2024-10-14 05:46:43 +01:00
|
|
|
{
|
|
|
|
config,
|
|
|
|
stdenv,
|
|
|
|
fetchurl,
|
|
|
|
fetchpatch,
|
|
|
|
callPackage,
|
|
|
|
lib,
|
|
|
|
acpica-tools,
|
|
|
|
dev86,
|
|
|
|
pam,
|
|
|
|
libxslt,
|
|
|
|
libxml2,
|
|
|
|
wrapQtAppsHook,
|
|
|
|
libX11,
|
|
|
|
xorgproto,
|
|
|
|
libXext,
|
|
|
|
libXcursor,
|
|
|
|
libXmu,
|
|
|
|
libIDL,
|
|
|
|
SDL2,
|
|
|
|
libcap,
|
|
|
|
libGL,
|
|
|
|
libGLU,
|
|
|
|
libpng,
|
|
|
|
glib,
|
|
|
|
lvm2,
|
|
|
|
libXrandr,
|
|
|
|
libXinerama,
|
|
|
|
libopus,
|
|
|
|
libtpms,
|
|
|
|
qtbase,
|
|
|
|
qtx11extras,
|
|
|
|
qttools,
|
|
|
|
qtsvg,
|
|
|
|
qtwayland,
|
|
|
|
pkg-config,
|
|
|
|
which,
|
|
|
|
docbook_xsl,
|
|
|
|
docbook_xml_dtd_43,
|
|
|
|
alsa-lib,
|
|
|
|
curl,
|
|
|
|
libvpx,
|
|
|
|
nettools,
|
|
|
|
dbus,
|
|
|
|
substituteAll,
|
|
|
|
gsoap,
|
|
|
|
zlib,
|
|
|
|
xz,
|
|
|
|
yasm,
|
|
|
|
glslang,
|
|
|
|
nixosTests,
|
|
|
|
# If open-watcom-bin is not passed, VirtualBox will fall back to use
|
|
|
|
# the shipped alternative sources (assembly).
|
|
|
|
open-watcom-bin,
|
|
|
|
makeself,
|
|
|
|
perl,
|
|
|
|
vulkan-loader,
|
|
|
|
javaBindings ? true,
|
|
|
|
jdk, # Almost doesn't affect closure size
|
|
|
|
pythonBindings ? false,
|
|
|
|
python3,
|
|
|
|
extensionPack ? null,
|
|
|
|
fakeroot,
|
|
|
|
pulseSupport ? config.pulseaudio or stdenv.hostPlatform.isLinux,
|
|
|
|
libpulseaudio,
|
|
|
|
enableHardening ? false,
|
|
|
|
headless ? false,
|
|
|
|
enable32bitGuests ? true,
|
|
|
|
enableWebService ? false,
|
|
|
|
enableKvm ? false,
|
|
|
|
extraConfigureFlags ? "",
|
2009-04-16 14:44:06 +01:00
|
|
|
}:
|
2009-04-12 22:59:40 +01:00
|
|
|
|
2024-05-03 16:11:27 +01:00
|
|
|
# The web services use Java infrastructure.
|
|
|
|
assert enableWebService -> javaBindings;
|
|
|
|
|
2012-08-18 15:47:13 +01:00
|
|
|
let
|
2014-12-18 10:34:57 +00:00
|
|
|
buildType = "release";
|
2020-01-20 13:48:43 +00:00
|
|
|
# Use maintainers/scripts/update.nix to update the version and all related hashes or
|
|
|
|
# change the hashes in extpack.nix and guest-additions/default.nix as well manually.
|
2024-07-29 07:43:19 +01:00
|
|
|
virtualboxVersion = "7.0.20";
|
|
|
|
virtualboxSha256 = "5cf5979bef66ebab3fcd495796b215a940e8a07c469d4bc56d064de44222dd02";
|
2024-04-10 15:36:10 +01:00
|
|
|
|
2024-08-29 07:40:35 +01:00
|
|
|
kvmPatchVersion = "20240828";
|
|
|
|
kvmPatchHash = "sha256-g0esJbB1IGyLGZMLFJIY8ZYdHWuiM5IZtLMHZvCY6bs=";
