diff options
author | Wael M. Nasreddine <wael.nasreddine@gmail.com> | 2019-03-21 21:01:25 -0700 |
---|---|---|
committer | Wael M. Nasreddine <wael.nasreddine@gmail.com> | 2019-03-21 21:01:25 -0700 |
commit | 5af0780492827a0c9525e255371f9e7df0f3bb1d (patch) | |
tree | 14bebf201b7402984908f1e5c889d8bedbfc0561 /pkgs/tools/networking | |
parent | 7957a93520d458727c19532c607f6d7176f78207 (diff) | |
parent | 52dae14f0c763dd48572058f0f0906166da14c31 (diff) | |
download | nixlib-5af0780492827a0c9525e255371f9e7df0f3bb1d.tar nixlib-5af0780492827a0c9525e255371f9e7df0f3bb1d.tar.gz nixlib-5af0780492827a0c9525e255371f9e7df0f3bb1d.tar.bz2 nixlib-5af0780492827a0c9525e255371f9e7df0f3bb1d.tar.lz nixlib-5af0780492827a0c9525e255371f9e7df0f3bb1d.tar.xz nixlib-5af0780492827a0c9525e255371f9e7df0f3bb1d.tar.zst nixlib-5af0780492827a0c9525e255371f9e7df0f3bb1d.zip |
Merge remote-tracking branch 'origin/master' into staging
* origin/master: (693 commits) buildGoModule: use go_1_12 instead of go_1_11 (#58103) gitAndTools.lab: 0.15.2 -> 0.15.3 (#58091) signal-desktop: 1.22.0 -> 1.23.0 added missing semicolon to documentation terminus_font_ttf: 4.46.0 -> 4.47.0 buildGoModule: remove SSL env vars in favor of cacert in buildInputs (#58071) dav1d: init at 0.2.1 dropbox-cli: 2018.11.28 -> 2019.02.14 atlassian-confluence: 6.14.1 -> 6.14.2 maintainers: update email for dywedir python.pkgs.hglib: use patch to specify hg path (#57926) chkrootkit: 0.52 -> 0.53 radare2-cutter: 1.7.2 -> 1.8.0 autorandr: 1.7 -> 1.8 pythonPackages.pyhepmc: fix build llvm-polly/clang-polly: use latest llvm apulse: 0.1.11.1 -> 0.1.12, cleanup factorio: experimental 0.17.14 → 0.17.16 (#58000) sequeler: 0.6.7 -> 0.6.8 nasc: 0.5.1 -> 0.5.2 ...
Diffstat (limited to 'pkgs/tools/networking')
-rw-r--r-- | pkgs/tools/networking/aria2/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/networking/davix/default.nix | 24 | ||||
-rw-r--r-- | pkgs/tools/networking/dnscrypt-proxy/1.x/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/networking/junkie/default.nix | 36 | ||||
-rw-r--r-- | pkgs/tools/networking/kail/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/mitmproxy/default.nix | 20 | ||||
-rw-r--r-- | pkgs/tools/networking/ngrok-2/default.nix | 41 | ||||
-rwxr-xr-x | pkgs/tools/networking/ngrok-2/update.sh | 33 | ||||
-rw-r--r-- | pkgs/tools/networking/ngrok-2/versions.json | 32 | ||||
-rw-r--r-- | pkgs/tools/networking/offlineimap/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/openfortivpn/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/shadowsocks-rust/default.nix | 29 | ||||
-rw-r--r-- | pkgs/tools/networking/tayga/default.nix | 26 | ||||
-rw-r--r-- | pkgs/tools/networking/tcpdump/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/networking/tgt/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/wireguard-tools/default.nix | 6 |
16 files changed, 228 insertions, 41 deletions
