diff options
Diffstat (limited to 'pkgs/tools/security')
-rw-r--r-- | pkgs/tools/security/bitwarden/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/buttercup-desktop/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/security/certipy/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/security/duo-unix/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/security/exploitdb/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/security/ghidra/build.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/ghidra/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/gitleaks/default.nix | 6 | ||||
-rw-r--r-- | pkgs/tools/security/jd-gui/default.nix | 6 | ||||
-rw-r--r-- | pkgs/tools/security/log4j-sniffer/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/security/nuclei/default.nix | 6 | ||||
-rw-r--r-- | pkgs/tools/security/open-ecard/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/pwgen-secure/default.nix | 17 | ||||
-rw-r--r-- | pkgs/tools/security/yara/default.nix | 26 |
14 files changed, 54 insertions, 35 deletions
diff --git a/pkgs/tools/security/bitwarden/default.nix b/pkgs/tools/security/bitwarden/default.nix index 40552d14904..ad757425761 100644 --- a/pkgs/tools/security/bitwarden/default.nix +++ b/pkgs/tools/security/bitwarden/default.nix @@ -27,7 +27,7 @@ stdenv.mkDerivation rec { icon = "bitwarden"; comment = "A secure and free password manager for all of your devices"; desktopName = "Bitwarden"; - categories = "Utility"; + categories = [ "Utility" ]; }; dontBuild = true; diff --git a/pkgs/tools/security/buttercup-desktop/default.nix b/pkgs/tools/security/buttercup-desktop/default.nix index 07df51e84e3..22106727e39 100644 --- a/pkgs/tools/security/buttercup-desktop/default.nix +++ b/pkgs/tools/security/buttercup-desktop/default.nix @@ -2,11 +2,11 @@ let pname = "buttercup-desktop"; - version = "2.13.0"; + version = "2.14.2"; name = "${pname}-${version}"; src = fetchurl { url = "https://github.com/buttercup/buttercup-desktop/releases/download/v${version}/Buttercup-linux-x86_64.AppImage"; - sha256 = "sha256-JXXJZyd/fp2463WyxIB+pKcNzGUFfCouPE6iTx2lhME="; + sha256 = "sha256-ZZaolebDGqRk4BHP5PxFxBsMgOQAxUoIMTlhxM58k0Y="; }; appimageContents = appimageTools.extractType2 { inherit name src; }; diff --git a/pkgs/tools/security/certipy/default.nix b/pkgs/tools/security/certipy/default.nix index 536a1a502ad..c6b0efe28a2 100644 --- a/pkgs/tools/security/certipy/default.nix +++ b/pkgs/tools/security/certipy/default.nix @@ -5,13 +5,13 @@ python3.pkgs.buildPythonApplication rec { pname = "certipy"; - version = "2.0"; + version = "2.0.7"; src = fetchFromGitHub { owner = "ly4k"; repo = "Certipy"; rev = version; - hash = "sha256-xN0DrLrxWNCEy3HodA1pOJHYhDyA1sMRVIfefbXq45E="; + hash = "sha256-/89TO/Dzj53bxndLgMIPCaL3axXJUEpX07+25xtnmws="; }; propagatedBuildInputs = with python3.pkgs; [ diff --git a/pkgs/tools/security/duo-unix/default.nix b/pkgs/tools/security/duo-unix/default.nix index 0ec07371df3..5769e1a4b7b 100644 --- a/pkgs/tools/security/duo-unix/default.nix +++ b/pkgs/tools/security/duo-unix/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { pname = "duo-unix"; - version = "1.11.5"; + version = "1.12.0"; src = fetchurl { url = "https://dl.duosecurity.com/duo_unix-${version}.tar.gz"; - sha256 = "sha256-7pE4EnyV22qQ13RFKHv0ah/BQYHJE1jdTwXBeqpBFgs="; + sha256 = "sha256-i7oAmNjXkGn1MCn5EBmidMY/u3h/rzRAHCD4uhVGV/Q="; }; buildInputs = [ pam openssl zlib ]; diff --git a/pkgs/tools/security/exploitdb/default.nix