nixpkgs/pkgs/tools/misc/yubikey-manager/default.nix

50 lines
1.3 KiB
Nix
Raw Normal View History

2017-03-19 10:16:22 +01:00
{ pythonPackages, fetchurl, lib,
yubikey-personalization, libu2f-host, libusb1 }:
pythonPackages.buildPythonPackage rec {
name = "yubikey-manager-1.0.1";
2017-03-19 10:16:22 +01:00
srcs = fetchurl {
url = "https://developers.yubico.com/yubikey-manager/Releases/${name}.tar.gz";
sha256 = "0i7w1f89hqlw7g800fjhbb6yvq9wjmj5d7w7p6v8bkyvk645v48z";
2017-03-19 10:16:22 +01:00
};
propagatedBuildInputs =
with pythonPackages;
lib.optional (!pythonPackages.pythonAtLeast "3.4") enum34 ++ [
click
cryptography
pyscard
pyusb
pyopenssl
2017-03-19 10:16:22 +01:00
six
2018-06-28 16:08:27 +02:00
fido2
2017-03-19 10:16:22 +01:00
] ++ [
libu2f-host
libusb1
yubikey-personalization
];
makeWrapperArgs = [
"--prefix" "LD_LIBRARY_PATH" ":"
(lib.makeLibraryPath [ libu2f-host libusb1 yubikey-personalization ])
2017-03-19 10:16:22 +01:00
];
postInstall = ''
mkdir -p $out/share/bash-completion/completions
_YKMAN_COMPLETE=source $out/bin/ykman > $out/share/bash-completion/completions/ykman || :
2017-03-19 10:16:22 +01:00
'';
# See https://github.com/NixOS/nixpkgs/issues/29169
doCheck = false;
2017-03-19 10:16:22 +01:00
meta = with lib; {
homepage = https://developers.yubico.com/yubikey-manager;
description = "Command line tool for configuring any YubiKey over all USB transports.";
2017-03-19 10:16:22 +01:00
license = licenses.bsd2;
platforms = platforms.unix;
maintainers = with maintainers; [ benley ];
};
}