Compare commits

...

20 commits

Author SHA1 Message Date
Alejandro Soto c651b8c470
modules/athena-bccr: initial commit 2025-08-06 14:59:33 -06:00
Alejandro Soto e72efe6b59
pkgs/athena-bccr: initial commit 2025-08-06 14:46:59 -06:00
Alejandro Soto a69723cf87
modules/thinkpad: initial commit 2025-08-06 14:37:49 -06:00
Alejandro Soto 4a7e6f545c
doctrine/lib: add optional prefix/namespace args to mkModule 2025-08-06 14:37:47 -06:00
Alejandro Soto 3121013376
doctrine/lib: support module dependencies 2025-08-06 14:36:55 -06:00
Alejandro Soto 3152a0f626
modules/laptop: initial commit 2025-08-06 14:36:55 -06:00
Alejandro Soto 8cc6c13cf5
doctrine/lib: rename importAll.nix -> import-all.nix 2025-08-06 14:36:55 -06:00
Alejandro Soto 2fe1f36eb9
doctrine/lib: refactor 'close' helper 2025-08-06 14:36:53 -06:00
Alejandro Soto a8ef8e43b9
modules/yubico: initialcommit 2025-08-06 13:57:25 -06:00
Alejandro Soto 5d375d1d93
modules: automatically import all modules 2025-08-06 13:56:54 -06:00
Fabian Montero 8741b32021
add sway module 2025-08-06 13:40:06 -06:00
Fabian Montero 26619394f4
add doctrine 2025-08-06 13:36:43 -06:00
Alejandro Soto 1c7810a49e
nixos: remove services, trash 2025-08-05 21:45:32 -06:00
Alejandro Soto adc44af3a0
nixos/services: remove forgejo 2025-08-05 21:45:32 -06:00
Alejandro Soto 263b27cbb2
flake: add nixpkgs input url 2025-08-05 21:45:32 -06:00
Alejandro Soto cfdf227b9c
flake: export nixosModules and homeManagerModules 2025-08-05 21:40:37 -06:00
Alejandro Diaz 12b7c09c0b spliit: removes exec at start 2025-06-22 13:06:40 -06:00
Alejandro Diaz a78a4f764e spliit: added functional package 2025-06-22 01:17:27 -06:00
Alejandro Soto 517c240c19
flake: add attribute 'packages' 2025-06-05 21:30:10 -06:00
Alejandro Soto 12cd697209
pkgs: add spliit 2025-06-05 19:46:06 -06:00
38 changed files with 918 additions and 165 deletions

1
.gitignore vendored
View file

@ -1,3 +1,2 @@
!**/.keep
result
flake.lock

12
doctrine/default.nix Normal file
View file

@ -0,0 +1,12 @@
{
pkgs,
namespace,
}: let
doctrine = {
lib = import ./lib {inherit lib pkgs doctrine;};
prefix = "trivium";
inherit namespace;
};
inherit (pkgs) lib;
in
doctrine

20
doctrine/lib/default.nix Normal file
View file

@ -0,0 +1,20 @@
{
lib,
doctrine,
pkgs,
}: let
close = vars: f: args:
(
if builtins.isPath f
then import f
else f
)
(args // vars);
closeLib = close {inherit lib;};
closeFull = close {inherit lib pkgs doctrine;};
in {
inherit close;
importAll = closeLib ./import-all.nix;
mkModule = closeFull ./mk-module.nix;
}

View file

@ -1,6 +1,7 @@
{lib}: {
{
lib,
root,
exclude ? [],
exclude ? ["default"],
}:
with builtins;
with lib;
@ -10,7 +11,7 @@ with lib;
isMatch = name: type:
(hasSuffix ".nix" name || type == "directory")
&& ! elem name (map basename exclude);
&& ! elem (basename name) exclude;
entry = name: _: {
name = basename name;

