Merge pull request #85687 from mayflower/privacyidea
Init privacyIDEA packages and modules
This commit is contained in:
commit
db010c5537
@ -792,6 +792,7 @@
|
|||||||
./services/security/nginx-sso.nix
|
./services/security/nginx-sso.nix
|
||||||
./services/security/oauth2_proxy.nix
|
./services/security/oauth2_proxy.nix
|
||||||
./services/security/oauth2_proxy_nginx.nix
|
./services/security/oauth2_proxy_nginx.nix
|
||||||
|
./services/security/privacyidea.nix
|
||||||
./services/security/physlock.nix
|
./services/security/physlock.nix
|
||||||
./services/security/shibboleth-sp.nix
|
./services/security/shibboleth-sp.nix
|
||||||
./services/security/sks.nix
|
./services/security/sks.nix
|
||||||
|
279
nixos/modules/services/security/privacyidea.nix
Normal file
279
nixos/modules/services/security/privacyidea.nix
Normal file
@ -0,0 +1,279 @@
|
|||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
with lib;
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.services.privacyidea;
|
||||||
|
|
||||||
|
uwsgi = pkgs.uwsgi.override { plugins = [ "python3" ]; };
|
||||||
|
python = uwsgi.python3;
|
||||||
|
penv = python.withPackages (ps: [ ps.privacyidea ]);
|
||||||
|
logCfg = pkgs.writeText "privacyidea-log.cfg" ''
|
||||||
|
[formatters]
|
||||||
|
keys=detail
|
||||||
|
|
||||||
|
[handlers]
|
||||||
|
keys=stream
|
||||||
|
|
||||||
|
[formatter_detail]
|
||||||
|
class=privacyidea.lib.log.SecureFormatter
|
||||||
|
format=[%(asctime)s][%(process)d][%(thread)d][%(levelname)s][%(name)s:%(lineno)d] %(message)s
|
||||||
|
|
||||||
|
[handler_stream]
|
||||||
|
class=StreamHandler
|
||||||
|
level=NOTSET
|
||||||
|
formatter=detail
|
||||||
|
args=(sys.stdout,)
|
||||||
|
|
||||||
|
[loggers]
|
||||||
|
keys=root,privacyidea
|
||||||
|
|
||||||
|
[logger_privacyidea]
|
||||||
|
handlers=stream
|
||||||
|
qualname=privacyidea
|
||||||
|
level=INFO
|
||||||
|
|
||||||
|
[logger_root]
|
||||||
|
handlers=stream
|
||||||
|
level=ERROR
|
||||||
|
'';
|
||||||
|
|
||||||
|
piCfgFile = pkgs.writeText "privacyidea.cfg" ''
|
||||||
|
SUPERUSER_REALM = [ '${concatStringsSep "', '" cfg.superuserRealm}' ]
|
||||||
|
SQLALCHEMY_DATABASE_URI = 'postgresql:///privacyidea'
|
||||||
|
SECRET_KEY = '${cfg.secretKey}'
|
||||||
|
PI_PEPPER = '${cfg.pepper}'
|
||||||
|
PI_ENCFILE = '${cfg.encFile}'
|
||||||
|
PI_AUDIT_KEY_PRIVATE = '${cfg.auditKeyPrivate}'
|
||||||
|
PI_AUDIT_KEY_PUBLIC = '${cfg.auditKeyPublic}'
|
||||||
|
PI_LOGCONFIG = '${logCfg}'
|
||||||
|
${cfg.extraConfig}
|
||||||
|
'';
|
||||||
|
|
||||||
|
in
|
||||||
|
|
||||||
|
{
|
||||||
|
options = {
|
||||||
|
services.privacyidea = {
|
||||||
|
enable = mkEnableOption "PrivacyIDEA";
|
||||||
|
|
||||||
|
stateDir = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "/var/lib/privacyidea";
|
||||||
|
description = ''
|
||||||
|
Directory where all PrivacyIDEA files will be placed by default.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
superuserRealm = mkOption {
|
||||||
|
type = types.listOf types.str;
|
||||||
|
default = [ "super" "administrators" ];
|
||||||
|
description = ''
|
||||||
|
The realm where users are allowed to login as administrators.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
secretKey = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
example = "t0p s3cr3t";
|
||||||
|
description = ''
|
||||||
|
This is used to encrypt the auth_token.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
pepper = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
example = "Never know...";
|
||||||
|
description = ''
|
||||||
|
This is used to encrypt the admin passwords.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