b/pkgs/tools/security/exploitdb/default.nix index d758d33db88..bcf456dcf96 100644 --- a/pkgs/tools/security/exploitdb/default.nix +++ b/pkgs/tools/security/exploitdb/default.nix @@ -2,13 +2,13 @@ stdenv.mkDerivation rec { pname = "exploitdb"; - version = "2022-02-23"; + version = "2022-02-25"; src = fetchFromGitHub { owner = "offensive-security"; repo = pname; rev = version; - sha256 = "sha256-5jxcx16CS35U8MVWR8Ea4hUTweQfsLSceVaQN5T5XiU="; + sha256 = "sha256-KGUDtJxmx5/F77McUK/9ecHLPKblm97n2yl7ntyTzvQ="; }; nativeBuildInputs = [ makeWrapper ]; diff --git a/pkgs/tools/security/ghidra/build.nix b/pkgs/tools/security/ghidra/build.nix index 831ec3b6133..bb53a1958e0 100644 --- a/pkgs/tools/security/ghidra/build.nix +++ b/pkgs/tools/security/ghidra/build.nix @@ -34,7 +34,7 @@ let icon = "ghidra"; desktopName = "Ghidra"; genericName = "Ghidra Software Reverse Engineering Suite"; - categories = "Development;"; + categories = [ "Development" ]; }; # postPatch scripts. diff --git a/pkgs/tools/security/ghidra/default.nix b/pkgs/tools/security/ghidra/default.nix index e57f60637e2..d65d7abc4de 100644 --- a/pkgs/tools/security/ghidra/default.nix +++ b/pkgs/tools/security/ghidra/default.nix @@ -19,7 +19,7 @@ let icon = "ghidra"; desktopName = "Ghidra"; genericName = "Ghidra Software Reverse Engineering Suite"; - categories = "Development;"; + categories = [ "Development" ]; }; in stdenv.mkDerivation rec { diff --git a/pkgs/tools/security/gitleaks/default.nix b/pkgs/tools/security/gitleaks/default.nix index cb8155e5a1f..ff70782dabe 100644 --- a/pkgs/tools/security/gitleaks/default.nix +++ b/pkgs/tools/security/gitleaks/default.nix @@ -5,16 +5,16 @@ buildGoModule rec { pname = "gitleaks"; - version = "8.2.7"; + version = "8.3.0"; src = fetchFromGitHub { owner = "zricethezav"; repo = pname; rev = "v${version}"; - sha256 = "sha256-kCKkPx0JEzmQn0y6UbVuwZXre7rDd4vKTudh6J3AxYA="; + sha256 = "sha256-D6leHpGZNQ9Xt4PSU0Dwte6N3bMge7itkZtcUl0mIrQ="; }; - vendorSha256 = "sha256-zJ9Xl4tRUWntQwco+EHzqmL1aVcOjp70LCCmRsboxQ4="; + vendorSha256 = "sha256-JZOalUOIeV51Nttm6xeBos+/8fleSBpUiXa8ekVuYJA="; ldflags = [ "-s" diff --git a/pkgs/tools/security/jd-gui/default.nix b/pkgs/tools/security/jd-gui/default.nix index 046abed36f0..4e7a6237404 100644 --- a/pkgs/tools/security/jd-gui/default.nix +++ b/pkgs/tools/security/jd-gui/default.nix @@ -62,9 +62,9 @@ let comment = "Java Decompiler JD-GUI"; desktopName = "JD-GUI"; genericName = "Java Decompiler"; - mimeType = "application/java;application/java-vm;application/java-archive"; - categories = "Development;Debugger;"; - extraEntries="StartupWMClass=org-jd-gui-App"; + mimeTypes = [ "application/java" "application/java-vm" "application/java-archive" ]; + categories = [ "Development" "Debugger" ]; + startupWMClass = "org-jd-gui-App"; }; in stdenv.mkDerivation rec { diff --git a/pkgs/tools/security/log4j-sniffer/default.nix b/pkgs/tools/security/log4j-sniffer/default.nix index 0bc08fb6e3c..d894e39d7fa 100644 --- a/pkgs/tools/security/log4j-sniffer/default.nix +++ b/pkgs/tools/security/log4j-sniffer/default.nix @@ -6,13 +6,13 @@ buildGoModule rec { pname = "log4j-sniffer"; - version = "1.8.0"; + version = "1.9.0"; src = fetchFromGitHub { owner = "palantir"; repo = pname; rev = "v${version}"; - sha256 = "sha256-NojFXonov/80p+6kimfbiMK/v4najiMe//xFDnOi5KE="; + sha256 = "sha256-pO6difzNvQvKQtRLyksXmExtQHlnnwyF3iNEmSBgUmU="; }; vendorSha256 = null; diff --git a/pkgs/tools/security/nuclei/default.nix