Skip to content

Instantly share code, notes, and snippets.

@craigem
Created June 23, 2020 01:27
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save craigem/337f996d1594ee09f9f79096e60e7d0e to your computer and use it in GitHub Desktop.
Save craigem/337f996d1594ee09f9f79096e60e7d0e to your computer and use it in GitHub Desktop.
{
"/nix/store/xcy0na1mrvj83s83hv0942kpm84c2kd6-nixos-system-dionach-20.03post-git.drv": {
"outputs": {
"out": {
"path": "/nix/store/kzh21i6ma3xbyz0qhji65l43k6wb962a-nixos-system-dionach-20.03post-git"
}
},
"inputSrcs": [
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh",
"/nix/store/dmgl9vsr6gxf7gpxzi0lrkxbvs23125s-2hn0byrnz7dqkzx1rcgd7jhcwwz6xa33-source",
"/nix/store/iy5nsd4gwpd87brljvls0ib8r9mdkvqb-switch-to-configuration.pl",
"/nix/store/vn1xs9s2akf79y1pbya2qldydbf2b22m-setup-etc.pl",
"/nix/store/w5s7s1nnzsmzdqh06abysffrj2m0nrwf-update-users-groups.pl"
],
"inputDrvs": {
"/nix/store/0nlgif2dwbfs83yh8dlgjvxfsidzjvwm-perl5.30.1-File-Slurp-9999.29.drv": [
"out"
],
"/nix/store/0xp40631x77h73p67a11aydyqib1z92h-glibc-locales-2.30.drv": [
"out"
],
"/nix/store/12k2qw6qdm0lh2zvg2c08jjryfqz7gnw-perl5.30.1-JSON-4.02.drv": [
"out"
],
"/nix/store/19swscs0s5p87q8z5r9y8ss1n41fsi19-net-tools-1.60_p20170221182432.drv": [
"out"
],
"/nix/store/1kcg0dprfzryn61nqrgf20g43a48df9v-getent-1003.1-2008.drv": [
"out"
],
"/nix/store/20vwa6qpx8w3ar66x1fmrjlwy86c7b71-bash-4.4-p23.drv": [
"out"
],
"/nix/store/3nd3zzw89xydsfdp58v2f6ql3xz8aggz-libcap-2.27.drv": [
"out"
],
"/nix/store/3y8fljsajr1xjbymzl2dm563idnb8bd3-iputils-20190709.drv": [
"out"
],
"/nix/store/561r6h8i1ans5vk62dlnnhian2v704yf-gnome-shell-3.34.4.drv": [
"out"
],
"/nix/store/5nb55m0cd6jw89bbbswyki5hgdbchplr-glibc-2.30.drv": [
"bin"
],
"/nix/store/5yrk2mqbxj5n1hxmkjl67rdvhbjk1lq7-coreutils-8.31.drv": [
"out"
],
"/nix/store/66r5v1s63cy34r8fihhr9i90rjzv5mbb-fuse-2.9.9.drv": [
"out"
],
"/nix/store/6h5x2m4ch3b4ijxa12hcvhgpf1a8r03m-linux-pam-1.3.1.drv": [
"out"
],
"/nix/store/6yf1l2cx54lhyy03hmqn4m8wkrxk4yds-perl5.30.1-XML-Twig-3.52.drv": [
"out"
],
"/nix/store/7ykg2sihl65w6hb85323qw2jnrymrh5r-dbus-1.12.16.drv": [
"out"
],
"/nix/store/89a56fd632zjdcksicz8641jfpf4abnw-system-path.drv": [
"out"
],
"/nix/store/9imdwvgw5qmx1rngqxliz215c738ynqd-perl5.30.1-Net-DBus-1.2.0.drv": [
"out"
],
"/nix/store/asf00xdxj9yxlnhx2ckrd6yjidb62ljk-linux-5.4.46.drv": [
"out"
],
"/nix/store/b57n6br70xp57zi2iykfmwb13046bqb8-users-groups.json.drv": [
"out"
],
"/nix/store/b7y35jqhf1ib2h9n6qilgyy3b1kslphg-firmware.drv": [
"out"
],
"/nix/store/b8qpi7rwc0f7byn0hqisfa4v0q2r1zwh-append-initrd-secrets.drv": [
"out"
],
"/nix/store/c0a0mndiv56nwp6nc41zi73zndnqkmcb-sudo-1.8.31.drv": [
"out"
],
"/nix/store/c70sv1xcsmq5b38ib1bhplkccdvn9rk4-security-wrapper.drv": [
"out"
],
"/nix/store/dfvm6z7pia0h5v4q3766fyidi7rz2wlw-fuse-3.9.0.drv": [
"out"
],
"/nix/store/gygn3ydlgk1ixjnrd7f1dmm3wpshlsm5-e2fsprogs-1.45.5.drv": [
"bin"
],
"/nix/store/hfsj235qc796y9mv4bjacdw1bqii155w-gnome-keyring-3.34.0.drv": [
"out"
],
"/nix/store/j7z6g8fkvzjmjn2g94lijw3csddhsdi8-stdenv-linux.drv": [
"out"
],
"/nix/store/jl4rwy9g983m21xlf2y4nd7iwrrc7skg-bash-interactive-4.4-p23.drv": [
"out"
],
"/nix/store/k6y39d2pxj7m0n6jv6jsnmijgnwmjhsk-etc.drv": [
"out"
],
"/nix/store/kf5pah39xp8xja9qnv0qxwln6s0iy21f-systemd-243.7.drv": [
