diff options
Diffstat (limited to 'pkgs/by-name/au')
-rw-r--r-- | pkgs/by-name/au/audio-sharing/package.nix | 1 | ||||
-rw-r--r-- | pkgs/by-name/au/audiobookshelf/source.json | 10 | ||||
-rw-r--r-- | pkgs/by-name/au/audion/package.nix | 27 | ||||
-rw-r--r-- | pkgs/by-name/au/authentik/ldap.nix | 2 | ||||
-rw-r--r-- | pkgs/by-name/au/authentik/package.nix | 64 | ||||
-rw-r--r-- | pkgs/by-name/au/autobloody/package.nix | 46 |
6 files changed, 135 insertions, 15 deletions
diff --git a/pkgs/by-name/au/audio-sharing/package.nix b/pkgs/by-name/au/audio-sharing/package.nix index f65ffbc434de..4fbf8a54036f 100644 --- a/pkgs/by-name/au/audio-sharing/package.nix +++ b/pkgs/by-name/au/audio-sharing/package.nix @@ -68,6 +68,7 @@ stdenv.mkDerivation (finalAttrs: { meta = with lib; { homepage = "https://gitlab.gnome.org/World/AudioSharing"; description = "Automatically share the current audio playback in the form of an RTSP stream"; + mainProgram = "audio-sharing"; maintainers = with maintainers; [ benediktbroich ]; license = licenses.gpl3Plus; platforms = platforms.linux; diff --git a/pkgs/by-name/au/audiobookshelf/source.json b/pkgs/by-name/au/audiobookshelf/source.json index 7dced826db6d..115584aa553f 100644 --- a/pkgs/by-name/au/audiobookshelf/source.json +++ b/pkgs/by-name/au/audiobookshelf/source.json @@ -1,9 +1,9 @@ { "owner": "advplyr", "repo": "audiobookshelf", - "rev": "85fecbd1b9fc424d8bfd1b63cbae45b8b23a7d34", - "hash": "sha256-GWaaoVa1UJptbYAZ99LbrzfKEksSqK0GSsl3Vh2xKKs=", - "version": "2.8.0", - "depsHash": "sha256-vznd+ZKn0nx0Q7/lsMfWRUZUsK2LtxQor/3C4fQc0Ss=", - "clientDepsHash": "sha256-oqINZO4v5WeRRiLQnnChrnK8VeIzLg1MRhG/gEjkv58=" + "rev": "166454ef43e3cdb42c644cdccdacddd3a880cd89", + "hash": "sha256-QrGzlSGK7WDlRemS13CmHdg563HFv9QhOpCF+XRxXsg=", + "version": "2.8.1", + "depsHash": "sha256-CzlwpgSgsQZGuRWTA/IkCyaryCSurH74WR5Rhm5faEk=", + "clientDepsHash": "sha256-s7/Rlj3DrYjUkxAN82bTpWe+D4HdVOc1mrqKgqcJuI4=" } diff --git a/pkgs/by-name/au/audion/package.nix b/pkgs/by-name/au/audion/package.nix new file mode 100644 index 000000000000..0f9b05c527ac --- /dev/null +++ b/pkgs/by-name/au/audion/package.nix @@ -0,0 +1,27 @@ +{ lib +, fetchFromGitHub +, rustPlatform +}: + +rustPlatform.buildRustPackage rec { + pname = "audion"; + version = "0.2.0"; + + src = fetchFromGitHub { + owner = "audiusGmbH"; + repo = "audion"; + rev = "refs/tags/${version}"; + hash = "sha256-j8sQCeHpxrpzyY75DypWI9z+JBWq7aaaXPnZh7ksRjc="; + }; + + cargoHash = "sha256-/x2gjLz73uPY+ouQOxLN2ViET+V/s9jgkgw97yzVj24="; + + meta = with lib; { + description = "Ping the host continuously and write results to a file"; + homepage = "https://github.com/audiusGmbH/audion"; + changelog = "https://github.com/audiusGmbH/audion/releases/tag/${version}"; + license = licenses.mit; + maintainers = with maintainers; [ fab ]; + mainProgram = "audion"; + }; +} diff --git a/pkgs/by-name/au/authentik/ldap.nix b/pkgs/by-name/au/authentik/ldap.nix index 1745e5556d3c..bff1c1584bbb 100644 --- a/pkgs/by-name/au/authentik/ldap.nix +++ b/pkgs/by-name/au/authentik/ldap.nix @@ -4,7 +4,7 @@ buildGoModule { pname = "authentik-ldap-outpost"; inherit (authentik) version src; - vendorHash = "sha256-74rSuZrO5c7mjhHh0iQlJEkOslsFrcDb1aRXXC4RsUM="; + vendorHash = "sha256-UIJBCTq7AJGUDIlZtJaWCovyxlMPzj2BCJQqthybEz4="; CGO_ENABLED = 0; diff --git a/pkgs/by-name/au/authentik/package.nix b/pkgs/by-name/au/authentik/package.nix index 454a994e314b..9f8299e985ce 100644 --- a/pkgs/by-name/au/authentik/package.nix +++ b/pkgs/by-name/au/authentik/package.nix @@ -11,13 +11,13 @@ , makeWrapper }: let - version = "2023.10.7"; + version = "2024.2.2"; src = fetchFromGitHub { owner = "goauthentik"; repo = "authentik"; rev = "version/${version}"; - hash = "sha256-+1IdXRt28UZ2KTa0zsmjneNUOcutP99UUwqcYyVyqTI="; + hash = "sha256-2B1RgKY5tpDBdzguEyWqzg15w5x/dLS2ffjbnxbpINs="; }; meta = with lib; { @@ -32,7 +32,7 @@ let website = buildNpmPackage { pname = "authentik-website"; inherit version src meta; - npmDepsHash = "sha256-4dgFxEvMnp+35nSQNsEchtN1qoS5X2KzEbLPvMnyR+k="; + npmDepsHash = "sha256-paACBXG7hEQSLekxCvxNns2Tg9rN3DUgz6o3A/lAhA8="; NODE_ENV = "production"; NODE_OPTIONS = "--openssl-legacy-provider"; @@ -82,7 +82,7 @@ let ln -s ${src}/website $out/ ln -s ${clientapi} $out/web/node_modules/@goauthentik/api ''; - npmDepsHash = "sha256-5aCKlArtoEijGqeYiY3zoV0Qo7/Xt5hSXbmy2uYZpok="; + npmDepsHash = "sha256-Xtzs91m+qu7jTwr0tMeS74gjlZs4vufGGlplPVf9yew="; postPatch = '' cd web @@ -105,26 +105,68 @@ let python = python3.override { self = python; packageOverrides = final: prev: { + django-tenants = prev.buildPythonPackage rec { + pname = "django-tenants"; + version = "unstable-2024-01-11"; + src = fetchFromGitHub { + owner = "rissson"; + repo = pname; + rev = "a7f37c53f62f355a00142473ff1e3451bb794eca"; + hash = "sha256-YBT0kcCfETXZe0j7/f1YipNIuRrcppRVh1ecFS3cvNo="; + }; + format = "setuptools"; + doCheck = false; # Tests require postgres + + propagatedBuildInputs = with prev; [ + django + psycopg + gunicorn + ]; + }; + + tenant-schemas-celery = prev.buildPythonPackage rec { + pname = "tenant-schemas-celery"; + version = "2.2.0"; + src = fetchFromGitHub { + owner = "maciej-gol"; + repo = pname; + rev = version; + hash = "sha256-OpIJobjWZE5GQGnHADioeoJo3A6DAKh0HdO10k4rsX4="; + }; + format = "setuptools"; + doCheck = false; + + propagatedBuildInputs = with prev; [ + freezegun + more-itertools + psycopg2 + ]; + }; + authentik-django = prev.buildPythonPackage { pname = "authentik-django"; inherit version src meta; pyproject = true; postPatch = '' + rm lifecycle/system_migrations/tenant_files.py substituteInPlace authentik/root/settings.py \ --replace-fail 