;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2013-2019, 2023 Ludovic Courtès ;;; Copyright © 2014-2021 Mark H Weaver ;;; Copyright © 2016-2019, 2021-2024 Efraim Flashner ;;; Copyright © 2017, 2018 Tobias Geerinckx-Rice ;;; Copyright © 2020, 2021 Marius Bakke ;;; Copyright © 2020 Jonathan Brielmaier ;;; Copyright © 2021-2025 Maxim Cournoyer ;;; Copyright © 2021 Maxime Devos ;;; Copyright © 2024 Zheng Junjie <873216071@qq.com> ;;; ;;; This file is part of GNU Guix. ;;; ;;; GNU Guix is free software; you can redistribute it and/or modify it ;;; under the terms of the GNU General Public License as published by ;;; the Free Software Foundation; either version 3 of the License, or (at ;;; your option) any later version. ;;; ;;; GNU Guix is distributed in the hope that it will be useful, but ;;; WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ;;; GNU General Public License for more details. ;;; ;;; You should have received a copy of the GNU General Public License ;;; along with GNU Guix. If not, see . (define-module (gnu packages nss) #:use-module (guix packages) #:use-module ((guix search-paths) #:select ($SSL_CERT_DIR $SSL_CERT_FILE)) #:use-module (guix utils) #:use-module (guix gexp) #:use-module (guix download) #:use-module (guix git-download) #:use-module (guix build-system cargo) #:use-module (guix build-system gnu) #:use-module (guix build-system mozilla) #:use-module (guix build-system trivial) #:use-module ((guix licenses) #:prefix license:) #:use-module (gnu packages) #:use-module (gnu packages base) #:use-module (gnu packages bash) #:use-module (gnu packages certs) #:use-module (gnu packages check) #:use-module (gnu packages crates-check) #:use-module (gnu packages crates-io) #:use-module (gnu packages compression) #:use-module (gnu packages perl) #:use-module (gnu packages sqlite) #:use-module (gnu packages time) #:use-module (gnu packages tls) #:use-module (srfi srfi-1) #:use-module (srfi srfi-26)) (define-public nspr (package (name "nspr") (version "4.36") (source (origin (method url-fetch) (uri (string-append "https://ftp.mozilla.org/pub/mozilla.org/nspr/releases/v" version "/src/nspr-" version ".tar.gz")) (sha256 (base32 "15b83ipjxrmw0909l5qqz13pbarhp50d6i58vgjx4720y4bw7pjm")))) (build-system gnu-build-system) (inputs (list perl ;for 'compile-et.pl' bash-minimal)) ;for 'nspr-config' (native-inputs (list perl)) (arguments (list ;; Prevent the 'native' perl from sneaking into the closure. ;; XXX it would be nice to do the same for 'bash-minimal', ;; but using 'canonical-package' causes loops. #:disallowed-references (if (%current-target-system) (list (gexp-input (this-package-native-input "perl") #:native? #t)) #f) #:tests? #f ;no check target #:configure-flags #~(list "--disable-static" "--enable-64bit" (string-append "LDFLAGS=-Wl,-rpath=" (assoc-ref %outputs "out") "/lib") #$@(if (%current-target-system) #~("HOST_CC=gcc") #~())) ;; Use fixed timestamps for reproducibility. #:make-flags #~'("SH_DATE='1970-01-01 00:00:01'" ;; This is epoch 1 in microseconds. "SH_NOW=100000") #:phases #~(modify-phases %standard-phases (add-before 'configure 'chdir (lambda _ (chdir "nspr") #t))))) (home-page "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSPR") (synopsis "Netscape API for system level and libc-like functions") (description "Netscape Portable Runtime (@dfn{NSPR}) provides a platform-neutral API for system level and libc-like functions. It is used in the Mozilla clients.") (license license:mpl2.0))) (define (nss-uri version) (let* ((versions (string-split version #\.)) (version-with-underscores (string-join versions "_")) (version-with-final-underscore (string-append (car versions) "." (cadr versions) "_" (caddr versions)))) (string-append "https://ftp.mozilla.org/pub/mozilla.org/security/nss/" "releases/NSS_" version-with-underscores "_RTM/src/" "nss-" version-with-final-underscore ".tar.gz"))) (define %nss-release-date "2025-02-05") (define-public nss (package (name "nss") ;; IMPORTANT: Also update and test the nss-certs package, which duplicates ;; version and source to avoid a top-level variable reference & module ;; cycle. (version "3.101.3") ;also update above %NSS-RELEASE-DATE! (source (origin (method url-fetch) (uri (nss-uri version)) (sha256 (base32 "1gkpbyh90aw9yhjnyj1bsp79s2bxab886d9ihkaw1i2kzqfvf3dg")) ;; Create nss.pc and nss-config. (patches (search-patches "nss-3.56-pkgconfig.patch" "nss-getcwd-nonnull.patch" "nss-increase-test-timeout.patch" "nss-disable-broken-tests.patch")) (modules '((guix build utils))) (snippet '(begin ;; Delete the bundled copy of these libraries. (delete-file-recursively "nss/lib/zlib") (delete-file-recursively "nss/lib/sqlite"))))) (build-system gnu-build-system) (outputs '("out" "bin" "static")) ;11 MiB of static archives (arguments (list #:make-flags #~(let ((rpath (string-append "-Wl,-rpath=" #$output "/lib/nss"))) (list "-C" "nss" (string-append "PREFIX=" #$output) "NSDISTMODE=copy" "NSS_USE_SYSTEM_SQLITE=1" ;; The gtests fail to compile on riscv64. ;; Skipping them doesn't affect the test suite. #$@(if (target-riscv64?) #~("NSS_DISABLE_GTESTS=1") #~()) ;; Ensure we are building for the (%current-target-system). #$@(if (%current-target-system) #~((string-append "OS_TEST=" (string-take #$(%current-target-system) (string-index #$(%current-target-system) #\-))) (string-append "KERNEL=" (cond (#$(target-hurd?) "gnu") (#$(target-linux?) "linux") (else "")))) #~()) #$@(if (%current-target-system) #~("CROSS_COMPILE=1") #~()) (string-append "NSPR_INCLUDE_DIR=" (search-input-directory %build-inputs "include/nspr")) ;; Add $out/lib/nss to RPATH. (string-append "RPATH=" rpath) (string-append "LDFLAGS=" rpath))) #:modules '((guix build gnu-build-system) (guix build utils) (ice-9 ftw) (ice-9 match) (srfi srfi-26)) #:tests? (not (or (%current-target-system) ;; Tests take more than 30 hours on some architectures. (target-riscv64?) (target-ppc32?))) #:phases #~(modify-phases %standard-phases (replace 'configure (lambda _ (setenv "CC" #$(cc-for-target)) (setenv "CCC" #$(cxx-for-target)) (setenv "NATIVE_CC" "gcc") ;; No VSX on powerpc-linux. (when #$(target-ppc32?) (setenv "NSS_DISABLE_CRYPTO_VSX" "1")) ;; Tells NSS to build for the 64-bit ABI if we are 64-bit system. (when #$(target-64bit?) (setenv "USE_64" "1")))) (replace 'check (lambda* (#:key tests? #:allow-other-keys) (if tests? (begin ;; Use 127.0.0.1 instead of $HOST.$DOMSUF as HOSTADDR for ;; testing. The latter requires a working DNS or /etc/hosts. (setenv "DOMSUF" "localdomain") (setenv "USE_IP" "TRUE") (setenv "IP_ADDRESS" "127.0.0.1") ;; This specific test is looking at performance "now ;; verify that we can quickly dump a database", and ;; we're not testing performance here (especially ;; since we're using faketime), so raise the ;; threshold (substitute* "nss/tests/dbtests/dbtests.sh" ((" -lt 5") " -lt 50")) (unless #$(target-64bit?) ;; The script fails to determine the source ;; directory when running under 'datefudge' (see ;; ). Help it. (substitute* "nss/tests/gtests/gtests.sh" (("SOURCE_DIR=.*") (string-append "SOURCE_DIR=" (getcwd) "/nss\n")))) ;; The "PayPalEE.cert" certificate expires every six months, ;; leading to test failures: ;; . To ;; work around that, set the time to roughly the release date. (invoke #$(if (target-64bit?) "faketime" "datefudge") #$%nss-release-date "./nss/tests/all.sh")) (format #t "test suite not run~%")))) (replace 'install (lambda _ (let* ((inc (string-append #$output "/include/nss")) (lib (string-append #$output "/lib/nss")) (obj (match (scandir "dist" (cut string-suffix? "OBJ" <>)) ((obj) (string-append "dist/" obj))))) ;; Install nss-config to $out/bin. (install-file (string-append obj "/bin/nss-config") (string-append #$output "/bin")) (delete-file (string-append obj "/bin/nss-config")) ;; Install nss.pc to $out/lib/pkgconfig. (install-file (string-append