2020-11-27 22:42:15 +00:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
set -eu
|
|
|
|
set -o pipefail
|
2019-12-15 15:43:43 +00:00
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
# I'm a little agnostic on the choices, but supporting a wide
|
|
|
|
# slate of uses for now, including:
|
|
|
|
# - import-only: `. create-darwin-volume.sh no-main[ ...]`
|
|
|
|
# - legacy: `./create-darwin-volume.sh` or `. create-darwin-volume.sh`
|
|
|
|
# (both will run main())
|
|
|
|
# - external alt-routine: `./create-darwin-volume.sh no-main func[ ...]`
|
|
|
|
if [ "${1-}" = "no-main" ]; then
|
|
|
|
shift
|
|
|
|
readonly _CREATE_VOLUME_NO_MAIN=1
|
|
|
|
else
|
|
|
|
readonly _CREATE_VOLUME_NO_MAIN=0
|
|
|
|
# declare some things we expect to inherit from install-multi-user
|
|
|
|
# I don't love this (because it's a bit of a kludge).
|
|
|
|
#
|
|
|
|
# CAUTION: (Dec 19 2020)
|
|
|
|
# This is a stopgap. It doesn't cover the full slate of
|
|
|
|
# identifiers we inherit--just those necessary to:
|
|
|
|
# - avoid breaking direct invocations of this script (here/now)
|
|
|
|
# - avoid hard-to-reverse structural changes before the call to rm
|
|
|
|
# single-user support is verified
|
|
|
|
#
|
|
|
|
# In the near-mid term, I (personally) think we should:
|
|
|
|
# - decide to deprecate the direct call and add a notice
|
|
|
|
# - fold all of this into install-darwin-multi-user.sh
|
|
|
|
# - intentionally remove the old direct-invocation form (kill the
|
|
|
|
# routine, replace this script w/ deprecation notice and a note
|
|
|
|
# on the remove-after date)
|
|
|
|
#
|
|
|
|
readonly NIX_ROOT="${NIX_ROOT:-/nix}"
|
|
|
|
|
|
|
|
_sudo() {
|
|
|
|
shift # throw away the 'explanation'
|
|
|
|
/usr/bin/sudo "$@"
|
|
|
|
}
|
|
|
|
failure() {
|
|
|
|
if [ "$*" = "" ]; then
|
|
|
|
cat
|
|
|
|
else
|
|
|
|
echo "$@"
|
|
|
|
fi
|
|
|
|
exit 1
|
|
|
|
}
|
|
|
|
task() {
|
|
|
|
echo "$@"
|
|
|
|
}
|
|
|
|
fi
|
2019-12-15 15:43:43 +00:00
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
# usually "disk1"
|
2020-09-08 05:45:27 +00:00
|
|
|
root_disk_identifier() {
|
2020-11-27 22:42:15 +00:00
|
|
|
# For performance (~10ms vs 280ms) I'm parsing 'diskX' from stat output
|
|
|
|
# (~diskXsY)--but I'm retaining the more-semantic approach since
|
|
|
|
# it documents intent better.
|
|
|
|
# /usr/sbin/diskutil info -plist / | xmllint --xpath "/plist/dict/key[text()='ParentWholeDisk']/following-sibling::string[1]/text()" -
|
|
|
|
#
|
|
|
|
local special_device
|
|
|
|
special_device="$(/usr/bin/stat -f "%Sd" /)"
|
|
|
|
echo "${special_device%s[0-9]*}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# make it easy to play w/ 'Case-sensitive APFS'
|
|
|
|
readonly NIX_VOLUME_FS="${NIX_VOLUME_FS:-APFS}"
|
|
|
|
readonly NIX_VOLUME_LABEL="${NIX_VOLUME_LABEL:-Nix Store}"
|
|
|
|
# Strongly assuming we'll make a volume on the device / is on
|
|
|
|
# But you can override NIX_VOLUME_USE_DISK to create it on some other device
|
|
|
|
readonly NIX_VOLUME_USE_DISK="${NIX_VOLUME_USE_DISK:-$(root_disk_identifier)}"
|
|
|
|
NIX_VOLUME_USE_SPECIAL="${NIX_VOLUME_USE_SPECIAL:-}"
|
|
|
|
NIX_VOLUME_USE_UUID="${NIX_VOLUME_USE_UUID:-}"
|
|
|
|
readonly NIX_VOLUME_MOUNTD_DEST="${NIX_VOLUME_MOUNTD_DEST:-/Library/LaunchDaemons/org.nixos.darwin-store.plist}"
|
|
|
|
|
|
|
|
if /usr/bin/fdesetup isactive >/dev/null; then
|
|
|
|
test_filevault_in_use() { return 0; }
|
|
|
|
# no readonly; we may modify if user refuses from cure_volume
|
|
|
|
NIX_VOLUME_DO_ENCRYPT="${NIX_VOLUME_DO_ENCRYPT:-1}"
|
|
|
|
else
|
|
|
|
test_filevault_in_use() { return 1; }
|
|
|
|
NIX_VOLUME_DO_ENCRYPT="${NIX_VOLUME_DO_ENCRYPT:-0}"
|
|
|
|
fi
|
|
|
|
|
|
|
|
should_encrypt_volume() {
|
|
|
|
test_filevault_in_use && (( NIX_VOLUME_DO_ENCRYPT == 1 ))
|
2019-12-15 15:43:43 +00:00
|
|
|
}
|
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
substep() {
|
|
