1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
|
{ lib, stdenv
, buildPythonPackage
, debugger
, fetchPypi
, isPy3k
, Mako
, makeWrapper
, packaging
, pysocks
, pygments
, ROPGadget
, capstone
, paramiko
, pip
, psutil
, pyelftools
, pyserial
, dateutil
, requests
, tox
, unicorn
, intervaltree
, fetchpatch
}:
buildPythonPackage rec {
version = "4.3.1";
pname = "pwntools";
src = fetchPypi {
inherit pname version;
sha256 = "12ja913kz8wl4afrmpzxh9fx6j7rcwc2vqzkvfr1fxn42gkqhqf4";
};
# Upstream has set an upper bound on unicorn because of https://github.com/Gallopsled/pwntools/issues/1538,
# but since that is a niche use case and it requires extra work to get unicorn 1.0.2rc3 to work we relax
# the bound here. Check if this is still necessary when updating!
postPatch = ''
sed -i 's/unicorn>=1.0.2rc1,<1.0.2rc4/unicorn>=1.0.2rc1/' setup.py
'';
propagatedBuildInputs = [
Mako
packaging
pysocks
pygments
ROPGadget
capstone
paramiko
pip
psutil
pyelftools
pyserial
dateutil
requests
tox
unicorn
intervaltree
];
doCheck = false; # no setuptools tests for the package
postFixup = ''
mkdir -p "$out/bin"
makeWrapper "${debugger}/bin/${stdenv.lib.strings.getName debugger}" "$out/bin/pwntools-gdb"
'';
meta = with lib; {
homepage = "http://pwntools.com";
description = "CTF framework and exploit development library";
license = licenses.mit;
maintainers = with maintainers; [ bennofs kristoff3r pamplemousse ];
};
}
|