Created
June 23, 2020 01:27
-
-
Save craigem/337f996d1594ee09f9f79096e60e7d0e to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"/nix/store/xcy0na1mrvj83s83hv0942kpm84c2kd6-nixos-system-dionach-20.03post-git.drv": { | |
"outputs": { | |
"out": { | |
"path": "/nix/store/kzh21i6ma3xbyz0qhji65l43k6wb962a-nixos-system-dionach-20.03post-git" | |
} | |
}, | |
"inputSrcs": [ | |
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh", | |
"/nix/store/dmgl9vsr6gxf7gpxzi0lrkxbvs23125s-2hn0byrnz7dqkzx1rcgd7jhcwwz6xa33-source", | |
"/nix/store/iy5nsd4gwpd87brljvls0ib8r9mdkvqb-switch-to-configuration.pl", | |
"/nix/store/vn1xs9s2akf79y1pbya2qldydbf2b22m-setup-etc.pl", | |
"/nix/store/w5s7s1nnzsmzdqh06abysffrj2m0nrwf-update-users-groups.pl" | |
], | |
"inputDrvs": { | |
"/nix/store/0nlgif2dwbfs83yh8dlgjvxfsidzjvwm-perl5.30.1-File-Slurp-9999.29.drv": [ | |
"out" | |
], | |
"/nix/store/0xp40631x77h73p67a11aydyqib1z92h-glibc-locales-2.30.drv": [ | |
"out" | |
], | |
"/nix/store/12k2qw6qdm0lh2zvg2c08jjryfqz7gnw-perl5.30.1-JSON-4.02.drv": [ | |
"out" | |
], | |
"/nix/store/19swscs0s5p87q8z5r9y8ss1n41fsi19-net-tools-1.60_p20170221182432.drv": [ | |
"out" | |
], | |
"/nix/store/1kcg0dprfzryn61nqrgf20g43a48df9v-getent-1003.1-2008.drv": [ | |
"out" | |
], | |
"/nix/store/20vwa6qpx8w3ar66x1fmrjlwy86c7b71-bash-4.4-p23.drv": [ | |
"out" | |
], | |
"/nix/store/3nd3zzw89xydsfdp58v2f6ql3xz8aggz-libcap-2.27.drv": [ | |
"out" | |
], | |
"/nix/store/3y8fljsajr1xjbymzl2dm563idnb8bd3-iputils-20190709.drv": [ | |
"out" | |
], | |
"/nix/store/561r6h8i1ans5vk62dlnnhian2v704yf-gnome-shell-3.34.4.drv": [ | |
"out" | |
], | |
"/nix/store/5nb55m0cd6jw89bbbswyki5hgdbchplr-glibc-2.30.drv": [ | |
"bin" | |
], | |
"/nix/store/5yrk2mqbxj5n1hxmkjl67rdvhbjk1lq7-coreutils-8.31.drv": [ | |
"out" | |
], | |
"/nix/store/66r5v1s63cy34r8fihhr9i90rjzv5mbb-fuse-2.9.9.drv": [ | |
"out" | |
], | |
"/nix/store/6h5x2m4ch3b4ijxa12hcvhgpf1a8r03m-linux-pam-1.3.1.drv": [ | |
"out" | |
], | |
"/nix/store/6yf1l2cx54lhyy03hmqn4m8wkrxk4yds-perl5.30.1-XML-Twig-3.52.drv": [ | |
"out" | |
], | |
"/nix/store/7ykg2sihl65w6hb85323qw2jnrymrh5r-dbus-1.12.16.drv": [ | |
"out" | |
], | |
"/nix/store/89a56fd632zjdcksicz8641jfpf4abnw-system-path.drv": [ | |
"out" | |
], | |
"/nix/store/9imdwvgw5qmx1rngqxliz215c738ynqd-perl5.30.1-Net-DBus-1.2.0.drv": [ | |
"out" | |
], | |
"/nix/store/asf00xdxj9yxlnhx2ckrd6yjidb62ljk-linux-5.4.46.drv": [ | |
"out" | |
], | |
"/nix/store/b57n6br70xp57zi2iykfmwb13046bqb8-users-groups.json.drv": [ | |
"out" | |
], | |
"/nix/store/b7y35jqhf1ib2h9n6qilgyy3b1kslphg-firmware.drv": [ | |
"out" | |
], | |
"/nix/store/b8qpi7rwc0f7byn0hqisfa4v0q2r1zwh-append-initrd-secrets.drv": [ | |
"out" | |
], | |
"/nix/store/c0a0mndiv56nwp6nc41zi73zndnqkmcb-sudo-1.8.31.drv": [ | |
"out" | |
], | |
"/nix/store/c70sv1xcsmq5b38ib1bhplkccdvn9rk4-security-wrapper.drv": [ | |
"out" | |
], | |
"/nix/store/dfvm6z7pia0h5v4q3766fyidi7rz2wlw-fuse-3.9.0.drv": [ | |
"out" | |
], | |
"/nix/store/gygn3ydlgk1ixjnrd7f1dmm3wpshlsm5-e2fsprogs-1.45.5.drv": [ | |
"bin" | |
], | |
"/nix/store/hfsj235qc796y9mv4bjacdw1bqii155w-gnome-keyring-3.34.0.drv": [ | |
"out" | |
], | |
"/nix/store/j7z6g8fkvzjmjn2g94lijw3csddhsdi8-stdenv-linux.drv": [ | |
"out" | |
], | |
"/nix/store/jl4rwy9g983m21xlf2y4nd7iwrrc7skg-bash-interactive-4.4-p23.drv": [ | |
