diff options
author | Vladimír Čunát <vcunat@gmail.com> | 2014-02-02 10:05:25 +0100 |
---|---|---|
committer | Vladimír Čunát <vcunat@gmail.com> | 2014-02-02 10:05:25 +0100 |
commit | 6e2d3b98473523672b06ff5c90b5b387a029e566 (patch) | |
tree | 4f53d0adf17553b40031d35fae3e6f263933fd93 /pkgs/tools/networking | |
parent | fcaa782b6ab7cd18b8ccca82cc6615b0b3c36b18 (diff) | |
parent | 14a6a059f5863bfd9e7c69336baa8a918b41a86a (diff) | |
download | nixpkgs-6e2d3b98473523672b06ff5c90b5b387a029e566.tar nixpkgs-6e2d3b98473523672b06ff5c90b5b387a029e566.tar.gz nixpkgs-6e2d3b98473523672b06ff5c90b5b387a029e566.tar.bz2 nixpkgs-6e2d3b98473523672b06ff5c90b5b387a029e566.tar.lz nixpkgs-6e2d3b98473523672b06ff5c90b5b387a029e566.tar.xz nixpkgs-6e2d3b98473523672b06ff5c90b5b387a029e566.tar.zst nixpkgs-6e2d3b98473523672b06ff5c90b5b387a029e566.zip |
Merge master into x-updates
Diffstat (limited to 'pkgs/tools/networking')
-rw-r--r-- | pkgs/tools/networking/bully/default.nix | 28 | ||||
-rw-r--r-- | pkgs/tools/networking/gupnp-tools/default.nix | 17 | ||||
-rw-r--r-- | pkgs/tools/networking/iftop/default.nix | 1 | ||||
-rw-r--r-- | pkgs/tools/networking/nbd/default.nix | 8 | ||||
-rw-r--r-- | pkgs/tools/networking/openssh/default.nix | 23 | ||||
-rw-r--r-- | pkgs/tools/networking/tcpdump/default.nix | 1 |
6 files changed, 58 insertions, 20 deletions
diff --git a/pkgs/tools/networking/bully/default.nix b/pkgs/tools/networking/bully/default.nix new file mode 100644 index 00000000000..f667d772ac4 --- /dev/null +++ b/pkgs/tools/networking/bully/default.nix @@ -0,0 +1,28 @@ +{stdenv, fetchurl, openssl, libpcap}: + +stdenv.mkDerivation rec { + name = "bully-${version}"; + version = "1.0-22"; + src = fetchurl { + url = "https://github.com/bdpurcell/bully/archive/v${version}.tar.gz"; + sha256 = "72f568f659fdcf70455a17f91f25dde65a53431c67c796517d3d3c4a4703ab68"; + }; + buildInputs = [ openssl libpcap ]; + + buildPhase = '' + cd src + make + ''; + + installPhase = '' + mkdir -p $out/bin + mv bully $out/bin + ''; + + meta = { + description = "Retrieve WPA/WPA2 passphrase from a WPS enabled access point."; + homepage = "https://github.com/bdpurcell/bully"; + maintainers = [ stdenv.lib.maintainers.edwtjo ]; + license = stdenv.lib.licenses.gpl3; + }; +} \ No newline at end of file diff --git a/pkgs/tools/networking/gupnp-tools/default.nix b/pkgs/tools/networking/gupnp-tools/default.nix index 8346be2ceb5..54f3e860e0c 100644 --- a/pkgs/tools/networking/gupnp-tools/default.nix +++ b/pkgs/tools/networking/gupnp-tools/default.nix @@ -1,11 +1,18 @@ -{fetchurl, stdenv, gupnp, gssdp, pkgconfig, glib, libxml2, libsoup, gtk, libglade, gnomeicontheme, e2fsprogs}: +{fetchurl, stdenv, gupnp, gssdp, pkgconfig, gtk3, libuuid, intltool, gupnp_av, gnome3, makeWrapper}: stdenv.mkDerivation rec { - name = "gupnp-tools-0.6"; + name = "gupnp-tools-${version}"; + majorVersion = "0.8"; + version = "${majorVersion}.8"; src = fetchurl { - url = "http://www.gupnp.org/sources/gupnp-tools/gupnp-tools-0.6.tar.gz"; - sha256 = "08fnggk85zqdcvm4np53yxw15b3ck25c2rmyfrh04g8j25qf50dj"; + url = "mirror://gnome/sources/gupnp-tools/${majorVersion}/gupnp-tools-${version}.tar.xz"; + sha256 = "160dgh9pmlb85qfavwqz46lqawpshs8514bx2b57f9rbiny8kbij"; }; - buildInputs = [gupnp gssdp pkgconfig glib libxml2 libsoup gtk libglade gnomeicontheme e2fsprogs]; + buildInputs = [gupnp libuuid gssdp pkgconfig gtk3 intltool gupnp_av gnome3.gnome_icon_theme gnome3.gnome_themes_standard makeWrapper]; + + postInstall = '' + wrapProgram "$out/bin/gupnp-av-cp" --prefix XDG_DATA_DIRS : "${gtk3}/share:${gnome3.gnome_themes_standard}/share:${gnome3.gnome_icon_theme}/share:$out/share" + wrapProgram "$out/bin/gupnp-universal-cp" --prefix XDG_DATA_DIRS : "${gtk3}/share:${gnome3.gnome_themes_standard}/share:${gnome3.gnome_icon_theme}/share:$out/share" + ''; } diff --git