summaryrefslogtreecommitdiffstats
path: root/pkgs/applications/virtualization
diff options
context:
space:
mode:
Diffstat (limited to 'pkgs/applications/virtualization')
-rw-r--r--pkgs/applications/virtualization/8086tiny/default.nix10
-rw-r--r--pkgs/applications/virtualization/OVMF/default.nix2
-rw-r--r--pkgs/applications/virtualization/aqemu/default.nix4
-rw-r--r--pkgs/applications/virtualization/bochs/default.nix8
-rw-r--r--pkgs/applications/virtualization/charliecloud/default.nix14
-rw-r--r--pkgs/applications/virtualization/cloud-hypervisor/default.nix4
-rw-r--r--pkgs/applications/virtualization/cntr/default.nix13
-rw-r--r--pkgs/applications/virtualization/conmon/default.nix11
-rw-r--r--pkgs/applications/virtualization/containerd/default.nix37
-rw-r--r--pkgs/applications/virtualization/cri-o/default.nix10
-rw-r--r--pkgs/applications/virtualization/crosvm/default.nix6
-rw-r--r--pkgs/applications/virtualization/crun/default.nix8
-rw-r--r--pkgs/applications/virtualization/docker-compose/default.nix12
-rw-r--r--pkgs/applications/virtualization/docker-slim/default.nix4
-rw-r--r--pkgs/applications/virtualization/docker/buildx.nix25
-rw-r--r--pkgs/applications/virtualization/docker/default.nix194
-rw-r--r--pkgs/applications/virtualization/docker/distribution.nix4
-rw-r--r--pkgs/applications/virtualization/docker/gc.nix2
-rw-r--r--pkgs/applications/virtualization/docker/proxy.nix8
-rw-r--r--pkgs/applications/virtualization/driver/win-pvdrivers/default.nix6
-rw-r--r--pkgs/applications/virtualization/driver/win-qemu/default.nix4
-rw-r--r--pkgs/applications/virtualization/driver/win-signed-gplpv-drivers/default.nix4
-rw-r--r--pkgs/applications/virtualization/driver/win-spice/default.nix4
-rw-r--r--pkgs/applications/virtualization/driver/win-virtio/default.nix6
-rw-r--r--pkgs/applications/virtualization/dumb-init/default.nix8
-rw-r--r--pkgs/applications/virtualization/dynamips/default.nix4
-rw-r--r--pkgs/applications/virtualization/ecs-agent/default.nix4
-rw-r--r--pkgs/applications/virtualization/firecracker/default.nix4
-rw-r--r--pkgs/applications/virtualization/firectl/default.nix4
-rw-r--r--pkgs/applications/virtualization/gvisor/default.nix6
-rw-r--r--pkgs/applications/virtualization/hercules/default.nix4
-rw-r--r--pkgs/applications/virtualization/libnvidia-container/avoid-static-libtirpc-build.patch (renamed from pkgs/applications/virtualization/nvidia-docker/avoid-static-libtirpc-build.patch)0
-rw-r--r--pkgs/applications/virtualization/libnvidia-container/default.nix (renamed from pkgs/applications/virtualization/nvidia-docker/libnvc.nix)28
-rw-r--r--pkgs/applications/virtualization/libnvidia-container/libnvc-ldconfig-and-path-fixes.patch (renamed from pkgs/applications/virtualization/nvidia-docker/libnvc-ldconfig-and-path-fixes.patch)4
-rw-r--r--pkgs/applications/virtualization/libnvidia-container/modprobe.patch29
-rw-r--r--pkgs/applications/virtualization/lkl/default.nix4
-rw-r--r--pkgs/applications/virtualization/looking-glass-client/default.nix6
-rw-r--r--pkgs/applications/virtualization/nvidia-container-runtime/default.nix72
-rw-r--r--pkgs/applications/virtualization/nvidia-container-toolkit/default.nix37