|
2024-02-08 19:19:41 +00:00
|
|
|
|
|
|
|
# The KVM build is not compatible to VirtualBox's kernel modules. So don't export
|
|
|
|
# modsrc at all.
|
|
|
|
withModsrc = !enableKvm;
|
2024-02-14 09:33:43 +00:00
|
|
|
|
|
|
|
virtualboxGuestAdditionsIso = callPackage guest-additions-iso/default.nix { };
|
2024-04-10 10:19:22 +01:00
|
|
|
|
2024-10-14 05:46:43 +01:00
|
|
|
inherit (lib)
|
|
|
|
optional
|
|
|
|
optionals
|
|
|
|
optionalString
|
|
|
|
getDev
|
|
|
|
getLib
|
|
|
|
;
|
|
|
|
in
|
|
|
|
stdenv.mkDerivation (finalAttrs: {
|
2019-08-13 22:52:01 +01:00
|
|
|
pname = "virtualbox";
|
2024-04-10 15:36:10 +01:00
|
|
|
version = finalAttrs.virtualboxVersion;
|
|
|
|
|
2024-10-14 05:46:43 +01:00
|
|
|
inherit
|
|
|
|
buildType
|
|
|
|
virtualboxVersion
|
|
|
|
virtualboxSha256
|
|
|
|
kvmPatchVersion
|
|
|
|
kvmPatchHash
|
|
|
|
virtualboxGuestAdditionsIso
|
|
|
|
;
|
2009-04-12 22:59:40 +01:00
|
|
|
|
|
|
|
src = fetchurl {
|
2024-04-10 15:36:10 +01:00
|
|
|
url = "https://download.virtualbox.org/virtualbox/${finalAttrs.virtualboxVersion}/VirtualBox-${finalAttrs.virtualboxVersion}.tar.bz2";
|
|
|
|
sha256 = finalAttrs.virtualboxSha256;
|
2009-04-12 22:59:40 +01:00
|
|
|
};
|
|
|
|
|
2024-02-08 19:19:41 +00:00
|
|
|
outputs = [ "out" ] ++ optional withModsrc "modsrc";
|
2016-09-13 02:42:16 +01:00
|
|
|
|
2024-10-14 05:46:43 +01:00
|
|
|
nativeBuildInputs = [
|
|
|
|
pkg-config
|
|
|
|
which
|
|
|
|
docbook_xsl
|
|
|
|
docbook_xml_dtd_43
|
|
|
|
yasm
|
|
|
|
glslang
|
|
|
|
] ++ optional (!headless) wrapQtAppsHook;
