aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
18 lines
491 B
Nix
18 lines
491 B
Nix
{ stdenv, fetchurl, pkgconfig, gtk, gettext, libxml2, intltool, libart_lgpl }:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "libgnomecups-0.2.3";
|
|
|
|
src = fetchurl {
|
|
url = "mirror://gnome/sources/libgnomecups/0.2/${name}.tar.bz2";
|
|
sha256 = "0a8xdaxzz2wc0n1fjcav65093gixzyac3948l8cxx1mk884yhc71";
|
|
};
|
|
|
|
hardeningDisable = [ "format" ];
|
|
|
|
patches = [ ./glib.patch ./cups_1.6.patch ];
|
|
|
|
buildInputs = [ pkgconfig gtk gettext intltool libart_lgpl ];
|
|
|
|
propagatedBuildInputs = [ libxml2 ];
|
|
}
|