-rw-r--r--pkgs/applications/virtualization/nvidia-docker/default.nix62
-rw-r--r--pkgs/applications/virtualization/nvidia-podman/config.toml13
-rw-r--r--pkgs/applications/virtualization/open-vm-tools/default.nix6
-rw-r--r--pkgs/applications/virtualization/podman/default.nix8
-rw-r--r--pkgs/applications/virtualization/qboot/default.nix6
-rw-r--r--pkgs/applications/virtualization/qemu/CVE-2020-27617.patch43
-rw-r--r--pkgs/applications/virtualization/qemu/default.nix59
-rw-r--r--pkgs/applications/virtualization/qemu/no-etc-install.patch12
-rw-r--r--pkgs/applications/virtualization/qtemu/default.nix8
-rw-r--r--pkgs/applications/virtualization/remotebox/default.nix4
-rw-r--r--pkgs/applications/virtualization/seabios/default.nix4
-rw-r--r--pkgs/applications/virtualization/singularity/default.nix11
-rw-r--r--pkgs/applications/virtualization/spice-vdagent/default.nix10
-rw-r--r--pkgs/applications/virtualization/spike/default.nix4
-rw-r--r--pkgs/applications/virtualization/tini/default.nix4
-rw-r--r--pkgs/applications/virtualization/tinyemu/default.nix8
-rw-r--r--pkgs/applications/virtualization/virt-manager/default.nix6
-rw-r--r--pkgs/applications/virtualization/virt-manager/qt.nix4
-rw-r--r--pkgs/applications/virtualization/virt-top/default.nix4
-rw-r--r--pkgs/applications/virtualization/virt-viewer/default.nix6
-rw-r--r--pkgs/applications/virtualization/virtinst/default.nix10
-rw-r--r--pkgs/applications/virtualization/virtualbox/default.nix10
-rw-r--r--pkgs/applications/virtualization/virtualbox/extpack.nix2
-rw-r--r--pkgs/applications/virtualization/virtualbox/guest-additions/default.nix4
-rw-r--r--pkgs/applications/virtualization/vpcs/default.nix6
-rw-r--r--pkgs/applications/virtualization/x11docker/default.nix10
-rw-r--r--pkgs/applications/virtualization/xen/4.10.nix4
-rw-r--r--pkgs/applications/virtualization/xen/generic.nix12
-rw-r--r--pkgs/applications/virtualization/xen/packages.nix2
-rw-r--r--pkgs/applications/virtualization/xen/xsa-patches.nix2
69 files changed, 525 insertions, 433 deletions
diff --git a/pkgs/applications/virtualization/8086tiny/default.nix b/pkgs/applications/virtualization/8086tiny/default.nix
index db76efb96e5f..c58d488f5839 100644
--- a/pkgs/applications/virtualization/8086tiny/default.nix
+++ b/pkgs/applications/virtualization/8086tiny/default.nix
@@ -1,4 +1,4 @@
-{ stdenv, fetchFromGitHub
+{ lib, stdenv, fetchFromGitHub
, localBios ? true, nasm ? null
, sdlSupport ? true, SDL ? null }:
@@ -16,15 +16,15 @@ stdenv.mkDerivation rec {
sha256 = "00aydg8f28sgy8l3rd2a7jvp56lx3b63hhak43p7g7vjdikv495w";
};
- buildInputs = with stdenv.lib;
+ buildInputs = with lib;
optionals localBios [ nasm ]
++ optionals sdlSupport [ SDL ];
-
+
bios = localBios;
-
+
builder = ./builder.sh;
- meta = with stdenv.lib; {
+ meta = with lib; {
description = "An open-source small 8086 emulator";
longDescription = ''
8086tiny is a tiny, open-source (MIT), portable (little-endian hosts)
diff --git a/pkgs/applications/virtualization/OVMF/default.nix b/pkgs/applications/virtualization/OVMF/default.nix
index 6301182771fb..14d8d0c13fe6 100644
--- a/pkgs/applications/virtualization/OVMF/default.nix
+++ b/pkgs/applications/virtualization/OVMF/default.nix
