2018-03-28 13:16:13 +00:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
|
|
|
set -eu
|
|
|
|
set -o pipefail
|
|
|
|
|
2024-03-04 06:26:19 +00:00
|
|
|
# System specific settings
|
|
|
|
export NIX_FIRST_BUILD_UID="${NIX_FIRST_BUILD_UID:-30001}"
|
|
|
|
export NIX_BUILD_USER_NAME_TEMPLATE="nixbld%d"
|
|
|
|
|
2018-03-28 13:16:13 +00:00
|
|
|
readonly SERVICE_SRC=/lib/systemd/system/nix-daemon.service
|
|
|
|
readonly SERVICE_DEST=/etc/systemd/system/nix-daemon.service
|
|
|
|
|
|
|
|
readonly SOCKET_SRC=/lib/systemd/system/nix-daemon.socket
|
|
|
|
readonly SOCKET_DEST=/etc/systemd/system/nix-daemon.socket
|
|
|
|
|
2022-03-22 16:06:09 +00:00
|
|
|
readonly TMPFILES_SRC=/lib/tmpfiles.d/nix-daemon.conf
|
|
|
|
readonly TMPFILES_DEST=/etc/tmpfiles.d/nix-daemon.conf
|
2019-06-14 18:57:26 +00:00
|
|
|
|
|
|
|
# Path for the systemd override unit file to contain the proxy settings
|
|
|
|
readonly SERVICE_OVERRIDE=${SERVICE_DEST}.d/override.conf
|
|
|
|
|
|
|
|
create_systemd_override() {
|
|
|
|
header "Configuring proxy for the nix-daemon service"
|
2021-11-18 17:33:13 +00:00
|
|
|
_sudo "create directory for systemd unit override" mkdir -p "$(dirname "$SERVICE_OVERRIDE")"
|
2019-06-14 18:57:26 +00:00
|
|
|
cat <<EOF | _sudo "create systemd unit override" tee "$SERVICE_OVERRIDE"
|
|
|
|
[Service]
|
|
|
|
$1
|
|
|
|
EOF
|
|
|
|
}
|
|
|
|
|
2023-01-13 19:46:11 +00:00
|
|
|
escape_systemd_env() {
|
|
|
|
temp_var="${1//\'/\\\'}"
|
|
|
|
echo "${temp_var//\%/%%}"
|
|
|
|
}
|
|
|
|
|
2019-06-14 18:57:26 +00:00
|
|
|
# Gather all non-empty proxy environment variables into a string
|
|
|
|
create_systemd_proxy_env() {
|
|
|
|
vars="http_proxy https_proxy ftp_proxy no_proxy HTTP_PROXY HTTPS_PROXY FTP_PROXY NO_PROXY"
|
|
|
|
for v in $vars; do
|
|
|
|
if [ "x${!v:-}" != "x" ]; then
|
2023-01-13 19:46:11 +00:00
|
|
|
echo "Environment=${v}=$(escape_systemd_env ${!v})"
|
2019-06-14 18:57:26 +00:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
handle_network_proxy() {
|
|
|
|
# Create a systemd unit override with proxy environment variables
|
|
|
|
# if any proxy environment variables are not empty.
|
|
|
|
PROXY_ENV_STRING=$(create_systemd_proxy_env)
|
|
|
|
if [ -n "${PROXY_ENV_STRING}" ]; then
|
|
|
|
create_systemd_override "${PROXY_ENV_STRING}"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
poly_cure_artifacts() {
|
|
|
|
:
|
2018-03-28 13:16:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
poly_service_installed_check() {
|
|
|
|
[ "$(systemctl is-enabled nix-daemon.service)" = "linked" ] \
|
|
|
|
|| [ "$(systemctl is-enabled nix-daemon.socket)" = "enabled" ]
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_service_uninstall_directions() {
|
|
|
|
cat <<EOF
|
|
|
|
$1. Delete the systemd service and socket units
|
|
|
|
|
|
|
|
sudo systemctl stop nix-daemon.socket
|
|
|
|
sudo systemctl stop nix-daemon.service
|
|
|
|
sudo systemctl disable nix-daemon.socket
|
|
|
|
sudo systemctl disable nix-daemon.service
|
|
|
|
sudo systemctl daemon-reload
|
|
|
|
EOF
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_service_setup_note() {
|
|
|
|
cat <<EOF
|
|
|
|
- load and start a service (at $SERVICE_DEST
|
|
|
|
and $SOCKET_DEST) for nix-daemon
|
|
|
|
|
|
|
|
EOF
|
|
|
|
}
|
|
|
|
|
2020-11-27 22:42:15 +00:00
|
|
|
poly_extra_try_me_commands() {
|
2020-09-11 17:06:01 +00:00
|
|
|
if [ -e /run/systemd/system ]; then
|
|
|
|
:
|
|
|
|
else
|
|
|
|
cat <<EOF
|
|
|
|
$ sudo nix-daemon
|
|
|
|
EOF
|
|
|
|
fi
|
|
|
|
}
|
2018-03-28 13:16:13 +00:00
|
|
|
|
2020-09-11 17:06:01 +00:00
|
|
|
poly_configure_nix_daemon_service() {
|
|
|
|
if [ -e /run/systemd/system ]; then
|
2020-11-27 22:42:15 +00:00
|
|
|
task "Setting up the nix-daemon systemd service"
|
2022-03-22 16:06:09 +00:00
|
|
|
|
|
|
|
_sudo "to create the nix-daemon tmpfiles config" \
|
2023-04-20 22:36:01 +00:00
|
|
|
ln -sfn "/nix/var/nix/profiles/default$TMPFILES_SRC" "$TMPFILES_DEST"
|
2022-03-22 16:06:09 +00:00
|
|
|
|
|
|
|
_sudo "to run systemd-tmpfiles once to pick that path up" \
|
2022-03-31 19:14:53 +00:00
|
|
|
systemd-tmpfiles --create --prefix=/nix/var/nix
|
2022-03-22 16:06:09 +00:00
|
|
|
|
2020-09-11 17:06:01 +00:00
|
|
|
_sudo "to set up the nix-daemon service" \
|
|
|
|
systemctl link "/nix/var/nix/profiles/default$SERVICE_SRC"
|
|
|
|
|
|
|
|
_sudo "to set up the nix-daemon socket service" \
|
|
|
|
systemctl enable "/nix/var/nix/profiles/default$SOCKET_SRC"
|
2019-06-14 18:57:26 +00:00
|
|
|
|
2020-09-11 17:06:01 +00:00
|
|
|
handle_network_proxy
|
2018-03-28 13:16:13 +00:00
|
|
|
|
2020-09-11 17:06:01 +00:00
|
|
|
_sudo "to load the systemd unit for nix-daemon" \
|
|
|
|
systemctl daemon-reload
|
2018-03-28 13:16:13 +00:00
|
|
|
|
2020-09-11 17:06:01 +00:00
|
|
|
_sudo "to start the nix-daemon.socket" \
|
|
|
|
systemctl start nix-daemon.socket
|
2018-03-28 13:16:13 +00:00
|
|
|
|
2020-09-11 17:06:01 +00:00
|
|
|
_sudo "to start the nix-daemon.service" \
|
|
|
|
systemctl restart nix-daemon.service
|
2020-11-27 22:42:15 +00:00
|
|
|
else
|
|
|
|
reminder "I don't support your init system yet; you may want to add nix-daemon manually."
|
2020-09-11 17:06:01 +00:00
|
|
|
fi
|
2018-03-28 13:16:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
poly_group_exists() {
|
|
|
|
getent group "$1" > /dev/null 2>&1
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_group_id_get() {
|
|
|
|
getent group "$1" | cut -d: -f3
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_create_build_group() {
|
|
|
|
_sudo "Create the Nix build group, $NIX_BUILD_GROUP_NAME" \
|
|
|
|
groupadd -g "$NIX_BUILD_GROUP_ID" --system \
|
|
|
|
"$NIX_BUILD_GROUP_NAME" >&2
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_exists() {
|
|
|
|
getent passwd "$1" > /dev/null 2>&1
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_id_get() {
|
|
|
|
getent passwd "$1" | cut -d: -f3
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_hidden_get() {
|
|
|
|
echo "1"
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_hidden_set() {
|
|
|
|
true
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_home_get() {
|
|
|
|
getent passwd "$1" | cut -d: -f6
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_home_set() {
|
|
|
|
_sudo "in order to give $1 a safe home directory" \
|
|
|
|
usermod --home "$2" "$1"
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_note_get() {
|
|
|
|
getent passwd "$1" | cut -d: -f5
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_note_set() {
|
|
|
|
_sudo "in order to give $1 a useful comment" \
|
|
|
|
usermod --comment "$2" "$1"
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_shell_get() {
|
|
|
|
getent passwd "$1" | cut -d: -f7
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_shell_set() {
|
|
|
|
_sudo "in order to prevent $1 from logging in" \
|
|
|
|
usermod --shell "$2" "$1"
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_in_group_check() {
|
|
|
|
groups "$1" | grep -q "$2" > /dev/null 2>&1
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_in_group_set() {
|
|
|
|
_sudo "Add $1 to the $2 group"\
|
|
|
|
usermod --append --groups "$2" "$1"
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_primary_group_get() {
|
|
|
|
getent passwd "$1" | cut -d: -f4
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_user_primary_group_set() {
|
|
|
|
_sudo "to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership)" \
|
|
|
|
usermod --gid "$2" "$1"
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
poly_create_build_user() {
|
|
|
|
username=$1
|
|
|
|
uid=$2
|
|
|
|
builder_num=$3
|
|
|
|
|
|
|
|
_sudo "Creating the Nix build user, $username" \
|
|
|
|
useradd \
|
|
|
|
--home-dir /var/empty \
|
|
|
|
--comment "Nix build user $builder_num" \
|
|
|
|
--gid "$NIX_BUILD_GROUP_ID" \
|
|
|
|
--groups "$NIX_BUILD_GROUP_NAME" \
|
|
|
|
--no-user-group \
|
|
|
|
--system \
|
|
|
|
--shell /sbin/nologin \
|
|
|
|
--uid "$uid" \
|
|
|
|
--password "!" \
|
|
|
|
"$username"
|
|
|
|
}
|
2020-11-27 22:42:15 +00:00
|
|
|
|
|
|
|
poly_prepare_to_install() {
|
|
|
|
:
|
|
|
|
}
|