2021-01-11 07:54:33 +00:00
|
|
|
{ lib, stdenv, fetchurl, callPackage, libpng12, imagemagick
|
2021-01-19 06:50:56 +00:00
|
|
|
, autoreconfHook, glib, pstoedit, pkg-config, gettext, gd, darwin
|
2019-02-26 11:45:54 +00:00
|
|
|
, runtimeShell }:
|
2017-05-23 18:23:01 +01:00
|
|
|
|
|
|
|
# TODO: Figure out why the resultant binary is somehow linked against
|
|
|
|
# libpng16.so.16 rather than libpng12.
|
|
|
|
|
|
|
|
stdenv.mkDerivation rec {
|
2019-08-15 13:41:18 +01:00
|
|
|
pname = "autotrace";
|
2017-05-23 18:23:01 +01:00
|
|
|
version = "0.31.1";
|
|
|
|
|
|
|
|
src = fetchurl {
|
2019-08-15 13:41:18 +01:00
|
|
|
url = "mirror://sourceforge/autotrace/AutoTrace/0.31.1/${pname}-${version}.tar.gz";
|
2017-05-23 18:23:01 +01:00
|
|
|
sha256 = "1xmgja5fv48mdbsa51inf7ksz36nqd6bsaybrk5xgprm6cy946js";
|
|
|
|
};
|
|
|
|
|
|
|
|
# The below commented out part is for an identically-named project
|
|
|
|
# on GitHub which appears to derive somehow from the Sourceforge
|
|
|
|
# version, but I have no idea what the lineage is of this project.
|
|
|
|
# It will build, but it segfaults when I attempt to run -centerline.
|
|
|
|
# Someone may need this for some reason, so I've left it here.
|
|
|
|
#
|
|
|
|
#src = fetchFromGitHub {
|
|
|
|
# owner = "autotrace";
|
|
|
|
# repo = "autotrace";
|
|
|
|
# rev = "b3ac8818d86943102cb4f13734e0b527c42dc45a";
|
|
|
|
# sha256 = "0z5h2mvxwckk2msi361zk1nc9fdcvxyimyc2hlyqd6h8k3p7zdi4";
|
|
|
|
#};
|
|
|
|
#postConfigure = ''
|
|
|
|
# sed -i -e "s/at_string/gchar */g" *.c
|
|
|
|
# sed -i -e "s/at_address/gpointer/g" *.c
|
|
|
|
# sed -i -e "s/at_bitmap_type/struct _at_bitmap/g" *.c
|
|
|
|
# sed -i -e "s/AT_BITMAP_BITS(bitmap)/AT_BITMAP_BITS(\&bitmap)/g" input-magick.c
|
|
|
|
#'';
|
|
|
|
|
|
|
|
autofig = callPackage ./autofig.nix {};
|
2021-01-19 06:50:56 +00:00
|
|
|
nativeBuildInputs = [ autoreconfHook glib autofig pkg-config gettext ];
|
2017-05-23 18:23:01 +01:00
|
|
|
buildInputs = [ libpng12 imagemagick pstoedit ]
|
2021-01-15 13:21:58 +00:00
|
|
|
++ lib.optionals stdenv.isDarwin
|
2017-09-08 20:08:15 +01:00
|
|
|
(with darwin.apple_sdk.frameworks; [ gd ApplicationServices ]);
|
|
|
|
|
2017-05-23 18:23:01 +01:00
|
|
|
postUnpack = ''
|
|
|
|
pushd $sourceRoot
|
|
|
|
autofig autotrace-config.af
|
|
|
|
popd
|
|
|
|
'';
