2016-09-13 05:01:27 +01:00
|
|
|
{ stdenv, fetchurl, lib, iasl, dev86, pam, libxslt, libxml2, libX11, xproto, libXext
|
2016-09-13 02:42:16 +01:00
|
|
|
, libXcursor, libXmu, qt5, libIDL, SDL, libcap, zlib, libpng, glib, lvm2
|
2016-09-10 10:40:06 +01:00
|
|
|
, libXrandr, libXinerama
|
2015-09-15 05:32:57 +01:00
|
|
|
, which, alsaLib, curl, libvpx, gawk, nettools, dbus
|
2016-09-13 02:42:16 +01:00
|
|
|
, xorriso, makeself, perl, pkgconfig
|
2012-03-20 13:54:01 +00:00
|
|
|
, javaBindings ? false, jdk ? null
|
2016-10-22 16:02:59 +01:00
|
|
|
, pythonBindings ? false, python2 ? null
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
, enableExtensionPack ? false, requireFile ? null, patchelf ? null, fakeroot ? null
|
2015-05-27 20:42:15 +01:00
|
|
|
, pulseSupport ? false, libpulseaudio ? null
|
2014-12-15 06:13:02 +00:00
|
|
|
, enableHardening ? false
|
2016-09-01 19:54:58 +01:00
|
|
|
, headless ? false
|
2016-09-20 12:57:57 +01:00
|
|
|
, patchelfUnstable # needed until 0.10 is released
|
2009-04-16 14:44:06 +01:00
|
|
|
}:
|
2009-04-12 22:59:40 +01:00
|
|
|
|
2012-03-20 13:54:01 +00:00
|
|
|
with stdenv.lib;
|
|
|
|
|
2012-08-18 15:47:13 +01:00
|
|
|
let
|
2016-10-22 16:02:59 +01:00
|
|
|
python = python2;
|
2014-12-18 10:34:57 +00:00
|
|
|
buildType = "release";
|
2012-08-22 21:48:03 +01:00
|
|
|
|
2016-09-13 02:48:14 +01:00
|
|
|
inherit (importJSON ./upstream-info.json) version extpackRev extpack main;
|
2012-08-22 21:48:03 +01:00
|
|
|
|
2013-06-24 19:35:00 +01:00
|
|
|
# See https://github.com/NixOS/nixpkgs/issues/672 for details
|
|
|
|
extensionPack = requireFile rec {
|
2016-09-13 02:48:14 +01:00
|
|
|
name = "Oracle_VM_VirtualBox_Extension_Pack-${version}-${extpackRev}.vbox-extpack";
|
|
|
|
sha256 = extpack;
|
2013-06-24 19:35:00 +01:00
|
|
|
message = ''
|
|
|
|
In order to use the extension pack, you need to comply with the VirtualBox Personal Use
|
2016-06-01 10:01:04 +01:00
|
|
|
and Evaluation License (PUEL) available at:
|
2013-06-24 19:35:00 +01:00
|
|
|
|
2016-06-01 10:01:04 +01:00
|
|
|
https://www.virtualbox.org/wiki/VirtualBox_PUEL
|
2013-06-24 19:35:00 +01:00
|
|
|
|
2016-06-01 10:01:04 +01:00
|
|
|
Once you have read and if you agree with the license, please use the
|
|
|
|
following command and re-run the installation:
|
2013-06-24 19:35:00 +01:00
|
|
|
|
2016-06-01 10:01:04 +01:00
|
|
|
nix-prefetch-url http://download.virtualbox.org/virtualbox/${version}/${name}
|
2013-06-24 19:35:00 +01:00
|
|
|
'';
|
2012-12-12 06:12:46 +00:00
|
|
|
};
|
|
|
|
|
2012-08-18 15:47:13 +01:00
|
|
|
in stdenv.mkDerivation {
|
2016-09-13 02:42:16 +01:00
|
|
|
name = "virtualbox-${version}";
|
2009-04-12 22:59:40 +01:00
|
|
|
|
|
|
|
src = fetchurl {
|
2011-04-18 20:24:10 +01:00
|
|
|
url = "http://download.virtualbox.org/virtualbox/${version}/VirtualBox-${version}.tar.bz2";
|
2016-09-13 02:48:14 +01:00
|
|
|
sha256 = main;
|
