forked from mirrors/nixpkgs
* Make OpenSSL 1.0.0e the default.
svn path=/nixpkgs/branches/stdenv-updates/; revision=30233
This commit is contained in:
parent
a35804be30
commit
a839947b85
|
@ -1,74 +0,0 @@
|
||||||
{ stdenv, fetchurl, perl }:
|
|
||||||
|
|
||||||
let
|
|
||||||
name = "openssl-1.0.0e";
|
|
||||||
|
|
||||||
opensslCrossSystem = stdenv.lib.attrByPath [ "openssl" "system" ]
|
|
||||||
(throw "openssl needs its platform name cross building" null)
|
|
||||||
stdenv.cross;
|
|
||||||
in
|
|
||||||
|
|
||||||
stdenv.mkDerivation {
|
|
||||||
inherit name;
|
|
||||||
|
|
||||||
src = fetchurl {
|
|
||||||
url = "http://www.openssl.org/source/${name}.tar.gz";
|
|
||||||
sha256 = "1xw0ffzmr4wbnb0glywgks375dvq8x87pgxmwx6vhgvkflkxqqg3";
|
|
||||||
};
|
|
||||||
|
|
||||||
patches =
|
|
||||||
[ # Allow the location of the X509 certificate file (the CA
|
|
||||||
# bundle) to be set through the environment variable
|
|
||||||
# ‘OPENSSL_X509_CERT_FILE’. This is necessary because the
|
|
||||||
# default location ($out/ssl/cert.pem) doesn't exist, and
|
|
||||||
# hardcoding something like /etc/ssl/cert.pem is impure and
|
|
||||||
# cannot be overriden per-process. For security, the
|
|
||||||
# environment variable is ignored for setuid binaries.
|
|
||||||
./cert-file.patch
|
|
||||||
]
|
|
||||||
++ stdenv.lib.optional stdenv.isDarwin ./darwin-arch.patch;
|
|
||||||
|
|
||||||
buildNativeInputs = [ perl ];
|
|
||||||
|
|
||||||
# On x86_64-darwin, "./config" misdetects the system as
|
|
||||||
# "darwin-i386-cc". So specify the system type explicitly.
|
|
||||||
configureScript =
|
|
||||||
if stdenv.system == "x86_64-darwin" then "./Configure darwin64-x86_64-cc" else "./config";
|
|
||||||
|
|
||||||
configureFlags = "shared --libdir=lib";
|
|
||||||
|
|
||||||
makeFlags = "MANDIR=$(out)/share/man";
|
|
||||||
|
|
||||||
postInstall =
|
|
||||||
''
|
|
||||||
# If we're building dynamic libraries, then don't install static
|
|
||||||
# libraries.
|
|
||||||
if [ -n "$(echo $out/lib/*.so)" ]; then
|
|
||||||
rm $out/lib/*.a
|
|
||||||
fi
|
|
||||||
''; # */
|
|
||||||
|
|
||||||
crossAttrs = {
|
|
||||||
preConfigure=''
|
|
||||||
# It's configure does not like --build or --host
|
|
||||||
export configureFlags="--libdir=lib --cross-compile-prefix=${stdenv.cross.config}- shared ${opensslCrossSystem}"
|
|
||||||
'';
|
|
||||||
|
|
||||||
postInstall = ''
