nixpkgs/pkgs/by-name/wa/wasm3/package.nix
aleksana 571c71e6f7 treewide: migrate packages to pkgs/by-name, take 1
We are migrating packages that meet below requirements:

1. using `callPackage`
2. called path is a directory
3. overriding set is empty (`{ }`)
4. not containing path expressions other than relative path (to
makenixpkgs-vet happy)
5. not referenced by nix files outside of the directory, other
than`pkgs/top-level/all-packages.nix`
6. not referencing nix files outside of the directory
7. not referencing `default.nix` (since it's changed to `package.nix`)
8. `outPath` doesn't change after migration

The tool is here: https://github.com/Aleksanaa/by-name-migrate.
2024-11-09 20:04:51 +08:00

47 lines
1.1 KiB
Nix

{ lib, stdenv, cmake, fetchFromGitHub }:
stdenv.mkDerivation rec {
pname = "wasm3";
version = "0.5.0";
src = fetchFromGitHub {
owner = "wasm3";
repo = "wasm3";
rev = "v${version}";
sha256 = "07zzmk776j8ydyxhrnnjiscbhhmz182a62r6aix6kfk5kq2cwia2";
};
nativeBuildInputs = [ cmake ];
cmakeFlags = [
"-DBUILD_WASI=simple"
];
installPhase = ''
runHook preInstall
install -Dm755 wasm3 -t $out/bin
runHook postInstall
'';
meta = with lib; {
homepage = "https://github.com/wasm3/wasm3";
description = "Fastest WebAssembly interpreter, and the most universal runtime";
platforms = platforms.all;
maintainers = with maintainers; [ malbarbo ];
license = licenses.mit;
knownVulnerabilities = [
# wasm3 expects all wasm code to be pre-validated, any users
# should be aware that running unvalidated wasm will potentially
# lead to RCE until upstream have added a builtin validator
"CVE-2022-39974"
"CVE-2022-34529"
"CVE-2022-28990"
"CVE-2022-28966"
"CVE-2021-45947"
"CVE-2021-45946"
"CVE-2021-45929"
"CVE-2021-38592"
];
};
}