Skip to content

Instantly share code, notes, and snippets.

@abathur
Created January 15, 2021 19:17
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save abathur/c4067adf634645ca76fd5a28b943b1b6 to your computer and use it in GitHub Desktop.
Save abathur/c4067adf634645ca76fd5a28b943b1b6 to your computer and use it in GitHub Desktop.
nixos-rebuild
$ resholve --path '/nix/store/23a2sqwng3vd8ri14q4v71nqbf4xxv3f-man-db-2.9.3/bin:/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin:/nix/store/vvc7cyj75yvvv2jiccg503lfp1f9dhr1-openssh-8.4p1/bin:/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin:/nix/store/hcl24glm0i9rzva0f96r4yagmj2n2w1k-jq-1.6-bin/bin:libudev/systemctl:/nix/store/2pbrv1rcin29rmz1yn0dvlmx5rx6d5sl-gnugrep-3.6/bin:/nix/store/ldfh4frkl0hzak7z2w3238c9vkwvbxif-gnused-4.8/bin' --interpreter 'none' --fake 'external:systemctl' --keep '$maybeSudo exec:$p exec:EDITOR $SHELL' nixos/modules/installer/tools/nixos-rebuild.sh
Rewrote '/Users/abathur/work/nixpkgs/nixos/modules/installer/tools/nixos-rebuild.sh' to '/Users/abathur/work/nixpkgs/nixos/modules/installer/tools/nixos-rebuild.sh.resolved'
#! @runtimeShell@
if [ -x "@runtimeShell@" ]; then export SHELL="@runtimeShell@"; fi;
set -e
set -o pipefail
export PATH=@path@:$PATH
showSyntax() {
exec /nix/store/23a2sqwng3vd8ri14q4v71nqbf4xxv3f-man-db-2.9.3/bin/man nixos-rebuild
exit 1
}
# Parse the command line.
origArgs=("$@")
extraBuildFlags=()
lockFlags=()
flakeFlags=()
action=
buildNix=1
fast=
rollback=
upgrade=
upgrade_all=
repair=
profile=/nix/var/nix/profiles/system
buildHost=
targetHost=
maybeSudo=()
while [ "$#" -gt 0 ]; do
i="$1"; shift 1
case "$i" in
--help)
showSyntax
;;
switch|boot|test|build|edit|dry-build|dry-run|dry-activate|build-vm|build-vm-with-bootloader)
if [ "$i" = dry-run ]; then i=dry-build; fi
action="$i"
;;
--install-grub)
echo "$0: --install-grub deprecated, use --install-bootloader instead" >&2
export NIXOS_INSTALL_BOOTLOADER=1
;;
--install-bootloader)
export NIXOS_INSTALL_BOOTLOADER=1
;;
--no-build-nix)
buildNix=
;;
--rollback)
rollback=1
;;
--upgrade)
upgrade=1
;;
--upgrade-all)
upgrade=1
upgrade_all=1
;;
--repair)
repair=1
extraBuildFlags+=("$i")
;;
--max-jobs|-j|--cores|-I|--builders)
j="$1"; shift 1
extraBuildFlags+=("$i" "$j")
;;
--show-trace|--keep-failed|-K|--keep-going|-k|--verbose|-v|-vv|-vvv|-vvvv|-vvvvv|--fallback|--repair|--no-build-output|-Q|-j*|-L|--refresh|--no-net|--impure)
extraBuildFlags+=("$i")
;;
--option)
j="$1"; shift 1
k="$1"; shift 1
extraBuildFlags+=("$i" "$j" "$k")
;;
--fast)
buildNix=
fast=1
extraBuildFlags+=(--show-trace)
;;
--profile-name|-p)
if [ -z "$1" ]; then
echo "$0: ‘--profile-name’ requires an argument"
exit 1
fi
if [ "$1" != system ]; then
profile="/nix/var/nix/profiles/system-profiles/$1"
