Created
July 4, 2014 18:29
-
-
Save Mathnerd314/5fb79de61125fccb5a18 to your computer and use it in GitHub Desktop.
bglpp output
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Derive | |
((("out" | |
,"/nix/store/m821yarrwal6g1yjf64awc3ahnbg62dp-nixos-14.04.350.a8f6601" | |
,"" | |
,"")) | |
,(("/nix/store/2zzsrd0idk3vqsgl6sia3rl894fbadph-modprobe.drv" | |
,("out")) | |
,("/nix/store/32dm52z06bw5zn15397r4n2p5sqw9zps-password-file.drv" | |
,("out")) | |
,("/nix/store/41d2c4b4fa9sbakxzavb5r6al95jick3-shadow-4.1.5.1.drv" | |
,("out")) | |
,("/nix/store/4n84rk7r7wdm0wis1v728mifpd9i5lkr-mesa-drivers+txc-10.0.5.drv" | |
,("out")) | |
,("/nix/store/5maqprps2mjis6qprgwa7z8k0l2s8r35-initrd.drv" | |
,("out")) | |
,("/nix/store/5zzl22zc9fkgi730k06mrdvi4i5pkwi8-firmware.drv" | |
,("out")) | |
,("/nix/store/a5djnmq5cnkhhqq2gg0fxr64q8pwrgbl-system-path.drv" | |
,("out")) | |
,("/nix/store/arkiy2an9xh59p92yxwpc07q779rlr65-util-linux-2.24.1.drv" | |
,("out")) | |
,("/nix/store/az7nzvkf87zk7n169ilxrl4jr00l637d-kde-workspace-4.11.6.drv" | |
,("out")) | |
,("/nix/store/bnxskwns4p1qdb1dh7gngy7wjf2fz8hy-polkit-0.112.drv" | |
,("out")) | |
,("/nix/store/bvzs32gq88s0yl2amgmw55djnwg0pfpg-perl-5.16.3.drv" | |
,("out")) | |
,("/nix/store/c3ksxb9j9wdagvhjp55cpa10jm5avffl-acl-2.2.52.drv" | |
,("out")) | |
,("/nix/store/c824ffalg3hp0j2m2rcgvqhig2jf23i8-gummiboot-builder.py.drv" | |
,("out")) | |
,("/nix/store/fyh302ycakqkzc4j47apylmg741m4s8r-gnugrep-2.14.drv" | |
,("out")) | |
,("/nix/store/i0z0r5p5ggfg035xzfa7y6y4s2612rdh-linux-pam-1.1.8.drv" | |
,("out")) | |
,("/nix/store/ilfi1221l7rwxzi494y73whdmjdf08v0-merger.drv" | |
,("out")) | |
,("/nix/store/jfn0r1q3b8y6aw536ydqgcs0hbm39f5i-net-tools-1.60_p20120127084908.drv" | |
,("out")) | |
,("/nix/store/jw4q1x1zgm495ak458csmcy0smv2zb22-stage-2-init.sh.drv" | |
,("out")) | |
,("/nix/store/jzj0apw4c21zl8ixmqg8dh0v8ghwjzhr-glibc-2.19.drv" | |
,("out")) | |
,("/nix/store/k2mc1dkraf0dqs518mjr7dfz62c9lh2b-etc.drv" | |
,("out")) | |
,("/nix/store/mcg76zmhiv75vl8lwssjid9kiplf17x3-dbus-tools-1.8.0.drv" | |
,("out")) | |
,("/nix/store/n93y6zv1zh92l6fbvrggs6r3kk4i1laa-systemd-212.drv" | |
,("out")) | |
,("/nix/store/p1hwhvd6pp1zc68zidq1ga0n6jqs1hb8-bash-4.2-p45.drv" | |
,("out")) | |
,("/nix/store/qag078vvm5f6v8q5z106p1dzwza669zn-kernel-modules.drv" | |
,("out")) | |
,("/nix/store/r22lgf7f6r81sjfjmbcx32ds4ckagqhj-bash-4.2-p45.drv" | |
,("out")) | |
,("/nix/store/r5i0ibvdyg0pcqkkarkqad0q6aj8824d-coreutils-8.21.drv" | |
,("out")) | |
,("/nix/store/rwfkg05a0x4j22p0qlq4ab8ic5pz728a-setuid-wrapper.drv" | |
,("out")) | |
,("/nix/store/w054pxqmvcm26h9k6wf04a6jz6sarqa8-perl-File-Slurp-9999.19.drv" | |
,("out")) | |
,("/nix/store/wl7pcr8g3hwdazqdikpbbqdjwli22207-merger.drv" | |
,("out")) | |
,("/nix/store/xy1zy5vliv2a0gvjbvk399yzqg8vgxf5-linux-3.12.23.drv" | |
,("out")) | |
,("/nix/store/yq3d92abngr7nylk89dc9060x74s2ya5-findutils-4.4.2.drv" | |
,("out")) | |
,("/nix/store/zf8fn1pbrxiw3aljw1cxm2sw55fw311q-stdenv.drv" | |
,("out"))) | |
,("/nix/store/28nvmxbcsal8bbpl8jqfacxdlgznzfy0-setup-etc.pl" | |
,"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh" | |
,"/nix/store/ayb48cf2mgkyz1558c6k9rw07h59zmna-switch-to-configuration.pl") | |
,"x86_64-linux" | |
,"/nix/store/p0vd3ydvxplbpjffkpblwj5dahcmp9ri-bash-4.2-p45/bin/bash" | |
,("-e" | |
,"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh") | |
,(("activationScript" | |