2009-04-12 22:59:40 +01:00
|
|
|
};
|
|
|
|
|
2016-09-13 02:42:16 +01:00
|
|
|
outputs = [ "out" "modsrc" ];
|
|
|
|
|
2012-02-23 22:04:54 +00:00
|
|
|
buildInputs =
|
2016-09-01 19:54:58 +01:00
|
|
|
[ iasl dev86 libxslt libxml2 xproto libX11 libXext libXcursor libIDL
|
2016-10-22 16:02:59 +01:00
|
|
|
libcap glib lvm2 alsaLib curl libvpx pam xorriso makeself perl
|
2016-09-20 12:57:57 +01:00
|
|
|
pkgconfig which libXmu libpng patchelfUnstable ]
|
2012-03-20 13:54:01 +00:00
|
|
|
++ optional javaBindings jdk
|
2014-04-17 23:36:41 +01:00
|
|
|
++ optional pythonBindings python
|
2016-09-01 19:54:58 +01:00
|
|
|
++ optional pulseSupport libpulseaudio
|
2016-09-10 10:40:06 +01:00
|
|
|
++ optionals (headless) [ libXrandr ]
|
2016-09-13 05:01:27 +01:00
|
|
|
++ optionals (!headless) [ qt5.qtbase qt5.qtx11extras libXinerama SDL ];
|
2009-04-12 22:59:40 +01:00
|
|
|
|
2016-03-06 15:45:44 +00:00
|
|
|
hardeningDisable = [ "fortify" "pic" "stackprotector" ];
|
|
|
|
|
2013-01-10 01:21:02 +00:00
|
|
|
prePatch = ''
|
2009-04-12 22:59:40 +01:00
|
|
|
set -x
|
2016-09-13 02:42:16 +01:00
|
|
|
sed -e 's@MKISOFS --version@MKISOFS -version@' \
|
2012-03-20 13:54:01 +00:00
|
|
|
-e 's@PYTHONDIR=.*@PYTHONDIR=${if pythonBindings then python else ""}@' \
|
2016-09-13 05:01:27 +01:00
|
|
|
${optionalString (!headless) ''
|
|
|
|
-e 's@TOOLQT5BIN=.*@TOOLQT5BIN="${getDev qt5.qtbase}/bin"@' \
|
|
|
|
''} -i configure
|
2015-04-26 18:54:51 +01:00
|
|
|
ls kBuild/bin/linux.x86/k* tools/linux.x86/bin/* | xargs -n 1 patchelf --set-interpreter ${stdenv.glibc.out}/lib/ld-linux.so.2
|
|
|
|
ls kBuild/bin/linux.amd64/k* tools/linux.amd64/bin/* | xargs -n 1 patchelf --set-interpreter ${stdenv.glibc.out}/lib/ld-linux-x86-64.so.2
|
2015-07-13 18:30:01 +01:00
|
|
|
sed -i -e '
|
2015-10-13 13:33:08 +01:00
|
|
|
s@"libdbus-1\.so\.3"@"${dbus.lib}/lib/libdbus-1.so.3"@g
|
2015-10-08 10:23:19 +01:00
|
|
|
s@"libasound\.so\.2"@"${alsaLib.out}/lib/libasound.so.2"@g
|
2015-07-13 18:30:01 +01:00
|
|
|
${optionalString pulseSupport ''
|
2015-10-08 10:23:19 +01:00
|
|
|
s@"libpulse\.so\.0"@"${libpulseaudio.out}/lib/libpulse.so.0"@g
|
2015-07-13 18:30:01 +01:00
|
|
|
''}
|
2015-09-15 05:32:57 +01:00
|
|
|
' src/VBox/Main/xml/Settings.cpp \
|
|
|
|
src/VBox/Devices/Audio/{alsa,pulse}_stubs.c \
|
|
|
|
include/VBox/dbus-calls.h
|
2009-04-12 22:59:40 +01:00
|
|
|
export USER=nix
|
|
|
|
set +x
|
2012-02-23 22:04:54 +00:00
|
|
|
'';
|
2009-04-12 22:59:40 +01:00
|
|
|
|
2016-09-10 10:40:06 +01:00
|
|
|
patches = optional enableHardening ./hardened.patch
|
virtualbox: 5.1.6 -> 5.1.8 for many CVEs:
From LWN:
From the NVD entries:
CVE-2016-5501: Unspecified vulnerability in the Oracle VM VirtualBox
component before 5.0.28 and 5.1.x before 5.1.8 in Oracle
Virtualization allows local users to affect confidentiality,
integrity, and availability via vectors related to Core, a different
vulnerability than CVE-2016-5538.