diff --git a/pkgs/tools/networking/aria2/default.nix b/pkgs/tools/networking/aria2/default.nix index 873aa66c4212..2cf735328974 100644 --- a/pkgs/tools/networking/aria2/default.nix +++ b/pkgs/tools/networking/aria2/default.nix @@ -40,6 +40,6 @@ stdenv.mkDerivation rec { description = "A lightweight, multi-protocol, multi-source, command-line download utility"; license = licenses.gpl2Plus; platforms = platforms.unix; - maintainers = with maintainers; [ koral jgeerds ]; + maintainers = with maintainers; [ koral ]; }; } diff --git a/pkgs/tools/networking/davix/default.nix b/pkgs/tools/networking/davix/default.nix index 3be2b0401bc4..74aa30bb95e0 100644 --- a/pkgs/tools/networking/davix/default.nix +++ b/pkgs/tools/networking/davix/default.nix @@ -1,22 +1,24 @@ -{ stdenv, fetchFromGitHub, cmake, pkgconfig, openssl, libxml2, boost }: +{ stdenv, fetchurl, cmake, pkgconfig, openssl, libxml2, boost, python3, libuuid }: stdenv.mkDerivation rec { - name = "davix-0.6.4"; - nativeBuildInputs = [ pkgconfig ]; - buildInputs = [ stdenv cmake openssl libxml2 boost ]; + version = "0.7.2"; + name = "davix-${version}"; + nativeBuildInputs = [ cmake pkgconfig python3 ]; + buildInputs = [ openssl libxml2 boost libuuid ]; - src = fetchFromGitHub { - owner = "cern-it-sdc-id"; - repo = "davix"; - rev = "R_0_6_4"; - sha256 = "10hg7rs6aams96d4ghldgkrrnikskdpmn8vy6hj5j0s17a2yms6q"; + # using the url below since the 0.7.2 release did carry a broken CMake file, + # supposedly fixed in the next release + # https://github.com/cern-fts/davix/issues/40 + src = fetchurl { + url = "http://grid-deployment.web.cern.ch/grid-deployment/dms/lcgutil/tar/davix/${version}/davix-${version}.tar.gz"; + sha256 = "1w1q7r6r5j5f23ra4qhx3x29w9z9xal23c2azazpfmcz88hkkmhz"; }; meta = with stdenv.lib; { description = "Toolkit for Http-based file management"; - longDescription = "Davix is a toolkit designed for file + longDescription = "Davix is a toolkit designed for file operations with Http based protocols (WebDav, Amazon S3, ...). Davix provides an API and a set of command line tools"; @@ -24,6 +26,6 @@ stdenv.mkDerivation rec { homepage = http://dmc.web.cern.ch/projects/davix/home; maintainers = [ maintainers.adev ]; platforms = platforms.all; - }; + }; } diff --git a/pkgs/tools/networking/dnscrypt-proxy/1.x/default.nix b/pkgs/tools/networking/dnscrypt-proxy/1.x/default.nix index d555a74ffb1a..c0b2c795a40b 100644 --- a/pkgs/tools/networking/dnscrypt-proxy/1.x/default.nix +++ b/pkgs/tools/networking/dnscrypt-proxy/1.x/default.nix @@ -30,7 +30,7 @@ stdenv.mkDerivation rec { description = "A tool for securing communications between a client and a DNS resolver"; homepage = https://dnscrypt.info/; license = licenses.isc; - maintainers = with maintainers; [ joachifm jgeerds ]; + maintainers = with maintainers; [ joachifm ]; # upstream claims OSX support, but Hydra fails platforms = platforms.linux; # Maybe other non-darwin Unix }; diff --git a/pkgs/tools/networking/junkie/default.nix b/pkgs/tools/networking/junkie/default.nix new file mode 100644 index 000000000000..29fe71c9365a --- /dev/null +++ b/pkgs/tools/networking/junkie/default.nix @@ -0,0 +1,36 @@ +{ stdenv, fetchFromGitHub, pkgconfig, libpcap, guile, openssl }: + +stdenv.mkDerivation rec { + pname = "junkie"; + version = "2.8.0"; + + src = fetchFromGitHub { + owner = "rixed"; + repo = "junkie"; + rev = "v${version}"; + sha256 = "0kfdjgch667gfb3qpiadd2dj3fxc7r19nr620gffb1ahca02wq31"; + }; + buildInputs = [ libpcap guile openssl ]; + nativeBuildInputs = [ pkgconfig ]; + configureFlags = [ + "GUILELIBDIR=\${out}/share/guile/site" + "GUILECACHEDIR=\${out}/lib/guile/ccache" + ]; + + meta = { + description = "Deep packet inspection swiss-army knife"; + homepage = "https://github.com/rixed/junkie"; + license = stdenv.lib.licenses.agpl3Plus; + maintainers = [ stdenv.lib.maintainers.rixed ]; + platforms = stdenv.lib.platforms.unix; + longDescription = '' + Junkie is a network sniffer like Tcpdump or Wireshark, but designed to + be easy to program and extend. + + It comes with several command line tools to demonstrate this: + - a packet dumper; + - a nettop tool; + - a tool listing TLS certificates... + ''; + }; +} diff --git a/pkgs/tools/networking/kail/default.nix b/pkgs/tools/networking/kail/default.nix index e13511487170..7877200116d1 100644 --- a/pkgs/tools/networking/kail/default.nix +++ b/pkgs/tools/networking/kail/default.nix @@ -2,7 +2,7 @@ buildGoPackage rec { name = "kail-${version}"; - version = "0.7.0"; + version = "0.8.0"; goPackagePath = "github.com/boz/kail"; @@ -10,7 +10,7 @@ buildGoPackage rec { owner = "boz"; repo = "kail"; rev = "v${version}"; - sha256 = "0j0948wjn0jsk89fp0l29pd90n86wi85yghrbdhwihhgyqcdmhi0"; + sha256 = "0ibk7j40pj6f2086qcnwp998wld61d2gvrv7yiy6hlkalhww2pq7"; }; # regenerate deps.nix using following steps: diff --git a/pkgs/tools/networking/mitmproxy/default.nix b/pkgs/tools/networking/mitmproxy/default.nix index d06399169707..ee331648e75f 100644 --- a/pkgs/tools/networking/mitmproxy/default.nix +++ b/pkgs/tools/networking/mitmproxy/default.nix @@ -22,6 +22,26 @@ buildPythonPackage rec { url = "https://github.com/mitmproxy/mitmproxy/commit/1b6a8d6acd3d70f9b9627ad4ae9def08103f8250.patch"; sha256 = "03y79c25yir7d8xj79czdc81y3irqq1i3ks9ca0mv1az8b7xsvfv"; }) + (fetchpatch { + # 0.13 <= wsproto < 0.14 patch + # https://github.com/mitmproxy/mitmproxy/issues/3459 + # TODO: remove on next update + name = "wsproto-0.13.patch"; + url = https://github.com/mitmproxy/mitmproxy/commit/70777a1b6ed64af9cafcdef223a8a260ecc96864.patch; + sha256 = "1ddxdr7js510kzyq3gyks4k5k1n8zb1i9amxw7wzmi1dcg8kqw9a"; + # We strip these bounds anyway + excludes = [ "setup.py" ]; + }) + (fetchpatch { + # Fix for newer pytest disallowing calling fixtures + # https://github.com/mitmproxy/mitmproxy/issues/3403 + # TODO: remove on next update + name = "dont-call-fixtures.patch"; + url = https://github.com/mitmproxy/mitmproxy/commit/ce28721458c8cc71de86513a5110676e9763041b.patch; + sha256 = "05pljr28lx7l1xgswqr9sz8dnhvc7npzh8xg2p9hignf159kd54d"; + # Irrelevant in nixpkgs + excludes = [ "setup.py" "setup.cfg" "release/docker/*" ]; + }) ]; postPatch = '' diff --git a/pkgs/tools/networking/ngrok-2/default.nix b/pkgs/tools/networking/ngrok-2/default.nix index fdf9067dfee9..89d6a9b454da 100644 --- a/pkgs/tools/networking/ngrok-2/default.nix +++ b/pkgs/tools/networking/ngrok-2/default.nix @@ -1,30 +1,39 @@ -{ stdenv, fetchurl, unzip }: +{ stdenv, fetchurl }: with stdenv.lib; -stdenv.mkDerivation rec { +let versions = builtins.fromJSON (builtins.readFile ./versions.json); + arch = if stdenv.isi686 then "386" + else if stdenv.isx86_64 then "amd64" + else if stdenv.isAarch64 then "arm64" + else if stdenv.isArm then "arm" + else throw "Unsupported architecture"; + os = if stdenv.isLinux then "linux" + else if stdenv.isDarwin then "darwin" + else throw "Unsupported os"; + versionInfo = versions."