nixpkgs/pkgs/by-name/op/opcr-policy/package.nix
aleksana 571c71e6f7 treewide: migrate packages to pkgs/by-name, take 1
We are migrating packages that meet below requirements:

1. using `callPackage`
2. called path is a directory
3. overriding set is empty (`{ }`)
4. not containing path expressions other than relative path (to
makenixpkgs-vet happy)
5. not referenced by nix files outside of the directory, other
than`pkgs/top-level/all-packages.nix`
6. not referencing nix files outside of the directory
7. not referencing `default.nix` (since it's changed to `package.nix`)
8. `outPath` doesn't change after migration

The tool is here: https://github.com/Aleksanaa/by-name-migrate.
2024-11-09 20:04:51 +08:00

49 lines
1.3 KiB
Nix

{ lib
, buildGoModule
, fetchFromGitHub
}:
buildGoModule rec {
pname = "opcr-policy";
version = "0.2.19";
src = fetchFromGitHub {
owner = "opcr-io";
repo = "policy";
rev = "v${version}";
sha256 = "sha256-A5dqKbQhdJlSOU7qxC8xrCCSXK5yGmDsoVWfgWKl2TE=";
};
vendorHash = "sha256-ASR8Y/L8ub0w36fO+UpJ5ZpijP+YCLVbRtnhzvMNj9U=";
ldflags = [ "-s" "-w" "-X github.com/opcr-io/policy/pkg/version.ver=${version}" ];
subPackages = [ "cmd/policy" ];
# disable go workspaces
env.GOWORK = "off";
doCheck = false;
doInstallCheck = true;
installCheckPhase = ''
runHook preInstallCheck
$out/bin/policy --help
$out/bin/policy version | grep "version: ${version}"
runHook postInstallCheck
'';
meta = with lib; {
mainProgram = "policy";
homepage = "https://www.openpolicyregistry.io/";
changelog = "https://github.com/opcr-io/policy/releases/tag/v${version}";
description = "CLI for managing authorization policies";
longDescription = ''
The policy CLI is a tool for building, versioning and publishing your authorization policies.
It uses OCI standards to manage artifacts, and the Open Policy Agent (OPA) to compile and run.
'';
license = licenses.asl20;
maintainers = with maintainers; [ naphta jk ];
};
}