encFile = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "${cfg.stateDir}/enckey";
|
||||||
|
description = ''
|
||||||
|
This is used to encrypt the token data and token passwords
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
auditKeyPrivate = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "${cfg.stateDir}/private.pem";
|
||||||
|
description = ''
|
||||||
|
Private Key for signing the audit log.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
auditKeyPublic = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "${cfg.stateDir}/public.pem";
|
||||||
|
description = ''
|
||||||
|
Public key for checking signatures of the audit log.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
adminPasswordFile = mkOption {
|
||||||
|
type = types.path;
|
||||||
|
description = "File containing password for the admin user";
|
||||||
|
};
|
||||||
|
|
||||||
|
adminEmail = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
example = "admin@example.com";
|
||||||
|
description = "Mail address for the admin user";
|
||||||
|
};
|
||||||
|
|
||||||
|
extraConfig = mkOption {
|
||||||
|
type = types.lines;
|
||||||
|
default = "";
|
||||||
|
description = ''
|
||||||
|
Extra configuration options for pi.cfg.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
user = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "privacyidea";
|
||||||
|
description = "User account under which PrivacyIDEA runs.";
|
||||||
|
};
|
||||||
|
|
||||||
|
group = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "privacyidea";
|
||||||
|
description = "Group account under which PrivacyIDEA runs.";
|
||||||
|
};
|
||||||
|
|
||||||
|
ldap-proxy = {
|
||||||
|
enable = mkEnableOption "PrivacyIDEA LDAP Proxy";
|
||||||
|
|
||||||
|
configFile = mkOption {
|
||||||
|
type = types.path;
|
||||||
|
default = "";
|
||||||
|
description = ''
|
||||||
|
Path to PrivacyIDEA LDAP Proxy configuration (proxy.ini).
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
user = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "pi-ldap-proxy";
|
||||||
|
description = "User account under which PrivacyIDEA LDAP proxy runs.";
|
||||||
|
};
|
||||||
|
|
||||||
|
group = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "pi-ldap-proxy";
|
||||||
|
description = "Group account under which PrivacyIDEA LDAP proxy runs.";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = mkMerge [
|
||||||
|
|
||||||
|
(mkIf cfg.enable {
|
||||||
|
|
||||||
|
environment.systemPackages = [ python.pkgs.privacyidea ];
|
||||||
|
|
||||||
|
services.postgresql.enable = mkDefault true;
|
||||||
|
|
||||||
|
systemd.services.privacyidea = let
|
||||||
|
piuwsgi = pkgs.writeText "uwsgi.json" (builtins.toJSON {
|
||||||
|
uwsgi = {
|
||||||
|
plugins = [ "python3" ];
|
||||||
|
pythonpath = "${penv}/${uwsgi.python3.sitePackages}";
|
||||||
|
socket = "/run/privacyidea/socket";
|
||||||
|
uid = cfg.user;
|
||||||
|
gid = cfg.group;
|
||||||
|
chmod-socket = 770;
|
||||||
|
chown-socket = "${cfg.user}:nginx";
|
||||||
|
chdir = cfg.stateDir;
|
||||||
|
wsgi-file = "${penv}/etc/privacyidea/privacyideaapp.wsgi";
|
||||||
|
processes = 4;
|
||||||
|
harakiri = 60;
|
||||||
|
reload-mercy = 8;
|
||||||
|
stats = "/run/privacyidea/stats.socket";
|
||||||
|
max-requests = 2000;
|
||||||
|
limit-as = 1024;
|
||||||
|
reload-on-as = 512;
|
||||||
|
reload-on-rss = 256;
|
||||||
|
no-orphans = true;
|
||||||
|
vacuum = true;
|
||||||
|
};
|
||||||
|
});
|
||||||
|
in {
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = [ "postgresql.service" ];
|
||||||
|
path = with pkgs; [ openssl ];
|
||||||
|
environment.PRIVACYIDEA_CONFIGFILE = piCfgFile;
|
||||||
|
preStart = let
|
||||||
|
pi-manage = "${pkgs.sudo}/bin/sudo -u privacyidea -HE ${penv}/bin/pi-manage";
|
||||||
|
pgsu = config.services.postgresql.superUser;
|
||||||
|
psql = config.services.postgresql.package;
|
||||||
|
in ''
|
||||||
|
mkdir -p ${cfg.stateDir} /run/privacyidea
|
||||||
|
chown ${cfg.user}:${cfg.group} -R ${cfg.stateDir} /run/privacyidea
|
||||||
|
if ! test -e "${cfg.stateDir}/db-created"; then
|
||||||
|
${pkgs.sudo}/bin/sudo -u ${pgsu} ${psql}/bin/createuser --no-superuser --no-createdb --no-createrole ${cfg.user}
|
||||||
|
${pkgs.sudo}/bin/sudo -u ${pgsu} ${psql}/bin/createdb --owner ${cfg.user} privacyidea
|
||||||
|
${pi-manage} create_enckey
|
||||||
|
${pi-manage} create_audit_keys
|
||||||
|
${pi-manage} createdb
|
||||||
|
${pi-manage} admin add admin -e ${cfg.adminEmail} -p "$(cat ${cfg.adminPasswordFile})"
|
||||||
|
${pi-manage} db stamp head -d ${penv}/lib/privacyidea/migrations
|
||||||
|
touch "${cfg.stateDir}/db-created"
|
||||||
|
chmod g+r "${cfg.stateDir}/enckey" "${cfg.stateDir}/private.pem"
|
||||||
|
fi
|
||||||
|
${pi-manage} db upgrade -d ${penv}/lib/privacyidea/migrations
|
||||||
|
'';
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "notify";
|
||||||
|
ExecStart = "${uwsgi}/bin/uwsgi --json ${piuwsgi}";
|
||||||
|
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
|
||||||
|
ExecStop = "${pkgs.coreutils}/bin/kill -INT $MAINPID";
|
||||||
|
NotifyAccess = "main";
|
||||||
|
KillSignal = "SIGQUIT";
|
||||||
|
StandardError = "syslog";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.privacyidea = mkIf (cfg.user == "privacyidea") {
|
||||||
|
group = cfg.group;
|
||||||
|
};
|
||||||
|
|
||||||
|
users.groups.privacyidea = mkIf (cfg.group == "privacyidea") {};
|
||||||
|
})
|
||||||
|
|
||||||
|
(mkIf cfg.ldap-proxy.enable {
|
||||||
|
|
||||||
|
systemd.services.privacyidea-ldap-proxy = let
|
||||||
|
ldap-proxy-env = pkgs.python2.withPackages (ps: [ ps.privacyidea-ldap-proxy ]);
|
||||||
|
in {
|
||||||
|
description = "privacyIDEA LDAP proxy";
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
serviceConfig = {
|
||||||
|
User = cfg.ldap-proxy.user;
|
||||||
|
Group = cfg.ldap-proxy.group;
|
||||||
|
ExecStart = ''
|
||||||
|
${ldap-proxy-env}/bin/twistd \
|
||||||
|
--nodaemon \
|
||||||
|
--pidfile= \
|
||||||
|
-u ${cfg.ldap-proxy.user} \
|
||||||
|
-g ${cfg.ldap-proxy.group} \
|
||||||
|
ldap-proxy \
|
||||||
|
-c ${cfg.ldap-proxy.configFile}
|
||||||
|
'';
|
||||||
|
Restart = "always";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.pi-ldap-proxy = mkIf (cfg.ldap-proxy.user == "pi-ldap-proxy") {
|
||||||
|
group = cfg.ldap-proxy.group;
|
||||||
|
};
|
||||||
|
|
||||||
|
users.groups.pi-ldap-proxy = mkIf (cfg.ldap-proxy.group == "pi-ldap-proxy") {};
|
||||||
|
})
|
||||||
|
];
|
||||||
|
|
||||||
|
}
|
@ -260,6 +260,7 @@ in
|
|||||||
pppd = handleTest ./pppd.nix {};
|
pppd = handleTest ./pppd.nix {};
|
||||||
predictable-interface-names = handleTest ./predictable-interface-names.nix {};
|
predictable-interface-names = handleTest ./predictable-interface-names.nix {};
|
||||||
printing = handleTest ./printing.nix {};
|
printing = handleTest ./printing.nix {};
|
||||||
|
privacyidea = handleTest ./privacyidea.nix {};
|
||||||
prometheus = handleTest ./prometheus.nix {};
|
prometheus = handleTest ./prometheus.nix {};
|
||||||
prometheus-exporters = handleTest ./prometheus-exporters.nix {};
|
prometheus-exporters = handleTest ./prometheus-exporters.nix {};
|
||||||
prosody = handleTest ./xmpp/prosody.nix {};
|
prosody = handleTest ./xmpp/prosody.nix {};
|
||||||
|
36
nixos/tests/privacyidea.nix
Normal file
36
nixos/tests/privacyidea.nix
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
# Miscellaneous small tests that don't warrant their own VM run.
|
||||||
|
|
||||||
|
import ./make-test-python.nix ({ pkgs, ...} : rec {
|
||||||
|
name = "privacyidea";
|
||||||
|
meta = with pkgs.stdenv.lib.maintainers; {
|
||||||
|
maintainers = [ fpletz ];
|
||||||
|
};
|
||||||
|
|
||||||
|
machine = { ... }: {
|
||||||
|
virtualisation.cores = 2;
|
||||||
|
virtualisation.memorySize = 512;
|
||||||
|
|
||||||
|
services.privacyidea = {
|
||||||
|
enable = true;
|
||||||
|
secretKey = "testing";
|
||||||
|
pepper = "testing";
|
||||||
|
adminPasswordFile = pkgs.writeText "admin-password" "testing";
|
||||||
|
adminEmail = "root@localhost";
|
||||||
|
};
|
||||||
|
services.nginx = {
|
||||||
|
enable = true;
|
||||||
|
virtualHosts."_".locations."/".extraConfig = ''
|
||||||
|
uwsgi_pass unix:/run/privacyidea/socket;
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = ''
|
||||||
|
machine.start()
|
||||||
|
machine.wait_for_unit("multi-user.target")
|
||||||
|
machine.succeed("curl --fail http://localhost | grep privacyIDEA")
|
||||||
|
machine.succeed(
|
||||||
|
"curl --fail http://localhost/auth -F username=admin -F password=testing | grep token"
|
||||||
|
)
|
||||||
|
'';
|
||||||
|
})
|
23
pkgs/development/python-modules/flask-versioned/default.nix
Normal file
23
pkgs/development/python-modules/flask-versioned/default.nix
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
{ stdenv, buildPythonPackage, fetchFromGitHub, flask }:
|
||||||
|
|
||||||
|
buildPythonPackage rec {
|
||||||
|
pname = "Flask-Versioned";
|
||||||
|
version = "0.9.4-20101221";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "pilt";
|
||||||
|
repo = "flask-versioned";
|
||||||
|
rev = "38046fb53a09060de437c90a5f7370a6b94ffc31"; # no tags
|
||||||
|
sha256 = "1wim9hvx7lxzfg35c0nc7p34j4vw9mzisgijlz4ibgykah4g1y37";
|
||||||
|
};
|
||||||
|
|
||||||
|
propagatedBuildInputs = [ flask ];
|
||||||
|
|
||||||
|
meta = with stdenv.lib; {
|
||||||
|
description = "Flask plugin to rewrite file paths to add version info";
|
||||||
|
homepage = "https://github.com/pilt/flask-versioned";
|
||||||
|
license = licenses.bsd3;
|
||||||
|
maintainers = with maintainers; [ globin ];
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
25
pkgs/development/python-modules/huey/default.nix
Normal file
25
pkgs/development/python-modules/huey/default.nix
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
{ lib, buildPythonPackage, fetchFromGitHub, redis }:
|
||||||
|
|
||||||
|
buildPythonPackage rec {
|
||||||
|
pname = "huey";
|
||||||
|
version = "2.2.0";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "coleifer";
|
||||||
|
repo = pname;
|
||||||
|
rev = version;
|
||||||
|
sha256 = "1hgic7qrmb1kxvfgf2qqiw39nqyknf17pjvli8jfzvd9mv7cb7hh";
|
||||||
|
};
|
||||||
|
|
||||||
|
propagatedBuildInputs = [ redis ];
|
||||||
|
|
||||||
|
# connects to redis
|
||||||
|
doCheck = false;
|
||||||
|
|
||||||
|
meta = with lib; {
|
||||||
|
description = "A little task queue for python";
|
||||||
|
homepage = "https://github.com/coleifer/huey";
|
||||||
|
license = licenses.mit;
|
||||||
|
maintainers = [ maintainers.globin ];
|
||||||
|
};
|
||||||
|
}
|
51
pkgs/development/python-modules/privacyidea/default.nix