/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/mkdir -p -m 0755 "$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/dirname "$profile")"
fi
shift 1
;;
--build-host|h)
buildHost="$1"
shift 1
;;
--target-host|t)
targetHost="$1"
shift 1
;;
--use-remote-sudo)
maybeSudo=(sudo --)
;;
--flake)
flake="$1"
flakeFlags=(--experimental-features 'nix-command flakes')
shift 1
;;
--recreate-lock-file|--no-update-lock-file|--no-write-lock-file|--no-registries|--commit-lock-file)
lockFlags+=("$i")
;;
--update-input)
j="$1"; shift 1
lockFlags+=("$i" "$j")
;;
--override-input)
j="$1"; shift 1
k="$1"; shift 1
lockFlags+=("$i" "$j" "$k")
;;
*)
echo "$0: unknown option \`$i'"
exit 1
;;
esac
done
if [ -n "$SUDO_USER" ]; then
maybeSudo=(sudo --)
fi
if [ -z "$buildHost" -a -n "$targetHost" ]; then
buildHost="$targetHost"
fi
if [ "$targetHost" = localhost ]; then
targetHost=
fi
if [ "$buildHost" = localhost ]; then
buildHost=
fi
buildHostCmd() {
if [ -z "$buildHost" ]; then
"$@"
elif [ -n "$remoteNix" ]; then
/nix/store/vvc7cyj75yvvv2jiccg503lfp1f9dhr1-openssh-8.4p1/bin/ssh $SSHOPTS "$buildHost" env PATH="$remoteNix:$PATH" "${maybeSudo[@]}" "$@"
else
/nix/store/vvc7cyj75yvvv2jiccg503lfp1f9dhr1-openssh-8.4p1/bin/ssh $SSHOPTS "$buildHost" "${maybeSudo[@]}" "$@"
fi
}
targetHostCmd() {
if [ -z "$targetHost" ]; then
"${maybeSudo[@]}" "$@"
else
/nix/store/vvc7cyj75yvvv2jiccg503lfp1f9dhr1-openssh-8.4p1/bin/ssh $SSHOPTS "$targetHost" "${maybeSudo[@]}" "$@"
fi
}
copyToTarget() {
if ! [ "$targetHost" = "$buildHost" ]; then
if [ -z "$targetHost" ]; then
NIX_SSHOPTS=$SSHOPTS /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-copy-closure --from "$buildHost" "$1"
elif [ -z "$buildHost" ]; then
NIX_SSHOPTS=$SSHOPTS /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-copy-closure --to "$targetHost" "$1"
else
buildHostCmd nix-copy-closure --to "$targetHost" "$1"
fi
fi
}
nixBuild() {
if [ -z "$buildHost" ]; then
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-build "$@"
else
local instArgs=()
local buildArgs=()
while [ "$#" -gt 0 ]; do
local i="$1"; shift 1
case "$i" in
-o)
local out="$1"; shift 1
buildArgs+=("--add-root" "$out" "--indirect")
;;
-A)
local j="$1"; shift 1
instArgs+=("$i" "$j")
;;
-I) # We don't want this in buildArgs
shift 1
;;
--no-out-link) # We don't want this in buildArgs
;;
"<"*) # nix paths
instArgs+=("$i")
;;
*)
buildArgs+=("$i")
;;
esac
done
local drv="$(/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-instantiate "${instArgs[@]}" "${extraBuildFlags[@]}")"
if [ -a "$drv" ]; then
NIX_SSHOPTS=$SSHOPTS /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-copy-closure --to "$buildHost" "$drv"
buildHostCmd nix-store -r "$drv" "${buildArgs[@]}"
else
echo "nix-instantiate failed"