View file

@ -0,0 +1,48 @@
{
# The first few arguments are implicitly passed by the 'close' helper
lib,
pkgs,
doctrine,
name,
config,
hm ? null,
sys ? null,
options ? null,
requires ? [],
prefix ? doctrine.prefix,
namespace ? doctrine.namespace,
}: let
optionsSet = import options {
inherit config lib pkgs cfg name doctrine;
};
configSet = import configFiles.${namespace} {
inherit config lib pkgs doctrine cfg;
};
configFiles = lib.filterAttrs (k: v: v != null) {
inherit sys hm;
};
cfg = config.${prefix}.${name};
in {
config =
lib.optionalAttrs (configFiles ? ${namespace})
(lib.mkIf cfg.enable (lib.mkMerge [
configSet
{
assertions =
map (dependency: {
assertion = cfg.enable -> config.${prefix}.${dependency}.enable;
message = "${prefix}.${name}.enable requires ${prefix}.${dependency}.enable";
})
requires;
}
]));
options.${prefix}.${name} =
lib.optionalAttrs (options != null && optionsSet ? ${namespace}) optionsSet.${namespace}
// {
enable = lib.mkEnableOption name;
};
}

61
flake.lock Normal file
View file

@ -0,0 +1,61 @@
{
"nodes": {
"flake-utils": {
"inputs": {
"systems": "systems"
},
"locked": {
"lastModified": 1731533236,
"narHash": "sha256-l0KFg5HjrsfsO/JpG+r7fRrqm12kzFHyUHqHCVpMMbI=",
"owner": "numtide",
"repo": "flake-utils",
"rev": "11707dc2f618dd54ca8739b309ec4fc024de578b",
"type": "github"
},
"original": {
"owner": "numtide",
"repo": "flake-utils",
"type": "github"
}
},
"nixpkgs": {
"locked": {
"lastModified": 1754292888,
"narHash": "sha256-1ziydHSiDuSnaiPzCQh1mRFBsM2d2yRX9I+5OPGEmIE=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "ce01daebf8489ba97bd1609d185ea276efdeb121",
"type": "github"
},
"original": {
"owner": "nixos",
"ref": "nixos-25.05",
"repo": "nixpkgs",
"type": "github"
}
},
"root": {
"inputs": {
"flake-utils": "flake-utils",
"nixpkgs": "nixpkgs"
}
},
"systems": {
"locked": {
"lastModified": 1681028828,
"narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=",
"owner": "nix-systems",
"repo": "default",
"rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e",
"type": "github"
},
"original": {
"owner": "nix-systems",
"repo": "default",
"type": "github"
}
}
},
"root": "root",
"version": 7
}

View file

@ -1,5 +1,8 @@
{
inputs.flake-utils.url = "github:numtide/flake-utils";
inputs = {
flake-utils.url = "github:numtide/flake-utils";
nixpkgs.url = "github:nixos/nixpkgs/nixos-25.05";
};
outputs = {
self,
@ -16,6 +19,12 @@
in
flake-utils.lib.eachDefaultSystem (system: {
formatter = (import nixpkgs {inherit system;}).alejandra;
packages =
(import nixpkgs {
inherit system;
overlays = [(mapOverlayOverride "local" (import ./pkgs))];
}).local;
})
// {
templates = let
@ -36,6 +45,9 @@
trivium = overlay;
};
homeManagerModules.default = ./modules;
nixosModules.default = ./modules;
lib = {
mkSystemFlake = {
flakes,
@ -145,7 +157,7 @@
hostConfig = platform:
nixosSystem {
modules = [
./nixos
self.nixosModules.default
nixosSourcePath
platform
];
@ -171,7 +183,7 @@
};
modules = [
./hm
self.homeManagerModules.default
hmSourcePath
platform
registry

View file

@ -1 +0,0 @@
{}

View file

@ -0,0 +1,14 @@
{
config,
lib,
pkgs,
doctrine,
...
}:
doctrine.lib.mkModule {
inherit config;
name = "athena-bccr";
hm = ./hm.nix;
sys = ./sys.nix;
options = ./options.nix;
}

View file

@ -0,0 +1,14 @@
{
pkgs,
lib,
cfg,
doctrine,
...
}: let
athena = pkgs.${doctrine.prefix}.athena-bccr.${cfg.release};
in {
home.packages = [
athena.firmador
(athena.gaudi.override {inherit (cfg) gaudiHash;})
];
}

View file

@ -0,0 +1,30 @@
{lib, ...}:
with lib.types; {
hm = {
gaudiHash = lib.mkOption {
type = nullOr str;
default = null;
description = "hash of the Gaudi client";
};
release = lib.mkOption {
type = str;
default = "latest";
description = "pinned athena-bccr release tag";
};
};
sys = {
group = lib.mkOption {
type = str;
default = "users";
description = "user group with full access to the smartcard reader";
};
release = lib.mkOption {
type = str;
default = "latest";
description = "pinned athena-bccr release tag";
};
};
}

View file

@ -0,0 +1,35 @@
{
pkgs,
lib,
cfg,
doctrine,
...
}: let
athena = pkgs.${doctrine.prefix}.athena-bccr.${cfg.release};
in {
environment = {
etc = {
"Athena".source = "${athena.ase-pkcs11}/etc/Athena";
"pkcs11/modules/asep11".text = ''
module: ${athena.libasep11}
'';
};
systemPackages = [athena.ase-pkcs11];
};
#FIXME: Extremadamente peligroso si BCCR o MICITT caen, investigar política nacional de root CA
security.pki.certificateFiles = ["${athena.bccr-cacerts}/root-ca.pem"];
services = {
pcscd.enable = true;
udev.extraRules = ''
# Athena Smartcard Solutions, Inc. ASEDrive V3CR
ATTRS{idVendor}=="0dc3", ATTRS{idProduct}=="1004", MODE="660", GROUP="${cfg.group}", TAG+="uaccess"
'';
};
users.groups.${cfg.group} = {};
}

3
modules/default.nix Normal file
View file

@ -0,0 +1,3 @@
{doctrine, ...}: {
imports = builtins.attrValues (doctrine.lib.importAll {root = ./.;});
}

View file

@ -0,0 +1,10 @@
{
config,
doctrine,
...
}:
doctrine.lib.mkModule {
inherit config;
name = "laptop";
sys = ./sys.nix;
}

11
modules/laptop/sys.nix Normal file
View file

@ -0,0 +1,11 @@
{
config,
lib,
pkgs,
...
}: {
services = {
tlp.enable = lib.mkDefault true;
upower.enable = lib.mkDefault true;
};
}

13
modules/sway/default.nix Normal file
View file

@ -0,0 +1,13 @@
{
config,
lib,
pkgs,
doctrine,
...
}:
doctrine.lib.mkModule {
inherit config;
name = "sway";
sys = ./sys.nix;
options = ./options.nix;
}

3
modules/sway/options.nix Normal file
View file

@ -0,0 +1,3 @@
{...}: {
sys = {};
}

45
modules/sway/sys.nix Normal file
View file

@ -0,0 +1,45 @@
{
pkgs,
lib,
...
}: {
services.libinput.enable = true;
hardware.graphics.enable = true;
xdg.portal = {
enable = true;
wlr.enable = true;
extraPortals = with pkgs; [xdg-desktop-portal-gtk];
xdgOpenUsePortal = true;
# warning: xdg-desktop-portal 1.17 reworked how portal implementations are loaded, you
# should either set `xdg.portal.config` or `xdg.portal.configPackages`
# to specify which portal backend to use for the requested interface.
#
# https://github.com/flatpak/xdg-desktop-portal/blob/1.18.1/doc/portals.conf.rst.in
#
# If you simply want to keep the behaviour in < 1.17, which uses the first
# portal implementation found in lexicographical order, use the following:
#
# xdg.portal.config.common.default = "*";
config.common.default = "*";
};
environment = {
sessionVariables.NIXOS_OZONE_WL = "1";
systemPackages = with pkgs; [
qt5.qtwayland
qt6.qtwayland
];
};
programs = {
gtklock = {
enable = lib.mkDefault true;
config = {};
modules = [];
};
};
}

View file

@ -0,0 +1,11 @@
{
config,
doctrine,
...
}:
doctrine.lib.mkModule {
inherit config;
name = "thinkpad";
sys = ./sys.nix;
requires = ["laptop"];
}

30
modules/thinkpad/sys.nix Normal file
View file

@ -0,0 +1,30 @@
{
config,
pkgs,
lib,
...
}: {
# For suspending to RAM to work, set Config -> Power -> Sleep State to "Linux" in EFI.
# See https://wiki.archlinux.org/index.php/Lenovo_ThinkPad_X1_Carbon_(Gen_6)#Suspend_issues
# Fingerprint sensor requires a firmware-update to work.
boot = {
extraModulePackages = with config.boot.kernelPackages; [acpi_call];
extraModprobeConfig = "options iwlwifi 11n_disable=1 wd_disable=1";
# acpi_call makes tlp work for newer thinkpads
kernelModules = ["acpi_call"];
# Force use of the thinkpad_acpi driver for backlight control.
# This allows the backlight save/load systemd service to work.
kernelParams = ["acpi_backlight=native"];
};
hardware.firmware = [pkgs.sof-firmware];
services = {
fprintd.enable = lib.mkDefault true;
thinkfan.enable = lib.mkDefault true;
tp-auto-kbbl.enable = lib.mkDefault true;
};
}

