blob: c55689350211d28e3b5e3cd0c6bc9fcbd73bd2df (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
|
{ lib
, python3
, fetchFromGitHub
}:
python3.pkgs.buildPythonApplication rec {
pname = "autobloody";
version = "0.1.8";
pyproject = true;
src = fetchFromGitHub {
owner = "CravateRouge";
repo = "autobloody";
rev = "refs/tags/v${version}";
hash = "sha256-0MwhdT9GYLcrdZSqszx1DC9lyz8K61lJZZCzeFfWB0E=";
};
nativeBuildInputs = with python3.pkgs; [
hatchling
];
propagatedBuildInputs = with python3.pkgs; [
bloodyad
neo4j
];
# Tests require a test file which is not available in the current release
doCheck = false;
nativeCheckInputs = with python3.pkgs; [
pytestCheckHook
];
pythonImportsCheck = [
"autobloody"
];
meta = with lib; {
description = "Tool to automatically exploit Active Directory privilege escalation paths";
homepage = "https://github.com/CravateRouge/autobloody";
changelog = "https://github.com/CravateRouge/autobloody/releases/tag/v${version}";
license = licenses.mit;
maintainers = with maintainers; [ fab ];
mainProgram = "autobloody";
};
}
|