nixpkgs/pkgs/tools/security/tpm2-tools/default.nix

43 lines
1.1 KiB
Nix
Raw Normal View History

{ stdenv, fetchurl, lib
2019-10-27 11:30:06 +01:00
, pandoc, pkgconfig, makeWrapper, curl, openssl, tpm2-tss
, abrmdSupport ? true, tpm2-abrmd ? null }:
2019-02-14 06:12:32 +01:00
stdenv.mkDerivation rec {
pname = "tpm2-tools";
2019-10-27 11:30:06 +01:00
version = "4.0";
2019-02-14 06:12:32 +01:00
src = fetchurl {
url = "https://github.com/tpm2-software/${pname}/releases/download/${version}/${pname}-${version}.tar.gz";
2019-10-27 11:30:06 +01:00
sha256 = "02p0wj87fnrpsijd2zaqcxqxicqs36q7vakp6y8and920x36jb0y";
2019-02-14 06:12:32 +01:00
};
2019-10-27 11:30:06 +01:00
nativeBuildInputs = [ pandoc pkgconfig makeWrapper ];
2019-02-14 06:12:32 +01:00
buildInputs = [
curl openssl tpm2-tss
];
2019-10-27 11:30:06 +01:00
preFixup = let
ldLibraryPath = lib.makeLibraryPath ([
tpm2-tss
] ++ (lib.optional abrmdSupport tpm2-abrmd));
in ''
for bin in $out/bin/*; do
wrapProgram $bin \
--suffix LD_LIBRARY_PATH : "${ldLibraryPath}"
done
'';
# Unit tests disabled, as they rely on a dbus session
#configureFlags = [ "--enable-unit" ];
doCheck = false;
2019-02-14 06:12:32 +01:00
meta = with lib; {
description = "Command line tools that provide access to a TPM 2.0 compatible device";
homepage = https://github.com/tpm2-software/tpm2-tools;
license = licenses.bsd3;
platforms = platforms.linux;
maintainers = with maintainers; [ delroth ];
};
}