aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
20 lines
474 B
Nix
20 lines
474 B
Nix
{stdenv, fetchurl}:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "fribidi-${version}";
|
|
version = "0.19.6";
|
|
|
|
src = fetchurl {
|
|
url = "http://fribidi.org/download/${name}.tar.bz2";
|
|
sha256 = "0zg1hpaml34ny74fif97j7ngrshlkl3wk3nja3gmlzl17i1bga6b";
|
|
};
|
|
|
|
hardeningDisable = [ "format" ];
|
|
|
|
meta = with stdenv.lib; {
|
|
homepage = http://fribidi.org/;
|
|
description = "GNU implementation of the Unicode Bidirectional Algorithm (bidi)";
|
|
license = licenses.gpl2;
|
|
};
|
|
}
|