diff options
author | Katharina Fey <kookie@spacekookie.de> | 2020-02-03 09:26:35 +0100 |
---|---|---|
committer | Katharina Fey <kookie@spacekookie.de> | 2020-02-03 09:26:35 +0100 |
commit | 899a451e08f7d6d2c8214d119c2a0316849a0ed4 (patch) | |
tree | 5e72a7288b7d2b33fead36fbfe91a02a48ff7fef /nixpkgs/pkgs/applications/virtualization | |
parent | 5962418b6543dfb3ca34965c0fa16dd77543801b (diff) | |
parent | a21c2fa3ea2b88e698db6fc151d9c7259ae14d96 (diff) |
Merge commit 'a21c2fa3ea2b88e698db6fc151d9c7259ae14d96'
Diffstat (limited to 'nixpkgs/pkgs/applications/virtualization')
10 files changed, 43 insertions, 345 deletions
diff --git a/nixpkgs/pkgs/applications/virtualization/conmon/default.nix b/nixpkgs/pkgs/applications/virtualization/conmon/default.nix index 49d14d25bab..802272c4b5d 100644 --- a/nixpkgs/pkgs/applications/virtualization/conmon/default.nix +++ b/nixpkgs/pkgs/applications/virtualization/conmon/default.nix @@ -9,13 +9,13 @@ stdenv.mkDerivation rec { project = "conmon"; name = "${project}-${version}"; - version = "2.0.9"; + version = "2.0.10"; src = fetchFromGitHub { owner = "containers"; repo = project; rev = "v${version}"; - sha256 = "0wy3nihif9ih62rlskrjysshfaxdl878fj5ni1zfb9db4nsx6z0m"; + sha256 = "194wach3yrkvll2xaj0x77hzlngk2016mflgnd5k8knjn2b9dgvl"; }; nativeBuildInputs = [ pkgconfig ]; diff --git a/nixpkgs/pkgs/applications/virtualization/cri-o/default.nix b/nixpkgs/pkgs/applications/virtualization/cri-o/default.nix index 483c6f8b337..f6e78f364c2 100644 --- a/nixpkgs/pkgs/applications/virtualization/cri-o/default.nix +++ b/nixpkgs/pkgs/applications/virtualization/cri-o/default.nix @@ -16,8 +16,7 @@ }: let - makeFlags = "BUILDTAGS=\"apparmor seccomp selinux - containers_image_ostree_stub\""; + buildTags = "apparmor seccomp selinux containers_image_ostree_stub"; in buildGoPackage rec { project = "cri-o"; version = "1.16.1"; @@ -47,7 +46,7 @@ in buildGoPackage rec { # Build the crio binaries function build() { go build \ - -tags ${makeFlags} \ + -tags "${buildTags}" \ -o bin/"$1" \ -buildmode=pie \ -ldflags '-s -w ${ldflags}' \ diff --git a/nixpkgs/pkgs/applications/virtualization/crun/default.nix b/nixpkgs/pkgs/applications/virtualization/crun/default.nix index 9376adf8d6a..6fc60780ba7 100644 --- a/nixpkgs/pkgs/applications/virtualization/crun/default.nix +++ b/nixpkgs/pkgs/applications/virtualization/crun/default.nix @@ -3,13 +3,13 @@ stdenv.mkDerivation rec { pname = "crun"; - version = "0.10.6"; + version = "0.11"; src = fetchFromGitHub { owner = "containers"; repo = pname; rev = version; - sha256 = "0v1hrlpnln0c976fb0k2ig4jv11qbyzf95z0wy92fd8r8in16rc1"; + sha256 = "0mn64hrgx4a7mhqjxn127i8yivhn1grp93wws1da1ffj4ap6ay76"; fetchSubmodules = true; }; @@ -19,6 +19,14 @@ stdenv.mkDerivation rec { enableParallelBuilding = true; + preBuild = '' + cat > git-version.h <<EOF + #ifndef GIT_VERSION + # define GIT_VERSION "nixpkgs-${version}" + #endif + EOF + ''; + # the tests require additional permissions doCheck = false; diff --git a/nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix b/nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix index 7e8dbf33a7b..4bb03aa4ac3 100644 --- a/nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix +++ b/nixpkgs/pkgs/applications/virtualization/docker-compose/default.nix @@ -7,12 +7,12 @@ }: buildPythonApplication rec { - version = "1.25.0"; + version = "1.25.1"; pname = "docker-compose"; src = fetchPypi { inherit pname version; - sha256 = "0zlprmsgmj4z627snsl0qmq8y7ggcyqrqm5vxvrvcigl7zywnprc"; + sha256 = "003rb5hp8plb3yvv0x5dwzz13gdvq91nvrvx29d41h97n1lklw67"; }; # lots of networking and other fails diff --git a/nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix b/nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix index cf160d8af53..87ec2e52f13 100644 --- a/nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix +++ b/nixpkgs/pkgs/applications/virtualization/open-vm-tools/default.nix @@ -6,13 +6,13 @@ stdenv.mkDerivation rec { pname = "open-vm-tools"; - version = "10.3.10"; + version = "11.0.5"; src = fetchFromGitHub { owner = "vmware"; repo = "open-vm-tools"; rev = "stable-${version}"; - sha256 = "0x2cyccnb4sycrw7r5mzby2d196f9jiph8vyqi0x8v8r2b4vi4yj"; + sha256 = "0idh8dqwb1df2di689090k9x1iap35jk3wg8yb1g70byichmscqb"; }; sourceRoot = "${src.name}/open-vm-tools"; @@ -29,6 +29,7 @@ stdenv.mkDerivation rec { mkdir -p common-agent/etc/config sed -i 's|.*common-agent/etc/config/Makefile.*|\\|' configure.ac + sed -i 's,etc/vmware-tools,''${prefix}/etc/vmware-tools,' Makefile.am sed -i 's,^confdir = ,confdir = ''${prefix},' scripts/Makefile.am sed -i 's,etc/vmware-tools,''${prefix}/etc/vmware-tools,' services/vmtoolsd/Makefile.am sed -i 's,$(PAM_PREFIX),''${prefix}/$(PAM_PREFIX),' services/vmtoolsd/Makefile.am diff --git a/nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch b/nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch index 46d8ea7f7f3..95b0951b585 100644 --- a/nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch +++ b/nixpkgs/pkgs/applications/virtualization/open-vm-tools/recognize_nixos.patch @@ -1,8 +1,8 @@ -diff --git a/lib/include/guest_os.h b/open-vm-tools/lib/include/guest_os.h -index ef202e3..c7a105d 100644 +diff --git a/lib/include/guest_os.h b/lib/include/guest_os.h +index 868dec68..0b9a2ad7 100644 --- a/lib/include/guest_os.h +++ b/lib/include/guest_os.h -@@ -238,6 +238,7 @@ Bool Gos_InSetArray(uint32 gos, const uint32 *set); +@@ -278,6 +278,7 @@ Bool Gos_InSetArray(uint32 gos, const uint32 *set); #define STR_OS_MANDRAKE_FULL "Mandrake Linux" #define STR_OS_MANDRIVA "mandriva" #define STR_OS_MKLINUX "MkLinux" @@ -10,19 +10,19 @@ index ef202e3..c7a105d 100644 #define STR_OS_NOVELL "nld9" #define STR_OS_NOVELL_FULL "Novell Linux Desktop 9" #define STR_OS_ORACLE6 "oraclelinux6" -diff --git a/lib/misc/hostinfoPosix.c b/open-vm-tools/lib/misc/hostinfoPosix.c -index 0f55070..2d8467c 100644 +diff --git a/lib/misc/hostinfoPosix.c b/lib/misc/hostinfoPosix.c +index 348a67ec..5f8beb2b 100644 --- a/lib/misc/hostinfoPosix.c +++ b/lib/misc/hostinfoPosix.c -@@ -195,6 +195,7 @@ static const DistroInfo distroArray[] = { - {"Mandrake", "/etc/mandrake-release"}, - {"Mandriva", "/etc/mandriva-release"}, - {"MkLinux", "/etc/mklinux-release"}, -+ {"NixOS", "/etc/os-release"}, - {"Novell", "/etc/nld-release"}, - {"OracleLinux", "/etc/oracle-release"}, - {"Photon", "/etc/lsb-release"}, -@@ -554,6 +555,8 @@ HostinfoGetOSShortName(char *distro, // IN: full distro name +@@ -203,6 +203,7 @@ static const DistroInfo distroArray[] = { + { "Mandrake", "/etc/mandrake-release" }, + { "Mandriva", "/etc/mandriva-release" }, + { "MkLinux", "/etc/mklinux-release" }, ++ { "NixOS", "/etc/os-release" }, + { "Novell", "/etc/nld-release" }, + { "OracleLinux", "/etc/oracle-release" }, + { "Photon", "/etc/lsb-release" }, +@@ -865,6 +866,8 @@ HostinfoGetOSShortName(const char *distro, // IN: full distro name } } else if (strstr(distroLower, "mandrake")) { Str_Strcpy(distroShort, STR_OS_MANDRAKE, distroShortSize); diff --git a/nixpkgs/pkgs/applications/virtualization/podman/default.nix b/nixpkgs/pkgs/applications/virtualization/podman/default.nix index 607d790247f..dbd05e38d3f 100644 --- a/nixpkgs/pkgs/applications/virtualization/podman/default.nix +++ b/nixpkgs/pkgs/applications/virtualization/podman/default.nix @@ -20,12 +20,14 @@ buildGoPackage rec { nativeBuildInputs = [ pkgconfig go-md2man installShellFiles ]; - buildInputs = [ btrfs-progs libseccomp gpgme lvm2 systemd ]; + buildInputs = stdenv.lib.optionals stdenv.isLinux [ btrfs-progs libseccomp gpgme lvm2 systemd ]; buildPhase = '' - pushd $NIX_BUILD_TOP/go/src/${goPackagePath} + pushd go/src/${goPackagePath} patchShebangs . - make binaries docs + ${if stdenv.isDarwin + then "make CGO_ENABLED=0 BUILDTAGS='remoteclient containers_image_openpgp exclude_graphdriver_devicemapper' varlink_generate all" + else "make binaries docs"} ''; installPhase = '' @@ -39,7 +41,7 @@ buildGoPackage rec { homepage = https://podman.io/; description = "A program for managing pods, containers and container images"; license = licenses.asl20; - maintainers = with maintainers; [ vdemeester saschagrunert ]; - platforms = platforms.linux; + maintainers = with maintainers; [ vdemeester saschagrunert marsam ]; + platforms = platforms.unix; }; } diff --git a/nixpkgs/pkgs/applications/virtualization/runc/default.nix b/nixpkgs/pkgs/applications/virtualization/runc/default.nix index 48bd81f383a..e7713d45f2f 100644 --- a/nixpkgs/pkgs/applications/virtualization/runc/default.nix +++ b/nixpkgs/pkgs/applications/virtualization/runc/default.nix @@ -5,13 +5,13 @@ with lib; buildGoPackage rec { pname = "runc"; - version = "1.0.0-rc9"; + version = "1.0.0-rc10"; src = fetchFromGitHub { owner = "opencontainers"; repo = "runc"; rev = "v${version}"; - sha256 = "1ss5b46cbbckyqlwgj8dbd5l59c5y0kp679hcpc0ybaj53pmwxj7"; + sha256 = "0pi3rvj585997m4z9ljkxz2z9yxf9p2jr0pmqbqrc7bc95f5hagk"; }; goPackagePath = "github.com/opencontainers/runc"; diff --git a/nixpkgs/pkgs/applications/virtualization/xen/4.5.nix b/nixpkgs/pkgs/applications/virtualization/xen/4.5.nix deleted file mode 100644 index af4721516ec..00000000000 --- a/nixpkgs/pkgs/applications/virtualization/xen/4.5.nix +++ /dev/null @@ -1,261 +0,0 @@ -{ stdenv, callPackage, fetchurl, fetchpatch, fetchgit -, ocaml-ng -, withInternalQemu ? true -, withInternalTraditionalQemu ? true -, withInternalSeabios ? true -, withSeabios ? !withInternalSeabios, seabios ? null -, withInternalOVMF ? false # FIXME: tricky to build -, withOVMF ? false, OVMF -, withLibHVM ? true - -# qemu -, udev, pciutils, xorg, SDL, pixman, acl, glusterfs, spice-protocol, usbredir -, alsaLib -, ... } @ args: - -assert withInternalSeabios -> !withSeabios; -assert withInternalOVMF -> !withOVMF; - -with stdenv.lib; - -# Patching XEN? Check the XSAs at -# https://xenbits.xen.org/xsa/ -# and try applying all the ones we don't have yet. - -let - xsaPatch = { name , sha256 }: (fetchpatch { - url = "https://xenbits.xen.org/xsa/xsa${name}.patch"; - inherit sha256; - }); - - qemuDeps = [ - udev pciutils xorg.libX11 SDL pixman acl glusterfs spice-protocol usbredir - alsaLib - ]; - - xsa = import ./xsa-patches.nix { inherit fetchpatch; }; -in - -callPackage (import ./generic.nix (rec { - version = "4.5.5"; - - meta = { - knownVulnerabilities = [ "Security support ended in January 2018" ]; - }; - - src = fetchurl { - url = "https://downloads.xenproject.org/release/xen/${version}/xen-${version}.tar.gz"; - sha256 = "1y74ms4yc3znf8jc3fgyq94va2y0pf7jh8m9pfqnpgklywqnw8g2"; - }; - - # Sources needed to build tools and firmwares. - xenfiles = optionalAttrs withInternalQemu { - qemu-xen = { - src = fetchgit { - url = https://xenbits.xen.org/git-http/qemu-xen.git; - rev = "refs/tags/qemu-xen-${version}"; - sha256 = "014s755slmsc7xzy7qhk9i3kbjr2grxb5yznjp71dl6xxfvnday2"; - }; - buildInputs = qemuDeps; - patches = [ - (xsaPatch { - name = "197-4.5-qemuu"; - sha256 = "09gp980qdlfpfmxy0nk7ncyaa024jnrpzx9gpq2kah21xygy5myx"; - }) - (xsaPatch { - name = "208-qemuu-4.7"; - sha256 = "0z9b1whr8rp2riwq7wndzcnd7vw1ckwx0vbk098k2pcflrzppgrb"; - }) - (xsaPatch { - name = "209-qemuu/0001-display-cirrus-ignore-source-pitch-value-as-needed-i"; - sha256 = "1xvxzsrsq05fj6szjlpbgg4ia3cw54dn5g7xzq1n1dymbhv606m0"; - }) - (xsaPatch { - name = "209-qemuu/0002-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput"; - sha256 = "0avxqs9922qjfsxxlk7bh10432a526j2yyykhags8dk1bzxkpxwv"; - }) - (xsaPatch { - name = "211-qemuu-4.6"; - sha256 = "1g090xs8ca8676vyi78b99z5yjdliw6mxkr521b8kimhf8crx4yg"; - }) - (xsaPatch { - name = "216-qemuu-4.5"; - sha256 = "0nh5akbal93czia1gh1pzvwq7gc4zwiyr1hbyk1m6wwdmqv6ph61"; - }) - ]; - meta.description = "Xen's fork of upstream Qemu"; - }; - } // optionalAttrs withInternalTraditionalQemu { - qemu-xen-traditional = { - src = fetchgit { - url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git; - rev = "refs/tags/xen-${version}"; - sha256 = "0n0ycxlf1wgdjkdl8l2w1i0zzssk55dfv67x8i6b2ima01r0k93r"; - }; - buildInputs = qemuDeps; - patches = [ - (xsaPatch { - name = "197-4.5-qemut"; - sha256 = "17l7npw00gyhqzzaqamwm9cawfvzm90zh6jjyy95dmqbh7smvy79"; - }) - (xsaPatch { - name = "199-trad"; - sha256 = "0dfw6ciycw9a9s97sbnilnzhipnzmdm9f7xcfngdjfic8cqdcv42"; - }) - (xsaPatch { - name = "208-qemut"; - sha256 = "0960vhchixp60j9h2lawgbgzf6mpcdk440kblk25a37bd6172l54"; - }) - (xsaPatch { - name = "209-qemut"; - sha256 = "1hq8ghfzw6c47pb5vf9ngxwgs8slhbbw6cq7gk0nam44rwvz743r"; - }) - (xsaPatch { - name = "211-qemut-4.5"; - sha256 = "1z3phabvqmxv4b5923fx63hwdg4v1fnl15zbl88873ybqn0hp50f"; - }) - ]; - postPatch = '' - substituteInPlace xen-hooks.mak \ - --replace /usr/include/pci ${pciutils}/include/pci - ''; - meta.description = "Xen's fork of upstream Qemu that uses old device model"; - }; - } // optionalAttrs withInternalSeabios { - "firmware/seabios-dir-remote" = { - src = fetchgit { - url = https://xenbits.xen.org/git-http/seabios.git; - rev = "e51488c5f8800a52ac5c8da7a31b85cca5cc95d2"; - #rev = "rel-1.7.5"; - sha256 = "0jk54ybhmw97pzyhpm6jr2x99f702kbn0ipxv5qxcbynflgdazyb"; - }; - patches = [ ./0000-qemu-seabios-enable-ATA_DMA.patch ]; - meta.description = "Xen's fork of Seabios"; - }; - } // optionalAttrs withInternalOVMF { - "firmware/ovmf-dir-remote" = { - src = fetchgit { - url = https://xenbits.xen.org/git-http/ovmf.git; - rev = "cb9a7ebabcd6b8a49dc0854b2f9592d732b5afbd"; - sha256 = "07zmdj90zjrzip74fvd4ss8n8njk6cim85s58mc6snxmqqv7gmcq"; - }; - meta.description = "Xen's fork of OVMF"; - }; - } // { - # TODO: patch Xen to make this optional? - "firmware/etherboot/ipxe.git" = { - src = fetchgit { - url = https://git.ipxe.org/ipxe.git; - rev = "9a93db3f0947484e30e753bbd61a10b17336e20e"; - sha256 = "1ga3h1b34q0cl9azj7j9nswn7mfcs3cgfjdihrm5zkp2xw2hpvr6"; - }; - meta.description = "Xen's fork of iPXE"; - }; - } // optionalAttrs withLibHVM { - xen-libhvm-dir-remote = { - src = fetchgit { - name = "xen-libhvm"; - url = https://github.com/ts468/xen-libhvm; - rev = "442dcc4f6f4e374a51e4613532468bd6b48bdf63"; - sha256 = "9ba97c39a00a54c154785716aa06691d312c99be498ebbc00dc3769968178ba8"; - }; - buildPhase = '' - make - cd biospt - cc -Wall -g -D_LINUX -Wstrict-prototypes biospt.c -o biospt -I../libhvm -L../libhvm -lxenhvm - ''; - installPhase = '' - make install - cp biospt/biospt $out/bin/ - ''; - meta = { - description = '' - Helper library for reading ACPI and SMBIOS firmware values - from the host system for use with the HVM guest firmware - pass-through feature in Xen''; - license = licenses.bsd2; - }; - }; - }; - - configureFlags = [] - ++ optional (!withInternalQemu) "--with-system-qemu" # use qemu from PATH - ++ optional (withInternalTraditionalQemu) "--enable-qemu-traditional" - ++ optional (!withInternalTraditionalQemu) "--disable-qemu-traditional" - - ++ optional (withSeabios) "--with-system-seabios=${seabios}" - ++ optional (!withInternalSeabios && !withSeabios) "--disable-seabios" - - ++ optional (withOVMF) "--with-system-ovmf=${OVMF.fd}/FV/OVMF.fd" - ++ optional (withInternalOVMF) "--enable-ovmf"; - - patches = with xsa; flatten [ - ./0001-libxl-Spice-image-compression-setting-support-for-up.patch - ./0002-libxl-Spice-streaming-video-setting-support-for-upst.patch - ./0003-Add-qxl-vga-interface-support-for-upstream-qem.patch - XSA_190 - XSA_191 - XSA_192 - XSA_193 - XSA_195 - XSA_196 - XSA_198 - XSA_200 - XSA_202_45 - XSA_204_45 - XSA_206_45 - XSA_207 - XSA_212 - XSA_213_45 - XSA_214 - XSA_215 - XSA_217_45 - XSA_218_45 - XSA_219_45 - XSA_220_45 - XSA_221 - XSA_222_45 - XSA_223 - XSA_224_45 - XSA_227_45 - XSA_230 - XSA_231_45 - XSA_232 - XSA_233 - XSA_234_45 - XSA_235_45 - XSA_236_45 - XSA_237_45 - XSA_238_45 - XSA_239_45 - XSA_240_45 - XSA_241 - XSA_242 - XSA_243_45 - XSA_244_45 - XSA_245 - XSA_246_45 - XSA_247_45 - XSA_248_45 - XSA_249 - XSA_250_45 - XSA_251_45 - ]; - - # Fix build on Glibc 2.24. - NIX_CFLAGS_COMPILE = "-Wno-error=deprecated-declarations"; - - postPatch = '' - # Avoid a glibc >= 2.25 deprecation warnings that get fatal via -Werror. - sed 1i'#include <sys/sysmacros.h>' \ - -i tools/blktap2/control/tap-ctl-allocate.c \ - -i tools/libxl/libxl_device.c - ''; - - passthru = { - qemu-system-i386 = if withInternalQemu - then "lib/xen/bin/qemu-system-i386" - else throw "this xen has no qemu builtin"; - }; - -})) ({ ocamlPackages = ocaml-ng.ocamlPackages_4_02; } // args) diff --git a/nixpkgs/pkgs/applications/virtualization/xen/packages.nix b/nixpkgs/pkgs/applications/virtualization/xen/packages.nix index 791a3b91818..e30006fbcc1 100644 --- a/nixpkgs/pkgs/applications/virtualization/xen/packages.nix +++ b/nixpkgs/pkgs/applications/virtualization/xen/packages.nix @@ -1,62 +1,11 @@ { callPackage -, stdenv, overrideCC, gcc49 +, stdenv, overrideCC }: # TODO(@oxij) on new Xen version: generalize this to generate [vanilla slim # light] for each ./<version>.nix. rec { - - xen_4_5-vanilla = callPackage ./4.5.nix { - # At the very least included seabios and etherboot need gcc49, - # so we have to build all of it with gcc49. - stdenv = overrideCC stdenv gcc49; - - meta = { - description = "vanilla"; - longDescription = '' - Vanilla version of Xen. Uses forks of Qemu and Seabios bundled - with Xen. This gives vanilla experince, but wastes space and - build time: typical NixOS setup that runs lots of VMs will - build three different versions of Qemu when using this (two - forks and upstream). - ''; - }; - }; - - xen_4_5-slim = xen_4_5-vanilla.override { - withInternalQemu = false; - withInternalTraditionalQemu = true; - withInternalSeabios = false; - withSeabios = true; - - meta = { - description = "slim"; - longDescription = '' - Slimmed-down version of Xen that reuses nixpkgs packages as - much as possible. Different parts may get out of sync, but - this builds faster and uses less space than vanilla. Use with - `qemu_xen` from nixpkgs. - ''; - }; - }; - - xen_4_5-light = xen_4_5-vanilla.override { - withInternalQemu = false; - withInternalTraditionalQemu = false; - withInternalSeabios = false; - withSeabios = true; - - meta = { - description = "light"; - longDescription = '' - Slimmed-down version of Xen without `qemu-traditional` (you - don't need it if you don't know what it is). Use with - `qemu_xen-light` from nixpkgs. - ''; - }; - }; - xen_4_8-vanilla = callPackage ./4.8.nix { meta = { description = "vanilla"; |