forked from mirrors/nixpkgs
d0677e6d45
This adds a warning to the top of each “boot” package that reads: Note: this package is used for bootstrapping fetchurl, and thus cannot use fetchpatch! All mutable patches (generated by GitHub or cgit) that are needed here should be included directly in Nixpkgs as files. This makes it clear to maintainer that they may need to treat this package a little differently than others. Importantly, we can’t use fetchpatch here due to using <nix/fetchurl.nix>. To avoid having stale hashes, we need to include patches that are subject to changing overtime (for instance, gitweb’s patches contain a version number at the bottom).
133 lines
4.9 KiB
Nix
133 lines
4.9 KiB
Nix
{ stdenv, lib, fetchurl, pkgconfig, perl
|
|
, http2Support ? true, nghttp2
|
|
, idnSupport ? false, libidn ? null
|
|
, ldapSupport ? false, openldap ? null
|
|
, zlibSupport ? true, zlib ? null
|
|
, sslSupport ? zlibSupport, openssl ? null
|
|
, gnutlsSupport ? false, gnutls ? null
|
|
, wolfsslSupport ? false, wolfssl ? null
|
|
, scpSupport ? zlibSupport && !stdenv.isSunOS && !stdenv.isCygwin, libssh2 ? null
|
|
, gssSupport ? !stdenv.hostPlatform.isWindows, libkrb5 ? null
|
|
, c-aresSupport ? false, c-ares ? null
|
|
, brotliSupport ? false, brotli ? null
|
|
}:
|
|
|
|
# Note: this package is used for bootstrapping fetchurl, and thus
|
|
# cannot use fetchpatch! All mutable patches (generated by GitHub or
|
|
# cgit) that are needed here should be included directly in Nixpkgs as
|
|
# files.
|
|
|
|
assert http2Support -> nghttp2 != null;
|
|
assert idnSupport -> libidn != null;
|
|
assert ldapSupport -> openldap != null;
|
|
assert zlibSupport -> zlib != null;
|
|
assert sslSupport -> openssl != null;
|
|
assert !(gnutlsSupport && sslSupport);
|
|
assert !(gnutlsSupport && wolfsslSupport);
|
|
assert !(sslSupport && wolfsslSupport);
|
|
assert gnutlsSupport -> gnutls != null;
|
|
assert wolfsslSupport -> wolfssl != null;
|
|
assert scpSupport -> libssh2 != null;
|
|
assert c-aresSupport -> c-ares != null;
|
|
assert brotliSupport -> brotli != null;
|
|
assert gssSupport -> libkrb5 != null;
|
|
|
|
stdenv.mkDerivation rec {
|
|
pname = "curl";
|
|
version = "7.71.1";
|
|
|
|
src = fetchurl {
|
|
urls = [
|
|
"https://curl.haxx.se/download/${pname}-${version}.tar.bz2"
|
|
"https://github.com/curl/curl/releases/download/${lib.replaceStrings ["."] ["_"] pname}-${version}/${pname}-${version}.tar.bz2"
|
|
];
|
|
sha256 = "097jnkbayscifgzgl7v8kwd7m2crpvbyaazac3ab1yal0pca8llx";
|
|
};
|
|
|
|
outputs = [ "bin" "dev" "out" "man" "devdoc" ];
|
|
separateDebugInfo = stdenv.isLinux;
|
|
|
|
enableParallelBuilding = true;
|
|
|
|
nativeBuildInputs = [ pkgconfig perl ];