|
2019-08-06 18:07:57 +01:00
|
|
|
|
2019-09-02 22:21:34 +01:00
|
|
|
# Wrap manually because we wrap just a small number of executables.
|
2019-08-06 18:07:57 +01:00
|
|
|
dontWrapQtApps = true;
|
2017-12-06 23:33:59 +00:00
|
|
|
|
2024-10-14 05:46:43 +01:00
|
|
|
buildInputs =
|
|
|
|
[
|
|
|
|
acpica-tools
|
|
|
|
dev86
|
|
|
|
libxslt
|
|
|
|
libxml2
|
|
|
|
xorgproto
|
|
|
|
libX11
|
|
|
|
libXext
|
|
|
|
libXcursor
|
|
|
|
libIDL
|
|
|
|
libcap
|
|
|
|
glib
|
|
|
|
lvm2
|
|
|
|
alsa-lib
|
|
|
|
curl
|
|
|
|
libvpx
|
|
|
|
pam
|
|
|
|
makeself
|
|
|
|
perl
|
|
|
|
libXmu
|
|
|
|
libXrandr
|
|
|
|
libpng
|
|
|
|
libopus
|
|
|
|
libtpms
|
|
|
|
python3
|
|
|
|
xz
|
|
|
|
]
|
2012-03-20 13:54:01 +00:00
|
|
|
++ optional javaBindings jdk
|
2021-11-10 00:40:47 +00:00
|
|
|
++ optional pythonBindings python3 # Python is needed even when not building bindings
|
2016-09-01 19:54:58 +01:00
|
|
|
++ optional pulseSupport libpulseaudio
|
2023-05-19 07:48:51 +01:00
|
|
|
++ optionals headless [ libGL ]
|
2024-10-14 05:46:43 +01:00
|
|
|
++ optionals (!headless) [
|
|
|
|
qtbase
|
|
|
|
qtx11extras
|
|
|
|
libXinerama
|
|
|
|
SDL2
|
|
|
|
libGLU
|
|
|
|
]
|
|
|
|
++ optionals enableWebService [
|
|
|
|
gsoap
|
|
|
|
zlib
|
|
|
|
];
|
2009-04-12 22:59:40 +01:00
|
|
|
|
2024-10-14 05:46:43 +01:00
|
|
|
hardeningDisable = [
|
|
|
|
"format"
|
|
|
|
"fortify"
|
|
|
|
"pic"
|
|
|
|
"stackprotector"
|
|
|
|
];
|
2016-03-06 15:45:44 +00:00
|
|
|
|
2013-01-10 01:21:02 +00:00
|
|
|
prePatch = ''
|
2009-04-12 22:59:40 +01:00
|
|
|
set -x
|
2016-09-13 02:42:16 +01:00
|
|
|
sed -e 's@MKISOFS --version@MKISOFS -version@' \
|
2024-04-10 10:19:22 +01:00
|
|
|
-e 's@PYTHONDIR=.*@PYTHONDIR=${optionalString pythonBindings python3}@' \
|
2017-02-28 03:35:52 +00:00
|
|
|
-e 's@CXX_FLAGS="\(.*\)"@CXX_FLAGS="-std=c++11 \1"@' \
|
2024-10-14 05:46:43 +01:00
|
|
|
${
|
|
|
|
optionalString (!headless) ''
|
|
|
|
-e 's@TOOLQT5BIN=.*@TOOLQT5BIN="${getDev qtbase}/bin"@' \
|
|
|
|
''
|
|
|
|
} -i configure
|
2022-05-10 22:52:26 +01:00
|
|
|
ls kBuild/bin/linux.x86/k* tools/linux.x86/bin/* | xargs -n 1 patchelf --set-interpreter ${stdenv.cc.libc}/lib/ld-linux.so.2
|
|
|
|
ls kBuild/bin/linux.amd64/k* tools/linux.amd64/bin/* | xargs -n 1 patchelf --set-interpreter ${stdenv.cc.libc}/lib/ld-linux-x86-64.so.2
|
2017-03-24 02:49:12 +00:00
|
|
|
|
|
|
|
grep 'libpulse\.so\.0' src include -rI --files-with-match | xargs sed -i -e '
|
2024-10-14 05:46:43 +01:00
|
|
|
${optionalString pulseSupport ''s@"libpulse\.so\.0"@"${libpulseaudio.out}/lib/libpulse.so.0"@g''}'
|
2017-03-24 02:49:12 +00:00
|
|
|
|
|
|
|
grep 'libdbus-1\.so\.3' src include -rI --files-with-match | xargs sed -i -e '
|
|
|
|
s@"libdbus-1\.so\.3"@"${dbus.lib}/lib/libdbus-1.so.3"@g'
|
|
|
|
|
|
|
|
grep 'libasound\.so\.2' src include -rI --files-with-match | xargs sed -i -e '
|
2021-06-10 03:57:09 +01:00
|
|
|
s@"libasound\.so\.2"@"${alsa-lib.out}/lib/libasound.so.2"@g'
|
2017-03-24 02:49:12 +00:00
|
|
|
|
2009-04-12 22:59:40 +01:00
|
|
|
export USER=nix
|
|
|
|
set +x
|
2012-02-23 22:04:54 +00:00
|
|
|
'';
|
2009-04-12 22:59:40 +01:00
|
|
|
|
2017-12-06 23:25:16 +00:00
|
|
|
patches =
|
2024-10-14 05:46:43 +01:00
|
|
|
optional enableHardening ./hardened.patch
|
|
|
|
# Since VirtualBox 7.0.8, VBoxSDL requires SDL2, but the build framework uses SDL1
|
|
|
|
++ optionals (!headless) [
|
|
|
|
./fix-sdl.patch
|
|
|
|
# No update patch disables check for update function
|
|
|
|
# https://bugs.launchpad.net/ubuntu/+source/virtualbox-ose/+bug/272212
|
|
|
|
(fetchpatch {
|
|
|
|
url = "https://salsa.debian.org/pkg-virtualbox-team/virtualbox/-/raw/debian/7.0.14-dfsg-1/debian/patches/16-no-update.patch";
|
|
|
|
hash = "sha256-UJHpuB6QB/BbxJorlqZXUF12lgq8gbLMRHRMsbyqRpY=";
|
|
|
|
})
|
|
|
|
]
|
|
|
|
++ [ ./extra_symbols.patch ]
|
|
|
|
# When hardening is enabled, we cannot use wrapQtApp to ensure that VirtualBoxVM sees
|
|
|
|
# the correct environment variables needed for Qt to work, specifically QT_PLUGIN_PATH.
|
|
|
|
# This is because VirtualBoxVM would detect that it is wrapped that and refuse to run,
|
|
|
|
# and also because it would unset QT_PLUGIN_PATH for security reasons. We work around
|
|
|
|
# these issues by patching the code to set QT_PLUGIN_PATH to the necessary paths,
|
|
|
|
# after the code that unsets it. Note that qtsvg is included so that SVG icons from
|
|
|
|
# the user's icon theme can be loaded.
|
|
|
|
++ optional (!headless && enableHardening) (substituteAll {
|
2019-09-02 22:21:34 +01:00
|
|
|
src = ./qt-env-vars.patch;
|
|
|
|
qtPluginPath = "${qtbase.bin}/${qtbase.qtPluginPrefix}:${qtsvg.bin}/${qtbase.qtPluginPrefix}:${qtwayland.bin}/${qtbase.qtPluginPrefix}";
|
2024-10-14 05:46:43 +01:00
|
|
|
})
|
|
|
|
# While the KVM patch should not break any other behavior if --with-kvm is not specified,
|
|
|
|
# we don't take any chances and only apply it if people actually want to use KVM support.
|
|
|
|
++ optional enableKvm (fetchpatch {
|
2024-04-10 15:36:10 +01:00
|
|
|
name = "virtualbox-${finalAttrs.virtualboxVersion}-kvm-dev-${finalAttrs.kvmPatchVersion}.patch";
|
|
|
|
url = "https://github.com/cyberus-technology/virtualbox-kvm/releases/download/dev-${finalAttrs.kvmPatchVersion}/kvm-backend-${finalAttrs.virtualboxVersion}-dev-${finalAttrs.kvmPatchVersion}.patch";
|
|
|
|
hash = finalAttrs.kvmPatchHash;
|
|
|
|
})
|
2024-10-14 05:46:43 +01:00
|
|
|
++ [
|
|
|
|
./qt-dependency-paths.patch
|
|
|
|
# https://github.com/NixOS/nixpkgs/issues/123851
|
|