,"#! /nix/store/p0vd3ydvxplbpjffkpblwj5dahcmp9ri-bash-4.2-p45/bin/bash\n\nsystemConfig=@out@\n\nexport PATH=/empty\nfor i in /nix/store/xdswdgz11w9lm9n9bzb6spl7dj45s2x2-coreutils-8.21 /nix/store/937i66g191shz0hwzll61vmi0zvy3gwy-gnugrep-2.14 /nix/store/sls52f6fkpqfs0kj4w0k525v57zrsz9x-findutils-4.4.2 /nix/store/pdskwizjw8ar31hql2wjnnx6g0s6xc50-glibc-2.19 /nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1 /nix/store/sfp5vqabn8zdwda2sk157dhhwcrax5pn-net-tools-1.60_p20120127084908; do\n PATH=$PATH:$i/bin:$i/sbin\ndone\n\n# Ensure a consistent umask.\numask 0022\n\n#### Activation script snippet stdio:\n# Needed by some programs.\nln -sfn /proc/self/fd /dev/fd\nln -sfn /proc/self/fd/0 /dev/stdin\nln -sfn /proc/self/fd/1 /dev/stdout\nln -sfn /proc/self/fd/2 /dev/stderr\n\n\n#### Activation script snippet binsh:\n# Create the required /bin/sh symlink; otherwise lots of things\n# (notably the system() function) won't work.\nmkdir -m 0755 -p /bin\nln -sfn \"/nix/store/ajxd1z42ql9qihdj1pa7in12iynf532g-bash-4.2-p45/bin/sh\" /bin/.sh.tmp\nmv /bin/.sh.tmp /bin/sh # atomically replace /bin/sh\n\n\n#### Activation script snippet domain:\n\n\n#### Activation script snippet etc:\n# Set up the statically computed bits of /etc.\necho \"setting up /etc...\"\n/nix/store/l4sd8xf2q3x5xk5z8ji9dk3hxpb9v8sa-perl-5.16.3/bin/perl /nix/store/28nvmxbcsal8bbpl8jqfacxdlgznzfy0-setup-etc.pl /nix/store/bv4xyipshdk82bcy8xpr9zjbmdks139i-etc/etc\n\n\n#### Activation script snippet users:\ntouch /etc/group\ntouch /etc/passwd\nVISUAL=/nix/store/1yhipvmhbaqykyywhk5y3dwv03mfa221-merger /nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/vigr &>/dev/null\nVISUAL=/nix/store/46yx7m6rp9by2d4rdw2722dhfc0jd0yi-merger /nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/vipw &>/dev/null\n/nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/grpconv\n/nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/pwconv\n\n\n\nsetpw=yes\ntest \"$(getent shadow 'messagebus' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'messagebus' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld1' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld1' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld10' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld10' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld2' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld2' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld3' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld3' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld4' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld4' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld5' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld5' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld6' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld6' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld7' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld7' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld8' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld8' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nixbld9' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nixbld9' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nobody' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nobody' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'nscd' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'nscd' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'ntp' | cut -d: -f2)\" | |
!= \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'ntp' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'polkituser' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'polkituser' &>/dev/null\nfi\nsetpw=yes\ntest \"$(getent shadow 'root' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n echo -n \"root:\" | cat - \"/nix/store/4j0vpq6jwi8r63s7f9xhvqcpjkw0cd44-password-file\" | \\\n /nix/store/gzr868gspawhic2pcamqms8xbpp06rm2-shadow-4.1.5.1/sbin/chpasswd -e\n\nfi\nsetpw=yes\ntest \"$(getent shadow 'systemd-journal-gateway' | cut -d: -f2)\" != \"x\" && setpw=no\n\nif [ \"$setpw\" == \"yes\" ]; then\n passwd -l 'systemd-journal-gateway' &>/dev/null\nfi\n\n\n\n#### Activation script snippet groups:\n\n\n#### Activation script snippet hostname:\nhostname \"nixos\"\n\n\n#### Activation script snippet media:\nmkdir -m 0755 -p /media\n\n\n#### Activation script snippet modprobe:\n# Allow the kernel to find our wrapped modprobe (which searches\n# in the right location in the Nix store for kernel modules).