f34ce41345
GitOrigin-RevId: b73c2221a46c13557b1b3be9c2070cc42cf01eb3
156 lines
4 KiB
Nix
156 lines
4 KiB
Nix
{
|
|
lib,
|
|
stdenv,
|
|
pname,
|
|
version,
|
|
src,
|
|
meta,
|
|
makeShellWrapper,
|
|
wrapGAppsHook3,
|
|
alsa-lib,
|
|
at-spi2-atk,
|
|
at-spi2-core,
|
|
atk,
|
|
cairo,
|
|
cups,
|
|
dbus,
|
|
expat,
|
|
gdk-pixbuf,
|
|
glib,
|
|
gtk3,
|
|
libX11,
|
|
libXcomposite,
|
|
libXdamage,
|
|
libXext,
|
|
libXfixes,
|
|
libXrandr,
|
|
libdrm,
|
|
libxcb,
|
|
libxkbcommon,
|
|
libxshmfence,
|
|
libGL,
|
|
libappindicator-gtk3,
|
|
mesa,
|
|
nspr,
|
|
nss,
|
|
pango,
|
|
systemd,
|
|
udev,
|
|
xdg-utils,
|
|
|
|
# The 1Password polkit file requires a list of users for whom polkit
|
|
# integrations should be enabled. This should be a list of strings that
|
|
# correspond to usernames.
|
|
polkitPolicyOwners ? [ ],
|
|
}:
|
|
let
|
|
# Convert the polkitPolicyOwners variable to a polkit-compatible string for the polkit file.
|
|
policyOwners = lib.concatStringsSep " " (map (user: "unix-user:${user}") polkitPolicyOwners);
|
|
|
|
in
|
|
stdenv.mkDerivation {
|
|
inherit
|
|
pname
|
|
version
|
|
src
|
|
meta
|
|
;
|
|
|
|
nativeBuildInputs = [
|
|
makeShellWrapper
|
|
wrapGAppsHook3
|
|
];
|
|
buildInputs = [ glib ];
|
|
|
|
dontConfigure = true;
|
|
dontBuild = true;
|
|
dontPatchELF = true;
|
|
dontWrapGApps = true;
|
|
|
|
installPhase =
|
|
let
|
|
rpath =
|
|
lib.makeLibraryPath [
|
|
alsa-lib
|
|
at-spi2-atk
|
|
at-spi2-core
|
|
atk
|
|
cairo
|
|
cups
|
|
dbus
|
|
expat
|
|
gdk-pixbuf
|
|
glib
|
|
gtk3
|
|
libX11
|
|
libXcomposite
|
|
libXdamage
|
|
libXext
|
|
libXfixes
|
|
libXrandr
|
|
libdrm
|
|
libxcb
|
|
libxkbcommon
|
|
libxshmfence
|
|
libGL
|
|
libappindicator-gtk3
|
|
mesa
|
|
nspr
|
|
nss
|
|
pango
|
|
systemd
|
|
]
|
|
+ ":${stdenv.cc.cc.lib}/lib64";
|
|
in
|
|
''
|
|
runHook preInstall
|
|
|
|
mkdir -p $out/bin $out/share/1password
|
|
cp -a * $out/share/1password
|
|
|
|
# Desktop file
|
|
install -Dt $out/share/applications resources/${pname}.desktop
|
|
substituteInPlace $out/share/applications/${pname}.desktop \
|
|
--replace 'Exec=/opt/1Password/${pname}' 'Exec=${pname}'
|
|
|
|
''
|
|
+ (lib.optionalString (polkitPolicyOwners != [ ]) ''
|
|
# Polkit file
|
|
mkdir -p $out/share/polkit-1/actions
|
|
substitute com.1password.1Password.policy.tpl $out/share/polkit-1/actions/com.1password.1Password.policy --replace "\''${POLICY_OWNERS}" "${policyOwners}"
|
|
'')
|
|
+ ''
|
|
|
|
# Icons
|
|
cp -a resources/icons $out/share
|
|
|
|
interp="$(cat $NIX_CC/nix-support/dynamic-linker)"
|
|
patchelf --set-interpreter $interp $out/share/1password/{1password,1Password-BrowserSupport,1Password-LastPass-Exporter,op-ssh-sign}
|
|
patchelf --set-rpath ${rpath}:$out/share/1password $out/share/1password/{1password,1Password-BrowserSupport,1Password-LastPass-Exporter,op-ssh-sign}
|
|
for file in $(find $out -type f -name \*.so\* ); do
|
|
patchelf --set-rpath ${rpath}:$out/share/1password $file
|
|
done
|
|
|
|
ln -s $out/share/1password/op-ssh-sign $out/bin/op-ssh-sign
|
|
|
|
runHook postInstall
|
|
'';
|
|
|
|
preFixup = ''
|
|
# makeWrapper defaults to makeBinaryWrapper due to wrapGAppsHook
|
|
# but we need a shell wrapper specifically for `NIXOS_OZONE_WL`.
|
|
# Electron is trying to open udev via dlopen()
|
|
# and for some reason that doesn't seem to be impacted from the rpath.
|
|
# Adding udev to LD_LIBRARY_PATH fixes that.
|
|
# Make xdg-open overrideable at runtime.
|
|
makeShellWrapper $out/share/1password/1password $out/bin/1password \
|
|
"''${gappsWrapperArgs[@]}" \
|
|
--suffix PATH : ${lib.makeBinPath [ xdg-utils ]} \
|
|
--prefix LD_LIBRARY_PATH : ${lib.makeLibraryPath [ udev ]}
|
|
# Currently half broken on wayland (e.g. no copy functionality)
|
|
# See: https://github.com/NixOS/nixpkgs/pull/232718#issuecomment-1582123406
|
|
# Remove this comment when upstream fixes:
|
|
# https://1password.community/discussion/comment/624011/#Comment_624011
|
|
#--add-flags "\''${NIXOS_OZONE_WL:+\''${WAYLAND_DISPLAY:+--ozone-platform-hint=auto --enable-features=WaylandWindowDecorations}}"
|
|
'';
|
|
}
|