"out"
],
"/nix/store/ky2s1r13qdpmn0s8c6sii2f7dh6d4qsj-util-linux-2.33.2.drv": [
"bin"
],
"/nix/store/l2s6gqcn1hwk24sn27vp525fqd19k80r-kernel-modules.drv": [
"out"
],
"/nix/store/lfd112s5jmh7zvc5iv6rixl77w9va0a5-cron-4.1.drv": [
"out"
],
"/nix/store/min5m7g9vz7qm4i068jlp91yfsqp4l3v-mounts.sh.drv": [
"out"
],
"/nix/store/nyrgrc4xpsblccbsjlrg8m0lyb162sy4-polkit-0.116.drv": [
"bin",
"out"
],
"/nix/store/q17a1x1cacc2kwfpqy6mlrbx124qvzwm-install-grub.sh.drv": [
"out"
],
"/nix/store/q809kaj98z734kldackxd4073mflb30b-stage-2-init.sh.drv": [
"out"
],
"/nix/store/qnnnx3ridki2c6xkdl61327izsa2cjmf-findutils-4.7.0.drv": [
"out"
],
"/nix/store/r5jhfs6hffqh8mmlf6mjdy4rbvr6n698-perl5.30.1-XML-Parser-2.44.drv": [
"out"
],
"/nix/store/rdcwccikn608j3m9ld309giza9qrgh6v-kmod-26.drv": [
"out"
],
"/nix/store/rxx41vmwwwj8pyfx68q7zhpgwrzzkppq-setup-keys.sh.drv": [
"out"
],
"/nix/store/snys52a547r1ckzmgv050ws7ylpzc8sb-perl-5.30.1.drv": [
"out"
],
"/nix/store/wdfq54pw5xridnknh6866vlr5pcd4q7h-xkb-validated.drv": [
"out"
],
"/nix/store/wlbck61fycl45w58ad9kdq2dwc2x3rmr-gnugrep-3.4.drv": [
"out"
],
"/nix/store/xrmsiym9ml66vi876m8j6lwk9995ddkc-shadow-4.8.drv": [
"out",
"su"
],
"/nix/store/ykryj629shi87sm3ivq274a9r07jdb5g-initrd-linux-5.4.46.drv": [
"out"
]
},
"platform": "x86_64-linux",
"builder": "/nix/store/hrpvwkjz04s9i4nmli843hyw9z4pwhww-bash-4.4-p23/bin/bash",
"args": [
"-e",
"/nix/store/9krlzvny65gdc8s7kpb6lkx8cd02c25b-default-builder.sh"
],
"env": {
"activationScript": "#! /nix/store/hrpvwkjz04s9i4nmli843hyw9z4pwhww-bash-4.4-p23/bin/bash\n\nsystemConfig=@out@\n\nexport PATH=/empty\nfor i in /nix/store/x0jla3hpxrwz76hy9yckg1iyc9hns81k-coreutils-8.31 /nix/store/srmjkp5pq8c055j0lak2hn0ls0fis8yl-gnugrep-3.4 /nix/store/97vambzyvpvrd9wgrrw7i7svi0s8vny5-findutils-4.7.0 /nix/store/c3q0mx9bql126y9bq6wsrqzh44rp0acd-getent-1003.1-2008 /nix/store/0k65d30z9xsixil10yw3bwajbdk4yskv-glibc-2.30-bin /nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8 /nix/store/7xicnmvb03zm45j20afkaaw74kqqzg3y-net-tools-1.60_p20170221182432 /nix/store/y5pz7sk0svmj770glzr5mqivwzm5xhs8-util-linux-2.33.2-bin; do\n PATH=$PATH:$i/bin:$i/sbin\ndone\n\n_status=0\ntrap \"_status=1 _localstatus=\\$?\" ERR\n\n# Ensure a consistent umask.\numask 0022\n\n#### Activation script snippet binfmt:\n_localstatus=0\nmkdir -p -m 0755 /run/binfmt\n\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"binfmt\" \"$_localstatus\"\nfi\n\n#### Activation script snippet stdio:\n_localstatus=0\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"stdio\" \"$_localstatus\"\nfi\n\n#### Activation script snippet binsh:\n_localstatus=0\n# Create the required /bin/sh symlink; otherwise lots of things\n# (notably the system() function) won't work.\nmkdir -m 0755 -p /bin\nln -sfn \"/nix/store/nmgiyxa9fpn42w6xjd1wvzgb1svffn1w-bash-interactive-4.4-p23/bin/sh\" /bin/.sh.tmp\nmv /bin/.sh.tmp /bin/sh # atomically replace /bin/sh\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"binsh\" \"$_localstatus\"\nfi\n\n#### Activation script snippet domain:\n_localstatus=0\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"domain\" \"$_localstatus\"\nfi\n\n#### Activation script snippet users:\n_localstatus=0\ninstall -m 0700 -d /root\ninstall -m 0755 -d /home\n\n/nix/store/bzxvdbmcppw61rvkphsnvs5kbcq7lf5d-perl-5.30.1/bin/perl -w \\\n -I/nix/store/aq3i1sdj8vqwn0w7xn33fhvkm9ym5m3x-perl5.30.1-File-Slurp-9999.29/lib/perl5/site_perl \\\n -I/nix/store/pvymciqaf7sg6llb4w039427nhjvgzsn-perl5.30.1-JSON-4.02/lib/perl5/site_perl \\\n /nix/store/w5s7s1nnzsmzdqh06abysffrj2m0nrwf-update-users-groups.pl /nix/store/clvarff8yhrd9l4j7sybpxwp3qfmy2pl-users-groups.json\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"users\" \"$_localstatus\"\nfi\n\n#### Activation script snippet groups:\n_localstatus=0\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"groups\" \"$_localstatus\"\nfi\n\n#### Activation script snippet etc:\n_localstatus=0\n# Set up the statically computed bits of /etc.\necho \"setting up /etc...\"\n/nix/store/bzxvdbmcppw61rvkphsnvs5kbcq7lf5d-perl-5.30.1/bin/perl -I/nix/store/aq3i1sdj8vqwn0w7xn33fhvkm9ym5m3x-perl5.30.1-File-Slurp-9999.29/lib/perl5/site_perl /nix/store/vn1xs9s2akf79y1pbya2qldydbf2b22m-setup-etc.pl /nix/store/8pn01yay70am9y0yr4m95dib4w0m4hr4-etc/etc\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"etc\" \"$_localstatus\"\nfi\n\n#### Activation script snippet hostname:\n_localstatus=0\nhostname \"dionach\"\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"hostname\" \"$_localstatus\"\nfi\n\n#### Activation script snippet specialfs:\n_localstatus=0\nspecialMount() {\n local device=\"$1\"\n local mountPoint=\"$2\"\n local options=\"$3\"\n local fsType=\"$4\"\n\n if mountpoint -q \"$mountPoint\"; then\n local options=\"remount,$options\"\n else\n mkdir -m 0755 -p \"$mountPoint\"\n fi\n mount -t \"$fsType\" -o \"$options\" \"$device\" \"$mountPoint\"\n}\nsource /nix/store/hb462dgghbm34bs8dgn7hx474nvxa6w4-mounts.sh\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"specialfs\" \"$_localstatus\"\nfi\n\n#### Activation script snippet modprobe:\n_localstatus=0\n# Allow the kernel to find our wrapped modprobe (which searches\n# in the right location in the Nix store for kernel modules).\n# We need this when the kernel (or some module) auto-loads a\n# module.\necho /nix/store/kk0k40xpib168h0h6xkz2mqd7jrjng04-kmod-26/bin/modprobe > /proc/sys/kernel/modprobe\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"modprobe\" \"$_localstatus\"\nfi\n\n#### Activation script snippet nix:\n_localstatus=0\n# Create directories in /nix.\ninstall -m 0755 -d /nix/var/nix/{gcroots,profiles}/per-user\n\n# Subscribe the root user to the NixOS channel by default.\nif [ ! -e \"/root/.nix-channels\" ]; then\n echo \"https://nixos.org/channels/nixos-20.03 nixos\" > \"/root/.nix-channels\"\nfi\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"nix\" \"$_localstatus\"\nfi\n\n#### Activation script snippet nixops-keys:\n_localstatus=0\nsource /nix/store/zkcs8mv0aqrgd37vns82fj1labami07x-setup-keys.sh\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"nixops-keys\" \"$_localstatus\"\nfi\n\n#### Activation script snippet systemd-timesyncd-migration:\n_localstatus=0\n# workaround an issue of systemd-timesyncd not starting due to upstream systemd reverting their dynamic users changes\n# - https://github.com/NixOS/nixpkgs/pull/61321#issuecomment-492423742\n# - https://github.com/systemd/systemd/issues/12131\nif [ -L /var/lib/systemd/timesync ]; then\n rm /var/lib/systemd/timesync\n mv /var/lib/private/systemd/timesync /var/lib/systemd/timesync\nfi\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"systemd-timesyncd-migration\" \"$_localstatus\"\nfi\n\n#### Activation script snippet udevd:\n_localstatus=0\n# The deprecated hotplug uevent helper is not used anymore\nif [ -e /proc/sys/kernel/hotplug ]; then\n echo \"\" > /proc/sys/kernel/hotplug\nfi\n\n# Allow the kernel to find our firmware.