2021-01-24 01:40:18 +01:00
|
|
|
{ lib
|
|
|
|
, pkgs
|
2014-09-21 18:28:07 +02:00
|
|
|
, kernel ? pkgs.linux
|
2021-01-23 02:33:55 +01:00
|
|
|
, img ? pkgs.stdenv.hostPlatform.linux-kernel.target
|
2016-09-28 01:42:05 +02:00
|
|
|
, storeDir ? builtins.storeDir
|
2012-04-11 09:45:12 +02:00
|
|
|
, rootModules ?
|
2018-09-25 10:41:39 +02:00
|
|
|
[ "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_balloon" "virtio_rng" "ext4" "unix" "9p" "9pnet_virtio" "crc32c_generic" ]
|
2017-12-06 19:25:06 +01:00
|
|
|
++ pkgs.lib.optional (pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64) "rtc_cmos"
|
2011-02-01 13:11:05 +01:00
|
|
|
}:
|
2008-03-17 18:29:07 +01:00
|
|
|
|
|
|
|
with pkgs;
|
2017-12-06 19:26:16 +01:00
|
|
|
with import ../../../nixos/lib/qemu-flags.nix { inherit pkgs; };
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
rec {
|
|
|
|
|
2013-07-31 14:35:53 +02:00
|
|
|
qemu = pkgs.qemu_kvm;
|
2013-07-04 18:30:26 +02:00
|
|
|
|
2008-03-17 11:40:47 +01:00
|
|
|
modulesClosure = makeModulesClosure {
|
2011-02-01 13:11:05 +01:00
|
|
|
inherit kernel rootModules;
|
2018-01-08 14:13:28 +01:00
|
|
|
firmware = kernel;
|
2008-03-14 14:51:01 +01:00
|
|
|
};
|
|
|
|
|
2009-04-09 10:12:16 +02:00
|
|
|
|
2010-06-14 01:49:16 +02:00
|
|
|
hd = "vda"; # either "sda" or "vda"
|
|
|
|
|
2010-06-10 14:28:04 +02:00
|
|
|
initrdUtils = runCommand "initrd-utils"
|
|
|
|
{ buildInputs = [ nukeReferences ];
|
|
|
|
allowedReferences = [ "out" modulesClosure ]; # prevent accidents like glibc being included in the initrd
|
|
|
|
}
|
|
|
|
''
|
2012-01-18 21:16:00 +01:00
|
|
|
mkdir -p $out/bin
|
|
|
|
mkdir -p $out/lib
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2010-06-10 14:28:04 +02:00
|
|
|
# Copy what we need from Glibc.
|
2015-04-26 19:54:51 +02:00
|
|
|
cp -p ${pkgs.stdenv.glibc.out}/lib/ld-linux*.so.? $out/lib
|
|
|
|
cp -p ${pkgs.stdenv.glibc.out}/lib/libc.so.* $out/lib
|
|
|
|
cp -p ${pkgs.stdenv.glibc.out}/lib/libm.so.* $out/lib
|
vmTools: Fix BusyBox runtime error in initrd
With the recent update of BusyBox to version 1.29.0 in
d6aa506e3baa3565eb375bbf8a4e68c3e3134ec9 there is now a new dependency
on libresolv.
This now throws a runtime error when executing ash, eg. whenever we do
something like this:
nix-build -E 'with import ./. {}; vmTools.runInLinuxVM hello'
The resulting error will be:
.../ash: error while loading shared libraries: libresolv.so.2: cannot
open shared object file: No such file or directory
I tried to override BusyBox with enableStatic, but that still requires
parts of glibc:
Static linking against glibc, can't use --gc-sections
Trying libraries: crypt m resolv
Library crypt is not needed, excluding it
Library m is needed, can't exclude it (yet)
Library resolv is needed, can't exclude it (yet)
Library m is needed, can't exclude it (yet)
Library resolv is needed, can't exclude it (yet)
Final link with: m resolv
In the long term maybe switching to a more minimal C library such as
musl would make more sense, but for now I just added libresolv.so to the
initrd which fixes the runtime error.
Signed-off-by: aszlig <aszlig@nix.build>
Cc: @edolstra, @rbvermaa
Signed-off-by: aszlig <aszlig@nix.build>
2018-07-18 02:42:27 +02:00
|
|
|
cp -p ${pkgs.stdenv.glibc.out}/lib/libresolv.so.* $out/lib
|
2012-12-18 16:57:11 +01:00
|
|
|
|
|
|
|
# Copy BusyBox.
|
2015-01-12 17:42:59 +01:00
|
|
|
cp -pd ${pkgs.busybox}/bin/* $out/bin
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2010-06-10 14:28:04 +02:00
|
|
|
# Run patchelf to make the programs refer to the copied libraries.
|
|
|
|
for i in $out/bin/* $out/lib/*; do if ! test -L $i; then nuke-refs $i; fi; done
|
|
|
|
|
|
|
|
for i in $out/bin/*; do
|
2012-12-18 16:57:11 +01:00
|
|
|
if [ -f "$i" -a ! -L "$i" ]; then
|
|
|
|
echo "patching $i..."
|
|
|
|
patchelf --set-interpreter $out/lib/ld-linux*.so.? --set-rpath $out/lib $i || true
|
|
|
|
fi
|
2010-06-10 14:28:04 +02:00
|
|
|
done
|
|
|
|
''; # */
|
2009-03-02 14:22:31 +01:00
|
|
|
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
stage1Init = writeScript "vm-run-stage1" ''
|
2012-12-18 16:57:11 +01:00
|
|
|
#! ${initrdUtils}/bin/ash -e
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2010-06-10 14:28:04 +02:00
|
|
|
export PATH=${initrdUtils}/bin
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
mkdir /etc
|
|
|
|
echo -n > /etc/fstab
|
|
|
|
|
|
|
|
mount -t proc none /proc
|
2009-12-18 13:10:35 +01:00
|
|
|
mount -t sysfs none /sys
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2013-07-04 23:35:31 +02:00
|
|
|
echo 2 > /proc/sys/vm/panic_on_oom
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
for o in $(cat /proc/cmdline); do
|
|
|
|
case $o in
|
2008-03-17 11:40:47 +01:00
|
|
|
mountDisk=1)
|
|
|
|
mountDisk=1
|
2008-03-14 14:51:01 +01:00
|
|
|
;;
|
|
|
|
command=*)
|
|
|
|
set -- $(IFS==; echo $o)
|
|
|
|
command=$2
|
|
|
|
;;
|
|
|
|
out=*)
|
|
|
|
set -- $(IFS==; echo $o)
|
|
|
|
export out=$2
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
|
2013-08-01 14:35:04 +02:00
|
|
|
echo "loading kernel modules..."
|
2008-03-14 14:51:01 +01:00
|
|
|
for i in $(cat ${modulesClosure}/insmod-list); do
|
2018-05-04 01:04:11 +02:00
|
|
|
insmod $i || echo "warning: unable to load $i"
|
2008-03-14 14:51:01 +01:00
|
|
|
done
|
|
|
|
|
2017-12-06 19:28:43 +01:00
|
|
|
mount -t devtmpfs devtmpfs /dev
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2013-07-05 15:02:43 +02:00
|
|
|
ifconfig lo up
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
mkdir /fs
|
|
|
|
|
2008-03-17 11:40:47 +01:00
|
|
|
if test -z "$mountDisk"; then
|
2008-03-14 14:51:01 +01:00
|
|
|
mount -t tmpfs none /fs
|
|
|
|
else
|
2011-10-11 15:22:09 +02:00
|
|
|
mount /dev/${hd} /fs
|
2008-03-14 14:51:01 +01:00
|
|
|
fi
|
2010-06-14 01:49:16 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
mkdir -p /fs/dev
|
|
|
|
mount -o bind /dev /fs/dev
|
|
|
|
|
2016-09-04 15:42:43 +02:00
|
|
|
mkdir -p /fs/dev/shm /fs/dev/pts
|
2015-05-07 15:27:45 +02:00
|
|
|
mount -t tmpfs -o "mode=1777" none /fs/dev/shm
|
2016-09-04 15:42:43 +02:00
|
|
|
mount -t devpts none /fs/dev/pts
|
2015-05-07 15:27:45 +02:00
|
|
|
|
2011-08-09 16:05:40 +02:00
|
|
|
echo "mounting Nix store..."
