Skip to content

Instantly share code, notes, and snippets.

@Mathnerd314
Created July 4, 2014 18:29
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Mathnerd314/5fb79de61125fccb5a18 to your computer and use it in GitHub Desktop.
Save Mathnerd314/5fb79de61125fccb5a18 to your computer and use it in GitHub Desktop.
bglpp output
Derive
((("out"
,"/nix/store/m821yarrwal6g1yjf64awc3ahnbg62dp-nixos-14.04.350.a8f6601"
,""
,""))
,(("/nix/store/2zzsrd0idk3vqsgl6sia3rl894fbadph-modprobe.drv"
,("out"))
,("/nix/store/32dm52z06bw5zn15397r4n2p5sqw9zps-password-file.drv"
,("out"))
,("/nix/store/41d2c4b4fa9sbakxzavb5r6al95jick3-shadow-4.1.5.1.drv"
,("out"))
,("/nix/store/4n84rk7r7wdm0wis1v728mifpd9i5lkr-mesa-drivers+txc-10.0.5.drv"
,("out"))
,("/nix/store/5maqprps2mjis6qprgwa7z8k0l2s8r35-initrd.drv"
,("out"))
,("/nix/store/5zzl22zc9fkgi730k06mrdvi4i5pkwi8-firmware.drv"
,("out"))
,("/nix/store/a5djnmq5cnkhhqq2gg0fxr64q8pwrgbl-system-path.drv"
,("out"))
,("/nix/store/arkiy2an9xh59p92yxwpc07q779rlr65-util-linux-2.24.1.drv"
,("out"))
,("/nix/store/az7nzvkf87zk7n169ilxrl4jr00l637d-kde-workspace-4.11.6.drv"
,("out"))
,("/nix/store/bnxskwns4p1qdb1dh7gngy7wjf2fz8hy-polkit-0.112.drv"
,("out"))
,("/nix/store/bvzs32gq88s0yl2amgmw55djnwg0pfpg-perl-5.16.3.drv"
,("out"))
,("/nix/store/c3ksxb9j9wdagvhjp55cpa10jm5avffl-acl-2.2.52.drv"
,("out"))
,("/nix/store/c824ffalg3hp0j2m2rcgvqhig2jf23i8-gummiboot-builder.py.drv"
,("out"))
,("/nix/store/fyh302ycakqkzc4j47apylmg741m4s8r-gnugrep-2.14.drv"
,("out"))
,("/nix/store/i0z0r5p5ggfg035xzfa7y6y4s2612rdh-linux-pam-1.1.8.drv"
,("out"))
,("/nix/store/ilfi1221l7rwxzi494y73whdmjdf08v0-merger.drv"
,("out"))
,("/nix/store/jfn0r1q3b8y6aw536ydqgcs0hbm39f5i-net-tools-1.60_p20120127084908.drv"
,("out"))
,("/nix/store/jw4q1x1zgm495ak458csmcy0smv2zb22-stage-2-init.sh.drv"
,("out"))
,("/nix/store/jzj0apw4c21zl8ixmqg8dh0v8ghwjzhr-glibc-2.19.drv"
,("out"))
,("/nix/store/k2mc1dkraf0dqs518mjr7dfz62c9lh2b-etc.drv"
,("out"))
,("/nix/store/mcg76zmhiv75vl8lwssjid9kiplf17x3-dbus-tools-1.8.0.drv"
,("out"))
,("/nix/store/n93y6zv1zh92l6fbvrggs6r3kk4i1laa-systemd-212.drv"
,("out"))
,("/nix/store/p1hwhvd6pp1zc68zidq1ga0n6jqs1hb8-bash-4.2-p45.drv"
,("out"))
,("/nix/store/qag078vvm5f6v8q5z106p1dzwza669zn-kernel-modules.drv"
,("out"))
,("/nix/store/r22lgf7f6r81sjfjmbcx32ds4ckagqhj-bash-4.2-p45.drv"
,("out"))
,("/nix/store/r5i0ibvdyg0pcqkkarkqad0q6aj8824d-coreutils-8.21.drv"
,("out"))
,("/nix/store/rwfkg05a0x4j22p0qlq4ab8ic5pz728a-setuid-wrapper.drv"
,("out"))
,("/nix/store/w054pxqmvcm26h9k6wf04a6jz6sarqa8-perl-File-Slurp-9999.19.drv"
,("out"))
,("/nix/store/wl7pcr8g3hwdazqdikpbbqdjwli22207-merger.drv"
,("out"))
,("/nix/store/xy1zy5vliv2a0gvjbvk399yzqg8vgxf5-linux-3.12.23.drv"
,("out"))
,("/nix/store/yq3d92abngr7nylk89dc9060x74s2ya5-findutils-4.4.2.drv"
,("out"))
,("/nix/store/zf8fn1pbrxiw3aljw1cxm2sw55fw311q-stdenv.drv"
,("out")))
,("/nix/store/28nvmxbcsal8bbpl8jqfacxdlgznzfy0-setup-etc.pl"
,"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
,"/nix/store/ayb48cf2mgkyz1558c6k9rw07h59zmna-switch-to-configuration.pl")
,"x86_64-linux"
,"/nix/store/p0vd3ydvxplbpjffkpblwj5dahcmp9ri-bash-4.2-p45/bin/bash"
,("-e"
,"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh")
,(("activationScript"
,"#! /nix/store/p0vd3ydvxplbpjffkpblwj5dahcmp9ri-bash-4.2-p45/bin/bash\n\nsystemConfig=@out@\n\nexport PATH=/empty\nfor i in /nix/store/xdswdgz11w9lm9n9bzb6spl7dj45s2x2-coreutils-8.21 /nix/store/937i66g191shz0hwzll61vmi0zvy3gwy-gnugrep-2.14 /nix/store/sls52f6fkpqfs0kj4w0k525v57zrsz9x-findutils-4.4.2 /nix/store/pdskwizjw8ar31hql2wjnnx6g0s6xc50-glibc-2.19 /nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1 /nix/store/sfp5vqabn8zdwda2sk157dhhwcrax5pn-net-tools-1.60_p20120127084908; do\n PATH=$PATH:$i/bin:$i/sbin\ndone\n\n# Ensure a consistent umask.\numask 0022\n\n#### Activation script snippet stdio:\n# Needed by some programs.\nln -sfn /proc/self/fd /dev/fd\nln -sfn /proc/self/fd/0 /dev/stdin\nln -sfn /proc/self/fd/1 /dev/stdout\nln -sfn /proc/self/fd/2 /dev/stderr\n\n\n#### Activation script snippet binsh:\n# Create the required /bin/sh symlink; otherwise lots of things\n# (notably the system() function) won't work.