diff options
Diffstat (limited to 'pkgs/os-specific/linux/pam_u2f/default.nix')
-rw-r--r-- | pkgs/os-specific/linux/pam_u2f/default.nix | 23 |
1 files changed, 14 insertions, 9 deletions
diff --git a/pkgs/os-specific/linux/pam_u2f/default.nix b/pkgs/os-specific/linux/pam_u2f/default.nix index 30acb86d860..30a55f2b9c0 100644 --- a/pkgs/os-specific/linux/pam_u2f/default.nix +++ b/pkgs/os-specific/linux/pam_u2f/default.nix @@ -1,25 +1,30 @@ -{ stdenv, fetchurl, pkgconfig, libu2f-host, libu2f-server, pam }: +{ lib, stdenv, fetchurl, pkg-config, libfido2, pam, openssl }: stdenv.mkDerivation rec { pname = "pam_u2f"; - version = "1.0.8"; + version = "1.1.1"; src = fetchurl { url = "https://developers.yubico.com/pam-u2f/Releases/${pname}-${version}.tar.gz"; - sha256 = "16awjzx348imjz141fzzldy00qpdmw2g37rnq430w5mnzak078jj"; + sha256 = "12p3pkrp32vzpg7707cgx8zgvgj8iqwhy39sm761k7plqi027mmp"; }; - nativeBuildInputs = [ pkgconfig ]; - buildInputs = [ libu2f-host libu2f-server pam ]; - - # Fix the broken include in 1.0.1 - CFLAGS = "-I${libu2f-host}/include/u2f-host"; + nativeBuildInputs = [ pkg-config ]; + buildInputs = [ libfido2 pam openssl ]; preConfigure = '' configureFlagsArray+=("--with-pam-dir=$out/lib/security") ''; - meta = with stdenv.lib; { + # a no-op makefile to prevent building the fuzz targets + postConfigure = '' + cat > fuzz/Makefile <<EOF + all: + install: + EOF + ''; + + meta = with lib; { homepage = "https://developers.yubico.com/pam-u2f/"; description = "A PAM module for allowing authentication with a U2F device"; license = licenses.bsd2; |