|
|
printf " %s\n" "" "- $1" "" "${@:2}"
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
volumes_labeled() {
|
|
|
|
local label="$1"
|
|
|
|
xsltproc --novalid --stringparam label "$label" - <(/usr/sbin/ioreg -ra -c "AppleAPFSVolume") <<'EOF'
|
|
|
|
<xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0">
|
|
|
|
<xsl:output method="text"/>
|
|
|
|
<xsl:template match="/">
|
|
|
|
<xsl:apply-templates select="/plist/array/dict/key[text()='IORegistryEntryName']/following-sibling::*[1][text()=$label]/.."/>
|
|
|
|
</xsl:template>
|
|
|
|
<xsl:template match="dict">
|
|
|
|
<xsl:apply-templates match="string" select="key[text()='BSD Name']/following-sibling::*[1]"/>
|
|
|
|
<xsl:text>=</xsl:text>
|
|
|
|
<xsl:apply-templates match="string" select="key[text()='UUID']/following-sibling::*[1]"/>
|
|
|
|
<xsl:text>
</xsl:text>
|
|
|
|
</xsl:template>
|
|
|
|
</xsl:stylesheet>
|
|
|
|
EOF
|
|
|
|
# I cut label out of the extracted values, but here it is for reference:
|
|
|
|
# <xsl:apply-templates match="string" select="key[text()='IORegistryEntryName']/following-sibling::*[1]"/>
|
|
|
|
# <xsl:text>=</xsl:text>
|
|
|
|
}
|
|
|
|
|
|
|
|
right_disk() {
|
|
|
|
local volume_special="$1" # (i.e., disk1s7)
|
|
|
|
[[ "$volume_special" == "$NIX_VOLUME_USE_DISK"s* ]]
|
|
|
|
}
|
|
|
|
|
|
|
|
right_volume() {
|
|
|
|
local volume_special="$1" # (i.e., disk1s7)
|
|
|
|
# if set, it must match; otherwise ensure it's on the right disk
|
|
|
|
if [ -z "$NIX_VOLUME_USE_SPECIAL" ]; then
|
|
|
|
if right_disk "$volume_special"; then
|
|
|
|
NIX_VOLUME_USE_SPECIAL="$volume_special" # latch on
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
return 1
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
[ "$volume_special" = "$NIX_VOLUME_USE_SPECIAL" ]
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
right_uuid() {
|
|
|
|
local volume_uuid="$1"
|
|
|
|
# if set, it must match; otherwise allow
|
|
|
|
if [ -z "$NIX_VOLUME_USE_UUID" ]; then
|
|
|
|
NIX_VOLUME_USE_UUID="$volume_uuid" # latch on
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
[ "$volume_uuid" = "$NIX_VOLUME_USE_UUID" ]
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
cure_volumes() {
|
|
|
|
local found volume special uuid
|
|
|
|
# loop just in case they have more than one volume
|
|
|
|
# (nothing stops you from doing this)
|
|
|
|
for volume in $(volumes_labeled "$NIX_VOLUME_LABEL"); do
|
|
|
|
# CAUTION: this could (maybe) be a more normal read
|
|
|
|
# loop like:
|
|
|
|
# while IFS== read -r special uuid; do
|
|
|
|
# # ...
|
|
|
|
# done <<<"$(volumes_labeled "$NIX_VOLUME_LABEL")"
|
|
|
|
#
|
|
|
|
# I did it with for to skirt a problem with the obvious
|
|
|
|
# pattern replacing stdin and causing user prompts
|
|
|
|
# inside (which also use read and access stdin) to skip
|
|
|
|
#
|
|
|
|
# If there's an existing encrypted volume we can't find
|
|
|
|
# in keychain, the user never gets prompted to delete
|
|
|
|
# the volume, and the install fails.
|
|
|
|
#
|
|
|
|
# If you change this, a human needs to test a very
|
|
|
|
# specific scenario: you already have an encrypted
|
|
|
|
# Nix Store volume, and have deleted its credential
|
|
|
|
# from keychain. Ensure the script asks you if it can
|
|
|
|
# delete the volume, and then prompts for your sudo
|
|
|
|
# password to confirm.
|
|
|
|
#
|
|
|
|
# shellcheck disable=SC1097
|
|
|
|
IFS== read -r special uuid <<< "$volume"
|
|
|
|
# take the first one that's on the right disk
|
|
|
|
if [ -z "${found:-}" ]; then
|
|
|
|
if right_volume "$special" && right_uuid "$uuid"; then
|
|
|
|
cure_volume "$special" "$uuid"
|
|
|
|
found="${special} (${uuid})"
|
|
|
|
else
|
|
|
|
warning <<EOF
|
|
|
|
Ignoring ${special} (${uuid}) because I am looking for:
|
|
|
|
disk=${NIX_VOLUME_USE_DISK} special=${NIX_VOLUME_USE_SPECIAL:-${NIX_VOLUME_USE_DISK}sX} uuid=${NIX_VOLUME_USE_UUID:-any}