\nmkdir -m 0755 -p /bin\nln -sfn \"/nix/store/ajxd1z42ql9qihdj1pa7in12iynf532g-bash-4.2-p45/bin/sh\" /bin/.sh.tmp\nmv /bin/.sh.tmp /bin/sh # atomically replace /bin/sh\n\n\n#### Activation script snippet domain:\n\n\n#### Activation script snippet etc:\n# Set up the statically computed bits of /etc.\necho \"setting up /etc...\"\n/nix/store/l4sd8xf2q3x5xk5z8ji9dk3hxpb9v8sa-perl-5.16.3/bin/perl /nix/store/28nvmxbcsal8bbpl8jqfacxdlgznzfy0-setup-etc.pl /nix/store/bv4xyipshdk82bcy8xpr9zjbmdks139i-etc/etc\n\n\n#### Activation script snippet users:\ntouch /etc/group\ntouch /etc/passwd\nVISUAL=/nix/store/1yhipvmhbaqykyywhk5y3dwv03mfa221-merger /nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/vigr &>/dev/null\nVISUAL=/nix/store/46yx7m6rp9by2d4rdw2722dhfc0jd0yi-merger /nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/vipw &>/dev/null\n/nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/grpconv\n/nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/pwconv\n\n\n\nsetpw=yes\ntest \"$(getent shadow 'messagebus' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'messagebus' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld1' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld1' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld10' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld10' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld2' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld2' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld3' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld3' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld4' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld4' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld5' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld5' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld6' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld6' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld7' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld7' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld8' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld8' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld9' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld9' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nobody' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nobody' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nscd' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nscd' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'ntp' | cut -d: -f2)\"
!= \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'ntp' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'polkituser' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'polkituser' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'root' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n echo -n \"root:\" | cat - \"/nix/store/4j0vpq6jwi8r63s7f9xhvqcpjkw0cd44-password-file\" | \\\n /nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/chpasswd -e\n\nfi\nsetpw=yes\ntest \"$(getent shadow 'systemd-journal-gateway' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'systemd-journal-gateway' &>/dev/null\nfi\n\n\n\n#### Activation script snippet groups:\n\n\n#### Activation script snippet hostname:\nhostname \"nixos\"\n\n\n#### Activation script snippet media:\nmkdir -m 0755 -p /media\n\n\n#### Activation script snippet modprobe:\n# Allow the kernel to find our wrapped modprobe (which searches\n# in the right location in the Nix store for kernel modules).\n# We need this when the kernel (or some module) auto-loads a\n# module.\necho /nix/store/z4b1bykwq1kqg8arrcm1q1kn67876s96-modprobe/sbin/modprobe > /proc/sys/kernel/modprobe\n\n\n#### Activation script snippet nix:\n# Nix initialisation.