"out" | |
], | |
"/nix/store/k6y39d2pxj7m0n6jv6jsnmijgnwmjhsk-etc.drv": [ | |
"out" | |
], | |
"/nix/store/kf5pah39xp8xja9qnv0qxwln6s0iy21f-systemd-243.7.drv": [ | |
"out" | |
], | |
"/nix/store/ky2s1r13qdpmn0s8c6sii2f7dh6d4qsj-util-linux-2.33.2.drv": [ | |
"bin" | |
], | |
"/nix/store/l2s6gqcn1hwk24sn27vp525fqd19k80r-kernel-modules.drv": [ | |
"out" | |
], | |
"/nix/store/lfd112s5jmh7zvc5iv6rixl77w9va0a5-cron-4.1.drv": [ | |
"out" | |
], | |
"/nix/store/min5m7g9vz7qm4i068jlp91yfsqp4l3v-mounts.sh.drv": [ | |
"out" | |
], | |
"/nix/store/nyrgrc4xpsblccbsjlrg8m0lyb162sy4-polkit-0.116.drv": [ | |
"bin", | |
"out" | |
], | |
"/nix/store/q17a1x1cacc2kwfpqy6mlrbx124qvzwm-install-grub.sh.drv": [ | |
"out" | |
], | |
"/nix/store/q809kaj98z734kldackxd4073mflb30b-stage-2-init.sh.drv": [ | |
"out" | |
], | |
"/nix/store/qnnnx3ridki2c6xkdl61327izsa2cjmf-findutils-4.7.0.drv": [ | |
"out" | |
], | |
"/nix/store/r5jhfs6hffqh8mmlf6mjdy4rbvr6n698-perl5.30.1-XML-Parser-2.44.drv": [ | |
"out" | |
], | |
"/nix/store/rdcwccikn608j3m9ld309giza9qrgh6v-kmod-26.drv": [ | |
"out" | |
], | |
"/nix/store/rxx41vmwwwj8pyfx68q7zhpgwrzzkppq-setup-keys.sh.drv": [ | |
"out" | |
], | |
"/nix/store/snys52a547r1ckzmgv050ws7ylpzc8sb-perl-5.30.1.drv": [ | |
"out" | |
], | |
"/nix/store/wdfq54pw5xridnknh6866vlr5pcd4q7h-xkb-validated.drv": [ | |
"out" | |
], | |
"/nix/store/wlbck61fycl45w58ad9kdq2dwc2x3rmr-gnugrep-3.4.drv": [ | |
"out" | |
], | |
"/nix/store/xrmsiym9ml66vi876m8j6lwk9995ddkc-shadow-4.8.drv": [ | |
"out", | |
"su" | |
], | |
"/nix/store/ykryj629shi87sm3ivq274a9r07jdb5g-initrd-linux-5.4.46.drv": [ | |
"out" | |
] | |
}, | |
"platform": "x86_64-linux", | |
"builder": "/nix/store/hrpvwkjz04s9i4nmli843hyw9z4pwhww-bash-4.4-p23/bin/bash", | |
"args": [ | |
"-e", | |
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh" | |
], | |
"env": { | |
"activationScript": "#! /nix/store/hrpvwkjz04s9i4nmli843hyw9z4pwhww-bash-4.4-p23/bin/bash\n\nsystemConfig=@out@\n\nexport PATH=/empty\nfor i in /nix/store/x0jla3hpxrwz76hy9yckg1iyc9hns81k-coreutils-8.31 /nix/store/srmjkp5pq8c055j0lak2hn0ls0fis8yl-gnugrep-3.4 /nix/store/97vambzyvpvrd9wgrrw7i7svi0s8vny5-findutils-4.7.0 /nix/store/c3q0mx9bql126y9bq6wsrqzh44rp0acd-getent-1003.1-2008 /nix/store/0k65d30z9xsixil10yw3bwajbdk4yskv-glibc-2.30-bin /nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8 /nix/store/7xicnmvb03zm45j20afkaaw74kqqzg3y-net-tools-1.60_p20170221182432 /nix/store/y5pz7sk0svmj770glzr5mqivwzm5xhs8-util-linux-2.33.2-bin; do\n PATH=$PATH:$i/bin:$i/sbin\ndone\n\n_status=0\ntrap \"_status=1 _localstatus=\\$?\" ERR\n\n# Ensure a consistent umask.\numask 0022\n\n#### Activation script snippet binfmt:\n_localstatus=0\nmkdir -p -m 0755 /run/binfmt\n\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"binfmt\" \"$_localstatus\"\nfi\n\n#### Activation script snippet stdio:\n_localstatus=0\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"stdio\" \"$_localstatus\"\nfi\n\n#### Activation script snippet binsh:\n_localstatus=0\n# Create the required /bin/sh symlink; otherwise lots of things\n# (notably the system() function) won't work.\nmkdir -m 0755 -p /bin\nln -sfn \"/nix/store/nmgiyxa9fpn42w6xjd1wvzgb1svffn1w-bash-interactive-4.4-p23/bin/sh\" /bin/.sh.tmp\nmv /bin/.sh.tmp /bin/sh # atomically replace /bin/sh\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"binsh\" \"$_localstatus\"\nfi\n\n#### Activation script snippet domain:\n_localstatus=0\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"domain\" \"$_localstatus\"\nfi\n\n#### Activation script snippet users:\n_localstatus=0\ninstall -m 0700 -d /root\ninstall -m 0755 -d /home\n\n/nix/store/bzxvdbmcppw61rvkphsnvs5kbcq7lf5d-perl-5.30.1/bin/perl -w \\\n -I/nix/store/aq3i1sdj8vqwn0w7xn33fhvkm9ym5m3x-perl5.30.1-File-Slurp-9999.29/lib/perl5/site_perl \\\n -I/nix/store/pvymciqaf7sg6llb4w039427nhjvgzsn-perl5.30.1-JSON-4.02/lib/perl5/site_perl \\\n /nix/store/w5s7s1nnzsmzdqh06abysffrj2m0nrwf-update-users-groups.pl /nix/store/clvarff8yhrd9l4j7sybpxwp3qfmy2pl-users-groups.json\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"users\" \"$_localstatus\"\nfi\n\n#### Activation script snippet groups:\n_localstatus=0\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"groups\" \"$_localstatus\"\nfi\n\n#### Activation script snippet etc:\n_localstatus=0\n# Set up the statically computed bits of /etc.\necho \"setting up /etc...\"\n/nix/store/bzxvdbmcppw61rvkphsnvs5kbcq7lf5d-perl-5.30.1/bin/perl -I/nix/store/aq3i1sdj8vqwn0w7xn33fhvkm9ym5m3x-perl5.30.1-File-Slurp-9999.29/lib/perl5/site_perl /nix/store/vn1xs9s2akf79y1pbya2qldydbf2b22m-setup-etc.pl /nix/store/8pn01yay70am9y0yr4m95dib4w0m4hr4-etc/etc\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"etc\" \"$_localstatus\"\nfi\n\n#### Activation script snippet hostname:\n_localstatus=0\nhostname \"dionach\"\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"hostname\" \"$_localstatus\"\nfi\n\n#### Activation script snippet specialfs:\n_localstatus=0\nspecialMount() {\n local device=\"$1\"\n local mountPoint=\"$2\"\n local options=\"$3\"\n local fsType=\"$4\"\n\n if mountpoint -q \"$mountPoint\"; then\n local options=\"remount,$options\"\n else\n mkdir -m 0755 -p \"$mountPoint\"\n fi\n mount -t \"$fsType\" -o \"$options\" \"$device\" \"$mountPoint\"\n}\nsource /nix/store/hb462dgghbm34bs8dgn7hx474nvxa6w4-mounts.sh\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"specialfs\" \"$_localstatus\"\nfi\n\n#### Activation script snippet modprobe:\n_localstatus=0\n# Allow the kernel to find our wrapped modprobe (which searches\n# in the right location in the Nix store for kernel modules).\n# We need this when the kernel (or some module) auto-loads a\n# module.\necho /nix/store/kk0k40xpib168h0h6xkz2mqd7jrjng04-kmod-26/bin/modprobe > /proc/sys/kernel/modprobe\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"modprobe\" \"$_localstatus\"\nfi\n\n#### Activation script snippet nix:\n_localstatus=0\n# Create directories in /nix.\ninstall -m 0755 -d /nix/var/nix/{gcroots,profiles}/per-user\n\n# Subscribe the root user to the NixOS channel by default.\nif [ ! -e \"/root/.nix-channels\" ]; then\n echo \"https://nixos.org/channels/nixos-20.03 nixos\" > \"/root/.nix-channels\"\nfi\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"nix\" \"$_localstatus\"\nfi\n\n#### Activation script snippet nixops-keys:\n_localstatus=0\nsource /nix/store/zkcs8mv0aqrgd37vns82fj1labami07x-setup-keys.sh\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"nixops-keys\" \"$_localstatus\"\nfi\n\n#### Activation script snippet systemd-timesyncd-migration:\n_localstatus=0\n# workaround an issue of systemd-timesyncd not starting