2021-01-19 06:50:56 +00:00
|
|
|
|
{ stdenv, fetchurl, pkg-config, glib, expat, pam, perl, fetchpatch
|
2020-11-17 10:15:30 +00:00
|
|
|
|
, intltool, spidermonkey_78, gobject-introspection, libxslt, docbook_xsl, dbus
|
2018-07-06 21:41:41 +01:00
|
|
|
|
, docbook_xml_dtd_412, gtk-doc, coreutils
|
2019-10-26 16:53:52 +01:00
|
|
|
|
, useSystemd ? (stdenv.isLinux && !stdenv.hostPlatform.isMusl), systemd, elogind
|
2021-01-01 21:06:07 +00:00
|
|
|
|
# needed until gobject-introspection does cross-compile (https://github.com/NixOS/nixpkgs/pull/88222)
|
|
|
|
|
, withIntrospection ? (stdenv.buildPlatform == stdenv.hostPlatform)
|
2019-10-26 16:53:52 +01:00
|
|
|
|
# A few tests currently fail on musl (polkitunixusertest, polkitunixgrouptest, polkitidentitytest segfault).
|
|
|
|
|
# Not yet investigated; it may be due to the "Make netgroup support optional"
|
|
|
|
|
# patch not updating the tests correctly yet, or doing something wrong,
|
|
|
|
|
# or being unrelated to that.
|
|
|
|
|
, doCheck ? (stdenv.isLinux && !stdenv.hostPlatform.isMusl)
|
2017-05-25 17:05:46 +01:00
|
|
|
|
}:
|
2009-08-13 08:55:11 +01:00
|
|
|
|
|
2010-05-15 10:55:31 +01:00
|
|
|
|
let
|
2011-07-07 19:16:03 +01:00
|
|
|
|
|
2018-07-06 21:41:41 +01:00
|
|
|
|
system = "/run/current-system/sw";
|
2019-10-05 12:10:11 +01:00
|
|
|
|
setuid = "/run/wrappers/bin";
|
2012-08-21 13:34:59 +01:00
|
|
|
|
|
2010-05-15 10:55:31 +01:00
|
|
|
|
in
|
|
|
|
|
|
2009-08-13 08:55:11 +01:00
|
|
|
|
stdenv.mkDerivation rec {
|
2019-04-26 20:42:52 +01:00
|
|
|
|
pname = "polkit";
|
2020-11-17 10:15:30 +00:00
|
|
|
|
version = "0.118";
|
2010-05-15 10:55:31 +01:00
|
|
|
|
|
2009-08-13 08:55:11 +01:00
|
|
|
|
src = fetchurl {
|
2019-04-26 20:42:52 +01:00
|
|
|
|
url = "https://www.freedesktop.org/software/${pname}/releases/${pname}-${version}.tar.gz";
|
2020-11-17 10:15:30 +00:00
|
|
|
|
sha256 = "0swmg37jsxsxfsd2b3qm0l3zxr9ldvhpjw8lsgq3j8q7wy2fjm3d";
|
2009-08-13 08:55:11 +01:00
|
|
|
|
};
|
2010-05-15 10:55:31 +01:00
|
|
|
|
|
2019-09-16 04:28:12 +01:00
|
|
|
|
patches = [
|
|
|
|
|
# Don't use etc/dbus-1/system.d
|
2019-10-27 00:44:34 +01:00
|
|
|
|
# Upstream MR: https://gitlab.freedesktop.org/polkit/polkit/merge_requests/11
|
2019-09-16 04:28:12 +01:00
|
|
|
|
(fetchpatch {
|
2019-10-27 00:44:34 +01:00
|
|
|
|
url = "https://gitlab.freedesktop.org/polkit/polkit/commit/5dd4e22efd05d55833c4634b56e473812b5acbf2.patch";
|
2019-09-16 04:28:12 +01:00
|
|
|
|
sha256 = "17lv7xj5ksa27iv4zpm4zwd4iy8zbwjj4ximslfq3sasiz9kxhlp";
|
|
|
|
|
})
