Maximilian Bosch
c6d4197e4f
Merge pull request #110283 from r-ryantm/auto-update/docker-compose
...
docker-compose: 1.27.4 -> 1.28.0
2021-01-22 23:25:29 +01:00
Jonathan Ringer
0bc275e634
Revert "lib: Clean up how linux and gcc config is specified"
...
This is a stdenv-rebuild, and should not be merged
into master
This reverts commit 8929989614
.
2021-01-22 14:07:06 -08:00
Ivan Babrou
aea19f284a
docker: correct substitution path with buildx enabled
...
Starting with Docker 20.10, the client repo moved and the path changed.
2021-01-22 13:43:30 -08:00
John Ericson
d95aebbe0e
Merge pull request #107214 from Ericson2314/linux-config-cleanup
...
lib: Clean up how linux and gcc config is specified
2021-01-22 15:15:58 -05:00
Sandro
0c096b67dc
Merge pull request #107302 from bobrik/ivan/docker-buildx
2021-01-22 12:50:25 +01:00
John Ericson
8929989614
lib: Clean up how linux and gcc config is specified
...
The `platform` field is pointless nesting: it's just stuff that happens
to be defined together, and that should be an implementation detail.
This instead makes `linux-kernel` and `gcc` top level fields in platform
configs. They join `rustc` there [all are optional], which was put there
and not in `platform` in anticipation of a change like this.
`linux-kernel.arch` in particular also becomes `linuxArch`, to match the
other `*Arch`es.
The next step after is this to combine the *specific* machines from
`lib.systems.platforms` with `lib.systems.examples`, keeping just the
"multiplatform" ones for defaulting.
2021-01-21 22:44:09 -05:00
zowoq
722c5a8316
crun: 0.16 -> 0.17
...
https://github.com/containers/crun/releases/tag/0.17
2021-01-22 08:06:10 +10:00
Ivan Babrou
deb0d298a2
docker: add buildx support to docker client
2021-01-21 12:52:46 -08:00
Ivan Babrou
e431ff7e2e
docker-buildx: init at 0.5.1
...
Installing docker-buildx enables buildx subcommand on the client:
* https://github.com/docker/buildx
2021-01-21 12:52:45 -08:00
zowoq
30ab92ea31
conmon: 2.0.24 -> 2.0.25
...
https://github.com/containers/conmon/releases/tag/v2.0.25
2021-01-21 18:35:16 +10:00
R. RyanTM
a17adff3e9
docker-compose: 1.27.4 -> 1.28.0
2021-01-21 07:50:25 +00:00
Mario Rodas
369e772cda
Merge pull request #109955 from r-ryantm/auto-update/dumb-init
...
dumb-init: 1.2.4 -> 1.2.5
2021-01-20 21:24:40 -05:00
zowoq
31f5dd3f36
treewide: editorconfig fixes
...
- remove trailing whitespace
- use spaces for indentation
2021-01-20 09:11:11 +10:00
Drew Risinger
9e403b19a1
qemu: 5.1.0 -> 5.2.0
...
Updates to latest version of QEMU.
The build system has changed to ninja.
There are several configuration flags that aren't enabled. I will
defer to maintainers on those.
Adds autoPatchelfHook for patching output dynamically linked binaries.
qemu: use Nix's meson vs bundled
qemu: remove custom directory locations
It appears that these directories are no longer automatically prefixed
with $out/, so they are now trying to write to the system /etc/, /var/
directories, which is not permitted in sandbox.
The default directories seem to work OK, so using those.
2021-01-19 14:06:28 -05:00
R. RyanTM
2ed911999c
dumb-init: 1.2.4 -> 1.2.5
2021-01-19 12:17:33 +00:00
R. RyanTM
d71bca5967
cri-o-unwrapped: 1.19.0 -> 1.20.0 ( #109920 )
2021-01-19 18:58:49 +10:00
Sandro
1afec60627
Merge pull request #95274 from misuzu/qemu-iscsi
2021-01-17 20:16:06 +01:00
Ben Siraphob
5d566c43b4
pkgs/applications: pkgconfig -> pkg-config
2021-01-16 23:49:59 -08:00
Jörg Thalheim
f3042e3078
Merge pull request #108862 from cpcloud/refactor-nvidia-containers
2021-01-15 11:10:09 +00:00
Ben Siraphob
108bdac3d9
pkgs/applications: stdenv.lib -> lib
2021-01-15 14:24:03 +07:00
zowoq
93e5d99592
conmon: 2.0.22 -> 2.0.24
...
https://github.com/containers/conmon/releases/tag/v2.0.24
2021-01-15 13:03:08 +10:00
zowoq
8a4b39330f
Revert "conmon: 2.0.22 -> 2.0.23"
...
This reverts commit 59d4583cf3
.
Broken release.
2021-01-15 04:44:13 +10:00
Sascha Grunert
59d4583cf3
conmon: 2.0.22 -> 2.0.23
...
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2021-01-14 08:03:25 -08:00
Mark Vainomaa
b451286b1f
docker: 19.03.4 -> 20.10.2 ( #108960 )
...
This commit refactors the build process to handle Docker engine and
CLI split.
2021-01-13 11:33:14 +01:00
Sandro
e12409de89
Merge pull request #108959 from mikroskeem/docker-proxy-update
...
docker-proxy: 7b2b1fe -> fa125a3
2021-01-13 09:18:19 +01:00
Profpatsch
4a7f99d55d
treewide: with stdenv.lib; in meta -> with lib;
...
Part of: https://github.com/NixOS/nixpkgs/issues/108938
meta = with stdenv.lib;
is a widely used pattern. We want to slowly remove
the `stdenv.lib` indirection and encourage people
to use `lib` directly. Thus let’s start with the meta
field.
This used a rewriting script to mostly automatically
replace all occurances of this pattern, and add the
`lib` argument to the package header if it doesn’t
exist yet.
The script in its current form is available at
https://cs.tvl.fyi/depot@2f807d7f141068d2d60676a89213eaa5353ca6e0/-/blob/users/Profpatsch/nixpkgs-rewriter/default.nix
2021-01-11 10:38:22 +01:00
Mark Vainomaa
855bf1a311
docker-proxy: 7b2b1fe -> fa125a3
2021-01-10 17:31:10 +02:00
Phillip Cloud
4cd4468144
nvidia-container-toolkit: remove unused input
2021-01-10 08:54:38 -05:00
Phillip Cloud
5af3dd4a96
nvidia-container-toolkit: fix license
2021-01-10 08:54:38 -05:00
Phillip Cloud
8f33bef20f
nvidia-container-runtime: fix license
2021-01-10 08:54:38 -05:00
Phillip Cloud
7eed27754c
libnvidia-container: fix license
2021-01-10 08:54:38 -05:00
Phillip Cloud
8169d5c644
nvidia-container-toolkit: pass nvidia-container-runtime into drv
2021-01-10 08:54:38 -05:00
Phillip Cloud
f91f9eacd6
nvidia-container-toolkit: format
2021-01-10 08:54:37 -05:00
Phillip Cloud
bc43141b48
nvidia-container-runtime: format
2021-01-10 08:54:37 -05:00
Phillip Cloud
b0b92e598d
libnvidia-container: remove line break
2021-01-10 08:54:37 -05:00
Phillip Cloud
d93754bb40
nvidia-docker: fix lib access
2021-01-10 08:54:37 -05:00
Phillip Cloud
e94a0228c5
nvidia-docker: clean up drv inputs
2021-01-10 08:54:37 -05:00
Phillip Cloud
6b5b64173f
nvidia-docker: no longer perform templating of container runtime config files
2021-01-10 08:54:37 -05:00
Phillip Cloud
91b47ae43c
nvidia-docker: podman-config.toml -> nvidia-podman/config.toml
2021-01-10 08:54:37 -05:00
Phillip Cloud
e67c679649
nvidia-docker: split out nvidia-container-toolkit into separate drv
2021-01-10 08:54:37 -05:00
Phillip Cloud
610ec202dc
nvidia-docker: split out nvidia-container-runtime into separate drv
2021-01-10 08:54:37 -05:00
Phillip Cloud
27cd42fd6d
nvidia-docker: use pname for repo attribute
2021-01-10 08:54:37 -05:00
Phillip Cloud
b578c28217
nvidia-docker: split out libnvidia-container into separate drv
2021-01-10 08:54:37 -05:00
Michael Weiss
8ae8602bf7
Merge branch 'master' into staging-next
...
Manually resolved a conflict in
pkgs/development/libraries/libbladeRF/default.nix.
2021-01-09 12:16:11 +01:00
Phillip Cloud
7115e5ac8d
nvidia-docker: fix pname of nvidia-container-runtime
2021-01-08 09:29:56 -05:00
Phillip Cloud
890a298409
nvidia-docker: wrapProgram to pickup needed runc executable
2021-01-08 09:29:56 -05:00
Phillip Cloud
df43c0f9da
nvidia-docker: install podman config
2021-01-08 09:29:56 -05:00
Jan Tojnar
e6c0c98940
Merge branch 'master' into staging-next
...
zynaddsubfx conflict has been updated to 3.0.1, which conflicted with rewrite after 3.0.5 update on a different branch.
2021-01-08 02:07:34 +01:00
Phillip Cloud
976c3999a2
nvidia-docker: fix VERSION reporting bug
2021-01-07 15:56:08 -05:00
github-actions[bot]
5c072a088d
Merge master into staging-next
2021-01-07 18:40:50 +00:00
Phillip Cloud
6468f2cb69
nvidia-docker: 2.0.3 -> 2.5.0
2021-01-07 07:50:01 -05:00
Ben Siraphob
b04fc593e7
treewide: cmake buildInputs to nativeBuildInputs, minor cleanups
2021-01-01 11:52:33 +07:00
Jörg Thalheim
f91d7cf059
cntr: 1.2.1 -> 1.4.1
2020-12-30 07:09:54 +01:00
misuzu
c5dd597870
qemu: libiscsi support
2020-12-29 16:19:42 +02:00
Florian Klink
f13837054b
Merge pull request #107778 from zowoq/containerd
...
containerd: misc fixes
2020-12-29 01:04:10 +01:00
zowoq
824cfdd019
docker: disable containerd completion
...
not available in containerd prior to 1.4
2020-12-29 09:33:28 +10:00
zowoq
d7d6f5507c
containerd: misc fixes
...
- build man during buildPhase
- use `src.rev` for `commit`
- install completion
2020-12-29 09:33:28 +10:00
freezeboy
8ab8ada2f5
charliecloud: 0.20 -> 0.21
2020-12-27 22:34:18 +01:00
zowoq
70bcf62c05
conmon: 2.0.21 -> 2.0.22
...
https://github.com/containers/conmon/releases/tag/v2.0.22
2020-12-21 05:28:42 +10:00
Michael Weiss
52424415bc
vpcs: 0.8 -> 0.8.1
...
Thanks to Repology / Alpine Linux I noticed that the GNS3 team continued
the development. From their README:
> This is a continuation of VPCS, based on the last development version
> and improved with patches wrote by various people from the community.
> The original VPCS code, which is unfortunately not maintained anymore,
> can be viewed on https://sourceforge.net/p/vpcs/code/
2020-12-18 20:45:54 +01:00
Mario Rodas
9c8a7716d3
docker-slim: 1.32.0 -> 1.33.0
...
https://github.com/docker-slim/docker-slim/releases/tag/1.33.0
2020-12-15 13:45:00 -05:00
R. RyanTM
4cddb0930d
dumb-init: 1.2.3 -> 1.2.4
2020-12-10 15:01:17 +00:00
zowoq
cfbc1af189
podman: 2.2.0 -> 2.2.1
...
https://github.com/containers/podman/releases/tag/v2.2.1
2020-12-09 05:37:31 +10:00
R. RyanTM
bbbb6dfa36
dumb-init: 1.2.2 -> 1.2.3
2020-12-04 10:05:05 +00:00
Maximilian Bosch
ccb3f1c9dd
Merge pull request #105591 from mweinelt/qemu
...
qemu: fix CVE-2020-28916
2020-12-02 21:14:16 +01:00
Sergey Lukjanov
b999879206
docker: 19.03.13 -> 19.03.14
2020-12-01 23:34:59 -08:00
Martin Weinelt
2d55b8def4
containerd: update commit id for version indicator
...
I forogt to update the `commit` value in 8884729
, which is why this the
version output was wrong:
```
❯ ./result/bin/containerd -v
containerd github.com/containerd/containerd v1.4.3 7ad184331fa3e55e52b890ea95e65ba581ae3429
```
This change corrects it.
```
❯ ./result/bin/containerd -v
containerd github.com/containerd/containerd v1.4.3 269548fa27e0089a8b8278fc4fc781d7f65a939b
```
2020-12-01 18:55:01 +01:00
Martin Weinelt
8884729f19
containerd: 1.4.2 -> 1.4.3
...
Access controls for the shim’s API socket verified that the connecting
process had an effective UID of 0, but did not otherwise restrict
access to the abstract Unix domain socket. This would allow malicious
containers running in the same network namespace as the shim, with an
effective UID of 0 but otherwise reduced privileges, to cause new
processes to be run with elevated privileges.
Fixes: CVE-2020-15257
2020-12-01 17:10:19 +01:00
Martin Weinelt
c3f268000e
qemu: fix CVE-2020-28916
...
While receiving packets via e1000e_write_packet_to_guest an infinite
loop could be triggered if the receive descriptor had a NULL buffer
address.
A privileged guest user could use this to induce a DoS Scenario.
Fixes: CVE-2020-28916
2020-12-01 16:54:21 +01:00
Sascha Grunert
bd6067cd5d
podman: 2.1.0 -> 2.2.0
...
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2020-12-01 22:20:11 +10:00
Martin Weinelt
3200eaef74
Merge pull request #105157 from mweinelt/libslirp
...
libslirp: fix CVE-2020-29129
2020-11-30 15:56:09 +01:00
Martin Weinelt
bd3ce46719
qemu: fix CVE-2020-29129, CVE-2020-29130 in vendored libslirp
...
Fixes out-of-bounds access in libslirp while processing ARP/NCSI packets.
