nixpkgs/pkgs/os-specific/linux/cryptsetup/default.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

89 lines
3 KiB
Nix
Raw Normal View History

2022-08-14 09:40:43 +00:00
{ lib, stdenv, fetchurl, lvm2, json_c, asciidoctor
2022-09-23 14:08:35 +00:00
, openssl, libuuid, pkg-config, popt, nixosTests
, libargon2, withInternalArgon2 ? false
# Programs enabled by default upstream are implicitly enabled unless
# manually set to false.
, programs ? {}
# The release tarballs contain precomputed manpage files, so we don't need
# to run asciidoctor on the man sources. By avoiding asciidoctor, we make
# the bare NixOS build hash independent of changes to the ruby ecosystem,
# saving mass-rebuilds.
, rebuildMan ? false
}:
stdenv.mkDerivation rec {
pname = "cryptsetup";
2023-02-01 14:19:04 +00:00
version = "2.6.1";
2012-08-10 20:42:29 +00:00
outputs = [ "bin" "out" "dev" "man" ];
2022-01-24 12:57:15 +00:00
separateDebugInfo = true;
2018-08-20 14:43:48 +00:00
src = fetchurl {
2023-02-01 14:19:04 +00:00
url = "mirror://kernel/linux/utils/cryptsetup/v${lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
hash = "sha256-QQ3tZaEHKrnI5Brd7Te5cpwIf+9NLbArtO9SmtbaRpM=";
};
patches = [
# Allow reading tokens from a relative path, see #167994
./relative-token-path.patch
];
2018-08-08 21:18:19 +00:00
postPatch = ''
patchShebangs tests
# O_DIRECT is filesystem dependent and fails in a sandbox (on tmpfs)
# and on several filesystem types (btrfs, zfs) without sandboxing.
# Remove it, see discussion in #46151
substituteInPlace tests/unit-utils-io.c --replace "| O_DIRECT" ""
2018-08-08 21:18:19 +00:00
'';
NIX_LDFLAGS = lib.optionalString (stdenv.cc.isGNU && !stdenv.hostPlatform.isStatic) "-lgcc_s";
2018-06-15 23:20:53 +00:00
configureFlags = [
"--with-crypto_backend=openssl"
"--disable-ssh-token"
] ++ lib.optionals (!rebuildMan) [
"--disable-asciidoc"
] ++ lib.optionals (!withInternalArgon2) [
"--enable-libargon2"
] ++ lib.optionals stdenv.hostPlatform.isStatic [
"--disable-external-tokens"
# We have to override this even though we're removing token
# support, because the path still gets included in the binary even
# though it isn't used.
"--with-luks2-external-tokens-path=/"
] ++ (with lib; mapAttrsToList (flip enableFeature)) programs;
2012-08-10 20:42:29 +00:00
nativeBuildInputs = [ pkg-config ] ++ lib.optionals rebuildMan [ asciidoctor ];
buildInputs = [ lvm2 json_c openssl libuuid popt ] ++ lib.optional (!withInternalArgon2) libargon2;
# The test [7] header backup in compat-test fails with a mysterious
# "out of memory" error, even though tons of memory is available.
# Issue filed upstream: https://gitlab.com/cryptsetup/cryptsetup/-/issues/763
doCheck = !stdenv.hostPlatform.isMusl;
2022-09-23 14:08:35 +00:00
passthru = {
tests = {
nixos =
lib.optionalAttrs stdenv.hostPlatform.isLinux (
lib.recurseIntoAttrs (
lib.filterAttrs
(name: _value: lib.hasPrefix "luks" name)
nixosTests.installer
)
);
};
};
meta = {
homepage = "https://gitlab.com/cryptsetup/cryptsetup/";
description = "LUKS for dm-crypt";
2023-02-01 14:19:04 +00:00
changelog = "https://gitlab.com/cryptsetup/cryptsetup/-/raw/v${version}/docs/v${version}-ReleaseNotes";
2021-01-15 14:45:37 +00:00
license = lib.licenses.gpl2;
2023-08-16 15:10:09 +00:00
mainProgram = "cryptsetup";
maintainers = with lib.maintainers; [ raitobezarius ];
2021-01-15 14:45:37 +00:00
platforms = with lib.platforms; linux;
};
}