|
|
|
|
@@ -0,0 +1,645 @@
|
|
|
|
|
with builtins;
|
|
|
|
|
{
|
|
|
|
|
bwrap,
|
|
|
|
|
nix,
|
|
|
|
|
unzip,
|
|
|
|
|
zip,
|
|
|
|
|
unixtools,
|
|
|
|
|
stdenv,
|
|
|
|
|
buildPackages,
|
|
|
|
|
upx,
|
|
|
|
|
|
|
|
|
|
bootstrapPrograms ? [
|
|
|
|
|
"gitMinimal"
|
|
|
|
|
"netcat-openbsd"
|
|
|
|
|
"openssh"
|
|
|
|
|
"bashInteractive"
|
|
|
|
|
],
|
|
|
|
|
|
|
|
|
|
busybox,
|
|
|
|
|
cacert ? pkgs.cacert,
|
|
|
|
|
compression ? "zstd -19 -T0",
|
|
|
|
|
gnutar ? pkgs.pkgsStatic.gnutar,
|
|
|
|
|
lib ? pkgs.lib,
|
|
|
|
|
perl ? pkgs.perl,
|
|
|
|
|
pkgs ? import <nixpkgs> {},
|
|
|
|
|
xz ? pkgs.pkgsStatic.xz,
|
|
|
|
|
zstd ? pkgs.pkgsStatic.zstd,
|
|
|
|
|
nixStatic,
|
|
|
|
|
# hardcode executable to run. Useful when creating a bundle.
|
|
|
|
|
bundledPackage ? null,
|
|
|
|
|
...
|
|
|
|
|
}@inp:
|
|
|
|
|
with lib;
|
|
|
|
|
let
|
|
|
|
|
|
|
|
|
|
pname =
|
|
|
|
|
if bundledPackage == null
|
|
|
|
|
then "nix-portable"
|
|
|
|
|
else lib.getName bundledPackage;
|
|
|
|
|
|
|
|
|
|
bundledExe = lib.getExe bundledPackage;
|
|
|
|
|
|
|
|
|
|
nixpkgsSrc = pkgs.path;
|
|
|
|
|
|
|
|
|
|
maketar = targets:
|
|
|
|
|
let
|
|
|
|
|
closureInfo = buildPackages.closureInfo { rootPaths = targets; };
|
|
|
|
|
in
|
|
|
|
|
stdenv.mkDerivation {
|
|
|
|
|
name = "nix-portable-store-tarball";
|
|
|
|
|
nativeBuildInputs = [ perl pkgs.zstd ];
|
|
|
|
|
exportReferencesGraph = map (x: [("closure-" + baseNameOf x) x]) targets;
|
|
|
|
|
buildCommand = ''
|
|
|
|
|
storePaths=$(cat ${closureInfo}/store-paths)
|
|
|
|
|
mkdir $out
|
|
|
|
|
echo $storePaths > $out/index
|
|
|
|
|
cp -r ${closureInfo} $out/closureInfo
|
|
|
|
|
|
|
|
|
|
tar -cf - \
|
|
|
|
|
--owner=0 --group=0 --mode=u+rw,uga+r \
|
|
|
|
|
--hard-dereference \
|
|
|
|
|
$storePaths | ${compression} > $out/tar
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
packStaticBin = binPath: let
|
|
|
|
|
binName = (last (splitString "/" binPath)); in
|
|
|
|
|
pkgs.runCommand
|
|
|
|
|
binName
|
|
|
|
|
{ nativeBuildInputs = [ upx ]; }
|
|
|
|
|
''
|
|
|
|
|
mkdir -p $out/bin
|
|
|
|
|
theBinPath=${binPath}
|
|
|
|
|
|
|
|
|
|
if [[ -L "$theBinPath" ]]; then
|
|
|
|
|
theBinPath=$(readlink -f "$theBinPath")
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
upx -9 -o $out/bin/${binName} $theBinPath
|
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
installBin = pkg: bin: ''
|
|
|
|
|
unzip -qqoj "\$self" ${ lib.removePrefix "/" "${pkg}/bin/${bin}"} -d \$dir/bin
|
|
|
|
|
chmod +wx \$dir/bin/${bin};
|
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
installDynamic = pkgname: let
|
|
|
|
|
out = pkgs.${pkgname}.out;
|
|
|
|
|
in ''
|
|
|
|
|
if [ ! -e \$store${lib.removePrefix "/nix/store" pkgs.${pkgname}.out} ] ; then
|
|
|
|
|
debug "Installing ${pkgname}"
|
|
|
|
|
\$run \$store${lib.removePrefix "/nix/store" nix}/bin/nix build --impure --no-link --expr "
|
|
|
|
|
(import ${nixpkgsSrc} {}).${pkgname}.out
|
|
|
|
|
"
|
|
|
|
|
else
|
|
|
|
|
debug "${pkgname} already installed"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
export PATH="${out}/bin:\$PATH"
|
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
caBundleZstd = pkgs.runCommand "cacerts" {
|
|
|
|
|
nativeBuildInputs = [ pkgs.zstd ];
|
|
|
|
|
} "cat ${cacert}/etc/ssl/certs/ca-bundle.crt | zstd -19 > $out";
|
|
|
|
|
|
|
|
|
|
bwrap = packStaticBin "${inp.bwrap}/bin/bwrap";
|
|
|
|
|
nixStatic = packStaticBin "${inp.nixStatic}/bin/nix";
|
|
|
|
|
zstd = packStaticBin "${inp.zstd}/bin/zstd";
|
|
|
|
|
|
|
|
|
|
# the default nix store contents to extract when first used
|
|
|
|
|
storeTar = maketar ([ cacert nix nixpkgsSrc ] ++ lib.optional (bundledPackage != null) bundledPackage);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# The runtime script which unpacks the necessary files to $HOME/.nix-portable