due to upstream systemd reverting their dynamic users changes\n# - https://github.com/NixOS/nixpkgs/pull/61321#issuecomment-492423742\n# - https://github.com/systemd/systemd/issues/12131\nif [ -L /var/lib/systemd/timesync ]; then\n rm /var/lib/systemd/timesync\n mv /var/lib/private/systemd/timesync /var/lib/systemd/timesync\nfi\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"systemd-timesyncd-migration\" \"$_localstatus\"\nfi\n\n#### Activation script snippet udevd:\n_localstatus=0\n# The deprecated hotplug uevent helper is not used anymore\nif [ -e /proc/sys/kernel/hotplug ]; then\n echo \"\" > /proc/sys/kernel/hotplug\nfi\n\n# Allow the kernel to find our firmware.\nif [ -e /sys/module/firmware_class/parameters/path ]; then\n echo -n \"/nix/store/izb1n31cwrww97b4dd7ladik5hwixf87-firmware/lib/firmware\" > /sys/module/firmware_class/parameters/path\nfi\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"udevd\" \"$_localstatus\"\nfi\n\n#### Activation script snippet usrbinenv:\n_localstatus=0\nmkdir -m 0755 -p /usr/bin\nln -sfn /nix/store/x0jla3hpxrwz76hy9yckg1iyc9hns81k-coreutils-8.31/bin/env /usr/bin/.env.tmp\nmv /usr/bin/.env.tmp /usr/bin/env # atomically replace /usr/bin/env\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"usrbinenv\" \"$_localstatus\"\nfi\n\n#### Activation script snippet var:\n_localstatus=0\n# Various log/runtime directories.\n\nmkdir -m 1777 -p /var/tmp\n\n# Empty, immutable home directory of many system accounts.\nmkdir -p /var/empty\n# Make sure it's really empty\n/nix/store/cf3nz78q77n8mwm6frfmd44w1jsa5pn7-e2fsprogs-1.45.5-bin/bin/chattr -f -i /var/empty || true\nfind /var/empty -mindepth 1 -delete\nchmod 0555 /var/empty\nchown root:root /var/empty\n/nix/store/cf3nz78q77n8mwm6frfmd44w1jsa5pn7-e2fsprogs-1.45.5-bin/bin/chattr -f +i /var/empty || true\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"var\" \"$_localstatus\"\nfi\n\n#### Activation script snippet wrappers:\n_localstatus=0\n# Look in the system path and in the default profile for\n# programs to be wrapped.\nWRAPPER_PATH=/nix/store/8apaah70y9nqlwl7ypwsx2rmmnxmwz2v-system-path/bin:/nix/store/8apaah70y9nqlwl7ypwsx2rmmnxmwz2v-system-path/sbin\n\n# We want to place the tmpdirs for the wrappers to the parent dir.\nwrapperDir=$(mktemp --directory --tmpdir=\"/run/wrappers\" wrappers.XXXXXXXXXX)\nchmod a+rx $wrapperDir\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/.gnome-shell-wrapped\necho -n \"/nix/store/q48pkm2ybfa8nr3bh9m71cbzzm4ih302-gnome-shell-3.34.4/bin/.gnome-shell-wrapped\" > $wrapperDir/.gnome-shell-wrapped.real\n\n# Prevent races\nchmod 0000 $wrapperDir/.gnome-shell-wrapped\nchown root.root $wrapperDir/.gnome-shell-wrapped\n\n# Set desired capabilities on the file plus cap_setpcap so\n# the wrapper program can elevate the capabilities set on\n# its file into the Ambient set.\n/nix/store/2g4wrlmbk8izmxb1h6l67cx5lvjx68yv-libcap-2.27/bin/setcap \"cap_setpcap,cap_sys_nice=ep\" $wrapperDir/.gnome-shell-wrapped\n\n# Set the executable bit\nchmod u+rx,g+x,o+x $wrapperDir/.gnome-shell-wrapped\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/cpuclock_sysfs.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/modules/sysinfo/linux-gnu-x86_64-0.23.1/cpuclock_sysfs.orig\" > $wrapperDir/cpuclock_sysfs.