3
0
Fork 0
forked from mirrors/nixpkgs
nixpkgs/pkgs/servers/monitoring/nagios/plugins/check_ssl_cert.nix
volth 46420bbaa3 treewide: name -> pname (easy cases) (#66585)
treewide replacement of

stdenv.mkDerivation rec {
  name = "*-${version}";
  version = "*";

to pname
2019-08-15 13:41:18 +01:00

37 lines
1 KiB
Nix

{ stdenv, fetchFromGitHub, file, openssl, makeWrapper, which, curl, fetchpatch }:
stdenv.mkDerivation rec {
pname = "check_ssl_cert";
version = "1.80.0";
src = fetchFromGitHub {
owner = "matteocorti";
repo = "check_ssl_cert";
rev = "v${version}";
sha256 = "1jkwii45hynil1jail9gmz4bak066rdi8zfcczicjsa6npbz50w4";
};
patches = [
# https://github.com/matteocorti/check_ssl_cert/pull/114
(fetchpatch {
url = "https://github.com/matteocorti/check_ssl_cert/commit/2b7aad583d507a70605dd44d918739a65b267bfd.patch";
sha256 = "1jk872jgm6k3qc1ks1h3v6p804spjlnxcj2wc8v0hkmwfwiwd2k4";
})
];
nativeBuildInputs = [ makeWrapper ];
makeFlags = [ "DESTDIR=$(out)/bin" "MANDIR=$(out)/share/man" ];
postInstall = ''
wrapProgram $out/bin/check_ssl_cert \
--prefix PATH : "${stdenv.lib.makeBinPath [ openssl file which curl ]}"
'';
meta = with stdenv.lib; {
description = "A Nagios plugin to check the CA and validity of an X.509 certificate";
license = licenses.gpl3;
platforms = platforms.all;
};
}