nixpkgs-suyu/pkgs/tools/networking/ntp/default.nix

53 lines
1.5 KiB
Nix
Raw Normal View History

{ stdenv, lib, fetchurl, openssl, perl, libcap ? null, libseccomp ? null, pps-tools }:
assert stdenv.isLinux -> libcap != null;
2016-11-21 23:11:05 +01:00
assert stdenv.isLinux -> libseccomp != null;
2014-02-03 23:15:25 +01:00
let
withSeccomp = stdenv.isLinux && (stdenv.isi686 || stdenv.isx86_64);
in
stdenv.mkDerivation rec {
name = "ntp-4.2.8p12";
2014-02-03 23:15:25 +01:00
src = fetchurl {
url = "https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/${name}.tar.gz";
sha256 = "0m04ndn0674kcf9x0aggjya07a3hlig2nlzzpwk7vmqka0mj56vh";
};
2014-02-03 23:15:25 +01:00
# The hardcoded list of allowed system calls for seccomp is
# insufficient for NixOS, add more to make it work (issue #21136).
patches = [ ./seccomp.patch ];
2015-04-25 00:28:48 +02:00
configureFlags = [
"--sysconfdir=/etc"
"--localstatedir=/var"
"--with-openssl-libdir=${openssl.out}/lib"
"--with-openssl-incdir=${openssl.dev}/include"
2015-04-25 00:28:48 +02:00
"--enable-ignore-dns-errors"
2018-10-12 14:48:59 +02:00
"--with-yielding-select=yes"
] ++ stdenv.lib.optional stdenv.isLinux "--enable-linuxcaps"
++ stdenv.lib.optional withSeccomp "--enable-libseccomp";
2014-02-03 23:15:25 +01:00
buildInputs = [ libcap openssl perl ]
++ lib.optional withSeccomp libseccomp
++ lib.optional stdenv.isLinux pps-tools;
hardeningEnable = [ "pie" ];
2016-02-26 18:26:03 +01:00
2015-04-25 00:28:48 +02:00
postInstall = ''
rm -rf $out/share/doc
'';
meta = with stdenv.lib; {
homepage = http://www.ntp.org/;
description = "An implementation of the Network Time Protocol";
2018-08-17 23:52:16 +02:00
license = {
# very close to isc and bsd2
url = https://www.eecis.udel.edu/~mills/ntp/html/copyright.html;
};
maintainers = [ maintainers.eelco ];
platforms = platforms.linux;
};
}