a/pkgs/tools/networking/iftop/default.nix b/pkgs/tools/networking/iftop/default.nix index a1f5026fb28..c40764866eb 100644 --- a/pkgs/tools/networking/iftop/default.nix +++ b/pkgs/tools/networking/iftop/default.nix @@ -28,5 +28,6 @@ stdenv.mkDerivation rec { license = licenses.gpl2Plus; homepage = http://ex-parrot.com/pdw/iftop/; platforms = platforms.linux; + maintainers = maintainers.mornfall; }; } diff --git a/pkgs/tools/networking/nbd/default.nix b/pkgs/tools/networking/nbd/default.nix index 99793c139cb..54f6689582d 100644 --- a/pkgs/tools/networking/nbd/default.nix +++ b/pkgs/tools/networking/nbd/default.nix @@ -1,21 +1,21 @@ { stdenv, fetchurl, pkgconfig, glib }: let - name = "nbd-3.5"; + name = "nbd-3.7"; in stdenv.mkDerivation { inherit name; src = fetchurl { - url = "mirror://sourceforge/nbd/${name}.tar.bz2"; - sha256 = "0frnbmdcm1b0nmmpvpwjb9h1yabdpwwd2l95056mhl2zaafh8gqx"; + url = "mirror://sourceforge/nbd/${name}.tar.xz"; + sha256 = "1k4bvg5rg4q6b58y4kd9qwj07sznsfbknlpc6y1bk6c48rgr3d0b"; }; buildInputs = [ pkgconfig glib ] ++ stdenv.lib.optional (stdenv ? glibc) stdenv.glibc.kernelHeaders; postInstall = '' mkdir -p "$out/share/doc/${name}" - cp README "$out/share/doc/${name}/README" + cp README.md "$out/share/doc/${name}/" ''; # The test suite doesn't succeed in chroot builds. diff --git a/pkgs/tools/networking/openssh/default.nix b/pkgs/tools/networking/openssh/default.nix index 1f785fdf730..0b68ec83b52 100644 --- a/pkgs/tools/networking/openssh/default.nix +++ b/pkgs/tools/networking/openssh/default.nix @@ -13,15 +13,16 @@ let url = mirror://sourceforge/hpnssh/openssh-6.3p1-hpnssh14v2.diff.gz; sha256 = "1jldqjwry9qpxxzb3mikfmmmv90mfb7xkmcfdbvwqac6nl3r7bi3"; }; + optionalString = stdenv.lib.optionalString; in stdenv.mkDerivation rec { - name = "openssh-6.4p1"; + name = "openssh-6.5p1"; src = fetchurl { url = "ftp://ftp.nl.uu.net/pub/OpenBSD/OpenSSH/portable/${name}.tar.gz"; - sha256 = "1lkmi7v83qvpcc04qrrqk4k7mafnmwxkfk1ccsisw51va4bgcc2m"; + sha256 = "09wh7mi65aahyxd2xvq1makckhd5laid8c0pb8njaidrbpamw6d1"; }; prePatch = stdenv.lib.optionalString hpnSupport @@ -32,9 +33,8 @@ stdenv.mkDerivation rec { patches = [ ./locale_archive.patch ]; - buildInputs = [ zlib openssl libedit pkgconfig pam ] ++ - (if withKerberos then [ kerberos ] else []) - ; + buildInputs = [ zlib openssl libedit pkgconfig pam ] + ++ stdenv.lib.optional withKerberos [ kerberos ]; # I set --disable-strip because later we strip anyway. And it fails to strip # properly when cross building. @@ -44,8 +44,8 @@ stdenv.mkDerivation rec { --with-libedit=yes --disable-strip ${if pam != null then "--with-pam" else "--without-pam"} - ${if etcDir != null then "--sysconfdir=${etcDir}" else ""} - ${if withKerberos then "--with-kerberos5=${kerberos}" else ""} + ${optionalString (etcDir != null) "--sysconfdir=${etcDir}"} + ${optionalString withKerberos "--with-kerberos5=${kerberos}"} ''; preConfigure = @@ -67,11 +67,12 @@ stdenv.mkDerivation rec { installTargets = "install-nosysconf"; - meta = { - homepage = http://www.openssh.org/; + meta = with stdenv.lib; { + homepage = "http://www.openssh.org/"; description = "An implementation of the SSH protocol"; license = "bsd"; - platforms = stdenv.lib.platforms.unix; - maintainers = stdenv.lib.maintainers.eelco; + platforms = platforms.unix; + maintainers = with maintainers; [ eelco ]; + broken = hpnSupport; # cf. https://github.com/NixOS/nixpkgs/pull/1640 }; } diff --git a/pkgs/tools/networking/tcpdump/default.nix b/pkgs/tools/networking/tcpdump/default.nix index acea2d6da6a..2e27c2b2dc3 100644 --- a/pkgs/tools/networking/tcpdump/default.nix +++ b/pkgs/tools/networking/tcpdump/default.nix @@ -20,5 +20,6 @@ stdenv.mkDerivation rec { description = "tcpdump, a famous network sniffer"; homepage = http://www.tcpdump.org/; license = "BSD-style"; + maintainers = stdenv.lib.maintainers.mornfall; }; } |