depot/third_party/nixpkgs/pkgs/tools/security/sudo-rs/default.nix
Default email 5e7c2d6cef Project import generated by Copybara.
GitOrigin-RevId: f99e5f03cc0aa231ab5950a15ed02afec45ed51a
2023-10-09 21:29:22 +02:00

80 lines
2.2 KiB
Nix

{ lib
, bash
, fetchFromGitHub
, installShellFiles
, nix-update-script
, nixosTests
, pam
, pandoc
, rustPlatform
}:
rustPlatform.buildRustPackage rec {
pname = "sudo-rs";
version = "0.2.1";
src = fetchFromGitHub {
owner = "memorysafety";
repo = "sudo-rs";
rev = "v${version}";
hash = "sha256-EQEdNDUXEMMiFZKuu9LR9ywjvKWyM5bWcRHHUB9+gp4=";
};
cargoHash = "sha256-Zs9/A7u4yMLKY4cAUCnsqRHgkxI8R3w1JwkAd2lw0eo=";
nativeBuildInputs = [ installShellFiles pandoc ];
buildInputs = [ pam ];
# Don't attempt to generate the docs in a (pan)Docker container
postPatch = ''
substituteInPlace util/generate-docs.sh \
--replace "/usr/bin/env bash" ${lib.getExe bash} \
--replace util/pandoc.sh pandoc
'';
postInstall = ''
./util/generate-docs.sh
installManPage target/docs/man/*
'';
checkFlags = map (t: "--skip=${t}") [
# Those tests make path assumptions
"common::command::test::test_build_command_and_args"
"common::context::tests::test_build_context"
"common::resolve::test::canonicalization"
"common::resolve::tests::test_resolve_path"
"system::tests::kill_test"
# Assumes $SHELL is an actual shell
"su::context::tests::su_to_root"
# Attempts to access /etc files from the build sandbox
"system::audit::test::secure_open_is_predictable"
# Assume there is a `daemon` user and group
"system::interface::test::test_unix_group"
"system::interface::test::test_unix_user"
"system::tests::test_get_user_and_group_by_id"
# This expects some PATH_TZINFO environment var
"env::environment::tests::test_tzinfo"
# Unsure why those are failing
"env::tests::test_environment_variable_filtering"
"su::context::tests::invalid_shell"
];
passthru = {
updateScript = nix-update-script { };
tests = nixosTests.sudo-rs;
};
meta = with lib; {
description = "A memory safe implementation of sudo and su.";
homepage = "https://github.com/memorysafety/sudo-rs";
changelog = "${meta.homepage}/blob/v${version}/CHANGELOG.md";
license = with licenses; [ asl20 mit ];
maintainers = with maintainers; [ nicoo ];
platforms = platforms.linux;
};
}