aboutsummaryrefslogtreecommitdiff
path: root/nixpkgs/pkgs/applications/virtualization
diff options
context:
space:
mode:
authorKatharina Fey <kookie@spacekookie.de>2020-02-03 09:26:35 +0100
committerKatharina Fey <kookie@spacekookie.de>2020-02-03 09:26:35 +0100
commit899a451e08f7d6d2c8214d119c2a0316849a0ed4 (patch)
tree5e72a7288b7d2b33fead36fbfe91a02a48ff7fef /nixpkgs/pkgs/applications/virtualization
parent5962418b6543dfb3ca34965c0fa16dd77543801b (diff)
parenta21c2fa3ea2b88e698db6fc151d9c7259ae14d96 (diff)
Merge commit 'a21c2fa3ea2b88e698db6fc151d9c7259ae14d96'
Diffstat (limited to 'nixpkgs/pkgs/applications/virtualization')
-rw-r--r--nixpkgs/pkgs/applications/virtualization/conmon/default.nix4
-rw-r--r--nixpkgs/pkgs/applications/virtualization/cri-o/default.nix5
-rw-r--r--nixpkgs/pkgs/applications/virtualization/crun/default.nix12
-rw-r--r--nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix4
-rw-r--r--nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix5
-rw-r--r--nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch28
-rw-r--r--nixpkgs/pkgs/applications/virtualization/podman/default.nix12
-rw-r--r--nixpkgs/pkgs/applications/virtualization/runc/default.nix4
-rw-r--r--nixpkgs/pkgs/applications/virtualization/xen/4.5.nix261
-rw-r--r--nixpkgs/pkgs/applications/virtualization/xen/packages.nix53
10 files changed, 43 insertions, 345 deletions
diff --git a/nixpkgs/pkgs/applications/virtualization/conmon/default.nix b/nixpkgs/pkgs/applications/virtualization/conmon/default.nix
index 49d14d25bab..802272c4b5d 100644
--- a/nixpkgs/pkgs/applications/virtualization/conmon/default.nix
+++ b/nixpkgs/pkgs/applications/virtualization/conmon/default.nix
@@ -9,13 +9,13 @@
stdenv.mkDerivation rec {
project = "conmon";
name = "${project}-${version}";
- version = "2.0.9";
+ version = "2.0.10";
src = fetchFromGitHub {
owner = "containers";
repo = project;
rev = "v${version}";
- sha256 = "0wy3nihif9ih62rlskrjysshfaxdl878fj5ni1zfb9db4nsx6z0m";
+ sha256 = "194wach3yrkvll2xaj0x77hzlngk2016mflgnd5k8knjn2b9dgvl";
};
nativeBuildInputs = [ pkgconfig ];
diff --git a/nixpkgs/pkgs/applications/virtualization/cri-o/default.nix b/nixpkgs/pkgs/applications/virtualization/cri-o/default.nix
index 483c6f8b337..f6e78f364c2 100644
--- a/nixpkgs/pkgs/applications/virtualization/cri-o/default.nix
+++ b/nixpkgs/pkgs/applications/virtualization/cri-o/default.nix
@@ -16,8 +16,7 @@
}:
let
- makeFlags = "BUILDTAGS=\"apparmor seccomp selinux
- containers_image_ostree_stub\"";
+ buildTags = "apparmor seccomp selinux containers_image_ostree_stub";
in buildGoPackage rec {
project = "cri-o";
version = "1.16.1";
@@ -47,7 +46,7 @@ in buildGoPackage rec {
# Build the crio binaries
function build() {
go build \
- -tags ${makeFlags} \
+ -tags "${buildTags}" \
-o bin/"$1" \
-buildmode=pie \
-ldflags '-s -w ${ldflags}' \
diff --git a/nixpkgs/pkgs/applications/virtualization/crun/default.nix b/nixpkgs/pkgs/applications/virtualization/crun/default.nix
index 9376adf8d6a..6fc60780ba7 100644
--- a/nixpkgs/pkgs/applications/virtualization/crun/default.nix
+++ b/nixpkgs/pkgs/applications/virtualization/crun/default.nix
@@ -3,13 +3,13 @@
stdenv.mkDerivation rec {
pname = "crun";
- version = "0.10.6";
+ version = "0.11";
src = fetchFromGitHub {
owner = "containers";
repo = pname;
rev = version;
- sha256 = "0v1hrlpnln0c976fb0k2ig4jv11qbyzf95z0wy92fd8r8in16rc1";
+ sha256 = "0mn64hrgx4a7mhqjxn127i8yivhn1grp93wws1da1ffj4ap6ay76";
fetchSubmodules = true;
};
@@ -19,6 +19,14 @@ stdenv.mkDerivation rec {
enableParallelBuilding = true;