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/cpuclock_sysfs.orig\nchown root.root $wrapperDir/cpuclock_sysfs.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/cpuclock_sysfs.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/crontab\necho -n \"/nix/store/g6x0mhdirz8qvsiz3z0zfpgzbqiqdy5j-cron-4.1/bin/crontab\" > $wrapperDir/crontab.real\n\n# Prevent races\nchmod 0000 $wrapperDir/crontab\nchown root.root $wrapperDir/crontab\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/crontab\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/dbus-daemon-launch-helper\necho -n \"/nix/store/8lhn08dhv83rqc77b2fl7gqryqkq9mig-dbus-1.12.16/libexec/dbus-daemon-launch-helper\" > $wrapperDir/dbus-daemon-launch-helper.real\n\n# Prevent races\nchmod 0000 $wrapperDir/dbus-daemon-launch-helper\nchown root.messagebus $wrapperDir/dbus-daemon-launch-helper\n\nchmod \"u+s,g-s,u+rx,g+rx,o-rx\" $wrapperDir/dbus-daemon-launch-helper\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/enlightenment_backlight.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/utils/enlightenment_backlight.orig\" > $wrapperDir/enlightenment_backlight.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/enlightenment_backlight.orig\nchown root.root $wrapperDir/enlightenment_backlight.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/enlightenment_backlight.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/enlightenment_ckpasswd.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/utils/enlightenment_ckpasswd.orig\" > $wrapperDir/enlightenment_ckpasswd.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/enlightenment_ckpasswd.orig\nchown root.root $wrapperDir/enlightenment_ckpasswd.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/enlightenment_ckpasswd.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/enlightenment_sys.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/utils/enlightenment_sys.orig\" > $wrapperDir/enlightenment_sys.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/enlightenment_sys.orig\nchown root.root $wrapperDir/enlightenment_sys.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/enlightenment_sys.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/freqset.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/modules/cpufreq/linux-gnu-x86_64-0.23.1/freqset.orig\" > $wrapperDir/freqset.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/freqset.orig\nchown root.root $wrapperDir/freqset.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/freqset.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/fusermount\necho -n \"/nix/store/5fnjrh30z0gsd1lvjr21w7ivcn7a94xd-fuse-2.9.9/bin/fusermount\" > $wrapperDir/fusermount.real\n\n# Prevent races\nchmod 0000 $wrapperDir/fusermount\nchown root.root $wrapperDir/fusermount\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/fusermount\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/fusermount3\necho -n \"/nix/store/7rk8yd1z2zv2247iz73gj3jrf89yg71m-fuse-3.9.0/bin/fusermount3\" > $wrapperDir/fusermount3.real\n\n# Prevent races\nchmod 0000 $wrapperDir/fusermount3\nchown root.root $wrapperDir/fusermount3\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/fusermount3\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/gnome-keyring-daemon\necho -n \"/nix/store/y097gmz6rnv3dj83k4gkpr0178w6am7g-gnome-keyring-3.34.0/bin/gnome-keyring-daemon\" > $wrapperDir/gnome-keyring-daemon.real\n\n# Prevent races\nchmod 0000 $wrapperDir/gnome-keyring-daemon\nchown root.root $wrapperDir/gnome-keyring-daemon\n\n# Set desired capabilities on the file plus cap_setpcap so\n# the wrapper program can elevate the capabilities set on\n# its file into the Ambient set.