\n# We need this when the kernel (or some module) auto-loads a\n# module.\necho /nix/store/z4b1bykwq1kqg8arrcm1q1kn67876s96-modprobe/sbin/modprobe > /proc/sys/kernel/modprobe\n\n\n#### Activation script snippet nix:\n# Nix initialisation.\nmkdir -m 0755 -p \\\n /nix/var/nix/gcroots \\\n /nix/var/nix/temproots \\\n /nix/var/nix/manifests \\\n /nix/var/nix/userpool \\\n /nix/var/nix/profiles \\\n /nix/var/nix/db \\\n /nix/var/log/nix/drvs \\\n /nix/var/nix/channel-cache\nmkdir -m 1777 -p \\\n /nix/var/nix/gcroots/per-user \\\n /nix/var/nix/profiles/per-user \\\n /nix/var/nix/gcroots/tmp\n\nln -sf /nix/var/nix/profiles /nix/var/nix/gcroots/\nln -sf /nix/var/nix/manifests /nix/var/nix/gcroots/\n\n\n#### Activation script snippet polkit:\n# Probably no more needed, clean up\nrm -rf /var/lib/{polkit-1,PolicyKit}\n\n\n#### Activation script snippet setuid:\n# Look in the system path and in the default profile for\n# programs to be wrapped.\nSETUID_PATH=/nix/store/ml1yp50kz8qasqpq9d14gzfqaas32bx8-system-path/bin:/nix/store/ml1yp50kz8qasqpq9d14gzfqaas32bx8-system-path/sbin\n\nrm -f /var/setuid-wrappers/* # */\n\nsource=$(PATH=$SETUID_PATH type -tP ping)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/ping\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/ping\necho -n \"$source\" > /var/setuid-wrappers/ping.real\nchmod 0000 /var/setuid-wrappers/ping # to prevent races\nchown root.root /var/setuid-wrappers/ping\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/ping\nsource=$(PATH=$SETUID_PATH type -tP ping6)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/ping6\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/ping6\necho -n \"$source\" > /var/setuid-wrappers/ping6.real\nchmod 0000 /var/setuid-wrappers/ping6 # to prevent races\nchown root.root /var/setuid-wrappers/ping6\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/ping6\nsource=$(PATH=$SETUID_PATH type -tP crontab)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/crontab\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/crontab\necho -n \"$source\" > /var/setuid-wrappers/crontab.real\nchmod 0000 /var/setuid-wrappers/crontab # to prevent races\nchown root.root /var/setuid-wrappers/crontab\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/crontab\nsource=$(PATH=$SETUID_PATH type -tP sudo)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/sudo\nfi\n\ncp /nix/store/ | |
xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/sudo\necho -n \"$source\" > /var/setuid-wrappers/sudo.real\nchmod 0000 /var/setuid-wrappers/sudo # to prevent races\nchown root.root /var/setuid-wrappers/sudo\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/sudo\nsource=$(PATH=$SETUID_PATH type -tP sudoedit)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/sudoedit\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/sudoedit\necho -n \"$source\" > /var/setuid-wrappers/sudoedit.real\nchmod 0000 /var/setuid-wrappers/sudoedit # to prevent races\nchown root.root /var/setuid-wrappers/sudoedit\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/sudoedit\nsource=$(PATH=$SETUID_PATH type -tP fusermount)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/fusermount\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/fusermount\necho -n \"$source\" > /var/setuid-wrappers/fusermount.real\nchmod 0000 /var/setuid-wrappers/fusermount # to prevent races\nchown root.root /var/setuid-wrappers/fusermount\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/fusermount\nsource=$(PATH=$SETUID_PATH type -tP wodim)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/wodim\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/wodim\necho -n \"$source\" > /var/setuid-wrappers/wodim.real\nchmod 0000 /var/setuid-wrappers/wodim # to prevent races\nchown root.root /var/setuid-wrappers/wodim\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/wodim\nsource=$(PATH=$SETUID_PATH type -tP cdrdao)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/cdrdao\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/cdrdao\necho -n \"$source\" > /var/setuid-wrappers/cdrdao.real\nchmod 0000 /var/setuid-wrappers/cdrdao # to prevent races\nchown root.root /var/setuid-wrappers/cdrdao\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/cdrdao\nsource=$(PATH=$SETUID_PATH type -tP growisofs)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/growisofs\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/growisofs\necho -n \"$source\" > /var/setuid-wrappers/growisofs.real\nchmod 0000 /var/setuid-wrappers/growisofs # to prevent races\nchown root.root /var/setuid-wrappers/growisofs\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/growisofs\nsource=$(PATH=$SETUID_PATH type -tP pkexec)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/pkexec\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/pkexec\necho -n \"$source\" > /var/setuid-wrappers/pkexec.real\nchmod 0000 /var/setuid-wrappers/pkexec # to prevent races\nchown root.root /var/setuid-wrappers/pkexec\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/pkexec\nsource=$(PATH=$SETUID_PATH type -tP passwd)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/passwd\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/passwd\necho -n \"$source\" > /var/setuid-wrappers/passwd.real\nchmod 0000 /var/setuid-wrappers/passwd # to prevent races\nchown root.root /var/setuid-wrappers/passwd\nchmod \ | |
"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/passwd\nsource=$(PATH=$SETUID_PATH type -tP chfn)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/chfn\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/chfn\necho -n \"$source\" > /var/setuid-wrappers/chfn.real\nchmod 0000 /var/setuid-wrappers/chfn # to prevent races\nchown root.root /var/setuid-wrappers/chfn\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/chfn\nsource=$(PATH=$SETUID_PATH type -tP su)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/su\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/su\necho -n \"$source\" > /var/setuid-wrappers/su.real\nchmod 0000 /var/setuid-wrappers/su # to prevent races\nchown root.root /var/setuid-wrappers/su\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/su\nsource=$(PATH=$SETUID_PATH type -tP newgrp)\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/newgrp\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/newgrp\necho -n \"$source\" > /var/setuid-wrappers/newgrp.real\nchmod 0000 /var/setuid-wrappers/newgrp # to prevent races\nchown root.root /var/setuid-wrappers/newgrp\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/newgrp\nsource=/nix/store/v7f1nilh7dk5j3w8fdz9d0ddvmm4z08s-kde-workspace-4.11.6/lib/kde4/libexec/kcheckpass\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/kcheckpass\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/kcheckpass\necho -n \"$source\" > /var/setuid-wrappers/kcheckpass.real\nchmod 0000 /var/setuid-wrappers/kcheckpass # to prevent races\nchown root.root /var/setuid-wrappers/kcheckpass\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/kcheckpass\nsource=/nix/store/xf7mcagd3asaygvpil7085604ih8wsb3-dbus-tools-1.8.0/libexec/dbus-daemon-launch-helper\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/dbus-daemon-launch-helper\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/dbus-daemon-launch-helper\necho -n \"$source\" > /var/setuid-wrappers/dbus-daemon-launch-helper.real\nchmod 0000 /var/setuid-wrappers/dbus-daemon-launch-helper # to prevent races\nchown root.messagebus /var/setuid-wrappers/dbus-daemon-launch-helper\nchmod \"u+s,g-s,u+rx,g+rx,o-rx\" /var/setuid-wrappers/dbus-daemon-launch-helper\nsource=/nix/store/h5jb7fxnls2nzrhiv1y9q7h8h5kpqyzp-polkit-0.112/lib/polkit-1/polkit-agent-helper-1\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/polkit-agent-helper-1\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/polkit-agent-helper-1\necho -n \"$source\" > /var/setuid-wrappers/polkit-agent-helper-1.real\nchmod 0000 /var/setuid-wrappers/polkit-agent-helper-1 # to prevent races\nchown root.root /var/setuid-wrappers/polkit-agent-helper-1\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/polkit-agent-helper-1\nsource=/nix/store/nx0vgkapsy94dsqy8qy2jlcza3mrra6a-linux-pam-1.1.8/sbin/unix_chkpwd.orig\nif test -z \"$source\"; then\n # If we can't find the program, fall back to the\n # system profile.\n source=/nix/var/nix/profiles/default/bin/unix_chkpwd\nfi\n\ncp /nix/store/xa92hqcqxz0f7ndypgp2imh7zhjnj2q8-setuid-wrapper/bin/setuid-wrapper /var/setuid-wrappers/unix_chkpwd\necho -n \"$source\" > /var/setuid-wrappers/unix_chkpwd. | |
real\nchmod 0000 /var/setuid-wrappers/unix_chkpwd # to prevent races\nchown root.nogroup /var/setuid-wrappers/unix_chkpwd\nchmod \"u+s,g-s,u+rx,g+x,o+x\" /var/setuid-wrappers/unix_chkpwd\n\n\n\n#### Activation script snippet setup-opengl:\nln -sfn /nix/store/pprnpxqx1h5520rxay1mgwwhszyrvg5s-mesa-drivers+txc-10.0.5 /run/opengl-driver\nrm -f /run/opengl-driver-32\n\n\n\n#### Activation script snippet systemd:\nmkdir -m 0755 -p /var/lib/udev\nmkdir -p /var/log/journal\nchmod 0755 /var/log/journal\n\n# Make all journals readable to users in the wheel and adm\n# groups, in addition to those in the systemd-journal group.\n# Users can always read their own journals.\n/nix/store/1flsshqg61dhbfrylbix8m0riaymr6si-acl-2.2.52/bin/setfacl -nm g:wheel:rx,d:g:wheel:rx,g:adm:rx,d:g:adm:rx /var/log/journal\n\n\n#### Activation script snippet tmpfs:\n/nix/store/0syx0na4m3nah8m0ks48m5rs485r60pb-util-linux-2.24.1/bin/mount -o \"remount,size=5%\" none /dev\n/nix/store/0syx0na4m3nah8m0ks48m5rs485r60pb-util-linux-2.24.1/bin/mount -o \"remount,size=50%\" none /dev/shm\n/nix/store/0syx0na4m3nah8m0ks48m5rs485r60pb-util-linux-2.24.1/bin/mount -o \"remount,size=25%\" none /run\n\n\n#### Activation script snippet udevd:\necho \"\" > /proc/sys/kernel/hotplug\n\n# Regenerate the hardware database /var/lib/udev/hwdb.bin\n# whenever systemd changes.\nif [ ! -e /var/lib/udev/prev-systemd -o \"$(readlink /var/lib/udev/prev-systemd)\" != /nix/store/sk3017fxx2vhj69saizk5634y3w6hqhn-systemd-212 ]; then\n echo \"regenerating udev hardware database...\"\n /nix/store/sk3017fxx2vhj69saizk5634y3w6hqhn-systemd-212/bin/udevadm hwdb --update && ln -sfn /nix/store/sk3017fxx2vhj69saizk5634y3w6hqhn-systemd-212 /var/lib/udev/prev-systemd\nfi\n\n\n#### Activation script snippet udisks2:\nmkdir -m 0755 -p /var/lib/udisks2\n\n\n#### Activation script snippet upower:\nmkdir -m 0755 -p /var/lib/upower\n\n\n#### Activation script snippet usrbinenv:\nmkdir -m 0755 -p /usr/bin\nln -sfn /nix/store/xdswdgz11w9lm9n9bzb6spl7dj45s2x2-coreutils-8.21/bin/env /usr/bin/.env.tmp\nmv /usr/bin/.env.tmp /usr/bin/env # atomically replace /usr/bin/env\n\n\n#### Activation script snippet var:\n# Various log/runtime directories.\n\ntouch /var/run/utmp # must exist\nchgrp 29 /var/run/utmp\nchmod 664 /var/run/utmp\n\nmkdir -m 0755 -p /var/run/nix/current-load # for distributed builds\nmkdir -m 0700 -p /var/run/nix/remote-stores\n\nmkdir -m 0755 -p /var/log\n\ntouch /var/log/wtmp /var/log/lastlog # must exist\nchmod 644 /var/log/wtmp /var/log/lastlog\n\nmkdir -m 1777 -p /var/tmp\n\n# Empty, read-only home directory of many system accounts.\nmkdir -m 0555 -p /var/empty\n\n\n\n# Make this configuration the current configuration.\n# The readlink is there to ensure that when $systemConfig = /system\n# (which is a symlink to the store), /run/current-system is still\n# used as a garbage collection root.\nln -sfn \"$(readlink -f \"$systemConfig\")\" /run/current-system\n\n# Prevent the current configuration from being garbage-collected.\nln -sfn /run/current-system /nix/var/nix/gcroots/current-system\n") | |
,("buildCommand" | |
,"mkdir $out\n\n# Containers don't have their own kernel or initrd. They boot\n# directly into stage 2.\nif [ ! -f /nix/store/nqap670ba20izgf9db7glyd3pqbza0s3-linux-3.12.23/bzImage ]; then\n echo \"The bootloader cannot find the proper kernel image.\"\n echo \"(Expecting /nix/store/nqap670ba20izgf9db7glyd3pqbza0s3-linux-3.12.23/bzImage)\"\n false\nfi\n\nln -s /nix/store/nqap670ba20izgf9db7glyd3pqbza0s3-linux-3.12.23/bzImage $out/kernel\nln -s /nix/store/4gxdlmzgr0x8g3pjsvdgp40a9x5gkm4i-kernel-modules $out/kernel-modules\n\necho -n \"$kernelParams\" > $out/kernel-params\n\nln -s /nix/store/mrlpk0cw6h6xw339dn8im30dji02bxa5-initrd/initrd $out/initrd\n\nln -s /nix/store/yrfd2sn1jivk7jijxhwr1bhrmkqghwll-firmware $out/firmware\n\n\necho \"$activationScript\" > $out/activate\nsubstituteInPlace $out/activate --subst-var out\nchmod u+x $out/activate\nunset activationScript\n\ncp /nix/store/yqp7jx4wkgpqd03pwmdqifr5cpic52x7-stage-2-init.sh $out/init\nsubstituteInPlace $out/init --subst-var-by systemConfig $out\n\nln -s /nix/store/bv4xyipshdk82bcy8xpr9zjbmdks139i-etc/etc $out/etc\nln -s /nix/store/ml1yp50kz8qasqpq9d14gzfqaas32bx8-system-path $out/sw\nln -s \"$systemd\" $out/systemd\n\necho -n \"$configurationName\" > $out/configuration-name\necho -n \"systemd 2\" > $out/init-interface-version\necho -n \"$nixosVersion\" > $out/nixos-version\necho -n \"$system\" > $out/system\n\nmkdir $out/fine-tune\nchildCount=0\nfor i in $children; do\n childCount=$(( childCount + 1 ))\n ln -s $i $out/fine-tune/child-$childCount\ndone\n\nmkdir $out/bin\nsubstituteAll /nix/store/ayb48cf2mgkyz1558c6k9rw07h59zmna-switch-to-configuration.pl $out/bin/switch-to-configuration\nchmod +x $out/bin/switch-to-configuration\n\n\n") | |
,("buildInputs" ,"") | |
,("builder" | |
,"/nix/store/p0vd3ydvxplbpjffkpblwj5dahcmp9ri-bash-4.2-p45/bin/bash") | |
,("children" ,"") | |
,("configurationName" ,"") | |
,("coreutils" | |
,"/nix/store/xdswdgz11w9lm9n9bzb6spl7dj45s2x2-coreutils-8.21") | |
,("installBootLoader" | |
,"/nix/store/6ly4sp536kw3baabvxjxiaa2s1kirzfm-gummiboot-builder.py") | |
,("kernelParams" ,"loglevel=4") | |
,("name" ,"nixos-14.04.350.a8f6601") | |
,("nativeBuildInputs" ,"") | |
,("nixosVersion" ,"14.04.350.a8f6601") | |
,("out" | |
,"/nix/store/m821yarrwal6g1yjf64awc3ahnbg62dp-nixos-14.04.350.a8f6601") | |
,("perl" | |
,"/nix/store/l4sd8xf2q3x5xk5z8ji9dk3hxpb9v8sa-perl-5.16.3/bin/perl -I/nix/store/d63pjxj7pjx3f6w02qw0z25pfvqqybzx-perl-File-Slurp-9999.19/lib/perl5/site_perl") | |
,("preferLocalBuild" ,"1") | |
,("propagatedBuildInputs" ,"") | |
,("propagatedNativeBuildInputs" ,"") | |
,("stdenv" | |
,"/nix/store/rq16hrf7gy426a6lcnf6pa9746sxnbgc-stdenv") | |
,("system" ,"x86_64-linux") | |
,("systemd" | |
,"/nix/store/sk3017fxx2vhj69saizk5634y3w6hqhn-systemd-212") | |
,("userHook" ,"") | |
,("utillinux" | |
,"/nix/store/0syx0na4m3nah8m0ks48m5rs485r60pb-util-linux-2.24.1"))) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment