nixpkgs/pkgs/os-specific/linux/pam/default.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

57 lines
1.6 KiB
Nix
Raw Normal View History

{ lib, stdenv, buildPackages, fetchurl, flex, cracklib, db4, gettext, audit, libxcrypt
, nixosTests
}:
stdenv.mkDerivation rec {
pname = "linux-pam";
2021-09-14 18:05:01 +02:00
version = "1.5.2";
src = fetchurl {
2020-12-19 03:22:10 +01:00
url = "https://github.com/linux-pam/linux-pam/releases/download/v${version}/Linux-PAM-${version}.tar.xz";
2021-09-14 18:05:01 +02:00
sha256 = "sha256-5OxxMakdpEUSV0Jo9JPG2MoQXIcJFpG46bVspoXU+U0=";
};
patches = [ ./suid-wrapper-path.patch ];
outputs = [ "out" "doc" "man" /* "modules" */ ];
depsBuildBuild = [ buildPackages.stdenv.cc ];
nativeBuildInputs = [ flex ]
++ lib.optional stdenv.buildPlatform.isDarwin gettext;
2012-09-21 16:20:26 +02:00
buildInputs = [ cracklib db4 libxcrypt ]
++ lib.optional stdenv.buildPlatform.isLinux audit;
enableParallelBuilding = true;
2021-01-15 15:45:37 +01:00
preConfigure = lib.optionalString (stdenv.hostPlatform.libc == "musl") ''
2018-01-03 23:49:45 +01:00
# export ac_cv_search_crypt=no
# (taken from Alpine linux, apparently insecure but also doesn't build O:))
# disable insecure modules
# sed -e 's/pam_rhosts//g' -i modules/Makefile.am
sed -e 's/pam_rhosts//g' -i modules/Makefile.in
'';
configureFlags = [
"--includedir=${placeholder "out"}/include/security"
"--enable-sconfigdir=/etc/security"
];
installFlags = [
"SCONFIGDIR=${placeholder "out"}/etc/security"
];
doCheck = false; # fails
passthru.tests = {
2023-05-09 17:13:45 +02:00
inherit (nixosTests) pam-oath-login pam-u2f shadow sssd-ldap;
};
meta = with lib; {
homepage = "http://www.linux-pam.org/";
description = "Pluggable Authentication Modules, a flexible mechanism for authenticating user";
2018-04-16 14:11:01 +02:00
platforms = platforms.linux;
license = licenses.bsd3;
};
}