\nif [ -e /sys/module/firmware_class/parameters/path ]; then\n echo -n \"/nix/store/izb1n31cwrww97b4dd7ladik5hwixf87-firmware/lib/firmware\" > /sys/module/firmware_class/parameters/path\nfi\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"udevd\" \"$_localstatus\"\nfi\n\n#### Activation script snippet usrbinenv:\n_localstatus=0\nmkdir -m 0755 -p /usr/bin\nln -sfn /nix/store/x0jla3hpxrwz76hy9yckg1iyc9hns81k-coreutils-8.31/bin/env /usr/bin/.env.tmp\nmv /usr/bin/.env.tmp /usr/bin/env # atomically replace /usr/bin/env\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"usrbinenv\" \"$_localstatus\"\nfi\n\n#### Activation script snippet var:\n_localstatus=0\n# Various log/runtime directories.\n\nmkdir -m 1777 -p /var/tmp\n\n# Empty, immutable home directory of many system accounts.\nmkdir -p /var/empty\n# Make sure it's really empty\n/nix/store/cf3nz78q77n8mwm6frfmd44w1jsa5pn7-e2fsprogs-1.45.5-bin/bin/chattr -f -i /var/empty || true\nfind /var/empty -mindepth 1 -delete\nchmod 0555 /var/empty\nchown root:root /var/empty\n/nix/store/cf3nz78q77n8mwm6frfmd44w1jsa5pn7-e2fsprogs-1.45.5-bin/bin/chattr -f +i /var/empty || true\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"var\" \"$_localstatus\"\nfi\n\n#### Activation script snippet wrappers:\n_localstatus=0\n# Look in the system path and in the default profile for\n# programs to be wrapped.\nWRAPPER_PATH=/nix/store/8apaah70y9nqlwl7ypwsx2rmmnxmwz2v-system-path/bin:/nix/store/8apaah70y9nqlwl7ypwsx2rmmnxmwz2v-system-path/sbin\n\n# We want to place the tmpdirs for the wrappers to the parent dir.\nwrapperDir=$(mktemp --directory --tmpdir=\"/run/wrappers\" wrappers.XXXXXXXXXX)\nchmod a+rx $wrapperDir\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/.gnome-shell-wrapped\necho -n \"/nix/store/q48pkm2ybfa8nr3bh9m71cbzzm4ih302-gnome-shell-3.34.4/bin/.gnome-shell-wrapped\" > $wrapperDir/.gnome-shell-wrapped.real\n\n# Prevent races\nchmod 0000 $wrapperDir/.gnome-shell-wrapped\nchown root.root $wrapperDir/.gnome-shell-wrapped\n\n# Set desired capabilities on the file plus cap_setpcap so\n# the wrapper program can elevate the capabilities set on\n# its file into the Ambient set.\n/nix/store/2g4wrlmbk8izmxb1h6l67cx5lvjx68yv-libcap-2.27/bin/setcap \"cap_setpcap,cap_sys_nice=ep\" $wrapperDir/.gnome-shell-wrapped\n\n# Set the executable bit\nchmod u+rx,g+x,o+x $wrapperDir/.gnome-shell-wrapped\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/cpuclock_sysfs.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/modules/sysinfo/linux-gnu-x86_64-0.23.1/cpuclock_sysfs.orig\" > $wrapperDir/cpuclock_sysfs.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/cpuclock_sysfs.orig\nchown root.root $wrapperDir/cpuclock_sysfs.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/cpuclock_sysfs.