nixpkgs/pkgs/tools/networking/ntp/default.nix

53 lines
1.6 KiB
Nix
Raw Normal View History

{ stdenv, lib, fetchurl, openssl, perl, libcap ? null, libseccomp ? null, pps-tools }:
assert stdenv.isLinux -> libcap != null;
2016-11-21 23:11:05 +01:00
assert stdenv.isLinux -> libseccomp != null;
2014-02-03 23:15:25 +01:00
let
withSeccomp = stdenv.isLinux && (stdenv.isi686 || stdenv.isx86_64);
in
stdenv.mkDerivation rec {
2020-03-05 15:45:43 +01:00
name = "ntp-4.2.8p14";
2014-02-03 23:15:25 +01:00
src = fetchurl {
url = "https://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/${name}.tar.gz";
2020-03-05 15:45:43 +01:00
sha256 = "1dsfbrad5adwjnm3k0y0ip8dzs7r2nmw66vjil8gvapnh7qf8q0r";
};
2014-02-03 23:15:25 +01:00
# The hardcoded list of allowed system calls for seccomp is
# insufficient for NixOS, add more to make it work (issue #21136).
patches = [ ./seccomp.patch ];
2015-04-25 00:28:48 +02:00
configureFlags = [
"--sysconfdir=/etc"
"--localstatedir=/var"
"--with-openssl-libdir=${openssl.out}/lib"
"--with-openssl-incdir=${openssl.dev}/include"
2015-04-25 00:28:48 +02:00
"--enable-ignore-dns-errors"
2018-10-12 14:48:59 +02:00
"--with-yielding-select=yes"
] ++ stdenv.lib.optional stdenv.isLinux "--enable-linuxcaps"
++ stdenv.lib.optional withSeccomp "--enable-libseccomp";
2014-02-03 23:15:25 +01:00
buildInputs = [ libcap openssl perl ]
++ lib.optional withSeccomp libseccomp
++ lib.optional stdenv.isLinux pps-tools;
hardeningEnable = [ "pie" ];
2016-02-26 18:26:03 +01:00
2015-04-25 00:28:48 +02:00
postInstall = ''
rm -rf $out/share/doc
'';
meta = with stdenv.lib; {
2020-03-05 15:45:43 +01:00
homepage = "http://www.ntp.org/";
description = "An implementation of the Network Time Protocol";
2018-08-17 23:52:16 +02:00
license = {
# very close to isc and bsd2
url = "https://www.eecis.udel.edu/~mills/ntp/html/copyright.html";
2018-08-17 23:52:16 +02:00
};
maintainers = with maintainers; [ eelco thoughtpolice ];
platforms = platforms.linux;
};
}