Normal file
51
pkgs/development/python-modules/privacyidea/default.nix
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{ lib, buildPythonPackage, fetchFromGitHub, cacert, openssl, python
|
||||||
|
|
||||||
|
, cryptography, pyrad, pymysql, python-dateutil, flask-versioned, flask_script
|
||||||
|
, defusedxml, croniter, flask_migrate, pyjwt, configobj, sqlsoup, pillow
|
||||||
|
, python-gnupg, passlib, pyopenssl, beautifulsoup4, smpplib, flask-babel
|
||||||
|
, ldap3, huey, pyyaml, qrcode, oauth2client, requests, lxml, cbor2, psycopg2
|
||||||
|
|
||||||
|
, mock, pytest, responses, testfixtures
|
||||||
|
}:
|
||||||
|
|
||||||
|
buildPythonPackage rec {
|
||||||
|
pname = "privacyIDEA";
|
||||||
|
version = "3.3";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = pname;
|
||||||
|
repo = pname;
|
||||||
|
rev = "v${version}";
|
||||||
|
sha256 = "188ki924dig899wlih45xfsm0s7mjkya56vii26bg02h91izrb4b";
|
||||||
|
};
|
||||||
|
|
||||||
|
propagatedBuildInputs = [
|
||||||
|
cryptography pyrad pymysql python-dateutil flask-versioned flask_script
|
||||||
|
defusedxml croniter flask_migrate pyjwt configobj sqlsoup pillow
|
||||||
|
python-gnupg passlib pyopenssl beautifulsoup4 smpplib flask-babel
|
||||||
|
ldap3 huey pyyaml qrcode oauth2client requests lxml cbor2 psycopg2
|
||||||
|
];
|
||||||
|
|
||||||
|
checkInputs = [ openssl mock pytest responses testfixtures ];
|
||||||
|
# issues with hardware token tests
|
||||||
|
doCheck = false;
|
||||||
|
|
||||||
|
pythonImportsCheck = [ "privacyidea" ];
|
||||||
|
|
||||||
|
postPatch = ''
|
||||||
|
substituteInPlace privacyidea/lib/resolvers/LDAPIdResolver.py --replace \
|
||||||
|
"/etc/privacyidea/ldap-ca.crt" \
|
||||||
|
"${cacert}/etc/ssl/certs/ca-bundle.crt"
|
||||||
|
'';
|
||||||
|
|
||||||
|
postInstall = ''
|
||||||
|
rm -rf $out/${python.sitePackages}/tests
|
||||||
|
'';
|
||||||
|
|
||||||
|
meta = with lib; {
|
||||||
|
description = "Multi factor authentication system (2FA, MFA, OTP Server)";
|
||||||
|
license = licenses.agpl3Plus;
|
||||||
|
homepage = "http://www.privacyidea.org";
|
||||||
|
maintainers = [ maintainers.globin ];
|
||||||
|
};
|
||||||
|
}
|
27
pkgs/development/python-modules/privacyidea/ldap-proxy.nix
Normal file
27
pkgs/development/python-modules/privacyidea/ldap-proxy.nix
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
{ lib, buildPythonPackage, fetchFromGitHub, twisted, ldaptor, configobj }:
|
||||||
|
|
||||||
|
buildPythonPackage rec {
|
||||||
|
pname = "privacyidea-ldap-proxy";
|
||||||
|
version = "0.6.1";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "privacyidea";
|
||||||
|
repo = pname;
|
||||||
|
rev = "v${version}";
|
||||||
|
sha256 = "1kc1n9wr1a66xd5zvl6dq78xnkqkn5574jpzashc99pvm62dr24j";
|
||||||
|
};
|
||||||
|
|
||||||
|
propagatedBuildInputs = [ twisted ldaptor configobj ];
|
||||||
|
|
||||||
|
# python 2 zope.interface test import path issues
|
||||||
|
doCheck = false;
|
||||||
|
|
||||||
|
pythonImportsCheck = [ "pi_ldapproxy" ];
|
||||||
|
|
||||||
|
meta = with lib; {
|
||||||
|
description = "LDAP Proxy to intercept LDAP binds and authenticate against privacyIDEA";
|
||||||
|
homepage = "https://github.com/privacyidea/privacyidea-ldap-proxy";
|
||||||
|
license = licenses.agpl3;
|
||||||
|
maintainers = [ maintainers.globin ];
|
||||||
|
};
|
||||||
|
}
|
27
pkgs/development/python-modules/pyrad/default.nix
