nixpkgs/pkgs/development/libraries/gpgme/default.nix

88 lines
3.3 KiB
Nix
Raw Normal View History

{ stdenv, fetchurl, fetchpatch
, autoreconfHook, libgpgerror, gnupg, pkgconfig, glib, pth, libassuan
, file, which, ncurses
2018-09-09 00:04:55 +01:00
, texinfo
2019-03-20 20:36:30 +00:00
, buildPackages
, qtbase ? null
, pythonSupport ? false, swig2 ? null, python ? null
}:
2017-05-09 16:31:12 +01:00
let
inherit (stdenv) lib;
inherit (stdenv.hostPlatform) system;
in
stdenv.mkDerivation rec {
pname = "gpgme";
2020-11-16 18:32:00 +00:00
version = "1.15.0";
2014-09-21 18:27:41 +01:00
src = fetchurl {
url = "mirror://gnupg/gpgme/${pname}-${version}.tar.bz2";
2020-11-16 18:32:00 +00:00
sha256 = "0nqfipv5s4npfidsm1rs3kpq0r0av9bfqfd5r035jibx5k0jniqb";
};
2014-09-21 18:27:41 +01:00
2020-04-02 05:35:36 +01:00
patches = [
2020-07-19 10:44:08 +01:00
(fetchpatch { # gpg: Send --with-keygrip when listing keys
2020-04-02 05:35:36 +01:00
name = "c4cf527ea227edb468a84bf9b8ce996807bd6992.patch";
url = "http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=patch;h=c4cf527ea227edb468a84bf9b8ce996807bd6992";
sha256 = "0y0b0lb2nq5p9kx13b59b2jaz157mvflliw1qdvg1v1hynvgb8m4";
2020-04-02 05:35:36 +01:00
})
# https://lists.gnupg.org/pipermail/gnupg-devel/2020-April/034591.html
(fetchpatch {
name = "0001-Fix-python-tests-on-non-Linux.patch";
url = "https://lists.gnupg.org/pipermail/gnupg-devel/attachments/20200415/f7be62d1/attachment.obj";
sha256 = "00d4sxq63601lzdp2ha1i8fvybh7dzih4531jh8bx07fab3sw65g";
})
# Disable python tests on Darwin as they use gpg (see configureFlags below)
] ++ lib.optional stdenv.isDarwin ./disable-python-tests.patch;
2020-04-02 05:35:36 +01:00
outputs = [ "out" "dev" "info" ];
outputBin = "dev"; # gpgme-config; not so sure about gpgme-tool
2017-05-09 16:31:12 +01:00
propagatedBuildInputs =
[ libgpgerror glib libassuan pth ]
++ lib.optional (qtbase != null) qtbase;
nativeBuildInputs = [ pkgconfig gnupg texinfo autoreconfHook ]
++ lib.optionals pythonSupport [ python swig2 which ncurses ];
2019-03-20 20:36:30 +00:00
depsBuildBuild = [ buildPackages.stdenv.cc ];
configureFlags = [
"--enable-fixed-path=${gnupg}/bin"
"--with-libgpg-error-prefix=${libgpgerror.dev}"
2019-03-20 20:36:30 +00:00
"--with-libassuan-prefix=${libassuan.dev}"
2019-06-07 21:03:51 +01:00
] ++ lib.optional pythonSupport "--enable-languages=python"
# Tests will try to communicate with gpg-agent instance via a UNIX socket
# which has a path length limit. Nix on darwin is using a build directory
# that already has quite a long path and the resulting socket path doesn't
# fit in the limit. https://github.com/NixOS/nix/pull/1085
++ lib.optionals stdenv.isDarwin [ "--disable-gpg-test" ];
2014-09-21 18:27:41 +01:00
2019-10-30 00:40:49 +00:00
NIX_CFLAGS_COMPILE = toString (
# qgpgme uses Q_ASSERT which retains build inputs at runtime unless
# debugging is disabled
lib.optional (qtbase != null) "-DQT_NO_DEBUG"
# https://www.gnupg.org/documentation/manuals/gpgme/Largefile-Support-_0028LFS_0029.html
2019-10-30 00:40:49 +00:00
++ lib.optional (system == "i686-linux") "-D_FILE_OFFSET_BITS=64");
2016-10-10 19:37:05 +01:00
checkInputs = [ which ];
2018-10-13 03:45:02 +01:00
doCheck = true;
2015-10-11 20:49:49 +01:00
meta = with stdenv.lib; {
homepage = "https://gnupg.org/software/gpgme/index.html";
2020-07-19 10:44:08 +01:00
changelog = "https://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=blob;f=NEWS;hb=refs/tags/gpgme-${version}";
2014-09-21 18:27:41 +01:00
description = "Library for making GnuPG easier to use";
longDescription = ''
GnuPG Made Easy (GPGME) is a library designed to make access to GnuPG
easier for applications. It provides a High-Level Crypto API for
encryption, decryption, signing, signature verification and key
management.
'';
license = with licenses; [ lgpl21Plus gpl3Plus ];
2015-10-11 20:49:49 +01:00
platforms = platforms.unix;
maintainers = with maintainers; [ primeos ];
2014-09-21 18:27:41 +01:00
};
}