\n/nix/store/2g4wrlmbk8izmxb1h6l67cx5lvjx68yv-libcap-2.27/bin/setcap \"cap_setpcap,cap_ipc_lock=ep\" $wrapperDir/gnome-keyring-daemon\n\n# Set the executable bit\nchmod u+rx,g+x,o+x $wrapperDir/gnome-keyring-daemon\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/newgidmap\necho -n \"/nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8/bin/newgidmap\" > $wrapperDir/newgidmap.real\n\n# Prevent races\nchmod 0000 $wrapperDir/newgidmap\nchown root.root $wrapperDir/newgidmap\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/newgidmap\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/newgrp\necho -n \"/nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8/bin/newgrp\" > $wrapperDir/newgrp.real\n\n# Prevent races\nchmod 0000 $wrapperDir/newgrp\nchown root.root $wrapperDir/newgrp\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/newgrp\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/newuidmap\necho -n \"/nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8/bin/newuidmap\" > $wrapperDir/newuidmap.real\n\n# Prevent races\nchmod 0000 $wrapperDir/newuidmap\nchown root.root $wrapperDir/newuidmap\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/newuidmap\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/ping\necho -n \"/nix/store/nfzrnphh3zap5ysz1cm3lx8rzz4fq7bx-iputils-20190709/bin/ping\" > $wrapperDir/ping.real\n\n# Prevent races\nchmod 0000 $wrapperDir/ping\nchown root.root $wrapperDir/ping\n\n# Set desired capabilities on the file plus cap_setpcap so\n# the wrapper program can elevate the capabilities set on\n# its file into the Ambient set.\n/nix/store/2g4wrlmbk8izmxb1h6l67cx5lvjx68yv-libcap-2.27/bin/setcap \"cap_setpcap,cap_net_raw+p\" $wrapperDir/ping\n\n# Set the executable bit\nchmod u+rx,g+x,o+x $wrapperDir/ping\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/pkexec\necho -n \"/nix/store/mfdjrk4qiad246939760ihnphb9m72w4-polkit-0.116-bin/bin/pkexec\" > $wrapperDir/pkexec.real\n\n# Prevent races\nchmod 0000 $wrapperDir/pkexec\nchown root.root $wrapperDir/pkexec\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/pkexec\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/polkit-agent-helper-1\necho -n \"/nix/store/750r2r449lgg2ps6xyy3y41nyg0riwad-polkit-0.116/lib/polkit-1/polkit-agent-helper-1\" > $wrapperDir/polkit-agent-helper-1.real\n\n# Prevent races\nchmod 0000 $wrapperDir/polkit-agent-helper-1\nchown root.root $wrapperDir/polkit-agent-helper-1\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/polkit-agent-helper-1\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/qemu-bridge-helper\necho -n \"/run/libvirt/nix-helpers/qemu-bridge-helper\" > $wrapperDir/qemu-bridge-helper.real\n\n# Prevent races\nchmod 0000 $wrapperDir/qemu-bridge-helper\nchown root.root $wrapperDir/qemu-bridge-helper\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/qemu-bridge-helper\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/sg\necho -n \"/nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8/bin/sg\" > $wrapperDir/sg.real\n\n# Prevent