View file

@ -0,0 +1,13 @@
{
config,
lib,
pkgs,
doctrine,
...
}:
doctrine.lib.mkModule {
inherit config;
name = "yubico";
hm = ./hm.nix;
sys = ./sys.nix;
}

9
modules/yubico/hm.nix Normal file
View file

@ -0,0 +1,9 @@
{
pkgs,
lib,
...
}: {
home.packages = [
pkgs.yubikey-manager
];
}

14
modules/yubico/sys.nix Normal file
View file

@ -0,0 +1,14 @@
{
pkgs,
lib,
...
}: {
environment.etc."pkcs11/modules/ykcs11".text = ''
module: ${pkgs.yubico-piv-tool}/lib/libykcs11.so
'';
services = {
pcscd.enable = true;
udev.packages = [pkgs.yubikey-personalization];
};
}

View file

@ -1,11 +0,0 @@
{
config,
lib,
pkgs,
...
}: {
imports = [
./trash
./services
];
}

View file

@ -1,10 +0,0 @@
{
config,
lib,
pkgs,
...
}: {
imports = [
./forgejo
];
}

View file

@ -1,66 +0,0 @@
{
config,
lib,
pkgs,
...
}:
with lib; let
cfg = config.options.trivium.services.forgejo;
in {
options.trivium.services.forgejo = {
enable = mkEnableOption "forgejo settings";
virtualHost = mkOption {
type = types.string;
description = "Virtualhost to use for nginx's reverse proxy. Usually something like git.<your server>.com";
};
appName = mkOption {
type = types.string;
description = "You guess what this does";
};
disableRegistration = mkOption {
type = types.bool;
default = true;
description = "Turn this off just to create the first admin account";
};
};
config = mkIf cfg.enable {
services = {
nginx = {
virtualHosts."${cfg.virtualHost}" = {
enableACME = true;
forceSSL = true;
locations."/".proxyPass = "http://localhost:9170";
};
};
forgejo = {
enable = true;
lfs.enable = true;
useWizard = false;
settings = {
general.APP_NAME = "${cfg.appName}";
ui.DEFAULT_THEME = "forgejo-dark";
server = {
DOMAIN = "${cfg.virtualHost}";
ROOT_URL = "https://${cfg.virtualHost}";
HTTP_PORT = 9170;
LANDING_PAGE = "explore";
};
service.DISABLE_REGISTRATION = ${cfg.disableRegistration};
actions = {
ENABLED = true;
};
mailer = {
ENABLED = false;
};
};
};
};
};
}

View file

@ -1,10 +0,0 @@
{
config,
lib,
pkgs,
...
}: {
imports = [
./steam
];
}

View file

@ -1,55 +0,0 @@
{
config,
lib,
pkgs,
...
}:
with lib; let
cfg = config.options.trivium.trash.steam;
in {
options.trivium.trash.steam = {
enable = mkEnableOption "steam settings";
compatibilityPackages = mkOption {
type = types.bool;
default = true;
description = "Enable additional compatibility packages (protontricks, protonup, etc.)";
};
remotePlayOpenFirewall = mkOption {
type = types.bool;
default = false;
description = "Open firewall for Steam Remote Play";
};
dedicatedServerOpenFirewall = mkOption {
type = types.bool;
default = false;
description = "Open firewall for Steam Dedicated Server";
};
localNetworkGameTransfersOpenFirewall = mkOption {
type = types.bool;
default = false;
description = "Open firewall for Steam Local Network Game Transfers";
};
};
config = mkIf cfg.enable {
programs.steam = {
enable = true;
remotePlay.openFirewall = cfg.remotePlayOpenFirewall;
dedicatedServer.openFirewall = cfg.dedicatedServerOpenFirewall;
localNetworkGameTransfers.openFirewall = cfg.localNetworkGameTransfersOpenFirewall;
};
environment = mkIf cfg.compatibilityPackages {
systemPackages = with pkgs; [
protontricks
protonup
protonup-ng
winetricks
];
};
};
}