@@ -59,7 +59,7 @@ edk2.mkDerivation projectDscPath {
meta = {
description = "Sample UEFI firmware for QEMU and KVM";
homepage = "https://github.com/tianocore/tianocore.github.io/wiki/OVMF";
- license = stdenv.lib.licenses.bsd2;
+ license = lib.licenses.bsd2;
platforms = ["x86_64-linux" "i686-linux" "aarch64-linux" "x86_64-darwin"];
};
}
diff --git a/pkgs/applications/virtualization/aqemu/default.nix b/pkgs/applications/virtualization/aqemu/default.nix
index 9177f2645028..2d865f418187 100644
--- a/pkgs/applications/virtualization/aqemu/default.nix
+++ b/pkgs/applications/virtualization/aqemu/default.nix
@@ -1,4 +1,4 @@
-{ mkDerivation, cmake, fetchFromGitHub, libvncserver, qemu, qtbase, stdenv
+{ mkDerivation, cmake, fetchFromGitHub, libvncserver, qemu, qtbase, lib
}:
mkDerivation rec {
@@ -16,7 +16,7 @@ mkDerivation rec {
buildInputs = [ libvncserver qtbase qemu ];
- meta = with stdenv.lib; {
+ meta = with lib; {
description = "A virtual machine manager GUI for qemu";
homepage = "https://github.com/tobimensch/aqemu";
license = licenses.gpl2;
diff --git a/pkgs/applications/virtualization/bochs/default.nix b/pkgs/applications/virtualization/bochs/default.nix
index e9982d61391d..f2418d80d2e4 100644
--- a/pkgs/applications/virtualization/bochs/default.nix
+++ b/pkgs/applications/virtualization/bochs/default.nix
@@ -1,5 +1,5 @@
-{ stdenv, fetchurl
-, pkgconfig, libtool
+{ lib, stdenv, fetchurl
+, pkg-config, libtool
, gtk2, libGLU, libGL, readline, libX11, libXpm
, docbook_xml_dtd_45, docbook_xsl
, sdlSupport ? true, SDL2 ? null
@@ -15,7 +15,7 @@ assert wxSupport -> (gtk2 != null && wxGTK != null);
assert wgetSupport -> (wget != null);
assert curlSupport -> (curl != null);
-with stdenv.lib;
+with lib;
stdenv.mkDerivation rec {
pname = "bochs";
@@ -29,7 +29,7 @@ stdenv.mkDerivation rec {
patches = [ ./bochs-2.6.11-glibc-2.26.patch ./fix-build-smp.patch ];
buildInputs =
- [ pkgconfig libtool gtk2 libGLU libGL readline libX11 libXpm docbook_xml_dtd_45 docbook_xsl ]
+ [ pkg-config libtool gtk2 libGLU libGL readline libX11 libXpm docbook_xml_dtd_45 docbook_xsl ]
++ optionals termSupport [ ncurses ]
++ optionals sdlSupport [ SDL2 ]
++ optionals wxSupport [ wxGTK ]
diff --git a/pkgs/applications/virtualization/charliecloud/default.nix b/pkgs/applications/virtualization/charliecloud/default.nix
index d6cbc25d883b..9e866d7cf4dc 100644
--- a/pkgs/applications/virtualization/charliecloud/default.nix
+++ b/pkgs/applications/virtualization/charliecloud/default.nix
@@ -1,15 +1,15 @@
-{ stdenv, fetchFromGitHub, python3, python3Packages, docker, autoreconfHook, coreutils, makeWrapper, gnused, gnutar, gzip, findutils, sudo, nixosTests }:
+{ lib, stdenv, fetchFromGitHub, python3, python3Packages, docker, autoreconfHook, coreutils, makeWrapper, gnused, gnutar, gzip, findutils, sudo, nixosTests }:
stdenv.mkDerivation rec {
- version = "0.20";
+ version = "0.21";
pname = "charliecloud";
src = fetchFromGitHub {
owner = "hpc";
repo = "charliecloud";
rev = "v${version}";
- sha256 = "15ihffwhpjnzgz0ir5vc9la4fwkqj91vmrcsb2r58ikq7h9sk45j";
+ sha256 = "Y/tH6Znq//HBA/FHfIm2Wpppx6TiL7CqKtZFDc/XSNc=";
};
nativeBuildInputs = [ autoreconfHook makeWrapper ];
@@ -38,7 +38,7 @@ stdenv.mkDerivation rec {
# Here we wrap those deps so they are resolved inside nixpkgs.
postInstall = ''
for file in $out/bin/* ; do \
- wrapProgram $file --prefix PATH : ${stdenv.lib.makeBinPath [ coreutils docker gnused gnutar gzip findutils sudo ]}
+ wrapProgram $file --prefix PATH : ${lib.makeBinPath [ coreutils docker gnused gnutar gzip findutils sudo ]}
done
'';
@@ -54,9 +54,9 @@ stdenv.mkDerivation rec {
on offer.
'';
homepage = "https://hpc.github.io/charliecloud";
- license = stdenv.lib.licenses.asl20;
- maintainers = [ stdenv.lib.maintainers.bzizou ];
- platforms = stdenv.lib.platforms.linux;
+ license = lib.licenses.asl20;
+ maintainers = [ lib.maintainers.bzizou ];
+ platforms = lib.platforms.linux;
};
}
diff --git a/pkgs/applications/virtualization/cloud-hypervisor/default.nix b/pkgs/applications/virtualization/cloud-hypervisor/default.nix
index 59c97c4a8dea..32d5be13d3b7 100644
--- a/pkgs/applications/virtualization/cloud-hypervisor/default.nix
+++ b/pkgs/applications/virtualization/cloud-hypervisor/default.nix
@@ -1,4 +1,4 @@
-{ lib, fetchFromGitHub, rustPlatform, pkgconfig, openssl }:
+{ lib, fetchFromGitHub, rustPlatform, pkg-config, openssl }:
rustPlatform.buildRustPackage rec {
pname = "cloud-hypervisor";
@@ -11,7 +11,7 @@ rustPlatform.buildRustPackage rec {
sha256 = "h2aWWjycTm84TS89/vhqnAvwOqeeSDtvvCt+Is6I0eI=";
};
- nativeBuildInputs = [ pkgconfig ];
+ nativeBuildInputs = [ pkg-config ];
buildInputs = [ openssl ];
cargoPatches = [ ./cargo-lock-vendor-fix.patch ];
diff --git a/pkgs/applications/virtualization/cntr/default.nix b/pkgs/applications/virtualization/cntr/default.nix
index e3ab1c6c2f80..2283b45aee47 100644
--- a/pkgs/applications/virtualization/cntr/default.nix
+++ b/pkgs/applications/virtualization/cntr/default.nix
@@ -1,24 +1,23 @@
-{ stdenv, rustPlatform, fetchFromGitHub }:
+{ lib, rustPlatform, fetchFromGitHub }:
rustPlatform.buildRustPackage rec {
pname = "cntr";
- version = "1.2.1";
+ version = "1.4.1";
src = fetchFromGitHub {
owner = "Mic92";
repo = "cntr";
rev = version;
- sha256 = "0dhfz7aj3cqi974ybf0axchih40rzrs9m8bxhwz1hgig57aisfc0";
+ sha256 = "sha256-4ogyOKuz6702/sOQNvE+UP+cvQrPPU3VjL4b0FUfRNw=";
};
- cargoSha256 = "088drkpkgq8psv5j6igxyhfvvbalzg6nd98r9z0nxkawck5i2clz";
+ cargoSha256 = "sha256-lblvun2T1qpFiowld77Ti2MFPzhs5pOWWRbErORXYCM=";
- meta = with stdenv.lib; {
+ meta = with lib; {
description = "A container debugging tool based on FUSE";
homepage = "https://github.com/Mic92/cntr";
license = licenses.mit;
- # aarch64 support will be fixed soon
- platforms = [ "x86_64-linux" ];
+ platforms = platforms.linux;
maintainers = [ maintainers.mic92 ];
};
}
diff --git a/pkgs/applications/virtualization/conmon/default.nix b/pkgs/applications/virtualization/conmon/default.nix
index e143ebcca755..cef69cb0c6ca 100644
--- a/pkgs/applications/virtualization/conmon/default.nix
+++ b/pkgs/applications/virtualization/conmon/default.nix
@@ -1,4 +1,5 @@
-{ stdenv
+{ lib
+, stdenv
, fetchFromGitHub
, pkg-config
, glib
@@ -9,18 +10,18 @@
stdenv.mkDerivation rec {
pname = "conmon";
- version = "2.0.22";
+ version = "2.0.25";
src = fetchFromGitHub {
owner = "containers";
repo = pname;
rev = "v${version}";
- sha256 = "07wd3pns6x25dcnc1r84cwmrzg8xgzsfmidkclcpcagf97ad7jmc";
+ sha256 = "sha256-u22irZ9AC1W2AVJ1OD1gLzTH4NOgRkZekZ78rNKXnps=";
};
nativeBuildInputs = [ pkg-config ];
buildInputs = [ glib systemd ]
- ++ stdenv.lib.optionals (!stdenv.hostPlatform.isMusl) [ glibc glibc.static ];
+ ++ lib.optionals (!stdenv.hostPlatform.isMusl) [ glibc glibc.static ];
# manpage requires building the vendored go-md2man
makeFlags = [ "bin/conmon" ];
@@ -31,7 +32,7 @@ stdenv.mkDerivation rec {
passthru.tests = { inherit (nixosTests) cri-o podman; };
- meta = with stdenv.lib; {
+ meta = with lib; {
homepage = "https://github.com/containers/conmon";
description = "An OCI container runtime monitor";
license = licenses.asl20;
diff --git a/pkgs/applications/virtualization/containerd/default.nix b/pkgs/applications/virtualization/containerd/default.nix
index cece3cc6b673..695109fd8a40 100644
--- a/pkgs/applications/virtualization/containerd/default.nix
+++ b/pkgs/applications/virtualization/containerd/default.nix
@@ -1,12 +1,16 @@
-{ lib, fetchFromGitHub, buildGoPackage, btrfs-progs, go-md2man, installShellFiles, util-linux, nixosTests }:
-
-with lib;
+{ lib
+, fetchFromGitHub
+, buildGoPackage
+, btrfs-progs
+, go-md2man
+, installShellFiles
+, util-linux
+, nixosTests
+}:
buildGoPackage rec {
pname = "containerd";
version = "1.4.3";
- # git commit for the above version's tag
- commit = "269548fa27e0089a8b8278fc4fc781d7f65a939b";
src = fetchFromGitHub {
owner = "containerd";
@@ -22,29 +26,32 @@ buildGoPackage rec {
buildInputs = [ btrfs-progs ];
- buildFlags = [ "VERSION=v${version}" "REVISION=${commit}" ];
+ buildFlags = [ "VERSION=v${version}" "REVISION=${src.rev}" ];
- BUILDTAGS = []
- ++ optional (btrfs-progs == null) "no_btrfs";
+ BUILDTAGS = [ ]
+ ++ lib.optional (btrfs-progs == null) "no_btrfs";
buildPhase = ''
cd go/src/${goPackagePath}
patchShebangs .
- make binaries $buildFlags
+ make binaries man $buildFlags
'';
installPhase = ''
- for b in bin/*; do
- install -Dm555 $b $out/$b
- done
-
- make man
+ install -Dm555 bin/* -t $out/bin
installManPage man/*.[1-9]
'';
+ # completion installed separately so it can be overridden in docker
+ # can be moved to installPhase when docker uses containerd >= 1.4
+ postInstall = ''
+ installShellFiles --bash contrib/autocomplete/ctr
+ installShellFiles --zsh --name _ctr contrib/autocomplete/zsh_autocomplete
+ '';
+
passthru.tests = { inherit (nixosTests) docker; };
- meta = {
+ meta = with lib; {
h