|
2016-09-28 01:42:05 +02:00
|
|
|
mkdir -p /fs${storeDir}
|
2017-02-13 12:18:10 +01:00
|
|
|
mount -t 9p store /fs${storeDir} -o trans=virtio,version=9p2000.L,cache=loose
|
2011-08-09 16:05:40 +02:00
|
|
|
|
2015-05-08 13:00:54 +02:00
|
|
|
mkdir -p /fs/tmp /fs/run /fs/var
|
2014-11-18 14:49:14 +01:00
|
|
|
mount -t tmpfs -o "mode=1777" none /fs/tmp
|
2015-05-08 13:00:54 +02:00
|
|
|
mount -t tmpfs -o "mode=755" none /fs/run
|
|
|
|
ln -sfn /run /fs/var/run
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2011-08-09 16:05:40 +02:00
|
|
|
echo "mounting host's temporary directory..."
|
|
|
|
mkdir -p /fs/tmp/xchg
|
2020-05-27 22:07:43 +02:00
|
|
|
mount -t 9p xchg /fs/tmp/xchg -o trans=virtio,version=9p2000.L
|
2011-08-09 16:05:40 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
mkdir -p /fs/proc
|
|
|
|
mount -t proc none /fs/proc
|
|
|
|
|
2009-12-18 13:10:35 +01:00
|
|
|
mkdir -p /fs/sys
|
|
|
|
mount -t sysfs none /fs/sys
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
mkdir -p /fs/etc
|
|
|
|
ln -sf /proc/mounts /fs/etc/mtab
|
2013-07-05 15:02:43 +02:00
|
|
|
echo "127.0.0.1 localhost" > /fs/etc/hosts
|
2020-02-21 00:19:05 +01:00
|
|
|
# Ensures tools requiring /etc/passwd will work (e.g. nix)
|
|
|
|
if [ ! -e /fs/etc/passwd ]; then
|
|
|
|
echo "root:x:0:0:System administrator:/root:/bin/sh" > /fs/etc/passwd
|
|
|
|
fi
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2013-08-01 14:35:04 +02:00
|
|
|
echo "starting stage 2 ($command)"
|
2015-05-08 13:01:10 +02:00
|
|
|
exec switch_root /fs $command $out
|
2008-03-14 14:51:01 +01:00
|
|
|
'';
|
|
|
|
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-17 11:40:47 +01:00
|
|
|
initrd = makeInitrd {
|
2008-03-14 14:51:01 +01:00
|
|
|
contents = [
|
|
|
|
{ object = stage1Init;
|
|
|
|
symlink = "/init";
|
|
|
|
}
|
|
|
|
];
|
|
|
|
};
|
|
|
|
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
stage2Init = writeScript "vm-run-stage2" ''
|
|
|
|
#! ${bash}/bin/sh
|
2011-08-09 16:05:40 +02:00
|
|
|
source /tmp/xchg/saved-env
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2014-03-18 15:02:09 +01:00
|
|
|
# Set the system time from the hardware clock. Works around an
|
|
|
|
# apparent KVM > 1.5.2 bug.
|
2020-11-24 16:29:28 +01:00
|
|
|
${pkgs.util-linux}/bin/hwclock -s
|
2014-03-18 15:02:09 +01:00
|
|
|
|
2016-09-28 01:42:05 +02:00
|
|
|
export NIX_STORE=${storeDir}
|
2011-08-09 16:05:40 +02:00
|
|
|
export NIX_BUILD_TOP=/tmp
|
|
|
|
export TMPDIR=/tmp
|
2008-03-14 14:51:01 +01:00
|
|
|
export PATH=/empty
|
2011-08-09 16:05:40 +02:00
|
|
|
out="$1"
|
2008-03-14 14:51:01 +01:00
|
|
|
cd "$NIX_BUILD_TOP"
|
|
|
|
|
|
|
|
if ! test -e /bin/sh; then
|
|
|
|
${coreutils}/bin/mkdir -p /bin
|
|
|
|
${coreutils}/bin/ln -s ${bash}/bin/sh /bin/sh
|
|
|
|
fi
|
|
|
|
|
2015-05-08 13:01:10 +02:00
|
|
|
# Set up automatic kernel module loading.
|
2019-01-29 21:17:44 +01:00
|
|
|
export MODULE_DIR=${kernel}/lib/modules/
|
2015-05-08 13:01:10 +02:00
|
|
|
${coreutils}/bin/cat <<EOF > /run/modprobe
|
2019-01-15 23:41:31 +01:00
|
|
|
#! ${bash}/bin/sh
|
2015-05-08 13:01:10 +02:00
|
|
|
export MODULE_DIR=$MODULE_DIR
|
|
|
|
exec ${kmod}/bin/modprobe "\$@"
|
|
|
|
EOF
|
|
|
|
${coreutils}/bin/chmod 755 /run/modprobe
|
|
|
|
echo /run/modprobe > /proc/sys/kernel/modprobe
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
# For debugging: if this is the second time this image is run,
|
|
|
|
# then don't start the build again, but instead drop the user into
|
|
|
|
# an interactive shell.
|
|
|
|
if test -n "$origBuilder" -a ! -e /.debug; then
|
2015-06-04 20:08:24 +02:00
|
|
|
exec < /dev/null
|
2008-03-14 14:51:01 +01:00
|
|
|
${coreutils}/bin/touch /.debug
|
2015-05-08 13:01:10 +02:00
|
|
|
$origBuilder $origArgs
|
|
|
|
echo $? > /tmp/xchg/in-vm-exit
|
|
|
|
|
|
|
|
${busybox}/bin/mount -o remount,ro dummy /
|
|
|
|
|
|
|
|
${busybox}/bin/poweroff -f
|
2008-03-14 14:51:01 +01:00
|
|
|
else
|
|
|
|
export PATH=/bin:/usr/bin:${coreutils}/bin
|
|
|
|
echo "Starting interactive shell..."
|
|
|
|
echo "(To run the original builder: \$origBuilder \$origArgs)"
|
2017-12-06 19:26:16 +01:00
|
|
|
exec ${busybox}/bin/setsid ${bashInteractive}/bin/bash < /dev/${qemuSerialDevice} &> /dev/${qemuSerialDevice}
|
2008-03-14 14:51:01 +01:00
|
|
|
fi
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
2008-04-29 14:32:17 +02:00
|
|
|
qemuCommandLinux = ''
|
2017-12-06 19:26:22 +01:00
|
|
|
${qemuBinary qemu} \
|
2008-03-14 14:51:01 +01:00
|
|
|
-nographic -no-reboot \
|
2016-07-27 11:29:18 +02:00
|
|
|
-device virtio-rng-pci \
|
2016-09-28 01:42:05 +02:00
|
|
|
-virtfs local,path=${storeDir},security_model=none,mount_tag=store \
|
2013-07-05 00:06:08 +02:00
|
|
|
-virtfs local,path=$TMPDIR/xchg,security_model=none,mount_tag=xchg \
|
2018-09-25 10:41:39 +02:00
|
|
|
''${diskImage:+-drive file=$diskImage,if=virtio,cache=unsafe,werror=report} \
|
2011-02-01 13:11:05 +01:00
|
|
|
-kernel ${kernel}/${img} \
|
2008-03-14 14:51:01 +01:00
|
|
|
-initrd ${initrd}/initrd \
|
2017-12-06 19:26:16 +01:00
|
|
|
-append "console=${qemuSerialDevice} panic=1 command=${stage2Init} out=$out mountDisk=$mountDisk loglevel=4" \
|
2008-03-14 14:51:01 +01:00
|
|
|
$QEMU_OPTS
|
|
|
|
'';
|
|
|
|
|
2010-06-14 02:18:54 +02:00
|
|
|
|
2008-04-29 14:32:17 +02:00
|
|
|
vmRunCommand = qemuCommand: writeText "vm-run" ''
|
2008-03-14 14:51:01 +01:00
|
|
|
export > saved-env
|
|
|
|
|
2010-06-15 18:13:10 +02:00
|
|
|
PATH=${coreutils}/bin
|
2011-08-09 16:05:40 +02:00
|
|
|
mkdir xchg
|
|
|
|
mv saved-env xchg/
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
eval "$preVM"
|
|
|
|
|
2017-02-21 14:53:16 +01:00
|
|
|
if [ "$enableParallelBuilding" = 1 ]; then
|
|
|
|
if [ ''${NIX_BUILD_CORES:-0} = 0 ]; then
|
|
|
|
QEMU_OPTS+=" -smp cpus=$(nproc)"
|
|
|
|
else
|
|
|
|
QEMU_OPTS+=" -smp cpus=$NIX_BUILD_CORES"
