nixpkgs/pkgs/tools/security/pass/default.nix

112 lines
3.4 KiB
Nix
Raw Normal View History

{ stdenv, lib, fetchurl, fetchFromGitHub
2017-02-26 18:36:04 +00:00
, coreutils, gnused, getopt, git, tree, gnupg, which, procps, qrencode
, makeWrapper
, xclip ? null, xdotool ? null, dmenu ? null
2015-08-19 19:50:58 +01:00
, x11Support ? !stdenv.isDarwin
, tombPluginSupport ? false, tomb
}:
2017-02-26 18:36:04 +00:00
with lib;
assert x11Support -> xclip != null
&& xdotool != null
&& dmenu != null;
2013-08-03 10:25:13 +01:00
let
plugins = map (p: (fetchFromGitHub {
owner = "roddhjav";
repo = "pass-${p.name}";
inherit (p) rev sha256;
}))
([
2017-09-13 09:59:49 +01:00
{ name = "import";
rev = "491935bd275f29ceac2b876b3a288011d1ce31e7";
sha256 = "02mbh05ab8h7kc30hz718d1d1vkjz43b96c7p0xnd92610d2q66q"; }
2017-09-13 09:59:49 +01:00
{ name = "update";
rev = "cf576c9036fd18efb9ed29e0e9f811207b556fde";
sha256 = "1hhbrg6a2walrvla6q4cd3pgrqbcrf9brzjkb748735shxfn52hd"; }
] ++ stdenv.lib.optional tombPluginSupport {
name = "tomb";
rev = "3368134898a42c1b758fabac625ec240e125c6be";
sha256 = "0qqmxfg4w3r088qhlkhs44036mya82vjflsjjhw2hk8y0wd2i6ds"; }
);
in stdenv.mkDerivation rec {
2017-05-05 21:08:44 +01:00
version = "1.7.1";
2013-08-03 10:25:13 +01:00
name = "password-store-${version}";
src = fetchurl {
url = "http://git.zx2c4.com/password-store/snapshot/${name}.tar.xz";
2017-05-05 21:08:44 +01:00
sha256 = "0scqkpll2q8jhzcgcsh9kqz0gwdpvynivqjmmbzax2irjfaiklpn";
2013-08-03 10:25:13 +01:00
};
2017-05-05 21:08:44 +01:00
patches = [ ./set-correct-program-name-for-sleep.patch
] ++ stdenv.lib.optional stdenv.isDarwin ./no-darwin-getopt.patch;
2015-02-15 16:14:13 +00:00
nativeBuildInputs = [ makeWrapper ];
installFlags = [ "PREFIX=$(out)" "WITH_ALLCOMP=yes" ];
2013-08-03 10:25:13 +01:00
2015-02-11 15:29:34 +00:00
postInstall = ''
# plugins
${stdenv.lib.concatStringsSep "\n" (map (plugin: ''
pushd ${plugin}
PREFIX=$out make install
popd
'') plugins)}
# Install Emacs Mode. NOTE: We can't install the necessary
# dependencies (s.el and f.el) here. The user has to do this
# himself.
mkdir -p "$out/share/emacs/site-lisp"
cp "contrib/emacs/password-store.el" "$out/share/emacs/site-lisp/"
2017-02-26 18:36:04 +00:00
'' + optionalString x11Support ''
cp "contrib/dmenu/passmenu" "$out/bin/"
2013-08-03 10:25:13 +01:00
'';
wrapperPath = with stdenv.lib; makeBinPath ([
coreutils
getopt
git
gnupg
gnused
tree
which
2017-02-26 18:36:04 +00:00
qrencode
] ++ optional tombPluginSupport tomb
++ optional stdenv.isLinux procps
++ ifEnable x11Support [ dmenu xclip xdotool ]);
postFixup = ''
# Fix program name in --help
substituteInPlace $out/bin/pass \
2017-02-26 18:36:04 +00:00
--replace 'PROGRAM="''${0##*/}"' "PROGRAM=pass"
# Ensure all dependencies are in PATH
wrapProgram $out/bin/pass \
--prefix PATH : "${wrapperPath}"
'' + stdenv.lib.optionalString x11Support ''
# We just wrap passmenu with the same PATH as pass. It doesn't
# need all the tools in there but it doesn't hurt either.
wrapProgram $out/bin/passmenu \
--prefix PATH : "$out/bin:${wrapperPath}"
'';
meta = with stdenv.lib; {
description = "Stores, retrieves, generates, and synchronizes passwords securely";
2017-08-17 22:55:43 +01:00
homepage = https://www.passwordstore.org/;
license = licenses.gpl2Plus;
maintainers = with maintainers; [ lovek323 the-kenny fpletz ];
platforms = platforms.unix;
longDescription = ''
pass is a very simple password store that keeps passwords inside gpg2
encrypted files inside a simple directory tree residing at
~/.password-store. The pass utility provides a series of commands for
manipulating the password store, allowing the user to add, remove, edit,
synchronize, generate, and manipulate passwords.
'';
};
}