CVE-2016-5538: Unspecified vulnerability in the Oracle VM VirtualBox
component before 5.0.28 and 5.1.x before 5.1.8 in Oracle
Virtualization allows local users to affect confidentiality,
integrity, and availability via vectors related to Core, a different
vulnerability than CVE-2016-5501.
CVE-2016-5605: Unspecified vulnerability in the Oracle VM VirtualBox
component before 5.1.4 in Oracle Virtualization allows remote
attackers to affect confidentiality and integrity via vectors related
to VRDE.
CVE-2016-5608: Unspecified vulnerability in the Oracle VM VirtualBox
component before 5.0.28 and 5.1.x before 5.1.8 in Oracle
Virtualization allows local users to affect availability via vectors
related to Core, a different vulnerability than CVE-2016-5613.
CVE-2016-5610: Unspecified vulnerability in the Oracle VM VirtualBox
component before 5.0.28 and 5.1.x before 5.1.8 in Oracle
Virtualization allows local users to affect confidentiality,
integrity, and availability via vectors related to Core.
CVE-2016-5611: Unspecified vulnerability in the Oracle VM VirtualBox
component before 5.0.28 and 5.1.x before 5.1.8 in Oracle
Virtualization allows local users to affect confidentiality via
vectors related to Core.
CVE-2016-5613: Unspecified vulnerability in the Oracle VM VirtualBox
component before 5.0.28 and 5.1.x before 5.1.8 in Oracle
Virtualization allows local users to affect availability via vectors
related to Core, a different vulnerability than CVE-2016-5608.
2016-10-26 12:48:21 +01:00
|
|
|
++ [ ./qtx11extras.patch ];
|
2014-11-29 07:09:50 +00:00
|
|
|
|
2014-12-16 23:57:36 +00:00
|
|
|
postPatch = ''
|
|
|
|
sed -i -e 's|/sbin/ifconfig|${nettools}/bin/ifconfig|' \
|
2016-09-10 10:40:06 +01:00
|
|
|
src/VBox/HostDrivers/adpctl/VBoxNetAdpCtl.cpp
|
2014-12-16 23:57:36 +00:00
|
|
|
'';
|
|
|
|
|
2015-07-24 13:32:52 +01:00
|
|
|
# first line: ugly hack, and it isn't yet clear why it's a problem
|
2009-04-12 22:59:40 +01:00
|
|
|
configurePhase = ''
|
2016-08-31 10:32:34 +01:00
|
|
|
NIX_CFLAGS_COMPILE=$(echo "$NIX_CFLAGS_COMPILE" | sed 's,\-isystem ${lib.getDev stdenv.cc.libc}/include,,g')
|
2015-07-24 13:32:52 +01:00
|
|
|
|
2014-11-29 07:09:50 +00:00
|
|
|
cat >> LocalConfig.kmk <<LOCAL_CONFIG
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
VBOX_WITH_TESTCASES :=
|
|
|
|
VBOX_WITH_TESTSUITE :=
|
|
|
|
VBOX_WITH_VALIDATIONKIT :=
|
|
|
|
VBOX_WITH_DOCS :=
|
|
|
|
VBOX_WITH_WARNINGS_AS_ERRORS :=
|
|
|
|
|
|
|
|
VBOX_WITH_ORIGIN :=
|
|
|
|
VBOX_PATH_APP_PRIVATE_ARCH_TOP := $out/share/virtualbox
|
|
|
|
VBOX_PATH_APP_PRIVATE_ARCH := $out/libexec/virtualbox
|
|
|
|
VBOX_PATH_SHARED_LIBS := $out/libexec/virtualbox
|
|
|
|
VBOX_WITH_RUNPATH := $out/libexec/virtualbox
|
|
|
|
VBOX_PATH_APP_PRIVATE := $out/share/virtualbox
|
|
|
|
VBOX_PATH_APP_DOCS := $out/doc
|
2014-11-29 07:09:50 +00:00
|
|
|
${optionalString javaBindings ''
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
VBOX_JAVA_HOME := ${jdk}
|
2014-11-29 07:09:50 +00:00
|
|
|
''}
|
2016-09-13 05:01:27 +01:00
|
|
|
${optionalString (!headless) ''
|
|
|
|
