routersploit: init at unstable-2021-02-06
This commit is contained in:
parent
91d0bd076e
commit
6cb0c16640
2 changed files with 58 additions and 0 deletions
56
pkgs/tools/security/routersploit/default.nix
Normal file
56
pkgs/tools/security/routersploit/default.nix
Normal file
|
@ -0,0 +1,56 @@
|
|||
{ lib
|
||||
, fetchFromGitHub
|
||||
, python3
|
||||
}:
|
||||
|
||||
python3.pkgs.buildPythonApplication rec {
|
||||
pname = "routersploit";
|
||||
version = "unstable-2021-02-06";
|
||||
format = "setuptools";
|
||||
|
||||
src = fetchFromGitHub {
|
||||
owner = "threat9";
|
||||
repo = pname;
|
||||
rev = "3fd394637f5566c4cf6369eecae08c4d27f93cda";
|
||||
hash = "sha256-IET0vL0VVP9ZNn75hKdTCiEmOZRHHYICykhzW2g3LEg=";
|
||||
};
|
||||
|
||||
propagatedBuildInputs = with python3.pkgs; [
|
||||
future
|
||||
paramiko
|
||||
pycryptodome
|
||||
pysnmp
|
||||
requests
|
||||
setuptools
|
||||
];
|
||||
|
||||
checkInputs = with python3.pkgs; [
|
||||
pytest-xdist
|
||||
pytestCheckHook
|
||||
threat9-test-bed
|
||||
];
|
||||
|
||||
postInstall = ''
|
||||
mv $out/bin/rsf.py $out/bin/rsf
|
||||
'';
|
||||
|
||||
pythonImportsCheck = [
|
||||
"routersploit"
|
||||
];
|
||||
|
||||
pytestFlagsArray = [
|
||||
"-n"
|
||||
"$NIX_BUILD_CORES"
|
||||
# Run the same tests as upstream does in the first round
|
||||
"tests/core/"
|
||||
"tests/test_exploit_scenarios.py"
|
||||
"tests/test_module_info.py"
|
||||
];
|
||||
|
||||
meta = with lib; {
|
||||
description = "Exploitation Framework for Embedded Devices";
|
||||
homepage = "https://github.com/threat9/routersploit";
|
||||
license = with licenses; [ bsd3 ];
|
||||
maintainers = with maintainers; [ fab ];
|
||||
};
|
||||
}
|
|
@ -4320,6 +4320,8 @@ with pkgs;
|
|||
|
||||
roundcubePlugins = dontRecurseIntoAttrs (callPackage ../servers/roundcube/plugins { });
|
||||
|
||||
routersploit = callPackage ../tools/security/routersploit { };
|
||||
|
||||
routinator = callPackage ../servers/routinator {
|
||||
inherit (darwin.apple_sdk.frameworks) Security;
|
||||
};
|
||||
|
|
Loading…
Reference in a new issue