nixpkgs/pkgs/tools/security/fail2ban/default.nix

50 lines
1.4 KiB
Nix
Raw Normal View History

{ stdenv, fetchurl, python, pythonPackages, unzip, systemd, gamin }:
let version = "0.9"; in
pythonPackages.buildPythonPackage {
name = "fail2ban-${version}";
namePrefix = "";
src = fetchurl {
url = "https://github.com/fail2ban/fail2ban/zipball/${version}";
name = "fail2ban-${version}.zip";
sha256 = "0dawl0vvdvpnkg1hc4l0c8sj8ikcr2l48d6khfx0174nq8yfcg93";
};
buildInputs = [ unzip ];
pythonPath = [ systemd python.modules.sqlite3 gamin ];
preConfigure = ''
substituteInPlace setup.cfg \
--replace /usr $out
substituteInPlace setup.py \
--replace /usr $out \
--replace /etc $out/etc \
--replace /var $TMPDIR/var \
for i in fail2ban-client fail2ban-regex fail2ban-server; do
substituteInPlace $i \
--replace /usr/share/fail2ban $out/share/fail2ban
done
for i in config/action.d/sendmail*.conf; do
substituteInPlace $i \
--replace /usr/sbin/sendmail sendmail \
--replace /usr/bin/whois whois
done
'';
doCheck = false;
meta = with stdenv.lib; {
homepage = http://www.fail2ban.org/;
description = "A program that scans log files for repeated failing login attempts and bans IP addresses";
license = licenses.gpl2Plus;
maintainers = with maintainers; [ eelco lovek323 ];
platforms = platforms.linux ++ platforms.darwin;
};
}