3d832dee59
This solves the dependency cycle in gcr alternatively so there won't be two gnupg store paths in a standard NixOS system which has udisks2 enabled by default. NixOS users are expected to use the gpg-agent user service to pull in the appropriate pinentry flavour or install it on their systemPackages and set it in their local gnupg agent config instead. Co-authored-by: Florian Klink <flokli@flokli.de>
83 lines
3.0 KiB
Nix
83 lines
3.0 KiB
Nix
{ fetchurl, fetchpatch, stdenv, pkgconfig, libgcrypt, libassuan, libksba
|
|
, libgpgerror, libiconv, npth, gettext, texinfo, pcsclite, sqlite
|
|
, buildPackages
|
|
|
|
# Each of the dependencies below are optional.
|
|
# Gnupg can be built without them at the cost of reduced functionality.
|
|
, pinentry ? null, guiSupport ? false
|
|
, adns ? null, gnutls ? null, libusb ? null, openldap ? null
|
|
, readline ? null, zlib ? null, bzip2 ? null
|
|
}:
|
|
|
|
with stdenv.lib;
|
|
|
|
assert guiSupport -> pinentry != null;
|
|
|
|
stdenv.mkDerivation rec {
|
|
pname = "gnupg";
|
|
|
|
version = "2.2.17";
|
|
|
|
src = fetchurl {
|
|
url = "mirror://gnupg/gnupg/${pname}-${version}.tar.bz2";
|
|
sha256 = "056mgy09lvsi03531a437qj58la1j2x1y1scvfi53diris3658mg";
|
|
};
|
|
|
|
depsBuildBuild = [ buildPackages.stdenv.cc ];
|
|
nativeBuildInputs = [ pkgconfig texinfo ];
|
|
buildInputs = [
|
|
libgcrypt libassuan libksba libiconv npth gettext
|
|
readline libusb gnutls adns openldap zlib bzip2 sqlite
|
|
];
|
|
|
|
patches = [
|
|
./fix-libusb-include-path.patch
|
|
./0001-dirmngr-Only-use-SKS-pool-CA-for-SKS-pool.patch
|
|
];
|
|
postPatch = ''
|
|
sed -i 's,hkps://hkps.pool.sks-keyservers.net,hkps://keys.openpgp.org,g' \
|
|
configure doc/dirmngr.texi doc/gnupg.info-1
|
|
'' + stdenv.lib.optionalString stdenv.isLinux ''
|
|
sed -i 's,"libpcsclite\.so[^"]*","${stdenv.lib.getLib pcsclite}/lib/libpcsclite.so",g' scd/scdaemon.c
|
|
''; #" fix Emacs syntax highlighting :-(
|
|
|
|
pinentryBinaryPath = pinentry.binaryPath or "bin/pinentry";
|
|
configureFlags = [
|
|
"--with-libgpg-error-prefix=${libgpgerror.dev}"
|
|
"--with-libgcrypt-prefix=${libgcrypt.dev}"
|
|
"--with-libassuan-prefix=${libassuan.dev}"
|
|
"--with-ksba-prefix=${libksba.dev}"
|
|
"--with-npth-prefix=${npth}"
|
|
] ++ optional guiSupport "--with-pinentry-pgm=${pinentry}/${pinentryBinaryPath}";
|
|
|
|
postInstall = ''
|
|
mkdir -p $out/lib/systemd/user
|
|
for f in doc/examples/systemd-user/*.{service,socket} ; do
|
|
substitute $f $out/lib/systemd/user/$(basename $f) \
|
|
--replace /usr/bin $out/bin
|
|
done
|
|
|
|
# add gpg2 symlink to make sure git does not break when signing commits
|
|
ln -s $out/bin/gpg $out/bin/gpg2
|
|
'';
|
|
|
|
meta = with stdenv.lib; {
|
|
homepage = https://gnupg.org;
|
|
description = "Modern (2.1) release of the GNU Privacy Guard, a GPL OpenPGP implementation";
|
|
license = licenses.gpl3Plus;
|
|
longDescription = ''
|
|
The GNU Privacy Guard is the GNU project's complete and free
|
|
implementation of the OpenPGP standard as defined by RFC4880. GnuPG
|
|
"modern" (2.1) is the latest development with a lot of new features.
|
|
GnuPG allows to encrypt and sign your data and communication, features a
|
|
versatile key management system as well as access modules for all kind of
|
|
public key directories. GnuPG, also known as GPG, is a command line tool
|
|
with features for easy integration with other applications. A wealth of
|
|
frontend applications and libraries are available. Version 2 of GnuPG
|
|
also provides support for S/MIME.
|
|
'';
|
|
maintainers = with maintainers; [ peti fpletz vrthra ];
|
|
platforms = platforms.all;
|
|
};
|
|
}
|