Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

treewide: Default openssl version to 3.0 #150093

Merged
merged 81 commits into from
Aug 17, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
81 commits
Select commit Hold shift + click to select a range
0565276
openssl: Default version to 3.0
dasJ Dec 10, 2021
c6de1d4
openssl: fix static build
ajs124 Aug 1, 2022
075b852
openssl: versionAtLeast 1.1.0 -> 1.1.1
ajs124 Aug 1, 2022
ac6e552
oven-media-engine: openssl_3_0 -> openssl
ajs124 Feb 7, 2022
af91144
ibm-sw-tpm2: Pin OpenSSL 1.1.1
dasJ Dec 25, 2021
8b1f165
python3.pkgs.cryptography: use openssl_1_1
ajs124 Apr 3, 2022
5cb3e07
openvpn*: use matching openssl version for each release
ajs124 Apr 8, 2022
a902277
ruby*: use matching openssl version for each release
ajs124 Apr 9, 2022
498d67e
krb5: use openssl_1_1
ajs124 Apr 17, 2022
7cf34b2
coturn: use openssl_1_1
ajs124 May 31, 2022
94d8086
lighttpd: pin to openssl_1_1
ajs124 May 31, 2022
ed3fab5
nodejs-14_x: pin to openssl_1_1
ajs124 May 31, 2022
bf95b6e
qca2: remove
ajs124 May 26, 2022
1c6327d
freeswitch: pin to openssl_1_1
ajs124 May 31, 2022
08ed8cf
libsForQt.qca-qt5_2_3_2: pin to openssl_1_1
ajs124 May 31, 2022
3c33219
mysql57: pin to openssl_1_1
ajs124 May 31, 2022
b802fc1
mysql80: pin to openssl_1_1
ajs124 May 31, 2022
1f48d6f
cyrus_sasl: pin to openssl_1_1
ajs124 May 31, 2022
de5a121
openldap: pin to openssl_1_1
ajs124 Jun 8, 2022
484f8ab
python3.pkgs.m2crypto: pin to openssl_1_1
ajs124 Jun 1, 2022
e472d36
perlPackages.CryptOpenSSLRSA: pin to openssl_1_1
ajs124 Jun 1, 2022
f8ce3f9
lua-modules: pin to openssl_1_1
ajs124 Jun 1, 2022
c88c43e
libs3: update and fix build against openssl3
ajs124 Jun 1, 2022
58edfe9
apk-tools: pin to openssl_1_1
ajs124 Jun 7, 2022
2a49c87
haskellPackages.hopenssl: use openssl_1_1
ajs124 Jun 8, 2022
2a32ce7
serf: pin to openssl_1_1
ajs124 Jun 8, 2022
35099b9
dovecot: pin to openssl_1_1
ajs124 Jun 15, 2022
9601981
libewf: fix build with OpenSSL 3.0
ajs124 Jun 15, 2022
6ebaf85
thrift: pin to openssl_1_1
ajs124 Jun 15, 2022
84f17a3
mariadb: use openssl_1_1 for older releases
ajs124 May 31, 2022
e51d2c2
erlang*: use matching openssl version for each release
ajs124 Jun 15, 2022
80f2c05
php80Extensions.openssl: pin to openssl_1_1
ajs124 Jun 17, 2022
8d8f4cd
sbsigntool: pin to openssl_1_1
ajs124 Jun 17, 2022
3ab7524
sbsigntool: clean up a bit
ajs124 Jun 17, 2022
8496e1a
dot-http: pin to openssl_1_1
ajs124 Jun 17, 2022
f38d2ae
dogdns: pin to openssl_1_1
ajs124 Jun 17, 2022
42d8c34
freeradius: pin to openssl_1_1
ajs124 Jun 17, 2022
69f1ec7
qt5_openssl_1_1: init
ajs124 Jun 27, 2022
e20f004
mumble: fix build by using qt5_openssl_1_1
ajs124 Jun 27, 2022
302e4e8
amarok: pin to openssl 1.1
ajs124 Jul 3, 2022
d39a635
hurl: pin to openssl 1.1
ajs124 Jul 4, 2022
ece71cc
nodejs-16_x-openssl_1_1 & yarn2nix-moretea-openssl_1_1: init
ajs124 Jul 4, 2022
d1b2156
element-web: use openssl 1.1
ajs124 Jul 4, 2022
945ac1c
google-cloud-cpp: pin to openssl 1.1
ajs124 Jul 3, 2022
cc12020
tqsl: pin to openssl_1_1
ajs124 Jul 4, 2022
b9c0db8
odp-dpdk: pin to openssl_1_1
ajs124 Jul 4, 2022
659ea66
rustup: pin to openssl_1_1
ajs124 Jul 4, 2022
50e225d
s3rs: pin to openssl_1_1
ajs124 Jul 4, 2022
ea94d17
simple-http-server: pin to openssl_1_1
ajs124 Jul 4, 2022
faac333
python3.pkgs.uamqp: pin to openssl_1_1
ajs124 Jul 4, 2022
04e9a38
nginx: remove openssl_3 override
ajs124 Jul 4, 2022
3908614
tengine: pin to openssl_1_1
ajs124 Jul 4, 2022
03d1fd8
gemConfig/openssl: pin to openssl_1_1
ajs124 Jul 4, 2022
b6aad16
gitlab: pin to openssl_1_1
ajs124 Jul 4, 2022
240ace0
sysdig: pin to openssl_1_1
ajs124 Jul 7, 2022
09f53a8
swiProlog: pin to openssl_1_1
ajs124 Jul 7, 2022
f6390b3
percona-server56: pin to openssl_1_1
ajs124 Nov 4, 2021
4915e59
pam_p11: pin to openssl_1_1
ajs124 Jul 7, 2022
bf4c320
umurmur: pin to openssl_1_1
ajs124 Jul 7, 2022
a9fc19c
libstrophe: pin to openssl_1_1
ajs124 Jul 7, 2022
0a90c5d
zookeeper_mt: pin to openssl_1_1
ajs124 Jul 7, 2022
8dfc998
python3: pin to openssl_1_1
ajs124 Jul 7, 2022
b2bed48
fractal: pin to openssl_1_1
ajs124 Jul 31, 2022
ad76e3d
ceph: pin to openssl_1_1
ajs124 Jul 31, 2022
9c8e33f
git-crypt: fix build with openssl_3
ajs124 Jul 31, 2022
14f18b3
git-backup: pin to openssl_1_1
ajs124 Jul 31, 2022
ce6deb5
firmware-manager: pin to openssl_1_1
ajs124 Jul 31, 2022
e891feb
meli: pin to openssl_1_1
ajs124 Jul 31, 2022
dd5518b
squid: pin to openssl_1_1
ajs124 Jul 31, 2022
5cc75bb
percona-xtrabackup_*: pin to openssl_1_1
ajs124 Jul 31, 2022
dc13b70
ipfs: pin to openssl_1_1
ajs124 Aug 2, 2022
fffda8a
nzbget: pin to openssl_1_1
ajs124 Aug 2, 2022
b17c551
libmysqlconnectorcpp: pin to openssl_1_1
ajs124 Aug 3, 2022
4921d94
git-trim: pin to openssl_1_1
ajs124 Aug 3, 2022
76064cc
git-subset: pin to openssl_1_1
ajs124 Aug 3, 2022
424885f
perlPackages.CryptOpenSSLGuess: 0.11 -> 0.15
ajs124 Aug 6, 2022
1a75cc1
perlPackages.CryptOpenSSLX509: 1.813 -> 1.914
ajs124 Aug 6, 2022
cc375c4
wraith: pin to openssl_1_1
ajs124 Aug 6, 2022
d761390
sgx/sdk/ipp-crypto: pin to openssl_1_1
ajs124 Aug 6, 2022
63adbbd
nixos/changelog: Mention openssl3 update
dasJ Aug 9, 2022
0df0cbf
proxysql: don't reference openssl_3 explicitly
ajs124 Aug 16, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions nixos/doc/manual/from_md/release-notes/rl-2211.section.xml
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,11 @@
Cinnamon has been updated to 5.4.
</para>
</listitem>
<listitem>
<para>
OpenSSL now defaults to OpenSSL 3, updated from 1.1.1.
</para>
</listitem>
<listitem>
<para>
<literal>hardware.nvidia</literal> has a new option
Expand Down
2 changes: 2 additions & 0 deletions nixos/doc/manual/release-notes/rl-2211.section.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,8 @@ In addition to numerous new and upgraded packages, this release has the followin

- Cinnamon has been updated to 5.4.

- OpenSSL now defaults to OpenSSL 3, updated from 1.1.1.

- `hardware.nvidia` has a new option `open` that can be used to opt in the opensource version of NVIDIA kernel driver. Note that the driver's support for GeForce and Workstation GPUs is still alpha quality, see [NVIDIA Releases Open-Source GPU Kernel Modules](https://developer.nvidia.com/blog/nvidia-releases-open-source-gpu-kernel-modules/) for the official announcement.

<!-- To avoid merge conflicts, consider adding your item at an arbitrary place in the list instead. -->
Expand Down
2 changes: 1 addition & 1 deletion pkgs/applications/radio/tqsl/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ stdenv.mkDerivation rec {
openssl
zlib
db
curl
(curl.override { inherit openssl; })
wxGTK
];

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,11 @@ stdenv.mkDerivation rec {
"DOCBOOK_XSL=${docbook_xsl}/share/xml/docbook-xsl-nons/manpages/docbook.xsl"
];

# https://github.com/AGWA/git-crypt/issues/232
CXXFLAGS = [
"-DOPENSSL_API_COMPAT=0x30000000L"
];

postFixup = ''
wrapProgram $out/bin/git-crypt \
--suffix PATH : ${lib.makeBinPath [ git gnupg ]}
Expand Down
4 changes: 2 additions & 2 deletions pkgs/development/compilers/dotnet/build-dotnet.nix
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ assert if type == "sdk" then packages != null else true;
, autoPatchelfHook
, makeWrapper
, libunwind
, openssl
, openssl_1_1
, libuuid
, zlib
, curl
Expand Down Expand Up @@ -48,7 +48,7 @@ stdenv.mkDerivation rec {
icu
libunwind
libuuid
openssl
openssl_1_1
] ++ lib.optional stdenv.isLinux lttng-ust_2_12);

nativeBuildInputs = [
Expand Down
3 changes: 3 additions & 0 deletions pkgs/development/haskell-modules/configuration-common.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2393,6 +2393,9 @@ self: super: {
'';
}) super.linear-base;

# https://github.com/peti/hopenssl/issues/5
hopenssl = super.hopenssl.override { openssl = pkgs.openssl_1_1; };

# Fixes compilation with GHC 9.0 and above
# https://hub.darcs.net/shelarcy/regex-compat-tdfa/issue/3
regex-compat-tdfa = appendPatches [
Expand Down
13 changes: 9 additions & 4 deletions pkgs/development/interpreters/python/cpython/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@
, mailcap, mimetypesSupport ? true
, ncurses
, openssl
, openssl_1_1
, readline
, sqlite
, tcl ? null, tk ? null, tix ? null, libX11 ? null, xorgproto ? null, x11Support ? false
Expand Down Expand Up @@ -75,6 +76,10 @@ assert lib.assertMsg (reproducibleBuild -> (!rebuildBytecode))
with lib;

let
# cpython does support/build with openssl 3.0, but some libraries using the ssl module seem to have issues with it
# null check for Minimal
openssl' = if openssl != null then openssl_1_1 else null;

buildPackages = pkgsBuildHost;
inherit (passthru) pythonForBuild;

Expand Down Expand Up @@ -115,7 +120,7 @@ let
];

buildInputs = filter (p: p != null) ([
zlib bzip2 expat xz libffi gdbm sqlite readline ncurses openssl ]
zlib bzip2 expat xz libffi gdbm sqlite readline ncurses openssl' ]
++ optionals x11Support [ tcl tk libX11 xorgproto ]
++ optionals (bluezSupport && stdenv.isLinux) [ bluez ]
++ optionals stdenv.isDarwin [ configd ])
Expand Down Expand Up @@ -321,8 +326,8 @@ in with passthru; stdenv.mkDerivation {
"--with-threads"
] ++ optionals (sqlite != null && isPy3k) [
"--enable-loadable-sqlite-extensions"
] ++ optionals (openssl != null) [
"--with-openssl=${openssl.dev}"
] ++ optionals (openssl' != null) [
"--with-openssl=${openssl'.dev}"
] ++ optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
"ac_cv_buggy_getaddrinfo=no"
# Assume little-endian IEEE 754 floating point when cross compiling
Expand Down Expand Up @@ -484,7 +489,7 @@ in with passthru; stdenv.mkDerivation {
# Enforce that we don't have references to the OpenSSL -dev package, which we
# explicitly specify in our configure flags above.
disallowedReferences =
lib.optionals (openssl != null && !static) [ openssl.dev ]
lib.optionals (openssl' != null && !static) [ openssl'.dev ]
++ lib.optionals (stdenv.hostPlatform != stdenv.buildPlatform) [
# Ensure we don't have references to build-time packages.
# These typically end up in shebangs.
Expand Down
8 changes: 5 additions & 3 deletions pkgs/development/interpreters/ruby/default.nix
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
{ stdenv, buildPackages, lib
, fetchurl, fetchpatch, fetchFromSavannah, fetchFromGitHub
, zlib, openssl, gdbm, ncurses, readline, groff, libyaml, libffi, jemalloc, autoreconfHook, bison
, zlib, gdbm, ncurses, readline, groff, libyaml, libffi, jemalloc, autoreconfHook, bison
, autoconf, libiconv, libobjc, libunwind, Foundation
, buildEnv, bundler, bundix
, makeWrapper, buildRubyGem, defaultGemConfig, removeReferencesTo
, openssl, openssl_1_1
} @ args:

let
Expand All @@ -26,7 +27,7 @@ let
, useRailsExpress ? true
, rubygemsSupport ? true
, zlib, zlibSupport ? true
, openssl, opensslSupport ? true
, openssl, openssl_1_1, opensslSupport ? true
, gdbm, gdbmSupport ? true
, ncurses, readline, cursesSupport ? true
, groff, docSupport ? true
Expand Down Expand Up @@ -75,7 +76,8 @@ let
++ (op fiddleSupport libffi)
++ (ops cursesSupport [ ncurses readline ])
++ (op zlibSupport zlib)
++ (op opensslSupport openssl)
++ (op (lib.versionOlder ver.majMin "3.0" && opensslSupport) openssl_1_1)
++ (op (atLeast30 && opensslSupport) openssl_1_1)
++ (op gdbmSupport gdbm)
++ (op yamlSupport libyaml)
# Looks like ruby fails to build on darwin without readline even if curses
Expand Down
2 changes: 1 addition & 1 deletion pkgs/development/libraries/google-cloud-cpp/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ stdenv.mkDerivation rec {
abseil-cpp
c-ares
crc32c
curl
(curl.override { inherit openssl; })
grpc
nlohmann_json
openssl
Expand Down
12 changes: 10 additions & 2 deletions pkgs/development/libraries/libewf/default.nix
Original file line number Diff line number Diff line change
@@ -1,14 +1,22 @@
{ fetchurl, lib, stdenv, zlib, openssl, libuuid, pkg-config, bzip2 }:
{ fetchurl, fetchpatch, lib, stdenv, zlib, openssl, libuuid, pkg-config, bzip2 }:

stdenv.mkDerivation rec {
version = "20201230";
pname = "libewf";

src = fetchurl {
url = "https://github.com/libyal/libewf/releases/download/${version}/libewf-experimental-${version}.tar.gz";
sha256 = "sha256-10r4jPzsA30nHQzjdg/VkwTG1PwOskwv8Bra34ZPMgc=";
hash = "sha256-10r4jPzsA30nHQzjdg/VkwTG1PwOskwv8Bra34ZPMgc=";
};

patches = [
# fix build with OpenSSL 3.0
(fetchpatch {
url = "https://github.com/libyal/libewf/commit/033ea5b4e5f8f1248f74a2ec61fc1be183c6c46b.patch";
hash = "sha256-R4+NO/91kiZP48SJyVF9oYjKCg1h/9Kh8/0VOEmJXPQ=";
})
];

nativeBuildInputs = [ pkg-config ];
buildInputs = [ zlib openssl libuuid ]
++ lib.optionals stdenv.isDarwin [ bzip2 ];
Expand Down
17 changes: 12 additions & 5 deletions pkgs/development/libraries/libs3/default.nix
Original file line number Diff line number Diff line change
@@ -1,19 +1,26 @@
{ lib, stdenv, fetchFromGitHub, curl, libxml2 }:
{ lib, stdenv, fetchFromGitHub, fetchpatch, curl, libxml2 }:

stdenv.mkDerivation {
pname = "libs3";
version = "unstable-2018-12-03";
version = "unstable-2019-04-10";

src = fetchFromGitHub {
owner = "bji";
repo = "libs3";
rev = "111dc30029f64bbf82031f3e160f253a0a63c119";
sha256 = "1ahf08hc7ql3fazfmlyj9vrhq7cvarsmgn2v8149y63zr1fl61hs";
rev = "287e4bee6fd430ffb52604049de80a27a77ff6b4";
hash = "sha256-xgiY8oJlRMiXB1fw5dhNidfaq18YVwaJ8aErKU11O6U=";
};

patches = [
(fetchpatch { # Fix compilation with openssl 3.0
url = "https://github.com/bji/libs3/pull/112/commits/3c3a1cf915e62b730db854d8007ba835cb38677c.patch";
hash = "sha256-+rWRh8dOznHlamc/T9qbgN0E2Rww3Hn94UeErxNDccs=";
})
];

buildInputs = [ curl libxml2 ];

makeFlags = [ "DESTDIR=$(out)" ];
makeFlags = [ "DESTDIR=${placeholder "out"}" ];

meta = with lib; {
homepage = "https://github.com/bji/libs3";
Expand Down
9 changes: 5 additions & 4 deletions pkgs/development/libraries/openssl/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ let

postPatch = ''
patchShebangs Configure
'' + lib.optionalString (lib.versionOlder version "1.1.0") ''
'' + lib.optionalString (lib.versionOlder version "1.1.1") ''
patchShebangs test/*
for a in test/t* ; do
substituteInPlace "$a" \
Expand All @@ -40,7 +40,7 @@ let
# config is a configure script which is not installed.
+ lib.optionalString (lib.versionAtLeast version "1.1.1") ''
substituteInPlace config --replace '/usr/bin/env' '${buildPackages.coreutils}/bin/env'
'' + lib.optionalString (lib.versionAtLeast version "1.1.0" && stdenv.hostPlatform.isMusl) ''
'' + lib.optionalString (lib.versionAtLeast version "1.1.1" && stdenv.hostPlatform.isMusl) ''
substituteInPlace crypto/async/arch/async_posix.h \
--replace '!defined(__ANDROID__) && !defined(__OpenBSD__)' \
'!defined(__ANDROID__) && !defined(__OpenBSD__) && 0'
Expand Down Expand Up @@ -130,11 +130,12 @@ let
] ++ lib.optional enableSSL2 "enable-ssl2"
++ lib.optional enableSSL3 "enable-ssl3"
++ lib.optional (lib.versionAtLeast version "3.0.0") "enable-ktls"
++ lib.optional (lib.versionAtLeast version "1.1.0" && stdenv.hostPlatform.isAarch64) "no-afalgeng"
++ lib.optional (lib.versionAtLeast version "1.1.1" && stdenv.hostPlatform.isAarch64) "no-afalgeng"
# OpenSSL needs a specific `no-shared` configure flag.
# See https://wiki.openssl.org/index.php/Compilation_and_Installation#Configure_Options
# for a comprehensive list of configuration options.
++ lib.optional (lib.versionAtLeast version "1.1.0" && static) "no-shared"
++ lib.optional (lib.versionAtLeast version "1.1.1" && static) "no-shared"
++ lib.optional (lib.versionAtLeast version "3.0.0" && static) "no-module"
# This introduces a reference to the CTLOG_FILE which is undesired when
# trying to build binaries statically.
++ lib.optional static "no-ct"
Expand Down
35 changes: 0 additions & 35 deletions pkgs/development/libraries/qca2/default.nix

This file was deleted.

28 changes: 0 additions & 28 deletions pkgs/development/libraries/qca2/libressl.patch

This file was deleted.

11 changes: 6 additions & 5 deletions pkgs/development/lua-modules/overrides.nix
Original file line number Diff line number Diff line change
Expand Up @@ -31,8 +31,8 @@ with prev;

cqueues = (prev.lib.overrideLuarocks prev.cqueues (drv: {
externalDeps = [
{ name = "CRYPTO"; dep = pkgs.openssl; }
{ name = "OPENSSL"; dep = pkgs.openssl; }
{ name = "CRYPTO"; dep = pkgs.openssl_1_1; }
{ name = "OPENSSL"; dep = pkgs.openssl_1_1; }
];
disabled = luaOlder "5.1" || luaAtLeast "5.4";
})).overrideAttrs(oa: rec {
Expand Down Expand Up @@ -271,14 +271,15 @@ with prev;

luaossl = prev.lib.overrideLuarocks prev.luaossl (drv: {
externalDeps = [
{ name = "CRYPTO"; dep = pkgs.openssl; }
{ name = "OPENSSL"; dep = pkgs.openssl; }
# https://github.com/wahern/luaossl/pull/199
{ name = "CRYPTO"; dep = pkgs.openssl_1_1; }
{ name = "OPENSSL"; dep = pkgs.openssl_1_1; }
];
});

luasec = prev.lib.overrideLuarocks prev.luasec (drv: {
externalDeps = [
{ name = "OPENSSL"; dep = pkgs.openssl; }
{ name = "OPENSSL"; dep = pkgs.openssl_1_1; }
];
});

Expand Down
5 changes: 3 additions & 2 deletions pkgs/development/ruby-modules/gem-config/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@
{ lib, fetchurl, writeScript, ruby, libkrb5, libxml2, libxslt, python2, stdenv, which
, libiconv, postgresql, v8, clang, sqlite, zlib, imagemagick, lasem
, pkg-config , ncurses, xapian, gpgme, util-linux, tzdata, icu, libffi
, cmake, libssh2, openssl, libmysqlclient, git, perl, pcre, gecode_3, curl
, cmake, libssh2, openssl, openssl_1_1, libmysqlclient, git, perl, pcre, gecode_3, curl
, msgpack, libsodium, snappy, libossp_uuid, lxc, libpcap, xorg, gtk2, buildRubyGem
, cairo, re2, rake, gobject-introspection, gdk-pixbuf, zeromq, czmq, graphicsmagick, libcxx
, file, libvirt, glib, vips, taglib, libopus, linux-pam, libidn, protobuf, fribidi, harfbuzz
Expand Down Expand Up @@ -478,7 +478,8 @@ in
};

openssl = attrs: {
buildInputs = [ openssl ];
# https://github.com/ruby/openssl/issues/369
buildInputs = [ openssl_1_1 ];
};

opus-ruby = attrs: {
Expand Down
3 changes: 2 additions & 1 deletion pkgs/development/tools/rust/rustup/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@
, rustPlatform
, makeWrapper
, pkg-config
, openssl
, curl
, zlib
, Security
Expand Down Expand Up @@ -36,7 +37,7 @@ rustPlatform.buildRustPackage rec {
nativeBuildInputs = [ makeWrapper pkg-config ];

buildInputs = [
curl
(curl.override { inherit openssl; })
zlib
] ++ lib.optionals stdenv.isDarwin [ CoreServices Security libiconv xz ];

Expand Down
3 changes: 2 additions & 1 deletion pkgs/development/web/nodejs/v14.nix
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
{ callPackage, python3, lib, stdenv, enableNpm ? true }:
{ callPackage, python3, lib, stdenv, openssl, enableNpm ? true }:

let
buildNodejs = callPackage ./nodejs.nix {
inherit openssl;
python = python3;
};
in
Expand Down
Loading