|
2019-10-26 16:53:52 +01:00
|
|
|
|
] ++ stdenv.lib.optionals stdenv.hostPlatform.isMusl [
|
|
|
|
|
# Make netgroup support optional (musl does not have it)
|
|
|
|
|
# Upstream MR: https://gitlab.freedesktop.org/polkit/polkit/merge_requests/10
|
|
|
|
|
# We use the version of the patch that Alpine uses successfully.
|
|
|
|
|
(fetchpatch {
|
|
|
|
|
name = "make-innetgr-optional.patch";
|
|
|
|
|
url = "https://git.alpinelinux.org/aports/plain/main/polkit/make-innetgr-optional.patch?id=391e7de6ced1a96c2dac812e0b12f1d7e0ea705e";
|
|
|
|
|
sha256 = "1p9qqqhnrfyjvvd50qh6vpl256kyfblm1qnhz5pm09klrl1bh1n4";
|
|
|
|
|
})
|
2019-09-16 04:28:12 +01:00
|
|
|
|
];
|
|
|
|
|
|
2018-06-16 03:57:44 +01:00
|
|
|
|
postPatch = stdenv.lib.optionalString stdenv.isDarwin ''
|
|
|
|
|
sed -i -e "s/-Wl,--as-needed//" configure.ac
|
|
|
|
|
'';
|
2017-05-25 17:05:46 +01:00
|
|
|
|
|
2016-08-29 01:30:01 +01:00
|
|
|
|
outputs = [ "bin" "dev" "out" ]; # small man pages in $bin
|
2015-10-14 05:03:25 +01:00
|
|
|
|
|
2017-05-25 17:05:46 +01:00
|
|
|
|
nativeBuildInputs =
|
2021-01-19 06:50:56 +00:00
|
|
|
|
[ glib gtk-doc pkg-config intltool perl ]
|
2017-05-25 17:05:46 +01:00
|
|
|
|
++ [ libxslt docbook_xsl docbook_xml_dtd_412 ]; # man pages
|
2011-07-07 19:16:03 +01:00
|
|
|
|
buildInputs =
|
2020-11-17 10:15:30 +00:00
|
|
|
|
[ expat pam spidermonkey_78 ]
|
2019-11-20 21:55:54 +00:00
|
|
|
|
# On Linux, fall back to elogind when systemd support is off.
|
|
|
|
|
++ stdenv.lib.optional stdenv.isLinux (if useSystemd then systemd else elogind)
|
2019-12-01 01:12:43 +00:00
|
|
|
|
++ stdenv.lib.optional withIntrospection gobject-introspection;
|
2009-08-13 08:55:11 +01:00
|
|
|
|
|
2019-10-05 12:08:51 +01:00
|
|
|
|
propagatedBuildInputs = [
|
|
|
|
|
glib # in .pc Requires
|
|
|
|
|
];
|
|
|
|
|
|
2015-01-08 09:26:49 +00:00
|
|
|
|
preConfigure = ''
|
2018-07-06 21:41:41 +01:00
|
|
|
|
chmod +x test/mocklibc/bin/mocklibc{,-test}.in
|
2015-01-08 09:26:49 +00:00
|
|
|
|
patchShebangs .
