aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
21 lines
502 B
Nix
21 lines
502 B
Nix
{ stdenv, fetchurl, yacc, lzo, db4 }:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "netboot-0.10.2";
|
|
src = fetchurl {
|
|
url = "mirror://sourceforge/netboot/${name}.tar.gz";
|
|
sha256 = "09w09bvwgb0xzn8hjz5rhi3aibysdadbg693ahn8rylnqfq4hwg0";
|
|
};
|
|
|
|
buildInputs = [ yacc lzo db4 ];
|
|
|
|
hardeningDisable = [ "format" ];
|
|
|
|
meta = with stdenv.lib; {
|
|
description = "Mini PXE server";
|
|
maintainers = [ maintainers.raskin ];
|
|
platforms = ["x86_64-linux"];
|
|
license = stdenv.lib.licenses.free;
|
|
};
|
|
}
|