exit 1
fi
fi
}
if [ -z "$action" ]; then showSyntax; fi
# Only run shell scripts from the Nixpkgs tree if the action is
# "switch", "boot", or "test". With other actions (such as "build"),
# the user may reasonably expect that no code from the Nixpkgs tree is
# executed, so it's safe to run nixos-rebuild against a potentially
# untrusted tree.
canRun=
if [ "$action" = switch -o "$action" = boot -o "$action" = test ]; then
canRun=1
fi
# If ‘--upgrade’ or `--upgrade-all` is given,
# run ‘nix-channel --update nixos’.
if [[ -n $upgrade && -z $_NIXOS_REBUILD_REEXEC && -z $flake ]]; then
# If --upgrade-all is passed, or there are other channels that
# contain a file called ".update-on-nixos-rebuild", update them as
# well. Also upgrade the nixos channel.
for channelpath in /nix/var/nix/profiles/per-user/root/channels/*; do
channel_name=$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/basename "$channelpath")
if [[ "$channel_name" == "nixos" ]]; then
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-channel --update "$channel_name"
elif [ -e "$channelpath/.update-on-nixos-rebuild" ]; then
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-channel --update "$channel_name"
elif [[ -n $upgrade_all ]] ; then
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-channel --update "$channel_name"
fi
done
fi
# Make sure that we use the Nix package we depend on, not something
# else from the PATH for nix-{env,instantiate,build}. This is
# important, because NixOS defaults the architecture of the rebuilt
# system to the architecture of the nix-* binaries used. So if on an
# amd64 system the user has an i686 Nix package in her PATH, then we
# would silently downgrade the whole system to be i686 NixOS on the
# next reboot.
if [ -z "$_NIXOS_REBUILD_REEXEC" ]; then
export PATH=@nix@/bin:$PATH
fi
# Use /etc/nixos/flake.nix if it exists. It can be a symlink to the
# actual flake.
if [[ -z $flake && -e /etc/nixos/flake.nix ]]; then
flake="$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/dirname "$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/readlink -f /etc/nixos/flake.nix)")"
fi
# Re-execute nixos-rebuild from the Nixpkgs tree.
# FIXME: get nixos-rebuild from $flake.
if [[ -z $_NIXOS_REBUILD_REEXEC && -n $canRun && -z $fast && -z $flake ]]; then
if p=$(/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-build --no-out-link --expr 'with import <nixpkgs/nixos> {}; config.system.build.nixos-rebuild' "${extraBuildFlags[@]}"); then
export _NIXOS_REBUILD_REEXEC=1
exec $p/bin/nixos-rebuild "${origArgs[@]}"
exit 1
fi
fi
# For convenience, use the hostname as the default configuration to
# build from the flake.
if [[ -n $flake ]]; then
if [[ $flake =~ ^(.*)\#([^\#\"]*)$ ]]; then
flake="${BASH_REMATCH[1]}"
flakeAttr="${BASH_REMATCH[2]}"
fi
if [[ -z $flakeAttr ]]; then
read -r hostname < /proc/sys/kernel/hostname
if [[ -z $hostname ]]; then
hostname=default
fi
flakeAttr="nixosConfigurations.\"$hostname\""
else
flakeAttr="nixosConfigurations.\"$flakeAttr\""
fi
fi
# Resolve the flake.
if [[ -n $flake ]]; then
flake=$(/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix "${flakeFlags[@]}" flake info --json "${extraBuildFlags[@]}" "${lockFlags[@]}" -- "$flake" | /nix/store/hcl24glm0i9rzva0f96r4yagmj2n2w1k-jq-1.6-bin/bin/jq -r .url)
fi
# Find configuration.nix and open editor instead of building.
if [ "$action" = edit ]; then
if [[ -z $flake ]]; then
NIXOS_CONFIG=${NIXOS_CONFIG:-$(/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-instantiate --find-file nixos-config)}
if [[ -d $NIXOS_CONFIG ]]; then
NIXOS_CONFIG=$NIXOS_CONFIG/default.nix
fi
exec ${EDITOR:-nano} "$NIXOS_CONFIG"
else
exec /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix "${flakeFlags[@]}" edit "${lockFlags[@]}" -- "$flake#$flakeAttr"
fi
exit 1
fi
tmpDir=$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/mktemp -t -d nixos-rebuild.XXXXXX)
SSHOPTS="$NIX_SSHOPTS -o ControlMaster=auto -o ControlPath=$tmpDir/ssh-%n -o ControlPersist=60"
cleanup() {
for ctrl in "$tmpDir"/ssh-*; do
/nix/store/vvc7cyj75yvvv2jiccg503lfp1f9dhr1-openssh-8.4p1/bin/ssh -o ControlPath="$ctrl" -O exit dummyhost 2>/dev/null || true
done
/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/rm -rf "$tmpDir"
