aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
26 lines
614 B
Nix
26 lines
614 B
Nix
{ stdenv, lib, fetchurl, ncurses }:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "ht-${version}";
|
|
version = "2.1.0";
|
|
|
|
src = fetchurl {
|
|
url = "http://sourceforge.net/projects/hte/files/ht-source/ht-${version}.tar.bz2";
|
|
sha256 = "0w2xnw3z9ws9qrdpb80q55h6ynhh3aziixcfn45x91bzrbifix9i";
|
|
};
|
|
|
|
buildInputs = [
|
|
ncurses
|
|
];
|
|
|
|
hardeningDisable = [ "format" ];
|
|
|
|
meta = with lib; {
|
|
description = "File editor/viewer/analyzer for executables";
|
|
homepage = "http://hte.sourceforge.net";
|
|
license = licenses.gpl2;
|
|
platforms = platforms.linux;
|
|
maintainers = with maintainers; [ cstrahan ];
|
|
};
|
|
}
|