-
Notifications
You must be signed in to change notification settings - Fork 1
/
flake.nix
125 lines (121 loc) · 4.06 KB
/
flake.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
{
description = "A devShell example";
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
rust-overlay.url = "github:oxalica/rust-overlay";
flake-utils.url = "github:numtide/flake-utils";
};
outputs = { self, nixpkgs, rust-overlay, flake-utils, ... }: flake-utils.lib.eachDefaultSystem
(system:
let
overlays = [ (import rust-overlay) ];
pkgs = import nixpkgs {
inherit system overlays;
};
in
{
devShells.default = with pkgs; mkShell {
buildInputs = [
rustPlatform.bindgenHook
pam
(rust-bin.stable.latest.default.override {
extensions = [ "rust-src" ];
})
];
};
}
) // {
nixosModules.default = { lib, pkgs, ... }: {
config =
let
rust-fp-dbus-interface-config = (pkgs.stdenv.mkDerivation rec {
name = "rust-fp-pam";
src = ./dbus-interface;
installPhase = ''
mkdir -p $out/share/dbus-1/system.d
cp $src/org.rust_fp.RustFp.conf $out/share/dbus-1/system.d
echo Cros FP Pam output at $out
'';
});
_cargoLock = {
lockFile = ./Cargo.lock;
outputHashes = {
"crosec-0.1.0" = "sha256-/G0/ClCZUdBv0a8fl/UUsXVCHD2V4Ts97oyQvfi23hE=";
};
};
rust-fp-dbus-interface = with pkgs; with builtins; rustPlatform.buildRustPackage
(
let
cargoToml = (fromTOML (readFile ./dbus-interface/Cargo.toml));
in
{
pname = cargoToml.package.name;
version = cargoToml.package.version;
cargoLock = _cargoLock;
src = ./.;
buildAndTestSubdir = "dbus-interface";
nativeBuildInputs = [
rustPlatform.bindgenHook
rustPlatform.cargoBuildHook
];
}
);
rust-fp-cli = with pkgs; with builtins; rustPlatform.buildRustPackage (
let
cargoToml = (fromTOML (readFile ./cli/Cargo.toml));
in
{
pname = cargoToml.package.name;
version = cargoToml.package.version;
cargoLock = _cargoLock;
src = ./.;
buildAndTestSubdir = "cli";
nativeBuildInputs = [
rustPlatform.bindgenHook
rustPlatform.cargoBuildHook
];
}
);
rust-fp-pam-module = with pkgs; with builtins;rustPlatform.buildRustPackage (
let
cargoToml = (fromTOML (readFile ./pam-module/Cargo.toml));
in
{
pname = cargoToml.package.name;
version = cargoToml.package.version;
cargoLock = _cargoLock;
src = ./.;
buildAndTestSubdir = "pam-module";
nativeBuildInputs = [
rustPlatform.bindgenHook
rustPlatform.cargoBuildHook
];
buildInputs = [
pam
];
}
);
in
{
systemd.services.rust-fp-dbus-interface = {
enable = true;
description = "Gives normal user access to enrolling and matching fingerprints";
serviceConfig = {
Type = "exec";
ExecStart = "${rust-fp-dbus-interface}/bin/rust-fp-dbus-interface";
};
wantedBy = [ "multi-user.target" ];
};
# Example: https://github.com/NixOS/nixpkgs/issues/239770#issuecomment-1608589113
security.pam.services.kde-fingerprint.text = ''
auth sufficient ${rust-fp-pam-module}/lib/librust_fp_pam_module.so
account sufficient ${rust-fp-pam-module}/lib/librust_fp_pam_module.so
'';
environment.systemPackages = [
rust-fp-dbus-interface-config
rust-fp-cli
];
};
};
};
}