}
trap cleanup EXIT
# If the Nix daemon is running, then use it. This allows us to use
# the latest Nix from Nixpkgs (below) for expression evaluation, while
# still using the old Nix (via the daemon) for actual store access.
# This matters if the new Nix in Nixpkgs has a schema change. It
# would upgrade the schema, which should only happen once we actually
# switch to the new configuration.
# If --repair is given, don't try to use the Nix daemon, because the
# flag can only be used directly.
if [ -z "$repair" ] && systemctl show nix-daemon.socket nix-daemon.service | /nix/store/2pbrv1rcin29rmz1yn0dvlmx5rx6d5sl-gnugrep-3.6/bin/grep -q ActiveState=active; then
export NIX_REMOTE=${NIX_REMOTE-daemon}
fi
# First build Nix, since NixOS may require a newer version than the
# current one.
if [ -n "$rollback" -o "$action" = dry-build ]; then
buildNix=
fi
nixSystem() {
machine="$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/uname -m)"
if [[ "$machine" =~ i.86 ]]; then
machine=i686
fi
echo $machine-linux
}
prebuiltNix() {
machine="$1"
if [ "$machine" = x86_64 ]; then
echo @nix_x86_64_linux@
elif [[ "$machine" =~ i.86 ]]; then
echo @nix_i686_linux@
else
echo "$0: unsupported platform"
exit 1
fi
}
remotePATH=
if [[ -n $buildNix && -z $flake ]]; then
echo "building Nix..." >&2
nixDrv=
if ! nixDrv="$(/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-instantiate '<nixpkgs/nixos>' --add-root $tmpDir/nix.drv --indirect -A config.nix.package.out "${extraBuildFlags[@]}")"; then
if ! nixDrv="$(/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-instantiate '<nixpkgs>' --add-root $tmpDir/nix.drv --indirect -A nix "${extraBuildFlags[@]}")"; then
if ! nixStorePath="$(/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-instantiate --eval '<nixpkgs/nixos/modules/installer/tools/nix-fallback-paths.nix>' -A $(nixSystem) | /nix/store/ldfh4frkl0hzak7z2w3238c9vkwvbxif-gnused-4.8/bin/sed -e 's/^"//' -e 's/"$//')"; then
nixStorePath="$(prebuiltNix "$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/uname -m)")"
fi
if ! /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-store -r $nixStorePath --add-root $tmpDir/nix --indirect \
--option extra-binary-caches https://cache.nixos.org/; then
echo "warning: don't know how to get latest Nix" >&2
fi
# Older version of nix-store -r don't support --add-root.
[ -e $tmpDir/nix ] || /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/ln -sf $nixStorePath $tmpDir/nix
if [ -n "$buildHost" ]; then
remoteNixStorePath="$(prebuiltNix "$(buildHostCmd uname -m)")"
remoteNix="$remoteNixStorePath/bin"
if ! buildHostCmd nix-store -r $remoteNixStorePath \
--option extra-binary-caches https://cache.nixos.org/ >/dev/null; then
remoteNix=
echo "warning: don't know how to get latest Nix" >&2
fi
fi
fi
fi
if [ -a "$nixDrv" ]; then
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-store -r "$nixDrv"'!'"out" --add-root $tmpDir/nix --indirect >/dev/null
if [ -n "$buildHost" ]; then
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-copy-closure --to "$buildHost" "$nixDrv"
# The nix build produces multiple outputs, we add them all to the remote path
for p in $(buildHostCmd nix-store -r "$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/readlink "$nixDrv")" "${buildArgs[@]}"); do
remoteNix="$remoteNix${remoteNix:+:}$p/bin"
done
fi
fi
PATH="$tmpDir/nix/bin:$PATH"
fi
# Update the version suffix if we're building from Git (so that
# nixos-version shows something useful).
if [[ -n $canRun && -z $flake ]]; then
if nixpkgs=$(/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-instantiate --find-file nixpkgs "${extraBuildFlags[@]}"); then
suffix=$($SHELL $nixpkgs/nixos/modules/installer/tools/get-version-suffix "${extraBuildFlags[@]}" || true)
if [ -n "$suffix" ]; then
echo -n "$suffix" > "$nixpkgs/.version-suffix" || true
fi
fi
fi
if [ "$action" = dry-build ]; then
extraBuildFlags+=(--dry-run)
