2013-11-09 15:29:18 +00:00
|
|
|
|
{ stdenv, fetchurl, pkgconfig, glib, expat, pam, intltool, spidermonkey
|
|
|
|
|
, gobjectIntrospection, libxslt, docbook_xsl
|
2013-10-05 22:20:34 +00:00
|
|
|
|
, useSystemd ? stdenv.isLinux, systemd }:
|
2009-08-13 07:55:11 +00:00
|
|
|
|
|
2010-05-15 09:55:31 +00:00
|
|
|
|
let
|
2011-07-07 18:16:03 +00:00
|
|
|
|
|
|
|
|
|
system = "/var/run/current-system/sw";
|
2013-11-09 15:29:18 +00:00
|
|
|
|
setuid = "/var/setuid-wrappers"; #TODO: from <nixos> config.security.wrapperDir;
|
2012-08-21 12:34:59 +00:00
|
|
|
|
|
2010-05-15 09:55:31 +00:00
|
|
|
|
foolVars = {
|
|
|
|
|
SYSCONF = "/etc";
|
2013-11-09 15:29:18 +00:00
|
|
|
|
DATA = "${system}/share"; # to find share/polkit-1/actions of other apps at runtime
|
2010-05-15 09:55:31 +00:00
|
|
|
|
};
|
2012-08-21 12:34:59 +00:00
|
|
|
|
|
2010-05-15 09:55:31 +00:00
|
|
|
|
in
|
|
|
|
|
|
2009-08-13 07:55:11 +00:00
|
|
|
|
stdenv.mkDerivation rec {
|
2013-11-09 15:29:18 +00:00
|
|
|
|
name = "polkit-0.112";
|
2010-05-15 09:55:31 +00:00
|
|
|
|
|
2009-08-13 07:55:11 +00:00
|
|
|
|
src = fetchurl {
|
2012-08-21 12:34:59 +00:00
|
|
|
|
url = "http://www.freedesktop.org/software/polkit/releases/${name}.tar.gz";
|
2013-11-09 15:29:18 +00:00
|
|
|
|
sha256 = "1xkary7yirdcjdva950nqyhmsz48qhrdsr78zciahj27p8yg95fn";
|
2009-08-13 07:55:11 +00:00
|
|
|
|
};
|
2010-05-15 09:55:31 +00:00
|
|
|
|
|
2011-07-07 18:16:03 +00:00
|
|
|
|
buildInputs =
|
2013-11-09 15:29:18 +00:00
|
|
|
|
[ pkgconfig glib expat pam intltool spidermonkey gobjectIntrospection ]
|
|
|
|
|
++ [ libxslt docbook_xsl ] # man pages
|
2012-08-21 12:34:59 +00:00
|
|
|
|
++ stdenv.lib.optional useSystemd systemd;
|
2009-08-13 07:55:11 +00:00
|
|
|
|
|
2010-05-15 09:55:31 +00:00
|
|
|
|
# Ugly hack to overwrite hardcoded directories
|
|
|
|
|
# TODO: investigate a proper patch which will be accepted upstream
|
2013-11-09 15:29:18 +00:00
|
|
|
|
# After update it's good to check the sources via:
|
|
|
|
|
# grep '\<PACKAGE_' '--include=*.[ch]' -R
|
2010-05-15 09:55:31 +00:00
|
|
|
|
CFLAGS = stdenv.lib.concatStringsSep " "
|
|
|
|
|
( map (var: ''-DPACKAGE_${var}_DIR=\""${builtins.getAttr var foolVars}"\"'')
|
2011-07-07 18:16:03 +00:00
|
|
|
|
(builtins.attrNames foolVars) );
|
2009-08-16 21:47:51 +00:00
|
|
|
|
|
2013-11-09 15:29:18 +00:00
|
|
|
|
preConfigure = ''
|
|
|
|
|
patchShebangs .
|
|
|
|
|
'' + stdenv.lib.optionalString useSystemd /* bogus chroot detection */ ''
|
|
|
|
|
sed '/libsystemd-login autoconfigured, but system does not appear to use systemd/s/.*/:/' -i configure
|
|
|
|
|
''
|
|
|
|
|
# ‘libpolkit-agent-1.so’ should call the setuid wrapper on
|
|
|
|
|
# NixOS. Hard-coding the path is kinda ugly. Maybe we can just
|
|
|
|
|
# call through $PATH, but that might have security implications.
|
|
|
|
|
+ ''
|
|
|
|
|
substituteInPlace src/polkitagent/polkitagentsession.c \
|
|
|
|
|
--replace 'PACKAGE_PREFIX "/lib/polkit-1/' '"${setuid}/'
|
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
configureFlags = [
|
|
|
|
|
#"--libexecdir=$(out)/libexec/polkit-1" # this and localstatedir are ignored by configure
|
|
|
|
|
"--with-systemdsystemunitdir=$(out)/etc/systemd/system"
|
|
|
|
|
"--with-polkitd-user=polkituser" #TODO? <nixos> config.ids.uids.polkituser
|
|
|
|
|
"--with-os-type=NixOS" # not recognized but prevents impurities on non-NixOS
|
2014-01-25 23:15:51 +00:00
|
|
|
|
"--enable-introspection"
|
2013-11-09 15:29:18 +00:00
|
|
|
|
];
|
2011-08-22 11:45:51 +00:00
|
|
|
|
|
2014-01-25 23:15:51 +00:00
|
|
|
|
makeFlags = "INTROSPECTION_GIRDIR=$(out)/share/gir-1.0 INTROSPECTION_TYPELIBDIR=$(out)/lib/girepository-1.0";
|
2012-08-21 12:34:59 +00:00
|
|
|
|
|
2013-11-09 15:29:18 +00:00
|
|
|
|
#doCheck = true; # some /bin/bash problem that isn't auto-solved by patchShebangs
|
2009-08-16 12:03:45 +00:00
|
|
|
|
|
2010-05-15 09:54:56 +00:00
|
|
|
|
meta = with stdenv.lib; {
|
2012-08-21 12:34:59 +00:00
|
|
|
|
homepage = http://www.freedesktop.org/wiki/Software/polkit;
|
2009-08-13 07:55:11 +00:00
|
|
|
|
description = "A toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes";
|
2010-05-15 09:54:56 +00:00
|
|
|
|
platforms = platforms.linux;
|
|
|
|
|
maintainers = [ maintainers.urkud ];
|
2009-08-13 07:55:11 +00:00
|
|
|
|
};
|
|
|
|
|
}
|