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
# Write the command to start the VM to a file so that the user can
|
|
|
|
# debug inside the VM if the build fails (when Nix is called with
|
|
|
|
# the -K option to preserve the temporary build directory).
|
|
|
|
cat > ./run-vm <<EOF
|
|
|
|
#! ${bash}/bin/sh
|
2018-01-03 19:25:48 +01:00
|
|
|
''${diskImage:+diskImage=$diskImage}
|
2008-03-14 14:51:01 +01:00
|
|
|
TMPDIR=$TMPDIR
|
2010-06-14 13:18:57 +02:00
|
|
|
cd $TMPDIR
|
2008-03-14 14:51:01 +01:00
|
|
|
${qemuCommand}
|
|
|
|
EOF
|
|
|
|
|
2011-05-02 16:55:16 +02:00
|
|
|
mkdir -p -m 0700 $out
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
chmod +x ./run-vm
|
|
|
|
source ./run-vm
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2011-08-09 16:05:40 +02:00
|
|
|
if ! test -e xchg/in-vm-exit; then
|
2008-03-14 14:51:01 +01:00
|
|
|
echo "Virtual machine didn't produce an exit code."
|
|
|
|
exit 1
|
|
|
|
fi
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2016-09-04 15:42:26 +02:00
|
|
|
exitCode="$(cat xchg/in-vm-exit)"
|
|
|
|
if [ "$exitCode" != "0" ]; then
|
|
|
|
exit "$exitCode"
|
|
|
|
fi
|
2008-04-29 14:32:17 +02:00
|
|
|
|
2016-09-04 15:42:26 +02:00
|
|
|
eval "$postVM"
|
2008-03-14 14:51:01 +01:00
|
|
|
'';
|
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
|
|
|
|
createEmptyImage = {size, fullName}: ''
|
|
|
|
mkdir $out
|
2009-03-02 15:31:33 +01:00
|
|
|
diskImage=$out/disk-image.qcow2
|
2013-07-31 14:35:53 +02:00
|
|
|
${qemu}/bin/qemu-img create -f qcow2 $diskImage "${toString size}M"
|
2008-03-17 18:08:40 +01:00
|
|
|
|
|
|
|
mkdir $out/nix-support
|
2008-03-18 13:54:21 +01:00
|
|
|
echo "${fullName}" > $out/nix-support/full-name
|
2008-03-17 18:08:40 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
|
2011-10-11 15:22:09 +02:00
|
|
|
defaultCreateRootFS = ''
|
2008-03-17 18:08:40 +01:00
|
|
|
mkdir /mnt
|
2015-01-12 17:42:59 +01:00
|
|
|
${e2fsprogs}/bin/mkfs.ext4 /dev/${hd}
|
2020-11-24 16:29:28 +01:00
|
|
|
${util-linux}/bin/mount -t ext4 /dev/${hd} /mnt
|
2008-03-17 18:08:40 +01:00
|
|
|
|
|
|
|
if test -e /mnt/.debug; then
|
|
|
|
exec ${bash}/bin/sh
|
|
|
|
fi
|
|
|
|
touch /mnt/.debug
|
|
|
|
|
2013-05-08 13:59:28 +02:00
|
|
|
mkdir /mnt/proc /mnt/dev /mnt/sys
|
2008-03-17 18:08:40 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
|
|
/* Run a derivation in a Linux virtual machine (using Qemu/KVM). By
|
|
|
|
default, there is no disk image; the root filesystem is a tmpfs,
|
2016-09-28 01:42:05 +02:00
|
|
|
and the nix store is shared with the host (via the 9P protocol).
|
2013-07-05 00:06:08 +02:00
|
|
|
Thus, any pure Nix derivation should run unmodified, e.g. the
|
|
|
|
call
|
2008-03-17 18:08:40 +01:00
|
|
|
|
|
|
|
runInLinuxVM patchelf
|
|
|
|
|
|
|
|
will build the derivation `patchelf' inside a VM. The attribute
|
|
|
|
`preVM' can optionally contain a shell command to be evaluated
|
|
|
|
*before* the VM is started (i.e., on the host). The attribute
|
|
|
|
`memSize' specifies the memory size of the VM in megabytes,
|
2013-07-04 23:36:17 +02:00
|
|
|
defaulting to 512. The attribute `diskImage' can optionally
|
2008-03-17 18:08:40 +01:00
|
|
|
specify a file system image to be attached to /dev/sda. (Note
|
|
|
|
that currently we expect the image to contain a filesystem, not a
|
|
|
|
full disk image with a partition table etc.)
