Colin
539d9e45a2
they require fundamentally different sandboxing approaches. the daemon *can't* always use bwrap if it wants to run as non-root. meanwhile the CLI tools would mostly *prefer* to run under bwrap. in the long term i'll maybe upstream the systemd sandboxing into nixpkgs, where there looks to be desire for it
18 lines
499 B
Nix
18 lines
499 B
Nix
{ deepLinkIntoOwnPackage
|
|
, networkmanager
|
|
}:
|
|
(deepLinkIntoOwnPackage networkmanager).overrideAttrs (base: {
|
|
outputs = [ "out" "daemon" "nmcli" ];
|
|
postFixup = ''
|
|
moveToOutput "" "$daemon"
|
|
for f in bin/{nmcli,nmtui,nmtui-connect,nmtui-edit,nmtui-hostname} share/bash-completion/completions/nmcli; do
|
|
moveToOutput "$f" "$nmcli"
|
|
done
|
|
# ensure non-empty default output so the build doesn't fail
|
|
mkdir "$out"
|
|
'';
|
|
meta = base.meta // {
|
|
outputsToInstall = [ ];
|
|
};
|
|
})
|