summaryrefslogtreecommitdiff
path: root/contrib/packages
diff options
context:
space:
mode:
authorng0 <ng0@infotropique.org>2017-08-19 10:24:06 +0000
committerng0 <ng0@infotropique.org>2017-08-19 10:24:06 +0000
commit2468776e9cd952364903c88e4ceba055dd2aff02 (patch)
tree5d9670d732501515571083c7567d7e880806418d /contrib/packages
parentcf6497347f433d188a6c32f03f8d5c5fa83104de (diff)
default.nix, gnunet-dev.nix: Move to contrib/packages/nix/.
Signed-off-by: ng0 <ng0@infotropique.org>
Diffstat (limited to 'contrib/packages')
-rw-r--r--contrib/packages/nix/default.nix78
-rw-r--r--contrib/packages/nix/gnunet-dev.nix83
2 files changed, 161 insertions, 0 deletions
diff --git a/contrib/packages/nix/default.nix b/contrib/packages/nix/default.nix
new file mode 100644
index 000000000..ffbcd4c44
--- /dev/null
+++ b/contrib/packages/nix/default.nix
@@ -0,0 +1,78 @@
+# Nix package for GNUnet development
+#
+## INSTALL
+#
+# To build and install the package in the user environment, use:
+#
+# $ nix-env -f . -i
+#
+## BUILD ONLY
+#
+# To build the package and add it to the nix store, use:
+#
+# $ nix-build
+#
+## SHELL
+#
+# To launch a shell with all dependencies installed in the environment, use one of the following:
+# $ nix-shell
+#
+# After entering nix-shell, build it:
+#
+# $ configurePhase
+# $ buildPhase
+#
+## NIXPKGS
+#
+# For all of the above commands, nixpkgs to use can be set the following way:
+#
+# a) by default it uses nixpkgs pinned to a known working version
+#
+# b) use nixpkgs from the system:
+# --arg pkgs 0
+#
+# c) use nixpkgs at a given path
+# --arg pkgs /path/to/nixpkgs
+#
+## CCACHE
+#
+# To enable ccache, use the following:
+#
+# --argstr ccache_dir /var/cache/ccache
+
+# or when using nix-shell:
+# --argstr ccache_dir ~/.ccache
+#
+# and make sure the given directory is writable by the nixpkgs group when using nix-build or nix-env -i,
+# or the current user when using nix-shell
+#
+
+{
+ pkgs ? null,
+ ccache_dir ? "",
+}:
+
+let
+ syspkgs = import <nixpkgs> { };
+ pinpkgs = syspkgs.fetchFromGitHub {
+ owner = "NixOS";
+ repo = "nixpkgs";
+
+ # binary cache exists for revisions in https://nixos.org/releases/nixos/<release>/<build>/git-revision
+ rev = "c4469edac1fc1fa5e5b5aa2ceadeda8f3f92d30a"; # https://nixos.org/releases/nixos/16.09/nixos-16.09beta430.c4469ed/git-revision
+ sha256 = "1x6hmf815d5anfxrxl6iivfkk60q5qxa6waa9xnwhwkbc14rhvn9";
+ };
+ usepkgs = if null == pkgs then
+ import pinpkgs {}
+ else
+ if 0 == pkgs then
+ import <nixpkgs> { }
+ else
+ import pkgs {};
+ stdenv = usepkgs.stdenvAdapters.keepDebugInfo usepkgs.stdenv;
+
+in {
+ gnunet-dev = usepkgs.callPackage ./gnunet-dev.nix {
+ inherit ccache_dir;
+ };
+}
diff --git a/contrib/packages/nix/gnunet-dev.nix b/contrib/packages/nix/gnunet-dev.nix
new file mode 100644
index 000000000..89b65f6b4
--- /dev/null
+++ b/contrib/packages/nix/gnunet-dev.nix
@@ -0,0 +1,83 @@
+{ stdenv, makeWrapper, pkgconfig, autoconf, automake, ccache, ccache_dir ? ""
+, adns, curl, gettext, gmp, gnutls, gss, ncurses, openldap
+, jansson, zlib, sqlite, mariadb, postgresql
+, libextractor, libgcrypt, libgnurl, libidn, libmicrohttpd
+, libpsl, libtool, libunistring, libxml2
+}:
+
+stdenv.mkDerivation rec {
+ src = ./.;
+ name = "gnunet-dev";
+
+ buildInputs = [
+ makeWrapper pkgconfig autoconf automake ccache
+ adns curl gettext gmp gnutls gss ncurses openldap
+ jansson zlib sqlite mariadb postgresql
+ libextractor libgcrypt libgnurl libidn libmicrohttpd
+ libpsl libtool libunistring libxml2
+ ];
+
+ patchPhase = ''
+ if [ -e Makefile ]; then
+ make distclean
+ fi
+ '';
+
+ NIX_CFLAGS_COMPILE = "-ggdb -O0";
+
+ configureFlags = [
+ "--enable-gcc-hardening"
+ "--enable-linker-hardening"
+
+ "--enable-poisoning"
+ "--enable-sanitizer"
+ "--enable-experimental"
+ "--enable-logging=verbose"
+ ];
+
+ preConfigure = ''
+ ./bootstrap
+ configureFlags="$configureFlags --with-nssdir=$out/lib"
+
+ if [ -n "${ccache_dir}" ]; then
+ export CC='ccache gcc'
+ export CCACHE_COMPRESS=1
+ export CCACHE_DIR="${ccache_dir}"
+ export CCACHE_UMASK=007
+ fi
+ '';
+
+ doCheck = false;
+
+ postInstall = ''
+ # Tests can be run this way
+ #export GNUNET_PREFIX="$out"
+ #export PATH="$out/bin:$PATH"
+ #make -k check
+ '';
+
+ meta = with stdenv.lib; {
+ description = "GNU's decentralized anonymous and censorship-resistant P2P framework";
+
+ longDescription = ''
+ GNUnet is a framework for secure peer-to-peer networking that
+ does not use any centralized or otherwise trusted services. A
+ first service implemented on top of the networking layer
+ allows anonymous censorship-resistant file-sharing. Anonymity
+ is provided by making messages originating from a peer
+ indistinguishable from messages that the peer is routing. All
+ peers act as routers and use link-encrypted connections with
+ stable bandwidth utilization to communicate with each other.
+ GNUnet uses a simple, excess-based economic model to allocate
+ resources. Peers in GNUnet monitor each others behavior with
+ respect to resource usage; peers that contribute to the
+ network are rewarded with better service.
+ '';
+
+ homepage = https://gnunet.org/;
+
+ license = licenses.gpl3Plus;
+ platforms = platforms.gnu;
+ maintainers = with maintainers; [ ];
+ };
+}