'Path(__file__).absolute().parent.parent.parent' "\"$out\"" substituteInPlace authentik/lib/default.yml \ - --replace-fail '/blueprints' "$out/blueprints" + --replace-fail '/blueprints' "$out/blueprints" \ + --replace-fail './media' '/var/lib/authentik/media' substituteInPlace pyproject.toml \ --replace-fail 'dumb-init = "*"' "" \ - --replace-fail 'djangorestframework-guardian' 'djangorestframework-guardian2' + --replace-fail 'djangorestframework-guardian' 'djangorestframework-guardian2' \ + --replace-fail 'version = "4.9.4"' 'version = "*"' \ + --replace-fail 'version = "<2"' 'version = "*"' substituteInPlace authentik/stages/email/utils.py \ --replace-fail 'web/' '${webui}/' ''; nativeBuildInputs = [ prev.poetry-core ]; - propagatedBuildInputs = with prev; [ + propagatedBuildInputs = with final; [ argon2-cffi celery channels @@ -140,6 +182,8 @@ let django-model-utils django-prometheus django-redis + django-storages + django-tenants djangorestframework djangorestframework-guardian2 docker @@ -153,6 +197,7 @@ let kubernetes ldap3 lxml + jsonpatch opencontainers packaging paramiko @@ -164,8 +209,10 @@ let pyyaml requests-oauthlib sentry-sdk + service-identity structlog swagger-spec-validator + tenant-schemas-celery twilio twisted ua-parser @@ -178,7 +225,6 @@ let wsproto xmlsec zxcvbn - jsonpatch ] ++ [ codespell ]; @@ -212,7 +258,7 @@ let CGO_ENABLED = 0; - vendorHash = "sha256-74rSuZrO5c7mjhHh0iQlJEkOslsFrcDb1aRXXC4RsUM="; + vendorHash = "sha256-UIJBCTq7AJGUDIlZtJaWCovyxlMPzj2BCJQqthybEz4="; postInstall = '' mv $out/bin/server $out/bin/authentik diff --git a/pkgs/by-name/au/autobloody/package.nix b/pkgs/by-name/au/autobloody/package.nix new file mode 100644 index 000000000000..c55689350211 --- /dev/null +++ b/pkgs/by-name/au/autobloody/package.nix @@ -0,0 +1,46 @@ +{ lib +, python3 +, fetchFromGitHub +}: + +python3.pkgs.buildPythonApplication rec { + pname = "autobloody"; + version = "0.1.8"; + pyproject = true; + + src = fetchFromGitHub { + owner = "CravateRouge"; + repo = "autobloody"; + rev = "refs/tags/v${version}"; + hash = "sha256-0MwhdT9GYLcrdZSqszx1DC9lyz8K61lJZZCzeFfWB0E="; + }; + + nativeBuildInputs = with python3.pkgs; [ + hatchling + ]; + + propagatedBuildInputs = with python3.pkgs; [ + bloodyad + neo4j + ]; + + # Tests require a test file which is not available in the current release + doCheck = false; + + nativeCheckInputs = with python3.pkgs; [ + pytestCheckHook + ]; + + pythonImportsCheck = [ + "autobloody" + ]; + + meta = with lib; { + description = "Tool to automatically exploit Active Directory privilege escalation paths"; + homepage = "https://github.com/CravateRouge/autobloody"; + changelog = "https://github.com/CravateRouge/autobloody/releases/tag/v${version}"; + license = licenses.mit; + maintainers = with maintainers; [ fab ]; + mainProgram = "autobloody"; + }; +} |