|
|
|
|
|
|
|
|
If the build fails and Nix is run with the `-K' option, a script
|
|
|
|
`run-vm' will be left behind in the temporary build directory
|
|
|
|
that allows you to boot into the VM and debug it interactively. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2018-09-25 10:41:39 +02:00
|
|
|
runInLinuxVM = drv: lib.overrideDerivation drv ({ memSize ? 512, QEMU_OPTS ? "", args, builder, ... }: {
|
2010-08-29 23:27:06 +02:00
|
|
|
requiredSystemFeatures = [ "kvm" ];
|
2008-03-14 14:51:01 +01:00
|
|
|
builder = "${bash}/bin/sh";
|
2008-04-29 14:32:17 +02:00
|
|
|
args = ["-e" (vmRunCommand qemuCommandLinux)];
|
2015-10-06 15:03:26 +02:00
|
|
|
origArgs = args;
|
|
|
|
origBuilder = builder;
|
|
|
|
QEMU_OPTS = "${QEMU_OPTS} -m ${toString memSize}";
|
2016-07-14 14:11:17 +02:00
|
|
|
passAsFile = []; # HACK fix - see https://github.com/NixOS/nixpkgs/issues/16742
|
2008-03-14 14:51:01 +01:00
|
|
|
});
|
|
|
|
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2011-01-19 10:06:12 +01:00
|
|
|
extractFs = {file, fs ? null} :
|
|
|
|
with pkgs; runInLinuxVM (
|
|
|
|
stdenv.mkDerivation {
|
|
|
|
name = "extract-file";
|
2020-11-24 16:29:28 +01:00
|
|
|
buildInputs = [ util-linux ];
|
2011-01-19 10:06:12 +01:00
|
|
|
buildCommand = ''
|
2019-01-29 21:17:44 +01:00
|
|
|
ln -s ${kernel}/lib /lib
|
2016-04-22 09:40:57 +02:00
|
|
|
${kmod}/bin/modprobe loop
|
|
|
|
${kmod}/bin/modprobe ext4
|
|
|
|
${kmod}/bin/modprobe hfs
|
|
|
|
${kmod}/bin/modprobe hfsplus
|
|
|
|
${kmod}/bin/modprobe squashfs
|
|
|
|
${kmod}/bin/modprobe iso9660
|
|
|
|
${kmod}/bin/modprobe ufs
|
|
|
|
${kmod}/bin/modprobe cramfs
|
2011-01-19 10:06:12 +01:00
|
|
|
|
2012-01-18 21:16:00 +01:00
|
|
|
mkdir -p $out
|
|
|
|
mkdir -p tmp
|
2011-01-19 11:59:26 +01:00
|
|
|
mount -o loop,ro,ufstype=44bsd ${lib.optionalString (fs != null) "-t ${fs} "}${file} tmp ||
|
|
|
|
mount -o loop,ro ${lib.optionalString (fs != null) "-t ${fs} "}${file} tmp
|
2011-01-31 19:02:46 +01:00
|
|
|
cp -Rv tmp/* $out/ || exit 0
|
2011-01-19 10:06:12 +01:00
|
|
|
'';
|
|
|
|
});
|
|
|
|
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2011-01-19 10:06:12 +01:00
|
|
|
extractMTDfs = {file, fs ? null} :
|
|
|
|
with pkgs; runInLinuxVM (
|
|
|
|
stdenv.mkDerivation {
|
|
|
|
name = "extract-file-mtd";
|
2020-11-24 16:29:28 +01:00
|
|
|
buildInputs = [ util-linux mtdutils ];
|
2011-01-19 10:06:12 +01:00
|
|
|
buildCommand = ''
|
2019-01-29 21:17:44 +01:00
|
|
|
ln -s ${kernel}/lib /lib
|
2016-04-22 09:40:57 +02:00
|
|
|
${kmod}/bin/modprobe mtd
|
|
|
|
${kmod}/bin/modprobe mtdram total_size=131072
|
|
|
|
${kmod}/bin/modprobe mtdchar
|
|
|
|
${kmod}/bin/modprobe mtdblock
|
|
|
|
${kmod}/bin/modprobe jffs2
|
|
|
|
${kmod}/bin/modprobe zlib
|
2011-01-19 10:06:12 +01:00
|
|
|
|
2012-01-18 21:16:00 +01:00
|
|
|
mkdir -p $out
|
|
|
|
mkdir -p tmp
|
2011-01-19 10:06:12 +01:00
|
|
|
|
|
|
|
dd if=${file} of=/dev/mtd0
|
|
|
|
mount ${lib.optionalString (fs != null) "-t ${fs} "}/dev/mtdblock0 tmp
|
|
|
|
|
|
|
|
cp -R tmp/* $out/
|
|
|
|
'';
|
|
|
|
});
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
/* Like runInLinuxVM, but run the build not using the stdenv from
|
|
|
|
the Nix store, but using the tools provided by /bin, /usr/bin
|
|
|
|
etc. from the specified filesystem image, which typically is a
|
|
|
|
filesystem containing a non-NixOS Linux distribution. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2013-05-15 07:15:16 +02:00
|
|
|
runInLinuxImage = drv: runInLinuxVM (lib.overrideDerivation drv (attrs: {
|
2008-03-17 18:08:40 +01:00
|
|
|
mountDisk = true;
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
/* Mount `image' as the root FS, but use a temporary copy-on-write
|
|
|
|
image since we don't want to (and can't) write to `image'. */
|
|
|
|
preVM = ''
|
2009-03-02 15:31:33 +01:00
|
|
|
diskImage=$(pwd)/disk-image.qcow2
|
2008-03-17 18:08:40 +01:00
|
|
|
origImage=${attrs.diskImage}
|
2009-03-02 15:31:33 +01:00
|
|
|
if test -d "$origImage"; then origImage="$origImage/disk-image.qcow2"; fi
|
2013-07-31 14:35:53 +02:00
|
|
|
${qemu}/bin/qemu-img create -b "$origImage" -f qcow2 $diskImage
|
2008-03-17 18:08:40 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
/* Inside the VM, run the stdenv setup script normally, but at the
|
|
|
|
very end set $PATH and $SHELL to the `native' paths for the
|
|
|
|
distribution inside the VM. */
|
|
|
|
postHook = ''
|
|
|
|
PATH=/usr/bin:/bin:/usr/sbin:/sbin
|
|
|
|
SHELL=/bin/sh
|
2008-03-17 18:29:07 +01:00
|
|
|
eval "$origPostHook"
|
2008-03-17 18:08:40 +01:00
|
|
|
'';
|
|
|
|
|
2008-03-17 18:29:07 +01:00
|
|
|
origPostHook = if attrs ? postHook then attrs.postHook else "";
|
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
/* Don't run Nix-specific build steps like patchelf. */
|
|
|
|
fixupPhase = "true";
|
2013-05-15 07:15:16 +02:00
|
|
|
}));
|
2008-03-17 18:08:40 +01:00
|
|
|
|
|
|
|
|
|
|
|
/* Create a filesystem image of the specified size and fill it with
|
|
|
|
a set of RPM packages. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
fillDiskWithRPMs =
|
2011-08-08 16:01:16 +02:00
|
|
|
{ size ? 4096, rpms, name, fullName, preInstall ? "", postInstall ? ""
|
2011-10-11 15:22:09 +02:00
|
|
|
, runScripts ? true, createRootFS ? defaultCreateRootFS
|
2016-03-30 09:47:09 +02:00
|
|
|
, QEMU_OPTS ? "", memSize ? 512
|
2013-05-08 13:59:28 +02:00
|
|
|
, unifiedSystemDir ? false
|
2011-08-08 16:01:16 +02:00
|
|
|
}:
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
runInLinuxVM (stdenv.mkDerivation {
|
2016-03-30 09:47:09 +02:00
|
|
|
inherit name preInstall postInstall rpms QEMU_OPTS memSize;
|
2008-03-17 18:08:40 +01:00
|
|
|
preVM = createEmptyImage {inherit size fullName;};
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
buildCommand = ''
|
2008-03-17 18:08:40 +01:00
|
|
|
${createRootFS}
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2008-03-18 22:14:02 +01:00
|
|
|
chroot=$(type -tP chroot)
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2013-05-08 13:59:28 +02:00
|
|
|
# Make the Nix store available in /mnt, because that's where the RPMs live.
|
2016-09-28 01:42:05 +02:00
|
|
|
mkdir -p /mnt${storeDir}
|
2020-11-24 16:29:28 +01:00
|
|
|
${util-linux}/bin/mount -o bind ${storeDir} /mnt${storeDir}
|
2013-05-08 13:59:28 +02:00
|
|
|
|
|
|
|
# Newer distributions like Fedora 18 require /lib etc. to be
|
|
|
|
# symlinked to /usr.
|
|
|
|
${lib.optionalString unifiedSystemDir ''
|
|
|
|
mkdir -p /mnt/usr/bin /mnt/usr/sbin /mnt/usr/lib /mnt/usr/lib64
|
|
|
|
ln -s /usr/bin /mnt/bin
|
|
|
|
ln -s /usr/sbin /mnt/sbin
|
|
|
|
ln -s /usr/lib /mnt/lib
|
|
|
|
ln -s /usr/lib64 /mnt/lib64
|
2020-11-24 16:29:28 +01:00
|
|
|
${util-linux}/bin/mount -t proc none /mnt/proc
|
2013-05-08 13:59:28 +02:00
|
|
|
''}
|
|
|
|
|
2008-03-18 15:56:47 +01:00
|
|
|
echo "unpacking RPMs..."
|
2015-02-10 11:24:22 +01:00
|
|
|
set +o pipefail
|
2008-03-18 15:56:47 +01:00
|
|
|
for i in $rpms; do
|
|
|
|
echo "$i..."
|
2019-12-08 18:13:40 +01:00
|
|
|
${rpm}/bin/rpm2cpio "$i" | chroot /mnt ${cpio}/bin/cpio -i --make-directories --unconditional
|
2008-03-18 15:56:47 +01:00
|
|
|
done
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2008-03-18 15:56:47 +01:00
|
|
|
eval "$preInstall"
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2008-03-18 22:14:02 +01:00
|
|
|
echo "initialising RPM DB..."
|
2008-05-21 11:35:15 +02:00
|
|
|
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
|
|
|
|
ldconfig -v || true
|
2008-03-18 22:14:02 +01:00
|
|
|
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
|
|
|
|
rpm --initdb
|
|
|
|
|
2020-11-24 16:29:28 +01:00
|
|
|
${util-linux}/bin/mount -o bind /tmp /mnt/tmp
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-18 15:56:47 +01:00
|
|
|
echo "installing RPMs..."
|
|
|
|
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
|
2015-02-12 16:55:44 +01:00
|
|
|
rpm -iv --nosignature ${if runScripts then "" else "--noscripts"} $rpms
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
echo "running post-install script..."
|
|
|
|
eval "$postInstall"
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
rm /mnt/.debug
|
2011-10-11 15:22:09 +02:00
|
|
|
|
2020-11-24 16:29:28 +01:00
|
|
|
${util-linux}/bin/umount /mnt${storeDir} /mnt/tmp ${lib.optionalString unifiedSystemDir "/mnt/proc"}
|
|
|
|
${util-linux}/bin/umount /mnt
|
2008-03-14 14:51:01 +01:00
|
|
|
'';
|
2008-11-12 18:19:12 +01:00
|
|
|
|
2011-08-08 16:01:16 +02:00
|
|
|
passthru = { inherit fullName; };
|
2008-03-14 14:51:01 +01:00
|
|
|
});
|
|
|
|
|
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
/* Generate a script that can be used to run an interactive session
|
|
|
|
in the given image. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
makeImageTestScript = image: writeScript "image-test" ''
|
|
|
|
#! ${bash}/bin/sh
|
|
|
|
if test -z "$1"; then
|
|
|
|
echo "Syntax: $0 <copy-on-write-temp-file>"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
diskImage="$1"
|
|
|
|
if ! test -e "$diskImage"; then
|
2013-07-31 14:35:53 +02:00
|
|
|
${qemu}/bin/qemu-img create -b ${image}/disk-image.qcow2 -f qcow2 "$diskImage"
|
2008-03-14 14:51:01 +01:00
|
|
|
fi
|
|
|
|
export TMPDIR=$(mktemp -d)
|
|
|
|
export out=/dummy
|
|
|
|
export origBuilder=
|
|
|
|
export origArgs=
|
2011-08-09 16:05:40 +02:00
|
|
|
mkdir $TMPDIR/xchg
|
|
|
|
export > $TMPDIR/xchg/saved-env
|
2008-03-18 15:56:47 +01:00
|
|
|
mountDisk=1
|
2008-04-29 14:32:17 +02:00
|
|
|
${qemuCommandLinux}
|
2008-03-14 14:51:01 +01:00
|
|
|
'';
|
|
|
|
|
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
/* Build RPM packages from the tarball `src' in the Linux
|
|
|
|
distribution installed in the filesystem `diskImage'. The
|
|
|
|
tarball must contain an RPM specfile. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-18 22:14:02 +01:00
|
|
|
buildRPM = attrs: runInLinuxImage (stdenv.mkDerivation ({
|
2008-04-09 08:37:59 +02:00
|
|
|
phases = "prepareImagePhase sysInfoPhase buildPhase installPhase";
|
2008-03-18 22:14:02 +01:00
|
|
|
|
|
|
|
outDir = "rpms/${attrs.diskImage.name}";
|
2008-04-09 08:37:59 +02:00
|
|
|
|
|
|
|
prepareImagePhase = ''
|
2008-04-12 07:19:37 +02:00
|
|
|
if test -n "$extraRPMs"; then
|
2009-10-01 09:25:50 +02:00
|
|
|
for rpmdir in $extraRPMs ; do
|
|
|
|
rpm -iv $(ls $rpmdir/rpms/*/*.rpm | grep -v 'src\.rpm' | sort | head -1)
|
|
|
|
done
|
2008-04-12 07:03:36 +02:00
|
|
|
fi
|
2008-04-09 08:37:59 +02:00
|
|
|
'';
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-17 18:29:07 +01:00
|
|
|
sysInfoPhase = ''
|
2008-09-12 14:06:40 +02:00
|
|
|
echo "System/kernel: $(uname -a)"
|
2008-04-09 14:51:54 +02:00
|
|
|
if test -e /etc/fedora-release; then echo "Fedora release: $(cat /etc/fedora-release)"; fi
|
|
|
|
if test -e /etc/SuSE-release; then echo "SUSE release: $(cat /etc/SuSE-release)"; fi
|
|
|
|
header "installed RPM packages"
|
2008-03-17 18:29:07 +01:00
|
|
|
rpm -qa --qf "%{Name}-%{Version}-%{Release} (%{Arch}; %{Distribution}; %{Vendor})\n"
|
|
|
|
stopNest
|
|
|
|
'';
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
buildPhase = ''
|
2008-03-18 13:54:21 +01:00
|
|
|
eval "$preBuild"
|
2008-03-18 15:56:47 +01:00
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
# Hacky: RPM looks for <basename>.spec inside the tarball, so
|
|
|
|
# strip off the hash.
|
2016-10-11 18:09:56 +02:00
|
|
|
srcName="$(stripHash "$src")"
|
2008-03-18 13:54:21 +01:00
|
|
|
cp "$src" "$srcName" # `ln' doesn't work always work: RPM requires that the file is owned by root
|
|
|
|
|
2008-11-27 19:58:37 +01:00
|
|
|
export HOME=/tmp/home
|
|
|
|
mkdir $HOME
|
|
|
|
|
|
|
|
rpmout=/tmp/rpmout
|
|
|
|
mkdir $rpmout $rpmout/SPECS $rpmout/BUILD $rpmout/RPMS $rpmout/SRPMS
|
|
|
|
|
|
|
|
echo "%_topdir $rpmout" >> $HOME/.rpmmacros
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2013-10-23 12:49:28 +02:00
|
|
|
if [ `uname -m` = i686 ]; then extra="--target i686-linux"; fi
|
|
|
|
rpmbuild -vv $extra -ta "$srcName"
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2008-03-18 13:54:21 +01:00
|
|
|
eval "$postBuild"
|
2008-03-17 18:08:40 +01:00
|
|
|
'';
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
installPhase = ''
|
2008-11-13 13:45:08 +01:00
|
|
|
eval "$preInstall"
|
2011-05-02 16:55:16 +02:00
|
|
|
|
2012-01-18 21:16:00 +01:00
|
|
|
mkdir -p $out/$outDir
|
2008-11-27 19:58:37 +01:00
|
|
|
find $rpmout -name "*.rpm" -exec cp {} $out/$outDir \;
|
2008-03-18 13:54:21 +01:00
|
|
|
|
2008-03-18 22:14:02 +01:00
|
|
|
for i in $out/$outDir/*.rpm; do
|
2008-03-18 13:54:21 +01:00
|
|
|
header "Generated RPM/SRPM: $i"
|
|
|
|
rpm -qip $i
|
|
|
|
stopNest
|
|
|
|
done
|
2008-11-13 13:45:08 +01:00
|
|
|
|
|
|
|
eval "$postInstall"
|
2008-03-18 22:14:02 +01:00
|
|
|
''; # */
|
|
|
|
} // attrs));
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
/* Create a filesystem image of the specified size and fill it with
|
|
|
|
a set of Debian packages. `debs' must be a list of list of
|
|
|
|
.deb files, namely, the Debian packages grouped together into
|
|
|
|
strongly connected components. See deb/deb-closure.nix. */
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
fillDiskWithDebs =
|
2016-05-11 15:40:44 +02:00
|
|
|
{ size ? 4096, debs, name, fullName, postInstall ? null, createRootFS ? defaultCreateRootFS
|
|
|
|
, QEMU_OPTS ? "", memSize ? 512 }:
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
runInLinuxVM (stdenv.mkDerivation {
|
2016-05-11 15:40:44 +02:00
|
|
|
inherit name postInstall QEMU_OPTS memSize;
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
debs = (lib.intersperse "|" debs);
|
|
|
|
|
2008-03-17 18:08:40 +01:00
|
|
|
preVM = createEmptyImage {inherit size fullName;};
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
buildCommand = ''
|
2008-03-17 18:08:40 +01:00
|
|
|
${createRootFS}
|
2008-03-14 14:51:01 +01:00
|
|
|
|
2021-03-14 19:12:53 +01:00
|
|
|
PATH=$PATH:${lib.makeBinPath [ dpkg dpkg glibc xz ]}
|
2008-03-14 14:51:01 +01:00
|
|
|
|
|
|
|
# Unpack the .debs. We do this to prevent pre-install scripts
|
|
|
|
# (which have lots of circular dependencies) from barfing.
|
|
|
|
echo "unpacking Debs..."