fi
# Either upgrade the configuration in the system profile (for "switch"
# or "boot"), or just build it and create a symlink "result" in the
# current directory (for "build" and "test").
if [ -z "$rollback" ]; then
echo "building the system configuration..." >&2
if [ "$action" = switch -o "$action" = boot ]; then
if [[ -z $flake ]]; then
pathToConfig="$(nixBuild '<nixpkgs/nixos>' --no-out-link -A system "${extraBuildFlags[@]}")"
else
outLink=$tmpDir/result
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix "${flakeFlags[@]}" build "$flake#$flakeAttr.config.system.build.toplevel" \
"${extraBuildFlags[@]}" "${lockFlags[@]}" --out-link $outLink
pathToConfig="$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/readlink -f $outLink)"
fi
copyToTarget "$pathToConfig"
targetHostCmd nix-env -p "$profile" --set "$pathToConfig"
elif [ "$action" = test -o "$action" = build -o "$action" = dry-build -o "$action" = dry-activate ]; then
if [[ -z $flake ]]; then
pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A system -k "${extraBuildFlags[@]}")"
else
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix "${flakeFlags[@]}" build "$flake#$flakeAttr.config.system.build.toplevel" "${extraBuildFlags[@]}" "${lockFlags[@]}"
pathToConfig="$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/readlink -f ./result)"
fi
elif [ "$action" = build-vm ]; then
if [[ -z $flake ]]; then
pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A vm -k "${extraBuildFlags[@]}")"
else
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix "${flakeFlags[@]}" build "$flake#$flakeAttr.config.system.build.vm" \
"${extraBuildFlags[@]}" "${lockFlags[@]}"
pathToConfig="$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/readlink -f ./result)"
fi
elif [ "$action" = build-vm-with-bootloader ]; then
if [[ -z $flake ]]; then
pathToConfig="$(nixBuild '<nixpkgs/nixos>' -A vmWithBootLoader -k "${extraBuildFlags[@]}")"
else
/nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix "${flakeFlags[@]}" build "$flake#$flakeAttr.config.system.build.vmWithBootLoader" \
"${extraBuildFlags[@]}" "${lockFlags[@]}"
pathToConfig="$(/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/readlink -f ./result)"
fi
else
showSyntax
fi
# Copy build to target host if we haven't already done it
if ! [ "$action" = switch -o "$action" = boot ]; then
copyToTarget "$pathToConfig"
fi
else # [ -n "$rollback" ]
if [ "$action" = switch -o "$action" = boot ]; then
targetHostCmd nix-env --rollback -p "$profile"
pathToConfig="$profile"
elif [ "$action" = test -o "$action" = build ]; then
systemNumber=$(
targetHostCmd nix-env -p "$profile" --list-generations |
/nix/store/ldfh4frkl0hzak7z2w3238c9vkwvbxif-gnused-4.8/bin/sed -n '/current/ {g; p;}; s/ *\([0-9]*\).*/\1/; h'
)
pathToConfig="$profile"-${systemNumber}-link
if [ -z "$targetHost" ]; then
/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/ln -sT "$pathToConfig" ./result
fi
else
showSyntax
fi
fi
# If we're not just building, then make the new configuration the boot
# default and/or activate it now.
if [ "$action" = switch -o "$action" = boot -o "$action" = test -o "$action" = dry-activate ]; then
if ! targetHostCmd $pathToConfig/bin/switch-to-configuration "$action"; then
echo "warning: error(s) occurred while switching to the new configuration" >&2
exit 1
fi
fi
if [ "$action" = build-vm ]; then
/nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/cat >&2 <<EOF
Done. The virtual machine can be started by running $(echo $pathToConfig/bin/run-*-vm)
EOF
fi
### resholve directives (auto-generated) ## format_version: 2
# resholve: fake external:systemctl
# resholve: keep $SHELL
# resholve: keep $maybeSudo
# resholve: keep /nix/store/23a2sqwng3vd8ri14q4v71nqbf4xxv3f-man-db-2.9.3/bin/man
# resholve: keep /nix/store/2pbrv1rcin29rmz1yn0dvlmx5rx6d5sl-gnugrep-3.6/bin/grep
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/basename
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/cat
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/dirname
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/ln
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/mkdir
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/mktemp
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/readlink
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/rm
# resholve: keep /nix/store/5m4875pw1zcd588n7a6j88vwsilvnm7j-coreutils-8.32/bin/uname
# resholve: keep /nix/store/hcl24glm0i9rzva0f96r4yagmj2n2w1k-jq-1.6-bin/bin/jq
# resholve: keep /nix/store/ldfh4frkl0hzak7z2w3238c9vkwvbxif-gnused-4.8/bin/sed
# resholve: keep /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix
# resholve: keep /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-build
# resholve: keep /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-channel
# resholve: keep /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-copy-closure
# resholve: keep /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-instantiate
# resholve: keep /nix/store/px8xg891b6jc7gz5klhixflc2si3d7mn-nix-2.4pre20201201_5a6ddb3/bin/nix-store
# resholve: keep /nix/store/vvc7cyj75yvvv2jiccg503lfp1f9dhr1-openssh-8.4p1/bin/ssh
# resholve: keep exec:$p
# resholve: keep exec:EDITOR
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment