cc-wrapper: ensure NIX_HARDENING_ENABLE
fortify3
implies fortify
too
#253194
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description of changes
i.e. even if
fortify3
is inhardening_unsupported_flags
This fixes a rather obscure piece of behaviour that probably wouldn't have been noticed by anything other than my hardening flag test suite (see #253186).
But it makes the clang and gcc paths behave ever so slightly differently due to clang being marked with
hardeningUnsupportedFlags = [ "fortify3" ];
. It currently has the effect of also disablingfortify
if onlyfortify3
is mentioned inNIX_HARDENING_ENABLE
for some reason, and I think most people would find that behaviour surprising.Things done
sandbox = true
set innix.conf
? (See Nix manual)nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)