depot/third_party/nixpkgs/pkgs/by-name/ta/taler-challenger/package.nix

81 lines
1.7 KiB
Nix

{
lib,
stdenv,
fetchgit,
autoreconfHook,
libgcrypt,
pkg-config,
texinfo,
curl,
gnunet,
jansson,
libgnurl,
libmicrohttpd,
libsodium,
libtool,
postgresql,
taler-exchange,
taler-merchant,
runtimeShell,
}:
stdenv.mkDerivation (finalAttrs: {
pname = "taler-challenger";
version = "0.13.0";
src = fetchgit {
url = "https://git.taler.net/challenger.git";
rev = "v${finalAttrs.version}";
hash = "sha256-OlUgE40Qo7on9VaMGKJ/MRWActDBqPe7Ja95dv1OFhA=";
};
# https://git.taler.net/challenger.git/tree/bootstrap
preAutoreconf = ''
# Generate Makefile.am in contrib/
pushd contrib
rm -f Makefile.am
find wallet-core/challenger/ -type f -printf ' %p \\\n' | sort > Makefile.am.ext
# Remove extra '\' at the end of the file
truncate -s -2 Makefile.am.ext
cat Makefile.am.in Makefile.am.ext >> Makefile.am
# Prevent accidental editing of the generated Makefile.am
chmod -w Makefile.am
popd
'';
strictDeps = true;
nativeBuildInputs = [
autoreconfHook
libgcrypt
pkg-config
texinfo
];
buildInputs = [
curl
gnunet
jansson
libgcrypt
libgnurl
libmicrohttpd
libsodium
libtool
postgresql
taler-exchange
taler-merchant
];
preFixup = ''
substituteInPlace $out/bin/challenger-{dbconfig,send-post.sh} \
--replace-fail "/bin/bash" "${runtimeShell}"
'';
meta = {
description = "OAuth 2.0-based authentication service that validates user can receive messages at a certain address";
homepage = "https://git.taler.net/challenger.git";
license = lib.licenses.agpl3Plus;
maintainers = with lib.maintainers; [ wegank ];
platforms = lib.platforms.linux;
};
})