|
|
|
|
|
# and then executes nix via bwrap
|
|
|
|
|
# Some shell expressions will be evaluated at build time and some at run time.
|
|
|
|
|
# Variables/expressions escaped via `\$` will be evaluated at run time
|
|
|
|
|
runtimeScript = ''
|
|
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
|
|
|
|
|
set -eo pipefail
|
|
|
|
|
|
|
|
|
|
start=\$(date +%s%N) # start time in nanoseconds
|
|
|
|
|
|
|
|
|
|
# dump environment on exit if debug is enabled
|
|
|
|
|
if [ -n "\$NP_DEBUG" ] && [ "\$NP_DEBUG" -ge 1 ]; then
|
|
|
|
|
trap "declare -p > \''${TMPDIR:-/tmp}/np_env" EXIT
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
set -e
|
|
|
|
|
if [ -n "\$NP_DEBUG" ] && [ "\$NP_DEBUG" -ge 2 ]; then
|
|
|
|
|
set -x
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
# &3 is our error out which we either forward to &2 or to /dev/null
|
|
|
|
|
# depending on the setting
|
|
|
|
|
if [ -n "\$NP_DEBUG" ] && [ "\$NP_DEBUG" -ge 1 ]; then
|
|
|
|
|
debug(){
|
|
|
|
|
echo \$@ || true
|
|
|
|
|
}
|
|
|
|
|
exec 3>&2
|
|
|
|
|
else
|
|
|
|
|
debug(){
|
|
|
|
|
true
|
|
|
|
|
}
|
|
|
|
|
exec 3>/dev/null
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
# to reference this script's file
|
|
|
|
|
self="\$(realpath \''${BASH_SOURCE[0]})"
|
|
|
|
|
|
|
|
|
|
# fingerprint will be inserted by builder
|
|
|
|
|
fingerprint="_FINGERPRINT_PLACEHOLDER_"
|
|
|
|
|
|
|
|
|
|
# user specified location for program files and nix store
|
|
|
|
|
[ -z "\$NP_LOCATION" ] && NP_LOCATION="\$HOME"
|
|
|
|
|
NP_LOCATION="\$(readlink -f "\$NP_LOCATION")"
|
|
|
|
|
dir="\$NP_LOCATION/.nix-portable"
|
|
|
|
|
|
|
|
|
|
# Create NP_LOCATION and remove sgid bit
|
|
|
|
|
mkdir -p \$dir
|
|
|
|
|
if [ ! -z "\$BSC_MACHINE" ]; then
|
|
|
|
|
# Attempt to avoid issues with sgid folders
|
|
|
|
|
chmod g-s \$dir
|
|
|
|
|
chgrp bsc \$dir
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
store="\$dir/nix/store"
|
|
|
|
|
# create /nix/var/nix to prevent nix from falling back to chroot store.
|
|
|
|
|
mkdir -p \$dir/{bin,nix/var/nix,nix/store}
|
|
|
|
|
|
|
|
|
|
# create minimal drv file for nix to spawn a nix shell
|
|
|
|
|
echo 'builtins.derivation {name="foo"; builder="/bin/sh"; args = ["-c" "echo hello \> \\\$out"]; system=builtins.currentSystem;}' > "\$dir/mini-drv.nix"
|
|
|
|
|
|
|
|
|
|
# the fingerprint being present inside a file indicates that
|
|
|
|
|
# this version of nix-portable has already been initialized
|
|
|
|
|
if test -e \$dir/conf/fingerprint && [ "\$(cat \$dir/conf/fingerprint)" == "\$fingerprint" ]; then
|
|
|
|
|
newNPVersion=false
|
|
|
|
|
else
|
|
|
|
|
newNPVersion=true
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
# Nix portable ships its own nix.conf
|
|
|
|
|
export NIX_CONF_DIR=\$dir/conf/
|
|
|
|
|
|
|
|
|
|
NP_CONF_SANDBOX=\''${NP_CONF_SANDBOX:-false}
|
|
|
|
|
NP_CONF_STORE=\''${NP_CONF_STORE:-auto}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
recreate_nix_conf(){
|
|
|
|
|
mkdir -p "\$NIX_CONF_DIR"
|
|
|
|
|
rm -f "\$NIX_CONF_DIR/nix.conf"
|
|
|
|
|
|
|
|
|
|
# static config
|
|
|
|
|
echo "build-users-group = " >> \$dir/conf/nix.conf
|
|
|
|
|
echo "experimental-features = nix-command flakes" >> \$dir/conf/nix.conf
|
|
|
|
|
echo "ignored-acls = security.selinux system.nfs4_acl" >> \$dir/conf/nix.conf
|
|
|
|
|
echo "sandbox-paths = /bin/sh=\$dir/busybox/bin/busybox" >> \$dir/conf/nix.conf
|
|
|
|
|
echo "extra-substituters = https://jungle.bsc.es/cache">> \$dir/conf/nix.conf
|
|
|
|
|
echo "extra-trusted-public-keys = jungle.bsc.es:pEc7MlAT0HEwLQYPtpkPLwRsGf80ZI26aj29zMw/HH0=" >> \$dir/conf/nix.conf
|
|
|
|
|
|
|
|
|
|
echo "extra-system-features = sys-devices" >> \$dir/conf/nix.conf
|
|
|
|
|
echo "extra-sandbox-paths = /sys/devices/system/cpu=/sys/devices/system/cpu /sys/devices/system/node=/sys/devices/system/node" >> \$dir/conf/nix.conf
|
|
|
|
|
echo "extra-trusted-users = @bsc" >> \$dir/conf/nix.conf
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# configurable config
|
|
|
|
|
echo "sandbox = \$NP_CONF_SANDBOX" >> \$dir/conf/nix.conf
|
|
|
|
|
echo "store = \$NP_CONF_STORE" >> \$dir/conf/nix.conf
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### install files
|
|
|
|
|
|
|
|
|
|
PATH_OLD="\$PATH"
|
|
|
|
|
|
|
|
|
|
# as soon as busybox is unpacked, restrict PATH to busybox to ensure reproducibility of this script
|
|
|
|
|
# only unpack binaries if necessary
|
|
|
|
|
if [ "\$newNPVersion" == "false" ]; then
|
|
|
|
|
|
|
|
|
|
debug "binaries already installed"
|
|
|
|
|
# our busybox does not run on termux, therefore we suffix the PATH only on termux
|
|
|
|
|
export PATH="\''${TERMUX_VERSION:+\$PATH:}\$dir/busybox/bin"
|
|
|
|
|
|
|
|
|
|
else
|
|
|
|
|
|
|
|
|
|
debug "installing files"
|
|
|
|
|
|
|
|
|
|
mkdir -p \$dir/emptyroot
|
|
|
|
|
|
|
|
|
|
# install busybox
|
|
|
|
|
mkdir -p \$dir/busybox/bin
|
|
|
|
|
(base64 -d> "\$dir/busybox/bin/busybox" && chmod +x "\$dir/busybox/bin/busybox") << END
|
|
|
|
|
$(cat ${busybox}/bin/busybox | base64)
|
|
|
|
|
END
|
|
|
|
|
busyBins="${toString (attrNames (filterAttrs (d: type: type == "symlink") (readDir "${inp.busybox}/bin")))}"
|
|
|
|
|
for bin in \$busyBins; do
|
|
|
|
|
[ ! -e "\$dir/busybox/bin/\$bin" ] && ln -s busybox "\$dir/busybox/bin/\$bin"
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
# our busybox does not run on termux, therefore we suffix the PATH only on termux
|
|
|
|
|
export PATH="\''${TERMUX_VERSION:+\$PATH:}\$dir/busybox/bin"
|
|
|
|
|
|
|
|
|
|
# install other binaries
|
|
|
|
|
${installBin zstd "zstd"}
|
|
|
|
|
${installBin bwrap "bwrap"}
|
|
|
|
|
${installBin nixStatic "nix"}
|
|
|
|
|
|
|
|
|
|
# install ssl cert bundle
|
|
|
|
|
unzip -poj "\$self" ${ lib.removePrefix "/" "${caBundleZstd}"} | \$dir/bin/zstd -d > \$dir/ca-bundle.crt
|
|
|
|
|
|
|
|
|
|
recreate_nix_conf
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
# Override $SHELL with nix bashInteractive
|
|
|
|
|
export SHELL="${pkgs.bashInteractive.out}/bin/bash"
|
|
|
|
|
export PS1="\n\[\033[1;32m\][\[\e]0;\u@\h: \w\a\]\u@\h:\w]\$\[\033[0m\] "
|
|
|
|
|
|
|
|
|
|
# unset bash function aliases
|
|
|
|
|
unset -f which ml module
|
|
|
|
|
|
|
|
|
|
### setup SSL
|
|
|
|
|
# find ssl certs or use from nixpkgs
|
|
|
|
|
debug "figuring out ssl certs"
|
|
|
|
|
if [ -z "\$SSL_CERT_FILE" ]; then
|
|
|
|
|
debug "SSL_CERT_FILE not defined. trying to find certs automatically"
|
|
|
|
|
if [ -e /etc/ssl/certs/ca-bundle.crt ]; then
|
|
|
|
|
export SSL_CERT_FILE=\$(realpath /etc/ssl/certs/ca-bundle.crt)
|
|
|
|
|
debug "found /etc/ssl/certs/ca-bundle.crt with real path \$SSL_CERT_FILE"
|
|
|
|
|
elif [ -e /etc/ssl/certs/ca-certificates.crt ]; then
|
|
|
|
|
export SSL_CERT_FILE=\$(realpath /etc/ssl/certs/ca-certificates.crt)
|
|
|
|
|
debug "found /etc/ssl/certs/ca-certificates.crt with real path \$SSL_CERT_FILE"
|
|
|
|
|
elif [ ! -e /etc/ssl/certs ]; then
|
|
|
|
|
debug "/etc/ssl/certs does not exist. Will use certs from nixpkgs."
|
|
|
|
|
export SSL_CERT_FILE=\$dir/ca-bundle.crt
|
|
|
|
|
else
|
|
|
|
|
debug "certs seem to reside in /etc/ssl/certs. No need to set up anything"
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
if [ -n "\$SSL_CERT_FILE" ]; then
|
|
|
|
|
sslBind="\$(realpath \$SSL_CERT_FILE) \$dir/ca-bundle.crt"
|
|
|
|
|
export SSL_CERT_FILE="\$dir/ca-bundle.crt"
|
|
|
|
|
else
|
|
|
|
|
sslBind="/etc/ssl /etc/ssl"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [ -n "\$NP_GIT" ]; then
|
|
|
|
|
echo "WARN: NP_GIT is not supported, using nix version instead"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
storePathOfFile(){
|
|
|
|
|
file=\$(realpath \$1)
|
|
|
|
|
sPath="\$(echo \$file | awk -F "/" 'BEGIN{OFS="/";}{print \$2,\$3,\$4}')"
|
|
|
|
|
echo "/\$sPath"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
collectBinds(){
|
|
|
|
|
pathsTopLevel="/boot /run /sys \$PWD /gpfs /tmp /scratch"
|
|
|
|
|
|
|
|
|
|
toBind=""
|
|
|
|
|
for p in \$pathsTopLevel; do
|
|
|
|
|
if [ -e "\$p" ]; then
|
|
|
|
|
real=\$(realpath \$p)
|
|
|
|
|
if [ -e "\$real" ]; then
|
|
|
|
|
if [[ "\$real" == /nix/store/* ]]; then
|
|
|
|
|
storePath=\$(storePathOfFile \$real)
|
|
|
|
|
toBind="\$toBind \$storePath \$storePath"
|
|
|
|
|
else
|
|
|
|
|
toBind="\$toBind \$real \$p"
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# TODO: add /var/run/dbus/system_bus_socket
|
|
|
|
|
paths="/etc/host.conf /etc/hosts /etc/hosts.equiv /etc/mtab /etc/netgroup /etc/networks /etc/passwd /etc/group /etc/nsswitch.conf /etc/resolv.conf /etc/localtime \$HOME"
|
|
|
|
|
|
|
|
|
|
for p in \$paths; do
|
|
|
|
|
if [ -e "\$p" ]; then
|
|
|
|
|
real=\$(realpath \$p)
|
|
|
|
|
if [ -e "\$real" ]; then
|
|
|
|
|
if [[ "\$real" == /nix/store/* ]]; then
|
|
|
|
|
storePath=\$(storePathOfFile \$real)
|
|
|
|
|
toBind="\$toBind \$storePath \$storePath"
|
|
|
|
|
else
|
|
|
|
|
toBind="\$toBind \$real \$real"
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
fi
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
# provide /bin/sh via the shipped busybox
|
|
|
|
|
toBind="\$toBind \$dir/busybox/bin/busybox /bin/sh"
|
|
|
|
|
toBind="\$toBind \$dir/busybox/bin/busybox /usr/bin/env"
|
|
|
|
|
|
|
|
|
|
# on termux, make sure termux packages still work inside the nix-portable environment
|
|
|
|
|
if [ -n "\$TERMUX_VERSION" ]; then
|
|
|
|
|
# binds required so termux native packages still run inside the nix-portable sandbox
|
|
|
|
|
# TODO: this doesn't quite work yet. debug and fix
|
|
|
|
|
toBind="\$toBind /system/lib64/libc.so /system/lib64/libc.so"
|
|
|
|
|
toBind="\$toBind /system/lib64/ld-android.so /system/lib64/ld-android.so"
|
|
|
|
|
toBind="\$toBind /system/lib64/libdl.so /system/lib64/libdl.so"
|
|
|
|
|
toBind="\$toBind /system/bin /system/bin"
|
|
|
|
|
toBind="\$toBind /system/lib64 /system/lib64"
|
|
|
|
|
toBind="\$toBind /apex/com.android.runtime/bin /apex/com.android.runtime/bin"
|
|
|
|
|
toBind="\$toBind /linkerconfig/ld.config.txt /linkerconfig/ld.config.txt"
|
|
|
|
|
toBind="\$toBind \$dir/ca-bundle.crt /etc/ssl/certs/ca-certificates.crt"
|
|
|
|
|
toBind="\$toBind \$(realpath \$HOME/../usr/etc/resolv.conf) /etc/resolv.conf"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
makeBindArgs(){
|
|
|
|
|
arg=\$1; shift
|
|
|
|
|
sep=\$1; shift
|
|
|
|
|
binds=""
|
|
|
|
|
while :; do
|
|
|
|
|
if [ -n "\$1" ]; then
|
|
|
|
|
from="\$1"; shift
|
|
|
|
|
to="\$1"; shift || { echo "no bind destination provided for \$from!"; exit 3; }
|
|
|
|
|
binds="\$binds \$arg \$from\$sep\$to";
|
|
|
|
|
else
|
|
|
|
|
break
|
|
|
|
|
fi
|
|
|
|
|
done
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### select container runtime
|
|
|
|
|
debug "figuring out which runtime to use"
|
|
|
|
|
[ -z "\$NP_BWRAP" ] && NP_BWRAP=\$dir/bin/bwrap
|
|
|
|
|
debug "bwrap executable: \$NP_BWRAP"
|
|
|
|
|
[ -z "\$NP_NIX" ] && NP_NIX=\$dir/bin/nix
|
|
|
|
|
debug "nix executable: \$NP_NIX"
|
|
|
|
|
debug "testing all available runtimes..."
|
|
|
|
|
if [ -z "\$NP_RUNTIME" ]; then
|
|
|
|
|
# read last automatic selected runtime from disk
|
|
|
|
|
if [ "\$newNPVersion" == "true" ]; then
|
|
|
|
|
debug "removing cached auto selected runtime"
|
|
|
|
|
rm -f "\$dir/conf/last_auto_runtime"
|
|
|
|
|
fi
|
|
|
|
|
if [ -f "\$dir/conf/last_auto_runtime" ]; then
|
|
|
|
|
last_auto_runtime="\$(cat "\$dir/conf/last_auto_runtime")"
|
|
|
|
|
else
|
|
|
|
|
last_auto_runtime=
|
|
|
|
|
fi
|
|
|
|
|
debug "last auto selected runtime: \$last_auto_runtime"
|
|
|
|
|
if [ "\$last_auto_runtime" != "" ]; then
|
|
|
|
|
NP_RUNTIME="\$last_auto_runtime"
|
|
|
|
|
# check if nix --store works
|
|
|
|
|
elif \\
|
|
|
|
|
debug "testing nix --store" \\
|
|
|
|
|
&& mkdir -p \$dir/tmp/ \\
|
|
|
|
|
&& touch \$dir/tmp/testfile \\
|
|
|
|
|
&& "\$NP_NIX" --store "\$dir/tmp/__store" shell -f "\$dir/mini-drv.nix" -c "\$dir/bin/nix" store add-file --store "\$dir/tmp/__store" "\$dir/tmp/testfile" >/dev/null 2>&3; then
|
|
|
|
|
chmod -R +w \$dir/tmp/__store
|
|
|
|
|
rm -r \$dir/tmp/__store
|
|
|
|
|
debug "nix --store works on this system -> will use nix as runtime"
|
|
|
|
|
NP_RUNTIME=nix
|
|
|
|
|
# check if bwrap works properly
|
|
|
|
|
elif \\
|
|
|
|
|
debug "nix --store failed -> testing bwrap" \\
|
|
|
|
|
&& \$NP_BWRAP --bind \$dir/emptyroot / --bind \$dir/ /nix --bind \$dir/busybox/bin/busybox "\$dir/true" "\$dir/true" 2>&3 ; then
|
|
|
|
|
debug "bwrap seems to work on this system -> will use bwrap"
|
|
|
|
|
NP_RUNTIME=bwrap
|
|
|
|
|
else
|
|
|
|
|
debug "bwrap doesn't work on this system -> will use proot"
|
|
|
|
|
NP_RUNTIME=proot
|
|
|
|
|
fi
|
|
|
|
|
echo -n "\$NP_RUNTIME" > "\$dir/conf/last_auto_runtime"
|
|
|
|
|
else
|
|
|
|
|
debug "runtime selected via NP_RUNTIME: \$NP_RUNTIME"
|
|
|
|
|
fi
|
|
|
|
|
debug "NP_RUNTIME: \$NP_RUNTIME"
|
|
|
|
|
if [ "\$NP_RUNTIME" == "nix" ]; then
|
|
|
|
|
run="\$NP_NIX shell -f \$dir/mini-drv.nix -c"
|
|
|
|
|
export PATH="\$PATH:\$store${lib.removePrefix "/nix/store" nix}/bin"
|
|
|
|
|
NP_CONF_STORE="\$dir"
|
|
|
|
|
recreate_nix_conf
|
|
|
|
|
elif [ "\$NP_RUNTIME" == "bwrap" ]; then
|
|
|
|
|
collectBinds
|
|
|
|
|
makeBindArgs --bind " " \$toBind \$sslBind
|
|
|
|
|
run="\$NP_BWRAP \$BWRAP_ARGS \\
|
|
|
|
|
--bind \$dir/emptyroot /\\
|
|
|
|
|
--dev-bind /dev /dev\\
|
|
|
|
|
--proc /proc\\
|
|
|
|
|
--bind \$dir/nix /nix\\
|
|
|
|
|
\$binds"
|
|
|
|
|
# --bind \$dir/busybox/bin/busybox /bin/sh\\
|
|
|
|
|
else
|
|
|
|
|
echo "\$NP_RUNTIME not available"
|
|
|
|
|
exit 1
|
|
|
|
|
fi
|
|
|
|
|
debug "base command will be: \$run"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### setup environment
|
|
|
|
|
export NIX_PATH="\$dir/channels:nixpkgs=\$dir/channels/nixpkgs"
|
|
|
|
|
mkdir -p \$dir/channels
|
|
|
|
|
[ -h \$dir/channels/nixpkgs ] || ln -s ${nixpkgsSrc} \$dir/channels/nixpkgs
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### install nix store
|
|
|
|
|
# Install all the nix store paths necessary for the current nix-portable version
|
|
|
|
|
# We only unpack missing store paths from the tar archive.
|
|
|
|
|
index="$(cat ${storeTar}/index)"
|
|
|
|
|
|
|
|
|
|
export missing=\$(
|
|
|
|
|
for path in \$index; do
|
|
|
|
|
basepath=\$(basename \$path)
|
|
|
|
|
if [ ! -e \$store/\$basepath ]; then
|
|
|
|
|
echo "nix/store/\$basepath"
|
|
|
|
|
fi
|
|
|
|
|
done
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
if [ -n "\$missing" ]; then
|
|
|
|
|
debug "extracting missing store paths"
|
|
|
|
|
(
|
|
|
|
|
mkdir -p \$dir/tmp \$store/
|
|
|
|
|
rm -rf \$dir/tmp/*
|
|
|
|
|
cd \$dir/tmp
|
|
|
|
|
unzip -qqp "\$self" ${ lib.removePrefix "/" "${storeTar}/tar"} \
|
|
|
|
|
| \$dir/bin/zstd -d \
|
|
|
|
|
| tar -x \$missing --strip-components 2
|
|
|
|
|
mv \$dir/tmp/* \$store/
|
|
|
|
|
)
|
|
|
|
|
rm -rf \$dir/tmp
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [ -n "\$missing" ]; then
|
|
|
|
|
debug "registering new store paths to DB"
|
|
|
|
|
reg="$(cat ${storeTar}/closureInfo/registration)"
|
|
|
|
|
cmd="\$run \$store${lib.removePrefix "/nix/store" nix}/bin/nix-store --load-db"
|
|
|
|
|
debug "running command: \$cmd"
|
|
|
|
|
echo "\$reg" | \$cmd
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### select executable
|
|
|
|
|
# the executable can either be selected by
|
|
|
|
|
# - executing './nix-portable BIN_NAME',
|
|
|
|
|
# - symlinking to nix-portable, in which case the name of the symlink selects the nix executable
|
|
|
|
|
# Alternatively the executable can be hardcoded by specifying the argument 'executable' of nix-portable's default.nix file.
|
|
|
|
|
executable="${if bundledPackage == null then "" else bundledExe}"
|
|
|
|
|
if [ "\$executable" != "" ]; then
|
|
|
|
|
bin="\$executable"
|
|
|
|
|
debug "executable is hardcoded to: \$bin"
|
|
|
|
|
|
|
|
|
|
elif [[ "\$(basename \$0)" == nix-portable* ]]; then\
|
|
|
|
|
if [ -z "\$1" ]; then
|
|
|
|
|
echo "Error: please specify the nix binary to execute"
|
|
|
|
|
echo "Alternatively symlink against \$0"
|
|
|
|
|
exit 1
|
|
|
|
|
elif [ "\$1" == "debug" ]; then
|
|
|
|
|
bin="\$(which \$2)"
|
|
|
|
|
shift; shift
|
|
|
|
|
else
|
|
|
|
|
bin="\$store${lib.removePrefix "/nix/store" nix}/bin/\$1"
|
|
|
|
|
shift
|
|
|
|
|
fi
|
|
|
|
|
# for binary selection via symlink
|
|
|
|
|
else
|
|
|
|
|
bin="\$store${lib.removePrefix "/nix/store" nix}/bin/\$(basename \$0)"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### check which runtime has been used previously
|
|
|
|
|
if [ -f "\$dir/conf/last_runtime" ]; then
|
|
|
|
|
lastRuntime=\$(cat "\$dir/conf/last_runtime")
|
|
|
|
|
else
|
|
|
|
|
lastRuntime=
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### check if nix is functional with or without sandbox
|
|
|
|
|
# sandbox-fallback is not reliable: https://github.com/NixOS/nix/issues/4719
|
|
|
|
|
if [ "\$newNPVersion" == "true" ] || [ "\$lastRuntime" != "\$NP_RUNTIME" ]; then
|
|
|
|
|
nixBin="\$(dirname \$bin)/nix"
|
|
|
|
|
debug "Testing if nix can build stuff without sandbox"
|
|
|
|
|
if ! \$run "\$nixBin" build --no-link -f "\$dir/mini-drv.nix" --option sandbox false >&3 2>&3; then
|
|
|
|
|
echo "Fatal error: nix is unable to build packages"
|
|
|
|
|
exit 1
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
debug "Testing if nix sandbox is functional"
|
|
|
|
|
if ! \$run "\$nixBin" build --no-link -f "\$dir/mini-drv.nix" --option sandbox true >&3 2>&3; then
|
|
|
|
|
debug "Sandbox doesn't work -> disabling sandbox"
|
|
|
|
|
NP_CONF_SANDBOX=false
|
|
|
|
|
recreate_nix_conf
|
|
|
|
|
else
|
|
|
|
|
debug "Sandboxed builds work -> enabling sandbox"
|
|
|
|
|
NP_CONF_SANDBOX=true
|
|
|
|
|
recreate_nix_conf
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### save fingerprint and lastRuntime
|
|
|
|
|
if [ "\$newNPVersion" == "true" ]; then
|
|
|
|
|
echo -n "\$fingerprint" > "\$dir/conf/fingerprint"
|
|
|
|
|
fi
|
|
|
|
|
if [ "\$lastRuntime" != \$NP_RUNTIME ]; then
|
|
|
|
|
echo -n \$NP_RUNTIME > "\$dir/conf/last_runtime"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### set PATH
|
|
|
|
|
export PATH="\$dir/busybox/bin"
|
|
|
|
|
export PATH="\$PATH:\$store${lib.removePrefix "/nix/store" nix}/bin"
|
|
|
|
|
|
|
|
|
|
### install programs via nix
|
|
|
|
|
${concatMapStringsSep "\n" installDynamic bootstrapPrograms}
|
|
|
|
|
|
|
|
|
|
### print elapsed time
|
|
|
|
|
end=\$(date +%s%N) # end time in nanoseconds
|
|
|
|
|
# time elapsed in millis with two decimal places
|
|
|
|
|
|
|
|
|
|
# print stats about initialization time of nix-portable
|
|
|
|
|
# skipt for termux, as it doesn't have bc installed
|
|
|
|
|
if [ -z "\$TERMUX_VERSION" ]; then
|
|
|
|
|
elapsed=\$(echo "scale=2; (\$end - \$start)/1000000" | bc)
|
|
|
|
|
debug "Time to initialize nix-portable: \$elapsed millis"
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### run commands
|
|
|
|
|
[ -z "\$NP_RUN" ] && NP_RUN="\$run"
|
|
|
|
|
cmd="\$NP_RUN \$bin \$@"
|
|
|
|
|
debug "running command: \$cmd"
|
|
|
|
|
exec \$NP_RUN \$bin "\$@"
|
|
|
|
|
exit
|
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
runtimeScriptEscaped = replaceStrings ["\""] ["\\\""] runtimeScript;
|
|
|
|
|
|
|
|
|
|
nixPortable = pkgs.runCommand pname {
|
|
|
|
|
nativeBuildInputs = [unixtools.xxd unzip pkgs.zip];
|
|
|
|
|
|
|
|
|
|
meta = {
|
|
|
|
|
homepage = "https://github.com/DavHau/nix-portable";
|
|
|
|
|
description = "Nix - Static, Permissionless, Installation-free, Pre-configured for mn5";
|
|
|
|
|
maintainers = with lib.maintainers.bsc; [ abonerib ];
|
|
|
|
|
platforms = lib.platforms.linux;
|
|
|
|
|
license = lib.licenses.mit;
|
|
|
|
|
};
|
|
|
|
|
} ''
|
|
|
|
|
mkdir -p $out/bin
|
|
|
|
|
echo "${runtimeScriptEscaped}" > $out/bin/nix-portable.zip
|
|
|
|
|
xxd $out/bin/nix-portable.zip | tail
|
|
|
|
|
|
|
|
|
|
sizeA=$(printf "%08x" `stat -c "%s" $out/bin/nix-portable.zip` | tac -rs ..)
|
|
|
|
|
echo 504b 0304 0000 0000 0000 0000 0000 0000 | xxd -r -p >> $out/bin/nix-portable.zip
|
|
|
|
|
echo 0000 0000 0000 0000 0000 0200 0000 4242 | xxd -r -p >> $out/bin/nix-portable.zip
|
|
|
|
|
|
|
|
|
|
sizeB=$(printf "%08x" `stat -c "%s" $out/bin/nix-portable.zip` | tac -rs ..)
|
|
|
|
|
echo 504b 0102 0000 0000 0000 0000 0000 0000 | xxd -r -p >> $out/bin/nix-portable.zip
|
|
|
|
|
echo 0000 0000 0000 0000 0000 0000 0200 0000 | xxd -r -p >> $out/bin/nix-portable.zip
|
|
|
|
|
echo 0000 0000 0000 0000 0000 $sizeA 4242 | xxd -r -p >> $out/bin/nix-portable.zip
|
|
|
|
|
|
|
|
|
|
echo 504b 0506 0000 0000 0000 0100 3000 0000 | xxd -r -p >> $out/bin/nix-portable.zip
|
|
|
|
|
echo $sizeB 0000 0000 0000 0000 0000 0000 | xxd -r -p >> $out/bin/nix-portable.zip
|
|
|
|
|
|
|
|
|
|
unzip -vl $out/bin/nix-portable.zip
|
|
|
|
|
|
|
|
|
|
zip="zip -0"
|
|
|
|
|
$zip $out/bin/nix-portable.zip ${bwrap}/bin/bwrap
|
|
|
|
|
$zip $out/bin/nix-portable.zip ${nixStatic}/bin/nix
|
|
|
|
|
$zip $out/bin/nix-portable.zip ${zstd}/bin/zstd
|
|
|
|
|
$zip $out/bin/nix-portable.zip ${storeTar}/tar
|
|
|
|
|
$zip $out/bin/nix-portable.zip ${caBundleZstd}
|
|
|
|
|
|
|
|
|
|
# create fingerprint
|
|
|
|
|
fp=$(sha256sum $out/bin/nix-portable.zip | cut -d " " -f 1)
|
|
|
|
|
sed -i "s/_FINGERPRINT_PLACEHOLDER_/$fp/g" $out/bin/nix-portable.zip
|
|
|
|
|
# fix broken zip header due to manual modification
|
|
|
|
|
zip -F $out/bin/nix-portable.zip --out $out/bin/nix-portable-fixed.zip
|
|
|
|
|
|
|
|
|
|
rm $out/bin/nix-portable.zip
|
|
|
|
|
executable=${if bundledPackage == null then "" else bundledExe}
|
|
|
|
|
if [ "$executable" == "" ]; then
|
|
|
|
|
target="$out/bin/nix-portable"
|
|
|
|
|
else
|
|
|
|
|
target="$out/bin/$(basename "$executable")"
|
|
|
|
|
fi
|
|
|
|
|
mv $out/bin/nix-portable-fixed.zip "$target"
|
|
|
|
|
chmod +x "$target"
|
|
|
|
|
'';
|
|
|
|
|
in
|
|
|
|
|
nixPortable.overrideAttrs (prev: {
|
|
|
|
|
passthru = (prev.passthru or {}) // {
|
|
|
|
|
inherit bwrap;
|
|
|
|
|
};
|
|
|
|
|
})
|