diff options
Diffstat (limited to 'pkgs/tools/networking')
-rw-r--r-- | pkgs/tools/networking/connect/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/networking/gnirehtet/default.nix | 50 | ||||
-rw-r--r-- | pkgs/tools/networking/gnirehtet/paths.patch | 35 | ||||
-rw-r--r-- | pkgs/tools/networking/hans/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/networking/offlineimap/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/openfortivpn/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/pirate-get/default.nix | 7 | ||||
-rw-r--r-- | pkgs/tools/networking/speedtest-cli/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/unbound/default.nix | 6 | ||||
-rw-r--r-- | pkgs/tools/networking/wireguard-go/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/wireguard-tools/default.nix | 4 | ||||
-rw-r--r-- | pkgs/tools/networking/zerotierone/default.nix | 4 |
12 files changed, 105 insertions, 21 deletions
diff --git a/pkgs/tools/networking/connect/default.nix b/pkgs/tools/networking/connect/default.nix index f7a0c00fb481..3d63340adb0b 100644 --- a/pkgs/tools/networking/connect/default.nix +++ b/pkgs/tools/networking/connect/default.nix @@ -23,7 +23,7 @@ stdenv.mkDerivation rec { ''; homepage = https://bitbucket.org/gotoh/connect/wiki/Home; license = stdenv.lib.licenses.gpl2Plus; - platforms = stdenv.lib.platforms.gnu ++ stdenv.lib.platforms.linux; + platforms = stdenv.lib.platforms.gnu ++ stdenv.lib.platforms.linux ++ stdenv.lib.platforms.darwin; maintainers = with stdenv.lib.maintainers; [ jcumming ]; }; } diff --git a/pkgs/tools/networking/gnirehtet/default.nix b/pkgs/tools/networking/gnirehtet/default.nix new file mode 100644 index 000000000000..8a2d32e543b0 --- /dev/null +++ b/pkgs/tools/networking/gnirehtet/default.nix @@ -0,0 +1,50 @@ +{stdenv, rustPlatform, fetchFromGitHub, fetchzip, androidenv, substituteAll}: +let +version = "2.2.1"; +apk = stdenv.mkDerivation { + name = "gnirehtet.apk-${version}"; + src = fetchzip { + url = "https://github.com/Genymobile/gnirehtet/releases/download/v${version}/gnirehtet-rust-linux64-v${version}.zip"; + sha256 = "1rz2wdjc1y7n8fhskmki1nj0ak80ylxspcsrcdnjkk9r7jbq0kan"; + }; + installPhase = '' + mkdir $out + mv gnirehtet.apk $out + ''; +}; +in +rustPlatform.buildRustPackage rec { + name = "gnirehtet-${version}"; + + src = fetchFromGitHub { + owner = "Genymobile"; + repo = "gnirehtet"; + rev = "v${version}"; + sha256 = "1mv8nq4422k2d766qjqqnqp47qzzbbvlwhdni0k6w4nmd3m5cnd9"; + }; + sourceRoot = "source/relay-rust"; + cargoSha256 = "11qf9n6h6akvb0rbmsgdlfmypkbnas8ss1cs7i8w19mh7524n0v5"; + + patchFlags = [ "-p2" ]; + patches = [ + (substituteAll { + src = ./paths.patch; + adb = "${androidenv.platformTools}/bin/adb"; + inherit apk; + }) + ]; + + meta = with stdenv.lib; { + description = "Reverse tethering over adb for Android"; + longDescription = '' + This project provides reverse tethering over adb for Android: it allows devices to use the internet connection of the computer they are plugged on. It does not require any root access (neither on the device nor on the computer). + + This relies on adb, make sure you have the required permissions/udev rules. + ''; + homepage = https://github.com/Genymobile/gnirehtet; + license = licenses.asl20; + maintainers = with maintainers; [ symphorien ]; + platforms = platforms.unix; + }; +} + diff --git a/pkgs/tools/networking/gnirehtet/paths.patch b/pkgs/tools/networking/gnirehtet/paths.patch new file mode 100644 index 000000000000..72a8445d83b9 --- /dev/null +++ b/pkgs/tools/networking/gnirehtet/paths.patch @@ -0,0 +1,35 @@ +diff --git a/relay-rust/src/main.rs b/relay-rust/src/main.rs +index 4f1be53..96d2e78 100644 +--- a/relay-rust/src/main.rs ++++ b/relay-rust/src/main.rs +@@ -299,7 +299,7 @@ impl Command for RelayCommand { + + fn cmd_install(serial: Option<&String>) -> Result<(), CommandExecutionError> { + info!(target: TAG, "Installing gnirehtet client..."); +- exec_adb(serial, vec!["install", "-r", "gnirehtet.apk"]) ++ exec_adb(serial, vec!["install", "-r", "@apk@/gnirehtet.apk"]) + } + + fn cmd_uninstall(serial: Option<&String>) -> Result<(), CommandExecutionError> { +@@ -467,8 +467,8 @@ fn exec_adb<S: Into<String>>( + args: Vec<S>, + ) -> Result<(), CommandExecutionError> { + let adb_args = create_adb_args(serial, args); +- debug!(target: TAG, "Execute: adb {:?}", adb_args); +- match process::Command::new("adb").args(&adb_args[..]).status() { ++ debug!(target: TAG, "Execute: @adb@ {:?}", adb_args); ++ match process::Command::new("@adb@").args(&adb_args[..]).status() { + Ok(exit_status) => { + if exit_status.success() { + Ok(()) +@@ -490,8 +490,8 @@ fn must_install_client(serial: Option<&String>) -> Result<bool, CommandExecution + serial, + vec!["shell", "dumpsys", "package", "com.genymobile.gnirehtet"], + ); +- debug!(target: TAG, "Execute: adb {:?}", args); +- match process::Command::new("adb").args(&args[..]).output() { ++ debug!(target: TAG, "Execute: @adb@ {:?}", args); ++ match process::Command::new("@adb@").args(&args[..]).output() { + Ok(output) => { + if output.status.success() { + // the "regex" crate makes the binary far bigger, so just parse the versionCode diff --git a/pkgs/tools/networking/hans/default.nix b/pkgs/tools/networking/hans/default.nix index 82e105c3a3be..6fd4ab361630 100644 --- a/pkgs/tools/networking/hans/default.nix +++ b/pkgs/tools/networking/hans/default.nix @@ -31,7 +31,7 @@ stdenv.mkDerivation rec { the situation that your Internet access is firewalled, but pings are allowed. ''; - homepage = http://code.gerade.org/hans/; + homepage = https://code.gerade.org/hans/; license = licenses.gpl3Plus; platforms = platforms.linux; }; diff --git a/pkgs/tools/networking/offlineimap/default.nix b/pkgs/tools/networking/offlineimap/default.nix index c1d00dba2b46..c7d153186986 100644 --- a/pkgs/tools/networking/offlineimap/default.nix +++ b/pkgs/tools/networking/offlineimap/default.nix @@ -2,7 +2,7 @@ asciidoc, libxml2, libxslt, docbook_xml_xslt }: pythonPackages.buildPythonApplication rec { - version = "7.2.0"; + version = "7.2.1"; name = "offlineimap-${version}"; namePrefix = ""; @@ -10,7 +10,7 @@ pythonPackages.buildPythonApplication rec { owner = "OfflineIMAP"; repo = "offlineimap"; rev = "v${version}"; - sha256 = "0xyvqgy36n0bb41c4ffldyrcnaja5gpwx2ngbnk3qs22ldb2n1sb"; + sha256 = "1m5i74baazwazqp98ssma968rnwzfl1nywb7icf0swc8447ps97q"; }; postPatch = '' diff --git a/pkgs/tools/networking/openfortivpn/default.nix b/pkgs/tools/networking/openfortivpn/default.nix index b265cdb4c326..5512db9fe760 100644 --- a/pkgs/tools/networking/openfortivpn/default.nix +++ b/pkgs/tools/networking/openfortivpn/default.nix @@ -3,7 +3,7 @@ with stdenv.lib; let repo = "openfortivpn"; - version = "1.7.0"; + version = "1.7.1"; in stdenv.mkDerivation { name = "${repo}-${version}"; @@ -12,7 +12,7 @@ in stdenv.mkDerivation { owner = "adrienverge"; inherit repo; rev = "v${version}"; - sha256 = "1qfz5igry7fhrkz5iyzqpffldhpdvcw98k06yb6acwc1jyv87nh0"; + sha256 = "01nsgmmh72qk0aq2zdjh8qqn256mmvz1w2gl0wi7g29d82y2hdfm"; }; nativeBuildInputs = [ autoreconfHook pkgconfig ]; diff --git a/pkgs/tools/networking/pirate-get/default.nix b/pkgs/tools/networking/pirate-get/default.nix index 6e50b11568e6..5258d53a18ae 100644 --- a/pkgs/tools/networking/pirate-get/default.nix +++ b/pkgs/tools/networking/pirate-get/default.nix @@ -3,18 +3,17 @@ with python3Packages; buildPythonApplication rec { - name = "${pname}-${version}"; pname = "pirate-get"; - version = "0.2.12"; + version = "0.3.1"; doCheck = false; src = fetchPypi { inherit pname version; - sha256 = "1q6hvavj0gswgw3x756h18nmmpnxlgg08qvxphpbzlwd43xrnza3"; + sha256 = "9d7cc4b15dd8c6a82f9e03a666372e38613ccafdc846ad4c1226ba936beea68d"; }; - propagatedBuildInputs = [ colorama veryprettytable beautifulsoup4 ]; + propagatedBuildInputs = [ colorama veryprettytable beautifulsoup4 pyperclip ]; meta = with stdenv.lib; { description = "A command line interface for The Pirate Bay"; diff --git a/pkgs/tools/networking/speedtest-cli/default.nix b/pkgs/tools/networking/speedtest-cli/default.nix index ff0441c40787..623081fbb4ef 100644 --- a/pkgs/tools/networking/speedtest-cli/default.nix +++ b/pkgs/tools/networking/speedtest-cli/default.nix @@ -2,13 +2,13 @@ pythonPackages.buildPythonApplication rec { name = "speedtest-cli-${version}"; - version = "2.0.1"; + version = "2.0.2"; src = fetchFromGitHub { owner = "sivel"; repo = "speedtest-cli"; rev = "v${version}"; - sha256 = "0d3av50qm7bahsdg0k7hp04r9ripsafn95yqcgsy5h5y9yj4rsvf"; + sha256 = "0vv2z37g2kgm2dzkfa4bhri92hs0d1acxi8z66gznsl5148q7sdi"; }; meta = with stdenv.lib; { diff --git a/pkgs/tools/networking/unbound/default.nix b/pkgs/tools/networking/unbound/default.nix index d7ef54a2497d..a009e76d9e0a 100644 --- a/pkgs/tools/networking/unbound/default.nix +++ b/pkgs/tools/networking/unbound/default.nix @@ -2,11 +2,11 @@ stdenv.mkDerivation rec { name = "unbound-${version}"; - version = "1.7.1"; + version = "1.7.3"; src = fetchurl { url = "https://unbound.net/downloads/${name}.tar.gz"; - sha256 = "13b210hd200xxvaffyzqb4g58knv1sfigph70ai74lrcb3pqbq2n"; + sha256 = "c11de115d928a6b48b2165e0214402a7a7da313cd479203a7ce7a8b62cba602d"; }; outputs = [ "out" "lib" "man" ]; # "dev" would only split ~20 kB @@ -40,7 +40,7 @@ stdenv.mkDerivation rec { # get rid of runtime dependencies on $dev outputs + ''substituteInPlace "$lib/lib/libunbound.la" '' + stdenv.lib.concatMapStrings - (pkg: " --replace '-L${pkg.dev}/lib' '-L${pkg.out}/lib' ") + (pkg: " --replace '-L${pkg.dev}/lib' '-L${pkg.out}/lib' --replace '-R${pkg.dev}/lib' '-R${pkg.out}/lib'") buildInputs; meta = with stdenv.lib; { diff --git a/pkgs/tools/networking/wireguard-go/default.nix b/pkgs/tools/networking/wireguard-go/default.nix index cbd28b6954a3..c6b8cb242fdc 100644 --- a/pkgs/tools/networking/wireguard-go/default.nix +++ b/pkgs/tools/networking/wireguard-go/default.nix @@ -2,13 +2,13 @@ buildGoPackage rec { name = "wireguard-go-${version}"; - version = "0.0.20180531"; + version = "0.0.20180613"; goPackagePath = "git.zx2c4.com/wireguard-go"; src = fetchzip { url = "https://git.zx2c4.com/wireguard-go/snapshot/wireguard-go-${version}.tar.xz"; - sha256 = "1vs11kr5a2s99v0g7079nfrfvmjfh1p2lnkj2icjyn2cb0s1vqiy"; + sha256 = "0pvg7s1kyn48az54lsnyn1ryhjk0flmpz5dx520rc94g6xn88fic"; }; goDeps = ./deps.nix; diff --git a/pkgs/tools/networking/wireguard-tools/default.nix b/pkgs/tools/networking/wireguard-tools/default.nix index 276d7066c561..e8f8b4258721 100644 --- a/pkgs/tools/networking/wireguard-tools/default.nix +++ b/pkgs/tools/networking/wireguard-tools/default.nix @@ -4,11 +4,11 @@ with stdenv.lib; stdenv.mkDerivation rec { name = "wireguard-tools-${version}"; - version = "0.0.20180531"; + version = "0.0.20180613"; src = fetchzip { url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz"; - sha256 = "0944zxmpx2cs71nxl7rcyhpqlwplkzd7jsf1n66vflngw2sjxm03"; + sha256 = "0xndf5qxc4s0gsidzm0v4ivara6k2shjbr74xfcdpc0apfgyk2fz"; }; sourceRoot = "source/src/tools"; diff --git a/pkgs/tools/networking/zerotierone/default.nix b/pkgs/tools/networking/zerotierone/default.nix index 43aa44809ed8..bc8b1a5e0cdf 100644 --- a/pkgs/tools/networking/zerotierone/default.nix +++ b/pkgs/tools/networking/zerotierone/default.nix @@ -1,12 +1,12 @@ { stdenv, fetchurl, openssl, lzo, zlib, iproute, which, ronn }: stdenv.mkDerivation rec { - version = "1.2.8"; + version = "1.2.10"; name = "zerotierone-${version}"; src = fetchurl { url = "https://github.com/zerotier/ZeroTierOne/archive/${version}.tar.gz"; - sha256 = "0iwaaicf3wa1xi20k2w18q01d0dlmf5w9akf227bcsqdalsdzqh8"; + sha256 = "0mqckh51xj79z468n2683liczqracip36jvhfyd0fr3pwrbyqy8w"; }; preConfigure = '' |