|
|
|
|
EOF
|
|
|
|
# TODO: give chance to delete if ! headless?
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
warning <<EOF
|
|
|
|
Ignoring ${special} (${uuid}), already found target: $found
|
|
|
|
EOF
|
|
|
|
# TODO reminder? I feel like I want one
|
|
|
|
# idiom that reminds some warnings, or warns
|
|
|
|
# some reminders?
|
|
|
|
# TODO: if ! headless, chance to delete?
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
if [ -z "${found:-}" ]; then
|
|
|
|
readonly NIX_VOLUME_USE_SPECIAL NIX_VOLUME_USE_UUID
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
volume_encrypted() {
|
|
|
|
local volume_special="$1" # (i.e., disk1s7)
|
|
|
|
# Trying to match the first line of output; known first lines:
|
|
|
|
# No cryptographic users for <special>
|
|
|
|
# Cryptographic user for <special> (1 found)
|
|
|
|
# Cryptographic users for <special> (2 found)
|
|
|
|
/usr/sbin/diskutil apfs listCryptoUsers -plist "$volume_special" | /usr/bin/grep -q APFSCryptoUserUUID
|
2019-12-15 15:43:43 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
test_fstab() {
|
2020-11-27 22:42:15 +00:00
|
|
|
/usr/bin/grep -q "$NIX_ROOT apfs rw" /etc/fstab 2>/dev/null
|
|
|
|
}
|
|
|
|
|
|
|
|
test_nix_root_is_symlink() {
|
|
|
|
[ -L "$NIX_ROOT" ]
|
|
|
|
}
|
|
|
|
|
|
|
|
test_synthetic_conf_either(){
|
|
|
|
/usr/bin/grep -qE "^${NIX_ROOT:1}($|\t.{3,}$)" /etc/synthetic.conf 2>/dev/null
|
|
|
|
}
|
|
|
|
|
|
|
|
test_synthetic_conf_mountable() {
|
|
|
|
/usr/bin/grep -q "^${NIX_ROOT:1}$" /etc/synthetic.conf 2>/dev/null
|
|
|
|
}
|
|
|
|
|
|
|
|
test_synthetic_conf_symlinked() {
|
|
|
|
/usr/bin/grep -qE "^${NIX_ROOT:1}\t.{3,}$" /etc/synthetic.conf 2>/dev/null
|
|
|
|
}
|
|
|
|
|
|
|
|
test_nix_volume_mountd_installed() {
|
|
|
|
test -e "$NIX_VOLUME_MOUNTD_DEST"
|
2020-03-18 19:34:46 +00:00
|
|
|
}
|
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
# current volume password
|
|
|
|
test_keychain_by_uuid() {
|
|
|
|
local volume_uuid="$1"
|
|
|
|
# Note: doesn't need sudo just to check; doesn't output pw
|
|
|
|
security find-generic-password -s "$volume_uuid" &>/dev/null
|
2019-12-15 15:43:43 +00:00
|
|
|
}
|
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
get_volume_pass() {
|
|
|
|
local volume_uuid="$1"
|
|
|
|
_sudo \
|
|
|
|
"to confirm keychain has a password that unlocks this volume" \
|
|
|
|
security find-generic-password -s "$volume_uuid" -w
|
|
|
|
}
|
|
|
|
|
|
|
|
verify_volume_pass() {
|
|
|
|
local volume_special="$1" # (i.e., disk1s7)
|
|
|
|
local volume_uuid="$2"
|
|
|
|
/usr/sbin/diskutil apfs unlockVolume "$volume_special" -verify -stdinpassphrase -user "$volume_uuid"
|
|
|
|
}
|
|
|
|
|
|
|
|
volume_pass_works() {
|
|
|
|
local volume_special="$1" # (i.e., disk1s7)
|
|
|
|
local volume_uuid="$2"
|
|
|
|
get_volume_pass "$volume_uuid" | verify_volume_pass "$volume_special" "$volume_uuid"
|
2019-12-15 15:43:43 +00:00
|
|
|
}
|
|
|
|
|
2020-09-08 06:01:11 +00:00
|
|
|
# Create the paths defined in synthetic.conf, saving us a reboot.
|
2020-11-27 22:42:15 +00:00
|
|
|
create_synthetic_objects() {
|
2020-09-08 06:01:11 +00:00
|
|
|
# Big Sur takes away the -B flag we were using and replaces it
|
|
|
|
# with a -t flag that appears to do the same thing (but they
|
|
|
|
# don't behave exactly the same way in terms of return values).
|
|
|
|
# This feels a little dirty, but as far as I can tell the
|
|
|
|
# simplest way to get the right one is to just throw away stderr
|
|
|
|
# and call both... :]
|
|
|
|
{
|
|
|
|
/System/Library/Filesystems/apfs.fs/Contents/Resources/apfs.util -t || true # Big Sur
|
|
|
|
/System/Library/Filesystems/apfs.fs/Contents/Resources/apfs.util -B || true # Catalina
|
|
|
|
} >/dev/null 2>&1
|
|
|
|
}
|
|
|
|
|
2019-12-15 15:43:43 +00:00
|
|
|
test_nix() {
|
2020-11-27 22:42:15 +00:00
|
|
|
test -d "$NIX_ROOT"
|
|
|
|
}
|
|
|
|
|
|
|
|
test_voldaemon() {
|
|
|
|
test -f "$NIX_VOLUME_MOUNTD_DEST"
|
|
|
|
}
|
|
|
|
|
|
|
|
generate_mount_command() {
|
|
|
|
local cmd_type="$1" # encrypted|unencrypted
|
|
|
|
local volume_uuid mountpoint cmd=()
|
|
|
|
printf -v volume_uuid "%q" "$2"
|
|
|
|
printf -v mountpoint "%q" "$NIX_ROOT"
|
|
|
|
|
|
|
|
case "$cmd_type" in
|
|
|
|
encrypted)
|
|
|
|
cmd=(/bin/sh -c "/usr/bin/security find-generic-password -s '$volume_uuid' -w | /usr/sbin/diskutil apfs unlockVolume '$volume_uuid' -mountpoint '$mountpoint' -stdinpassphrase");;
|
|
|
|
unencrypted)
|
|
|
|
cmd=(/usr/sbin/diskutil mount -mountPoint "$mountpoint" "$volume_uuid");;
|
|
|
|
*)
|
|
|
|
failure "Invalid first arg $cmd_type to generate_mount_command";;
|
|
|
|
esac
|
|
|
|
|
|
|
|
printf " <string>%s</string>\n" "${cmd[@]}"
|
|
|
|
}
|
|
|
|
|
|
|
|
generate_mount_daemon() {
|
|
|
|
local cmd_type="$1" # encrypted|unencrypted
|
|
|
|
local volume_uuid="$2"
|
|
|
|
cat <<EOF
|
|
|
|
<?xml version="1.0" encoding="UTF-8"?>
|
|
|
|
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
|
|
|
<plist version="1.0">
|
|
|
|
<dict>
|
|
|
|
<key>RunAtLoad</key>
|
|
|
|
<true/>
|
|
|
|
<key>Label</key>
|
|
|
|
<string>org.nixos.darwin-store</string>
|
|
|
|
<key>ProgramArguments</key>
|
|
|
|
<array>
|
|
|
|
$(generate_mount_command "$cmd_type" "$volume_uuid")
|
|
|
|
</array>
|
|
|
|
</dict>
|
|
|
|
</plist>
|
|
|
|
EOF
|
|
|
|
}
|
|
|
|
|
|
|
|
_eat_bootout_err() {
|
|
|
|
/usr/bin/grep -v "Boot-out failed: 36: Operation now in progress"
