nixpkgs/pkgs/tools/security/nsjail/default.nix

41 lines
1.2 KiB
Nix
Raw Normal View History

2018-10-10 23:33:43 +02:00
{ stdenv, fetchFromGitHub, autoconf, bison, flex, libtool, pkgconfig, which
, libnl, protobuf, protobufc, shadow
}:
2015-08-10 19:34:09 +02:00
stdenv.mkDerivation rec {
pname = "nsjail";
2019-09-15 22:36:16 +02:00
version = "2.9";
2015-08-10 19:34:09 +02:00
2017-10-22 00:13:11 +02:00
src = fetchFromGitHub {
owner = "google";
repo = "nsjail";
rev = version;
fetchSubmodules = true;
2019-09-15 22:36:16 +02:00
sha256 = "0218n0qjb45fawqqfj3gdxgd0fw5k0vxn9iggi0ciljmr9zywkgh";
2015-08-10 19:34:09 +02:00
};
postPatch = ''
substituteInPlace user.cc \
--replace "/usr/bin/newgidmap" "${shadow}/bin/newgidmap" \
--replace "/usr/bin/newuidmap" "${shadow}/bin/newuidmap"
'';
2018-10-10 23:33:43 +02:00
nativeBuildInputs = [ autoconf bison flex libtool pkgconfig which ];
buildInputs = [ libnl protobuf protobufc ];
enableParallelBuilding = true;
2017-10-22 00:13:11 +02:00
2015-08-10 19:34:09 +02:00
installPhase = ''
mkdir -p $out/bin $out/share/man/man1
install nsjail $out/bin/
install nsjail.1 $out/share/man/man1/
2015-08-10 19:34:09 +02:00
'';
2017-10-22 00:13:11 +02:00
meta = with stdenv.lib; {
description = "A light-weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters";
homepage = http://nsjail.com/;
license = licenses.asl20;
maintainers = with maintainers; [ bosu c0bw3b ];
2017-10-22 00:13:11 +02:00
platforms = platforms.linux;
2015-08-10 19:34:09 +02:00
};
}