mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-21 13:10:33 +00:00
dc4833f773
cherry-pick ^/nixpkgs/branches/glib-2.30@31425 svn path=/nixpkgs/branches/glib-2.30-take2/; revision=32941
65 lines
1.8 KiB
Nix
65 lines
1.8 KiB
Nix
{ stdenv, fetchurl, pkgconfig, glib, expat, pam, intltool, gettext
|
||
, gobjectIntrospection }:
|
||
|
||
let
|
||
|
||
system = "/var/run/current-system/sw";
|
||
|
||
foolVars = {
|
||
LOCALSTATE = "/var";
|
||
SYSCONF = "/etc";
|
||
LIB = "${system}/lib";
|
||
DATA = "${system}/share";
|
||
};
|
||
|
||
in
|
||
|
||
stdenv.mkDerivation rec {
|
||
name = "polkit-0.104";
|
||
|
||
src = fetchurl {
|
||
url = "http://hal.freedesktop.org/releases/${name}.tar.gz";
|
||
sha256 = "1yf7307svs8qk76qdlgww1bhgdcia5cm92n16xz7njhy73c162kb";
|
||
};
|
||
|
||
buildInputs =
|
||
[ pkgconfig glib expat pam intltool gobjectIntrospection ];
|
||
|
||
configureFlags = "--libexecdir=$(out)/libexec/polkit-1";
|
||
|
||
# Ugly hack to overwrite hardcoded directories
|
||
# TODO: investigate a proper patch which will be accepted upstream
|
||
CFLAGS = stdenv.lib.concatStringsSep " "
|
||
( map (var: ''-DPACKAGE_${var}_DIR=\""${builtins.getAttr var foolVars}"\"'')
|
||
(builtins.attrNames foolVars) );
|
||
|
||
preBuild =
|
||
''
|
||
# ‘libpolkit-agent-1.so’ should call the setuid wrapper on
|
||
# NixOS. Hard-coding the path is kinda ugly. Maybe we can just
|
||
# call through $PATH, but that might have security implications.
|
||
substituteInPlace src/polkitagent/polkitagentsession.c \
|
||
--replace PACKAGE_LIBEXEC_DIR '"/var/setuid-wrappers"'
|
||
'';
|
||
|
||
makeFlags =
|
||
''
|
||
INTROSPECTION_GIRDIR=$(out)/share/gir-1.0
|
||
INTROSPECTION_TYPELIBDIR=$(out)lib/girepository-1.0
|
||
'';
|
||
|
||
postInstall =
|
||
''
|
||
# Allow some files with paranoid permissions to be stripped in
|
||
# the fixup phase.
|
||
chmod a+rX -R $out
|
||
'';
|
||
|
||
meta = with stdenv.lib; {
|
||
homepage = http://www.freedesktop.org/wiki/Software/PolicyKit;
|
||
description = "A toolkit for defining and handling the policy that allows unprivileged processes to speak to privileged processes";
|
||
platforms = platforms.linux;
|
||
maintainers = [ maintainers.urkud ];
|
||
};
|
||
}
|