\nmkdir -m 0755 -p \\\n /nix/var/nix/gcroots \\\n /nix/var/nix/temproots \\\n /nix/var/nix/manifests \\\n /nix/var/nix/userpool \\\n /nix/var/nix/profiles \\\n /nix/var/nix/db \\\n /nix/var/log/nix/drvs \\\n /nix/var/nix/channel-cache\nmkdir -m 1777 -p \\\n /nix/var/nix/gcroots/per-user \\\n /nix/var/nix/profiles/per-user \\\n /nix/var/nix/gcroots/tmp\n\nln -sf /nix/var/nix/profiles /nix/var/nix/gcroots/\nln -sf /nix/var/nix/manifests /nix/var/nix/gcroots/\n\n\n#### Activation script snippet polkit:\n# Probably no more needed, clean up\nrm -rf /var/lib/{polkit-1,PolicyKit}\n\n\n#### Activation script snippet setuid:\n# Look in the system path and in the default profile for\n# programs to be wrapped.\nSETUID_PATH=/nix/store/ml1yp50kz8qasqpq9d14gzfqaas32bx8-system-path/bin:/nix/store/ml1yp50kz8qasqpq9d14gzfqaas32bx8-system-path/sbin\n\nrm -f /var/setuid-wrappers/* # */\n\nsource=$(PATH=$SETUID_PATH type -tP ping)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/ping\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/ping\necho -n \"$source\" > /var/setuid-wrappers/ping.real\nchmod 0000 /var/setuid-wrappers/ping # to prevent races\nchown root.root /var/setuid-wrappers/ping\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/ping\nsource=$(PATH=$SETUID_PATH type -tP ping6)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/ping6\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/ping6\necho -n \"$source\" > /var/setuid-wrappers/ping6.real\nchmod 0000 /var/setuid-wrappers/ping6 # to prevent races\nchown root.root /var/setuid-wrappers/ping6\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/ping6\nsource=$(PATH=$SETUID_PATH type -tP crontab)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/crontab\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/crontab\necho -n \"$source\" > /var/setuid-wrappers/crontab.real\nchmod 0000 /var/setuid-wrappers/crontab # to prevent races\nchown root.root /var/setuid-wrappers/crontab\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/crontab\nsource=$(PATH=$SETUID_PATH type -tP sudo)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/sudo\nfi\n\ncp /nix/store/
xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/sudo\necho -n \"$source\" > /var/setuid-wrappers/sudo.real\nchmod 0000 /var/setuid-wrappers/sudo # to prevent races\nchown root.root /var/setuid-wrappers/sudo\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/sudo\nsource=$(PATH=$SETUID_PATH type -tP sudoedit)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/sudoedit\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/sudoedit\necho -n \"$source\" > /var/setuid-wrappers/sudoedit.real\nchmod 0000 /var/setuid-wrappers/sudoedit # to prevent races\nchown root.root /var/setuid-wrappers/sudoedit\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/sudoedit\nsource=$(PATH=$SETUID_PATH type -tP fusermount)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/fusermount\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/fusermount\necho -n \"$source\" > /var/setuid-wrappers/fusermount.real\nchmod 0000 /var/setuid-wrappers/fusermount # to prevent races\nchown root.root /var/setuid-wrappers/fusermount\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/fusermount\nsource=$(PATH=$SETUID_PATH type -tP wodim)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/wodim\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/wodim\necho -n \"$source\" > /var/setuid-wrappers/wodim.real\nchmod 0000 /var/setuid-wrappers/wodim # to prevent races\nchown root.root /var/setuid-wrappers/wodim\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/wodim\nsource=$(PATH=$SETUID_PATH type -tP cdrdao)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/cdrdao\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/cdrdao\necho -n \"$source\" > /var/setuid-wrappers/cdrdao.real\nchmod 0000 /var/setuid-wrappers/cdrdao # to prevent races\nchown root.root /var/setuid-wrappers/cdrdao\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/cdrdao\nsource=$(PATH=$SETUID_PATH type -tP growisofs)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/growisofs\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/growisofs\necho -n \"$source\" > /var/setuid-wrappers/growisofs.real\nchmod 0000 /var/setuid-wrappers/growisofs # to prevent races\nchown root.root /var/setuid-wrappers/growisofs\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/growisofs\nsource=$(PATH=$SETUID_PATH type -tP pkexec)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/pkexec\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/pkexec\necho -n \"$source\" > /var/setuid-wrappers/pkexec.real\nchmod 0000 /var/setuid-wrappers/pkexec # to prevent races\nchown root.root /var/setuid-wrappers/pkexec\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/pkexec\nsource=$(PATH=$SETUID_PATH type -tP passwd)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/passwd\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/passwd\necho -n \"$source\" > /var/setuid-wrappers/passwd.real\nchmod 0000 /var/setuid-wrappers/passwd # to prevent races\nchown root.root /var/setuid-wrappers/passwd\nchmod \
"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/passwd\nsource=$(PATH=$SETUID_PATH type -tP chfn)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/chfn\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/chfn\necho -n \"$source\" > /var/setuid-wrappers/chfn.real\nchmod 0000 /var/setuid-wrappers/chfn # to prevent races\nchown root.root /var/setuid-wrappers/chfn\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/chfn\nsource=$(PATH=$SETUID_PATH type -tP su)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/su\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/su\necho -n \"$source\" > /var/setuid-wrappers/su.real\nchmod 0000 /var/setuid-wrappers/su # to prevent races\nchown root.root /var/setuid-wrappers/su\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/su\nsource=$(PATH=$SETUID_PATH type -tP newgrp)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/newgrp\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/newgrp\necho -n \"$source\" > /var/setuid-wrappers/newgrp.real\nchmod 0000 /var/setuid-wrappers/newgrp # to prevent races\nchown root.root /var/setuid-wrappers/newgrp\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/newgrp\nsource=/nix/store/v7f1nilh7dk5j3w8fdz9d0ddvmm4z08s-kde-workspace-4.11.6/lib/kde4/libexec/kcheckpass\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/kcheckpass\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/kcheckpass\necho -n \"$source\" > /var/setuid-wrappers/kcheckpass.real\nchmod 0000 /var/setuid-wrappers/kcheckpass # to prevent races\nchown root.root /var/setuid-wrappers/kcheckpass\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/kcheckpass\nsource=/nix/store/xf7mcagd3asaygvpil7085604ih8wsb3-dbus-tools-1.8.0/libexec/dbus-daemon-launch-helper\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/dbus-daemon-launch-helper\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/dbus-daemon-launch-helper\necho -n \"$source\" > /var/setuid-wrappers/dbus-daemon-launch-helper.real\nchmod 0000 /var/setuid-wrappers/dbus-daemon-launch-helper # to prevent races\nchown root.messagebus /var/setuid-wrappers/dbus-daemon-launch-helper\nchmod \"u+s,g-s,u+rx,g+rx,o-rx\" /var/setuid-wrappers/dbus-daemon-launch-helper\nsource=/nix/store/h5jb7fxnls2nzrhiv1y9q7h8h5kpqyzp-polkit-0.112/lib/polkit-1/polkit-agent-helper-1\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/polkit-agent-helper-1\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/polkit-agent-helper-1\necho -n \"$source\" > /var/setuid-wrappers/polkit-agent-helper-1.real\nchmod 0000 /var/setuid-wrappers/polkit-agent-helper-1 # to prevent races\nchown root.root /var/setuid-wrappers/polkit-agent-helper-1\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/polkit-agent-helper-1\nsource=/nix/store/nx0vgkapsy94dsqy8qy2jlcza3mrra6a-linux-pam-1.1.8/sbin/unix_chkpwd.orig\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/unix_chkpwd\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/unix_chkpwd\necho -n \"$source\" > /var/setuid-wrappers/unix_chkpwd.
