nixpkgs/pkgs/applications/misc/xpdf/default.nix

42 lines
1.2 KiB
Nix
Raw Normal View History

{ enableGUI ? true, enablePDFtoPPM ? true, useT1Lib ? false
2017-08-28 23:08:01 +02:00
, stdenv, fetchurl, zlib, libpng, freetype ? null, t1lib ? null
, cmake, qtbase ? null
}:
2017-08-28 23:08:01 +02:00
assert enableGUI -> qtbase != null && freetype != null;
assert enablePDFtoPPM -> freetype != null;
assert useT1Lib -> t1lib != null;
assert !useT1Lib; # t1lib has multiple unpatched security vulnerabilities
stdenv.mkDerivation {
2017-08-26 01:07:31 +02:00
name = "xpdf-4.00";
2017-08-26 01:07:31 +02:00
src = fetchurl {
url = http://www.xpdfreader.com/dl/xpdf-4.00.tar.gz;
sha256 = "1mhn89738vjva14xr5gblc2zrdgzmpqbbjdflqdmpqv647294ggz";
};
2017-08-28 23:08:01 +02:00
nativeBuildInputs = [ cmake ];
cmakeFlags = ["-DSYSTEM_XPDFRC=/etc/xpdfrc" "-DA4_PAPER=ON"];
buildInputs = [ zlib libpng ] ++
2017-08-28 23:08:01 +02:00
stdenv.lib.optional enableGUI qtbase ++
stdenv.lib.optional useT1Lib t1lib ++
stdenv.lib.optional enablePDFtoPPM freetype;
# Debian uses '-fpermissive' to bypass some errors on char* constantness.
CXXFLAGS = "-O2 -fpermissive";
2016-07-28 03:42:58 +02:00
hardeningDisable = [ "format" ];
meta = {
homepage = http://www.foolabs.com/xpdf/;
description = "Viewer for Portable Document Format (PDF) files";
platforms = stdenv.lib.platforms.unix;
maintainers = [ stdenv.lib.maintainers.peti ];
};
}