3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/pkgs/tools/networking/openfortivpn/default.nix
Peter Hoeg b55e4b764d openfortivpn: allow config in /etc/openfortivpn
openfortivpn would look in the nix store for config files, which
obviously doesn't work, so make it go to /etc/openfortivpn instead so
we *can* configure it system-wide.

Also add systemd units on Linux.
2020-10-05 14:48:10 +08:00

49 lines
1.2 KiB
Nix

{ stdenv, lib, fetchFromGitHub, autoreconfHook, pkgconfig
, openssl, ppp
, systemd ? null }:
let
withSystemd = stdenv.isLinux && !(systemd == null);
in
stdenv.mkDerivation rec {
pname = "openfortivpn";
version = "1.14.1";
src = fetchFromGitHub {
owner = "adrienverge";
repo = pname;
rev = "v${version}";
sha256 = "1r9lp19fmqx9dw33j5967ydijbnacmr80mqnhbbxyqiw4k5c10ds";
};
# we cannot write the config file to /etc and as we don't need the file, so drop it
postPatch = ''
substituteInPlace Makefile.am \
--replace '$(DESTDIR)$(confdir)' /tmp
'';
nativeBuildInputs = [ autoreconfHook pkgconfig ];
buildInputs = [
openssl ppp
]
++ lib.optional withSystemd systemd;
configureFlags = [
"--sysconfdir=/etc"
"--with-pppd=${ppp}/bin/pppd"
]
++ lib.optional withSystemd "--with-systemdsystemunitdir=${placeholder "out"}/lib/systemd/system";
enableParallelBuilding = true;
meta = with stdenv.lib; {
description = "Client for PPP+SSL VPN tunnel services";
homepage = "https://github.com/adrienverge/openfortivpn";
license = licenses.gpl3;
maintainers = with maintainers; [ madjar ];
platforms = with platforms; linux ++ darwin;
};
}