obj "/lib/pkgconfig/nss.pc") (string-append #$output "/lib/pkgconfig")) (delete-file (string-append obj "/lib/pkgconfig/nss.pc")) (rmdir (string-append obj "/lib/pkgconfig")) ;; Install other files. (copy-recursively "dist/public/nss" inc) (copy-recursively (string-append obj "/bin") #$output:bin) (copy-recursively (string-append obj "/lib") lib)))) (add-after 'install 'move-static-archives (lambda _ (with-directory-excursion #$output (for-each (lambda (f) (install-file f (string-append #$output:static "/" (dirname f)))) (find-files "." "\\.a$")))))))) (inputs (list sqlite zlib)) (propagated-inputs (list nspr)) ;required by nss.pc. (native-inputs (list perl ;for tests (if (target-64bit?) libfaketime datefudge) which)) ;; The NSS test suite takes around 48 hours on Loongson 3A (MIPS) when ;; another build is happening concurrently on the same machine. (properties '((timeout . 216000))) ;60 hours (home-page "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS") (synopsis "Network Security Services (ESR)") (description "Network Security Services (@dfn{NSS}) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards. This package tracks the Extended Support Release (ESR) channel.") (license license:mpl2.0))) ;; nss-rapid tracks the rapid release channel. Unless your package requires a ;; newer version, you should prefer the `nss' package, which tracks the ESR ;; channel. ;; ;; See https://wiki.mozilla.org/NSS:Release_Versions ;; and https://wiki.mozilla.org/Rapid_Release_Model (define-public nss-rapid (package (inherit nss) (name "nss-rapid") (version "3.110") (source (origin (inherit (package-source nss)) (uri (let ((version-with-underscores (string-join (string-split version #\.) "_"))) (string-append "https://ftp.mozilla.org/pub/mozilla.org/security/nss/" "releases/NSS_" version-with-underscores "_RTM/src/" "nss-" version ".tar.gz"))) (sha256 (base32 "09xfndqj07wy28l7jnk01gqa4bh55nz6cldlp5qpg8120k211mlw")) (patches (remove (cut string-contains <> "nss-disable-broken-tests.patch") (origin-patches (package-source nss)))))) (arguments (substitute-keyword-arguments (package-arguments nss) ((#:phases phases) #~(modify-phases #$phases (add-after 'unpack 'neutralize-network-test ;; Test tries to resolve `wrong.host.badssl.com' which fails due ;; to no networking in the build environment. ;; Behavior changed as of 3.110. (lambda _ (substitute* "nss/tests/ssl/ssl.sh" ((" ssl_policy_pkix_ocsp" all) (string-append "#" all))))) (replace 'check (lambda* (#:key tests? #:allow-other-keys) (if tests? (begin ;; Use 127.0.0.1 instead of $HOST.$DOMSUF as HOSTADDR for ;; testing. The latter requires a working DNS or /etc/hosts. (setenv "DOMSUF" "localdomain") (setenv "USE_IP" "TRUE") (setenv "IP_ADDRESS" "127.0.0.1") ;; This specific test is looking at performance "now ;; verify that we can quickly dump a database", and ;; we're not testing performance here (especially ;; since we're using faketime), so raise the ;; threshold (substitute* "nss/tests/dbtests/dbtests.sh" ((" -lt 5") " -lt 50")) ;; Since the test suite is very lengthy, run the test ;; suite once, not thrice as done by default, by ;; selecting only the 'standard' cycle. (setenv "NSS_CYCLES" "standard") ;; The "PayPalEE.cert" certificate expires every six months, ;; leading to test failures: ;; . To ;; work around that, set the time to roughly the release date. (invoke #$(if (target-64bit?) "faketime" "datefudge") "2025-03-28" "./nss/tests/all.sh")) (format #t "test suite not run~%")))))))) (synopsis "Network Security Services (Rapid Release)") (description "Network Security Services (@dfn{NSS}) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards. This package tracks the Rapid Release channel, which updates frequently."))) (define-public nss-certs (package (inherit nss) (name "nss-certs") (build-system gnu-build-system) (outputs '("out")) (native-inputs (list certdata2pem openssl)) (inputs '()) (propagated-inputs '()) (arguments (list #:modules '((guix build gnu-build-system) (guix build utils) (rnrs io ports) (srfi srfi-26)) #:phases #~(modify-phases (map (cut assq <> %standard-phases) '(set-paths install-locale unpack)) (add-after 'unpack 'install (lambda _ (let ((certsdir (string-append #$output "/etc/ssl/certs/"))) (with-directory-excursion "nss/lib/ckfw/builtins/" (unless (file-exists? "blacklist.txt") (call-with-output-file "blacklist.txt" (const #t))) ;; Extract selected single certificates from blob. (invoke "certdata2pem") ;; Copy .pem files into the output. (for-each (cut install-file <> certsdir) (find-files "." ".*\\.pem$"))) (invoke "openssl" "rehash" certsdir))))))) (synopsis "CA certificates from Mozilla") (description "This package provides certificates for Certification Authorities (CA) taken from the NSS package and thus ultimately from the Mozilla project.") (home-page "https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS") (license license:mpl2.0))) (define-public nss-certs-for-test (hidden-package (package (inherit nss-certs) (name "nss-certs-for-test") (source #f) (build-system trivial-build-system) (native-inputs (list nss-certs)) (inputs '()) (propagated-inputs '()) (arguments (list #:modules '((guix build utils) (rnrs io ports) (srfi srfi-26)) #:builder #~(begin (use-modules (guix build utils) (rnrs io ports) (srfi srfi-26)) (define certs-dir (string-append #$output "/etc/ssl/certs/")) (define ca-files (find-files (string-append #+(this-package-native-input "nss-certs") "/etc/ssl/certs") (lambda (file stat) (string-suffix? ".pem" file)))) (define (concatenate-files files result) "Make RESULT the concatenation of all of FILES." (define (dump file port) (display (call-with-input-file file get-string-all) port) (newline port)) (call-with-output-file result (lambda (port) (for-each (cut dump <> port) files)))) (mkdir-p certs-dir) (concatenate-files ca-files (string-append certs-dir "/ca-certificates.crt")) (for-each (cut install-file <> certs-dir) ca-files)))) (native-search-paths (list $SSL_CERT_DIR $SSL_CERT_FILE))))) (define-public nsncd (package (name "nsncd") (version "1.5.1") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/twosigma/nsncd") (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 (base32 "1qiphwlwbnni2vfqjbdzv2a1qgqv2ycmygmyrbx8pgaak9gl5hfi")))) (build-system cargo-build-system) (arguments `(#:cargo-test-flags '("--" ;; These tests fail with the current builder network setup "--skip=ffi::test_gethostbyaddr_r" "--skip=ffi::test_gethostbyname2_r" "--skip=handlers::test::test_handle_getservbyname_name" "--skip=handlers::test::test_handle_getservbyname_name_proto" "--skip=handlers::test::test_handle_getservbyport_port" "--skip=handlers::test::test_handle_getservbyport_port_proto" "--skip=handlers::test::test_handle_getservbyport_port_proto_aliases") #:install-source? #f #:cargo-inputs (("rust-anyhow" ,rust-anyhow-1) ("rust-atoi" ,rust-atoi-2) ("rust-slog" ,rust-slog-2) ("rust-slog-async" ,rust-slog-async-2) ("rust-slog-term" ,rust-slog-term-2) ("rust-crossbeam-channel" ,rust-crossbeam-channel-0.5) ("rust-nix" ,rust-nix-0.28) ("rust-num-derive" ,rust-num-derive-0.3) ("rust-num-traits" ,rust-num-traits-0.2) ("rust-sd-notify" ,rust-sd-notify-0.4) ("rust-static-assertions" ,rust-static-assertions-1) ("rust-dns-lookup" ,rust-dns-lookup-2)) #:cargo-development-inputs (("rust-criterion" ,rust-criterion-0.5) ("rust-temp-env" ,rust-temp-env-0.3)))) (home-page "https://github.com/twosigma/nsncd") (synopsis "The name service non-caching daemon") (description "This package provides @command{nscd}, a daemon compatible that proxies lookups, compatible with the GNU C Library's @command{nscd}, but without caching. It can be used in situations where you want to make an application use @acronym{NSS, Name Service Switch} plugins available to a different libc than the one the application will load.") (license (list license:asl2.0))))