Normal file
27
pkgs/development/python-modules/pyrad/default.nix
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
{ buildPythonPackage, fetchFromGitHub, lib, netaddr, six, nose }:
|
||||||
|
|
||||||
|
buildPythonPackage rec {
|
||||||
|
pname = "pyrad";
|
||||||
|
version = "2.3";
|
||||||
|
|
||||||
|
src = fetchFromGitHub {
|
||||||
|
owner = "pyradius";
|
||||||
|
repo = pname;
|
||||||
|
rev = version;
|
||||||
|
sha256 = "0hy7999av47s8100afbhxfjb8phbmrqcv530xlvskndby4a8w94k";
|
||||||
|
};
|
||||||
|
|
||||||
|
propagatedBuildInputs = [ netaddr six ];
|
||||||
|
checkInputs = [ nose ];
|
||||||
|
|
||||||
|
checkPhase = ''
|
||||||
|
nosetests -e testBind
|
||||||
|
'';
|
||||||
|
|
||||||
|
meta = with lib; {
|
||||||
|
description = "Python RADIUS Implementation";
|
||||||
|
homepage = "https://bitbucket.org/zzzeek/sqlsoup";
|
||||||
|
license = licenses.mit;
|
||||||
|
maintainers = [ maintainers.globin ];
|
||||||
|
};
|
||||||
|
}
|
29
pkgs/development/python-modules/smpplib/default.nix
Normal file
29
pkgs/development/python-modules/smpplib/default.nix
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
{ buildPythonPackage, fetchPypi, lib, python, six, tox, mock, pytest }:
|
||||||
|
|
||||||
|
buildPythonPackage rec {
|
||||||
|
pname = "smpplib";
|
||||||
|
version = "2.1.0";
|
||||||
|
|
||||||
|
src = fetchPypi {
|
||||||
|
inherit pname version;
|
||||||
|
sha256 = "0jzxlfwf0861ilh4xyd70hmkdbvdki52aalglm1bnpxkg6i3jhfz";
|
||||||
|
};
|
||||||
|
|
||||||
|
propagatedBuildInputs = [ six ];
|
||||||
|
checkInputs = [ tox mock pytest ];
|
||||||
|
|
||||||
|
checkPhase = ''
|
||||||
|
pytest
|
||||||
|
'';
|
||||||
|
|
||||||
|
postInstall = ''
|
||||||
|
rm -rf $out/${python.sitePackages}/tests
|
||||||
|
'';
|
||||||
|
|
||||||
|
meta = with lib; {
|
||||||
|
description = "SMPP library for Python";
|
||||||
|
homepage = "https://github.com/python-smpplib/python-smpplib";
|
||||||
|
license = licenses.lgpl3Plus;
|
||||||
|
maintainers = [ maintainers.globin ];
|
||||||
|
};
|
||||||
|
}
|
21
pkgs/development/python-modules/sqlsoup/default.nix
Normal file
21
pkgs/development/python-modules/sqlsoup/default.nix
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{ buildPythonPackage, fetchPypi, lib, sqlalchemy, nose }:
|
||||||
|
|
||||||
|
buildPythonPackage rec {
|
||||||
|
pname = "sqlsoup";
|
||||||
|
version = "0.9.1";
|
||||||
|
|
||||||
|
src = fetchPypi {
|
||||||
|
inherit pname version;
|
||||||
|
sha256 = "1mj00fhxj75ac3i8xk9jmm7hvcjz9p4x2r3yndcwsgb659rvgbrg";
|
||||||
|
};
|
||||||
|
|
||||||
|
propagatedBuildInputs = [ sqlalchemy ];
|
||||||
|
checkInputs = [ nose ];
|
||||||
|
|
||||||
|
meta = with lib; {
|
||||||
|
description = "A one step database access tool, built on the SQLAlchemy ORM";
|
||||||
|
homepage = "https://bitbucket.org/zzzeek/sqlsoup";
|
||||||
|
license = licenses.mit;
|
||||||
|
maintainers = [ maintainers.globin ];
|
||||||
|
};
|
||||||
|
}
|
@ -2933,6 +2933,8 @@ in {
|
|||||||
|
|
||||||
hglib = callPackage ../development/python-modules/hglib {};
|
hglib = callPackage ../development/python-modules/hglib {};
|
||||||
|
|
||||||
|
huey = callPackage ../development/python-modules/huey { };
|
||||||
|
|
||||||
humanize = callPackage ../development/python-modules/humanize { };
|
humanize = callPackage ../development/python-modules/humanize { };
|
||||||
|
|
||||||
humanfriendly = callPackage ../development/python-modules/humanfriendly { };
|
humanfriendly = callPackage ../development/python-modules/humanfriendly { };
|
||||||
@ -3233,6 +3235,9 @@ in {
|
|||||||
|
|
||||||
priority = callPackage ../development/python-modules/priority { };
|
priority = callPackage ../development/python-modules/priority { };
|
||||||
|
|
||||||
|
privacyidea = callPackage ../development/python-modules/privacyidea { };
|
||||||
|
privacyidea-ldap-proxy = callPackage ../development/python-modules/privacyidea/ldap-proxy.nix { };
|
||||||
|
|
||||||
prov = callPackage ../development/python-modules/prov { };
|
prov = callPackage ../development/python-modules/prov { };
|
||||||
|
|
||||||
pudb = callPackage ../development/python-modules/pudb { };
|
pudb = callPackage ../development/python-modules/pudb { };
|
||||||
@ -3753,6 +3758,8 @@ in {
|
|||||||
|
|
||||||
flask_testing = callPackage ../development/python-modules/flask-testing { };
|
flask_testing = callPackage ../development/python-modules/flask-testing { };
|
||||||
|
|
||||||
|
flask-versioned = callPackage ../development/python-modules/flask-versioned { };
|
||||||
|
|
||||||
flask_wtf = callPackage ../development/python-modules/flask-wtf { };
|
flask_wtf = callPackage ../development/python-modules/flask-wtf { };
|
||||||
|
|
||||||
wtforms = callPackage ../development/python-modules/wtforms { };
|
wtforms = callPackage ../development/python-modules/wtforms { };
|
||||||
@ -5229,6 +5236,8 @@ in {
|
|||||||
|
|
||||||
pyrabbit2 = callPackage ../development/python-modules/pyrabbit2 { };
|
pyrabbit2 = callPackage ../development/python-modules/pyrabbit2 { };
|
||||||
|
|
||||||
|
pyrad = callPackage ../development/python-modules/pyrad { };
|
||||||
|
|
||||||
pyrr = callPackage ../development/python-modules/pyrr { };
|
pyrr = callPackage ../development/python-modules/pyrr { };
|
||||||
|
|
||||||
pysha3 = callPackage ../development/python-modules/pysha3 { };
|
pysha3 = callPackage ../development/python-modules/pysha3 { };
|
||||||
@ -5839,6 +5848,8 @@ in {
|
|||||||
|
|
||||||
sqlalchemy-utils = callPackage ../development/python-modules/sqlalchemy-utils { };
|
sqlalchemy-utils = callPackage ../development/python-modules/sqlalchemy-utils { };
|
||||||
|
|
||||||
|
sqlsoup = callPackage ../development/python-modules/sqlsoup { };
|
||||||
|
|
||||||
staticjinja = callPackage ../development/python-modules/staticjinja { };
|
staticjinja = callPackage ../development/python-modules/staticjinja { };
|
||||||
|
|
||||||
statsmodels = callPackage ../development/python-modules/statsmodels { };
|
statsmodels = callPackage ../development/python-modules/statsmodels { };
|
||||||
@ -6251,6 +6262,8 @@ in {
|
|||||||
|
|
||||||
smartdc = callPackage ../development/python-modules/smartdc { };
|
smartdc = callPackage ../development/python-modules/smartdc { };
|
||||||
|
|
||||||
|
smpplib = callPackage ../development/python-modules/smpplib { };
|
||||||
|
|
||||||
socksipy-branch = callPackage ../development/python-modules/socksipy-branch { };
|
socksipy-branch = callPackage ../development/python-modules/socksipy-branch { };
|
||||||
|
|
||||||
sockjs-tornado = callPackage ../development/python-modules/sockjs-tornado { };
|
sockjs-tornado = callPackage ../development/python-modules/sockjs-tornado { };
|
||||||
|
Loading…
Reference in New Issue
Block a user