${os}-${arch}"; + inherit (versionInfo) version sha256 url; + +in +stdenv.mkDerivation { name = "ngrok-${version}"; - version = "2.2.8"; - - src = if stdenv.isLinux && stdenv.isi686 then fetchurl { - url = "https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-i386.tgz"; - sha256 = "0s5ymlaxrvm13q3mlvfirh74sx60qh56c5sgdma2r7q5qlsq41xg"; - } else if stdenv.isLinux && stdenv.isx86_64 then fetchurl { - url = "https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-amd64.tgz"; - sha256 = "1mn9iwgy6xzrjihikwc2k2j59igqmph0cwx17qp0ziap9lp5xxad"; - } else if stdenv.isDarwin then fetchurl { - url = "https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-darwin-386.zip"; - sha256 = "0yfd250b55wcpgqd00rqfaa7a82f35fmybb31q5xwdbgc2i47pbh"; - } else throw "platform ${stdenv.hostPlatform.system} not supported!"; + version = "${version}"; + + # run ./update + src = fetchurl { inherit sha256 url; }; sourceRoot = "."; - nativeBuildInputs = optional stdenv.isDarwin unzip; + unpackPhase = "cp $src ngrok"; + + buildPhase = "chmod a+x ngrok"; installPhase = '' install -D ngrok $out/bin/ngrok ''; + passthru.updateScript = ./update.sh; + meta = { description = "ngrok"; longDescription = '' @@ -32,7 +41,7 @@ stdenv.mkDerivation rec { ''; homepage = https://ngrok.com/; license = licenses.unfree; - platforms = [ "i686-linux" "x86_64-linux" "x86_64-darwin" ]; + platforms = [ "i686-linux" "x86_64-linux" "aarch64-linux" "x86_64-darwin" ]; maintainers = [ maintainers.bobvanderlinden ]; }; } diff --git a/pkgs/tools/networking/ngrok-2/update.sh b/pkgs/tools/networking/ngrok-2/update.sh new file mode 100755 index 000000000000..7908a1524e59 --- /dev/null +++ b/pkgs/tools/networking/ngrok-2/update.sh @@ -0,0 +1,33 @@ +#!/usr/bin/env nix-shell +#!nix-shell -p httpie +#!nix-shell -p jq +#!nix-shell -i bash + +set -eu -o pipefail + +get_download_info() { + http --body \ + https://update.equinox.io/check \ + 'Accept:application/json; q=1; version=1; charset=utf-8' \ + 'Content-Type:application/json; charset=utf-8' \ + app_id=app_goVRodbMVm \ + channel=stable \ + os=$1 \ + goarm= \ + arch=$2 \ + | jq --arg sys "$1-$2" '{ + sys: $sys, + url: .download_url, + sha256: .checksum, + version: .release.version + }' +} + +( + get_download_info linux 386 + get_download_info linux amd64 + get_download_info linux arm + get_download_info linux arm64 + get_download_info darwin amd64 +) | jq --slurp 'map ({ (.sys): . }) | add' \ + > pkgs/tools/networking/ngrok-2/versions.json diff --git a/pkgs/tools/networking/ngrok-2/versions.json b/pkgs/tools/networking/ngrok-2/versions.json new file mode 100644 index 000000000000..3d7aa8a56b6c --- /dev/null +++ b/pkgs/tools/networking/ngrok-2/versions.json @@ -0,0 +1,32 @@ +{ + "linux-386": { + "sys": "linux-386", + "url": "https://bin.equinox.io/a/jqJ2Vvh67gW/ngrok-2.3.18-linux-386", + "sha256": "2bebb8f39a3c19ca03eaf786b97c92876216d2297046e85271478edef2cd6404", + "version": "2.3.18" + }, + "linux-amd64": { + "sys": "linux-amd64", + "url": "https://bin.equinox.io/a/ik4d9aurG9/ngrok-2.3.18-linux-amd64", + "sha256": "75e19c343a208bf0e2d3b613d2fa3ce67abbf25c04a1d6be670598a4c25c1694", + "version": "2.3.18" + }, + "linux-arm": { + "sys": "linux-arm", + "url": "https://bin.equinox.io/a/c2KRZoJ5cb6/ngrok-2.3.18-linux-arm", + "sha256": "af4cdb9f116104921d7fbeeac9124e545a45495b3623b2b46da996400c305d9c", + "version": "2.3.18" + }, + "linux-arm64": { + "sys": "linux-arm64", + "url": "https://bin.equinox.io/a/b2NBP9tpq2E/ngrok-2.3.18-linux-arm64", + "sha256": "9e5fa5b83dc65803291b59867c664085de248a4adb3d415c4dbba1dae90a0aaf", + "version": "2.3.18" + }, + "darwin-amd64": { + "sys": "darwin-amd64", + "url": "https://bin.equinox.io/a/879TXbRQQRV/ngrok-2.3.18-darwin-amd64", + "sha256": "abb643bdba7ade5dabd60488b866804d814a41d4d7144fa09e01c9260e93659d", + "version": "2.3.18" + } +} diff --git a/pkgs/tools/networking/offlineimap/default.nix b/pkgs/tools/networking/offlineimap/default.nix index 5ac64d36eaf9..5050b8db023d 100644 --- a/pkgs/tools/networking/offlineimap/default.nix +++ b/pkgs/tools/networking/offlineimap/default.nix @@ -2,14 +2,14 @@ asciidoc, cacert, libxml2, libxslt, docbook_xsl }: python2Packages.buildPythonApplication rec { - version = "7.2.2"; + version = "7.2.3"; pname = "offlineimap"; src = fetchFromGitHub { owner = "OfflineIMAP"; repo = "offlineimap"; rev = "v${version}"; - sha256 = "11nj7y9fa7v6vcxk3wr8smfgm3mxxnmq3l8q69rrjxlfzcv7dl8m"; + sha256 = "18sdnhjldn8zs03bgqy1qa3ikmlfvyxcvwp3nbnv1a74biccqbpa"; }; postPatch = '' diff --git a/pkgs/tools/networking/openfortivpn/default.nix b/pkgs/tools/networking/openfortivpn/default.nix index b95c3aed8e62..d92984d3c9d6 100644 --- a/pkgs/tools/networking/openfortivpn/default.nix +++ b/pkgs/tools/networking/openfortivpn/default.nix @@ -3,7 +3,7 @@ with stdenv.lib; let repo = "openfortivpn"; - version = "1.8.0"; + version = "1.8.1"; in stdenv.mkDerivation { name = "${repo}-${version}"; @@ -12,7 +12,7 @@ in stdenv.mkDerivation { owner = "adrienverge"; inherit repo; rev = "v${version}"; - sha256 = "1p7zfysqvivca565ifb5anla3rgqavq2npavj1vlmhipa01080lk"; + sha256 = "16k5sb7sz5blhm59rxhzhcq91pgivpbpdq6wbhcaa563nnk7pxys"; }; nativeBuildInputs = [ autoreconfHook pkgconfig ]; diff --git a/pkgs/tools/networking/shadowsocks-rust/default.nix b/pkgs/tools/networking/shadowsocks-rust/default.nix new file mode 100644 index 000000000000..6a024b72f73e --- /dev/null +++ b/pkgs/tools/networking/shadowsocks-rust/default.nix @@ -0,0 +1,29 @@ +{ stdenv, fetchFromGitHub, rustPlatform, pkgconfig, openssl, libsodium, Security }: + +rustPlatform.buildRustPackage rec { + pname = "shadowsocks-rust"; + version = "1.7.0"; + + src = fetchFromGitHub { + rev = "v${version}"; + owner = "shadowsocks"; + repo = pname; + sha256 = "0mqjm54mp6c9mfdl3gf01v9vm2rjll8fw63n6j4qgv01y4hrsm4f"; + }; + + cargoSha256 = "1m0p40z6qx6s0r1x6apz56n2s4ppn8b2cff476xrfhp6s1j046q7"; + + buildInputs = [ openssl libsodium ] + ++ stdenv.lib.optionals stdenv.isDarwin [ Security ]; + nativeBuildInputs = [ pkgconfig ]; + + # tries to read /etc/resolv.conf, hence fails in sandbox + doCheck = false; + + meta = with stdenv.lib; { + homepage = https://github.com/shadowsocks/shadowsocks-rust; + description = "A Rust port of shadowsocks"; + license = licenses.mit; + maintainers = [ maintainers.marsam ]; + }; +} diff --git a/pkgs/tools/networking/tayga/default.nix b/pkgs/tools/networking/tayga/default.nix new file mode 100644 index 000000000000..97bcbdc999eb --- /dev/null +++ b/pkgs/tools/networking/tayga/default.nix @@ -0,0 +1,26 @@ +{ stdenv, fetchurl }: + +stdenv.mkDerivation rec { + version = "0.9.2"; + pname = "tayga"; + + src = fetchurl { + url= "http://www.litech.org/${pname}/${pname}-${version}.tar.bz2"; + sha256 = "1700y121lhvpna49bjpssb7jq1abj9qw5wxgjn8gzp6jm4kpj7rb"; + }; + + meta = with stdenv.lib; { + description = "Userland stateless NAT64 daemon"; + longDescription = '' + TAYGA is an out-of-kernel stateless NAT64 implementation + for Linux that uses the TUN driver to exchange IPv4 and + IPv6 packets with the kernel. + It is intended to provide production-quality NAT64 service + for networks where dedicated NAT64 hardware would be overkill. + ''; + homepage = http://www.litech.org/tayga; + license = licenses.gpl2; + maintainers = [ maintainers."0x4A6F" ]; + platforms = platforms.linux; + }; +} diff --git a/pkgs/tools/networking/tcpdump/default.nix b/pkgs/tools/networking/tcpdump/default.nix index f1470fc6c148..8a4722aa5214 100644 --- a/pkgs/tools/networking/tcpdump/default.nix +++ b/pkgs/tools/networking/tcpdump/default.nix @@ -32,7 +32,7 @@ stdenv.mkDerivation rec { description = "Network sniffer"; homepage = http://www.tcpdump.org/; license = "BSD-style"; - maintainers = with stdenv.lib.maintainers; [ jgeerds ]; + maintainers = with stdenv.lib.maintainers; [ ]; platforms = stdenv.lib.platforms.unix; }; } diff --git a/pkgs/tools/networking/tgt/default.nix b/pkgs/tools/networking/tgt/default.nix index 71c9263a6e2b..e1e19609d513 100644 --- a/pkgs/tools/networking/tgt/default.nix +++ b/pkgs/tools/networking/tgt/default.nix @@ -2,7 +2,7 @@ , docbook_xsl }: let - version = "1.0.74"; + version = "1.0.75"; in stdenv.mkDerivation rec { name = "tgt-${version}"; @@ -10,7 +10,7 @@ in stdenv.mkDerivation rec { owner = "fujita"; repo = "tgt"; rev = "v${version}"; - sha256 = "1k146w49dda77fd8frmc0nyr07ca1wh5vcw59fjid6knaj9vgck5"; + sha256 = "008x7xz49fnqi91hw4nim4f25gp5qyjgzxfikmj7gz81mh4hhamj"; }; buildInputs = [ libxslt systemd libaio docbook_xsl ]; diff --git a/pkgs/tools/networking/wireguard-tools/default.nix b/pkgs/tools/networking/wireguard-tools/default.nix index 54210469fba8..0d59864154d0 100644 --- a/pkgs/tools/networking/wireguard-tools/default.nix +++ b/pkgs/tools/networking/wireguard-tools/default.nix @@ -4,11 +4,11 @@ with stdenv.lib; stdenv.mkDerivation rec { name = "wireguard-tools-${version}"; - version = "0.0.20190123"; + version = "0.0.20190227"; src = fetchzip { url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz"; - sha256 = "1lyl3nmsgp9jk9js3vz032vdx7cg9ynkwzdr19wrr26pkxhpcnxr"; + sha256 = "1kaq0mjcdr4hxr3rx8z11rvlh4ycjsn5654fjw1gh1fdbjgczax5"; }; sourceRoot = "source/src/tools"; @@ -42,7 +42,7 @@ stdenv.mkDerivation rec { downloadPage = https://git.zx2c4.com/WireGuard/refs/; homepage = https://www.wireguard.com/; license = licenses.gpl2; - maintainers = with maintainers; [ ericsagnes mic92 zx2c4 ]; + maintainers = with maintainers; [ elseym ericsagnes mic92 zx2c4 ]; platforms = platforms.unix; }; } |