|
|
|
|
}
|
|
|
|
|
|
|
|
# TODO: remove with --uninstall?
|
|
|
|
uninstall_launch_daemon_directions() {
|
|
|
|
local daemon_label="$1" # i.e., org.nixos.blah-blah
|
|
|
|
local daemon_plist="$2" # abspath
|
|
|
|
substep "Uninstall LaunchDaemon $daemon_label" \
|
|
|
|
" sudo launchctl bootout system/$daemon_label" \
|
|
|
|
" sudo rm $daemon_plist"
|
|
|
|
}
|
|
|
|
|
|
|
|
uninstall_launch_daemon_prompt() {
|
|
|
|
local daemon_label="$1" # i.e., org.nixos.blah-blah
|
|
|
|
local daemon_plist="$2" # abspath
|
|
|
|
local reason_for_daemon="$3"
|
|
|
|
cat <<EOF
|
|
|
|
|
|
|
|
The installer adds a LaunchDaemon to $reason_for_daemon: $daemon_label
|
|
|
|
EOF
|
|
|
|
if ui_confirm "Can I remove it?"; then
|
|
|
|
_sudo "to terminate the daemon" \
|
|
|
|
launchctl bootout "system/$daemon_label" 2> >(_eat_bootout_err >&2) || true
|
|
|
|
# this can "fail" with a message like:
|
|
|
|
# Boot-out failed: 36: Operation now in progress
|
|
|
|
_sudo "to remove the daemon definition" rm "$daemon_plist"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
nix_volume_mountd_uninstall_directions() {
|
|
|
|
uninstall_launch_daemon_directions "org.nixos.darwin-store" \
|
|
|
|
"$NIX_VOLUME_MOUNTD_DEST"
|
|
|
|
}
|
|
|
|
|
|
|
|
nix_volume_mountd_uninstall_prompt() {
|
|
|
|
uninstall_launch_daemon_prompt "org.nixos.darwin-store" \
|
|
|
|
"$NIX_VOLUME_MOUNTD_DEST" \
|
|
|
|
"mount your Nix volume"
|
|
|
|
}
|
|
|
|
|
|
|
|
# TODO: move nix_daemon to install-darwin-multi-user if/when uninstall_launch_daemon_prompt moves up to install-multi-user
|
|
|
|
nix_daemon_uninstall_prompt() {
|
|
|
|
uninstall_launch_daemon_prompt "org.nixos.nix-daemon" \
|
|
|
|
"$NIX_DAEMON_DEST" \
|
|
|
|
"run the nix-daemon"
|
|
|
|
}
|
|
|
|
|
|
|
|
# TODO: remove with --uninstall?
|
|
|
|
nix_daemon_uninstall_directions() {
|
|
|
|
uninstall_launch_daemon_directions "org.nixos.nix-daemon" \
|
|
|
|
"$NIX_DAEMON_DEST"
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
# TODO: remove with --uninstall?
|
|
|
|
synthetic_conf_uninstall_directions() {
|
|
|
|
# :1 to strip leading slash
|
|
|
|
substep "Remove ${NIX_ROOT:1} from /etc/synthetic.conf" \
|
|
|
|
" If nix is the only entry: sudo rm /etc/synthetic.conf" \
|
|
|
|
" Otherwise: sudo /usr/bin/sed -i '' -e '/^${NIX_ROOT:1}$/d' /etc/synthetic.conf"
|
|
|
|
}
|
|
|
|
|
|
|
|
synthetic_conf_uninstall_prompt() {
|
|
|
|
cat <<EOF
|
|
|
|
|
|
|
|
During install, I add '${NIX_ROOT:1}' to /etc/synthetic.conf, which instructs
|
|
|
|
macOS to create an empty root directory for mounting the Nix volume.
|
|
|
|
EOF
|
|
|
|
# make the edit to a copy
|
|
|
|
/usr/bin/grep -vE "^${NIX_ROOT:1}($|\t.{3,}$)" /etc/synthetic.conf > "$SCRATCH/synthetic.conf.edit"
|
|
|
|
|
|
|
|
if test_synthetic_conf_symlinked; then
|
|
|
|
warning <<EOF
|
|
|
|
|
|
|
|
/etc/synthetic.conf already contains a line instructing your system
|
|
|
|
to make '${NIX_ROOT}' as a symlink:
|
|
|
|
$(/usr/bin/grep -nE "^${NIX_ROOT:1}\t.{3,}$" /etc/synthetic.conf)
|
|
|
|
|
|
|
|
This may mean your system has/had a non-standard Nix install.
|
|
|
|
|
|
|
|
The volume-creation process in this installer is *not* compatible
|
|
|
|
with a symlinked store, so I'll have to remove this instruction to
|
|
|
|
continue.
|
|
|
|
|
|
|
|
If you want/need to keep this instruction, answer 'n' to abort.
|
|
|
|
|
|
|
|
EOF
|
|
|
|
fi
|
|
|
|
|
|
|
|
# ask to rm if this left the file empty aside from comments, else edit
|
|
|
|
if /usr/bin/diff -q <(:) <(/usr/bin/grep -v "^#" "$SCRATCH/synthetic.conf.edit") &>/dev/null; then
|
|
|
|
if confirm_rm "/etc/synthetic.conf"; then
|
|
|
|
if test_nix_root_is_symlink; then
|
|
|
|
failure >&2 <<EOF
|
|
|
|
I removed /etc/synthetic.conf, but $NIX_ROOT is already a symlink
|
|
|
|
(-> $(readlink "$NIX_ROOT")). The system should remove it when you reboot.
|
|
|
|
Once you've rebooted, run the installer again.
|
|
|
|
EOF
|
|
|
|
fi
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
if confirm_edit "$SCRATCH/synthetic.conf.edit" "/etc/synthetic.conf"; then
|
|
|
|
if test_nix_root_is_symlink; then
|
|
|
|
failure >&2 <<EOF
|
|
|
|
I edited Nix out of /etc/synthetic.conf, but $NIX_ROOT is already a symlink
|
|
|
|
(-> $(readlink "$NIX_ROOT")). The system should remove it when you reboot.
|
|
|
|
Once you've rebooted, run the installer again.
|
|
|
|
EOF
|
|
|
|
fi
|
|
|
|
return 0
|
2020-03-07 11:01:40 +00:00
|
|
|
fi
|
2019-12-15 15:43:43 +00:00
|
|
|
fi
|
2020-11-27 22:42:15 +00:00
|
|
|
# fallback instructions
|
|
|
|
echo "Manually remove nix from /etc/synthetic.conf"
|
|
|
|
return 1
|
|
|
|
}
|
2019-12-15 15:43:43 +00:00
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
add_nix_vol_fstab_line() {
|
|
|
|
local uuid="$1"
|
|
|
|
# shellcheck disable=SC1003,SC2026
|
|
|
|
local escaped_mountpoint="${NIX_ROOT/ /'\\\'040}"
|
|
|
|
shift
|
|
|
|
EDITOR="/usr/bin/ex" _sudo "to add nix to fstab" "$@" <<EOF
|
|
|
|
:a
|
|
|
|
UUID=$uuid $escaped_mountpoint apfs rw,noauto,nobrowse,suid,owners
|
|
|
|
.
|
|
|
|
:x
|
|
|
|
EOF
|
|
|
|
# TODO: preserving my notes on suid,owners above until resolved
|
|
|
|
# There *may* be some issue regarding volume ownership, see nix#3156
|
|
|
|
#
|
|
|
|
# It seems like the cheapest fix is adding "suid,owners" to fstab, but:
|
|
|
|
# - We don't have much info on this condition yet
|
|
|
|
# - I'm not certain if these cause other problems?
|
|
|
|
# - There's a "chown" component some people claim to need to fix this
|
|
|
|
# that I don't understand yet
|
|
|
|
# (Note however that I've had to add a chown step to handle
|
|
|
|
# single->multi-user reinstalls, which may cover this)
|
|
|
|
#
|
|
|
|
# I'm not sure if it's safe to approach this way?
|
|
|
|
#
|
|
|
|
# I think I think the most-proper way to test for it is:
|
|
|
|
# diskutil info -plist "$NIX_VOLUME_LABEL" | xmllint --xpath "(/plist/dict/key[text()='GlobalPermissionsEnabled'])/following-sibling::*[1][name()='true']" -; echo $?
|
|
|
|
#
|
|
|
|
# There's also `sudo /usr/sbin/vsdbutil -c /path` (which is much faster, but is also
|
|
|
|
# deprecated and needs minor parsing).
|
|
|
|
#
|
|
|
|
# If no one finds a problem with doing so, I think the simplest approach
|
|
|
|
# is to just eagerly set this. I found a few imperative approaches:
|
|
|
|
# (diskutil enableOwnership, ~100ms), a cheap one (/usr/sbin/vsdbutil -a, ~40-50ms),
|
|
|
|
# a very cheap one (append the internal format to /var/db/volinfo.database).
|
|
|
|
#
|
|
|
|
# But vsdbutil's deprecation notice suggests using fstab, so I want to
|
|
|
|
# give that a whirl first.
|
|
|
|
#
|
|
|
|
# TODO: when this is workable, poke infinisil about reproducing the issue
|
|
|
|
# and confirming this fix?
|
|
|
|
}
|
|
|
|
|
|
|
|
delete_nix_vol_fstab_line() {
|
|
|
|
# TODO: I'm scaffolding this to handle the new nix volumes
|
|
|
|
# but it might be nice to generalize a smidge further to
|
|
|
|
# go ahead and set up a pattern for curing "old" things
|
|
|
|
# we no longer do?
|
|
|
|
EDITOR="/usr/bin/patch" _sudo "to cut nix from fstab" "$@" < <(/usr/bin/diff /etc/fstab <(/usr/bin/grep -v "$NIX_ROOT apfs rw" /etc/fstab))
|
|
|
|
# leaving some parts out of the grep; people may fiddle this a little?
|
|
|
|
}
|
|
|
|
|
|
|
|
# TODO: hope to remove with --uninstall
|
|
|
|
fstab_uninstall_directions() {
|
|
|
|
substep "Remove ${NIX_ROOT} from /etc/fstab" \
|
|
|
|
" If nix is the only entry: sudo rm /etc/fstab" \
|
|
|
|
" Otherwise, run 'sudo /usr/sbin/vifs' to remove the nix line"
|
|
|
|
}
|
|
|
|
|
|
|
|
fstab_uninstall_prompt() {
|
|
|
|
cat <<EOF
|
|
|
|
During install, I add '${NIX_ROOT}' to /etc/fstab so that macOS knows what
|
|
|
|
mount options to use for the Nix volume.
|
|
|
|
EOF
|
|
|
|
cp /etc/fstab "$SCRATCH/fstab.edit"
|
|
|
|
# technically doesn't need the _sudo path, but throwing away the
|
|
|
|
# output is probably better than mostly-duplicating the code...
|
|
|
|
delete_nix_vol_fstab_line patch "$SCRATCH/fstab.edit" &>/dev/null
|
|
|
|
|
|
|
|
# if the patch test edit, minus comment lines, is equal to empty (:)
|
|
|
|
if /usr/bin/diff -q <(:) <(/usr/bin/grep -v "^#" "$SCRATCH/fstab.edit") &>/dev/null; then
|
|
|
|
# this edit would leave it empty; propose deleting it
|
|
|
|
if confirm_rm "/etc/fstab"; then
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
echo "Remove nix from /etc/fstab (or remove the file)"
|
2020-03-07 11:01:40 +00:00
|
|
|
fi
|
2020-11-27 22:42:15 +00:00
|
|
|
else
|
|
|
|
echo "I might be able to help you make this edit. Here's the diff:"
|
|
|
|
if ! _diff "/etc/fstab" "$SCRATCH/fstab.edit" && ui_confirm "Does the change above look right?"; then
|
|
|
|
delete_nix_vol_fstab_line /usr/sbin/vifs
|
|
|
|
else
|
|
|
|
echo "Remove nix from /etc/fstab (or remove the file)"
|
2020-03-07 11:01:40 +00:00
|
|
|
fi
|
2019-12-15 15:43:43 +00:00
|
|
|
fi
|
2020-11-27 22:42:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
remove_volume() {
|
|
|
|
local volume_special="$1" # (i.e., disk1s7)
|
|
|
|
_sudo "to unmount the Nix volume" \
|
|
|
|
/usr/sbin/diskutil unmount force "$volume_special" || true # might not be mounted
|
|
|
|
_sudo "to delete the Nix volume" \
|
|
|
|
/usr/sbin/diskutil apfs deleteVolume "$volume_special"
|
|
|
|
}
|
2019-12-15 15:43:43 +00:00
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
# aspiration: robust enough to both fix problems
|
|
|
|
# *and* update older darwin volumes
|
|
|
|
cure_volume() {
|
|
|
|
local volume_special="$1" # (i.e., disk1s7)
|
|
|
|
local volume_uuid="$2"
|
|
|
|
header "Found existing Nix volume"
|
|
|
|
row " special" "$volume_special"
|
|
|
|
row " uuid" "$volume_uuid"
|
|
|
|
|
|
|
|
if volume_encrypted "$volume_special"; then
|
|
|
|
row "encrypted" "yes"
|
|
|
|
if volume_pass_works "$volume_special" "$volume_uuid"; then
|
|
|
|
NIX_VOLUME_DO_ENCRYPT=0
|
|
|
|
ok "Found a working decryption password in keychain :)"
|
|
|
|
echo ""
|
|
|
|
else
|
|
|
|
# - this is a volume we made, and
|
|
|
|
# - the user encrypted it on their own
|
|
|
|
# - something deleted the credential
|
|
|
|
# - this is an old or BYO volume and the pw
|
|
|
|
# just isn't somewhere we can find it.
|
|
|
|
#
|
|
|
|
# We're going to explain why we're freaking out
|
|
|
|
# and prompt them to either delete the volume
|
|
|
|
# (requiring a sudo auth), or abort to fix
|
|
|
|
warning <<EOF
|
|
|
|
|
|
|
|
This volume is encrypted, but I don't see a password to decrypt it.
|
|
|
|
The quick fix is to let me delete this volume and make you a new one.
|
|
|
|
If that's okay, enter your (sudo) password to continue. If not, you
|
|
|
|
can ensure the decryption password is in your system keychain with a
|
|
|
|
"Where" (service) field set to this volume's UUID:
|
|
|
|
$volume_uuid
|
|
|
|
EOF
|
|
|
|
if password_confirm "delete this volume"; then
|
|
|
|
remove_volume "$volume_special"
|
2020-05-15 02:59:10 +00:00
|
|
|
else
|
2020-11-27 22:42:15 +00:00
|
|
|
# TODO: this is a good design case for a warn-and
|
|
|
|
# remind idiom...
|
|
|
|
failure <<EOF
|
|
|
|
Your Nix volume is encrypted, but I couldn't find its password. Either:
|
|
|
|
- Delete or rename the volume out of the way
|
|
|
|
- Ensure its decryption password is in the system keychain with a
|
|
|
|
"Where" (service) field set to this volume's UUID:
|
|
|
|
$volume_uuid
|
|
|
|
EOF
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
elif test_filevault_in_use; then
|
|
|
|
row "encrypted" "no"
|
|
|
|
warning <<EOF
|
|
|
|
FileVault is on, but your $NIX_VOLUME_LABEL volume isn't encrypted.
|
|
|
|
EOF
|
|
|
|
# if we're interactive, give them a chance to
|
|
|
|
# encrypt the volume. If not, /shrug
|
|
|
|
if ! headless && (( NIX_VOLUME_DO_ENCRYPT == 1 )); then
|
|
|
|
if ui_confirm "Should I encrypt it and add the decryption key to your keychain?"; then
|
|
|
|
encrypt_volume "$volume_uuid" "$NIX_VOLUME_LABEL"
|
|
|
|
NIX_VOLUME_DO_ENCRYPT=0
|
|
|
|
else
|
|
|
|
NIX_VOLUME_DO_ENCRYPT=0
|
|
|
|
reminder "FileVault is on, but your $NIX_VOLUME_LABEL volume isn't encrypted."
|
2020-05-15 02:59:10 +00:00
|
|
|
fi
|
2020-03-26 20:51:13 +00:00
|
|
|
fi
|
2019-12-15 15:43:43 +00:00
|
|
|
else
|
2020-11-27 22:42:15 +00:00
|
|
|
row "encrypted" "no"
|
2019-12-15 15:43:43 +00:00
|
|
|
fi
|
2020-11-27 22:42:15 +00:00
|
|
|
}
|
2019-12-15 15:43:43 +00:00
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
remove_volume_artifacts() {
|
|
|
|
if test_synthetic_conf_either; then
|
|
|
|
# NIX_ROOT is in synthetic.conf
|
|
|
|
if synthetic_conf_uninstall_prompt; then
|
|
|
|
# TODO: moot until we tackle uninstall, but when we're
|
|
|
|
# actually uninstalling, we should issue:
|
|
|
|
# reminder "macOS will clean up the empty mount-point directory at $NIX_ROOT on reboot."
|
|
|
|
:
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
if test_fstab; then
|
|
|
|
fstab_uninstall_prompt
|
|
|
|
fi
|
|
|
|
|
|
|
|
if test_nix_volume_mountd_installed; then
|
|
|
|
nix_volume_mountd_uninstall_prompt
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
setup_synthetic_conf() {
|
|
|
|
if test_nix_root_is_symlink; then
|
|
|
|
if ! test_synthetic_conf_symlinked; then
|
|
|
|
failure >&2 <<EOF
|
|
|
|
error: $NIX_ROOT is a symlink (-> $(readlink "$NIX_ROOT")).
|
|
|
|
Please remove it. If nix is in /etc/synthetic.conf, remove it and reboot.
|
|
|
|
EOF
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
if ! test_synthetic_conf_mountable; then
|
|
|
|
task "Configuring /etc/synthetic.conf to make a mount-point at $NIX_ROOT" >&2
|
|
|
|
# technically /etc/synthetic.d/nix is supported in Big Sur+
|
|
|
|
# but handling both takes even more code...
|
|
|
|
_sudo "to add Nix to /etc/synthetic.conf" \
|
|
|
|
/usr/bin/ex /etc/synthetic.conf <<EOF
|
|
|
|
:a
|
|
|
|
${NIX_ROOT:1}
|
|
|
|
.
