···17 # We need to force the autodetection because detection doesn't
18 # work in pure build environments.
19 configureFlags = [
20- ("--with-pcap=" + {
21- linux = "linux";
22- darwin = "bpf";
23- }.${stdenv.hostPlatform.parsed.kernel.name})
24 ] ++ optionals stdenv.isDarwin [
25 "--disable-universal"
26 ] ++ optionals (stdenv.hostPlatform == stdenv.buildPlatform)
···17 # We need to force the autodetection because detection doesn't
18 # work in pure build environments.
19 configureFlags = [
20+ "--with-pcap=${if stdenv.isLinux then "linux" else "bpf"}"
00021 ] ++ optionals stdenv.isDarwin [
22 "--disable-universal"
23 ] ++ optionals (stdenv.hostPlatform == stdenv.buildPlatform)
···61 builder = ./builder.sh;
6263 meta = with lib; {
64- maintainers = with maintainers; [matthewbauer];
65 platforms = platforms.unix;
66 license = licenses.bsd2;
67 };
···61 builder = ./builder.sh;
6263 meta = with lib; {
64+ maintainers = with maintainers; [ matthewbauer qyliss ];
65 platforms = platforms.unix;
66 license = licenses.bsd2;
67 };
+13-2
pkgs/os-specific/darwin/darling/default.nix
···8 url = "https://github.com/darlinghq/darling/archive/d2cc5fa748003aaa70ad4180fff0a9a85dc65e9b.tar.gz";
9 sha256 = "11b51fw47nl505h63bgx5kqiyhf3glhp1q6jkpb6nqfislnzzkrf";
10 postFetch = ''
11- # Get rid of case conflict
12- mkdir $out
00013 cd $out
14 tar -xzf $downloadedFile --strip-components=1
15 rm -r $out/src/libm
0000000016 '';
17 };
18
···8 url = "https://github.com/darlinghq/darling/archive/d2cc5fa748003aaa70ad4180fff0a9a85dc65e9b.tar.gz";
9 sha256 = "11b51fw47nl505h63bgx5kqiyhf3glhp1q6jkpb6nqfislnzzkrf";
10 postFetch = ''
11+ # The archive contains both `src/opendirectory` and `src/OpenDirectory`,
12+ # pre-create the directory to choose the canonical case on
13+ # case-insensitive filesystems.
14+ mkdir -p $out/src/OpenDirectory
15+16 cd $out
17 tar -xzf $downloadedFile --strip-components=1
18 rm -r $out/src/libm
19+20+ # If `src/opendirectory` and `src/OpenDirectory` refer to different
21+ # things, then combine them into `src/OpenDirectory` to match the result
22+ # on case-insensitive filesystems.
23+ if [ "$(stat -c %i src/opendirectory)" != "$(stat -c %i src/OpenDirectory)" ]; then
24+ mv src/opendirectory/* src/OpenDirectory/
25+ rmdir src/opendirectory
26+ fi
27 '';
28 };
29
+4-3
pkgs/servers/nosql/redis/default.nix
···1-{ lib, stdenv, fetchurl, lua, pkg-config, systemd, nixosTests
02, tlsSupport ? true, openssl
3}:
4···23 nativeBuildInputs = [ pkg-config ];
2425 buildInputs = [ lua ]
26- ++ lib.optional (stdenv.isLinux && !stdenv.hostPlatform.isMusl) systemd
27 ++ lib.optionals tlsSupport [ openssl ];
28 # More cross-compiling fixes.
29 # Note: this enables libc malloc as a temporary fix for cross-compiling.
···31 # It's weird that the build isn't failing because of failure to compile dependencies, it's from failure to link them!
32 makeFlags = [ "PREFIX=$(out)" ]
33 ++ lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform) [ "AR=${stdenv.cc.targetPrefix}ar" "RANLIB=${stdenv.cc.targetPrefix}ranlib" "MALLOC=libc" ]
34- ++ lib.optional (stdenv.isLinux && !stdenv.hostPlatform.isMusl) ["USE_SYSTEMD=yes"]
35 ++ lib.optionals tlsSupport [ "BUILD_TLS=yes" ];
3637 enableParallelBuilding = true;
···1+{ lib, stdenv, fetchurl, lua, pkg-config, nixosTests
2+, withSystemd ? stdenv.isLinux && !stdenv.hostPlatform.isMusl, systemd
3, tlsSupport ? true, openssl
4}:
5···24 nativeBuildInputs = [ pkg-config ];
2526 buildInputs = [ lua ]
27+ ++ lib.optional withSystemd systemd
28 ++ lib.optionals tlsSupport [ openssl ];
29 # More cross-compiling fixes.
30 # Note: this enables libc malloc as a temporary fix for cross-compiling.
···32 # It's weird that the build isn't failing because of failure to compile dependencies, it's from failure to link them!
33 makeFlags = [ "PREFIX=$(out)" ]
34 ++ lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform) [ "AR=${stdenv.cc.targetPrefix}ar" "RANLIB=${stdenv.cc.targetPrefix}ranlib" "MALLOC=libc" ]
35+ ++ lib.optional withSystemd [ "USE_SYSTEMD=yes" ]
36 ++ lib.optionals tlsSupport [ "BUILD_TLS=yes" ];
3738 enableParallelBuilding = true;
···1-{ buildGoModule
02, fetchFromGitHub
3-, lib
4}:
56buildGoModule rec {
7 pname = "ffuf";
8- version = "1.2.1";
910 src = fetchFromGitHub {
11 owner = pname;
12 repo = pname;
13 rev = "v${version}";
14- sha256 = "sha256-XSdFLfSYDdKI7BYo9emYanvZeSFGxiNLYxuw5QKAyRc=";
15 };
1617 vendorSha256 = "sha256-szT08rIozAuliOmge5RFX4NeVrJ2pCVyfotrHuvc0UU=";
18-19- # tests don't pass due to an issue with the memory addresses
20- # https://github.com/ffuf/ffuf/issues/367
21- doCheck = false;
2223 meta = with lib; {
24 description = "Fast web fuzzer written in Go";
···1+{ lib
2+, buildGoModule
3, fetchFromGitHub
04}:
56buildGoModule rec {
7 pname = "ffuf";
8+ version = "1.3.0";
910 src = fetchFromGitHub {
11 owner = pname;
12 repo = pname;
13 rev = "v${version}";
14+ sha256 = "sha256-0ckpEiXxen2E9IzrsmKoEKagoJ5maAbH1tHKgQjoCjo=";
15 };
1617 vendorSha256 = "sha256-szT08rIozAuliOmge5RFX4NeVrJ2pCVyfotrHuvc0UU=";
00001819 meta = with lib; {
20 description = "Fast web fuzzer written in Go";
+30
pkgs/tools/security/traitor/default.nix
···000000000000000000000000000000
···1+{ lib
2+, buildGoModule
3+, fetchFromGitHub
4+}:
5+6+buildGoModule rec {
7+ pname = "traitor";
8+ version = "0.0.3";
9+10+ src = fetchFromGitHub {
11+ owner = "liamg";
12+ repo = pname;
13+ rev = "v${version}";
14+ sha256 = "0mffh4k87ybl0mpglgi2yfwksygrh62mcmkcmfcbszlh5pagsch1";
15+ };
16+17+ vendorSha256 = null;
18+19+ meta = with lib; {
20+ description = "Automatic Linux privilege escalation";
21+ longDescription = ''
22+ Automatically exploit low-hanging fruit to pop a root shell. Traitor packages
23+ up a bunch of methods to exploit local misconfigurations and vulnerabilities
24+ (including most of GTFOBins) in order to pop a root shell.
25+ '';
26+ homepage = "https://github.com/liamg/traitor";
27+ license = with licenses; [ mit ];
28+ maintainers = with maintainers; [ fab ];
29+ };
30+}