PATH_QT5_X11_EXTRAS_LIB := ${getLib qt5.qtx11extras}/lib
|
|
|
|
PATH_QT5_X11_EXTRAS_INC := ${getDev qt5.qtx11extras}/include
|
|
|
|
TOOL_QT5_LRC := ${getDev qt5.qttools}/bin/lrelease
|
|
|
|
''}
|
2014-11-29 07:09:50 +00:00
|
|
|
LOCAL_CONFIG
|
|
|
|
|
2016-09-01 19:54:58 +01:00
|
|
|
./configure \
|
|
|
|
${optionalString headless "--build-headless"} \
|
2012-03-20 13:54:01 +00:00
|
|
|
${optionalString (!javaBindings) "--disable-java"} \
|
|
|
|
${optionalString (!pythonBindings) "--disable-python"} \
|
2014-04-17 23:36:41 +01:00
|
|
|
${optionalString (!pulseSupport) "--disable-pulse"} \
|
2014-11-29 07:09:50 +00:00
|
|
|
${optionalString (!enableHardening) "--disable-hardening"} \
|
|
|
|
--disable-kmods --with-mkisofs=${xorriso}/bin/xorrisofs
|
2016-04-16 17:57:59 +01:00
|
|
|
sed -e 's@PKG_CONFIG_PATH=.*@PKG_CONFIG_PATH=${libIDL}/lib/pkgconfig:${glib.dev}/lib/pkgconfig ${libIDL}/bin/libIDL-config-2@' \
|
2009-04-12 22:59:40 +01:00
|
|
|
-i AutoConfig.kmk
|
|
|
|
sed -e 's@arch/x86/@@' \
|
|
|
|
-i Config.kmk
|
2010-11-20 10:41:53 +00:00
|
|
|
substituteInPlace Config.kmk --replace "VBOX_WITH_TESTCASES = 1" "#"
|
2009-04-12 22:59:40 +01:00
|
|
|
'';
|
|
|
|
|
2012-03-02 14:54:14 +00:00
|
|
|
enableParallelBuilding = true;
|
|
|
|
|
2012-08-17 11:36:43 +01:00
|
|
|
buildPhase = ''
|
2009-04-12 22:59:40 +01:00
|
|
|
source env.sh
|
2016-04-22 07:39:42 +01:00
|
|
|
kmk -j $NIX_BUILD_CORES BUILD_TYPE="${buildType}"
|
2012-03-02 14:54:14 +00:00
|
|
|
'';
|
|
|
|
|
2009-04-12 22:59:40 +01:00
|
|
|
installPhase = ''
|
2014-12-16 10:08:13 +00:00
|
|
|
libexec="$out/libexec/virtualbox"
|
|
|
|
share="${if enableHardening then "$out/share/virtualbox" else "$libexec"}"
|
2012-08-17 11:36:43 +01:00
|
|
|
|
2009-10-08 13:57:05 +01:00
|
|
|
# Install VirtualBox files
|
2014-12-16 21:13:12 +00:00
|
|
|
mkdir -p "$libexec"
|
2014-12-18 10:34:57 +00:00
|
|
|
find out/linux.*/${buildType}/bin -mindepth 1 -maxdepth 1 \
|
2014-12-16 21:13:12 +00:00
|
|
|
-name src -o -exec cp -avt "$libexec" {} +
|
2012-08-17 11:36:43 +01:00
|
|
|
|
2009-10-08 13:57:05 +01:00
|
|
|
# Create wrapper script
|
2012-03-02 14:54:14 +00:00
|
|
|
mkdir -p $out/bin
|
2012-03-20 13:54:01 +00:00
|
|
|
for file in VirtualBox VBoxManage VBoxSDL VBoxBalloonCtrl VBoxBFE VBoxHeadless; do
|
|
|
|
ln -s "$libexec/$file" $out/bin/$file
|
2009-04-14 14:29:19 +01:00
|
|
|
done
|
2012-08-17 11:36:43 +01:00
|
|
|
|
2012-12-12 06:12:46 +00:00
|
|
|
${optionalString enableExtensionPack ''
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
mkdir -p "$share"
|
|
|
|
"${fakeroot}/bin/fakeroot" "${stdenv.shell}" <<EXTHELPER
|
2012-12-12 06:12:46 +00:00
|
|
|
"$libexec/VBoxExtPackHelperApp" install \
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
--base-dir "$share/ExtensionPacks" \
|
|
|
|
--cert-dir "$share/ExtPackCertificates" \
|
2012-12-12 06:12:46 +00:00
|
|
|
--name "Oracle VM VirtualBox Extension Pack" \
|
2013-02-08 06:02:32 +00:00
|
|
|
--tarball "${extensionPack}" \
|
2012-12-12 06:12:46 +00:00
|
|
|
--sha-256 "${extensionPack.outputHash}"
|
virtualbox: Fix extension pack installation.