b/pkgs/tools/security/nuclei/default.nix index 51863e92848..71533b1172b 100644 --- a/pkgs/tools/security/nuclei/default.nix +++ b/pkgs/tools/security/nuclei/default.nix @@ -5,16 +5,16 @@ buildGoModule rec { pname = "nuclei"; - version = "2.6.1"; + version = "2.6.2"; src = fetchFromGitHub { owner = "projectdiscovery"; repo = pname; rev = "v${version}"; - sha256 = "sha256-ez57O8Dv5poYXBozS1WkrmbtNL1fApTacGemqSntZjk="; + sha256 = "sha256-tu7jj2rRREXH9jsQBWXncjCD6MXCddB99mr6h9ng8GA="; }; - vendorSha256 = "sha256-bVg0cI3MevNFilWb6EvENQAMTJMvGAECvv/89sTixmk="; + vendorSha256 = "sha256-ezUknVPlIbiy6PmpOgkUQU4kfH2Ic8Wn64zwoyqJMl0="; modRoot = "./v2"; subPackages = [ diff --git a/pkgs/tools/security/open-ecard/default.nix b/pkgs/tools/security/open-ecard/default.nix index 470e5f6530f..e7e21aec7c8 100644 --- a/pkgs/tools/security/open-ecard/default.nix +++ b/pkgs/tools/security/open-ecard/default.nix @@ -33,7 +33,7 @@ in stdenv.mkDerivation rec { comment = "Client side implementation of the eCard-API-Framework"; icon = "oec_logo_bg-transparent.svg"; exec = pname; - categories = "Utility;Security;"; + categories = [ "Utility" "Security" ]; }; installPhase = '' diff --git a/pkgs/tools/security/pwgen-secure/default.nix b/pkgs/tools/security/pwgen-secure/default.nix index c3141676b37..44ccd79fd39 100644 --- a/pkgs/tools/security/pwgen-secure/default.nix +++ b/pkgs/tools/security/pwgen-secure/default.nix @@ -1,7 +1,9 @@ { lib, python3Packages, fetchFromGitHub }: -with python3Packages; +let + inherit (python3Packages) buildPythonApplication pythonOlder; +in buildPythonApplication rec { pname = "pwgen-secure"; version = "0.9.1"; @@ -18,10 +20,18 @@ buildPythonApplication rec { sha256 = "15md5606hzy1xfhj2lxmc0nvynyrcs4vxa5jdi34kfm31rdklj28"; }; - propagatedBuildInputs = [ docopt ]; + postPatch = '' + shareDir=$out/share/${pname} + + substituteInPlace pwgen_secure/rpg.py \ + --replace "os.path.join(path, 'words.txt')" "os.path.join('$shareDir', 'words.txt')" + ''; + + propagatedBuildInputs = with python3Packages; [ docopt ]; postInstall = '' - install -Dm755 spwgen.py $out/bin/spwgen + install -Dm555 spwgen.py $out/bin/spwgen + install -Dm444 pwgen_secure/words.txt -t $shareDir ''; # there are no checks @@ -32,5 +42,6 @@ buildPythonApplication rec { homepage = "https://github.com/mjmunger/pwgen_secure/"; license = licenses.mit; maintainers = with maintainers; [ peterhoeg ]; + mainProgram = "spwgen"; }; } diff --git a/pkgs/tools/security/yara/default.nix b/pkgs/tools/security/yara/default.nix index a0a06e2906c..082f163437c 100644 --- a/pkgs/tools/security/yara/default.nix +++ b/pkgs/tools/security/yara/default.nix @@ -14,23 +14,31 @@ }: stdenv.mkDerivation rec { - version = "4.1.3"; pname = "yara"; + version = "4.2.0-rc1"; src = fetchFromGitHub { owner = "VirusTotal"; - repo = "yara"; + repo = pname; rev = "v${version}"; - sha256 = "sha256-7t2KksI3l+wFHqUSw2L4FXepMTJfTow/cTFYA47YBqY="; + hash = "sha256-WcN6ClYO2d+/MdG06RHx3kN0o0WVAY876dJiG7CwJ8w="; }; - nativeBuildInputs = [ autoreconfHook pkg-config ]; + nativeBuildInputs = [ + autoreconfHook + pkg-config + ]; - buildInputs = [ pcre protobufc ] - ++ lib.optionals withCrypto [ openssl ] - ++ lib.optionals enableMagic [ file ] - ++ lib.optionals enableCuckoo [ jansson ] - ; + buildInputs = [ + pcre + protobufc + ] ++ lib.optionals withCrypto [ + openssl + ] ++ lib.optionals enableMagic [ + file + ] ++ lib.optionals enableCuckoo [ + jansson + ]; preConfigure = "./bootstrap.sh"; |