|
|
./fix-audio-driver-loading.patch
|
|
|
|
];
|
2014-11-29 07:09:50 +00:00
|
|
|
|
2014-12-16 23:57:36 +00:00
|
|
|
postPatch = ''
|
|
|
|
sed -i -e 's|/sbin/ifconfig|${nettools}/bin/ifconfig|' \
|
2016-09-10 10:40:06 +01:00
|
|
|
src/VBox/HostDrivers/adpctl/VBoxNetAdpCtl.cpp
|
2014-12-16 23:57:36 +00:00
|
|
|
'';
|
|
|
|
|
2015-07-24 13:32:52 +01:00
|
|
|
# first line: ugly hack, and it isn't yet clear why it's a problem
|
2009-04-12 22:59:40 +01:00
|
|
|
configurePhase = ''
|
2016-08-31 10:32:34 +01:00
|
|
|
NIX_CFLAGS_COMPILE=$(echo "$NIX_CFLAGS_COMPILE" | sed 's,\-isystem ${lib.getDev stdenv.cc.libc}/include,,g')
|
2015-07-24 13:32:52 +01:00
|
|
|
|
2014-11-29 07:09:50 +00:00
|
|
|
cat >> LocalConfig.kmk <<LOCAL_CONFIG
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
VBOX_WITH_TESTCASES :=
|
|
|
|
VBOX_WITH_TESTSUITE :=
|
|
|
|
VBOX_WITH_VALIDATIONKIT :=
|
|
|
|
VBOX_WITH_DOCS :=
|
|
|
|
VBOX_WITH_WARNINGS_AS_ERRORS :=
|
|
|
|
|
|
|
|
VBOX_WITH_ORIGIN :=
|
|
|
|
VBOX_PATH_APP_PRIVATE_ARCH_TOP := $out/share/virtualbox
|
|
|
|
VBOX_PATH_APP_PRIVATE_ARCH := $out/libexec/virtualbox
|
|
|
|
VBOX_PATH_SHARED_LIBS := $out/libexec/virtualbox
|
|
|
|
VBOX_WITH_RUNPATH := $out/libexec/virtualbox
|
|
|
|
VBOX_PATH_APP_PRIVATE := $out/share/virtualbox
|
|
|
|
VBOX_PATH_APP_DOCS := $out/doc
|
2024-04-12 12:02:56 +01:00
|
|
|
|
|
|
|
VBOX_WITH_UPDATE_AGENT :=
|
|
|
|
|
2014-11-29 07:09:50 +00:00
|
|
|
${optionalString javaBindings ''
|
2024-10-14 05:46:43 +01:00
|
|
|
VBOX_JAVA_HOME := ${jdk}
|
2014-11-29 07:09:50 +00:00
|
|
|
''}
|
2016-09-13 05:01:27 +01:00
|
|
|
${optionalString (!headless) ''
|
2024-10-14 05:46:43 +01:00
|
|
|
VBOX_WITH_VBOXSDL := 1
|
|
|
|
PATH_QT5_X11_EXTRAS_LIB := ${getLib qtx11extras}/lib
|
|
|
|
PATH_QT5_X11_EXTRAS_INC := ${getDev qtx11extras}/include
|
|
|
|
PATH_QT5_TOOLS_LIB := ${getLib qttools}/lib
|
|
|
|
PATH_QT5_TOOLS_INC := ${getDev qttools}/include
|
2016-09-13 05:01:27 +01:00
|
|
|
''}
|
2021-11-10 00:40:47 +00:00
|
|
|
${optionalString enableWebService ''
|
2024-10-14 05:46:43 +01:00
|
|
|
# fix gsoap missing zlib include and produce errors with --as-needed
|
|
|
|
VBOX_GSOAP_CXX_LIBS := gsoapssl++ z
|
2020-11-02 06:54:00 +00:00
|
|
|
''}
|
2023-03-04 08:10:37 +00:00
|
|
|
TOOL_QT5_LRC := ${getDev qttools}/bin/lrelease
|
2014-11-29 07:09:50 +00:00
|
|
|
LOCAL_CONFIG
|
|
|
|
|
2016-09-01 19:54:58 +01:00
|
|
|
./configure \
|
|
|
|
${optionalString headless "--build-headless"} \
|
2012-03-20 13:54:01 +00:00
|
|
|
${optionalString (!javaBindings) "--disable-java"} \
|
|
|
|
${optionalString (!pythonBindings) "--disable-python"} \
|
2014-04-17 23:36:41 +01:00
|
|
|
${optionalString (!pulseSupport) "--disable-pulse"} \
|
2014-11-29 07:09:50 +00:00
|
|
|
${optionalString (!enableHardening) "--disable-hardening"} \
|
2017-06-29 03:24:19 +01:00
|
|
|
${optionalString (!enable32bitGuests) "--disable-vmmraw"} \
|
2021-11-10 00:40:47 +00:00
|
|
|
${optionalString enableWebService "--enable-webservice"} \
|
2020-04-22 12:13:59 +01:00
|
|
|
${optionalString (open-watcom-bin != null) "--with-ow-dir=${open-watcom-bin}"} \
|
2024-02-08 19:19:41 +00:00
|
|
|
${optionalString (enableKvm) "--with-kvm"} \
|
2024-02-08 18:45:30 +00:00
|
|
|
${extraConfigureFlags} \
|
2018-12-07 16:04:49 +00:00
|
|
|
--disable-kmods
|
2016-04-16 17:57:59 +01:00
|
|
|
sed -e 's@PKG_CONFIG_PATH=.*@PKG_CONFIG_PATH=${libIDL}/lib/pkgconfig:${glib.dev}/lib/pkgconfig ${libIDL}/bin/libIDL-config-2@' \
|
2009-04-12 22:59:40 +01:00
|
|
|
-i AutoConfig.kmk
|
|
|
|
sed -e 's@arch/x86/@@' \
|
|
|
|
-i Config.kmk
|
2024-04-10 15:36:10 +01:00
|
|
|
substituteInPlace Config.kmk --replace-fail "VBOX_WITH_TESTCASES = 1" "#"
|
2009-04-12 22:59:40 +01:00
|
|
|
'';
|
|
|
|
|
2012-03-02 14:54:14 +00:00
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
2012-08-17 11:36:43 +01:00
|
|
|
buildPhase = ''
|
2009-04-12 22:59:40 +01:00
|
|
|
source env.sh
|
2024-04-10 15:36:10 +01:00
|
|
|
kmk -j $NIX_BUILD_CORES BUILD_TYPE="${finalAttrs.buildType}"
|
2012-03-02 14:54:14 +00:00
|
|
|
'';
|
|
|
|
|
2009-04-12 22:59:40 +01:00
|
|
|
installPhase = ''
|
2014-12-16 10:08:13 +00:00
|
|
|
libexec="$out/libexec/virtualbox"
|
|
|
|
share="${if enableHardening then "$out/share/virtualbox" else "$libexec"}"
|
2012-08-17 11:36:43 +01:00
|
|
|
|
2009-10-08 13:57:05 +01:00
|
|
|
# Install VirtualBox files
|
2014-12-16 21:13:12 +00:00
|
|
|
mkdir -p "$libexec"
|
2024-04-10 15:36:10 +01:00
|
|
|
find out/linux.*/${finalAttrs.buildType}/bin -mindepth 1 -maxdepth 1 \
|
2014-12-16 21:13:12 +00:00
|
|
|
-name src -o -exec cp -avt "$libexec" {} +
|
2012-08-17 11:36:43 +01:00
|
|
|
|
2012-03-02 14:54:14 +00:00
|
|
|
mkdir -p $out/bin
|
2024-10-14 05:46:43 +01:00
|
|
|
for file in ${
|
|
|
|
optionalString (!headless) "VirtualBox VBoxSDL"
|
|
|
|
} ${optionalString enableWebService "vboxwebsrv"} VBoxManage VBoxBalloonCtrl VBoxHeadless; do
|
2017-03-27 22:28:26 +01:00
|
|
|
echo "Linking $file to /bin"
|
|
|
|
test -x "$libexec/$file"
|
2012-03-20 13:54:01 +00:00
|
|
|
ln -s "$libexec/$file" $out/bin/$file
|
2009-04-14 14:29:19 +01:00
|
|
|
done
|
2012-08-17 11:36:43 +01:00
|
|
|
|
2018-08-10 06:28:57 +01:00
|
|
|
${optionalString (extensionPack != null) ''
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
mkdir -p "$share"
|
2021-11-10 00:40:47 +00:00
|
|
|
"${fakeroot}/bin/fakeroot" "${stdenv.shell}" <<EOF
|
2012-12-12 06:12:46 +00:00
|
|
|
"$libexec/VBoxExtPackHelperApp" install \
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
--base-dir "$share/ExtensionPacks" \
|
|
|
|
--cert-dir "$share/ExtPackCertificates" \
|
2012-12-12 06:12:46 +00:00
|
|
|
--name "Oracle VM VirtualBox Extension Pack" \
|
2013-02-08 06:02:32 +00:00
|
|
|
--tarball "${extensionPack}" \
|
2012-12-12 06:12:46 +00:00
|
|
|
--sha-256 "${extensionPack.outputHash}"
|
2021-11-10 00:40:47 +00:00
|
|
|
EOF
|
2012-12-12 06:12:46 +00:00
|
|
|
''}
|
|
|
|
|
2016-09-01 19:54:58 +01:00
|
|
|
${optionalString (!headless) ''
|
|
|
|
# Create and fix desktop item
|
|
|
|
mkdir -p $out/share/applications
|
|
|
|
sed -i -e "s|Icon=VBox|Icon=$libexec/VBox.png|" $libexec/virtualbox.desktop
|
|
|
|
ln -sfv $libexec/virtualbox.desktop $out/share/applications
|
|
|
|
# Icons
|
|
|
|
mkdir -p $out/share/icons/hicolor
|
|
|
|
for size in `ls -1 $libexec/icons`; do
|
|
|
|
mkdir -p $out/share/icons/hicolor/$size/apps
|
|
|
|
ln -s $libexec/icons/$size/*.png $out/share/icons/hicolor/$size/apps
|
|
|
|
done
|
2024-01-30 10:06:14 +00:00
|
|
|
# Translation
|
|
|
|
ln -sv $libexec/nls "$out/share/virtualbox"
|
2016-09-01 19:54:58 +01:00
|
|
|
''}
|
2014-12-15 16:51:12 +00:00
|
|
|
|
2024-02-08 19:19:41 +00:00
|
|
|
${optionalString withModsrc ''
|
2024-04-10 15:36:10 +01:00
|
|
|
cp -rv out/linux.*/${finalAttrs.buildType}/bin/src "$modsrc"
|
2024-02-08 19:19:41 +00:00
|
|
|
''}
|
2023-08-15 19:54:29 +01:00
|
|
|
|
|
|
|
mkdir -p "$out/share/virtualbox"
|
|
|
|
cp -rv src/VBox/Main/UnattendedTemplates "$out/share/virtualbox"
|
2024-04-10 15:36:10 +01:00
|
|
|
ln -s "${finalAttrs.virtualboxGuestAdditionsIso}" "$out/share/virtualbox/VBoxGuestAdditions.iso"
|
2009-04-12 22:59:40 +01:00
|
|
|
'';
|
2012-08-17 11:36:43 +01:00
|
|
|
|
2024-10-14 05:46:43 +01:00
|
|
|
preFixup =
|
|
|
|
optionalString (!headless) ''
|
|
|
|
wrapQtApp $out/bin/VirtualBox
|
|
|
|
''
|
|
|
|
# If hardening is disabled, wrap the VirtualBoxVM binary instead of patching
|
|
|
|
# the source code (see postPatch).
|
|
|
|
+ optionalString (!headless && !enableHardening) ''
|
|
|
|
wrapQtApp $out/libexec/virtualbox/VirtualBoxVM \
|
|
|
|
--prefix LD_LIBRARY_PATH : "${lib.makeLibraryPath [ vulkan-loader ]}"
|
|
|
|
'';
|
2019-08-06 18:07:57 +01:00
|
|
|
|
2017-10-29 01:03:12 +01:00
|
|
|
passthru = {
|
|
|
|
inherit extensionPack; # for inclusion in profile to prevent gc
|
2024-05-14 17:17:05 +01:00
|
|
|
tests = nixosTests.virtualbox;
|
2020-01-20 13:48:43 +00:00
|
|
|
updateScript = ./update.sh;
|
2017-10-29 01:03:12 +01:00
|
|
|
};
|
2013-06-23 13:35:33 +01:00
|
|
|
|
2009-04-12 22:59:40 +01:00
|
|
|
meta = {
|
|
|
|
description = "PC emulator";
|
2023-03-21 18:08:09 +00:00
|
|
|
longDescription = ''
|
2024-01-26 12:19:04 +00:00
|
|
|
VirtualBox is an x86 and AMD64/Intel64 virtualization product for enterprise and home use.