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/crontab\necho -n \"/nix/store/g6x0mhdirz8qvsiz3z0zfpgzbqiqdy5j-cron-4.1/bin/crontab\" > $wrapperDir/crontab.real\n\n# Prevent races\nchmod 0000 $wrapperDir/crontab\nchown root.root $wrapperDir/crontab\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/crontab\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/dbus-daemon-launch-helper\necho -n \"/nix/store/8lhn08dhv83rqc77b2fl7gqryqkq9mig-dbus-1.12.16/libexec/dbus-daemon-launch-helper\" > $wrapperDir/dbus-daemon-launch-helper.real\n\n# Prevent races\nchmod 0000 $wrapperDir/dbus-daemon-launch-helper\nchown root.messagebus $wrapperDir/dbus-daemon-launch-helper\n\nchmod \"u+s,g-s,u+rx,g+rx,o-rx\" $wrapperDir/dbus-daemon-launch-helper\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/enlightenment_backlight.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/utils/enlightenment_backlight.orig\" > $wrapperDir/enlightenment_backlight.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/enlightenment_backlight.orig\nchown root.root $wrapperDir/enlightenment_backlight.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/enlightenment_backlight.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/enlightenment_ckpasswd.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/utils/enlightenment_ckpasswd.orig\" > $wrapperDir/enlightenment_ckpasswd.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/enlightenment_ckpasswd.orig\nchown root.root $wrapperDir/enlightenment_ckpasswd.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/enlightenment_ckpasswd.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/enlightenment_sys.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/utils/enlightenment_sys.orig\" > $wrapperDir/enlightenment_sys.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/enlightenment_sys.orig\nchown root.root $wrapperDir/enlightenment_sys.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/enlightenment_sys.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/freqset.orig\necho -n \"/nix/store/599dk4hvbfabm537ylxy31hqalr33kv9-enlightenment-0.23.1/lib/enlightenment/modules/cpufreq/linux-gnu-x86_64-0.23.1/freqset.orig\" > $wrapperDir/freqset.orig.real\n\n# Prevent races\nchmod 0000 $wrapperDir/freqset.orig\nchown root.root $wrapperDir/freqset.orig\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/freqset.orig\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/fusermount\necho -n \"/nix/store/5fnjrh30z0gsd1lvjr21w7ivcn7a94xd-fuse-2.9.9/bin/fusermount\" > $wrapperDir/fusermount.real\n\n# Prevent races\nchmod 0000 $wrapperDir/fusermount\nchown root.root $wrapperDir/fusermount\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/fusermount\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/fusermount3\necho -n \"/nix/store/7rk8yd1z2zv2247iz73gj3jrf89yg71m-fuse-3.9.0/bin/fusermount3\" > $wrapperDir/fusermount3.real\n\n# Prevent races\nchmod 0000 $wrapperDir/fusermount3\nchown root.root $wrapperDir/fusermount3\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/fusermount3\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/gnome-keyring-daemon\necho -n \"/nix/store/y097gmz6rnv3dj83k4gkpr0178w6am7g-gnome-keyring-3.34.0/bin/gnome-keyring-daemon\" > $wrapperDir/gnome-keyring-daemon.real\n\n# Prevent races\nchmod 0000 $wrapperDir/gnome-keyring-daemon\nchown root.root $wrapperDir/gnome-keyring-daemon\n\n# Set desired capabilities on the file plus cap_setpcap so\n# the wrapper program can elevate the capabilities set on\n# its file into the Ambient set.\n/nix/store/2g4wrlmbk8izmxb1h6l67cx5lvjx68yv-libcap-2.27/bin/setcap \"cap_setpcap,cap_ipc_lock=ep\" $wrapperDir/gnome-keyring-daemon\n\n# Set the executable bit\nchmod u+rx,g+x,o+x $wrapperDir/gnome-keyring-daemon\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/newgidmap\necho -n \"/nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8/bin/newgidmap\" > $wrapperDir/newgidmap.real\n\n# Prevent races\nchmod 0000 $wrapperDir/newgidmap\nchown root.root $wrapperDir/newgidmap\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/newgidmap\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/newgrp\necho -n \"/nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8/bin/newgrp\" > $wrapperDir/newgrp.real\n\n# Prevent races\nchmod 0000 $wrapperDir/newgrp\nchown root.root $wrapperDir/newgrp\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/newgrp\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/newuidmap\necho -n \"/nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8/bin/newuidmap\" > $wrapperDir/newuidmap.real\n\n# Prevent races\nchmod 0000 $wrapperDir/newuidmap\nchown root.root $wrapperDir/newuidmap\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/newuidmap\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/ping\necho -n \"/nix/store/nfzrnphh3zap5ysz1cm3lx8rzz4fq7bx-iputils-20190709/bin/ping\" > $wrapperDir/ping.real\n\n# Prevent races\nchmod 0000 $wrapperDir/ping\nchown root.root $wrapperDir/ping\n\n# Set desired capabilities on the file plus cap_setpcap so\n# the wrapper program can elevate the capabilities set on\n# its file into the Ambient set.\n/nix/store/2g4wrlmbk8izmxb1h6l67cx5lvjx68yv-libcap-2.27/bin/setcap \"cap_setpcap,cap_net_raw+p\" $wrapperDir/ping\n\n# Set the executable bit\nchmod u+rx,g+x,o+x $wrapperDir/ping\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/pkexec\necho -n \"/nix/store/mfdjrk4qiad246939760ihnphb9m72w4-polkit-0.116-bin/bin/pkexec\" > $wrapperDir/pkexec.real\n\n# Prevent races\nchmod 0000 $wrapperDir/pkexec\nchown root.root $wrapperDir/pkexec\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/pkexec\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/polkit-agent-helper-1\necho -n \"/nix/store/750r2r449lgg2ps6xyy3y41nyg0riwad-polkit-0.116/lib/polkit-1/polkit-agent-helper-1\" > $wrapperDir/polkit-agent-helper-1.real\n\n# Prevent races\nchmod 0000 $wrapperDir/polkit-agent-helper-1\nchown root.root $wrapperDir/polkit-agent-helper-1\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/polkit-agent-helper-1\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/qemu-bridge-helper\necho -n \"/run/libvirt/nix-helpers/qemu-bridge-helper\" > $wrapperDir/qemu-bridge-helper.real\n\n# Prevent races\nchmod 0000 $wrapperDir/qemu-bridge-helper\nchown root.root $wrapperDir/qemu-bridge-helper\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/qemu-bridge-helper\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/sg\necho -n \"/nix/store/cc8pnyl00i6l98xri52sjfvhmrm71s6h-shadow-4.8/bin/sg\" > $wrapperDir/sg.real\n\n# Prevent