2010-07-28 14:52:54 +02:00
|
|
|
{ stdenv, fetchurl, ncurses ? null }:
|
2009-01-06 10:28:45 +01:00
|
|
|
|
2009-08-11 22:57:29 +02:00
|
|
|
stdenv.mkDerivation rec {
|
2010-04-21 23:35:38 +02:00
|
|
|
name = "util-linux-ng-2.17.2";
|
2009-01-06 10:28:45 +01:00
|
|
|
|
|
|
|
src = fetchurl {
|
2010-03-09 18:25:03 +01:00
|
|
|
url = "mirror://kernel/linux/utils/util-linux-ng/v2.17/${name}.tar.bz2";
|
2010-04-21 23:35:38 +02:00
|
|
|
sha256 = "13qifk3i1x59q45fpdz8qnnm7vrhd2zshy5295vhpcjsd8dq1bn9";
|
2009-01-06 10:28:45 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
configureFlags = ''
|
|
|
|
--disable-use-tty-group
|
2010-04-21 22:47:15 +02:00
|
|
|
--enable-write
|
2009-01-06 10:28:45 +01:00
|
|
|
${if ncurses == null then "--without-ncurses" else ""}
|
|
|
|
'';
|
|
|
|
|
2009-08-11 22:57:29 +02:00
|
|
|
buildInputs = stdenv.lib.optional (ncurses != null) ncurses;
|
2009-01-06 10:28:45 +01:00
|
|
|
|
2009-08-11 22:57:29 +02:00
|
|
|
# !!! It would be better to obtain the path to the mount helpers
|
|
|
|
# (/sbin/mount.*) through an environment variable, but that's
|
|
|
|
# somewhat risky because we have to consider that mount can setuid
|
|
|
|
# root...
|
2009-01-06 10:28:45 +01:00
|
|
|
preConfigure = ''
|
2009-08-11 22:57:29 +02:00
|
|
|
substituteInPlace mount/mount.c --replace /sbin/mount. /var/run/current-system/sw/sbin/mount.
|
|
|
|
substituteInPlace mount/umount.c --replace /sbin/umount. /var/run/current-system/sw/sbin/umount.
|
2009-01-06 10:28:45 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
}
|