|
|
||||||
# Openssl installs readonly files, which otherwise we can't strip.
|
|
||||||
# This could at some stdenv hash change be put out of crossAttrs, too
|
|
||||||
chmod -R +w $out
|
|
||||||
|
|
||||||
# Remove references to perl, to avoid depending on it at runtime
|
|
||||||
rm $out/bin/c_rehash $out/ssl/misc/CA.pl $out/ssl/misc/tsget
|
|
||||||
'';
|
|
||||||
configureScript = "./Configure";
|
|
||||||
};
|
|
||||||
|
|
||||||
meta = {
|
|
||||||
homepage = http://www.openssl.org/;
|
|
||||||
description = "A cryptographic library that implements the SSL and TLS protocols";
|
|
||||||
platforms = stdenv.lib.platforms.all;
|
|
||||||
maintainers = [ stdenv.lib.maintainers.simons ];
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,7 +1,7 @@
|
||||||
{ stdenv, fetchurl, perl }:
|
{ stdenv, fetchurl, perl }:
|
||||||
|
|
||||||
let
|
let
|
||||||
name = "openssl-1.0.0d";
|
name = "openssl-1.0.0e";
|
||||||
|
|
||||||
opensslCrossSystem = stdenv.lib.attrByPath [ "openssl" "system" ]
|
opensslCrossSystem = stdenv.lib.attrByPath [ "openssl" "system" ]
|
||||||
(throw "openssl needs its platform name cross building" null)
|
(throw "openssl needs its platform name cross building" null)
|
||||||
|
@ -13,10 +13,20 @@ stdenv.mkDerivation {
|
||||||
|
|
||||||
src = fetchurl {
|
src = fetchurl {
|
||||||
url = "http://www.openssl.org/source/${name}.tar.gz";
|
url = "http://www.openssl.org/source/${name}.tar.gz";
|
||||||
sha256 = "1nr0cf6pf8i4qsnx31kqhiqv402xgn76yhjhlbdri8ma1hgislcj";
|
sha256 = "1xw0ffzmr4wbnb0glywgks375dvq8x87pgxmwx6vhgvkflkxqqg3";
|
||||||
};
|
};
|
||||||
|
|
||||||
patches = stdenv.lib.optional stdenv.isDarwin ./darwin-arch.patch;
|
patches =
|
||||||
|
[ # Allow the location of the X509 certificate file (the CA
|
||||||
|
# bundle) to be set through the environment variable
|
||||||
|
# ‘OPENSSL_X509_CERT_FILE’. This is necessary because the
|
||||||
|
# default location ($out/ssl/cert.pem) doesn't exist, and
|
||||||
|
# hardcoding something like /etc/ssl/cert.pem is impure and
|
||||||
|
# cannot be overriden per-process. For security, the
|
||||||
|
# environment variable is ignored for setuid binaries.
|
||||||
|
./cert-file.patch
|
||||||
|
]
|
||||||
|
++ stdenv.lib.optional stdenv.isDarwin ./darwin-arch.patch;
|
||||||
|
|
||||||
buildNativeInputs = [ perl ];
|
buildNativeInputs = [ perl ];
|
||||||
|
|
||||||
|
@ -27,6 +37,8 @@ stdenv.mkDerivation {
|
||||||
|
|
||||||
configureFlags = "shared --libdir=lib";
|
configureFlags = "shared --libdir=lib";
|
||||||
|
|
||||||
|
makeFlags = "MANDIR=$(out)/share/man";
|
||||||
|
|
||||||
postInstall =
|
postInstall =
|
||||||
''
|
''
|
||||||
# If we're building dynamic libraries, then don't install static
|
# If we're building dynamic libraries, then don't install static
|
||||||
|
|
|
@ -4265,7 +4265,6 @@ let
|
||||||
neon029 = callPackage ../development/libraries/neon/0.29.nix {
|
neon029 = callPackage ../development/libraries/neon/0.29.nix {
|
||||||
compressionSupport = true;
|
compressionSupport = true;
|
||||||
sslSupport = true;
|
sslSupport = true;
|
||||||
openssl = opensslNew;
|
|
||||||
};
|
};
|
||||||
|
|
||||||
nethack = builderDefsPackage (import ../games/nethack) {
|
nethack = builderDefsPackage (import ../games/nethack) {
|
||||||
|
@ -4339,8 +4338,6 @@ let
|
||||||
fetchurl = fetchurlBoot;
|
fetchurl = fetchurlBoot;
|
||||||
};
|
};
|
||||||
|
|
||||||
opensslNew = callPackage ../development/libraries/openssl/1.0.0e.nix { };
|
|
||||||
|
|
||||||
ortp = callPackage ../development/libraries/ortp { };
|
ortp = callPackage ../development/libraries/ortp { };
|
||||||
|
|
||||||
pangoxsl = callPackage ../development/libraries/pangoxsl {
|
pangoxsl = callPackage ../development/libraries/pangoxsl {
|
||||||
|
|
Loading…
Reference in a new issue