|
2018-07-06 21:41:41 +01:00
|
|
|
|
|
2013-11-09 15:29:18 +00:00
|
|
|
|
# ‘libpolkit-agent-1.so’ should call the setuid wrapper on
|
|
|
|
|
# NixOS. Hard-coding the path is kinda ugly. Maybe we can just
|
|
|
|
|
# call through $PATH, but that might have security implications.
|
|
|
|
|
substituteInPlace src/polkitagent/polkitagentsession.c \
|
|
|
|
|
--replace 'PACKAGE_PREFIX "/lib/polkit-1/' '"${setuid}/'
|
2018-07-06 21:41:41 +01:00
|
|
|
|
substituteInPlace test/data/etc/polkit-1/rules.d/10-testing.rules \
|
|
|
|
|
--replace /bin/true ${coreutils}/bin/true \
|
|
|
|
|
--replace /bin/false ${coreutils}/bin/false
|
|
|
|
|
|
|
|
|
|
'' + stdenv.lib.optionalString useSystemd /* bogus chroot detection */ ''
|
|
|
|
|
sed '/libsystemd autoconfigured/s/.*/:/' -i configure
|
2013-11-09 15:29:18 +00:00
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
configureFlags = [
|
2018-07-06 21:41:41 +01:00
|
|
|
|
"--datadir=${system}/share"
|
|
|
|
|
"--sysconfdir=/etc"
|
2019-04-26 20:42:52 +01:00
|
|
|
|
"--with-systemdsystemunitdir=${placeholder "out"}/etc/systemd/system"
|
2013-11-09 15:29:18 +00:00
|
|
|
|
"--with-polkitd-user=polkituser" #TODO? <nixos> config.ids.uids.polkituser
|
|
|
|
|
"--with-os-type=NixOS" # not recognized but prevents impurities on non-NixOS
|
2019-12-01 01:12:43 +00:00
|
|
|
|
(if withIntrospection then "--enable-introspection" else "--disable-introspection")
|
2018-06-16 03:57:44 +01:00
|
|
|
|
] ++ stdenv.lib.optional (!doCheck) "--disable-test";
|
2011-08-22 12:45:51 +01:00
|
|
|
|
|
2019-04-26 20:42:52 +01:00
|
|
|
|
makeFlags = [
|
|
|
|
|
"INTROSPECTION_GIRDIR=${placeholder "out"}/share/gir-1.0"
|
|
|
|
|
"INTROSPECTION_TYPELIBDIR=${placeholder "out"}/lib/girepository-1.0"
|
|
|
|
|
];
|
2012-08-21 13:34:59 +01:00
|
|
|
|
|
2019-04-26 20:42:52 +01:00
|
|
|
|
installFlags = [
|
|
|
|
|
"datadir=${placeholder "out"}/share"
|
|
|
|
|
"sysconfdir=${placeholder "out"}/etc"
|
|
|
|
|
];
|
2018-07-06 21:41:41 +01:00
|
|
|
|
|
2018-06-16 03:57:44 +01:00
|
|
|
|
inherit doCheck;
|
2019-10-05 12:10:11 +01:00
|
|
|
|
checkInputs = [ dbus ];
|
2018-07-06 21:41:41 +01:00
|
|
|
|
checkPhase = ''
|
2020-11-17 10:15:30 +00:00
|
|
|
|
# unfortunately this test needs python-dbusmock, but python-dbusmock needs polkit,
|
|
|
|
|
# leading to a circular dependency
|
|
|
|
|
substituteInPlace test/Makefile --replace polkitbackend ""
|
|
|
|
|
|
2018-07-06 21:41:41 +01:00
|
|
|
|
# tests need access to the system bus
|
|
|
|
|
dbus-run-session --config-file=${./system_bus.conf} -- sh -c 'DBUS_SYSTEM_BUS_ADDRESS=$DBUS_SESSION_BUS_ADDRESS make check'
|
|
|
|
|
'';
|
2009-08-16 13:03:45 +01:00
|
|
|
|
|
2010-05-15 10:54:56 +01:00
|
|
|
|
meta = with stdenv.lib; {
|
2020-04-01 02:11:51 +01:00
|
|
|
|
homepage = "http://www.freedesktop.org/wiki/Software/polkit";
|
2009-08-13 08:55:11 +01:00
|
|
|
|
description = "A toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes";
|
2018-08-17 23:12:55 +01:00
|
|
|
|
license = licenses.gpl2;
|
2018-06-16 03:57:44 +01:00
|
|
|
|
platforms = platforms.unix;
|
2019-10-29 00:40:34 +00:00
|
|
|
|
maintainers = with maintainers; [ worldofpeace ];
|
2009-08-13 08:55:11 +01:00
|
|
|
|
};
|
|
|
|
|
}
|