races\nchmod 0000 $wrapperDir/sg\nchown root.root $wrapperDir/sg\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/sg\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/su\necho -n \"/nix/store/3i395ky485x3zmzb6daz49chs52v9ywl-shadow-4.8-su/bin/su\" > $wrapperDir/su.real\n\n# Prevent races\nchmod 0000 $wrapperDir/su\nchown root.root $wrapperDir/su\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/su\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/sudo\necho -n \"/nix/store/2jicd18722djb8d6a5gcsk3l4rsyw6bn-sudo-1.8.31/bin/sudo\" > $wrapperDir/sudo.real\n\n# Prevent races\nchmod 0000 $wrapperDir/sudo\nchown root.root $wrapperDir/sudo\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/sudo\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/sudoedit\necho -n \"/nix/store/2jicd18722djb8d6a5gcsk3l4rsyw6bn-sudo-1.8.31/bin/sudoedit\" > $wrapperDir/sudoedit.real\n\n# Prevent races\nchmod 0000 $wrapperDir/sudoedit\nchown root.root $wrapperDir/sudoedit\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/sudoedit\n\ncp /nix/store/s64wjygfqamrwzxn7kysylb9vcy5q44x-security-wrapper/bin/security-wrapper $wrapperDir/unix_chkpwd\necho -n \"/nix/store/ib8n2znxilrqr760ddni0n6j709m0dil-linux-pam-1.3.1/sbin/unix_chkpwd.orig\" > $wrapperDir/unix_chkpwd.real\n\n# Prevent races\nchmod 0000 $wrapperDir/unix_chkpwd\nchown root.nogroup $wrapperDir/unix_chkpwd\n\nchmod \"u+s,g-s,u+rx,g+x,o+x\" $wrapperDir/unix_chkpwd\n\n\nif [ -L /run/wrappers/bin ]; then\n # Atomically replace the symlink\n # See https://axialcorps.com/2013/07/03/atomically-replacing-files-and-directories/\n old=$(readlink -f /run/wrappers/bin)\n ln --symbolic --force --no-dereference $wrapperDir /run/wrappers/bin-tmp\n mv --no-target-directory /run/wrappers/bin-tmp /run/wrappers/bin\n rm --force --recursive $old\nelse\n # For initial setup\n ln --symbolic $wrapperDir /run/wrappers/bin\nfi\n\n\nif (( _localstatus > 0 )); then\n printf \"Activation script snippet '%s' failed (%s)\\n\" \"wrappers\" \"$_localstatus\"\nfi\n\n\n# Make this configuration the current configuration.\n# The readlink is there to ensure that when $systemConfig = /system\n# (which is a symlink to the store), /run/current-system is still\n# used as a garbage collection root.\nln -sfn \"$(readlink -f \"$systemConfig\")\" /run/current-system\n\n# Prevent the current configuration from being garbage-collected.\nln -sfn /run/current-system /nix/var/nix/gcroots/current-system\n\nexit $_status\n",
"allowSubstitutes": "",
"buildCommand": "mkdir $out\n\n# Containers don't have their own kernel or initrd. They boot\n# directly into stage 2.\nif [ ! -f /nix/store/s86blfczqfssi5aramfg8z1ddkk1aiyd-linux-5.4.46/bzImage ]; then\n echo \"The bootloader cannot find the proper kernel image.\"\n echo \"(Expecting /nix/store/s86blfczqfssi5aramfg8z1ddkk1aiyd-linux-5.4.46/bzImage)\"\n false\nfi\n\nln -s /nix/store/s86blfczqfssi5aramfg8z1ddkk1aiyd-linux-5.4.46/bzImage $out/kernel\nln -s /nix/store/8kcv37kjlri7l0ap8a88qv0k8dyn5z68-kernel-modules $out/kernel-modules\n\n\necho -n \"$kernelParams\" > $out/kernel-params\n\nln -s /nix/store/lg82zm3mi0mjxhlvr6xhraxlciyj08wv-initrd-linux-5.4.46/initrd $out/initrd\n\nln -s /nix/store/z6kk89lds89jawpv0zy471gfq56hf43j-append-initrd-secrets/bin/append-initrd-secrets $out\n\nln -s /nix/store/izb1n31cwrww97b4dd7ladik5hwixf87-firmware/lib/firmware $out/firmware\n\n\necho \"$activationScript\" > $out/activate\nsubstituteInPlace $out/activate --subst-var out\nchmod u+x $out/activate\nunset activationScript\n\ncp /nix/store/mz3f0kib7xpivxwsax1y24zbyca0nfr0-stage-2-init.sh $out/init\nsubstituteInPlace $out/init --subst-var-by systemConfig $out\n\nln -s /nix/store/8pn01yay70am9y0yr4m95dib4w0m4hr4-etc/etc $out/etc\nln -s /nix/store/8apaah70y9nqlwl7ypwsx2rmmnxmwz2v-system-path $out/sw\nln -s \"$systemd\" $out/systemd\n\necho -n \"$configurationName\" > $out/configuration-name\necho -n \"systemd 2\" > $out/init-interface-version\necho -n \"$nixosLabel\" > $out/nixos-version\necho -n \"x86_64-linux\" > $out/system\n\nmkdir $out/fine-tune\nchildCount=0\nfor i in $children; do\n childCount=$(( childCount + 1 ))\n ln -s $i $out/fine-tune/child-$childCount\ndone\n\nmkdir $out/bin\nexport localeArchive=\"/nix/store/irbxdgqx84sj3aknpi3l38qw1gs4qgsc-glibc-locales-2.30/lib/locale/locale-archive\"\nsubstituteAll /nix/store/iy5nsd4gwpd87brljvls0ib8r9mdkvqb-switch-to-configuration.pl $out/bin/switch-to-configuration\nchmod +x $out/bin/switch-to-configuration\n\necho -n \"/nix/store/38rf953ryf29hdsnaafqzz10cyg7f4a0-xkb-validated\" > $out/extra-dependencies\n\nln -sv /nix/store/dmgl9vsr6gxf7gpxzi0lrkxbvs23125s-2hn0byrnz7dqkzx1rcgd7jhcwwz6xa33-source $out/nixpkgs\n\n\n",
"buildInputs": "",
"builder": "/nix/store/hrpvwkjz04s9i4nmli843hyw9z4pwhww-bash-4.4-p23/bin/bash",
"children": "",
"configurationName": "",
"configureFlags": "",
"coreutils": "/nix/store/x0jla3hpxrwz76hy9yckg1iyc9hns81k-coreutils-8.31",
"depsBuildBuild": "",
"depsBuildBuildPropagated": "",
"depsBuildTarget": "",
"depsBuildTargetPropagated": "",
"depsHostHost": "",
"depsHostHostPropagated": "",
"depsTargetTarget": "",
"depsTargetTargetPropagated": "",
"doCheck": "",
"doInstallCheck": "",
"installBootLoader": "/nix/store/vvp85n19qbflnvghwxzkn41kkz7ijmdd-install-grub.sh",
"kernelParams": "loglevel=4",
"name": "nixos-system-dionach-20.03post-git",
"nativeBuildInputs": "",
"nixosLabel": "20.03post-git",
"out": "/nix/store/kzh21i6ma3xbyz0qhji65l43k6wb962a-nixos-system-dionach-20.03post-git",
"outputs": "out",
"patches": "",
"perl": "/nix/store/bzxvdbmcppw61rvkphsnvs5kbcq7lf5d-perl-5.30.1/bin/perl -I/nix/store/aq3i1sdj8vqwn0w7xn33fhvkm9ym5m3x-perl5.30.1-File-Slurp-9999.29/lib/perl5/site_perl -I/nix/store/8vilv09zjz0m7qbjw7wdijrs9a8k7wxr-perl5.30.1-Net-DBus-1.2.0/lib/perl5/site_perl -I/nix/store/xq1k7ybal3bgkfywwngcg1j5ahzhlk6f-perl5.30.1-XML-Parser-2.44/lib/perl5/site_perl -I/nix/store/k2hic1k512g2lgkda8if9399zx8z08m1-perl5.30.1-XML-Twig-3.52/lib/perl5/site_perl",
"preferLocalBuild": "1",
"propagatedBuildInputs": "",
"propagatedNativeBuildInputs": "",
"shell": "/nix/store/hrpvwkjz04s9i4nmli843hyw9z4pwhww-bash-4.4-p23/bin/sh",
"stdenv": "/nix/store/bibbfn4agfv8dykw79ny3g2arzzxgs0f-stdenv-linux",
"strictDeps": "",
"su": "/nix/store/3i395ky485x3zmzb6daz49chs52v9ywl-shadow-4.8-su/bin/su",
"system": "x86_64-linux",
"systemd": "/nix/store/vfzp1mavwiz5w3v10hs69962k0gwl26c-systemd-243.7",
"utillinux": "/nix/store/y5pz7sk0svmj770glzr5mqivwzm5xhs8-util-linux-2.33.2-bin"
}
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment