blob: 0fea93dc50813e9eee63b985179f0e8a0689aaf9 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
|
{ lib
, fetchFromGitHub
, python3
}:
python3.pkgs.buildPythonApplication rec {
pname = "ioc-scan";
version = "1.5.0";
format = "setuptools";
src = fetchFromGitHub {
owner = "cisagov";
repo = "ioc-scanner";
rev = "refs/tags/v${version}";
hash = "sha256-dRrLd41HVVHJse7nkem8Cy+ltfJRnJiWrX/WShMfcOw=";
};
postPatch = ''
substituteInPlace pytest.ini \
--replace " --cov" ""
'';
propagatedBuildInputs = with python3.pkgs; [
docopt
];
nativeCheckInputs = with python3.pkgs; [
pyfakefs
pytestCheckHook
];
pythonImportsCheck = [
"ioc_scan"
];
meta = with lib; {
description = "Tool to search a filesystem for indicators of compromise (IoC)";
homepage = "https://github.com/cisagov/ioc-scanner";
changelog = "https://github.com/cisagov/ioc-scanner/releases/tag/v${version}";
license = with licenses; [ cc0 ];
maintainers = with maintainers; [ fab ];
};
}
|