View file

@ -0,0 +1,25 @@
From 5e7eb46f46af6a29a2aea19db722ebc28baede25 Mon Sep 17 00:00:00 2001
From: Alejandro Soto <alejandro@34project.org>
Date: Sat, 21 Jun 2025 22:37:19 -0600
Subject: [PATCH] Remove CheckUpdatePlugin from default list
---
src/main/java/cr/libre/firmador/Settings.java | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/main/java/cr/libre/firmador/Settings.java b/src/main/java/cr/libre/firmador/Settings.java
index e5ddf01..a028d6e 100644
--- a/src/main/java/cr/libre/firmador/Settings.java
+++ b/src/main/java/cr/libre/firmador/Settings.java
@@ -81,7 +81,7 @@ public class Settings {
public Settings() {
activePlugins.add("cr.libre.firmador.plugins.DummyPlugin");
- activePlugins.add("cr.libre.firmador.plugins.CheckUpdatePlugin");
+ // activePlugins.add("cr.libre.firmador.plugins.CheckUpdatePlugin");
availablePlugins.add("cr.libre.firmador.plugins.DummyPlugin");
availablePlugins.add("cr.libre.firmador.plugins.CheckUpdatePlugin");
}
--
2.49.0

View file

@ -0,0 +1,12 @@
// Los del BCCR no se molestaron en ponerle un main al Agente Gaudi porque el
// actualizador (que a su vez tiene main) carga el jar en memoria y crea una
// instancia de Inicializador usando reflexión. El actualizador no es relevante
// en Nix. En todo caso, dicho actualizador es sumamente frágil y me daría
// demasiada pereza arreglarlo, así que en su lugar usamos este stub para
// launchear Gaudi.
public class LaunchGaudi {
public static void main(String[] args) {
new InicializadorCliente.Inicializador("");
}
}

View file

@ -0,0 +1,30 @@
{
callPackage,
lib,
}: let
latest = "deb64-rev26";
releases = lib.mapAttrs (name: release: release // {name = name;}) (import ./releases.nix);
overrideUnwrapped = default: new: let
args = default // new;
unwrappedPkgs = lib.filterAttrs (name: _: ! lib.elem name ["override" "overrideDerivation"]) (callPackage ./unwrapped.nix args);
in
lib.fix (unwrapped: lib.mapAttrs (_: pkg: callPackage pkg unwrapped) unwrappedPkgs)
// {
override = overrideUnwrapped args;
};
pkgsForRelease = release: let
ase-pkcs11 = unwrapped.ase-idprotect.lib;
libasep11 = "${ase-pkcs11}/lib/x64-athena/libASEP11.so";
unwrapped = overrideUnwrapped {inherit release;} {};
in {
inherit ase-pkcs11 libasep11;
inherit (unwrapped) ase-idprotect bccr-cacerts;
gaudi = callPackage ./gaudi-env.nix {inherit unwrapped;};
firmador = callPackage ./firmador.nix {inherit libasep11;};
};
in
lib.mapAttrs (_: pkgsForRelease) (releases // {latest = releases.${latest};})

View file

@ -0,0 +1,57 @@
{
fetchgit,
lib,
makeWrapper,
maven,
openjdk,
wrapGAppsHook,
libasep11 ? null,
}: let
jdk = openjdk.override {
enableJavaFX = true;
};
version = "1.9.8";
in
maven.buildMavenPackage {
pname = "firmador";
inherit version;
src = fetchgit {
url = "https://codeberg.org/firmador/firmador";
rev = version;
hash = "sha256-xdiVPjihRADPK4nG+WQHWsDzVYLCeN6ouQ6SDtjf1qQ=";
};
patches = [
./0001-Remove-CheckUpdatePlugin-from-default-list.patch
];
mvnHash = "sha256-h1zoStTgaE7toWWKq0Y0ahOORyltChwjmaMYjLgs1VE=";
nativeBuildInputs = [
makeWrapper
wrapGAppsHook
];
postPatch = lib.optionalString (libasep11 != null) ''
sed -i 's@/usr/lib/x64-athena/libASEP11.so@${libasep11}@g' src/main/java/cr/libre/firmador/CRSigner.java
'';
installPhase = ''
runHook preInstall
mkdir -p $out/bin $out/share/java
install -Dm644 target/firmador.jar $out/share/java
makeWrapper ${jdk}/bin/java $out/bin/firmador \
--add-flags "-jar $out/share/java/firmador.jar"
runHook postInstall
'';
meta = {
homepage = "https://firmador.libre.cr";
license = lib.licenses.gpl3Plus;
};
}

View file

@ -0,0 +1,62 @@
{
buildFHSEnv,
curl,
lib,
writeShellScriptBin,
gaudiHash ? null,
unwrapped,
}: let
unwrappedWithGaudi = unwrapped.override {inherit gaudiHash;};
in
buildFHSEnv {
name = "gaudi";
targetPkgs = pkgs: [
unwrappedWithGaudi.ase-idprotect.lib
unwrappedWithGaudi.gaudi
(writeShellScriptBin "launch-gaudi" ''
set -o errexit
set -o pipefail
set -o nounset
PATH="${lib.makeBinPath [curl]}:$PATH"
echo "$0: testing for incompatible releases..." >&2
jar_name=bccr-firma-fva-clienteMultiplataforma.jar
url="https://www.firmadigital.go.cr/Bccr.Firma.Fva.Actualizador.ClienteFirmadorJava//recursosLiberica17/actualizador/$jar_name"
ca_file="${unwrappedWithGaudi.bccr-cacerts}/root-ca.pem"
url_hash=$(curl -sS --cacert "$ca_file" "$url" | sha256sum | cut -d' ' -f1)
jar_path="${unwrappedWithGaudi.gaudi}/share/java/$jar_name"
jar_hash=$(sha256sum "$jar_path" | cut -d' ' -f1)
if [ "$url_hash" != "$jar_hash" ]; then
last_modified=$(curl -sS --head --cacert "$ca_file" "$url" | grep -i '^last-modified:' | head -1)
echo "$0: sha256 mismatch for $jar_path due to server-side update" >&2
echo "$0: expected: $url_hash" >&2
echo "$0: actual: $jar_hash" >&2
echo "$0: $last_modified" >&2
echo "$0: run the following to download the new client JAR, then update your derivation:" >&2
echo "$0: \$ ${unwrappedWithGaudi.update-gaudi}" >&2
exit 1
fi
cache_path_1="''${XDG_CACHE_HOME:-$HOME/.cache}/Agente-GAUDI"
cache_path_2="''${XDG_CACHE_HOME:-$HOME/.cache}/Firmador-BCCR"
for cache_path in "$cache_path_1" "$cache_path_2"; do
mkdir -p "$cache_path"
ln -sf -- ${unwrappedWithGaudi.gaudi}/share/java/bccr-firma-fva-clienteMultiplataforma.jar "$cache_path"
done
cp -f --no-preserve=mode -t "$cache_path_1" -- "${unwrappedWithGaudi.gaudi}/share/java/config.properties"
exec gaudi
'')
];
runScript = "launch-gaudi";
}

View file

@ -0,0 +1,12 @@
{
"deb64-rev26" = {
# nix hash convert --hash-algo sha256 --from base16 --to sri $(sha256sum sfd_ClientesLinux_DEB64_Rev26.zip | cut -d' ' -f1)
hash = "sha256-ZPWP9TqJQ5coJAPzUSiaXKVItBWlqFM4smCjOf+gqQM=";
basename = "sfd_ClientesLinux_DEB64_Rev26";
srcPaths = {
gaudi = "Firma Digital/Agente GAUDI/agente-gaudi_20.0_amd64.deb";
idprotect = "Firma Digital/PinTool/IDProtect PINTool 7.24.02/DEB/idprotectclient_7.24.02-0_amd64.deb";
};
};
}

View file

@ -0,0 +1,226 @@
{
lib,
requireFile,
release,
gaudiHash ? null,
...
}: let
inherit (release) srcPaths;
src = requireFile {
url = "https://soportefirmadigital.com";
name = "${release.basename}.zip";
inherit (release) hash;
};
gaudiUpdateSrc = {update-gaudi}:
requireFile {
url = "${update-gaudi}";
name = "gaudi-update-${release.name}.zip";
hash = gaudiHash;
};
moduleFromDeb = name: args @ {
stdenv,
dpkg,
unzip,
srcPath,
...
}:
stdenv.mkDerivation ({
pname = "${name}-unwrapped";
version = release.name;
inherit src;
nativeBuildInputs = [dpkg unzip] ++ (args.nativeBuildInputs or []);
postUnpack = ''
dpkg -x ${lib.escapeShellArg "${release.basename}/${srcPath}"} ${lib.escapeShellArg release.basename}
'';
}
// lib.removeAttrs args ["stdenv" "dpkg" "unzip" "srcPath" "nativeBuildInputs"]);
in {
ase-idprotect = {
autoPatchelfHook,
dpkg,
fontconfig,
freetype,
pcsclite,
stdenv,
unzip,
xorg,
zlib,
...
}:
moduleFromDeb "ase-idprotect" {
inherit dpkg stdenv unzip;
srcPath = srcPaths.idprotect;
buildInputs = [
fontconfig
freetype
pcsclite
stdenv.cc.cc.lib
xorg.libX11
xorg.libXext
zlib
];
nativeBuildInputs = [
autoPatchelfHook
];
outputs = ["out" "lib"];
installPhase = ''
runHook preInstall
install -m755 -d $out/bin $lib/{etc,lib/x64-athena}
install -m755 usr/bin/IDProtect{_Manager,PINTool} $out/bin/
install -m755 usr/lib/x64-athena/* $lib/lib/x64-athena
cp -r etc/Athena $lib/etc/Athena
runHook postInstall
'';
preFixup = ''
patchelf --set-rpath $lib/lib/x64-athena $out/bin/*
'';
};
gaudi = {
autoPatchelfHook,
dpkg,
makeWrapper,
openjdk,
pkgs,
stdenv,
unzip,
writeShellScriptBin,
update-gaudi,
...
}: let
jdk = openjdk.override {
enableJavaFX = true;
openjfx_jdk = pkgs."openjfx${lib.head (lib.splitString "." openjdk.version)}".override {withWebKit = true;};
};
fakeSudo = writeShellScriptBin "sudo" "";
gaudiUpdate = gaudiUpdateSrc {inherit update-gaudi;};
in
moduleFromDeb "gaudi" {
inherit dpkg stdenv unzip;
srcPath = srcPaths.gaudi;
nativeBuildInputs = [
autoPatchelfHook
jdk
makeWrapper
];
preBuild = lib.optionalString (gaudiHash != null) ''
unzip -o ${gaudiUpdate} -d opt/Agente-GAUDI/lib/app
'';
buildPhase = ''
runHook preBuild
install -m755 -d $out/{bin,opt/Firmador-BCCR/lib}
cp -r opt/Agente-GAUDI/lib/app $out/opt/Firmador-BCCR/lib/app
# Preserves the original filename and avoids <hash>-LaunchGaudi.java
ln -s ${./LaunchGaudi.java} LaunchGaudi.java
javac \
-cp opt/Agente-GAUDI/lib/app/bccr-firma-fva-clienteMultiplataforma.jar \
-d $out/opt/Firmador-BCCR/lib/app \
LaunchGaudi.java
runHook postBuild
'';
installPhase = ''
runHook preInstall
install -m755 -d $out/{share,opt/Firmador-BCCR/lib/runtime/lib}
install -m755 -D opt/Agente-GAUDI/bin/Agente-GAUDI $out/opt/Firmador-BCCR/bin/Agente-GAUDI
install -m755 -D opt/Agente-GAUDI/lib/libapplauncher.so $out/opt/Firmador-BCCR/lib/libapplauncher.so
ln -s ../opt/Firmador-BCCR/lib/app $out/share/java
ln -s Firmador-BCCR $out/opt/Agente-GAUDI
ln -s ${jdk}/lib/openjdk/lib/libjli.so $out/opt/Firmador-BCCR/lib/runtime/lib/libjli.so
makeWrapper ${jdk}/bin/java $out/bin/gaudi \
--prefix PATH : ${fakeSudo}/bin \
--add-flags "-cp $out/share/java:$out/share/java/bccr-firma-fva-clienteMultiplataforma.jar" \
--add-flags "-Djavax.net.ssl.trustStore=$out/opt/Firmador-BCCR/lib/app/bccr.cacerts" \
--add-flags "LaunchGaudi"
runHook postInstall
'';
};
bccr-cacerts = {
openssl,
stdenv,
unzip,
...
}:
stdenv.mkDerivation {
pname = "bccr-cacerts";
version = release.name;
inherit src;
nativeBuildInputs = [
openssl
unzip
];
installPhase = ''
cp -r Firma\ Digital/Certificados $out
openssl x509 -in $out/CA\ RAIZ\ NACIONAL\ -\ COSTA\ RICA\ v2.crt -out $out/root-ca.pem -text
'';
};
update-gaudi = {
wget,
writeShellScript,
zip,
bccr-cacerts,
...
}:
writeShellScript "update-gaudi" ''
set -o errexit
set -o pipefail
set -o nounset
temp_dir="$(mktemp -d)"
trap 'cd / && rm -rf -- "$temp_dir"' EXIT
cd "$temp_dir"
PATH="${lib.makeBinPath [wget zip]}:$PATH"
ca_cert="${bccr-cacerts}/root-ca.pem"
base_url="https://www.firmadigital.go.cr/Bccr.Firma.Fva.Actualizador.ClienteFirmadorJava//recursosLiberica17/actualizador"
wget --ca-certificate="$ca_cert" "$base_url/bccr.cacerts"
wget --ca-certificate="$ca_cert" "$base_url/config.properties"
wget --ca-certificate="$ca_cert" "$base_url/bccr-firma-fva-clienteMultiplataforma.jar"
wget --ca-certificate="$ca_cert" "$base_url/ServicioActualizadorClienteBCCR.jar"
# https://gist.github.com/stokito/c588b8d6a6a0aee211393d68eea678f2
TZ=UTC find . -exec touch --no-dereference -a -m -t 198002010000.00 {} +
zip_path="$PWD/gaudi-update-${release.name}.zip"
TZ=UTC zip -q --move --recurse-paths --symlinks -X "$zip_path" .
TZ=UTC touch -a -m -t 198002010000.00 "$zip_path"
set -x
nix-store --add-fixed sha256 "$zip_path"
set +x
echo -e "\ngaudiHash: $(nix-hash --to-sri --type sha256 $(sha256sum "$zip_path" | cut -d' ' -f1))"
'';
}

View file

@ -2,7 +2,8 @@ final: prev:
with prev.lib; let
inherit (final) callPackage;
in {
lib = callPackage ./lib {};
override = {};
athena-bccr = callPackage ./athena-bccr {};
spliit = callPackage ./spliit {};
}

View file

@ -1,3 +0,0 @@
{callPackage}: {
importAll = callPackage ./importAll.nix {};
}

76
pkgs/spliit/default.nix Normal file
View file

@ -0,0 +1,76 @@
{
buildNpmPackage,
fetchFromGitHub,
nodePackages,
lib,
writeShellScriptBin,
pkgs,
}: let
schemaEngine = "${pkgs.prisma-engines}/bin/schema-engine";
queryEngineBin = "${pkgs.prisma-engines}/bin/query-engine";
queryEngineLib = "${pkgs.prisma-engines}/lib/libquery_engine.node";
buildFlags = ["--ignore-scripts"];
in
buildNpmPackage {
pname = "spliit2";
version = "master-20250420";
src = fetchFromGitHub {
repo = "spliit";
owner = "spliit-app";
rev = "a11efc79c13298c0d282e47496d132538752405f";
hash = "sha256-v4gaPzLzBbbqw/LDYxe1fiyficcrqcGOop23YPiTrdc=";
};
npmDepsHash = "sha256-sd0/7ruNUFxUKTeTwx/v8Vc/G3llkXP6RSDE78h3qVU=";
nativeBuildInputs = [pkgs.openssl];
npmRebuildFlags = buildFlags;
PRISMA_SCHEMA_ENGINE_BINARY = schemaEngine;
PRISMA_QUERY_ENGINE_BINARY = queryEngineBin;
PRISMA_QUERY_ENGINE_LIBRARY = queryEngineLib;
preBuild = ''
cp -v scripts/build.env .env
npx prisma generate
'';
npmBuildFlags = buildFlags;
postInstall = ''
cp -r .next public package.json next.config.mjs $out/lib/node_modules/spliit2
install -Dvm755 -t $out/bin ${lib.getExe (writeShellScriptBin "spliit2" ''
set -euxo pipefail
cd @out@/lib/node_modules/spliit2
export PATH="$PWD/node_modules/.bin:$PATH"
export NEXT_TELEMETRY_DISABLED=1
export PRISMA_SCHEMA_ENGINE_BINARY="${schemaEngine}"
export PRISMA_QUERY_ENGINE_BINARY="${queryEngineBin}"
export PRISMA_QUERY_ENGINE_LIBRARY="${queryEngineLib}"
prisma migrate deploy
next start
'')}
substituteInPlace $out/bin/spliit2 \
--replace @out@ $out
wrapProgram $out/bin/spliit2 \
--prefix PATH : ${lib.makeBinPath [pkgs.openssl]}
'';
meta = {
description = "Free and Open Source Alternative to Splitwise. Share expenses with your friends and family.";
homepage = "https://spliit.app";
license = lib.licenses.mit;
maintainers = with lib.maintainers; [];
};
}