nixpkgs/pkgs/tools/security/tpm2-tools/default.nix

43 lines
1.2 KiB
Nix
Raw Normal View History

{ stdenv, fetchurl, lib
2021-01-17 03:51:22 +00:00
, pandoc, pkg-config, makeWrapper, curl, openssl, tpm2-tss
2019-10-27 10:30:06 +00:00
, abrmdSupport ? true, tpm2-abrmd ? null }:
2019-02-14 05:12:32 +00:00
stdenv.mkDerivation rec {
pname = "tpm2-tools";
2020-06-09 04:39:04 +01:00
version = "4.1.3";
2019-02-14 05:12:32 +00:00
src = fetchurl {
url = "https://github.com/tpm2-software/${pname}/releases/download/${version}/${pname}-${version}.tar.gz";
2020-06-09 04:39:04 +01:00
sha256 = "0117r0zzdnblkibv81y71v3limixsw5m7g9xwf7lcx8fc8836pdv";
2019-02-14 05:12:32 +00:00
};
2021-01-17 03:51:22 +00:00
nativeBuildInputs = [ pandoc pkg-config makeWrapper ];
2019-02-14 05:12:32 +00:00
buildInputs = [
curl openssl tpm2-tss
];
2019-10-27 10:30:06 +00:00
preFixup = let
ldLibraryPath = lib.makeLibraryPath ([
tpm2-tss
] ++ (lib.optional abrmdSupport tpm2-abrmd));
in ''
for bin in $out/bin/*; do
wrapProgram $bin \
--suffix LD_LIBRARY_PATH : "${ldLibraryPath}"
done
'';
# Unit tests disabled, as they rely on a dbus session
#configureFlags = [ "--enable-unit" ];
doCheck = false;
2019-02-14 05:12:32 +00:00
meta = with lib; {
description = "Command line tools that provide access to a TPM 2.0 compatible device";
homepage = "https://github.com/tpm2-software/tpm2-tools";
2019-02-14 05:12:32 +00:00
license = licenses.bsd3;
platforms = platforms.linux;
maintainers = with maintainers; [ delroth ];
};
}