From 2468776e9cd952364903c88e4ceba055dd2aff02 Mon Sep 17 00:00:00 2001 From: ng0 Date: Sat, 19 Aug 2017 10:24:06 +0000 Subject: default.nix, gnunet-dev.nix: Move to contrib/packages/nix/. Signed-off-by: ng0 --- contrib/packages/nix/default.nix | 78 ++++++++++++++++++++++++++++++++++ contrib/packages/nix/gnunet-dev.nix | 83 +++++++++++++++++++++++++++++++++++++ 2 files changed, 161 insertions(+) create mode 100644 contrib/packages/nix/default.nix create mode 100644 contrib/packages/nix/gnunet-dev.nix (limited to 'contrib/packages/nix') diff --git a/contrib/packages/nix/default.nix b/contrib/packages/nix/default.nix new file mode 100644 index 000000000..ffbcd4c44 --- /dev/null +++ b/contrib/packages/nix/default.nix @@ -0,0 +1,78 @@ +# Nix package for GNUnet development +# +## INSTALL +# +# To build and install the package in the user environment, use: +# +# $ nix-env -f . -i +# +## BUILD ONLY +# +# To build the package and add it to the nix store, use: +# +# $ nix-build +# +## SHELL +# +# To launch a shell with all dependencies installed in the environment, use one of the following: +# $ nix-shell +# +# After entering nix-shell, build it: +# +# $ configurePhase +# $ buildPhase +# +## NIXPKGS +# +# For all of the above commands, nixpkgs to use can be set the following way: +# +# a) by default it uses nixpkgs pinned to a known working version +# +# b) use nixpkgs from the system: +# --arg pkgs 0 +# +# c) use nixpkgs at a given path +# --arg pkgs /path/to/nixpkgs +# +## CCACHE +# +# To enable ccache, use the following: +# +# --argstr ccache_dir /var/cache/ccache + +# or when using nix-shell: +# --argstr ccache_dir ~/.ccache +# +# and make sure the given directory is writable by the nixpkgs group when using nix-build or nix-env -i, +# or the current user when using nix-shell +# + +{ + pkgs ? null, + ccache_dir ? "", +}: + +let + syspkgs = import { }; + pinpkgs = syspkgs.fetchFromGitHub { + owner = "NixOS"; + repo = "nixpkgs"; + + # binary cache exists for revisions in https://nixos.org/releases/nixos///git-revision + rev = "c4469edac1fc1fa5e5b5aa2ceadeda8f3f92d30a"; # https://nixos.org/releases/nixos/16.09/nixos-16.09beta430.c4469ed/git-revision + sha256 = "1x6hmf815d5anfxrxl6iivfkk60q5qxa6waa9xnwhwkbc14rhvn9"; + }; + usepkgs = if null == pkgs then + import pinpkgs {} + else + if 0 == pkgs then + import { } + else + import pkgs {}; + stdenv = usepkgs.stdenvAdapters.keepDebugInfo usepkgs.stdenv; + +in { + gnunet-dev = usepkgs.callPackage ./gnunet-dev.nix { + inherit ccache_dir; + }; +} diff --git a/contrib/packages/nix/gnunet-dev.nix b/contrib/packages/nix/gnunet-dev.nix new file mode 100644 index 000000000..89b65f6b4 --- /dev/null +++ b/contrib/packages/nix/gnunet-dev.nix @@ -0,0 +1,83 @@ +{ stdenv, makeWrapper, pkgconfig, autoconf, automake, ccache, ccache_dir ? "" +, adns, curl, gettext, gmp, gnutls, gss, ncurses, openldap +, jansson, zlib, sqlite, mariadb, postgresql +, libextractor, libgcrypt, libgnurl, libidn, libmicrohttpd +, libpsl, libtool, libunistring, libxml2 +}: + +stdenv.mkDerivation rec { + src = ./.; + name = "gnunet-dev"; + + buildInputs = [ + makeWrapper pkgconfig autoconf automake ccache + adns curl gettext gmp gnutls gss ncurses openldap + jansson zlib sqlite mariadb postgresql + libextractor libgcrypt libgnurl libidn libmicrohttpd + libpsl libtool libunistring libxml2 + ]; + + patchPhase = '' + if [ -e Makefile ]; then + make distclean + fi + ''; + + NIX_CFLAGS_COMPILE = "-ggdb -O0"; + + configureFlags = [ + "--enable-gcc-hardening" + "--enable-linker-hardening" + + "--enable-poisoning" + "--enable-sanitizer" + "--enable-experimental" + "--enable-logging=verbose" + ]; + + preConfigure = '' + ./bootstrap + configureFlags="$configureFlags --with-nssdir=$out/lib" + + if [ -n "${ccache_dir}" ]; then + export CC='ccache gcc' + export CCACHE_COMPRESS=1 + export CCACHE_DIR="${ccache_dir}" + export CCACHE_UMASK=007 + fi + ''; + + doCheck = false; + + postInstall = '' + # Tests can be run this way + #export GNUNET_PREFIX="$out" + #export PATH="$out/bin:$PATH" + #make -k check + ''; + + meta = with stdenv.lib; { + description = "GNU's decentralized anonymous and censorship-resistant P2P framework"; + + longDescription = '' + GNUnet is a framework for secure peer-to-peer networking that + does not use any centralized or otherwise trusted services. A + first service implemented on top of the networking layer + allows anonymous censorship-resistant file-sharing. Anonymity + is provided by making messages originating from a peer + indistinguishable from messages that the peer is routing. All + peers act as routers and use link-encrypted connections with + stable bandwidth utilization to communicate with each other. + GNUnet uses a simple, excess-based economic model to allocate + resources. Peers in GNUnet monitor each others behavior with + respect to resource usage; peers that contribute to the + network are rewarded with better service. + ''; + + homepage = https://gnunet.org/; + + license = licenses.gpl3Plus; + platforms = platforms.gnu; + maintainers = with maintainers; [ ]; + }; +} -- cgit v1.2.3