nixpkgs/pkgs/os-specific/linux/syscall_limiter/default.nix

38 lines
959 B
Nix
Raw Normal View History

2016-01-05 16:00:02 +01:00
{ stdenv
, fetchFromGitHub
, libseccomp
, perl
, which
}:
stdenv.mkDerivation rec {
2017-02-18 11:39:01 +01:00
name = "syscall_limiter-${version}";
version = "2017-01-23";
2016-01-05 16:00:02 +01:00
src = fetchFromGitHub {
2017-02-18 11:39:01 +01:00
owner = "vi";
repo = "syscall_limiter";
rev = "481c8c883f2e1260ebc83b352b63bf61a930a341";
sha256 = "0z5arj1kq1xczgrbw1b8m9kicbv3vs9bd32wvgfr4r6ndingsp5m";
2016-01-05 16:00:02 +01:00
};
buildInputs = [ libseccomp ];
2016-01-05 16:00:02 +01:00
installPhase = ''
mkdir -p $out/bin
cp -v limit_syscalls $out/bin
cp -v monitor.sh $out/bin/limit_syscalls_monitor.sh
substituteInPlace $out/bin/limit_syscalls_monitor.sh \
--replace perl ${perl}/bin/perl \
--replace which ${which}/bin/which
'';
meta = with stdenv.lib; {
description = "Start Linux programs with only selected syscalls enabled";
2017-02-18 11:39:01 +01:00
homepage = https://github.com/vi/syscall_limiter;
license = licenses.mit;
2016-01-05 16:00:02 +01:00
maintainers = with maintainers; [ obadz ];
2017-02-18 11:39:01 +01:00
platforms = platforms.linux;
2016-01-05 16:00:02 +01:00
};
}