diff options
author | zowoq <59103226+zowoq@users.noreply.github.com> | 2020-08-04 10:26:27 +1000 |
---|---|---|
committer | zowoq <59103226+zowoq@users.noreply.github.com> | 2020-08-10 16:02:30 +1000 |
commit | cea7cd902eb4cd87f0b8eac9ee08f6cd8b92635f (patch) | |
tree | 8f0d94345ec3b0c072b13a2391248772325bb7f5 /pkgs/tools/security | |
parent | cc06d7a26f247df071c551a980147baff8a75ff7 (diff) |
buildGoModule packages: set doCheck = false
Diffstat (limited to 'pkgs/tools/security')
-rw-r--r-- | pkgs/tools/security/age/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/bettercap/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/browserpass/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/cfssl/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/gobuster/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/gopass/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/saml2aws/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/sops/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/verifpal/default.nix | 2 | ||||
-rw-r--r-- | pkgs/tools/security/yubikey-agent/default.nix | 2 |
10 files changed, 20 insertions, 0 deletions
diff --git a/pkgs/tools/security/age/default.nix b/pkgs/tools/security/age/default.nix index 429a8689a1ff..8436972ebc53 100644 --- a/pkgs/tools/security/age/default.nix +++ b/pkgs/tools/security/age/default.nix @@ -6,6 +6,8 @@ buildGoModule rec { goPackagePath = "github.com/FiloSottile/age"; vendorSha256 = "0km7a2826j3fk2nrkmgc990chrkcfz006wfw14yilsa4p2hmfl7m"; + doCheck = false; + subPackages = [ "cmd/age" "cmd/age-keygen" diff --git a/pkgs/tools/security/bettercap/default.nix b/pkgs/tools/security/bettercap/default.nix index 97b38359f663..6494002a4733 100644 --- a/pkgs/tools/security/bettercap/default.nix +++ b/pkgs/tools/security/bettercap/default.nix @@ -21,6 +21,8 @@ buildGoModule rec { vendorSha256 = "0yfs1f18d8frbkrshsajzzbj4wh2azd89g2h35wm6wqknvlipwr0"; + doCheck = false; + nativeBuildInputs = [ pkg-config ]; buildInputs = [ libpcap libnfnetlink libnetfilter_queue libusb1 ]; diff --git a/pkgs/tools/security/browserpass/default.nix b/pkgs/tools/security/browserpass/default.nix index fdb40b566e70..2e3291bd014f 100644 --- a/pkgs/tools/security/browserpass/default.nix +++ b/pkgs/tools/security/browserpass/default.nix @@ -14,6 +14,8 @@ buildGoModule rec { vendorSha256 = "1wcbn0ip596f2dp68y6jmxgv20l0dgrcxg5cwclkawigj05416zj"; + doCheck = false; + postPatch = '' # Because this Makefile will be installed to be used by the user, patch # variables to be valid by default diff --git a/pkgs/tools/security/cfssl/default.nix b/pkgs/tools/security/cfssl/default.nix index 669110b9179f..1aef7b5bd567 100644 --- a/pkgs/tools/security/cfssl/default.nix +++ b/pkgs/tools/security/cfssl/default.nix @@ -24,6 +24,8 @@ buildGoModule rec { vendorSha256 = null; + doCheck = false; + nativeBuildInputs = [ go-rice ]; preBuild = '' diff --git a/pkgs/tools/security/gobuster/default.nix b/pkgs/tools/security/gobuster/default.nix index c7366d02ac81..6e049917de2c 100644 --- a/pkgs/tools/security/gobuster/default.nix +++ b/pkgs/tools/security/gobuster/default.nix @@ -16,6 +16,8 @@ buildGoModule rec { vendorSha256 = "0kr9i2nm5csf3070hwaiss137pfa3088xbw2zigp7aqb2naky036"; + doCheck = false; + meta = with lib; { description = "Tool used to brute-force URIs, DNS subdomains, Virtual Host names on target web servers"; homepage = "https://github.com/OJ/gobuster"; diff --git a/pkgs/tools/security/gopass/default.nix b/pkgs/tools/security/gopass/default.nix index a174f8edbae8..4f90bace8950 100644 --- a/pkgs/tools/security/gopass/default.nix +++ b/pkgs/tools/security/gopass/default.nix @@ -22,6 +22,8 @@ buildGoModule rec { vendorSha256 = "1wn20bh7ma4pblsf6qnlbz5bx4p9apig3d1yz7cpsqv4z3w07baw"; + doCheck = false; + buildFlagsArray = [ "-ldflags=-s -w -X main.version=${version} -X main.commit=${src.rev}" ]; wrapperPath = stdenv.lib.makeBinPath ([ diff --git a/pkgs/tools/security/saml2aws/default.nix b/pkgs/tools/security/saml2aws/default.nix index d34e9e5da104..940e67013eec 100644 --- a/pkgs/tools/security/saml2aws/default.nix +++ b/pkgs/tools/security/saml2aws/default.nix @@ -14,6 +14,8 @@ buildGoModule rec { runVend = true; vendorSha256 = "1kzihyx44sx6php4z58fzy6c3g0y713939yzxpgk3n03snn2x8sf"; + doCheck = false; + subPackages = [ "." "cmd/saml2aws" ]; buildFlagsArray = '' diff --git a/pkgs/tools/security/sops/default.nix b/pkgs/tools/security/sops/default.nix index 3010c37a0100..8ec324b35428 100644 --- a/pkgs/tools/security/sops/default.nix +++ b/pkgs/tools/security/sops/default.nix @@ -13,6 +13,8 @@ buildGoModule rec { vendorSha256 = "0475y95qma5m346ng898n80xv2rxzndx89c9ygjcvjs513yzcba2"; + doCheck = false; + meta = with stdenv.lib; { homepage = "https://github.com/mozilla/sops"; description = "Mozilla sops (Secrets OPerationS) is an editor of encrypted files"; diff --git a/pkgs/tools/security/verifpal/default.nix b/pkgs/tools/security/verifpal/default.nix index a3f3132aa3cb..930b44cb4c68 100644 --- a/pkgs/tools/security/verifpal/default.nix +++ b/pkgs/tools/security/verifpal/default.nix @@ -16,6 +16,8 @@ buildGoModule rec { vendorSha256 = "0cmj6h103igg5pcs9c9wrcmrsf0mwp9vbgzf5amsnj1206ryb1p2"; + doCheck = false; + nativeBuildInputs = [ pigeon ]; subPackages = [ "cmd/verifpal" ]; diff --git a/pkgs/tools/security/yubikey-agent/default.nix b/pkgs/tools/security/yubikey-agent/default.nix index 6b6ed8e02854..5860fb3a03e4 100644 --- a/pkgs/tools/security/yubikey-agent/default.nix +++ b/pkgs/tools/security/yubikey-agent/default.nix @@ -27,6 +27,8 @@ buildGoModule rec { vendorSha256 = "128mlsagj3im6h0p0ndhzk29ya47g19im9dldx3nmddf2jlccj2h"; + doCheck = false; + subPackages = [ "." ]; # On macOS, there isn't a choice of pinentry program, so let's |