mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-28 18:03:04 +00:00
openvpn: cleanup unnecessary generic function
This commit is contained in:
parent
327b7e0104
commit
df2f1a8510
@ -2,7 +2,6 @@
|
|||||||
, stdenv
|
, stdenv
|
||||||
, fetchurl
|
, fetchurl
|
||||||
, pkg-config
|
, pkg-config
|
||||||
, iproute2
|
|
||||||
, libcap_ng
|
, libcap_ng
|
||||||
, libnl
|
, libnl
|
||||||
, lz4
|
, lz4
|
||||||
@ -18,73 +17,51 @@
|
|||||||
}:
|
}:
|
||||||
|
|
||||||
let
|
let
|
||||||
inherit (lib) versionOlder optional optionals optionalString;
|
inherit (lib) optional optionals optionalString;
|
||||||
|
|
||||||
generic = { version, sha256, extraBuildInputs ? [ ] }:
|
|
||||||
let
|
|
||||||
withIpRoute = stdenv.isLinux && (versionOlder version "2.5.4");
|
|
||||||
in
|
|
||||||
stdenv.mkDerivation
|
|
||||||
rec {
|
|
||||||
pname = "openvpn";
|
|
||||||
inherit version;
|
|
||||||
|
|
||||||
src = fetchurl {
|
|
||||||
url = "https://swupdate.openvpn.net/community/releases/${pname}-${version}.tar.gz";
|
|
||||||
inherit sha256;
|
|
||||||
};
|
|
||||||
|
|
||||||
nativeBuildInputs = [ pkg-config ];
|
|
||||||
|
|
||||||
buildInputs = [ lz4 lzo ]
|
|
||||||
++ optionals stdenv.isLinux [ libcap_ng libnl pam ]
|
|
||||||
++ optional withIpRoute iproute2
|
|
||||||
++ optional useSystemd systemd
|
|
||||||
++ optional pkcs11Support pkcs11helper
|
|
||||||
++ extraBuildInputs;
|
|
||||||
|
|
||||||
configureFlags = optionals withIpRoute [
|
|
||||||
"--enable-iproute2"
|
|
||||||
"IPROUTE=${iproute2}/sbin/ip"
|
|
||||||
]
|
|
||||||
++ optional useSystemd "--enable-systemd"
|
|
||||||
++ optional pkcs11Support "--enable-pkcs11"
|
|
||||||
++ optional stdenv.isDarwin "--disable-plugin-auth-pam";
|
|
||||||
|
|
||||||
# We used to vendor the update-systemd-resolved script inside libexec,
|
|
||||||
# but a separate package was made, that uses libexec/openvpn. Copy it
|
|
||||||
# into libexec in case any consumers expect it to be there even though
|
|
||||||
# they should use the update-systemd-resolved package instead.
|
|
||||||
postInstall = ''
|
|
||||||
mkdir -p $out/share/doc/openvpn/examples
|
|
||||||
cp -r sample/sample-{config-files,keys,scripts}/ $out/share/doc/openvpn/examples
|
|
||||||
'' + optionalString useSystemd ''
|
|
||||||
install -Dm555 -t $out/libexec ${update-systemd-resolved}/libexec/openvpn/*
|
|
||||||
'';
|
|
||||||
|
|
||||||
enableParallelBuilding = true;
|
|
||||||
|
|
||||||
meta = with lib; {
|
|
||||||
description = "A robust and highly flexible tunneling application";
|
|
||||||
mainProgram = "openvpn";
|
|
||||||
downloadPage = "https://openvpn.net/community-downloads/";
|
|
||||||
homepage = "https://openvpn.net/";
|
|
||||||
license = licenses.gpl2Only;
|
|
||||||
maintainers = with maintainers; [ viric peterhoeg ];
|
|
||||||
platforms = platforms.unix;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
in
|
in
|
||||||
{
|
stdenv.mkDerivation (finalAttrs: {
|
||||||
openvpn = (generic {
|
pname = "openvpn";
|
||||||
version = "2.6.8";
|
version = "2.6.8";
|
||||||
sha256 = "sha256-Xt4VZcim2IAQD38jUxen7p7qg9UFLbVUfxOp52r3gF0=";
|
|
||||||
extraBuildInputs = [ openssl ];
|
src = fetchurl {
|
||||||
}).overrideAttrs
|
url = "https://swupdate.openvpn.net/community/releases/openvpn-${finalAttrs.version}.tar.gz";
|
||||||
(_: {
|
hash = "sha256-Xt4VZcim2IAQD38jUxen7p7qg9UFLbVUfxOp52r3gF0=";
|
||||||
passthru.tests = {
|
};
|
||||||
inherit (nixosTests) initrd-network-openvpn systemd-initrd-networkd-openvpn;
|
|
||||||
};
|
nativeBuildInputs = [ pkg-config ];
|
||||||
});
|
|
||||||
}
|
buildInputs = [ lz4 lzo openssl ]
|
||||||
|
++ optionals stdenv.isLinux [ libcap_ng libnl pam ]
|
||||||
|
++ optional useSystemd systemd
|
||||||
|
++ optional pkcs11Support pkcs11helper;
|
||||||
|
|
||||||
|
configureFlags = optional useSystemd "--enable-systemd"
|
||||||
|
++ optional pkcs11Support "--enable-pkcs11"
|
||||||
|
++ optional stdenv.isDarwin "--disable-plugin-auth-pam";
|
||||||
|
|
||||||
|
# We used to vendor the update-systemd-resolved script inside libexec,
|
||||||
|
# but a separate package was made, that uses libexec/openvpn. Copy it
|
||||||
|
# into libexec in case any consumers expect it to be there even though
|
||||||
|
# they should use the update-systemd-resolved package instead.
|
||||||
|
postInstall = ''
|
||||||
|
mkdir -p $out/share/doc/openvpn/examples
|
||||||
|
cp -r sample/sample-{config-files,keys,scripts}/ $out/share/doc/openvpn/examples
|
||||||
|
'' + optionalString useSystemd ''
|
||||||
|
install -Dm555 -t $out/libexec ${update-systemd-resolved}/libexec/openvpn/*
|
||||||
|
'';
|
||||||
|
|
||||||
|
enableParallelBuilding = true;
|
||||||
|
|
||||||
|
passthru.tests = {
|
||||||
|
inherit (nixosTests) initrd-network-openvpn systemd-initrd-networkd-openvpn;
|
||||||
|
};
|
||||||
|
|
||||||
|
meta = with lib; {
|
||||||
|
description = "A robust and highly flexible tunneling application";
|
||||||
|
downloadPage = "https://openvpn.net/community-downloads/";
|
||||||
|
homepage = "https://openvpn.net/";
|
||||||
|
license = licenses.gpl2Only;
|
||||||
|
maintainers = with maintainers; [ viric peterhoeg ];
|
||||||
|
platforms = platforms.unix;
|
||||||
|
};
|
||||||
|
})
|
||||||
|
@ -11672,8 +11672,7 @@ with pkgs;
|
|||||||
|
|
||||||
opentsdb = callPackage ../tools/misc/opentsdb { };
|
opentsdb = callPackage ../tools/misc/opentsdb { };
|
||||||
|
|
||||||
inherit (callPackages ../tools/networking/openvpn {})
|
openvpn = callPackage ../tools/networking/openvpn {};
|
||||||
openvpn;
|
|
||||||
|
|
||||||
openvpn3 = callPackage ../tools/networking/openvpn3 { };
|
openvpn3 = callPackage ../tools/networking/openvpn3 { };
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user