net/"; license = licenses.gpl2; platforms = platforms.all; maintainers = [ maintainers.abbradar ]; |