real\nchmod 0000 /var/setuid-wrappers/unix_chkpwd # to prevent races\nchown root.nogroup /var/setuid-wrappers/unix_chkpwd\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/unix_chkpwd\n\n\n\n#### Activation script snippet setup-opengl:\nln -sfn /nix/store/pprnpxqx1h5520rxay1mgwwhszyrvg5s-mesa-drivers+txc-10.0.5 /run/opengl-driver\nrm -f /run/opengl-driver-32\n\n\n\n#### Activation script snippet systemd:\nmkdir -m 0755 -p /var/lib/udev\nmkdir -p /var/log/journal\nchmod 0755 /var/log/journal\n\n# Make all journals readable to users in the wheel and adm\n# groups, in addition to those in the systemd-journal group.\n# Users can always read their own journals.\n/nix/store/1flsshqg61dhbfrylbix8m0riaymr6si-acl-2.2.52/bin/setfacl -nm g:wheel:rx,d:g:wheel:rx,g:adm:rx,d:g:adm:rx /var/log/journal\n\n\n#### Activation script snippet tmpfs:\n/nix/store/0syx0na4m3nah8m0ks48m5rs485r60pb-util-linux-2.24.1/bin/mount -o \"remount,size=5%\" none /dev\n/nix/store/0syx0na4m3nah8m0ks48m5rs485r60pb-util-linux-2.24.1/bin/mount -o \"remount,size=50%\" none /dev/shm\n/nix/store/0syx0na4m3nah8m0ks48m5rs485r60pb-util-linux-2.24.1/bin/mount -o \"remount,size=25%\" none /run\n\n\n#### Activation script snippet udevd:\necho \"\" > /proc/sys/kernel/hotplug\n\n# Regenerate the hardware database /var/lib/udev/hwdb.bin\n# whenever systemd changes.\nif [ ! -e /var/lib/udev/prev-systemd -o \"$(readlink /var/lib/udev/prev-systemd)\" != /nix/store/sk3017fxx2vhj69saizk5634y3w6hqhn-systemd-212 ]; then\n echo \"regenerating udev hardware database...\"\n /nix/store/sk3017fxx2vhj69saizk5634y3w6hqhn-systemd-212/bin/udevadm hwdb --update && ln -sfn /nix/store/sk3017fxx2vhj69saizk5634y3w6hqhn-systemd-212 /var/lib/udev/prev-systemd\nfi\n\n\n#### Activation script snippet udisks2:\nmkdir -m 0755 -p /var/lib/udisks2\n\n\n#### Activation script snippet upower:\nmkdir -m 0755 -p /var/lib/upower\n\n\n#### Activation script snippet usrbinenv:\nmkdir -m 0755 -p /usr/bin\nln -sfn /nix/store/xdswdgz11w9lm9n9bzb6spl7dj45s2x2-coreutils-8.21/bin/env /usr/bin/.env.tmp\nmv /usr/bin/.env.tmp /usr/bin/env # atomically replace /usr/bin/env\n\n\n#### Activation script snippet var:\n# Various log/runtime directories.\n\ntouch /var/run/utmp # must exist\nchgrp 29 /var/run/utmp\nchmod 664 /var/run/utmp\n\nmkdir -m 0755 -p /var/run/nix/current-load # for distributed builds\nmkdir -m 0700 -p /var/run/nix/remote-stores\n\nmkdir -m 0755 -p /var/log\n\ntouch /var/log/wtmp /var/log/lastlog # must exist\nchmod 644 /var/log/wtmp /var/log/lastlog\n\nmkdir -m 1777 -p /var/tmp\n\n# Empty, read-only home directory of many system accounts.\nmkdir -m 0555 -p /var/empty\n\n\n\n# Make this configuration the current configuration.\n# The readlink is there to ensure that when $systemConfig = /system\n# (which is a symlink to the store), /run/current-system is still\n# used as a garbage collection root.\nln -sfn \"$(readlink -f \"$systemConfig\")\" /run/current-system\n\n# Prevent the current configuration from being garbage-collected.\nln -sfn /run/current-system /nix/var/nix/gcroots/current-system\n")
