aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
30 lines
814 B
Nix
30 lines
814 B
Nix
{stdenv, fetchurl, libao, libmad, libid3tag, zlib, alsaLib}:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "mpg321-${version}";
|
|
version = "0.3.2";
|
|
|
|
src = fetchurl {
|
|
url = "mirror://sourceforge/mpg321/${version}/mpg321_${version}.orig.tar.gz";
|
|
sha256 = "0ki8mh76bbmdh77qsiw682dvi8y468yhbdabqwg05igmwc1wqvq5";
|
|
};
|
|
|
|
hardeningDisable = [ "format" ];
|
|
|
|
configureFlags = [
|
|
("--enable-alsa=" + (if stdenv.isLinux then "yes" else "no"))
|
|
];
|
|
|
|
buildInputs = [libao libid3tag libmad zlib]
|
|
++ stdenv.lib.optional stdenv.isLinux alsaLib;
|
|
|
|
installTargets = "install install-man";
|
|
|
|
meta = with stdenv.lib; {
|
|
description = "Command-line MP3 player";
|
|
homepage = http://mpg321.sourceforge.net/;
|
|
license = licenses.gpl2;
|
|
maintainers = [ maintainers.rycee ];
|
|
platforms = platforms.gnu;
|
|
};
|
|
}
|