aboutsummaryrefslogtreecommitdiff
path: root/pkgs/tools/networking
diff options
context:
space:
mode:
Diffstat (limited to 'pkgs/tools/networking')
-rw-r--r--pkgs/tools/networking/6tunnel/default.nix2
-rw-r--r--pkgs/tools/networking/airfield/node.nix2
-rw-r--r--pkgs/tools/networking/aria2/default.nix2
-rw-r--r--pkgs/tools/networking/axel/default.nix4
-rw-r--r--pkgs/tools/networking/bandwhich/default.nix2
-rw-r--r--pkgs/tools/networking/bud/default.nix4
-rw-r--r--pkgs/tools/networking/cjdns/default.nix4
-rw-r--r--pkgs/tools/networking/clash/default.nix8
-rw-r--r--pkgs/tools/networking/croc/default.nix6
-rw-r--r--pkgs/tools/networking/davix/default.nix8
-rw-r--r--pkgs/tools/networking/dnsproxy/default.nix4
-rw-r--r--pkgs/tools/networking/dogdns/default.nix12
-rw-r--r--pkgs/tools/networking/drill/default.nix8
-rw-r--r--pkgs/tools/networking/dsniff/default.nix4
-rw-r--r--pkgs/tools/networking/easyrsa/default.nix9
-rw-r--r--pkgs/tools/networking/easyrsa/fix-paths.patch48
-rw-r--r--pkgs/tools/networking/eternal-terminal/default.nix4
-rw-r--r--pkgs/tools/networking/findomain/default.nix2
-rw-r--r--pkgs/tools/networking/frp/default.nix8
-rw-r--r--pkgs/tools/networking/gnirehtet/default.nix25
-rw-r--r--pkgs/tools/networking/gnirehtet/paths.patch48
-rw-r--r--pkgs/tools/networking/gping/default.nix29
-rw-r--r--pkgs/tools/networking/haproxy/default.nix8
-rw-r--r--pkgs/tools/networking/hey/default.nix6
-rw-r--r--pkgs/tools/networking/httpstat/default.nix4
-rw-r--r--pkgs/tools/networking/i2p/default.nix8
-rw-r--r--pkgs/tools/networking/i2pd/default.nix4
-rw-r--r--pkgs/tools/networking/igmpproxy/default.nix26
-rw-r--r--pkgs/tools/networking/inadyn/default.nix2
-rw-r--r--pkgs/tools/networking/lldpd/default.nix4
-rw-r--r--pkgs/tools/networking/mailutils/default.nix21
-rw-r--r--pkgs/tools/networking/minidlna/default.nix4
-rw-r--r--pkgs/tools/networking/minio-client/default.nix6
-rw-r--r--pkgs/tools/networking/modem-manager/default.nix4
-rw-r--r--pkgs/tools/networking/mosh/default.nix5
-rw-r--r--pkgs/tools/networking/nebula/default.nix2
-rw-r--r--pkgs/tools/networking/network-manager/default.nix7
-rw-r--r--pkgs/tools/networking/nfdump/default.nix4
-rw-r--r--pkgs/tools/networking/openapi-generator-cli/default.nix5
-rw-r--r--pkgs/tools/networking/openfortivpn/default.nix4
-rw-r--r--pkgs/tools/networking/openssh/default.nix13
-rw-r--r--pkgs/tools/networking/openssh/ssh-copy-id-fix-eof.patch21
-rw-r--r--pkgs/tools/networking/openvpn/default.nix112
-rw-r--r--pkgs/tools/networking/openvpn/openvpn_learnaddress.nix6
-rw-r--r--pkgs/tools/networking/openvpn/update-systemd-resolved.nix4
-rw-r--r--pkgs/tools/networking/pdsh/default.nix6
-rw-r--r--pkgs/tools/networking/photon/default.nix4
-rw-r--r--pkgs/tools/networking/privoxy/default.nix4
-rw-r--r--pkgs/tools/networking/proxychains/default.nix3
-rw-r--r--pkgs/tools/networking/shorewall/default.nix6
-rw-r--r--pkgs/tools/networking/slirp4netns/default.nix4
-rw-r--r--pkgs/tools/networking/subfinder/default.nix2
-rw-r--r--pkgs/tools/networking/tcpreplay/default.nix10
-rw-r--r--pkgs/tools/networking/telepresence/default.nix6
-rw-r--r--pkgs/tools/networking/tendermint/default.nix6
-rw-r--r--pkgs/tools/networking/tgt/default.nix2
-rw-r--r--pkgs/tools/networking/tridactyl-native/default.nix4
-rw-r--r--pkgs/tools/networking/tunnelto/default.nix2
-rw-r--r--pkgs/tools/networking/urlwatch/default.nix7
-rw-r--r--pkgs/tools/networking/v2ray/default.nix37
-rwxr-xr-xpkgs/tools/networking/v2ray/update.sh8
-rw-r--r--pkgs/tools/networking/wavemon/default.nix4
-rw-r--r--pkgs/tools/networking/ytcc/default.nix4
-rw-r--r--pkgs/tools/networking/zerotierone/default.nix10
64 files changed, 363 insertions, 289 deletions
diff --git a/pkgs/tools/networking/6tunnel/default.nix b/pkgs/tools/networking/6tunnel/default.nix
index bf0e8ba33162..fbdd23f754ef 100644
--- a/pkgs/tools/networking/6tunnel/default.nix
+++ b/pkgs/tools/networking/6tunnel/default.nix
@@ -17,7 +17,7 @@ stdenv.mkDerivation rec {
description = "Tunnelling for application that don't speak IPv6";
homepage = "https://github.com/wojtekka/6tunnel";
license = licenses.gpl2;
- maintainers = with maintainers; [ filalex77 ];
+ maintainers = with maintainers; [ Br1ght0ne ];
platforms = platforms.unix;
};
}
diff --git a/pkgs/tools/networking/airfield/node.nix b/pkgs/tools/networking/airfield/node.nix
index e306e49c8498..055fc5267c37 100644
--- a/pkgs/tools/networking/airfield/node.nix
+++ b/pkgs/tools/networking/airfield/node.nix
@@ -6,7 +6,7 @@
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
- inherit (pkgs) stdenv python2 utillinux runCommand writeTextFile;
+ inherit (pkgs) stdenv python2 util-linux runCommand writeTextFile;
inherit nodejs;
libtool = if pkgs.stdenv.isDarwin then pkgs.darwin.cctools else null;
};
diff --git a/pkgs/tools/networking/aria2/default.nix b/pkgs/tools/networking/aria2/default.nix
index 5ede0db598c9..614584a5f565 100644
--- a/pkgs/tools/networking/aria2/default.nix
+++ b/pkgs/tools/networking/aria2/default.nix
@@ -41,6 +41,6 @@ stdenv.mkDerivation rec {
description = "A lightweight, multi-protocol, multi-source, command-line download utility";
license = licenses.gpl2Plus;
platforms = platforms.unix;
- maintainers = with maintainers; [ filalex77 koral ];
+ maintainers = with maintainers; [ Br1ght0ne koral ];
};
}
diff --git a/pkgs/tools/networking/axel/default.nix b/pkgs/tools/networking/axel/default.nix
index 5cd8e41f70c8..baa498042f94 100644
--- a/pkgs/tools/networking/axel/default.nix
+++ b/pkgs/tools/networking/axel/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "axel";
- version = "2.17.9";
+ version = "2.17.10";
src = fetchFromGitHub {
owner = "axel-download-accelerator";
repo = pname;
rev = "v${version}";
- sha256 = "1bhzgvvqcwa5bd487400hg1nycvw8qqxzbzvq5ywyz5d9j12hdrd";
+ sha256 = "01mpfkz98r2fx4n0gyi3b4zvlyfd5bxydp2wh431lnj0ahrsiikp";
};
nativeBuildInputs = [ autoreconfHook pkgconfig autoconf-archive txt2man ];
diff --git a/pkgs/tools/networking/bandwhich/default.nix b/pkgs/tools/networking/bandwhich/default.nix
index 909f08e7bdde..46739742bd44 100644
--- a/pkgs/tools/networking/bandwhich/default.nix
+++ b/pkgs/tools/networking/bandwhich/default.nix
@@ -26,7 +26,7 @@ rustPlatform.buildRustPackage rec {
'';
homepage = "https://github.com/imsnif/bandwhich";
license = licenses.mit;
- maintainers = with maintainers; [ filalex77 ma27 ];
+ maintainers = with maintainers; [ Br1ght0ne ma27 ];
platforms = platforms.unix;
};
}
diff --git a/pkgs/tools/networking/bud/default.nix b/pkgs/tools/networking/bud/default.nix
index a79cbdc8bbd8..724d25d49f93 100644
--- a/pkgs/tools/networking/bud/default.nix
+++ b/pkgs/tools/networking/bud/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, lib, fetchgit, python, gyp, utillinux }:
+{ stdenv, lib, fetchgit, python, gyp, util-linux }:
stdenv.mkDerivation {
pname = "bud";
@@ -13,7 +13,7 @@ stdenv.mkDerivation {
buildInputs = [
python gyp
- ] ++ lib.optional stdenv.isLinux utillinux;
+ ] ++ lib.optional stdenv.isLinux util-linux;
buildPhase = ''
python ./gyp_bud -f make
diff --git a/pkgs/tools/networking/cjdns/default.nix b/pkgs/tools/networking/cjdns/default.nix
index 438f107c27c4..28a418c27f28 100644
--- a/pkgs/tools/networking/cjdns/default.nix
+++ b/pkgs/tools/networking/cjdns/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub, nodejs, which, python27, utillinux, nixosTests }:
+{ stdenv, fetchFromGitHub, nodejs, which, python27, util-linux, nixosTests }:
stdenv.mkDerivation rec {
pname = "cjdns";
@@ -13,7 +13,7 @@ stdenv.mkDerivation rec {
buildInputs = [ which python27 nodejs ] ++
# for flock
- stdenv.lib.optional stdenv.isLinux utillinux;
+ stdenv.lib.optional stdenv.isLinux util-linux;
CFLAGS = "-O2 -Wno-error=stringop-truncation";
buildPhase =
diff --git a/pkgs/tools/networking/clash/default.nix b/pkgs/tools/networking/clash/default.nix
index 912716894129..502a4b4bbd42 100644
--- a/pkgs/tools/networking/clash/default.nix
+++ b/pkgs/tools/networking/clash/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "clash";
- version = "1.2.0";
+ version = "1.3.0";
src = fetchFromGitHub {
owner = "Dreamacro";
repo = pname;
rev = "v${version}";
- sha256 = "16dgpq67bcy9z5lqwykwh61kwxi164khxqc78i6a3dc9xyivwfya";
+ sha256 = "1y0im2xs6pibbfri2k7g9jqbzm90jd9a5lghrzasxmkzjfcimrnf";
};
- vendorSha256 = "0gmyq54h9zb4ry2p24nsp8ybqrmaq69zlyp220w16kamx790j07j";
+ vendorSha256 = "0lljm594xgcv7ylz7qn170r9526k9d1lh77m9f9zcnhdd2qw4rw1";
doCheck = false;
@@ -24,6 +24,6 @@ buildGoModule rec {
description = "A rule-based tunnel in Go";
homepage = "https://github.com/Dreamacro/clash";
license = licenses.gpl3;
- maintainers = with maintainers; [ contrun filalex77 ];
+ maintainers = with maintainers; [ contrun Br1ght0ne ];
};
}
diff --git a/pkgs/tools/networking/croc/default.nix b/pkgs/tools/networking/croc/default.nix
index 6d6c08a1efe0..08eb3d69128b 100644
--- a/pkgs/tools/networking/croc/default.nix
+++ b/pkgs/tools/networking/croc/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "croc";
- version = "8.6.5";
+ version = "8.6.6";
src = fetchFromGitHub {
owner = "schollz";
repo = pname;
rev = "v${version}";
- sha256 = "1lzprv4qbmv2jjjp02z87819k54wdlsf8i6zvl3vchkqvygdkk6v";
+ sha256 = "0bd7q3j2i0r3v4liv2xpqlvx4nrixpdhr1yy1c579bls7y4myv61";
};
- vendorSha256 = "02mai9bp9pizbq6b8dj05rngxp3lfm9gh37zs8jknx56gas90j9i";
+ vendorSha256 = "06hqb5r9p67zh0v5whdsb3rvax6461y2n6jkhjwmn6zzswpgkg7y";
doCheck = false;
diff --git a/pkgs/tools/networking/davix/default.nix b/pkgs/tools/networking/davix/default.nix
index 797791e1c0b9..ca9e7b033c51 100644
--- a/pkgs/tools/networking/davix/default.nix
+++ b/pkgs/tools/networking/davix/default.nix
@@ -6,11 +6,11 @@ stdenv.mkDerivation rec {
nativeBuildInputs = [ cmake pkgconfig python3 ];
buildInputs = [ openssl libxml2 boost libuuid ];
- # using the url below since the 0.7.6 release did carry a broken CMake file,
- # supposedly fixed in the next release
- # https://github.com/cern-fts/davix/issues/40
+ # using the url below since the github release page states
+ # "please ignore the GitHub-generated tarballs, as they are incomplete"
+ # https://github.com/cern-fts/davix/releases/tag/R_0_7_6
src = fetchurl {
- url = "http://grid-deployment.web.cern.ch/grid-deployment/dms/lcgutil/tar/davix/${version}/davix-${version}.tar.gz";
+ url = "https://github.com/cern-fts/${pname}/releases/download/R_${stdenv.lib.replaceStrings ["."] ["_"] version}/${pname}-${version}.tar.gz";
sha256 = "0wq66spnr616cns72f9dvr2xfvkdvfqqmc6d7dx29fpp57zzvrx2";
};
diff --git a/pkgs/tools/networking/dnsproxy/default.nix b/pkgs/tools/networking/dnsproxy/default.nix
index 68739507d3b8..b2c19e2acf93 100644
--- a/pkgs/tools/networking/dnsproxy/default.nix
+++ b/pkgs/tools/networking/dnsproxy/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "dnsproxy";
- version = "0.32.6";
+ version = "0.33.2";
src = fetchFromGitHub {
owner = "AdguardTeam";
repo = pname;
rev = "v${version}";
- sha256 = "0wcn2wr521n2vcmpnwphgycq109251nkfdr0wzn7lk2zl5qx81ax";
+ sha256 = "0x005lgncaf1fzs27fpcpf6dcncb7wia6fka64pmjxdsq7nmh1hh";
};
vendorSha256 = null;
diff --git a/pkgs/tools/networking/dogdns/default.nix b/pkgs/tools/networking/dogdns/default.nix
index 2875f2025151..71e065e5d14c 100644
--- a/pkgs/tools/networking/dogdns/default.nix
+++ b/pkgs/tools/networking/dogdns/default.nix
@@ -3,6 +3,8 @@
, rustPlatform
, pkg-config
, openssl
+, Security
+, installShellFiles
}:
rustPlatform.buildRustPackage rec {
@@ -16,11 +18,17 @@ rustPlatform.buildRustPackage rec {
sha256 = "088ib0sncv0vrvnqfvxf5zc79v7pnxd2cmgp4378r6pmgax9z9zy";
};
- nativeBuildInputs = [ pkg-config ];
- buildInputs = [ openssl ];
+ nativeBuildInputs = [ installShellFiles ]
+ ++ stdenv.lib.optionals stdenv.isLinux [ pkg-config ];
+ buildInputs = stdenv.lib.optionals stdenv.isLinux [ openssl ]
+ ++ stdenv.lib.optionals stdenv.isDarwin [ Security ];
cargoSha256 = "08scc6vh703245rg3xkffhalrk5pisd0wg54fd49d7gdbyjivgi6";
+ postInstall = ''
+ installShellCompletion completions/dog.{bash,fish,zsh}
+ '';
+
meta = with stdenv.lib; {
description = "Command-line DNS client";
homepage = "https://dns.lookup.dog";
diff --git a/pkgs/tools/networking/drill/default.nix b/pkgs/tools/networking/drill/default.nix
index 572dc0d83848..176062ed314b 100644
--- a/pkgs/tools/networking/drill/default.nix
+++ b/pkgs/tools/networking/drill/default.nix
@@ -8,16 +8,16 @@
rustPlatform.buildRustPackage rec {
pname = "drill";
- version = "0.6.0";
+ version = "0.7.0";
src = fetchFromGitHub {
owner = "fcsonline";
repo = pname;
rev = version;
- sha256 = "0pcc91nk68z7hlhj7xvh6v3rybxpy6bzv3pzjcyaq7l0szjljrpw";
+ sha256 = "07zz0dj0wjwrc1rmayz7s8kpcv03i0ygl4vfwsam72qd4nf6v538";
};
- cargoSha256 = "1611w8b60d3x16ik8v96za0mkr5p0f9gdpz0awprfgj6c3r6s16m";
+ cargoSha256 = "1nbfbmm9v1yp7380zdzz7qrc7x6krwlvgn5x5yzb8yn1rc99jzx4";
nativeBuildInputs = stdenv.lib.optionals stdenv.isLinux [ pkg-config ];
buildInputs = [ ]
@@ -28,6 +28,6 @@ rustPlatform.buildRustPackage rec {
description = "HTTP load testing application inspired by Ansible syntax";
homepage = "https://github.com/fcsonline/drill";
license = licenses.gpl3;
- maintainers = with maintainers; [ filalex77 ];
+ maintainers = with maintainers; [ Br1ght0ne ];
};
}
diff --git a/pkgs/tools/networking/dsniff/default.nix b/pkgs/tools/networking/dsniff/default.nix
index 7d8cf97f46d8..db9c608e931b 100644
--- a/pkgs/tools/networking/dsniff/default.nix
+++ b/pkgs/tools/networking/dsniff/default.nix
@@ -38,7 +38,7 @@ let
inherit (openssl) name;
paths = with openssl.override { static = true; }; [ out dev ];
};
-in stdenv.mkDerivation {
+in stdenv.mkDerivation rec {
pname = "dsniff";
version = "2.4b1";
# upstream is so old that nearly every distribution packages the beta version.
@@ -49,7 +49,7 @@ in stdenv.mkDerivation {
domain = "salsa.debian.org";
owner = "pkg-security-team";
repo = "dsniff";
- rev = "debian%2F2.4b1%2Bdebian-29"; # %2B = urlquote("+"), %2F = urlquote("/")
+ rev = "debian/${version}+debian-29";
sha256 = "10zz9krf65jsqvlcr72ycp5cd27xwr18jkc38zqp2i4j6x0caj2g";
name = "dsniff.tar.gz";
};
diff --git a/pkgs/tools/networking/easyrsa/default.nix b/pkgs/tools/networking/easyrsa/default.nix
index 90e05e5310bd..4568aec9c5d9 100644
--- a/pkgs/tools/networking/easyrsa/default.nix
+++ b/pkgs/tools/networking/easyrsa/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchFromGitHub, openssl, runtimeShell }:
let
- version = "3.0.0";
+ version = "3.0.8";
in stdenv.mkDerivation {
pname = "easyrsa";
inherit version;
@@ -10,14 +10,15 @@ in stdenv.mkDerivation {
owner = "OpenVPN";
repo = "easy-rsa";
rev = "v${version}";
- sha256 = "0wbdv3wmqwm5680rpb971l56xiw49adpicqshk3vhfmpvqzl4dbs";
+ sha256 = "05q60s343ydh9j6hzj0840qdcq8fkyz06q68yw4pqgqg4w68rbgs";
};
patches = [ ./fix-paths.patch ];
installPhase = ''
mkdir -p $out/share/easyrsa
- cp -r easyrsa3/{openssl*.cnf,x509-types,vars.example} $out/share/easyrsa
+ cp -r easyrsa3/{*.cnf,x509-types,vars.example} $out/share/easyrsa
+ cp easyrsa3/openssl-easyrsa.cnf $out/share/easyrsa/safessl-easyrsa.cnf
install -D -m755 easyrsa3/easyrsa $out/bin/easyrsa
substituteInPlace $out/bin/easyrsa \
--subst-var out \
@@ -35,7 +36,7 @@ in stdenv.mkDerivation {
description = "Simple shell based CA utility";
homepage = "https://openvpn.net/";
license = licenses.gpl2;
- maintainers = [ maintainers.offline ];
+ maintainers = [ maintainers.offline maintainers.numinit ];
platforms = platforms.unix;
};
}
diff --git a/pkgs/tools/networking/easyrsa/fix-paths.patch b/pkgs/tools/networking/easyrsa/fix-paths.patch
index 82688fa79460..7891adcb20c7 100644
--- a/pkgs/tools/networking/easyrsa/fix-paths.patch
+++ b/pkgs/tools/networking/easyrsa/fix-paths.patch
@@ -1,33 +1,49 @@
diff --git a/easyrsa3/easyrsa b/easyrsa3/easyrsa
-index 6fec288..210648a 100755
+index 261336f..7b9a79b 100755
--- a/easyrsa3/easyrsa
+++ b/easyrsa3/easyrsa
-@@ -1003,7 +1003,7 @@ Note: using Easy-RSA configuration from: $vars"
+@@ -1661,7 +1661,7 @@ Note: using Easy-RSA configuration from: $vars"
# Set defaults, preferring existing env-vars if present
- set_var EASYRSA "$PWD"
+ set_var EASYRSA "$prog_dir"
- set_var EASYRSA_OPENSSL openssl
+ set_var EASYRSA_OPENSSL "@openssl@"
- set_var EASYRSA_PKI "$EASYRSA/pki"
+ set_var EASYRSA_PKI "$PWD/pki"
set_var EASYRSA_DN cn_only
set_var EASYRSA_REQ_COUNTRY "US"
-@@ -1030,13 +1030,17 @@ Note: using Easy-RSA configuration from: $vars"
- # Detect openssl config, preferring EASYRSA_PKI over EASYRSA
- if [ -f "$EASYRSA_PKI/openssl-1.0.cnf" ]; then
- set_var EASYRSA_SSL_CONF "$EASYRSA_PKI/openssl-1.0.cnf"
-- else set_var EASYRSA_SSL_CONF "$EASYRSA/openssl-1.0.cnf"
-+ elif [ -f "$EASYRSA/openssl-1.0.cnf" ]; then
-+ set_var EASYRSA_SSL_CONF "$EASYRSA/openssl-1.0.cnf"
-+ else set_var EASYRSA_SSL_CONF "@out@/share/easyrsa/openssl-1.0.cnf"
- fi
+@@ -1683,16 +1683,31 @@ Note: using Easy-RSA configuration from: $vars"
+ set_var EASYRSA_TEMP_DIR "$EASYRSA_PKI"
+ set_var EASYRSA_REQ_CN ChangeMe
+ set_var EASYRSA_DIGEST sha256
+- set_var EASYRSA_SSL_CONF "$EASYRSA_PKI/openssl-easyrsa.cnf"
+- set_var EASYRSA_SAFE_CONF "$EASYRSA_PKI/safessl-easyrsa.cnf"
+ set_var EASYRSA_KDC_REALM "CHANGEME.EXAMPLE.COM"
++ if [ -f "$EASYRSA_PKI/safessl-easyrsa.conf" ]; then
++ set_var EASYRSA_SAFE_CONF "$EASYRSA_PKI/safessl-easyrsa.cnf"
++ elif [ -f "$EASYRSA/safessl-easyrsa.conf" ]; then
++ set_var EASYRSA_SAFE_CONF "$EASYRSA/safessl-easyrsa.cnf"
++ elif [ -f "@out@/share/easyrsa/safessl-easyrsa.cnf" ]; then
++ set_var EASYRSA_SAFE_CONF "@out@/share/easyrsa/safessl-easyrsa.cnf"
++ fi
++
++ if [ -f "$EASYRSA_PKI/openssl-easyrsa.conf" ]; then
++ set_var EASYRSA_SSL_CONF "$EASYRSA_PKI/openssl-easyrsa.cnf"
++ elif [ -f "$EASYRSA/openssl-easyrsa.conf" ]; then
++ set_var EASYRSA_SSL_CONF "$EASYRSA/openssl-easyrsa.cnf"
++ elif [ -f "@out@/share/easyrsa/openssl-easyrsa.cnf" ]; then
++ set_var EASYRSA_SSL_CONF "@out@/share/easyrsa/openssl-easyrsa.cnf"
++ fi
++
# Same as above for the x509-types extensions dir
if [ -d "$EASYRSA_PKI/x509-types" ]; then
set_var EASYRSA_EXT_DIR "$EASYRSA_PKI/x509-types"
-- else set_var EASYRSA_EXT_DIR "$EASYRSA/x509-types"
+- else
+- #TODO: This should be removed. Not really suitable for packaging.
+ elif [ -d "$EASYRSA/x509-types" ]; then
-+ set_var EASYRSA_EXT_DIR "$EASYRSA/x509-types"
-+ else set_var EASYRSA_EXT_DIR "@out@/share/easyrsa/x509-types"
+ set_var EASYRSA_EXT_DIR "$EASYRSA/x509-types"
++ else
++ set_var EASYRSA_EXT_DIR "@out@/share/easyrsa/x509-types"
fi
# EASYRSA_ALGO_PARAMS must be set depending on selected algo
diff --git a/pkgs/tools/networking/eternal-terminal/default.nix b/pkgs/tools/networking/eternal-terminal/default.nix
index 452a9873bece..fdad966c81b6 100644
--- a/pkgs/tools/networking/eternal-terminal/default.nix
+++ b/pkgs/tools/networking/eternal-terminal/default.nix
@@ -8,13 +8,13 @@
stdenv.mkDerivation rec {
pname = "eternal-terminal";
- version = "6.0.11";
+ version = "6.0.13";
src = fetchFromGitHub {
owner = "MisterTea";
repo = "EternalTerminal";
rev = "et-v${version}";
- sha256 = "0yjf639ldfaxrw4pbg9avdkhhmcpnx58j3x70zskvgkajny8yqqr";
+ sha256 = "0sb1hypg2276y8c2a5vivrkcxp70swddvhnd9h273if3kv6j879r";
};
nativeBuildInputs = [ cmake ];
diff --git a/pkgs/tools/networking/findomain/default.nix b/pkgs/tools/networking/findomain/default.nix
index a98c634f9039..761e9eb4619b 100644
--- a/pkgs/tools/networking/findomain/default.nix
+++ b/pkgs/tools/networking/findomain/default.nix
@@ -31,6 +31,6 @@ rustPlatform.buildRustPackage rec {
description = "The fastest and cross-platform subdomain enumerator";
homepage = "https://github.com/Edu4rdSHL/findomain";
license = licenses.gpl3;
- maintainers = with maintainers; [ filalex77 ];
+ maintainers = with maintainers; [ Br1ght0ne ];
};
}
diff --git a/pkgs/tools/networking/frp/default.nix b/pkgs/tools/networking/frp/default.nix
index 0e00009751a3..7ba943e338d1 100644
--- a/pkgs/tools/networking/frp/default.nix
+++ b/pkgs/tools/networking/frp/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "frp";
- version = "0.34.1";
+ version = "0.34.3";
src = fetchFromGitHub {
owner = "fatedier";
repo = pname;
rev = "v${version}";
- sha256 = "1n1b7rr6njblz3rmsdl6xng4swlagg2z3jnik0gnajiq3w8ajwdj";
+ sha256 = "1c5337yv7m4ad1mr73a38lbxg6b7sk8pxqkzws01jxrry2jahb35";
};
- vendorSha256 = "18d9478ndzywwmh0jsxcb4i2rqyn3vzrgwflqrsv7krijalknsc9";
+ vendorSha256 = "0srkvd1kvjabf3r391n6spv5n77r7dw4y982ynqsv5grp5f4zmm1";
doCheck = false;
@@ -27,6 +27,6 @@ buildGoModule rec {
'';
homepage = "https://github.com/fatedier/frp";
license = licenses.asl20;
- maintainers = with maintainers; [ filalex77 ];
+ maintainers = with maintainers; [ Br1ght0ne ];
};
}
diff --git a/pkgs/tools/networking/gnirehtet/default.nix b/pkgs/tools/networking/gnirehtet/default.nix
index f739e80be1fe..8d7d2392dfb7 100644
--- a/pkgs/tools/networking/gnirehtet/default.nix
+++ b/pkgs/tools/networking/gnirehtet/default.nix
@@ -1,12 +1,12 @@
-{stdenv, rustPlatform, fetchFromGitHub, fetchzip, androidenv, substituteAll}:
+{ stdenv, rustPlatform, fetchFromGitHub, fetchzip, androidenv, makeWrapper }:
let
-version = "2.4";
+version = "2.5";
apk = stdenv.mkDerivation {
pname = "gnirehtet.apk";
inherit version;
src = fetchzip {
url = "https://github.com/Genymobile/gnirehtet/releases/download/v${version}/gnirehtet-rust-linux64-v${version}.zip";
- sha256 = "13gsh5982v961j86j5y71pgas94g2d1v1fgnbslbqw4h69fbf48g";
+ sha256 = "1db0gkg5z8lighhkyqfsr9jiacrck89zmfnmp74vj865hhxgjzgq";
};
installPhase = ''
mkdir $out
@@ -22,19 +22,18 @@ rustPlatform.buildRustPackage {
owner = "Genymobile";
repo = "gnirehtet";
rev = "v${version}";
- sha256 = "1c99d6zpjxa8xlrg0n1825am20d2pjiicfcjwv8iay9ylfdnvygl";
+ sha256 = "0wk6n082gnj9xk46n542h1012h8gyhldca23bs7vl73g0534g878";
};
sourceRoot = "source/relay-rust";
- cargoSha256 = "0rb5xcqg5ikgrxpmzrql5n298j50aqgkkp45znbfv2x2n40dywad";
+ cargoSha256 = "0i7f52r697gjw30m8k60hd3y6wsn5lpz419r083a1rhpbinzd26q";
- patchFlags = [ "-p2" ];
- patches = [
- (substituteAll {
- src = ./paths.patch;
- adb = "${androidenv.androidPkgs_9_0.platform-tools}/bin/adb";
- inherit apk;
- })
- ];
+ nativeBuildInputs = [ makeWrapper ];
+
+ postInstall = ''
+ wrapProgram $out/bin/gnirehtet \
+ --set GNIREHTET_APK ${apk}/gnirehtet.apk \
+ --set ADB ${androidenv.androidPkgs_9_0.platform-tools}/bin/adb
+ '';
meta = with stdenv.lib; {
description = "Reverse tethering over adb for Android";
diff --git a/pkgs/tools/networking/gnirehtet/paths.patch b/pkgs/tools/networking/gnirehtet/paths.patch
deleted file mode 100644
index e5df4b8e4fe7..000000000000
--- a/pkgs/tools/networking/gnirehtet/paths.patch
+++ /dev/null
@@ -1,48 +0,0 @@
-Index: gnirehtet/relay-rust/src/main.rs
-===================================================================
---- gnirehtet.orig/relay-rust/src/main.rs
-+++ gnirehtet/relay-rust/src/main.rs
-@@ -299,7 +299,7 @@ impl Command for RelayCommand {
-
- fn cmd_install(serial: Option<&String>) -> Result<(), CommandExecutionError> {
- info!(target: TAG, "Installing gnirehtet client...");
-- exec_adb(serial, vec!["install", "-r", "gnirehtet.apk"])
-+ exec_adb(serial, vec!["install", "-r", "@apk@/gnirehtet.apk"])
- }
-
- fn cmd_uninstall(serial: Option<&String>) -> Result<(), CommandExecutionError> {
-@@ -464,8 +464,8 @@ fn exec_adb<S: Into<String>>(
- args: Vec<S>,
- ) -> Result<(), CommandExecutionError> {
- let adb_args = create_adb_args(serial, args);
-- debug!(target: TAG, "Execute: adb {:?}", adb_args);
-- match process::Command::new("adb").args(&adb_args[..]).status() {
-+ debug!(target: TAG, "Execute: @adb@ {:?}", adb_args);
-+ match process::Command::new("@adb@").args(&adb_args[..]).status() {
- Ok(exit_status) => {
- if exit_status.success() {
- Ok(())
-@@ -487,8 +487,8 @@ fn must_install_client(serial: Option<&S
- serial,
- vec!["shell", "dumpsys", "package", "com.genymobile.gnirehtet"],
- );
-- debug!(target: TAG, "Execute: adb {:?}", args);
-- match process::Command::new("adb").args(&args[..]).output() {
-+ debug!(target: TAG, "Execute: @adb@ {:?}", args);
-+ match process::Command::new("@adb@").args(&args[..]).output() {
- Ok(output) => {
- if output.status.success() {
- // the "regex" crate makes the binary far bigger, so just parse the versionCode
-Index: gnirehtet/relay-rust/src/adb_monitor.rs
-===================================================================
---- gnirehtet.orig/relay-rust/src/adb_monitor.rs
-+++ gnirehtet/relay-rust/src/adb_monitor.rs
-@@ -206,7 +206,7 @@ impl AdbMonitor {
-
- fn start_adb_daemon() -> bool {
- info!(target: TAG, "Restarting adb daemon");
-- match process::Command::new("adb")
-+ match process::Command::new("@adb@")
- .args(&["start-server"])
- .status() {
- Ok(exit_status) => {
diff --git a/pkgs/tools/networking/gping/default.nix b/pkgs/tools/networking/gping/default.nix
index 092f3611abb7..fdf5c9ad704b 100644
--- a/pkgs/tools/networking/gping/default.nix
+++ b/pkgs/tools/networking/gping/default.nix
@@ -1,32 +1,25 @@
{ lib
-, iputils
-, python3
-, python3Packages
+, rustPlatform
+, fetchFromGitHub
}:
-python3Packages.buildPythonApplication rec {
+rustPlatform.buildRustPackage rec {
pname = "gping";
- version = "1.1";
+ version = "1.1.0";
- propagatedBuildInputs = with python3Packages; [ colorama ];
-
- src = python3Packages.fetchPypi {
- inherit version;
- pname = "pinggraph";
- sha256 = "0q5ma98457zb6vxsnhmrr3p38j1vg0gl155y0adzfg67wlniac92";
+ src = fetchFromGitHub {
+ owner = "orf";
+ repo = "gping";
+ rev = "v${version}";
+ sha256 = "10hvzgn98qbzs7mmql9wlbll814mkki29lvg71lbvr81wlbdn6mr";
};
- # Make path to ping explicit
- postFixup = ''
- substituteInPlace $out/${python3.sitePackages}/gping/pinger.py \
- --replace 'subprocess.getoutput("ping ' 'subprocess.getoutput("${iputils}/bin/ping ' \
- --replace 'args = ["ping"]' 'args = ["${iputils}/bin/ping"]'
- '';
+ cargoSha256 = "0kkfrdzyy5068k8nz08pfc4cl1dvn0vd6i01gax5dblk122ybbag";
meta = with lib; {
description = "Ping, but with a graph";
homepage = "https://github.com/orf/gping";
- license = licenses.gpl2;
+ license = licenses.mit;
maintainers = with maintainers; [ andrew-d ];
};
}
diff --git a/pkgs/tools/networking/haproxy/default.nix b/pkgs/tools/networking/haproxy/default.nix
index 16670ea175f8..9f01962250dc 100644
--- a/pkgs/tools/networking/haproxy/default.nix
+++ b/pkgs/tools/networking/haproxy/default.nix
@@ -1,7 +1,7 @@
{ useLua ? !stdenv.isDarwin
, usePcre ? true
, withPrometheusExporter ? true
-, stdenv, lib, fetchurl
+, stdenv, lib, fetchurl, nixosTests
, openssl, zlib
, lua5_3 ? null, pcre ? null, systemd ? null
}:
@@ -11,11 +11,11 @@ assert usePcre -> pcre != null;
stdenv.mkDerivation rec {
pname = "haproxy";
- version = "2.2.4";
+ version = "2.3.2";
src = fetchurl {
url = "https://www.haproxy.org/download/${stdenv.lib.versions.majorMinor version}/src/${pname}-${version}.tar.gz";
- sha256 = "1qhvaixns0xgxgd095kvqid0pi6jxsld9ghvnr60khwdzzadk947";
+ sha256 = "1mcg0d6qiwl3xps65ir2sv5sc868zla5wnfhk24d2b0sg6xp7jwr";
};
buildInputs = [ openssl zlib ]
@@ -51,6 +51,8 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
+ passthru.tests.haproxy = nixosTests.haproxy;
+
meta = with lib; {
description = "Reliable, high performance TCP/HTTP load balancer";
longDescription = ''
diff --git a/pkgs/tools/networking/hey/default.nix b/pkgs/tools/networking/hey/default.nix
index 22f933a4b654..edf91dd311d9 100644
--- a/pkgs/tools/networking/hey/default.nix
+++ b/pkgs/tools/networking/hey/default.nix
@@ -2,13 +2,13 @@
buildGoModule rec {
pname = "hey";
- version = "0.1.3";
+ version = "0.1.4";
src = fetchFromGitHub {
owner = "rakyll";
repo = pname;
rev = "v${version}";
- sha256 = "06w5hf0np0ayvjnfy8zgy605yrs5j326nk2gm0fy7amhwx1fzkwv";
+ sha256 = "0gsdksrzlwpba14a43ayyy41l1hxpw4ayjpvqyd4ycakddlkvgzb";
};
vendorSha256 = null;
@@ -19,6 +19,6 @@ buildGoModule rec {
description = "HTTP load generator, ApacheBench (ab) replacement";
homepage = "https://github.com/rakyll/hey";
license = licenses.asl20;
- maintainers = with maintainers; [ filalex77 ];
+ maintainers = with maintainers; [ Br1ght0ne ];
};
}
diff --git a/pkgs/tools/networking/httpstat/default.nix b/pkgs/tools/networking/httpstat/default.nix
index 29bd4c331eb8..e9987a51eaec 100644
--- a/pkgs/tools/networking/httpstat/default.nix
+++ b/pkgs/tools/networking/httpstat/default.nix
@@ -2,12 +2,12 @@
pythonPackages.buildPythonApplication rec {
pname = "httpstat";
- version = "1.2.1";
+ version = "1.3.0";
src = fetchFromGitHub {
owner = "reorx";
repo = pname;
rev = version;
- sha256 = "1vriibcsq4j1hvm5yigbbmmv21dc40y5c9gvd31dg9qkaz26hml6";
+ sha256 = "18k2glnyzxlmry19ijmndim2vqqn3c86smd7xc3haw6k7qafifx1";
};
doCheck = false; # No tests
buildInputs = [ glibcLocales ];
diff --git a/pkgs/tools/networking/i2p/default.nix b/pkgs/tools/networking/i2p/default.nix
index 4371d37391be..5c209393978f 100644
--- a/pkgs/tools/networking/i2p/default.nix
+++ b/pkgs/tools/networking/i2p/default.nix
@@ -2,11 +2,11 @@
let wrapper = stdenv.mkDerivation rec {
pname = "wrapper";
- version = "3.5.43";
+ version = "3.5.44";
src = fetchurl {
url = "https://wrapper.tanukisoftware.com/download/${version}/wrapper_${version}_src.tar.gz";
- sha256 = "19cx3854rk7b2056z8pvxnf4simsg5js7czsy2bys7jl6vh2x02b";
+ sha256 = "1iq4j7srzy5p8q3nci9316bnwx4g71jyvzd1i5hp3s8v1k61910g";
};
buildInputs = [ jdk ];
@@ -32,11 +32,11 @@ in
stdenv.mkDerivation rec {
pname = "i2p";
- version = "0.9.47";
+ version = "0.9.48";
src = fetchurl {
url = "https://download.i2p2.de/releases/${version}/i2psource_${version}.tar.bz2";
- sha256 = "0krcdm73qing7z918wpml9sk6dn0284wps2ghkmlrdaklfkavk6v";
+ sha256 = "0cnm4bwl1gqcx89i96j2qlq6adphy4l72h5whamqwv86n8bmpig8";
};
buildInputs = [ jdk ant gettext which ];
diff --git a/pkgs/tools/networking/i2pd/default.nix b/pkgs/tools/networking/i2pd/default.nix
index 1439b62bc94e..8bf90293a8ec 100644
--- a/pkgs/tools/networking/i2pd/default.nix
+++ b/pkgs/tools/networking/i2pd/default.nix
@@ -9,13 +9,13 @@ assert upnpSupport -> miniupnpc != null;
stdenv.mkDerivation rec {
pname = "i2pd";
- version = "2.34.0";
+ version = "2.35.0";
src = fetchFromGitHub {
owner = "PurpleI2P";
repo = pname;
rev = version;
- sha256 = "0ibk222fwgjaxrmhrk5avcmmbj52ibcsydm2m02xnlpr8kcqsjnc";
+ sha256 = "0bpkgq7srwpjmadsz3nsd14jpr19b1zfrpc074lzjaq15icxxgxc";
};
buildInputs = with stdenv.lib; [ boost zlib openssl ]
diff --git a/pkgs/tools/networking/igmpproxy/default.nix b/pkgs/tools/networking/igmpproxy/default.nix
new file mode 100644
index 000000000000..83b35c098669
--- /dev/null
+++ b/pkgs/tools/networking/igmpproxy/default.nix
@@ -0,0 +1,26 @@
+{ stdenv, fetchFromGitHub, autoreconfHook }:
+
+stdenv.mkDerivation rec {
+ pname = "igmpproxy";
+ version = "0.2.1";
+
+ src = fetchFromGitHub {
+ owner = "pali";
+ repo = "igmpproxy";
+ rev = version;
+ sha256 = "13zn4q24drbhpqmcmqh1jg7ind5iqn11wj3xvczlc8w35vyqssyf";
+ };
+
+ nativeBuildInputs = [ autoreconfHook ];
+
+ meta = with stdenv.lib; {
+ description = "A daemon that routes multicast using IGMP forwarding";
+ homepage = "https://github.com/pali/igmpproxy/";
+ changelog = "https://github.com/pali/igmpproxy/releases/tag/${version}";
+ license = licenses.gpl2Plus;
+ maintainers = [ maintainers.sdier ];
+ # The maintainer is using this on linux, but if you test it on other platforms
+ # please add them here!
+ platforms = platforms.linux;
+ };
+}
diff --git a/pkgs/tools/networking/inadyn/default.nix b/pkgs/tools/networking/inadyn/default.nix
index 2a551c56768c..f01bffa76da5 100644
--- a/pkgs/tools/networking/inadyn/default.nix
+++ b/pkgs/tools/networking/inadyn/default.nix
@@ -19,7 +19,7 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
meta = with stdenv.lib; {
- homepage = "http://troglobit.com/project/inadyn/";
+ homepage = "https://troglobit.com/project/inadyn/";
description = "Free dynamic DNS client";
license = licenses.gpl2Plus;
maintainers = with maintainers; [ ];
diff --git a/pkgs/tools/networking/lldpd/default.nix b/pkgs/tools/networking/lldpd/default.nix
index 5d7c648b2205..229f261c8c3e 100644
--- a/pkgs/tools/networking/lldpd/default.nix
+++ b/pkgs/tools/networking/lldpd/default.nix
@@ -4,11 +4,11 @@
stdenv.mkDerivation rec {
pname = "lldpd";
- version = "1.0.6";
+ version = "1.0.7";
src = fetchurl {
url = "https://media.luffy.cx/files/lldpd/${pname}-${version}.tar.gz";
- sha256 = "1v5fd8vwxracvzvgrsswvhppwyx5c4srj89g1cnvy73w831mpq95";
+ sha256 = "1qc7k83zpcq27hpjv1lmgrj4la2zy1gspwk5jas43j49siwr3xqx";
};
configureFlags = [
diff --git a/pkgs/tools/networking/mailutils/default.nix b/pkgs/tools/networking/mailutils/default.nix
index adcd2f1dc131..ff7d4176bd2e 100644
--- a/pkgs/tools/networking/mailutils/default.nix
+++ b/pkgs/tools/networking/mailutils/default.nix
@@ -3,13 +3,12 @@
, python3, gss, libmysqlclient, system-sendmail }:
stdenv.mkDerivation rec {
- name = "${project}-${version}";
- project = "mailutils";
- version = "3.9";
+ pname = "mailutils";
+ version = "3.10";
src = fetchurl {
- url = "mirror://gnu/${project}/${name}.tar.xz";
- sha256 = "1g1xf2lal04nsnf1iym9n9n0wxjpqbcr9nysxpm98v4pniinqwsz";
+ url = "mirror://gnu/${pname}/${pname}-${version}.tar.xz";
+ sha256 = "17smrxjdgbbzbzakik30vj46q4iib85ksqhb82jr4vjp57akszh9";
};
postPatch = ''
@@ -32,6 +31,18 @@ stdenv.mkDerivation rec {
patches = [
./fix-build-mb-len-max.patch
./path-to-cat.patch
+ # mailquota.c:277: undefined reference to `get_size'
+ # https://lists.gnu.org/archive/html/bug-mailutils/2020-08/msg00002.html
+ (fetchpatch {
+ url = "http://git.savannah.gnu.org/cgit/mailutils.git/patch/?id=37713b42a501892469234b90454731d8d8b7a3e6";
+ sha256 = "1mwj77nxvf4xvqf26yjs59jyksnizj0lmbymbzg4kmqynzq3zjny";
+ })
+ # Fix cross-compilation
+ # https://lists.gnu.org/archive/html/bug-mailutils/2020-11/msg00038.html
+ (fetchpatch {
+ url = "https://lists.gnu.org/archive/html/bug-mailutils/2020-11/txtiNjqcNpqOk.txt";
+ sha256 = "0ghzqb8qx2q8cffbvqzw19mivv7r5f16whplzhm7hdj0j2i6xf6s";
+ })
];
enableParallelBuilding = false;
diff --git a/pkgs/tools/networking/minidlna/default.nix b/pkgs/tools/networking/minidlna/default.nix
index 6a14b5f1c82d..d425e16782b3 100644
--- a/pkgs/tools/networking/minidlna/default.nix
+++ b/pkgs/tools/networking/minidlna/default.nix
@@ -1,6 +1,6 @@
{ stdenv, fetchurl, ffmpeg_3, flac, libvorbis, libogg, libid3tag, libexif, libjpeg, sqlite, gettext }:
-let version = "1.2.1"; in
+let version = "1.3.0"; in
stdenv.mkDerivation {
pname = "minidlna";
@@ -8,7 +8,7 @@ stdenv.mkDerivation {
src = fetchurl {
url = "mirror://sourceforge/project/minidlna/minidlna/${version}/minidlna-${version}.tar.gz";
- sha256 = "1v1ffhmaqxpvf2vv4yyvjsks4skr9y088853awsh7ixh7ai8nf37";
+ sha256 = "0qrw5ny82p5ybccw4pp9jma8nwl28z927v0j2561m0289imv1na7";
};
preConfigure = ''
diff --git a/pkgs/tools/networking/minio-client/default.nix b/pkgs/tools/networking/minio-client/default.nix
index ba715571000f..e452719a494a 100644
--- a/pkgs/tools/networking/minio-client/default.nix
+++ b/pkgs/tools/networking/minio-client/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "minio-client";
- version = "2020-10-03T02-54-56Z";
+ version = "2020-11-25T23-04-07Z";
src = fetchFromGitHub {
owner = "minio";
repo = "mc";
rev = "RELEASE.${version}";
- sha256 = "0pc08w0xdkk9w8xya0q7d1601wprshq852419pwpi8hd7y3q381h";
+ sha256 = "0r4za7jnwmh2wna5l4iv5pz6s5c62f7v4hmbv7misff9qbk4p4k7";
};
- vendorSha256 = "0bkidqcdfjyqjlzxy9w564c6s3vw850wgq6ksx5y1p8f5r4plzxs";
+ vendorSha256 = "0zracgqwhqs3gabrqqm8fm3hyicaadcinsjp5qgprjwd9a3c1zfv";
doCheck = false;
diff --git a/pkgs/tools/networking/modem-manager/default.nix b/pkgs/tools/networking/modem-manager/default.nix
index c3981b902f2b..7bad593e4dfa 100644
--- a/pkgs/tools/networking/modem-manager/default.nix
+++ b/pkgs/tools/networking/modem-manager/default.nix
@@ -3,12 +3,12 @@
stdenv.mkDerivation rec {
pname = "modem-manager";
- version = "1.12.10";
+ version = "1.14.8";
package = "ModemManager";
src = fetchurl {
url = "https://www.freedesktop.org/software/${package}/${package}-${version}.tar.xz";
- sha256 = "1apq9camys2gaw6y6ic1ld20cncfwpmxnzvh4j5zkbbjpf5hbcxj";
+ sha256 = "15cjy7zzsxagx649vz0990avin47vpgdmm4ss2msggdla6x2c6py";
};
nativeBuildInputs = [ vala gobject-introspection gettext pkgconfig ];
diff --git a/pkgs/tools/networking/mosh/default.nix b/pkgs/tools/networking/mosh/default.nix
index 26c9035cd79b..dba75400f6fa 100644
--- a/pkgs/tools/networking/mosh/default.nix
+++ b/pkgs/tools/networking/mosh/default.nix
@@ -3,10 +3,11 @@
, libutempter ? null, withUtempter ? stdenv.isLinux }:
stdenv.mkDerivation rec {
- name = "mosh-1.3.2";
+ pname = "mosh";
+ version = "1.3.2";
src = fetchurl {
- url = "https://mosh.org/${name}.tar.gz";
+ url = "https://mosh.org/mosh-${version}.tar.gz";
sha256 = "05hjhlp6lk8yjcy59zywpf0r6s0h0b9zxq0lw66dh9x8vxrhaq6s";
};
diff --git a/pkgs/tools/networking/nebula/default.nix b/pkgs/tools/networking/nebula/default.nix
index b3cd0d830245..61f0a00a9b81 100644
--- a/pkgs/tools/networking/nebula/default.nix
+++ b/pkgs/tools/networking/nebula/default.nix
@@ -38,7 +38,7 @@ buildGoModule rec {
'';
homepage = "https://github.com/slackhq/nebula";
license = licenses.mit;
- maintainers = with maintainers; [ filalex77 ];
+ maintainers = with maintainers; [ Br1ght0ne ];
};
}
diff --git a/pkgs/tools/networking/network-manager/default.nix b/pkgs/tools/networking/network-manager/default.nix
index f5b12a6cf373..c02275ef5b81 100644
--- a/pkgs/tools/networking/network-manager/default.nix
+++ b/pkgs/tools/networking/network-manager/default.nix
@@ -62,6 +62,13 @@ in stdenv.mkDerivation rec {
# Meson does not support using different directories during build and
# for installation like Autotools did with flags passed to make install.
./fix-install-paths.patch
+
+ # Fix build
+ # https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/merge_requests/620
+ (fetchpatch {
+ url = "https://gitlab.freedesktop.org/NetworkManager/NetworkManager/commit/54e25f23f53af889703dfc50d51a8afeeea8a439.patch";
+ sha256 = "oy/AZhOC15anWeIMYJfDBcITqJ7CiU715he68XvPRxk=";
+ })
];
buildInputs = [
diff --git a/pkgs/tools/networking/nfdump/default.nix b/pkgs/tools/networking/nfdump/default.nix
index 11ba442393dd..0c9bc41099f2 100644
--- a/pkgs/tools/networking/nfdump/default.nix
+++ b/pkgs/tools/networking/nfdump/default.nix
@@ -2,7 +2,7 @@
, autoconf, automake, libtool, pkg-config
, bzip2, libpcap, flex, yacc }:
-let version = "1.6.21"; in
+let version = "1.6.22"; in
stdenv.mkDerivation {
pname = "nfdump";
@@ -12,7 +12,7 @@ stdenv.mkDerivation {
owner = "phaag";
repo = "nfdump";
rev = "v${version}";
- sha256 = "1ifxnpyzyn8nd6n44pjcw0rwck392nzj1gwa4zzqvvgzj477m6ha";
+ sha256 = "14x2k85ard1kp99hhd90zsmvyw24g03m84rn13gb4grm9gjggzrj";
};
nativeBuildInputs = [ autoconf automake flex libtool pkg-config yacc ];
diff --git a/pkgs/tools/networking/openapi-generator-cli/default.nix b/pkgs/tools/networking/openapi-generator-cli/default.nix
index 2b09fe901d07..4630342cf8ae 100644
--- a/pkgs/tools/networking/openapi-generator-cli/default.nix
+++ b/pkgs/tools/networking/openapi-generator-cli/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchurl, jre, makeWrapper }:
stdenv.mkDerivation rec {
- version = "4.2.2";
+ version = "4.3.1";
pname = "openapi-generator-cli";
jarfilename = "${pname}-${version}.jar";
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
src = fetchurl {
url = "mirror://maven/org/openapitools/${pname}/${version}/${jarfilename}";
- sha256 = "1pafv432ll3pp52580pbnk0gnrm6byl5fkrf1rarhxfkpkr82yif";
+ sha256 = "1h9infspwbij9ahb376vc4ijakrqb7xww573ccrqvchxphbcsf7l";
};
phases = [ "installPhase" ];
@@ -31,4 +31,3 @@ stdenv.mkDerivation rec {
maintainers = [ maintainers.shou ];
};
}
-
diff --git a/pkgs/tools/networking/openfortivpn/default.nix b/pkgs/tools/networking/openfortivpn/default.nix
index 0a1680bfdb56..a8ce80f98382 100644
--- a/pkgs/tools/networking/openfortivpn/default.nix
+++ b/pkgs/tools/networking/openfortivpn/default.nix
@@ -8,13 +8,13 @@ let
in
stdenv.mkDerivation rec {
pname = "openfortivpn";
- version = "1.14.1";
+ version = "1.15.0";
src = fetchFromGitHub {
owner = "adrienverge";
repo = pname;
rev = "v${version}";
- sha256 = "1r9lp19fmqx9dw33j5967ydijbnacmr80mqnhbbxyqiw4k5c10ds";
+ sha256 = "1qsfgpxg553s8rc9cyrc4k96z0pislxsdxb9wyhp8fdprkak2mw2";
};
# we cannot write the config file to /etc and as we don't need the file, so drop it
diff --git a/pkgs/tools/networking/openssh/default.nix b/pkgs/tools/networking/openssh/default.nix
index 64e6757891e3..f8a518ca4dce 100644
--- a/pkgs/tools/networking/openssh/default.nix
+++ b/pkgs/tools/networking/openssh/default.nix
@@ -19,13 +19,13 @@
let
- version = "8.3p1";
+ version = "8.4p1";
# **please** update this patch when you update to a new openssh release.
gssapiPatch = fetchpatch {
name = "openssh-gssapi.patch";
- url = "https://salsa.debian.org/ssh-team/openssh/raw/debian/1%25${version}-1/debian/patches/gssapi.patch";
- sha256 = "0j22ccg6msyi88mpsb6x0il5cg8v2b7qdah57ninbwx5isyld80l";
+ url = "https://salsa.debian.org/ssh-team/openssh/raw/debian/1%25${version}-2/debian/patches/gssapi.patch";
+ sha256 = "1z1ckzimlkm1dmr9f5fqjnjg28gsqcwx6xka0klak857548d2lp2";
};
in
@@ -37,12 +37,12 @@ stdenv.mkDerivation rec {
src = if hpnSupport then
fetchurl {
url = "https://github.com/rapier1/openssh-portable/archive/hpn-KitchenSink-${replaceStrings [ "." "p" ] [ "_" "_P" ] version}.tar.gz";
- sha256 = "1ssdwgdxnvjwigisqi8c053znps5a4jf7bzsi99y0xyfzbw0x55k";
+ sha256 = "1x2afjy1isslbg7qlvhhs4zhj2c8q2h1ljz0fc5b4h9pqcm9j540";
}
else
fetchurl {
url = "mirror://openbsd/OpenSSH/portable/${pname}-${version}.tar.gz";
- sha256 = "1cl74ghi9y21dc3f4xa0qamb7dhwacbynh1ks9syprrg8zhgpgpj";
+ sha256 = "091b3pxdlj47scxx6kkf4agkx8c8sdacdxx8m1dw1cby80pd40as";
};
patches =
@@ -53,6 +53,9 @@ stdenv.mkDerivation rec {
./dont_create_privsep_path.patch
./ssh-keysign.patch
+
+ # See https://github.com/openssh/openssh-portable/pull/206
+ ./ssh-copy-id-fix-eof.patch
]
++ optional withGssapiPatches (assert withKerberos; gssapiPatch);
diff --git a/pkgs/tools/networking/openssh/ssh-copy-id-fix-eof.patch b/pkgs/tools/networking/openssh/ssh-copy-id-fix-eof.patch
new file mode 100644
index 000000000000..4ba2b562f556
--- /dev/null
+++ b/pkgs/tools/networking/openssh/ssh-copy-id-fix-eof.patch
@@ -0,0 +1,21 @@
+diff --git a/contrib/ssh-copy-id b/contrib/ssh-copy-id
+index 392f64f..a769077 100644
+--- a/contrib/ssh-copy-id
++++ b/contrib/ssh-copy-id
+@@ -247,7 +247,7 @@ installkeys_sh() {
+ # the -z `tail ...` checks for a trailing newline. The echo adds one if was missing
+ # the cat adds the keys we're getting via STDIN
+ # and if available restorecon is used to restore the SELinux context
+- INSTALLKEYS_SH=$(tr '\t\n' ' ' <<-EOF)
++ INSTALLKEYS_SH=$(tr '\t\n' ' ' <<-EOF
+ cd;
+ umask 077;
+ mkdir -p $(dirname "${AUTH_KEY_FILE}") &&
+@@ -258,6 +258,7 @@ installkeys_sh() {
+ restorecon -F .ssh ${AUTH_KEY_FILE};
+ fi
+ EOF
++ )
+
+ # to defend against quirky remote shells: use 'exec sh -c' to get POSIX;
+ printf "exec sh -c '%s'" "${INSTALLKEYS_SH}"
diff --git a/pkgs/tools/networking/openvpn/default.nix b/pkgs/tools/networking/openvpn/default.nix
index c5a15c2f87a8..04ac97003102 100644
--- a/pkgs/tools/networking/openvpn/default.nix
+++ b/pkgs/tools/networking/openvpn/default.nix
@@ -1,14 +1,23 @@
-{ stdenv, fetchurl, fetchpatch, pkgconfig, makeWrapper
-, iproute, lzo, openssl, pam
-, useSystemd ? stdenv.isLinux, systemd ? null, utillinux ? null
-, pkcs11Support ? false, pkcs11helper ? null,
+{ stdenv
+, fetchurl
+, pkg-config
+, makeWrapper
+, runtimeShell
+, iproute ? null
+, lzo
+, openssl
+, pam
+, useSystemd ? stdenv.isLinux
+, systemd ? null
+, util-linux ? null
+, pkcs11Support ? false
+, pkcs11helper ? null
}:
assert useSystemd -> (systemd != null);
assert pkcs11Support -> (pkcs11helper != null);
with stdenv.lib;
-
let
# Check if the script needs to have other binaries wrapped when changing this.
update-resolved = fetchurl {
@@ -16,49 +25,68 @@ let
sha256 = "021qzv1k0zxgv1rmyfpqj3zlzqr28xa7zff1n7vrbjk36ijylpsc";
};
-in stdenv.mkDerivation rec {
- pname = "openvpn";
- version = "2.4.9";
+ generic = { version, sha256 }:
+ let
+ withIpRoute = stdenv.isLinux && (versionOlder version "2.5");
+ in
+ stdenv.mkDerivation
+ rec {
+ pname = "openvpn";
+ inherit version;
- src = fetchurl {
- url = "https://swupdate.openvpn.net/community/releases/${pname}-${version}.tar.xz";
- sha256 = "1qpbllwlha7cffsd5dlddb8rl22g9rar5zflkz1wrcllhvfkl7v4";
- };
+ src = fetchurl {
+ url = "https://swupdate.openvpn.net/community/releases/${pname}-${version}.tar.xz";
+ inherit sha256;
+ };
+
+ nativeBuildInputs = [ makeWrapper pkg-config ];
- nativeBuildInputs = [ makeWrapper pkgconfig ];
+ buildInputs = [ lzo openssl ]
+ ++ optional stdenv.isLinux pam
+ ++ optional withIpRoute iproute
+ ++ optional useSystemd systemd
+ ++ optional pkcs11Support pkcs11helper;
- buildInputs = [ lzo openssl ]
- ++ optionals stdenv.isLinux [ pam iproute ]
- ++ optional useSystemd systemd
- ++ optional pkcs11Support pkcs11helper;
+ configureFlags = optionals withIpRoute [
+ "--enable-iproute2"
+ "IPROUTE=${iproute}/sbin/ip"
+ ]
+ ++ optional useSystemd "--enable-systemd"
+ ++ optional pkcs11Support "--enable-pkcs11"
+ ++ optional stdenv.isDarwin "--disable-plugin-auth-pam";
- configureFlags = optionals stdenv.isLinux [
- "--enable-iproute2"
- "IPROUTE=${iproute}/sbin/ip" ]
- ++ optional useSystemd "--enable-systemd"
- ++ optional pkcs11Support "--enable-pkcs11"
- ++ optional stdenv.isDarwin "--disable-plugin-auth-pam";
+ postInstall = ''
+ mkdir -p $out/share/doc/openvpn/examples
+ cp -r sample/sample-config-files/ $out/share/doc/openvpn/examples
+ cp -r sample/sample-keys/ $out/share/doc/openvpn/examples
+ cp -r sample/sample-scripts/ $out/share/doc/openvpn/examples
+ '' + optionalString useSystemd ''
+ install -Dm555 ${update-resolved} $out/libexec/update-systemd-resolved
+ wrapProgram $out/libexec/update-systemd-resolved \
+ --prefix PATH : ${makeBinPath [ runtimeShell iproute systemd util-linux ]}
+ '';
- postInstall = ''
- mkdir -p $out/share/doc/openvpn/examples
- cp -r sample/sample-config-files/ $out/share/doc/openvpn/examples
- cp -r sample/sample-keys/ $out/share/doc/openvpn/examples
- cp -r sample/sample-scripts/ $out/share/doc/openvpn/examples
- '' + optionalString useSystemd ''
- install -Dm555 ${update-resolved} $out/libexec/update-systemd-resolved
- wrapProgram $out/libexec/update-systemd-resolved \
- --prefix PATH : ${makeBinPath [ stdenv.shell iproute systemd utillinux ]}
- '';
+ enableParallelBuilding = true;
- enableParallelBuilding = true;
+ meta = with stdenv.lib; {
+ description = "A robust and highly flexible tunneling application";
+ downloadPage = "https://openvpn.net/community-downloads/";
+ homepage = "https://openvpn.net/";
+ license = licenses.gpl2;
+ maintainers = with maintainers; [ viric peterhoeg ];
+ platforms = platforms.unix;
+ };
+ };
+
+in
+{
+ openvpn_24 = generic {
+ version = "2.4.9";
+ sha256 = "1qpbllwlha7cffsd5dlddb8rl22g9rar5zflkz1wrcllhvfkl7v4";
+ };
- meta = with stdenv.lib; {
- description = "A robust and highly flexible tunneling application";
- downloadPage = "https://openvpn.net/community-downloads/";
- homepage = "https://openvpn.net/";
- license = licenses.gpl2;
- maintainers = with maintainers; [ viric ];
- platforms = platforms.unix;
- updateWalker = true;
+ openvpn = generic {
+ version = "2.5.0";
+ sha256 = "sha256-AppCbkTWVstOEYkxnJX+b8mGQkdyT1WZ2Z35xMNHj70=";
};
}
diff --git a/pkgs/tools/networking/openvpn/openvpn_learnaddress.nix b/pkgs/tools/networking/openvpn/openvpn_learnaddress.nix
index d73b8e911b9d..f50d17eaf7de 100644
--- a/pkgs/tools/networking/openvpn/openvpn_learnaddress.nix
+++ b/pkgs/tools/networking/openvpn/openvpn_learnaddress.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchgit, makeWrapper, coreutils, gawk, utillinux }:
+{ stdenv, fetchgit, makeWrapper, coreutils, gawk, util-linux }:
stdenv.mkDerivation {
name = "openvpn-learnaddress-19b03c3";
@@ -9,13 +9,13 @@ stdenv.mkDerivation {
sha256 = "16pcyvyhwsx34i0cjkkx906lmrwdd9gvznvqdwlad4ha8l8f8z42";
};
- buildInputs = [ makeWrapper coreutils gawk utillinux ];
+ buildInputs = [ makeWrapper coreutils gawk util-linux ];
installPhase = ''
install -Dm555 ovpn-learnaddress $out/libexec/openvpn/openvpn-learnaddress
wrapProgram $out/libexec/openvpn/openvpn-learnaddress \
- --prefix PATH : ${stdenv.lib.makeBinPath [ coreutils gawk utillinux ]}
+ --prefix PATH : ${stdenv.lib.makeBinPath [ coreutils gawk util-linux ]}
'';
meta = {
diff --git a/pkgs/tools/networking/openvpn/update-systemd-resolved.nix b/pkgs/tools/networking/openvpn/update-systemd-resolved.nix
index 4d18372363b6..1a192ce6688a 100644
--- a/pkgs/tools/networking/openvpn/update-systemd-resolved.nix
+++ b/pkgs/tools/networking/openvpn/update-systemd-resolved.nix
@@ -1,6 +1,6 @@
{ lib, stdenv, fetchFromGitHub
, makeWrapper
-, iproute, systemd, coreutils, utillinux }:
+, iproute, systemd, coreutils, util-linux }:
stdenv.mkDerivation rec {
pname = "update-systemd-resolved";
@@ -21,7 +21,7 @@ stdenv.mkDerivation rec {
installPhase = ''
wrapProgram $out/libexec/openvpn/update-systemd-resolved \
- --prefix PATH : ${lib.makeBinPath [ iproute systemd coreutils utillinux ]}
+ --prefix PATH : ${lib.makeBinPath [ iproute systemd coreutils util-linux ]}
'';
meta = with stdenv.lib; {
diff --git a/pkgs/tools/networking/pdsh/default.nix b/pkgs/tools/networking/pdsh/default.nix
index 9dd1a5581c55..3f00964bfd35 100644
--- a/pkgs/tools/networking/pdsh/default.nix
+++ b/pkgs/tools/networking/pdsh/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, perl, readline, rsh, ssh }:
+{ stdenv, fetchurl, perl, readline, rsh, ssh, slurm, slurmSupport ? false }:
stdenv.mkDerivation rec {
name = "pdsh-2.34";
@@ -8,7 +8,8 @@ stdenv.mkDerivation rec {
sha256 = "1s91hmhrz7rfb6h3l5k97s393rcm1ww3svp8dx5z8vkkc933wyxl";
};
- buildInputs = [ perl readline ssh ];
+ buildInputs = [ perl readline ssh ]
+ ++ (stdenv.lib.optional slurmSupport slurm);
preConfigure = ''
configureFlagsArray=(
@@ -18,6 +19,7 @@ stdenv.mkDerivation rec {
${if readline == null then "--without-readline" else "--with-readline"}
${if ssh == null then "--without-ssh" else "--with-ssh"}
${if rsh == false then "--without-rsh" else "--with-rsh"}
+ ${if slurmSupport then "--with-slurm" else "--without-slurm"}
"--with-dshgroups"
"--with-xcpu"
"--disable-debug"
diff --git a/pkgs/tools/networking/photon/default.nix b/pkgs/tools/networking/photon/default.nix
index 22da1320803e..db6917ef0b76 100644
--- a/pkgs/tools/networking/photon/default.nix
+++ b/pkgs/tools/networking/photon/default.nix
@@ -19,7 +19,7 @@ python3Packages.buildPythonApplication rec {
installPhase = ''
mkdir -p "$out"/{bin,share/photon}
cp -R photon.py core plugins $out/share/photon
-
+
makeWrapper ${python3Packages.python.interpreter} $out/bin/photon \
--set PYTHONPATH "$PYTHONPATH:$out/share/photon" \
--add-flags "-O $out/share/photon/photon.py"
@@ -29,6 +29,6 @@ python3Packages.buildPythonApplication rec {
description = "a lightning fast web crawler which extracts URLs, files, intel & endpoints from a target";
homepage = "https://github.com/s0md3v/Photon";
license = licenses.gpl3;
- maintainers = with maintainers; [ genesis ];
+ maintainers = with maintainers; [ ];
};
}
diff --git a/pkgs/tools/networking/privoxy/default.nix b/pkgs/tools/networking/privoxy/default.nix
index 10a25d5bf8b2..8346c862fc6e 100644
--- a/pkgs/tools/networking/privoxy/default.nix
+++ b/pkgs/tools/networking/privoxy/default.nix
@@ -3,11 +3,11 @@
stdenv.mkDerivation rec {
pname = "privoxy";
- version = "3.0.28";
+ version = "3.0.29";
src = fetchurl {
url = "mirror://sourceforge/ijbswa/Sources/${version}%20%28stable%29/${pname}-${version}-stable-src.tar.gz";
- sha256 = "0jl2yav1qzqnaqnnx8i6i53ayckkimcrs3l6ryvv7bda6v08rmxm";
+ sha256 = "17a8fbdyb0ixc0wwq68fg7xn7l6n7jq67njpq93psmxgzng0dii5";
};
hardeningEnable = [ "pie" ];
diff --git a/pkgs/tools/networking/proxychains/default.nix b/pkgs/tools/networking/proxychains/default.nix
index 6f00c7fc8b74..6ace8e139e13 100644
--- a/pkgs/tools/networking/proxychains/default.nix
+++ b/pkgs/tools/networking/proxychains/default.nix
@@ -14,6 +14,9 @@ stdenv.mkDerivation rec {
# Temporary work-around; most likely fixed by next upstream release
sed -i Makefile -e '/-lpthread/a LDFLAGS+=-ldl'
'';
+ postInstall = ''
+ cp src/proxychains.conf $out/etc
+ '';
meta = {
description = "Proxifier for SOCKS proxies";
diff --git a/pkgs/tools/networking/shorewall/default.nix b/pkgs/tools/networking/shorewall/default.nix
index 67f81b821053..c56f0eac7ff8 100644
--- a/pkgs/tools/networking/shorewall/default.nix
+++ b/pkgs/tools/networking/shorewall/default.nix
@@ -10,7 +10,7 @@
, perlPackages
, stdenv
, tree
-, utillinux
+, util-linux
}:
let
PATH = stdenv.lib.concatStringsSep ":"
@@ -19,7 +19,7 @@ let
"${iptables}/bin"
"${ipset}/bin"
"${ebtables}/bin"
- "${utillinux}/bin"
+ "${util-linux}/bin"
"${gnugrep}/bin"
"${gnused}/bin"
];
@@ -50,7 +50,7 @@ stdenv.mkDerivation rec {
ipset
iptables
ebtables
- utillinux
+ util-linux
gnugrep
gnused
perl
diff --git a/pkgs/tools/networking/slirp4netns/default.nix b/pkgs/tools/networking/slirp4netns/default.nix
index 39b361bd3020..c0c64405c0d4 100644
--- a/pkgs/tools/networking/slirp4netns/default.nix
+++ b/pkgs/tools/networking/slirp4netns/default.nix
@@ -11,13 +11,13 @@
stdenv.mkDerivation rec {
pname = "slirp4netns";
- version = "1.1.6";
+ version = "1.1.8";
src = fetchFromGitHub {
owner = "rootless-containers";
repo = "slirp4netns";
rev = "v${version}";
- sha256 = "1nspvzcpwmaipdq49jm7z3ymdg95zqgcyv1cjfs1zb950knrrggr";
+ sha256 = "06813k8a1gpakgykz5h75qpdlhrci9r39309n3qqh34ynbjil468";
};
nativeBuildInputs = [ autoreconfHook pkg-config ];
diff --git a/pkgs/tools/networking/subfinder/default.nix b/pkgs/tools/networking/subfinder/default.nix
index 70820ea03208..f812f7ffa91f 100644
--- a/pkgs/tools/networking/subfinder/default.nix
+++ b/pkgs/tools/networking/subfinder/default.nix
@@ -24,6 +24,6 @@ buildGoPackage rec {
'';
homepage = "https://github.com/projectdiscovery/subfinder";
license = licenses.mit;
- maintainers = with maintainers; [ fpletz filalex77 ];
+ maintainers = with maintainers; [ fpletz Br1ght0ne ];
};
}
diff --git a/pkgs/tools/networking/tcpreplay/default.nix b/pkgs/tools/networking/tcpreplay/default.nix
index b40df721c83e..fdf7965311d0 100644
--- a/pkgs/tools/networking/tcpreplay/default.nix
+++ b/pkgs/tools/networking/tcpreplay/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchurl, libpcap, tcpdump }:
+{ stdenv, fetchurl, libpcap, tcpdump, Carbon, CoreServices }:
stdenv.mkDerivation rec {
pname = "tcpreplay";
@@ -9,7 +9,11 @@ stdenv.mkDerivation rec {
sha256 = "1plgjm3dr9rr5q71s7paqk2wgrvkihbk2yrf9g3zaks3m750497d";
};
- buildInputs = [ libpcap ];
+ buildInputs = [ libpcap ]
+ ++ stdenv.lib.optionals stdenv.hostPlatform.isDarwin [
+ Carbon CoreServices
+ ];
+
configureFlags = [
"--disable-local-libopts"
@@ -26,6 +30,6 @@ stdenv.mkDerivation rec {
homepage = "http://tcpreplay.appneta.com/";
license = with licenses; [ bsd3 gpl3 ];
maintainers = with maintainers; [ eleanor ];
- platforms = platforms.linux;
+ platforms = platforms.unix;
};
}
diff --git a/pkgs/tools/networking/telepresence/default.nix b/pkgs/tools/networking/telepresence/default.nix
index 285a3764e038..a077ddb3de46 100644
--- a/pkgs/tools/networking/telepresence/default.nix
+++ b/pkgs/tools/networking/telepresence/default.nix
@@ -3,7 +3,7 @@
, iptables, bash }:
let
- sshuttle-telepresence =
+ sshuttle-telepresence =
let
sshuttleTelepresenceRev = "32226ff14d98d58ccad2a699e10cdfa5d86d6269";
in
@@ -22,13 +22,13 @@ let
});
in pythonPackages.buildPythonPackage rec {
pname = "telepresence";
- version = "0.105";
+ version = "0.108";
src = fetchFromGitHub {
owner = "telepresenceio";
repo = "telepresence";
rev = version;
- sha256 = "0fccbd54ryd9rcbhfh5lx8qcc3kx3k9jads918rwnzwllqzjf7sg";
+ sha256 = "6V0sM0Z+2xNDgL0wIzJOdaUp2Ol4ejNTk9K/pllVa7g=";
};
buildInputs = [ makeWrapper ];
diff --git a/pkgs/tools/networking/tendermint/default.nix b/pkgs/tools/networking/tendermint/default.nix
index 4ca5529bdc60..2fedae4b7a79 100644
--- a/pkgs/tools/networking/tendermint/default.nix
+++ b/pkgs/tools/networking/tendermint/default.nix
@@ -2,16 +2,16 @@
buildGoModule rec {
pname = "tendermint";
- version = "0.33.8";
+ version = "0.34.0";
src = fetchFromGitHub {
owner = "tendermint";
repo = pname;
rev = "v${version}";
- sha256 = "1dcr60gmbkb6833n49mjmlr082ahlv7alaqycl8g3d4f93kdm5c3";
+ sha256 = "1fnykdk35937ld8dyzjs571klz187jr8wlj8ljn78pajx1cd84k6";
};
- vendorSha256 = "0i0n89lal99fqnzva51kp9f7wzqsfmncpshwxhq26kvykp7ji7sw";
+ vendorSha256 = "19qx7ab6ar609cxxdsb9i2c3h7icqgf5bhi28lnsdk3bdjxr27vz";
doCheck = false;
diff --git a/pkgs/tools/networking/tgt/default.nix b/pkgs/tools/networking/tgt/default.nix
index 478c1ed35f29..d9d8478e9856 100644
--- a/pkgs/tools/networking/tgt/default.nix
+++ b/pkgs/tools/networking/tgt/default.nix
@@ -1,5 +1,5 @@
{ stdenv, lib, fetchFromGitHub, libxslt, libaio, systemd, perl, perlPackages
-, docbook_xsl, coreutils, lsof, rdma-core, makeWrapper, sg3_utils, utillinux
+, docbook_xsl, coreutils, lsof, rdma-core, makeWrapper, sg3_utils, util-linux
}:
stdenv.mkDerivation rec {
diff --git a/pkgs/tools/networking/tridactyl-native/default.nix b/pkgs/tools/networking/tridactyl-native/default.nix
index c0a132b481e1..1ebd8d8be6a2 100644
--- a/pkgs/tools/networking/tridactyl-native/default.nix
+++ b/pkgs/tools/networking/tridactyl-native/default.nix
@@ -7,13 +7,13 @@ stdenv.mkDerivation rec {
pname = "tridactyl-native";
# this is actually the version of tridactyl itself; the native messenger will
# probably not change with every tridactyl version
- version = "1.20.2";
+ version = "1.20.3";
src = fetchFromGitHub {
owner = "tridactyl";
repo = "tridactyl";
rev = version;
- sha256 = "0yz1vbqa3sppkjmny5ipnspsdi5gnix7wb6hzvdkm9h1rj2kb8ci";
+ sha256 = "064cl9m4hdv69q1af0xjcf2rf30n3pvz6ym2l53w90aq3217amps";
};
sourceRoot = "source/native";
diff --git a/pkgs/tools/networking/tunnelto/default.nix b/pkgs/tools/networking/tunnelto/default.nix
index c0dce98c4447..4bf251be81fc 100644
--- a/pkgs/tools/networking/tunnelto/default.nix
+++ b/pkgs/tools/networking/tunnelto/default.nix
@@ -28,6 +28,6 @@ rustPlatform.buildRustPackage rec {
description = "Expose your local web server to the internet with a public URL";
homepage = "https://tunnelto.dev";
license = licenses.mit;
- maintainers = with maintainers; [ filalex77 ];
+ maintainers = with maintainers; [ Br1ght0ne ];
};
}
diff --git a/pkgs/tools/networking/urlwatch/default.nix b/pkgs/tools/networking/urlwatch/default.nix
index f23aed3707be..e4b821be1f46 100644
--- a/pkgs/tools/networking/urlwatch/default.nix
+++ b/pkgs/tools/networking/urlwatch/default.nix
@@ -2,13 +2,13 @@
python3Packages.buildPythonApplication rec {
name = "urlwatch-${version}";
- version = "2.19";
+ version = "2.21";
src = fetchFromGitHub {
owner = "thp";
repo = "urlwatch";
rev = version;
- sha256 = "05vxs0x8gnsv2r9cy0brqny1y5jnj2mw11lqc8lqahx84xcs2m00";
+ sha256 = "1s6bigkwymxdp9bkgvwg3lbf465i6k8kmak2w7czf4mhwavcfq63";
};
propagatedBuildInputs = with python3Packages; [
@@ -20,12 +20,13 @@ python3Packages.buildPythonApplication rec {
pycodestyle
pyyaml
requests
+ pyppeteer
];
meta = with stdenv.lib; {
description = "A tool for monitoring webpages for updates";
homepage = "https://thp.io/2008/urlwatch/";
license = licenses.bsd3;
- maintainers = with maintainers; [ tv ];
+ maintainers = with maintainers; [ kmein tv ];
};
}
diff --git a/pkgs/tools/networking/v2ray/default.nix b/pkgs/tools/networking/v2ray/default.nix
index 1165f0bd7e0b..ecc2c2438414 100644
--- a/pkgs/tools/networking/v2ray/default.nix
+++ b/pkgs/tools/networking/v2ray/default.nix
@@ -3,33 +3,33 @@
}:
let
- version = "4.31.0";
+ version = "4.32.1";
src = fetchFromGitHub {
- owner = "v2ray";
+ owner = "v2fly";
repo = "v2ray-core";
rev = "v${version}";
- sha256 = "0s0blc05nrqm78qslv5xb42pjlx5v8qqwg0pwbzhxn9s71x2669m";
+ sha256 = "1mlrl5fz1v3bcb83pczqp859d8w9mi7jj600a2yw7xm372w2irk8";
};
- vendorSha256 = "0n2mf19fvgk5x0j2wwm4zk9xikzvl6cdvw26qar91wzcsraf5z2d";
+ vendorSha256 = "1mz1acdj8ailgyqrr1v47n36qc24ggzw5rmj4p2awfwz3gp2yz6z";
assets = {
# MIT licensed
"geoip.dat" = let
- geoipRev = "202009300006";
- geoipSha256 = "1ss2izqlmrp5b5kpw804jk6c1nyimwlccbkikix3bwfaz4vlv1nc";
+ geoipRev = "202011050012";
+ geoipSha256 = "1d2n3hskgdmcfk1nl7a8lxxz325p84i7gz44cs77z1m9r7c2vsjy";
in fetchurl {
- url = "https://github.com/v2ray/geoip/releases/download/${geoipRev}/geoip.dat";
+ url = "https://github.com/v2fly/geoip/releases/download/${geoipRev}/geoip.dat";
sha256 = geoipSha256;
};
# MIT licensed
"geosite.dat" = let
- geositeRev = "20201010021828";
- geositeSha256 = "0gpfhcf4iyx7ip7rlkb0l1q64w84zvmcah52qyjwljs6l4p3hrj9";
+ geositeRev = "20201102141726";
+ geositeSha256 = "0sn2f5vd6w94ryh845mnbfyjzycg7cvb66rkzh37pg9l7fvgs4jh";
in fetchurl {
- url = "https://github.com/v2ray/domain-list-community/releases/download/${geositeRev}/dlc.dat";
+ url = "https://github.com/v2fly/domain-list-community/releases/download/${geositeRev}/dlc.dat";
sha256 = geositeSha256;
};
@@ -59,20 +59,23 @@ let
installPhase = ''
install -Dm755 v2ray v2ctl -t $out/bin
'';
+
+ meta = {
+ homepage = "https://www.v2ray.com/en/index.html";
+ description = "A platform for building proxies to bypass network restrictions";
+ # The license of the dependency `https://github.com/XTLS/Go` doesn't allowed user to modify its source code,
+ # which made it unfree.
+ license = with lib.licenses; [ mit unfree ];
+ maintainers = with lib.maintainers; [ servalcatty ];
+ };
};
in runCommand "v2ray-${version}" {
inherit version;
+ inherit (core) meta;
nativeBuildInputs = [ makeWrapper ];
- meta = {
- homepage = "https://www.v2ray.com/en/index.html";
- description = "A platform for building proxies to bypass network restrictions";
- license = with lib.licenses; [ mit ];
- maintainers = with lib.maintainers; [ servalcatty ];
- };
-
passthru = {
updateScript = ./update.sh;
tests = {
diff --git a/pkgs/tools/networking/v2ray/update.sh b/pkgs/tools/networking/v2ray/update.sh
index 56a148444c71..08062b1e9969 100755
--- a/pkgs/tools/networking/v2ray/update.sh
+++ b/pkgs/tools/networking/v2ray/update.sh
@@ -14,7 +14,7 @@ echo "Current version:" >&2
echo "core: $old_core_rev, geoip: $old_geoip_rev, geosite: $old_geosite_rev" >&2
function fetch_latest_rev {
- curl "https://api.github.com/repos/v2ray/$1/releases" |
+ curl "https://api.github.com/repos/v2fly/$1/releases" |
jq '.[0].tag_name' --raw-output
}
@@ -28,7 +28,7 @@ echo "core: $core_rev, geoip: $geoip_rev, geosite: $geosite_rev" >&2
if [[ $core_rev != $old_core_rev ]]; then
echo "Prefetching core..." >&2
{ read hash; read store_path; } < <(
- nix-prefetch-url --unpack --print-path "https://github.com/v2ray/v2ray-core/archive/v$core_rev.zip"
+ nix-prefetch-url --unpack --print-path "https://github.com/v2fly/v2ray-core/archive/v$core_rev.zip"
)
sed --in-place \
@@ -40,7 +40,7 @@ fi
if [[ $geoip_rev != $old_geoip_rev ]]; then
echo "Prefetching geoip..." >&2
- hash=$(nix-prefetch-url "https://github.com/v2ray/geoip/releases/download/$geoip_rev/geoip.dat")
+ hash=$(nix-prefetch-url "https://github.com/v2fly/geoip/releases/download/$geoip_rev/geoip.dat")
sed --in-place \
-e "s/\bgeoipRev = \".*\"/geoipRev = \"$geoip_rev\"/" \
-e "s/\bgeoipSha256 = \".*\"/geoipSha256 = \"$hash\"/" \
@@ -49,7 +49,7 @@ fi
if [[ $geosite_rev != $old_geosite_rev ]]; then
echo "Prefetching geosite..." >&2
- hash=$(nix-prefetch-url "https://github.com/v2ray/domain-list-community/releases/download/$geosite_rev/dlc.dat")
+ hash=$(nix-prefetch-url "https://github.com/v2fly/domain-list-community/releases/download/$geosite_rev/dlc.dat")
sed --in-place \
-e "s/\bgeositeRev = \".*\"/geositeRev = \"$geosite_rev\"/" \
-e "s/\bgeositeSha256 = \".*\"/geositeSha256 = \"$hash\"/" \
diff --git a/pkgs/tools/networking/wavemon/default.nix b/pkgs/tools/networking/wavemon/default.nix
index dab52720a029..8549495e8f82 100644
--- a/pkgs/tools/networking/wavemon/default.nix
+++ b/pkgs/tools/networking/wavemon/default.nix
@@ -1,7 +1,7 @@
{ stdenv, fetchFromGitHub, ncurses, libnl, pkgconfig }:
stdenv.mkDerivation rec {
- version = "0.9.1";
+ version = "0.9.2";
baseName = "wavemon";
name = "${baseName}-${version}";
@@ -12,7 +12,7 @@ stdenv.mkDerivation rec {
owner = "uoaerg";
repo = "wavemon";
rev = "v${version}";
- sha256 = "109ycwnjjqc2vpnd8b86njfifczlxglnyv4rh2qmbn2i5nw2wryg";
+ sha256 = "0y984wm03lzqf7bk06a07mw7d1fzjsp9x7zxcvlx4xqmv7wlgb29";
};
meta = with stdenv.lib; {
diff --git a/pkgs/tools/networking/ytcc/default.nix b/pkgs/tools/networking/ytcc/default.nix
index dc38648c369c..2d474159359f 100644
--- a/pkgs/tools/networking/ytcc/default.nix
+++ b/pkgs/tools/networking/ytcc/default.nix
@@ -19,11 +19,11 @@ python3Packages.buildPythonApplication rec {
# Disable tests that touch network or shell out to commands
checkPhase = ''
- pytest . -k 'not get_channels \
+ pytest . -k "not get_channels \
and not play_video \
and not download_videos \
and not update_all \
- and not add_channel_duplicate'
+ and not add_channel_duplicate"
'';
meta = {
diff --git a/pkgs/tools/networking/zerotierone/default.nix b/pkgs/tools/networking/zerotierone/default.nix
index 666b30d2c8e7..1413ca72a105 100644
--- a/pkgs/tools/networking/zerotierone/default.nix
+++ b/pkgs/tools/networking/zerotierone/default.nix
@@ -2,22 +2,16 @@
stdenv.mkDerivation rec {
pname = "zerotierone";
- version = "1.4.6";
+ version = "1.6.2";
src = fetchFromGitHub {
owner = "zerotier";
repo = "ZeroTierOne";
rev = version;
- sha256 = "1f8hh05wx59dc0fbzdzwq05x0gmrdfl4v103wbcyjmzsbazaw6p3";
+ sha256 = "0lky68fjrqjsd62g97jkn5a9hzj53g8wb6d2ncx8s21rknpncdar";
};
preConfigure = ''
- substituteInPlace ./osdep/ManagedRoute.cpp \
- --replace '/usr/sbin/ip' '${iproute}/bin/ip'
-
- substituteInPlace ./osdep/ManagedRoute.cpp \
- --replace '/sbin/ip' '${iproute}/bin/ip'
-
patchShebangs ./doc/build.sh
substituteInPlace ./doc/build.sh \
--replace '/usr/bin/ronn' '${buildPackages.ronn}/bin/ronn' \