+ preBuild = ''
+ cat > git-version.h <<EOF
+ #ifndef GIT_VERSION
+ # define GIT_VERSION "nixpkgs-${version}"
+ #endif
+ EOF
+ '';
+
# the tests require additional permissions
doCheck = false;
diff --git a/nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix b/nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix
index 7e8dbf33a7b..4bb03aa4ac3 100644
--- a/nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix
+++ b/nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix
@@ -7,12 +7,12 @@
}:
buildPythonApplication rec {
- version = "1.25.0";
+ version = "1.25.1";
pname = "docker-compose";
src = fetchPypi {
inherit pname version;
- sha256 = "0zlprmsgmj4z627snsl0qmq8y7ggcyqrqm5vxvrvcigl7zywnprc";
+ sha256 = "003rb5hp8plb3yvv0x5dwzz13gdvq91nvrvx29d41h97n1lklw67";
};
# lots of networking and other fails
diff --git a/nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix b/nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix
index cf160d8af53..87ec2e52f13 100644
--- a/nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix
+++ b/nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix
@@ -6,13 +6,13 @@
stdenv.mkDerivation rec {
pname = "open-vm-tools";
- version = "10.3.10";
+ version = "11.0.5";
src = fetchFromGitHub {
owner = "vmware";
repo = "open-vm-tools";
rev = "stable-${version}";
- sha256 = "0x2cyccnb4sycrw7r5mzby2d196f9jiph8vyqi0x8v8r2b4vi4yj";
+ sha256 = "0idh8dqwb1df2di689090k9x1iap35jk3wg8yb1g70byichmscqb";
};
sourceRoot = "${src.name}/open-vm-tools";
@@ -29,6 +29,7 @@ stdenv.mkDerivation rec {
mkdir -p common-agent/etc/config
sed -i 's|.*common-agent/etc/config/Makefile.*|\\|' configure.ac
+ sed -i 's,etc/vmware-tools,''${prefix}/etc/vmware-tools,' Makefile.am
sed -i 's,^confdir = ,confdir = ''${prefix},' scripts/Makefile.am
sed -i 's,etc/vmware-tools,''${prefix}/etc/vmware-tools,' services/vmtoolsd/Makefile.am
sed -i 's,$(PAM_PREFIX),''${prefix}/$(PAM_PREFIX),' services/vmtoolsd/Makefile.am
diff --git a/nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch b/nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch
index 46d8ea7f7f3..95b0951b585 100644
--- a/nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch
+++ b/nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch
@@ -1,8 +1,8 @@
-diff --git a/lib/include/guest_os.h b/open-vm-tools/lib/include/guest_os.h
-index ef202e3..c7a105d 100644
+diff --git a/lib/include/guest_os.h b/lib/include/guest_os.h
+index 868dec68..0b9a2ad7 100644
--- a/lib/include/guest_os.h
+++ b/lib/include/guest_os.h
-@@ -238,6 +238,7 @@ Bool Gos_InSetArray(uint32 gos, const uint32 *set);
+@@ -278,6 +278,7 @@ Bool Gos_InSetArray(uint32 gos, const uint32 *set);
#define STR_OS_MANDRAKE_FULL "Mandrake Linux"
#define STR_OS_MANDRIVA "mandriva"
#define STR_OS_MKLINUX "MkLinux"
@@ -10,19 +10,19 @@ index ef202e3..c7a105d 100644
#define STR_OS_NOVELL "nld9"
#define STR_OS_NOVELL_FULL "Novell Linux Desktop 9"
#define STR_OS_ORACLE6 "oraclelinux6"
-diff --git a/lib/misc/hostinfoPosix.c b/open-vm-tools/lib/misc/hostinfoPosix.c
-index 0f55070..2d8467c 100644
+diff --git a/lib/misc/hostinfoPosix.c b/lib/misc/hostinfoPosix.c
+index 348a67ec..5f8beb2b 100644
--- a/lib/misc/hostinfoPosix.c
+++ b/lib/misc/hostinfoPosix.c
-@@ -195,6 +195,7 @@ static const DistroInfo distroArray[] = {
- {"Mandrake", "/etc/mandrake-release"},
- {"Mandriva", "/etc/mandriva-release"},
- {"MkLinux", "/etc/mklinux-release"},
-+ {"NixOS", "/etc/os-release"},
- {"Novell", "/etc/nld-release"},
- {"OracleLinux", "/etc/oracle-release"},
