nixpkgs/pkgs/os-specific/linux/ifenslave/default.nix
Franz Pletz aff1f4ab94 Use general hardening flag toggle lists
The following parameters are now available:

  * hardeningDisable
    To disable specific hardening flags
  * hardeningEnable
    To enable specific hardening flags

Only the cc-wrapper supports this right now, but these may be reused by
other wrappers, builders or setup hooks.

cc-wrapper supports the following flags:

  * fortify
  * stackprotector
  * pie (disabled by default)
  * pic
  * strictoverflow
  * format
  * relro
  * bindnow
2016-03-05 18:55:26 +01:00

29 lines
642 B
Nix

{ stdenv, fetchurl }:
stdenv.mkDerivation rec {
name = "ifenslave-${version}";
version = "1.1.0";
src = fetchurl {
url = "mirror://debian/pool/main/i/ifenslave-2.6/ifenslave-2.6_${version}.orig.tar.gz";
sha256 = "0h9hrmy19zdksl7ys250r158b943ihbgkb95n8p4k8l0vqsby5vr";
};
buildPhase = ''
gcc -o ifenslave ifenslave.c
'';
installPhase = ''
mkdir -p $out/bin
cp -a ifenslave $out/bin
'';
hardeningDisable = [ "format" ];
meta = {
description = "Utility for enslaving networking interfaces under a bond";
license = stdenv.lib.licenses.gpl2;
platforms = stdenv.lib.platforms.linux;
};
}