Commit graph

29 commits

Author SHA1 Message Date
c0bw3b
93e511c319 Treewide: use HTTPS on GNU Savannah domains
HTTP -> HTTPS for:
- http://savannah.gnu.org/
- http://git.savannah.gnu.org/
- http://download.savannah.gnu.org/
- http://svn.savannah.gnu.org/
2018-12-02 15:33:09 +01:00
Markus Kowalewski
52f6778230
gcl:; add license 2018-08-20 01:04:09 +02:00
volth
52f53c69ce pkgs/*: remove unreferenced function arguments 2018-07-21 02:48:04 +00:00
Michael Raskin
7c29295deb gcl_2_6_13_pre: init at 2.6.13pre50. GCL hasn't had releases for a long time, but there are relatively regular prereleases 2017-01-03 18:06:46 +01:00
Robin Gloster
365379857f gcl: disable bindnow hardening 2016-05-30 19:34:16 +00:00
Robin Gloster
f60c9df0ba Merge remote-tracking branch 'upstream/master' into hardened-stdenv 2016-03-28 15:16:29 +00:00
Michael Raskin
9ed00ff086 gcl: gcc5 build: enforce old inline semantics for now; will be fixed in the next upstream release 2016-03-23 15:10:12 +01:00
Joachim Fasting
27eac5313e gcl: fix gcc5 build
Apply patch from Gentoo
2016-03-23 15:10:12 +01:00
Franz Pletz
aff1f4ab94 Use general hardening flag toggle lists
The following parameters are now available:

  * hardeningDisable
    To disable specific hardening flags
  * hardeningEnable
    To enable specific hardening flags

Only the cc-wrapper supports this right now, but these may be reused by
other wrappers, builders or setup hooks.

cc-wrapper supports the following flags:

  * fortify
  * stackprotector
  * pie (disabled by default)
  * pic
  * strictoverflow
  * format
  * relro
  * bindnow
2016-03-05 18:55:26 +01:00
Robin Gloster
7561c1c9e7 gcl: clean up and disable pic hardening 2016-02-25 02:10:33 +00:00
Robin Gloster
cf33734351 gcl: use mkDerivation 2016-01-30 20:31:02 +00:00
Vladimír Čunát
c1bcf671dd gcl: don't depend on TeX
It doesn't seem to need it or use it at all.
2015-09-17 19:23:17 +02:00
Mathnerd314
eb7404d97a all-packages: Use callPackage where possible 2015-09-14 22:27:19 -06:00
Eric Seidel
662a6b1ca6 remove all references to stdenv.cc.cc.is{GNU,Clang}
use the new `stdenv.cc.is{GNU,Clang}` instead, which will always be
defined.
2015-05-11 14:44:50 -07:00
Eric Seidel
f3c6827373 rename all occurrences of stdenv.cc.gcc to stdenv.cc.cc 2015-01-14 20:27:55 -08:00
John Wiegley
28b6fb61e6 Change occurrences of gcc to the more general cc
This is done for the sake of Yosemite, which does not have gcc, and yet
this change is also compatible with Linux.
2014-12-26 11:06:21 -06:00
Michael Raskin
f1f5ac184f Update GCL 2014-11-04 00:37:42 +03:00
Michael Raskin
d68f3e9c0f gcl: update from 2.6.10 to 2.6.11 2014-09-24 13:42:17 +04:00
Michael Raskin
177b0a0e8b Update GCL source to latest release 2014-02-02 21:36:22 +04:00
Michael Raskin
6b0769ef90 Use dynamical libbfd because static one is searched in strange places 2014-02-02 21:14:55 +04:00
Michael Raskin
1cf7460522 Try appeasing Hydra with correct platform specification outside of assert
svn path=/nixpkgs/trunk/; revision=22922
2010-08-03 10:55:32 +00:00
Michael Raskin
522d4f9d85 GCL at the ansi level
svn path=/nixpkgs/trunk/; revision=22541
2010-07-09 03:34:29 +00:00
Michael Raskin
40fb98d671 Fix a typo; thanks to viric for showing me my being silly.
svn path=/nixpkgs/trunk/; revision=22517
2010-07-07 20:19:48 +00:00
Michael Raskin
c009e9d2f0 Assert the stdenv requirements of the expression for now
svn path=/nixpkgs/trunk/; revision=22516
2010-07-07 18:44:57 +00:00
Michael Raskin
af34f7a80a Request a larger version
svn path=/nixpkgs/trunk/; revision=22500
2010-07-06 20:27:48 +00:00
Michael Raskin
ce2f4992f1 Work around a gcl bug related to temporary directories - bug report sent upstream
svn path=/nixpkgs/trunk/; revision=22499
2010-07-06 19:59:10 +00:00
Michael Raskin
058ccd7714 Apparently fixed GCL build
svn path=/nixpkgs/trunk/; revision=22498
2010-07-06 16:48:03 +00:00
Michael Raskin
73933c7f9b Comment out gcl as broken
svn path=/nixpkgs/trunk/; revision=18188
2009-11-06 09:44:03 +00:00
Michael Raskin
4d02c927e6 Fix ratpoison dependencies
svn path=/nixpkgs/trunk/; revision=18166
2009-11-05 21:53:37 +00:00