races\nchmod 0000 $wrapperDir/sg\nchown root.root $wrapperDir/sg\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/sg\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/su\necho -n \"/nix/store/3i395ky485x3zmzb6daz49chs52v9ywl-shadow-4.8-su/bin/su\" > $wrapperDir/su.real\n\n# Prevent races\nchmod 0000 $wrapperDir/su\nchown root.root $wrapperDir/su\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/su\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/sudo\necho -n \"/nix/store/2jicd18722djb8d6a5gcsk3l4rsyw6bn-sudo-1.8.31/bin/sudo\" > $wrapperDir/sudo.real\n\n# Prevent races\nchmod 0000 $wrapperDir/sudo\nchown root.root $wrapperDir/sudo\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/sudo\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/sudoedit\necho -n \"/nix/store/2jicd18722djb8d6a5gcsk3l4rsyw6bn-sudo-1.8.31/bin/sudoedit\" > $wrapperDir/sudoedit.real\n\n# Prevent races\nchmod 0000 $wrapperDir/sudoedit\nchown root.root $wrapperDir/sudoedit\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/sudoedit\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/unix_chkpwd\necho -n \"/nix/store/ib8n2znxilrqr760ddni0n6j709m0dil-linux-pam-1.3.1/sbin/unix_chkpwd.orig\" > $wrapperDir/unix_chkpwd.real\n\n# Prevent races\nchmod 0000 $wrapperDir/unix_chkpwd\nchown root.nogroup $wrapperDir/unix_chkpwd\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/unix_chkpwd\n\n\nif [ -L /run/wrappers/bin ]; then\n # Atomically replace the symlink\n # See https://axialcorps.com/2013/07/03/atomically-replacing-files-and-directories/\n old=$(readlink -f /run/wrappers/bin)\n ln --symbolic --force --no-dereference $wrapperDir /run/wrappers/bin-tmp\n mv --no-target-directory /run/wrappers/bin-tmp /run/wrappers/bin\n rm --force --recursive $old\nelse\n # For initial setup\n ln --symbolic $wrapperDir /run/wrappers/bin\nfi\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"wrappers\" \"$_localstatus\"\nfi\n\n\n# Make this configuration the current configuration.\n# The readlink is there to ensure that when $systemConfig = /system\n# (which is a symlink to the store), /run/current-system is still\n# used as a garbage collection root.\nln -sfn \"$(readlink -f \"$systemConfig\")\" /run/current-system\n\n# Prevent the current configuration from being garbage-collected.\nln -sfn /run/current-system /nix/var/nix/gcroots/current-system\n\nexit $_status\n", | |
"allowSubstitutes": "", | |
"buildCommand": "mkdir $out\n\n# Containers don't have their own kernel or initrd. They boot\n# directly into stage 2.\nif [ ! -f /nix/store/s86blfczqfssi5aramfg8z1ddkk1aiyd-linux-5.4.46/bzImage ]; then\n echo \"The bootloader cannot find the proper kernel image.\"\n echo \"(Expecting /nix/store/s86blfczqfssi5aramfg8z1ddkk1aiyd-linux-5.4.46/bzImage)\"\n false\nfi\n\nln -s /nix/store/s86blfczqfssi5aramfg8z1ddkk1aiyd-linux-5.4.46/bzImage $out/kernel\nln -s /nix/store/8kcv37kjlri7l0ap8a88qv0k8dyn5z68-kernel-modules $out/kernel-modules\n\n\necho -n \"$kernelParams\" > $out/kernel-params\n\nln -s /nix/store/lg82zm3mi0mjxhlvr6xhraxlciyj08wv-initrd-linux-5.4.46/initrd $out/initrd\n\nln -s /nix/store/z6kk89lds89jawpv0zy471gfq56hf43j-append-initrd-secrets/bin/append-initrd-secrets $out\n\nln -s /nix/store/izb1n31cwrww97b4dd7ladik5hwixf87-firmware/lib/firmware $out/firmware\n\n\necho \"$activationScript\" > $out/activate\nsubstituteInPlace $out/activate --subst-var out\nchmod u+x $out/activate\nunset activationScript\n\ncp /nix/store/mz3f0kib7xpivxwsax1y24zbyca0nfr0-stage-2-init.sh $out/init\nsubstituteInPlace $out/init --subst-var-by systemConfig $out\n\nln -s /nix/store/8pn01yay70am9y0yr4m95dib4w0m4hr4-etc/etc $out/etc\nln -s /nix/store/8apaah70y9nqlwl7ypwsx2rmmnxmwz2v-system-path $out/sw\nln -s \"$systemd\" $out/systemd\n\necho -n \"$configurationName\" > $out/configuration-name\necho -n \"systemd 2\" > $out/init-interface-version\necho -n \"$nixosLabel\" > $out/nixos-version\necho -n \"x86_64-linux\" > $out/system\n\nmkdir $out/fine-tune\nchildCount=0\nfor i in $children; do\n childCount=$(( childCount + 1 ))\n ln -s $i $out/fine-tune/child-$childCount\ndone\n\nmkdir $out/bin\nexport localeArchive=\"/nix/store/irbxdgqx84sj3aknpi3l38qw1gs4qgsc-glibc-locales-2.30/lib/locale/locale-archive\"\nsubstituteAll /nix/store/iy5nsd4gwpd87brljvls0ib8r9mdkvqb-switch-to-configuration.pl $out/bin/switch-to-configuration\nchmod +x $out/bin/switch-to-configuration\n\necho -n \"/nix/store/38rf953ryf29hdsnaafqzz10cyg7f4a0-xkb-validated\" > $out/extra-dependencies\n\nln -sv /nix/store/dmgl9vsr6gxf7gpxzi0lrkxbvs23125s-2hn0byrnz7dqkzx1rcgd7jhcwwz6xa33-source $out/nixpkgs\n\n\n", | |
"buildInputs": "", | |
"builder": "/nix/store/hrpvwkjz04s9i4nmli843hyw9z4pwhww-bash-4.4-p23/bin/bash", | |
"children": "", | |
"configurationName": "", | |
"configureFlags": "", | |
"coreutils": "/nix/store/x0jla3hpxrwz76hy9yckg1iyc9hns81k-coreutils-8.31", | |
"depsBuildBuild": "", | |
"depsBuildBuildPropagated": "", | |
"depsBuildTarget": "", | |
"depsBuildTargetPropagated": "", | |
"depsHostHost": "", | |
"depsHostHostPropagated": "", | |
"depsTargetTarget": "", | |
"depsTargetTargetPropagated": "", | |
"doCheck": "", | |
"doInstallCheck": "", | |
"installBootLoader": "/nix/store/vvp85n19qbflnvghwxzkn41kkz7ijmdd-install-grub.sh", | |
"kernelParams": "loglevel=4", | |
"name": "nixos-system-dionach-20.03post-git", | |
"nativeBuildInputs": "", | |
"nixosLabel": "20.03post-git", | |
"out": "/nix/store/kzh21i6ma3xbyz0qhji65l43k6wb962a-nixos-system-dionach-20.03post-git", | |
"outputs": "out", | |
"patches": "", | |
"perl": "/nix/store/bzxvdbmcppw61rvkphsnvs5kbcq7lf5d-perl-5.30.1/bin/perl -I/nix/store/aq3i1sdj8vqwn0w7xn33fhvkm9ym5m3x-perl5.30.1-File-Slurp-9999.29/lib/perl5/site_perl -I/nix/store/8vilv09zjz0m7qbjw7wdijrs9a8k7wxr-perl5.30.1-Net-DBus-1.2.0/lib/perl5/site_perl -I/nix/store/xq1k7ybal3bgkfywwngcg1j5ahzhlk6f-perl5.30.1-XML-Parser-2.44/lib/perl5/site_perl -I/nix/store/k2hic1k512g2lgkda8if9399zx8z08m1-perl5.30.1-XML-Twig-3.52/lib/perl5/site_perl", | |
"preferLocalBuild": "1", | |
"propagatedBuildInputs": "", | |
"propagatedNativeBuildInputs": "", | |
"shell": "/nix/store/hrpvwkjz04s9i4nmli843hyw9z4pwhww-bash-4.4-p23/bin/sh", | |
"stdenv": "/nix/store/bibbfn4agfv8dykw79ny3g2arzzxgs0f-stdenv-linux", | |
"strictDeps": "", | |
"su": "/nix/store/3i395ky485x3zmzb6daz49chs52v9ywl-shadow-4.8-su/bin/su", | |
"system": "x86_64-linux", | |
"systemd": "/nix/store/vfzp1mavwiz5w3v10hs69962k0gwl26c-systemd-243.7", | |
"utillinux": "/nix/store/y5pz7sk0svmj770glzr5mqivwzm5xhs8-util-linux-2.33.2-bin" | |
} | |
} | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment