depot/third_party/nixpkgs/pkgs/tools/admin/docker-credential-helpers/default.nix
Default email e7ec2969af Project import generated by Copybara.
GitOrigin-RevId: 9b19f5e77dd906cb52dade0b7bd280339d2a1f3d
2024-01-13 09:15:51 +01:00

53 lines
1.5 KiB
Nix

{ lib, stdenv, buildGoModule, fetchFromGitHub, pkg-config, libsecret, testers, docker-credential-helpers }:
buildGoModule rec {
pname = "docker-credential-helpers";
version = "0.8.1";
src = fetchFromGitHub {
owner = "docker";
repo = pname;
rev = "v${version}";
sha256 = "sha256-Q1SdDfTT0W+eG/F5HX+pk4B06IG5ZoeZxe36l71gMc8=";
};
vendorHash = null;
nativeBuildInputs = lib.optionals stdenv.isLinux [ pkg-config ];
buildInputs = lib.optionals stdenv.isLinux [ libsecret ];
ldflags = [
"-s"
"-w"
"-X github.com/docker/docker-credential-helpers/credentials.Version=${version}"
];
buildPhase =
let
cmds = if stdenv.isDarwin then [ "osxkeychain" "pass" ] else [ "secretservice" "pass" ];
in
''
for cmd in ${builtins.toString cmds}; do
go build -ldflags "${builtins.toString ldflags}" -trimpath -o bin/docker-credential-$cmd ./$cmd/cmd
done
'';
installPhase = ''
install -Dm755 -t $out/bin bin/docker-credential-*
'';
passthru.tests.version = testers.testVersion {
package = docker-credential-helpers;
command = "docker-credential-pass version";
};
meta = with lib; {
description = "Suite of programs to use native stores to keep Docker credentials safe";
homepage = "https://github.com/docker/docker-credential-helpers";
license = licenses.mit;
maintainers = with maintainers; [ marsam ];
} // lib.optionalAttrs stdenv.isDarwin {
mainProgram = "docker-credential-osxkeychain";
};
}