aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
26 lines
789 B
Nix
26 lines
789 B
Nix
{ fetchurl, stdenv, ncurses, curl, pkgconfig, gnutls, readline, openssl, perl, libjpeg
|
|
, libzrtpcpp, gcc48 }:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "freeswitch-1.2.3";
|
|
|
|
src = fetchurl {
|
|
url = http://files.freeswitch.org/freeswitch-1.2.3.tar.bz2;
|
|
sha256 = "0kfvn5f75c6r6yp18almjz9p6llvpm66gpbxcjswrg3ddgbkzg0k";
|
|
};
|
|
|
|
buildInputs = [ ncurses curl pkgconfig gnutls readline openssl perl libjpeg
|
|
libzrtpcpp gcc48 ];
|
|
|
|
NIX_CFLAGS_COMPILE = "-Wno-error=cpp";
|
|
|
|
hardeningDisable = [ "format" ];
|
|
|
|
meta = {
|
|
description = "Cross-Platform Scalable FREE Multi-Protocol Soft Switch";
|
|
homepage = http://freeswitch.org/;
|
|
license = stdenv.lib.licenses.mpl11;
|
|
maintainers = with stdenv.lib.maintainers; [ viric ];
|
|
platforms = with stdenv.lib.platforms; linux;
|
|
};
|
|
}
|