1fc220f69c
Also expose `libwg` through `passthru` in the same way as `openvpn-wireguard`.
107 lines
3 KiB
Nix
107 lines
3 KiB
Nix
{ lib
|
|
, stdenv
|
|
, writeText
|
|
, rustPlatform
|
|
, fetchFromGitHub
|
|
, pkg-config
|
|
, protobuf
|
|
, makeWrapper
|
|
, dbus
|
|
, libnftnl
|
|
, libmnl
|
|
, libwg
|
|
, openvpn-mullvad
|
|
, shadowsocks-rust
|
|
}:
|
|
let
|
|
# result of running address_cache as of 02 Mar 2022
|
|
bootstrap-address-cache = writeText "api-ip-address.txt" ''
|
|
193.138.218.78:443
|
|
193.138.218.71:444
|
|
185.65.134.66:444
|
|
185.65.135.117:444
|
|
217.138.254.130:444
|
|
91.90.44.10:444
|
|
'';
|
|
in
|
|
rustPlatform.buildRustPackage rec {
|
|
pname = "mullvad";
|
|
version = "2022.1";
|
|
|
|
src = fetchFromGitHub {
|
|
owner = "mullvad";
|
|
repo = "mullvadvpn-app";
|
|
rev = version;
|
|
hash = "sha256-bLwuM3Qy2iStbXIvDEWp31vuiihSQThOej297XKo5Xc=";
|
|
};
|
|
|
|
cargoHash = "sha256-CBbm8cJHTjyvvzCFQfKmsE5d9N7azEm8nI6KeWLVaa8=";
|
|
|
|
nativeBuildInputs = [
|
|
pkg-config
|
|
protobuf
|
|
makeWrapper
|
|
];
|
|
|
|
buildInputs = [
|
|
dbus.dev
|
|
libnftnl
|
|
libmnl
|
|
];
|
|
|
|
# talpid-core wants libwg.a in build/lib/{triple}
|
|
preBuild = ''
|
|
dest=build/lib/${stdenv.targetPlatform.config}
|
|
mkdir -p $dest
|
|
ln -s ${libwg}/lib/libwg.a $dest
|
|
'';
|
|
|
|
postFixup =
|
|
# Place all binaries in the 'mullvad-' namespace, even though these
|
|
# specific binaries aren't used in the lifetime of the program.
|
|
# `address_cache` is used to generate the `api-ip-address.txt` file, which
|
|
# contains list of Mullvad API servers -- though we provide a "backup" of
|
|
# the output of this command, it could change at any time, so we want
|
|
# users to be able to regenerate the list at any time. (The daemon will
|
|
# refuse to start without this file.)
|
|
''
|
|
for bin in address_cache relay_list translations-converter; do
|
|
mv "$out/bin/$bin" "$out/bin/mullvad-$bin"
|
|
done
|
|
'' +
|
|
# Put distributed assets in-place -- specifically, the
|
|
# bootstrap-address-cache is necessary; otherwise, the user will have to run
|
|
# the `address_cache` binary and move the contents into place at
|
|
# `/var/cache/mullvad-vpn/api-ip-address.txt` manually.
|
|
''
|
|
mkdir -p $out/share/mullvad
|
|
ln -s ${bootstrap-address-cache} $out/share/mullvad/api-ip-address.txt
|
|
'' +
|
|
# Files necessary for OpenVPN tunnels to work.
|
|
''
|
|
cp dist-assets/ca.crt $out/share/mullvad
|
|
ln -s ${openvpn-mullvad}/bin/openvpn $out/share/mullvad
|
|
ln -s ${shadowsocks-rust}/bin/sslocal $out/share/mullvad
|
|
ln -s $out/lib/libtalpid_openvpn_plugin.so $out/share/mullvad
|
|
'' +
|
|
# Set the directory where Mullvad will look for its resources by default to
|
|
# `$out/share`, so that we can avoid putting the files in `$out/bin` --
|
|
# Mullvad defaults to looking inside the directory its binary is located in
|
|
# for its resources.
|
|
''
|
|
wrapProgram $out/bin/mullvad-daemon \
|
|
--set-default MULLVAD_RESOURCE_DIR "$out/share/mullvad"
|
|
'';
|
|
|
|
passthru = {
|
|
inherit libwg;
|
|
inherit openvpn-mullvad;
|
|
};
|
|
|
|
meta = with lib; {
|
|
description = "Mullvad VPN command-line client tools";
|
|
homepage = "https://github.com/mullvad/mullvadvpn-app";
|
|
license = licenses.gpl3Only;
|
|
maintainers = with maintainers; [ cole-h ];
|
|
};
|
|
}
|