Loading pkgs/by-name/tz/tzpfms/package.nix 0 → 100644 +86 −0 Original line number Diff line number Diff line { lib, fetchFromSourcehut, libtirpc, libuuid, mandoc, nix-update-script, openssl, pkgconf, shellcheck, stdenv, tpm2-tss, trousers, zfs, zlib, }: stdenv.mkDerivation (finalPackage: { pname = "tzpfms"; version = "0.4.1"; src = fetchFromSourcehut { owner = "~nabijaczleweli"; repo = "tzpfms"; rev = "v${finalPackage.version}"; hash = "sha256-DHmJpfURyFPeOWxIkfwn4f0n2WeDYErevC1gY2oM3Vg="; }; env = { TZPFMS_VERSION = ''"${finalPackage.version}"''; TZPFMS_DATE = "January 1, 1980"; }; nativeBuildInputs = [ mandoc pkgconf shellcheck ]; buildInputs = [ libtirpc libuuid openssl tpm2-tss trousers zfs zlib ]; postPatch = '' substituteInPlace Makefile \ --replace-fail "-flto=full" "" \ --replace-fail "-flto" "" \ --replace-fail "out/" "$out/" \ --replace-fail "ln -f" "ln -sf" substituteInPlace src/bin/zfs-tpm-list.cpp \ --replace-fail "none = -1," "none = (char)-1," ''; dontInstall = true; preFixup = '' rm -rf $out/{build,systemd,initramfs-tools,dracut} mkdir -p $out/bin mv -v $out/zfs-* $out/bin ''; passthru.updateScript = nix-update-script { }; meta = { homepage = "https://git.sr.ht/~nabijaczleweli/tzpfms"; description = "TPM-based encryption keys for ZFS datasets."; longDescription = '' Essentially BitLocker, but for ZFS – a random raw key is generated and sealed to the TPM (both 2 and 1.x supported) with an additional optional password in front of it, tying the dataset to the platform and an additional optional secret (or to the possession of the back-up). ''; maintainers = with lib.maintainers; [ numinit ]; license = with lib.licenses; [ mit bsd0 ]; platforms = lib.platforms.linux; }; }) Loading
pkgs/by-name/tz/tzpfms/package.nix 0 → 100644 +86 −0 Original line number Diff line number Diff line { lib, fetchFromSourcehut, libtirpc, libuuid, mandoc, nix-update-script, openssl, pkgconf, shellcheck, stdenv, tpm2-tss, trousers, zfs, zlib, }: stdenv.mkDerivation (finalPackage: { pname = "tzpfms"; version = "0.4.1"; src = fetchFromSourcehut { owner = "~nabijaczleweli"; repo = "tzpfms"; rev = "v${finalPackage.version}"; hash = "sha256-DHmJpfURyFPeOWxIkfwn4f0n2WeDYErevC1gY2oM3Vg="; }; env = { TZPFMS_VERSION = ''"${finalPackage.version}"''; TZPFMS_DATE = "January 1, 1980"; }; nativeBuildInputs = [ mandoc pkgconf shellcheck ]; buildInputs = [ libtirpc libuuid openssl tpm2-tss trousers zfs zlib ]; postPatch = '' substituteInPlace Makefile \ --replace-fail "-flto=full" "" \ --replace-fail "-flto" "" \ --replace-fail "out/" "$out/" \ --replace-fail "ln -f" "ln -sf" substituteInPlace src/bin/zfs-tpm-list.cpp \ --replace-fail "none = -1," "none = (char)-1," ''; dontInstall = true; preFixup = '' rm -rf $out/{build,systemd,initramfs-tools,dracut} mkdir -p $out/bin mv -v $out/zfs-* $out/bin ''; passthru.updateScript = nix-update-script { }; meta = { homepage = "https://git.sr.ht/~nabijaczleweli/tzpfms"; description = "TPM-based encryption keys for ZFS datasets."; longDescription = '' Essentially BitLocker, but for ZFS – a random raw key is generated and sealed to the TPM (both 2 and 1.x supported) with an additional optional password in front of it, tying the dataset to the platform and an additional optional secret (or to the possession of the back-up). ''; maintainers = with lib.maintainers; [ numinit ]; license = with lib.licenses; [ mit bsd0 ]; platforms = lib.platforms.linux; }; })