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
for deb in $debs; do
|
|
|
|
if test "$deb" != "|"; then
|
|
|
|
echo "$deb..."
|
|
|
|
dpkg-deb --extract "$deb" /mnt
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
# Make the Nix store available in /mnt, because that's where the .debs live.
|
2016-09-28 01:42:05 +02:00
|
|
|
mkdir -p /mnt/inst${storeDir}
|
2020-11-24 16:29:28 +01:00
|
|
|
${util-linux}/bin/mount -o bind ${storeDir} /mnt/inst${storeDir}
|
|
|
|
${util-linux}/bin/mount -o bind /proc /mnt/proc
|
|
|
|
${util-linux}/bin/mount -o bind /dev /mnt/dev
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
# Misc. files/directories assumed by various packages.
|
2008-11-12 18:15:09 +01:00
|
|
|
echo "initialising Dpkg DB..."
|
2008-03-14 14:51:01 +01:00
|
|
|
touch /mnt/etc/shells
|
|
|
|
touch /mnt/var/lib/dpkg/status
|
|
|
|
touch /mnt/var/lib/dpkg/available
|
|
|
|
touch /mnt/var/lib/dpkg/diversions
|
|
|
|
|
|
|
|
# Now install the .debs. This is basically just to register
|
|
|
|
# them with dpkg and to make their pre/post-install scripts
|
|
|
|
# run.
|
|
|
|
echo "installing Debs..."
|
|
|
|
|
|
|
|
export DEBIAN_FRONTEND=noninteractive
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
oldIFS="$IFS"
|
|
|
|
IFS="|"
|
|
|
|
for component in $debs; do
|
|
|
|
IFS="$oldIFS"
|
|
|
|
echo
|
|
|
|
echo ">>> INSTALLING COMPONENT: $component"
|
|
|
|
debs=
|
|
|
|
for i in $component; do
|
|
|
|
debs="$debs /inst/$i";
|
|
|
|
done
|
|
|
|
chroot=$(type -tP chroot)
|
2013-07-29 07:33:58 +02:00
|
|
|
|
|
|
|
# Create a fake start-stop-daemon script, as done in debootstrap.
|
|
|
|
mv "/mnt/sbin/start-stop-daemon" "/mnt/sbin/start-stop-daemon.REAL"
|
|
|
|
echo "#!/bin/true" > "/mnt/sbin/start-stop-daemon"
|
|
|
|
chmod 755 "/mnt/sbin/start-stop-daemon"
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
|
2011-02-14 17:52:32 +01:00
|
|
|
/usr/bin/dpkg --install --force-all $debs < /dev/null || true
|
2013-07-29 07:33:58 +02:00
|
|
|
|
|
|
|
# Move the real start-stop-daemon back into its place.
|
|
|
|
mv "/mnt/sbin/start-stop-daemon.REAL" "/mnt/sbin/start-stop-daemon"
|
2008-03-14 14:51:01 +01:00
|
|
|
done
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
echo "running post-install script..."
|
|
|
|
eval "$postInstall"
|
2009-10-02 11:34:37 +02:00
|
|
|
ln -sf dash /mnt/bin/sh
|
|
|
|
|
2008-03-14 14:51:01 +01:00
|
|
|
rm /mnt/.debug
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2020-11-24 16:29:28 +01:00
|
|
|
${util-linux}/bin/umount /mnt/inst${storeDir}
|
|
|
|
${util-linux}/bin/umount /mnt/proc
|
|
|
|
${util-linux}/bin/umount /mnt/dev
|
|
|
|
${util-linux}/bin/umount /mnt
|
2008-03-14 14:51:01 +01:00
|
|
|
'';
|
2008-11-12 18:19:12 +01:00
|
|
|
|
2011-08-08 16:01:16 +02:00
|
|
|
passthru = { inherit fullName; };
|
2008-03-14 14:51:01 +01:00
|
|
|
});
|
|
|
|
|
|
|
|
|
2008-04-09 14:02:15 +02:00
|
|
|
/* Generate a Nix expression containing fetchurl calls for the
|
|
|
|
closure of a set of top-level RPM packages from the
|
2008-04-11 13:52:40 +02:00
|
|
|
`primary.xml.gz' file of a Fedora or openSUSE distribution. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-04-09 14:02:15 +02:00
|
|
|
rpmClosureGenerator =
|
2011-10-11 15:22:09 +02:00
|
|
|
{name, packagesLists, urlPrefixes, packages, archs ? []}:
|
2012-08-27 19:46:51 +02:00
|
|
|
assert (builtins.length packagesLists) == (builtins.length urlPrefixes);
|
2009-04-20 14:52:24 +02:00
|
|
|
runCommand "${name}.nix" {buildInputs = [perl perlPackages.XMLSimple]; inherit archs;} ''
|
2011-10-11 15:22:09 +02:00
|
|
|
${lib.concatImapStrings (i: pl: ''
|
|
|
|
gunzip < ${pl} > ./packages_${toString i}.xml
|
|
|
|
'') packagesLists}
|
2008-04-09 14:02:15 +02:00
|
|
|
perl -w ${rpm/rpm-closure.pl} \
|
2011-10-11 15:22:09 +02:00
|
|
|
${lib.concatImapStrings (i: pl: "./packages_${toString i}.xml ${pl.snd} " ) (lib.zipLists packagesLists urlPrefixes)} \
|
|
|
|
${toString packages} > $out
|
2008-04-09 14:02:15 +02:00
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
|
|
/* Helper function that combines rpmClosureGenerator and
|
|
|
|
fillDiskWithRPMs to generate a disk image from a set of package
|
|
|
|
names. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-04-09 14:02:15 +02:00
|
|
|
makeImageFromRPMDist =
|
2011-10-11 15:22:09 +02:00
|
|
|
{ name, fullName, size ? 4096
|
|
|
|
, urlPrefix ? "", urlPrefixes ? [urlPrefix]
|
|
|
|
, packagesList ? "", packagesLists ? [packagesList]
|
2010-06-14 20:42:18 +02:00
|
|
|
, packages, extraPackages ? []
|
|
|
|
, preInstall ? "", postInstall ? "", archs ? ["noarch" "i386"]
|
2013-05-08 13:59:28 +02:00
|
|
|
, runScripts ? true, createRootFS ? defaultCreateRootFS
|
2016-03-30 09:47:09 +02:00
|
|
|
, QEMU_OPTS ? "", memSize ? 512
|
2013-05-08 13:59:28 +02:00
|
|
|
, unifiedSystemDir ? false }:
|
2008-04-09 14:02:15 +02:00
|
|
|
|
|
|
|
fillDiskWithRPMs {
|
2016-03-30 09:47:09 +02:00
|
|
|
inherit name fullName size preInstall postInstall runScripts createRootFS unifiedSystemDir QEMU_OPTS memSize;
|
2008-04-09 14:02:15 +02:00
|
|
|
rpms = import (rpmClosureGenerator {
|
2011-10-11 15:22:09 +02:00
|
|
|
inherit name packagesLists urlPrefixes archs;
|
2010-06-14 20:42:18 +02:00
|
|
|
packages = packages ++ extraPackages;
|
2011-08-08 16:01:16 +02:00
|
|
|
}) { inherit fetchurl; };
|
2008-04-09 14:02:15 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* Like `rpmClosureGenerator', but now for Debian/Ubuntu releases
|
|
|
|
(i.e. generate a closure from a Packages.bz2 file). */
|
|
|
|
|
|
|
|
debClosureGenerator =
|
2012-08-27 19:46:51 +02:00
|
|
|
{name, packagesLists, urlPrefix, packages}:
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2012-12-04 19:56:31 +01:00
|
|
|
runCommand "${name}.nix" { buildInputs = [ perl dpkg ]; } ''
|
2012-08-27 19:46:51 +02:00
|
|
|
for i in ${toString packagesLists}; do
|
|
|
|
echo "adding $i..."