Fixes: CVE-2020-29129, CVE-2020-29130
2020-11-28 02:47:44 +01:00
Sandro
1542fd8e8d
Merge pull request #77421 from Shados/xen-build-efi-binaries
2020-11-27 23:49:07 +01:00
Sandro
e6126df5d9
Merge pull request #105132 from r-ryantm/auto-update/containerd
...
containerd: 1.4.1 -> 1.4.2
2020-11-27 13:15:31 +01:00
R. RyanTM
706ed34eb3
containerd: 1.4.1 -> 1.4.2
2020-11-27 10:28:11 +00:00
Sandro
d3badf3b43
Merge pull request #105075 from r-ryantm/auto-update/singularity
...
singularity: 3.6.4 -> 3.7.0
2020-11-26 23:10:50 +01:00
Florian Klink
1cdbdc3278
Merge pull request #104545 from zowoq/runc
...
runc: add wrapper for systemd
2020-11-26 22:16:53 +01:00
R. RyanTM
1b0e3aa842
singularity: 3.6.4 -> 3.7.0
2020-11-26 20:28:31 +00:00
Sandro
3d4e98ea6e
Merge pull request #103466 from CheariX/open-vm-tools-11.2.0
2020-11-25 11:25:26 +01:00
Graham Christensen
bc49a0815a
utillinux: rename to util-linux
2020-11-24 12:42:06 -05:00
Sascha Grunert
52271f44b1
crun: 0.15.1 -> 0.16
...
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2020-11-24 19:35:46 +10:00
zowoq
50e24b8e0a
runc: add wrapper for procps, systemd
...
for cgroupsv2 it needs `busctl` and `systemctl` in its PATH.
2020-11-23 08:46:34 +10:00
zowoq
a82d8ca64d
runc: add docker to passthru.tests
2020-11-23 08:43:08 +10:00
zowoq
cdf6ffdf2e
docker: add passthru.tests
2020-11-23 08:43:08 +10:00
zowoq
fe78178e09
containerd: add passthru.tests
2020-11-23 08:43:08 +10:00
zowoq
90bb6fbb24
singularity: drop unneeded removeReferencesTo
2020-11-18 08:13:34 +10:00
zowoq
33822cb12f
docker: drop redundant removeReferencesTo
2020-11-18 08:13:34 +10:00
Oleksii Filonenko
512c3c0a05
maintainers: rename filalex77 -> Br1ght0ne
2020-11-17 13:09:31 +02:00
Austin Seipp
a83e5c4245
firecracker: 0.22.0 -> 0.23.0
...
Closes #102789 .
Signed-off-by: Austin Seipp <aseipp@pobox.com>
2020-11-15 21:28:29 -06:00
Christian Mainka
44e2d0d402
open-vm-tools: 11.1.5 -> 11.2.0
2020-11-11 16:22:41 +01:00
Alexander Bich
fae02c06b8
ocaml-libvirt: 0.6.1.4.2017-11-08-unstable -> 0.6.1.5
2020-11-10 05:57:39 +01:00
Maximilian Bosch
50957910fc
Merge pull request #102481 from mweinelt/qemu/cve-2020-27617
...
qemu: apply patch for CVE-2020-27617
2020-11-09 23:51:22 +01:00
Jörg Thalheim
feeda77ec2
Merge pull request #101820 from Chiiruno/dev/looking-glass
...
looking-glass-client: B1 -> B2
2020-11-09 14:43:27 +01:00
Okina Matara
56fb786f82
looking-glass-client: B1 -> B2
2020-11-07 02:41:16 -06:00
markuskowa
b580137d40
Merge pull request #100777 from jbedo/singularity
...
singularity: 3.6.3 -> 3.6.4
2020-11-06 00:13:36 +01:00
Sascha Grunert
d48026dc5b
crun: 0.15 -> 0.15.1
...
Signed-off-by: Sascha Grunert <sgrunert@suse.com>
2020-11-04 08:28:22 +10:00
Phillip Cloud
ea270c00b0
bug: fix libnvidia-container build ( #101665 )
2020-11-03 13:17:06 +01:00
R. RyanTM
2702aced5e
charliecloud: 0.19 -> 0.20
2020-11-02 08:19:19 -08:00
Martin Weinelt
0c54b757e9
qemu: apply patch for CVE-2020-27617
...
An assert(3) failure issue was found in the networking helper functions of QEMU. It could occur in the eth_get_gso_type() routine, if a packet does not have a valid networking L3 protocol (ex. IPv4, IPv6) value. A guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.
Fixes: CVE-2020-27617
2020-11-02 14:01:01 +01:00
WORLDofPEACE
f2d8aebe8e
Merge pull request #101493 from Magicloud/vbox6116
...
virtualbox: 6.1.14 -> 6.1.16
2020-10-27 12:37:16 -04:00