forked from mirrors/nixpkgs
aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
28 lines
823 B
Nix
28 lines
823 B
Nix
{ stdenv, fetchurl, alsaLib, alsaUtils, fltk, libjack2, libXft,
|
|
libXpm, libjpeg, libpng, libsamplerate, libsndfile, zlib }:
|
|
|
|
stdenv.mkDerivation rec {
|
|
name = "rakarrack-${version}";
|
|
version = "0.6.1";
|
|
|
|
src = fetchurl {
|
|
url = "mirror://sourceforge/rakarrack/${name}.tar.bz2";
|
|
sha256 = "1rpf63pdn54c4yg13k7cb1w1c7zsvl97c4qxcpz41c8l91xd55kn";
|
|
};
|
|
|
|
hardeningDisable = [ "format" ];
|
|
|
|
patches = [ ./fltk-path.patch ];
|
|
|
|
buildInputs = [ alsaLib alsaUtils fltk libjack2 libXft libXpm libjpeg
|
|
libpng libsamplerate libsndfile zlib ];
|
|
|
|
meta = with stdenv.lib; {
|
|
description = "multi-effects processor emulating a guitar effects pedalboard";
|
|
homepage = http://rakarrack.sourceforge.net;
|
|
license = licenses.gpl2;
|
|
platforms = platforms.linux;
|
|
maintainers = [ maintainers.goibhniu ];
|
|
};
|
|
}
|