aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
23 lines
587 B
Nix
23 lines
587 B
Nix
{stdenv, fetchurl, zlib, libpng, freetype, libjpeg, fontconfig}:
|
|
|
|
stdenv.mkDerivation {
|
|
name = "gd-2.0.35";
|
|
|
|
src = fetchurl {
|
|
url = http://www.libgd.org/releases/gd-2.0.35.tar.bz2;
|
|
sha256 = "1y80lcmb8qbzf0a28841zxhq9ndfapmh2fsrqfd9lalxfj8288mz";
|
|
};
|
|
|
|
buildInputs = [zlib libpng freetype];
|
|
|
|
propagatedBuildInputs = [libjpeg fontconfig]; # urgh
|
|
|
|
hardeningDisable = [ "format" ];
|
|
|
|
configureFlags = "--without-x";
|
|
|
|
meta = {
|
|
homepage = http://www.libgd.org/;
|
|
description = "An open source code library for the dynamic creation of images by programmers";
|
|
};
|
|
}
|