about summary refs log tree commit diff
path: root/pkgs/applications/virtualization/crosvm/default.nix
diff options
context:
space:
mode:
authorAlyssa Ross <hi@alyssa.is>2022-08-05 10:42:33 +0000
committerAlyssa Ross <hi@alyssa.is>2022-08-12 07:55:09 +0000
commitde662ab315676d3b9c26081ae34f5075f13fcf1c (patch)
tree148d3bd45eca97dd6a94b3c2562a0178b7a81c88 /pkgs/applications/virtualization/crosvm/default.nix
parent2e37bea41b6f5752bb831a9922ec8587330fb757 (diff)
downloadnixlib-de662ab315676d3b9c26081ae34f5075f13fcf1c.tar
nixlib-de662ab315676d3b9c26081ae34f5075f13fcf1c.tar.gz
nixlib-de662ab315676d3b9c26081ae34f5075f13fcf1c.tar.bz2
nixlib-de662ab315676d3b9c26081ae34f5075f13fcf1c.tar.lz
nixlib-de662ab315676d3b9c26081ae34f5075f13fcf1c.tar.xz
nixlib-de662ab315676d3b9c26081ae34f5075f13fcf1c.tar.zst
nixlib-de662ab315676d3b9c26081ae34f5075f13fcf1c.zip
crosvm: reindent
This style is more common across Nixpkgs.
Diffstat (limited to 'pkgs/applications/virtualization/crosvm/default.nix')
-rw-r--r--pkgs/applications/virtualization/crosvm/default.nix84
1 files changed, 42 insertions, 42 deletions
diff --git a/pkgs/applications/virtualization/crosvm/default.nix b/pkgs/applications/virtualization/crosvm/default.nix
index 6b9143c776e3..c09d1463b171 100644
--- a/pkgs/applications/virtualization/crosvm/default.nix
+++ b/pkgs/applications/virtualization/crosvm/default.nix
@@ -15,59 +15,59 @@ let
 
 in
 
-  rustPlatform.buildRustPackage rec {
-    pname = "crosvm";
-    inherit (upstreamInfo) version;
+rustPlatform.buildRustPackage rec {
+  pname = "crosvm";
+  inherit (upstreamInfo) version;
 
-    src = fetchgit (builtins.removeAttrs upstreamInfo.src [ "date" "path" ]);
+  src = fetchgit (builtins.removeAttrs upstreamInfo.src [ "date" "path" ]);
 
-    separateDebugInfo = true;
+  separateDebugInfo = true;
 
-    patches = [
-      ./default-seccomp-policy-dir.diff
-    ];
+  patches = [
+    ./default-seccomp-policy-dir.diff
+  ];
 
-    cargoLock.lockFile = ./Cargo.lock;
+  cargoLock.lockFile = ./Cargo.lock;
 
-    nativeBuildInputs = [ minijail-tools pkg-config wayland-scanner ];
+  nativeBuildInputs = [ minijail-tools pkg-config wayland-scanner ];
 
-    buildInputs = [
-      libcap libdrm libepoxy minijail virglrenderer wayland wayland-protocols
-    ];
+  buildInputs = [
+    libcap libdrm libepoxy minijail virglrenderer wayland wayland-protocols
+  ];
 
-    postPatch = ''
-      cp ${./Cargo.lock} Cargo.lock
-      sed -i "s|/usr/share/policy/crosvm/|$PWD/seccomp/${arch}/|g" \
-          seccomp/${arch}/*.policy
-    '';
+  postPatch = ''
+    cp ${./Cargo.lock} Cargo.lock
+    sed -i "s|/usr/share/policy/crosvm/|$PWD/seccomp/${arch}/|g" \
+        seccomp/${arch}/*.policy
+  '';
 
-    preBuild = ''
-      export DEFAULT_SECCOMP_POLICY_DIR=$out/share/policy
+  preBuild = ''
+    export DEFAULT_SECCOMP_POLICY_DIR=$out/share/policy
 
-      for policy in seccomp/${arch}/*.policy; do
-          compile_seccomp_policy \
-              --default-action trap $policy ''${policy%.policy}.bpf
-      done
-    '';
+    for policy in seccomp/${arch}/*.policy; do
+        compile_seccomp_policy \
+            --default-action trap $policy ''${policy%.policy}.bpf
+    done
+  '';
 
-    buildFeatures = [ "default" "virgl_renderer" "virgl_renderer_next" ];
+  buildFeatures = [ "default" "virgl_renderer" "virgl_renderer_next" ];
 
-    postInstall = ''
-      mkdir -p $out/share/policy/
-      cp -v seccomp/${arch}/*.bpf $out/share/policy/
-    '';
+  postInstall = ''
+    mkdir -p $out/share/policy/
+    cp -v seccomp/${arch}/*.bpf $out/share/policy/
+  '';
 
-    CROSVM_CARGO_TEST_KERNEL_BINARY =
-      lib.optionalString (stdenv.buildPlatform == stdenv.hostPlatform)
-        "${linux}/${stdenv.hostPlatform.linux-kernel.target}";
+  CROSVM_CARGO_TEST_KERNEL_BINARY =
+    lib.optionalString (stdenv.buildPlatform == stdenv.hostPlatform)
+      "${linux}/${stdenv.hostPlatform.linux-kernel.target}";
 
-    passthru.updateScript = ./update.py;
+  passthru.updateScript = ./update.py;
 
-    meta = with lib; {
-      description = "A secure virtual machine monitor for KVM";
-      homepage = "https://chromium.googlesource.com/crosvm/crosvm/";
-      maintainers = with maintainers; [ qyliss ];
-      license = licenses.bsd3;
-      platforms = [ "aarch64-linux" "x86_64-linux" ];
-    };
-  }
+  meta = with lib; {
+    description = "A secure virtual machine monitor for KVM";
+    homepage = "https://chromium.googlesource.com/crosvm/crosvm/";
+    maintainers = with maintainers; [ qyliss ];
+    license = licenses.bsd3;
+    platforms = [ "aarch64-linux" "x86_64-linux" ];
+  };
+}