|
2015-05-28 22:55:55 +02:00
|
|
|
case $i in
|
|
|
|
*.xz | *.lzma)
|
|
|
|
xz -d < $i >> ./Packages
|
|
|
|
;;
|
|
|
|
*.bz2)
|
|
|
|
bunzip2 < $i >> ./Packages
|
|
|
|
;;
|
|
|
|
*.gz)
|
|
|
|
gzip -dc < $i >> ./Packages
|
|
|
|
;;
|
|
|
|
esac
|
2012-08-27 19:46:51 +02:00
|
|
|
done
|
2008-09-12 15:17:52 +02:00
|
|
|
|
|
|
|
# Work around this bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452279
|
2012-03-06 19:49:44 +01:00
|
|
|
sed -i ./Packages -e s/x86_64-linux-gnu/x86-64-linux-gnu/g
|
2008-09-12 15:17:52 +02:00
|
|
|
|
2012-12-04 19:56:31 +01:00
|
|
|
perl -w ${deb/deb-closure.pl} \
|
2008-04-09 14:02:15 +02:00
|
|
|
./Packages ${urlPrefix} ${toString packages} > $out
|
|
|
|
'';
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-04-09 14:02:15 +02:00
|
|
|
|
|
|
|
/* Helper function that combines debClosureGenerator and
|
|
|
|
fillDiskWithDebs to generate a disk image from a set of package
|
|
|
|
names. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-04-09 14:02:15 +02:00
|
|
|
makeImageFromDebDist =
|
2012-08-27 19:46:51 +02:00
|
|
|
{ name, fullName, size ? 4096, urlPrefix
|
|
|
|
, packagesList ? "", packagesLists ? [packagesList]
|
2016-05-11 15:40:44 +02:00
|
|
|
, packages, extraPackages ? [], postInstall ? ""
|
2019-06-09 19:05:30 +02:00
|
|
|
, extraDebs ? [], createRootFS ? defaultCreateRootFS
|
2016-05-11 15:40:44 +02:00
|
|
|
, QEMU_OPTS ? "", memSize ? 512 }:
|
2008-04-09 14:02:15 +02:00
|
|
|
|
2008-11-12 18:15:09 +01:00
|
|
|
let
|
|
|
|
expr = debClosureGenerator {
|
2012-08-27 19:46:51 +02:00
|
|
|
inherit name packagesLists urlPrefix;
|
2010-06-14 20:42:18 +02:00
|
|
|
packages = packages ++ extraPackages;
|
2008-11-12 18:15:09 +01:00
|
|
|
};
|
|
|
|
in
|
|
|
|
(fillDiskWithDebs {
|
2019-06-09 19:05:30 +02:00
|
|
|
inherit name fullName size postInstall createRootFS QEMU_OPTS memSize;
|
2017-07-27 20:24:42 +02:00
|
|
|
debs = import expr {inherit fetchurl;} ++ extraDebs;
|
2008-11-12 18:15:09 +01:00
|
|
|
}) // {inherit expr;};
|
2008-04-09 14:02:15 +02:00
|
|
|
|
|
|
|
|
2010-06-14 20:42:18 +02:00
|
|
|
/* The set of supported RPM-based distributions. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2010-06-14 20:42:18 +02:00
|
|
|
rpmDistros = {
|
2008-04-09 14:02:15 +02:00
|
|
|
|
2018-02-19 11:16:31 +01:00
|
|
|
# Note: no i386 release for Fedora >= 26
|
|
|
|
fedora26x86_64 =
|
|
|
|
let version = "26";
|
2019-08-13 23:52:01 +02:00
|
|
|
in {
|
2018-02-19 11:16:31 +01:00
|
|
|
name = "fedora-${version}-x86_64";
|
|
|
|
fullName = "Fedora ${version} (x86_64)";
|
|
|
|
packagesList = fetchurl rec {
|
|
|
|
url = "mirror://fedora/linux/releases/${version}/Everything/x86_64/os/repodata/${sha256}-primary.xml.gz";
|
|
|
|
sha256 = "880055a50c05b20641530d09b23f64501a000b2f92fe252417c530178730a95e";
|
|
|
|
};
|
|
|
|
urlPrefix = "mirror://fedora/linux/releases/${version}/Everything/x86_64/os";
|
|
|
|
archs = ["noarch" "x86_64"];
|
|
|
|
packages = commonFedoraPackages ++ [ "cronie" "util-linux" ];
|
|
|
|
unifiedSystemDir = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
fedora27x86_64 =
|
|
|
|
let version = "27";
|
2019-08-13 23:52:01 +02:00
|
|
|
in {
|
2018-02-19 11:16:31 +01:00
|
|
|
name = "fedora-${version}-x86_64";
|
|
|
|
fullName = "Fedora ${version} (x86_64)";
|
|
|
|
packagesList = fetchurl rec {
|
|
|
|
url = "mirror://fedora/linux/releases/${version}/Everything/x86_64/os/repodata/${sha256}-primary.xml.gz";
|
|
|
|
sha256 = "48986ce4583cd09825c6d437150314446f0f49fa1a1bd62dcfa1085295030fe9";
|
|
|
|
};
|
|
|
|
urlPrefix = "mirror://fedora/linux/releases/${version}/Everything/x86_64/os";
|
|
|
|
archs = ["noarch" "x86_64"];
|
|
|
|
packages = commonFedoraPackages ++ [ "cronie" "util-linux" ];
|
|
|
|
unifiedSystemDir = true;
|
|
|
|
};
|
|
|
|
|
|
|
|
centos6i386 =
|
|
|
|
let version = "6.9";
|
|
|
|
in rec {
|
|
|
|
name = "centos-${version}-i386";
|
|
|
|
fullName = "CentOS ${version} (i386)";
|
2019-08-20 22:40:07 +02:00
|
|
|
urlPrefix = "mirror://centos/${version}/os/i386";
|
2018-02-19 11:16:31 +01:00
|
|
|
packagesList = fetchurl rec {
|
|
|
|
url = "${urlPrefix}/repodata/${sha256}-primary.xml.gz";
|
|
|
|
sha256 = "b826a45082ef68340325c0855f3d2e5d5a4d0f77d28ba3b871791d6f14a97aeb";
|
|
|
|
};
|
|
|
|
archs = ["noarch" "i386"];
|
|
|
|
packages = commonCentOSPackages ++ [ "procps" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
centos6x86_64 =
|
|
|
|
let version = "6.9";
|
|
|
|
in rec {
|
|
|
|
name = "centos-${version}-x86_64";
|
|
|
|
fullName = "CentOS ${version} (x86_64)";
|
2019-08-20 22:40:07 +02:00
|
|
|
urlPrefix = "mirror://centos/${version}/os/x86_64";
|
2018-02-19 11:16:31 +01:00
|
|
|
packagesList = fetchurl rec {
|
|
|
|
url = "${urlPrefix}/repodata/${sha256}-primary.xml.gz";
|
|
|
|
sha256 = "ed2b2d4ac98d774d4cd3e91467e1532f7e8b0275cfc91a0d214b532dcaf1e979";
|
|
|