|
|
|
|
:x
|
|
|
|
EOF
|
|
|
|
if ! test_synthetic_conf_mountable; then
|
|
|
|
failure "error: failed to configure synthetic.conf" >&2
|
|
|
|
fi
|
|
|
|
create_synthetic_objects
|
|
|
|
if ! test_nix; then
|
|
|
|
failure >&2 <<EOF
|
|
|
|
error: failed to bootstrap $NIX_ROOT
|
|
|
|
If you enabled FileVault after booting, this is likely a known issue
|
|
|
|
with macOS that you'll have to reboot to fix. If you didn't enable FV,
|
|
|
|
though, please open an issue describing how the system that you see
|
|
|
|
this error on was set up.
|
|
|
|
EOF
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
setup_fstab() {
|
|
|
|
local volume_uuid="$1"
|
|
|
|
# fstab used to be responsible for mounting the volume. Now the last
|
|
|
|
# step adds a LaunchDaemon responsible for mounting. This is technically
|
|
|
|
# redundant for mounting, but diskutil appears to pick up mount options
|
|
|
|
# from fstab (and diskutil's support for specifying them directly is not
|
|
|
|
# consistent across versions/subcommands).
|
2019-12-15 15:43:43 +00:00
|
|
|
if ! test_fstab; then
|
2020-11-27 22:42:15 +00:00
|
|
|
task "Configuring /etc/fstab to specify volume mount options" >&2
|
|
|
|
add_nix_vol_fstab_line "$volume_uuid" /usr/sbin/vifs
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
encrypt_volume() {
|
|
|
|
local volume_uuid="$1"
|
|
|
|
local volume_label="$2"
|
|
|
|
local password
|
|
|
|
# Note: mount/unmount are late additions to support the right order
|
|
|
|
# of operations for creating the volume and then baking its uuid into
|
|
|
|
# other artifacts; not as well-trod wrt to potential errors, race
|
|
|
|
# conditions, etc.
|
|
|
|
|
|
|
|
/usr/sbin/diskutil mount "$volume_label"
|
|
|
|
|
|
|
|
password="$(/usr/bin/xxd -l 32 -p -c 256 /dev/random)"
|
|
|
|
_sudo "to add your Nix volume's password to Keychain" \
|
|
|
|
/usr/bin/security -i <<EOF
|
|
|
|
add-generic-password -a "$volume_label" -s "$volume_uuid" -l "$volume_label encryption password" -D "Encrypted volume password" -j "Added automatically by the Nix installer for use by $NIX_VOLUME_MOUNTD_DEST" -w "$password" -T /System/Library/CoreServices/APFSUserAgent -T /System/Library/CoreServices/CSUserAgent -T /usr/bin/security "/Library/Keychains/System.keychain"
|
|
|
|
EOF
|
|
|
|
builtin printf "%s" "$password" | _sudo "to encrypt your Nix volume" \
|
|
|
|
/usr/sbin/diskutil apfs encryptVolume "$volume_label" -user disk -stdinpassphrase
|
|
|
|
|
|
|
|
/usr/sbin/diskutil unmount force "$volume_label"
|
|
|
|
}
|
|
|
|
|
|
|
|
create_volume() {
|
|
|
|
# Notes:
|
|
|
|
# 1) using `-nomount` instead of `-mountpoint "$NIX_ROOT"` to get
|
|
|
|
# its UUID and set mount opts in fstab before first mount
|
|
|
|
#
|
|
|
|
# 2) system is in some sense less secure than user keychain... (it's
|
|
|
|
# possible to read the password for decrypting the keychain) but
|
|
|
|
# the user keychain appears to be available too late. As far as I
|
|
|
|
# can tell, the file with this password (/var/db/SystemKey) is
|
|
|
|
# inside the FileVault envelope. If that isn't true, it may make
|
|
|
|
# sense to store the password inside the envelope?
|
|
|
|
#
|
|
|
|
# 3) At some point it would be ideal to have a small binary to serve
|
|
|
|
# as the daemon itself, and for it to replace /usr/bin/security here.
|
|
|
|
#
|
|
|
|
# 4) *UserAgent exemptions should let the system seamlessly supply the
|
|
|
|
# password if noauto is removed from fstab entry. This is intentional;
|
|
|
|
# the user will hopefully look for help if the volume stops mounting,
|
|
|
|
# rather than failing over into subtle race-condition problems.
|
|
|
|
#
|
|
|
|
# 5) If we ever get users griping about not having space to do
|
|
|
|
# anything useful with Nix, it is possibly to specify
|
|
|
|
# `-reserve 10g` or something, which will fail w/o that much
|
|
|
|
#
|
|
|
|
# 6) getting special w/ awk may be fragile, but doing it to:
|
|
|
|
# - save time over running slow diskutil commands
|
|
|
|
# - skirt risk we grab wrong volume if multiple match
|
2021-09-01 03:33:52 +00:00
|
|
|
_sudo "to create a new APFS volume '$NIX_VOLUME_LABEL' on $NIX_VOLUME_USE_DISK" \
|
|
|
|
/usr/sbin/diskutil apfs addVolume "$NIX_VOLUME_USE_DISK" "$NIX_VOLUME_FS" "$NIX_VOLUME_LABEL" -nomount | /usr/bin/awk '/Created new APFS Volume/ {print $5}'
|
2020-11-27 22:42:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
volume_uuid_from_special() {
|
|
|
|
local volume_special="$1" # (i.e., disk1s7)
|
|
|
|
# For reasons I won't pretend to fathom, this returns 253 when it works
|
|
|
|
/System/Library/Filesystems/apfs.fs/Contents/Resources/apfs.util -k "$volume_special" || true
|
|
|
|
}
|
|
|
|
|
|
|
|
# this sometimes clears immediately, and AFAIK clears
|
|
|
|
# within about 1s. diskutil info on an unmounted path
|
|
|
|
# fails in around 50-100ms and a match takes about
|
|
|
|
# 250-300ms. I suspect it's usually ~250-750ms
|
|
|
|
await_volume() {
|
|
|
|
# caution: this could, in theory, get stuck
|
|
|
|
until /usr/sbin/diskutil info "$NIX_ROOT" &>/dev/null; do
|
|
|
|
:
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
setup_volume() {
|
|
|
|
local use_special use_uuid profile_packages
|
|
|
|
task "Creating a Nix volume" >&2
|
|
|
|
|
|
|
|
use_special="${NIX_VOLUME_USE_SPECIAL:-$(create_volume)}"
|
|
|
|
|
2021-11-04 19:09:40 +00:00
|
|
|
_sudo "to ensure the Nix volume is not mounted" \
|
|
|
|
/usr/sbin/diskutil unmount force "$use_special" || true # might not be mounted
|
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
use_uuid=${NIX_VOLUME_USE_UUID:-$(volume_uuid_from_special "$use_special")}
|
|
|
|
|
|
|
|
setup_fstab "$use_uuid"
|
|
|
|
|
|
|
|
if should_encrypt_volume; then
|
|
|
|
encrypt_volume "$use_uuid" "$NIX_VOLUME_LABEL"
|
|
|
|
setup_volume_daemon "encrypted" "$use_uuid"
|
|
|
|
# TODO: might be able to save ~60ms by caching or setting
|
|
|
|
# this somewhere rather than re-checking here.
|
|
|
|
elif volume_encrypted "$use_special"; then
|
|
|
|
setup_volume_daemon "encrypted" "$use_uuid"
|
|
|
|
else
|
|
|
|
setup_volume_daemon "unencrypted" "$use_uuid"
|
|
|
|
fi
|
|
|
|
|
|
|
|
await_volume
|
|
|
|
|
2021-08-25 00:23:18 +00:00
|
|
|
if [ "$(/usr/sbin/diskutil info -plist "$NIX_ROOT" | xmllint --xpath "(/plist/dict/key[text()='GlobalPermissionsEnabled'])/following-sibling::*[1]" -)" = "<false/>" ]; then
|
2021-09-01 03:33:52 +00:00
|
|
|
_sudo "to set enableOwnership (enabling users to own files)" \
|
|
|
|
/usr/sbin/diskutil enableOwnership "$NIX_ROOT"
|
2021-08-25 00:23:18 +00:00
|
|
|
fi
|
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
# TODO: below is a vague kludge for now; I just don't know
|
|
|
|
# what if any safe action there is to take here. Also, the
|
|
|
|
# reminder isn't very helpful.
|
|
|
|
# I'm less sure where this belongs, but it also wants mounted, pre-install
|
|
|
|
if type -p nix-env; then
|
|
|
|
profile_packages="$(nix-env --query --installed)"
|
|
|
|
# TODO: can probably do below faster w/ read
|
|
|
|
# intentionally unquoted string to eat whitespace in wc output
|
|
|
|
# shellcheck disable=SC2046,SC2059
|
|
|
|
if ! [ $(printf "$profile_packages" | /usr/bin/wc -l) = "0" ]; then
|
|
|
|
reminder <<EOF
|
|
|
|
Nix now supports only multi-user installs on Darwin/macOS, and your user's
|
|
|
|
Nix profile has some packages in it. These packages may obscure those in the
|
|
|
|
default profile, including the Nix this installer will add. You should
|
|
|
|
review these packages:
|
|
|
|
$profile_packages
|
|
|
|
EOF
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
setup_volume_daemon() {
|
|
|
|
local cmd_type="$1" # encrypted|unencrypted
|
|
|
|
local volume_uuid="$2"
|
|
|
|
if ! test_voldaemon; then
|
|
|
|
task "Configuring LaunchDaemon to mount '$NIX_VOLUME_LABEL'" >&2
|
|
|
|
_sudo "to install the Nix volume mounter" /usr/bin/ex "$NIX_VOLUME_MOUNTD_DEST" <<EOF
|
|
|
|
:a
|
|
|
|
$(generate_mount_daemon "$cmd_type" "$volume_uuid")
|
|
|
|
.
|
|
|
|
:x
|
|
|
|
EOF
|
|
|
|
|
|
|
|
# TODO: should probably alert the user if this is disabled?
|
|
|
|
_sudo "to launch the Nix volume mounter" \
|
|
|
|
launchctl bootstrap system "$NIX_VOLUME_MOUNTD_DEST" || true
|
|
|
|
# TODO: confirm whether kickstart is necessesary?
|
|
|
|
# I feel a little superstitous, but it can guard
|
|
|
|
# against multiple problems (doesn't start, old
|
|
|
|
# version still running for some reason...)
|
|
|
|
_sudo "to launch the Nix volume mounter" \
|
|
|
|
launchctl kickstart -k system/org.nixos.darwin-store
|
2019-12-15 15:43:43 +00:00
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
setup_darwin_volume() {
|
|
|
|
setup_synthetic_conf
|
|
|
|
setup_volume
|
|
|
|
}
|
|
|
|
|
|
|
|
if [ "$_CREATE_VOLUME_NO_MAIN" = 1 ]; then
|
|
|
|
if [ -n "$*" ]; then
|
|
|
|
"$@" # expose functions in case we want multiple routines?
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
# no reason to pay for bash to process this
|
|
|
|
main() {
|
|
|
|
{
|
|
|
|
echo ""
|
|
|
|
echo " ------------------------------------------------------------------ "
|
|
|
|
echo " | This installer will create a volume for the nix store and |"
|
|
|
|
echo " | configure it to mount at $NIX_ROOT. Follow these steps to uninstall. |"
|
|
|
|
echo " ------------------------------------------------------------------ "
|
|
|
|
echo ""
|
|
|
|
echo " 1. Remove the entry from fstab using 'sudo /usr/sbin/vifs'"
|
|
|
|
echo " 2. Run 'sudo launchctl bootout system/org.nixos.darwin-store'"
|
|
|
|
echo " 3. Remove $NIX_VOLUME_MOUNTD_DEST"
|
|
|
|
echo " 4. Destroy the data volume using '/usr/sbin/diskutil apfs deleteVolume'"
|
|
|
|
echo " 5. Remove the 'nix' line from /etc/synthetic.conf (or the file)"
|
|
|
|
echo ""
|
|
|
|
} >&2
|
|
|
|
|
|
|
|
setup_darwin_volume
|
|
|
|
}
|
|
|
|
|
|
|
|
main "$@"
|
|
|
|
fi
|