|
2023-03-21 18:08:09 +00:00
|
|
|
|
|
|
|
To install on NixOS, please use the option `virtualisation.virtualbox.host.enable = true`.
|
|
|
|
Please also check other options under `virtualisation.virtualbox`.
|
|
|
|
'';
|
2022-06-04 23:19:25 +01:00
|
|
|
sourceProvenance = with lib.sourceTypes; [
|
|
|
|
fromSource
|
|
|
|
binaryNativeCode
|
|
|
|
];
|
2024-04-10 10:19:22 +01:00
|
|
|
license = lib.licenses.gpl2;
|
2020-04-01 02:11:51 +01:00
|
|
|
homepage = "https://www.virtualbox.org/";
|
2024-10-14 05:46:43 +01:00
|
|
|
maintainers = with lib.maintainers; [
|
|
|
|
sander
|
|
|
|
friedrichaltheide
|
|
|
|
blitz
|
|
|
|
];
|
virtualbox: 5.2.28 -> 6.0.6
Quite some fixing was needed to get this to work.
Changes in VirtualBox and additions:
- VirtualBox is no longer officially supported on 32-bit hosts so i686-linux is removed from platforms
for VirtualBox and the extension pack. 32-bit additions still work.
- There was a refactoring of kernel module makefiles and two resulting bugs affected us which had to be patched.
These bugs were reported to the bug tracker (see comments near patches).
- The Qt5X11Extras makefile patch broke. Fixed it to apply again, making the libraries logic simpler
and more correct (it just uses a different base path instead of always linking to Qt5X11Extras).
- Added a patch to remove "test1" and "test2" kernel messages due to forgotten debugging code.
- virtualbox-host NixOS module: the VirtualBoxVM executable should be setuid not VirtualBox.
This matches how the official installer sets it up.
- Additions: replaced a for loop for installing kernel modules with just a "make install",
which seems to work without any of the things done in the previous code.
- Additions: The package defined buildCommand which resulted in phases not running, including RUNPATH
stripping in fixupPhase, and installPhase was defined which was not even run. Fixed this by
refactoring using phases. Had to set dontStrip otherwise binaries were broken by stripping.
The libdbus path had to be added later in fixupPhase because it is used via dlopen not directly linked.
- Additions: Added zlib and libc to patchelf, otherwise runtime library errors result from some binaries.
For some reason the missing libc only manifested itself for mount.vboxsf when included in the initrd.
Changes in nixos/tests/virtualbox:
- Update the simple-gui test to send the right keys to start the VM. With VirtualBox 5
it was enough to just send "return", but with 6 the Tools thing may be selected by
default. Send "home" to reliably select Tools, "down" to move to the VM and "return"
to start it.
- Disable the VirtualBox UART by default because it causes a crash due to a regression
in VirtualBox (specific to software virtualization and serial port usage). It can
still be enabled using an option but there is an assert that KVM nested virtualization
is enabled, which works around the problem (see below).
- Add an option to enable nested KVM virtualization, allowing VirtualBox to use hardware
virtualization. This works around the UART problem and also allows using 64-bit
guests, but requires a kernel module parameter.
- Add an option to run 64-bit guests. Tested that the tests pass with that. As mentioned
this requires KVM nested virtualization.
2019-05-04 15:18:39 +01:00
|
|
|
platforms = [ "x86_64-linux" ];
|
2022-01-28 12:49:22 +00:00
|
|
|
mainProgram = "VirtualBox";
|
2009-04-12 22:59:40 +01:00
|
|
|
};
|
2024-04-10 15:36:10 +01:00
|
|
|
})
|