- {"Photon", "/etc/lsb-release"},
-@@ -554,6 +555,8 @@ HostinfoGetOSShortName(char *distro, // IN: full distro name
+@@ -203,6 +203,7 @@ static const DistroInfo distroArray[] = {
+ { "Mandrake", "/etc/mandrake-release" },
+ { "Mandriva", "/etc/mandriva-release" },
+ { "MkLinux", "/etc/mklinux-release" },
++ { "NixOS", "/etc/os-release" },
+ { "Novell", "/etc/nld-release" },
+ { "OracleLinux", "/etc/oracle-release" },
+ { "Photon", "/etc/lsb-release" },
+@@ -865,6 +866,8 @@ HostinfoGetOSShortName(const char *distro, // IN: full distro name
}
} else if (strstr(distroLower, "mandrake")) {
Str_Strcpy(distroShort, STR_OS_MANDRAKE, distroShortSize);
diff --git a/nixpkgs/pkgs/applications/virtualization/podman/default.nix b/nixpkgs/pkgs/applications/virtualization/podman/default.nix
index 607d790247f..dbd05e38d3f 100644
--- a/nixpkgs/pkgs/applications/virtualization/podman/default.nix
+++ b/nixpkgs/pkgs/applications/virtualization/podman/default.nix
@@ -20,12 +20,14 @@ buildGoPackage rec {
nativeBuildInputs = [ pkgconfig go-md2man installShellFiles ];
- buildInputs = [ btrfs-progs libseccomp gpgme lvm2 systemd ];
+ buildInputs = stdenv.lib.optionals stdenv.isLinux [ btrfs-progs libseccomp gpgme lvm2 systemd ];
buildPhase = ''
- pushd $NIX_BUILD_TOP/go/src/${goPackagePath}
+ pushd go/src/${goPackagePath}
patchShebangs .
- make binaries docs
+ ${if stdenv.isDarwin
+ then "make CGO_ENABLED=0 BUILDTAGS='remoteclient containers_image_openpgp exclude_graphdriver_devicemapper' varlink_generate all"
+ else "make binaries docs"}
'';
installPhase = ''
@@ -39,7 +41,7 @@ buildGoPackage rec {
homepage = https://podman.io/;
description = "A program for managing pods, containers and container images";
license = licenses.asl20;
- maintainers = with maintainers; [ vdemeester saschagrunert ];
- platforms = platforms.linux;
+ maintainers = with maintainers; [ vdemeester saschagrunert marsam ];
+ platforms = platforms.unix;
};
}
diff --git a/nixpkgs/pkgs/applications/virtualization/runc/default.nix b/nixpkgs/pkgs/applications/virtualization/runc/default.nix
index 48bd81f383a..e7713d45f2f 100644
--- a/nixpkgs/pkgs/applications/virtualization/runc/default.nix
+++ b/nixpkgs/pkgs/applications/virtualization/runc/default.nix
@@ -5,13 +5,13 @@ with lib;
buildGoPackage rec {
pname = "runc";
- version = "1.0.0-rc9";
+ version = "1.0.0-rc10";
src = fetchFromGitHub {
owner = "opencontainers";
repo = "runc";
rev = "v${version}";
- sha256 = "1ss5b46cbbckyqlwgj8dbd5l59c5y0kp679hcpc0ybaj53pmwxj7";
+ sha256 = "0pi3rvj585997m4z9ljkxz2z9yxf9p2jr0pmqbqrc7bc95f5hagk";
};
goPackagePath = "github.com/opencontainers/runc";
diff --git a/nixpkgs/pkgs/applications/virtualization/xen/4.5.nix b/nixpkgs/pkgs/applications/virtualization/xen/4.5.nix
deleted file mode 100644
index af4721516ec..00000000000
--- a/nixpkgs/pkgs/applications/virtualization/xen/4.5.nix
+++ /dev/null
@@ -1,261 +0,0 @@
-{ stdenv, callPackage, fetchurl, fetchpatch, fetchgit
-, ocaml-ng
-, withInternalQemu ? true
-, withInternalTraditionalQemu ? true
-, withInternalSeabios ? true
-, withSeabios ? !withInternalSeabios, seabios ? null
-, withInternalOVMF ? false # FIXME: tricky to build
-, withOVMF ? false, OVMF
-, withLibHVM ? true
-
-# qemu
-, udev, pciutils, xorg, SDL, pixman, acl, glusterfs, spice-protocol, usbredir
-, alsaLib
-, ... } @ args:
-
-assert withInternalSeabios -> !withSeabios;
-assert withInternalOVMF -> !withOVMF;
-
-with stdenv.lib;
-
-# Patching XEN? Check the XSAs at
-# https://xenbits.xen.org/xsa/
-# and try applying all the ones we don't have yet.
-
-let
- xsaPatch = { name , sha256 }: (fetchpatch {
- url = "https://xenbits.xen.org/xsa/xsa${name}.patch";
- inherit sha256;
- });
-
- qemuDeps = [
- udev pciutils xorg.libX11 SDL pixman acl glusterfs spice-protocol usbredir
- alsaLib
- ];
-
- xsa = import ./xsa-patches.nix { inherit fetchpatch; };
-in
-
-callPackage (import ./generic.nix (rec {
- version = "4.5.5";
-
- meta = {
- knownVulnerabilities = [ "Security support ended in January 2018" ];
- };
-
- src = fetchurl {
- url = "https://downloads.xenproject.org/release/xen/${version}/xen-${version}.tar.gz";
- sha256 = "1y74ms4yc3znf8jc3fgyq94va2y0pf7jh8m9pfqnpgklywqnw8g2";
- };
-
- # Sources needed to build tools and firmwares.
- xenfiles = optionalAttrs withInternalQemu {
- qemu-xen = {
- src = fetchgit {
- url = https://xenbits.xen.org/git-http/qemu-xen.git;
- rev = "refs/tags/qemu-xen-${version}";
- sha256 = "014s755slmsc7xzy7qhk9i3kbjr2grxb5yznjp71dl6xxfvnday2";
- };
- buildInputs = qemuDeps;
- patches = [
- (xsaPatch {
- name = "197-4.5-qemuu";
- sha256 = "09gp980qdlfpfmxy0nk7ncyaa024jnrpzx9gpq2kah21xygy5myx";
- })
- (xsaPatch {
- name = "208-qemuu-4.7";
- sha256 = "0z9b1whr8rp2riwq7wndzcnd7vw1ckwx0vbk098k2pcflrzppgrb";
- })
- (xsaPatch {
- name = "209-qemuu/0001-display-cirrus-ignore-source-pitch-value-as-needed-i";
- sha256 = "1xvxzsrsq05fj6szjlpbgg4ia3cw54dn5g7xzq1n1dymbhv606m0";
- })
- (xsaPatch {
- name = "209-qemuu/0002-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput";
- sha256 = "0avxqs9922qjfsxxlk7bh10432a526j2yyykhags8dk1bzxkpxwv";
- })
- (xsaPatch {
- name = "211-qemuu-4.6";
- sha256 = "1g090xs8ca8676vyi78b99z5yjdliw6mxkr521b8kimhf8crx4yg";
- })
- (xsaPatch {
- name = "216-qemuu-4.5";
- sha256 = "0nh5akbal93czia1gh1pzvwq7gc4zwiyr1hbyk1m6wwdmqv6ph61";
- })
- ];
- meta.description = "Xen's fork of upstream Qemu";
- };
- } // optionalAttrs withInternalTraditionalQemu {
- qemu-xen-traditional = {
- src = fetchgit {
- url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git;
- rev = "refs/tags/xen-${version}";
- sha256 = "0n0ycxlf1wgdjkdl8l2w1i0zzssk55dfv67x8i6b2ima01r0k93r";
- };
- buildInputs = qemuDeps;
- patches = [
- (xsaPatch {
- name = "197-4.5-qemut";
- sha256 = "17l7npw00gyhqzzaqamwm9cawfvzm90zh6jjyy95dmqbh7smvy79";
- })
- (xsaPatch {
- name = "199-trad";
- sha256 = "0dfw6ciycw9a9s97sbnilnzhipnzmdm9f7xcfngdjfic8cqdcv42";
- })
- (xsaPatch {
- name = "208-qemut";
- sha256 = "0960vhchixp60j9h2lawgbgzf6mpcdk440kblk25a37bd6172l54";
- })
- (xsaPatch {
- name = "209-qemut";
- sha256 = "1hq8ghfzw6c47pb5vf9ngxwgs8slhbbw6cq7gk0nam44rwvz743r";
- })
- (xsaPatch {
- name = "211-qemut-4.5";
- sha256 = "1z3phabvqmxv4b5923fx63hwdg4v1fnl15zbl88873ybqn0hp50f";
- })
- ];
- postPatch = ''
- substituteInPlace xen-hooks.mak \
- --replace /usr/include/pci ${pciutils}/include/pci
- '';
- meta.description = "Xen's fork of upstream Qemu that uses old device model";
- };
- } // optionalAttrs withInternalSeabios {
- "firmware/seabios-dir-remote" = {
- src = fetchgit {
- url = https://xenbits.xen.org/git-http/seabios.git;
- rev = "e51488c5f8800a52ac5c8da7a31b85cca5cc95d2";
- #rev = "rel-1.7.5";
- sha256 = "0jk54ybhmw97pzyhpm6jr2x99f702kbn0ipxv5qxcbynflgdazyb";
- };
- patches = [ ./0000-qemu-seabios-enable-ATA_DMA.patch ];
- meta.description = "Xen's fork of Seabios";
- };
- } // optionalAttrs withInternalOVMF {
- "firmware/ovmf-dir-remote" = {
- src = fetchgit {
- url = https://xenbits.xen.org/git-http/ovmf.git;
- rev = "cb9a7ebabcd6b8a49dc0854b2f9592d732b5afbd";
- sha256 = "07zmdj90zjrzip74fvd4ss8n8njk6cim85s58mc6snxmqqv7gmcq";
- };
- meta.description = "Xen's fork of OVMF";
- };
- } // {
- # TODO: patch Xen to make this optional?
- "firmware/etherboot/ipxe.git" = {
- src = fetchgit {
- url = https://git.ipxe.org/ipxe.git;
- rev = "9a93db3f0947484e30e753bbd61a10b17336e20e";
- sha256 = "1ga3h1b34q0cl9azj7j9nswn7mfcs3cgfjdihrm5zkp2xw2hpvr6";
- };
- meta.description = "Xen's fork of iPXE";
- };
- } // optionalAttrs withLibHVM {
- xen-libhvm-dir-remote = {
- src = fetchgit {
- name = "xen-libhvm";
- url = https://github.com/ts468/xen-libhvm;
- rev = "442dcc4f6f4e374a51e4613532468bd6b48bdf63";
- sha256 = "9ba97c39a00a54c154785716aa06691d312c99be498ebbc00dc3769968178ba8";
- };
- buildPhase = ''
- make
- cd biospt
- cc -Wall -g -D_LINUX -Wstrict-prototypes biospt.c -o biospt -I../libhvm -L../libhvm -lxenhvm
- '';
- installPhase = ''
- make install
- cp biospt/biospt $out/bin/
- '';
- meta = {
- description = ''
- Helper library for reading ACPI and SMBIOS firmware values
- from the host system for use with the HVM guest firmware
- pass-through feature in Xen'';
- license = licenses.bsd2;
- };
- };
- };
-
- configureFlags = []
- ++ optional (!withInternalQemu) "--with-system-qemu" # use qemu from PATH
- ++ optional (withInternalTraditionalQemu) "--enable-qemu-traditional"
- ++ optional (!withInternalTraditionalQemu) "--disable-qemu-traditional"
-
- ++ optional (withSeabios) "--with-system-seabios=${seabios}"
- ++ optional (!withInternalSeabios && !withSeabios) "--disable-seabios"
-
- ++ optional (withOVMF) "--with-system-ovmf=${OVMF.fd}/FV/OVMF.fd"
- ++ optional (withInternalOVMF) "--enable-ovmf";
-
- patches = with xsa; flatten [
- ./0001-libxl-Spice-image-compression-setting-support-for-up.patch
- ./0002-libxl-Spice-streaming-video-setting-support-for-upst.patch
- ./0003-Add-qxl-vga-interface-support-for-upstream-qem.patch
- XSA_190
- XSA_191
- XSA_192
- XSA_193
- XSA_195
- XSA_196
- XSA_198
- XSA_200
- XSA_202_45
- XSA_204_45
- XSA_206_45
- XSA_207
- XSA_212
- XSA_213_45
- XSA_214
- XSA_215
- XSA_217_45
- XSA_218_45
- XSA_219_45
- XSA_220_45
- XSA_221
- XSA_222_45
- XSA_223
- XSA_224_45
- XSA_227_45
- XSA_230
- XSA_231_45
- XSA_232
- XSA_233
- XSA_234_45
- XSA_235_45
- XSA_236_45
- XSA_237_45
- XSA_238_45
- XSA_239_45
- XSA_240_45
- XSA_241
- XSA_242
- XSA_243_45
- XSA_244_45
- XSA_245
- XSA_246_45
- XSA_247_45
- XSA_248_45
- XSA_249
- XSA_250_45
- XSA_251_45
- ];
-
- # Fix build on Glibc 2.24.
- NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations";
-
- postPatch = ''
- # Avoid a glibc >= 2.25 deprecation warnings that get fatal via -Werror.
- sed 1i'#include <sys/sysmacros.h>' \
- -i tools/blktap2/control/tap-ctl-allocate.c \
- -i tools/libxl/libxl_device.c
- '';
-
- passthru = {
- qemu-system-i386 = if withInternalQemu
- then "lib/xen/bin/qemu-system-i386"
- else throw "this xen has no qemu builtin";
- };
-
-})) ({ ocamlPackages = ocaml-ng.ocamlPackages_4_02; } // args)
diff --git a/nixpkgs/pkgs/applications/virtualization/xen/packages.nix b/nixpkgs/pkgs/applications/virtualization/xen/packages.nix
index 791a3b91818..e30006fbcc1 100644
--- a/nixpkgs/pkgs/applications/virtualization/xen/packages.nix
+++ b/nixpkgs/pkgs/applications/virtualization/xen/packages.nix
@@ -1,62 +1,11 @@
{ callPackage
-, stdenv, overrideCC, gcc49
+, stdenv, overrideCC
}:
# TODO(@oxij) on new Xen version: generalize this to generate [vanilla slim
# light] for each ./<version>.nix.
rec {
-
- xen_4_5-vanilla = callPackage ./4.5.nix {
- # At the very least included seabios and etherboot need gcc49,
- # so we have to build all of it with gcc49.
- stdenv = overrideCC stdenv gcc49;
-
- meta = {
- description = "vanilla";
- longDescription = ''
- Vanilla version of Xen. Uses forks of Qemu and Seabios bundled
- with Xen. This gives vanilla experince, but wastes space and
- build time: typical NixOS setup that runs lots of VMs will
- build three different versions of Qemu when using this (two
- forks and upstream).
- '';
- };
- };
-
- xen_4_5-slim = xen_4_5-vanilla.override {
- withInternalQemu = false;
- withInternalTraditionalQemu = true;
- withInternalSeabios = false;
- withSeabios = true;
-
- meta = {
- description = "slim";
- longDescription = ''
- Slimmed-down version of Xen that reuses nixpkgs packages as
- much as possible. Different parts may get out of sync, but
- this builds faster and uses less space than vanilla. Use with
- `qemu_xen` from nixpkgs.
- '';
- };
- };
-
- xen_4_5-light = xen_4_5-vanilla.override {
- withInternalQemu = false;
- withInternalTraditionalQemu = false;
- withInternalSeabios = false;
- withSeabios = true;
-
- meta = {
- description = "light";
- longDescription = ''
- Slimmed-down version of Xen without `qemu-traditional` (you
- don't need it if you don't know what it is). Use with
- `qemu_xen-light` from nixpkgs.
- '';
- };
- };
-
xen_4_8-vanilla = callPackage ./4.8.nix {
meta = {
description = "vanilla";