|
|
|
|
|
|
|
|
# This complains about various m4 files, but it appears to not be an
|
|
|
|
# actual error.
|
2017-06-30 15:30:12 +01:00
|
|
|
preConfigure = ''
|
|
|
|
glib-gettextize --copy --force
|
|
|
|
# pstoedit-config no longer exists, it was replaced with pkg-config
|
|
|
|
mkdir wrappers
|
|
|
|
cat >wrappers/pstoedit-config <<'EOF'
|
2019-02-26 11:45:54 +00:00
|
|
|
#!${runtimeShell}
|
2017-06-30 15:30:12 +01:00
|
|
|
# replace --version with --modversion for pkg-config
|
|
|
|
args=''${@/--version/--modversion}
|
|
|
|
exec pkg-config pstoedit "''${args[@]}"
|
|
|
|
EOF
|
|
|
|
chmod +x wrappers/pstoedit-config
|
|
|
|
export PATH="$PATH:$PWD/wrappers"
|
|
|
|
'';
|
2017-05-23 18:23:01 +01:00
|
|
|
|
2021-01-11 07:54:33 +00:00
|
|
|
meta = with lib; {
|
2020-04-01 02:11:51 +01:00
|
|
|
homepage = "http://autotrace.sourceforge.net/";
|
2017-05-23 18:23:01 +01:00
|
|
|
description = "Utility for converting bitmap into vector graphics";
|
|
|
|
platforms = platforms.unix;
|
|
|
|
maintainers = with maintainers; [ hodapp ];
|
|
|
|
license = licenses.gpl2;
|
2017-10-27 15:38:05 +01:00
|
|
|
knownVulnerabilities = [
|
|
|
|
"CVE-2013-1953"
|
|
|
|
"CVE-2016-7392"
|
|
|
|
"CVE-2017-9151"
|
|
|
|
"CVE-2017-9152"
|
|
|
|
"CVE-2017-9153"
|
|
|
|
"CVE-2017-9154"
|
|
|
|
"CVE-2017-9155"
|
|
|
|
"CVE-2017-9156"
|
|
|
|
"CVE-2017-9157"
|
|
|
|
"CVE-2017-9158"
|
|
|
|
"CVE-2017-9159"
|
|
|
|
"CVE-2017-9160"
|
|
|
|
"CVE-2017-9161"
|
|
|
|
"CVE-2017-9162"
|
|
|
|
"CVE-2017-9163"
|
|
|
|
"CVE-2017-9164"
|
|
|
|
"CVE-2017-9165"
|
|
|
|
"CVE-2017-9166"
|
|
|
|
"CVE-2017-9167"
|
|
|
|
"CVE-2017-9168"
|
|
|
|
"CVE-2017-9169"
|
|
|
|
"CVE-2017-9170"
|
|
|
|
"CVE-2017-9171"
|
|
|
|
"CVE-2017-9172"
|
|
|
|
"CVE-2017-9173"
|
|
|
|
"CVE-2017-9174"
|
|
|
|
"CVE-2017-9175"
|
|
|
|
"CVE-2017-9176"
|
|
|
|
"CVE-2017-9177"
|
|
|
|
"CVE-2017-9178"
|
|
|
|
"CVE-2017-9179"
|
|
|
|
"CVE-2017-9180"
|
|
|
|
"CVE-2017-9181"
|
|
|
|
"CVE-2017-9182"
|
|
|
|
"CVE-2017-9183"
|
|
|
|
"CVE-2017-9184"
|
|
|
|
"CVE-2017-9185"
|
|
|
|
"CVE-2017-9186"
|
|
|
|
"CVE-2017-9187"
|
|
|
|
"CVE-2017-9188"
|
|
|
|
"CVE-2017-9189"
|
|
|
|
"CVE-2017-9190"
|
|
|
|
"CVE-2017-9191"
|
|
|
|
"CVE-2017-9192"
|
|
|
|
"CVE-2017-9193"
|
|
|
|
"CVE-2017-9194"
|
|
|
|
"CVE-2017-9195"
|
|
|
|
"CVE-2017-9196"
|
|
|
|
"CVE-2017-9197"
|
|
|
|
"CVE-2017-9198"
|
|
|
|
"CVE-2017-9199"
|
|
|
|
"CVE-2017-9200"
|
|
|
|
];
|
2017-05-23 18:23:01 +01:00
|
|
|
};
|
|
|
|
}
|