nixpkgs/pkgs/tools/networking/shadowsocks-rust/default.nix
2024-04-24 04:20:00 +00:00

57 lines
1.5 KiB
Nix

{ lib, stdenv, fetchFromGitHub, rustPlatform, pkg-config, openssl, Security, CoreServices }:
rustPlatform.buildRustPackage rec {
pname = "shadowsocks-rust";
version = "1.18.3";
src = fetchFromGitHub {
rev = "v${version}";
owner = "shadowsocks";
repo = pname;
hash = "sha256-eqN6Qwq+ofQ9Ed7Viz+DoJQkVTvUTo1U5rVqO1YDp2w=";
};
cargoHash = "sha256-yJ2Ql6Fo2KaZRmvRB0C14fEcVwbBbsUlcqT3vFKHn58=";
nativeBuildInputs = lib.optionals stdenv.isLinux [ pkg-config ];
buildInputs = lib.optionals stdenv.isLinux [ openssl ]
++ lib.optionals stdenv.isDarwin [ Security CoreServices ];
buildFeatures = [
"trust-dns"
"local-http-native-tls"
"local-tunnel"
"local-socks4"
"local-redir"
"local-dns"
"local-tun"
"aead-cipher-extra"
"aead-cipher-2022"
"aead-cipher-2022-extra"
];
# all of these rely on connecting to www.example.com:80
checkFlags = [
"--skip=http_proxy"
"--skip=tcp_tunnel"
"--skip=tcprelay"
"--skip=udp_tunnel"
"--skip=udp_relay"
"--skip=socks4_relay_connect"
"--skip=socks5_relay_aead"
"--skip=socks5_relay_stream"
"--skip=trust_dns_resolver"
];
# timeouts in sandbox
doCheck = false;
meta = with lib; {
description = "A Rust port of Shadowsocks";
homepage = "https://github.com/shadowsocks/shadowsocks-rust";
changelog = "https://github.com/shadowsocks/shadowsocks-rust/raw/v${version}/debian/changelog";
license = licenses.mit;
maintainers = [ ];
};
}