|
|
|
|
# Zlib and OpenSSL must be propagated because `libcurl.la' contains
|
|
# "-lz -lssl", which aren't necessary direct build inputs of
|
|
# applications that use Curl.
|
|
propagatedBuildInputs = with stdenv.lib;
|
|
optional http2Support nghttp2 ++
|
|
optional idnSupport libidn ++
|
|
optional ldapSupport openldap ++
|
|
optional zlibSupport zlib ++
|
|
optional gssSupport libkrb5 ++
|
|
optional c-aresSupport c-ares ++
|
|
optional sslSupport openssl ++
|
|
optional gnutlsSupport gnutls ++
|
|
optional wolfsslSupport wolfssl ++
|
|
optional scpSupport libssh2 ++
|
|
optional brotliSupport brotli;
|
|
|
|
# for the second line see https://curl.haxx.se/mail/tracker-2014-03/0087.html
|
|
preConfigure = ''
|
|
sed -e 's|/usr/bin|/no-such-path|g' -i.bak configure
|
|
rm src/tool_hugehelp.c
|
|
'';
|
|
|
|
configureFlags = [
|
|
# Disable default CA bundle, use NIX_SSL_CERT_FILE or fallback
|
|
# to nss-cacert from the default profile.
|
|
"--without-ca-bundle"
|
|
"--without-ca-path"
|
|
# The build fails when using wolfssl with --with-ca-fallback
|
|
( if wolfsslSupport then "--without-ca-fallback" else "--with-ca-fallback")
|
|
"--disable-manual"
|
|
( if sslSupport then "--with-ssl=${openssl.dev}" else "--without-ssl" )
|
|
( if gnutlsSupport then "--with-gnutls=${gnutls.dev}" else "--without-gnutls" )
|
|
( if scpSupport then "--with-libssh2=${libssh2.dev}" else "--without-libssh2" )
|
|
( if ldapSupport then "--enable-ldap" else "--disable-ldap" )
|
|
( if ldapSupport then "--enable-ldaps" else "--disable-ldaps" )
|
|
( if idnSupport then "--with-libidn=${libidn.dev}" else "--without-libidn" )
|
|
( if brotliSupport then "--with-brotli" else "--without-brotli" )
|
|
]
|
|
++ stdenv.lib.optional wolfsslSupport "--with-wolfssl=${wolfssl.dev}"
|
|
++ stdenv.lib.optional c-aresSupport "--enable-ares=${c-ares}"
|
|
++ stdenv.lib.optional gssSupport "--with-gssapi=${libkrb5.dev}"
|
|
# For the 'urandom', maybe it should be a cross-system option
|
|
++ stdenv.lib.optional (stdenv.hostPlatform != stdenv.buildPlatform)
|
|
"--with-random=/dev/urandom"
|
|
++ stdenv.lib.optionals stdenv.hostPlatform.isWindows [
|
|
"--disable-shared"
|
|
"--enable-static"
|
|
];
|
|
|
|
CXX = "${stdenv.cc.targetPrefix}c++";
|
|
CXXCPP = "${stdenv.cc.targetPrefix}c++ -E";
|
|
|
|
doCheck = false; # expensive, fails
|
|
|
|
postInstall = ''
|
|
moveToOutput bin/curl-config "$dev"
|
|
|
|
# Install completions
|
|
make -C scripts install
|
|
'' + stdenv.lib.optionalString scpSupport ''
|
|
sed '/^dependency_libs/s|${libssh2.dev}|${libssh2.out}|' -i "$out"/lib/*.la
|
|
'' + stdenv.lib.optionalString gnutlsSupport ''
|
|
ln $out/lib/libcurl.so $out/lib/libcurl-gnutls.so
|
|
ln $out/lib/libcurl.so $out/lib/libcurl-gnutls.so.4
|
|
ln $out/lib/libcurl.so $out/lib/libcurl-gnutls.so.4.4.0
|
|
'';
|
|
|
|
passthru = {
|
|
inherit sslSupport openssl;
|
|
};
|
|
|
|
meta = with stdenv.lib; {
|
|
description = "A command line tool for transferring files with URL syntax";
|
|
homepage = "https://curl.haxx.se/";
|
|
license = licenses.curl;
|
|
maintainers = with maintainers; [ lovek323 ];
|
|
platforms = platforms.all;
|
|
};
|
|
}
|