3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/pkgs/os-specific/linux/wireguard/default.nix

74 lines
1.8 KiB
Nix
Raw Normal View History

2017-12-29 21:34:54 +00:00
{ stdenv, fetchurl, libmnl, kernel ? null }:
2016-07-11 17:05:23 +01:00
# module requires Linux >= 3.10 https://www.wireguard.io/install/#kernel-requirements
assert kernel != null -> stdenv.lib.versionAtLeast kernel.version "3.10";
let
2016-12-14 21:09:35 +00:00
name = "wireguard-${version}";
version = "0.0.20180218";
2016-07-11 17:05:23 +01:00
src = fetchurl {
2016-12-14 21:09:35 +00:00
url = "https://git.zx2c4.com/WireGuard/snapshot/WireGuard-${version}.tar.xz";
sha256 = "4ac4c4e4ad4dc2cf9dcb831b0cf347567ccea675ca524528cf5a4d9dccb2fe52";
2016-07-11 17:05:23 +01:00
};
meta = with stdenv.lib; {
homepage = https://www.wireguard.com/;
downloadPage = https://git.zx2c4.com/WireGuard/refs/;
description = "A prerelease of an experimental VPN tunnel which is not to be depended upon for security";
maintainers = with maintainers; [ ericsagnes mic92 zx2c4 ];
license = licenses.gpl2;
platforms = platforms.linux;
2016-07-11 17:05:23 +01:00
};
module = stdenv.mkDerivation {
inherit src meta name;
preConfigure = ''
cd src
sed -i '/depmod/,+1d' Makefile
'';
2016-07-21 01:01:20 +01:00
hardeningDisable = [ "pic" ];
KERNELDIR = "${kernel.dev}/lib/modules/${kernel.modDirVersion}/build";
INSTALL_MOD_PATH = "\${out}";
NIX_CFLAGS = ["-Wno-error=cpp"];
2017-12-29 21:34:54 +00:00
nativeBuildInputs = kernel.moduleBuildDependencies;
buildPhase = "make module";
};
tools = stdenv.mkDerivation {
inherit src meta name;
preConfigure = "cd src";
buildInputs = [ libmnl ];
enableParallelBuilding = true;
makeFlags = [
"WITH_BASHCOMPLETION=yes"
"WITH_WGQUICK=yes"
"WITH_SYSTEMDUNITS=yes"
"DESTDIR=$(out)"
"PREFIX=/"
"-C" "tools"
];
buildPhase = "make tools";
postInstall = ''
substituteInPlace $out/lib/systemd/system/wg-quick@.service \
--replace /usr/bin $out/bin
'';
};
in if kernel == null
then tools
else module