,("buildCommand"
,"mkdir $out\n\n# Containers don't have their own kernel or initrd. They boot\n# directly into stage 2.\nif [ ! -f /nix/store/nqap670ba20izgf9db7glyd3pqbza0s3-linux-3.12.23/bzImage ]; then\n echo \"The bootloader cannot find the proper kernel image.\"\n echo \"(Expecting /nix/store/nqap670ba20izgf9db7glyd3pqbza0s3-linux-3.12.23/bzImage)\"\n false\nfi\n\nln -s /nix/store/nqap670ba20izgf9db7glyd3pqbza0s3-linux-3.12.23/bzImage $out/kernel\nln -s /nix/store/4gxdlmzgr0x8g3pjsvdgp40a9x5gkm4i-kernel-modules $out/kernel-modules\n\necho -n \"$kernelParams\" > $out/kernel-params\n\nln -s /nix/store/mrlpk0cw6h6xw339dn8im30dji02bxa5-initrd/initrd $out/initrd\n\nln -s /nix/store/yrfd2sn1jivk7jijxhwr1bhrmkqghwll-firmware $out/firmware\n\n\necho \"$activationScript\" > $out/activate\nsubstituteInPlace $out/activate --subst-var out\nchmod u+x $out/activate\nunset activationScript\n\ncp /nix/store/yqp7jx4wkgpqd03pwmdqifr5cpic52x7-stage-2-init.sh $out/init\nsubstituteInPlace $out/init --subst-var-by systemConfig $out\n\nln -s /nix/store/bv4xyipshdk82bcy8xpr9zjbmdks139i-etc/etc $out/etc\nln -s /nix/store/ml1yp50kz8qasqpq9d14gzfqaas32bx8-system-path $out/sw\nln -s \"$systemd\" $out/systemd\n\necho -n \"$configurationName\" > $out/configuration-name\necho -n \"systemd 2\" > $out/init-interface-version\necho -n \"$nixosVersion\" > $out/nixos-version\necho -n \"$system\" > $out/system\n\nmkdir $out/fine-tune\nchildCount=0\nfor i in $children; do\n childCount=$(( childCount + 1 ))\n ln -s $i $out/fine-tune/child-$childCount\ndone\n\nmkdir $out/bin\nsubstituteAll /nix/store/ayb48cf2mgkyz1558c6k9rw07h59zmna-switch-to-configuration.pl $out/bin/switch-to-configuration\nchmod +x $out/bin/switch-to-configuration\n\n\n")
,("buildInputs" ,"")
,("builder"
,"/nix/store/p0vd3ydvxplbpjffkpblwj5dahcmp9ri-bash-4.2-p45/bin/bash")
,("children" ,"")
,("configurationName" ,"")
,("coreutils"
,"/nix/store/xdswdgz11w9lm9n9bzb6spl7dj45s2x2-coreutils-8.21")
,("installBootLoader"
,"/nix/store/6ly4sp536kw3baabvxjxiaa2s1kirzfm-gummiboot-builder.py")
,("kernelParams" ,"loglevel=4")
,("name" ,"nixos-14.04.350.a8f6601")
,("nativeBuildInputs" ,"")
,("nixosVersion" ,"14.04.350.a8f6601")
,("out"
,"/nix/store/m821yarrwal6g1yjf64awc3ahnbg62dp-nixos-14.04.350.a8f6601")
,("perl"
,"/nix/store/l4sd8xf2q3x5xk5z8ji9dk3hxpb9v8sa-perl-5.16.3/bin/perl -I/nix/store/d63pjxj7pjx3f6w02qw0z25pfvqqybzx-perl-File-Slurp-9999.19/lib/perl5/site_perl")
,("preferLocalBuild" ,"1")
,("propagatedBuildInputs" ,"")
,("propagatedNativeBuildInputs" ,"")
,("stdenv"
,"/nix/store/rq16hrf7gy426a6lcnf6pa9746sxnbgc-stdenv")
,("system" ,"x86_64-linux")
,("systemd"
,"/nix/store/sk3017fxx2vhj69saizk5634y3w6hqhn-systemd-212")
,("userHook" ,"")
,("utillinux"
,"/nix/store/0syx0na4m3nah8m0ks48m5rs485r60pb-util-linux-2.24.1")))
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment