aboutsummaryrefslogtreecommitdiff
path: root/infra/libkookie/nixpkgs/pkgs/development/libraries/audiofile/default.nix
diff options
context:
space:
mode:
Diffstat (limited to 'infra/libkookie/nixpkgs/pkgs/development/libraries/audiofile/default.nix')
-rw-r--r--infra/libkookie/nixpkgs/pkgs/development/libraries/audiofile/default.nix94
1 files changed, 94 insertions, 0 deletions
diff --git a/infra/libkookie/nixpkgs/pkgs/development/libraries/audiofile/default.nix b/infra/libkookie/nixpkgs/pkgs/development/libraries/audiofile/default.nix
new file mode 100644
index 000000000000..9f945b15dec2
--- /dev/null
+++ b/infra/libkookie/nixpkgs/pkgs/development/libraries/audiofile/default.nix
@@ -0,0 +1,94 @@
+{ stdenv, lib, fetchurl, fetchpatch, alsaLib, AudioUnit, CoreServices }:
+
+let
+
+ fetchDebianPatch = { name, debname, sha256 }:
+ fetchpatch {
+ inherit sha256 name;
+ url = "https://salsa.debian.org/multimedia-team/audiofile/raw/debian/0.3.6-4/debian/patches/${debname}";
+ };
+
+in
+
+stdenv.mkDerivation rec {
+ name = "audiofile-0.3.6";
+
+ buildInputs =
+ stdenv.lib.optionals stdenv.isLinux [
+ alsaLib
+ ] ++ stdenv.lib.optionals stdenv.isDarwin [
+ CoreServices AudioUnit
+ ];
+
+ src = fetchurl {
+ url = "https://audiofile.68k.org/${name}.tar.gz";
+ sha256 = "0rb927zknk9kmhprd8rdr4azql4gn2dp75a36iazx2xhkbqhvind";
+ };
+
+ # fix build with gcc9
+ NIX_CFLAGS_LINK = lib.optional (stdenv.system == "i686-linux") "-lgcc";
+
+ # Even when statically linking, libstdc++.la is put in dependency_libs here,
+ # and hence libstdc++.so passed to the linker, just pass -lstdc++ and let the
+ # compiler do what it does best. (libaudiofile.la is a generated file, so we
+ # have to run `make` that far first).
+ #
+ # Without this, the executables in this package (sfcommands and examples)
+ # fail to build: https://github.com/NixOS/nixpkgs/issues/103215
+ #
+ # There might be a more sensible way to do this with autotools, but I am not
+ # smart enough to discover it.
+ preBuild = lib.optionalString stdenv.targetPlatform.isStatic ''
+ make -C libaudiofile $makeFlags
+ sed -i "s/dependency_libs=.*/dependency_libs=' -lstdc++'/" libaudiofile/libaudiofile.la
+ '';
+
+ patches = [
+ ./gcc-6.patch
+ ./CVE-2015-7747.patch
+
+ (fetchDebianPatch {
+ name = "CVE-2017-6829.patch";
+ debname = "04_clamp-index-values-to-fix-index-overflow-in-IMA.cpp.patch";
+ sha256 = "04qxl51i64c53v69q2kx61qdq474f4vapk8rq97cipj7yrar392m";
+ })
+ (fetchDebianPatch {
+ name = "CVE-2017-6827+CVE-2017-6828+CVE-2017-6832+CVE-2017-6835+CVE-2017-6837.patch";
+ debname = "05_Always-check-the-number-of-coefficients.patch";
+ sha256 = "1ih03kfkabffi6ymp6832q470i28rsds78941vzqlshnqjb2nnxw";
+ })
+ (fetchDebianPatch {
+ name = "CVE-2017-6839.patch";
+ debname = "06_Check-for-multiplication-overflow-in-MSADPCM-decodeSam.patch";
+ sha256 = "0a8s2z8rljlj03p7l1is9s4fml8vyzvyvfrh1m6xj5a8vbi635d0";
+ })
+ (fetchDebianPatch {
+ name = "CVE-2017-6830+CVE-2017-6834+CVE-2017-6836+CVE-2017-6838.patch";
+ debname = "07_Check-for-multiplication-overflow-in-sfconvert.patch";
+ sha256 = "0rfba8rkasl5ycvc0kqlzinkl3rvyrrjvjhpc45h423wmjk2za2l";
+ })
+ (fetchDebianPatch {
+ name = "audiofile-fix-multiplyCheckOverflow-signature.patch";
+ debname = "08_Fix-signature-of-multiplyCheckOverflow.-It-returns-a-b.patch";
+ sha256 = "032p5jqp7q7jgc5axdnazz00zm7hd26z6m5j55ifs0sykr5lwldb";
+ })
+ (fetchDebianPatch {
+ name = "CVE-2017-6831.patch";
+ debname = "09_Actually-fail-when-error-occurs-in-parseFormat.patch";
+ sha256 = "0csikmj8cbiy6cigg0rmh67jrr0sgm56dfrnrxnac3m9635nxlac";
+ })
+ (fetchDebianPatch {
+ name = "CVE-2017-6833.patch";
+ debname = "10_Check-for-division-by-zero-in-BlockCodec-runPull.patch";
+ sha256 = "1rlislkjawq98bbcf1dgl741zd508wwsg85r37ca7pfdf6wgl6z7";
+ })
+ ];
+
+ meta = with stdenv.lib; {
+ description = "Library for reading and writing audio files in various formats";
+ homepage = "http://www.68k.org/~michael/audiofile/";
+ license = licenses.lgpl21Plus;
+ maintainers = with maintainers; [ lovek323 ];
+ platforms = platforms.unix;
+ };
+}