With hardening, we need to go a bit further rather than just allowing
/nix/store being world-writable. We now use fakeroot to make sure the
VBoxExtPackHelperApp won't moan that the files are not owned by root.
They are, but only outside of the chrooted build process.
Another issue with using fakeroot is that it doesn't seem to cope well
with arguments that contain spaces. That's why I've piped the call into
${stdenv.shell}.
Now, the really gory and confusing part is the introduction of
VBOX_PATH_APP_PRIVATE_ARCH_TOP and the change of VBOX_PATH_APP_PRIVATE.
The VBOX_PATH_APP_PRIVATE_ARCH is *only* for modules and is checked by
the hardened implementation against whether things like VMMR0.r0 or
VBoxVMM.so reside in that directory. As a side note: I admit that the
whole libexec directory is quite polluted with stuff that shouldn't be
there, but for now we've broken enough things and will tear apart the
whole structure at some day in the future[TM].
For the confusing part we have VBOX_PATH_APP_PRIVATE_ARCH_TOP, which
_should_ be the same as VBOX_PATH_APP_PRIVATE_ARCH but unfortunately,
the hardened implementation is checking against this directory (in
IsValidBaseDir) for the extension pack(why!?).
Of course, we could put even that into the libexec directory, somewhat
similar as the official package, but after all, let's at least *try* to
separate things.
Signed-off-by: aszlig <aszlig@redmoonstudios.org>
2014-12-01 02:13:51 +00:00
|
|
|
EXTHELPER
|
2012-12-12 06:12:46 +00:00
|
|
|
''}
|
|
|
|
|
2016-09-01 19:54:58 +01:00
|
|
|
${optionalString (!headless) ''
|
|
|
|
# Create and fix desktop item
|
|
|
|
mkdir -p $out/share/applications
|
|
|
|
sed -i -e "s|Icon=VBox|Icon=$libexec/VBox.png|" $libexec/virtualbox.desktop
|
|
|
|
ln -sfv $libexec/virtualbox.desktop $out/share/applications
|
|
|
|
# Icons
|
|
|
|
mkdir -p $out/share/icons/hicolor
|
|
|
|
for size in `ls -1 $libexec/icons`; do
|
|
|
|
mkdir -p $out/share/icons/hicolor/$size/apps
|
|
|
|
ln -s $libexec/icons/$size/*.png $out/share/icons/hicolor/$size/apps
|
|
|
|
done
|
|
|
|
''}
|
2014-12-15 16:51:12 +00:00
|
|
|
|
2016-09-13 02:42:16 +01:00
|
|
|
cp -rv out/linux.*/${buildType}/bin/src "$modsrc"
|
2009-04-12 22:59:40 +01:00
|
|
|
'';
|
2012-08-17 11:36:43 +01:00
|
|
|
|
2013-06-23 13:35:33 +01:00
|
|
|
passthru = { inherit version; /* for guest additions */ };
|
|
|
|
|
2009-04-12 22:59:40 +01:00
|
|
|
meta = {
|
|
|
|
description = "PC emulator";
|
|
|
|
homepage = http://www.virtualbox.org/;
|
2009-09-11 13:24:32 +01:00
|
|
|
maintainers = [ lib.maintainers.sander ];
|
2009-09-16 15:56:53 +01:00
|
|
|
platforms = lib.platforms.linux;
|
2009-04-12 22:59:40 +01:00
|
|
|
};
|
|
|
|
}
|