|
};
|
|
|
|
archs = ["noarch" "x86_64"];
|
|
|
|
packages = commonCentOSPackages ++ [ "procps" ];
|
2013-07-05 17:52:42 +02:00
|
|
|
};
|
2016-05-24 12:35:39 +02:00
|
|
|
|
|
|
|
# Note: no i386 release for 7.x
|
2018-02-19 11:16:31 +01:00
|
|
|
centos7x86_64 =
|
|
|
|
let version = "7.4.1708";
|
|
|
|
in rec {
|
|
|
|
name = "centos-${version}-x86_64";
|
|
|
|
fullName = "CentOS ${version} (x86_64)";
|
2019-08-20 22:40:07 +02:00
|
|
|
urlPrefix = "mirror://centos/${version}/os/x86_64";
|
2018-02-19 11:16:31 +01:00
|
|
|
packagesList = fetchurl rec {
|
|
|
|
url = "${urlPrefix}/repodata/${sha256}-primary.xml.gz";
|
|
|
|
sha256 = "b686d3a0f337323e656d9387b9a76ce6808b26255fc3a138b1a87d3b1cb95ed5";
|
|
|
|
};
|
|
|
|
archs = ["noarch" "x86_64"];
|
|
|
|
packages = commonCentOSPackages ++ [ "procps-ng" ];
|
2017-11-28 04:06:58 +01:00
|
|
|
};
|
2010-06-14 20:42:18 +02:00
|
|
|
};
|
2009-09-24 09:40:30 +02:00
|
|
|
|
2010-06-14 20:42:18 +02:00
|
|
|
|
|
|
|
/* The set of supported Dpkg-based distributions. */
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2019-08-13 23:52:01 +02:00
|
|
|
debDistros = {
|
2014-05-03 17:51:26 +02:00
|
|
|
ubuntu1404i386 = {
|
|
|
|
name = "ubuntu-14.04-trusty-i386";
|
|
|
|
fullName = "Ubuntu 14.04 Trusty (i386)";
|
|
|
|
packagesLists =
|
|
|
|
[ (fetchurl {
|
2020-04-01 03:11:51 +02:00
|
|
|
url = "mirror://ubuntu/dists/trusty/main/binary-i386/Packages.bz2";
|
2018-02-19 11:16:31 +01:00
|
|
|
sha256 = "1d5y3v3v079gdq45hc07ja0bjlmzqfwdwwlq0brwxi8m75k3iz7x";
|
2014-05-03 17:51:26 +02:00
|
|
|
})
|
|
|
|
(fetchurl {
|
2020-04-01 03:11:51 +02:00
|
|
|
url = "mirror://ubuntu/dists/trusty/universe/binary-i386/Packages.bz2";
|
2018-02-19 11:16:31 +01:00
|
|
|
sha256 = "03x9w92by320rfklrqhcl3qpwmnxds9c8ijl5zhcb21d6dcz5z1a";
|
2014-05-03 17:51:26 +02:00
|
|
|
})
|
|
|
|
];
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://ubuntu";
|
2014-05-03 17:51:26 +02:00
|
|
|
packages = commonDebPackages ++ [ "diffutils" "libc-bin" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
ubuntu1404x86_64 = {
|
|
|
|
name = "ubuntu-14.04-trusty-amd64";
|
|
|
|
fullName = "Ubuntu 14.04 Trusty (amd64)";
|
2018-02-19 11:16:31 +01:00
|
|
|
packagesLists =
|
2014-05-03 17:51:26 +02:00
|
|
|
[ (fetchurl {
|
2020-04-01 03:11:51 +02:00
|
|
|
url = "mirror://ubuntu/dists/trusty/main/binary-amd64/Packages.bz2";
|
2018-02-19 11:16:31 +01:00
|
|
|
sha256 = "1hhzbyqfr5i0swahwnl5gfp5l9p9hspywb1vpihr3b74p1z935bh";
|
2014-05-03 17:51:26 +02:00
|
|
|
})
|
|
|
|
(fetchurl {
|
2020-04-01 03:11:51 +02:00
|
|
|
url = "mirror://ubuntu/dists/trusty/universe/binary-amd64/Packages.bz2";
|
2018-02-19 11:16:31 +01:00
|
|
|
sha256 = "04560ba8s4z4v5iawknagrkn9q1nzvpn081ycmqvhh73p3p3g1jm";
|
2015-11-25 15:40:08 +01:00
|
|
|
})
|
|
|
|
];
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://ubuntu";
|
2015-11-25 15:40:08 +01:00
|
|
|
packages = commonDebPackages ++ [ "diffutils" "libc-bin" ];
|
2016-04-29 12:50:27 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
ubuntu1604i386 = {
|
|
|
|
name = "ubuntu-16.04-xenial-i386";
|
|
|
|
fullName = "Ubuntu 16.04 Xenial (i386)";
|
|
|
|
packagesLists =
|
|
|
|
[ (fetchurl {
|
2020-04-01 03:11:51 +02:00
|
|
|
url = "mirror://ubuntu/dists/xenial/main/binary-i386/Packages.xz";
|
2016-04-29 12:50:27 +02:00
|
|
|
sha256 = "13r75sp4slqy8w32y5dnr7pp7p3cfvavyr1g7gwnlkyrq4zx4ahy";
|
|
|
|
})
|
|
|
|
(fetchurl {
|
2020-04-01 03:11:51 +02:00
|
|
|
url = "mirror://ubuntu/dists/xenial/universe/binary-i386/Packages.xz";
|
2016-04-29 12:50:27 +02:00
|
|
|
sha256 = "14fid1rqm3sc0wlygcvn0yx5aljf51c2jpd4x0zxij4019316hsh";
|
|
|
|
})
|
|
|
|
];
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://ubuntu";
|
2016-04-29 12:50:27 +02:00
|
|
|
packages = commonDebPackages ++ [ "diffutils" "libc-bin" ];
|
|
|
|
};
|
|
|
|
|
|
|
|
ubuntu1604x86_64 = {
|
|
|
|
name = "ubuntu-16.04-xenial-amd64";
|
|
|
|
fullName = "Ubuntu 16.04 Xenial (amd64)";
|
2018-02-19 11:16:31 +01:00
|
|
|
packagesLists =
|
2016-04-29 12:50:27 +02:00
|
|
|
[ (fetchurl {
|
2020-04-01 03:11:51 +02:00
|
|
|
url = "mirror://ubuntu/dists/xenial/main/binary-amd64/Packages.xz";
|
2016-04-29 12:50:27 +02:00
|
|
|
sha256 = "110qnkhjkkwm316fbig3aivm2595ydz6zskc4ld5cr8ngcrqm1bn";
|
|
|
|
})
|
|
|
|
(fetchurl {
|
2020-04-01 03:11:51 +02:00
|
|
|
url = "mirror://ubuntu/dists/xenial/universe/binary-amd64/Packages.xz";
|
2016-04-29 12:50:27 +02:00
|
|
|
sha256 = "0mm7gj491yi6q4v0n4qkbsm94s59bvqir6fk60j73w7y4la8rg68";
|
|
|
|
})
|
|
|
|
];
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://ubuntu";
|
2016-04-29 12:50:27 +02:00
|
|
|
packages = commonDebPackages ++ [ "diffutils" "libc-bin" ];
|
2015-11-25 15:40:08 +01:00
|
|
|
};
|
|
|
|
|
2021-05-26 23:11:31 +02:00
|
|
|
ubuntu1804i386 = {
|
|
|
|
name = "ubuntu-18.04-bionic-i386";
|
|
|
|
fullName = "Ubuntu 18.04 Bionic (i386)";
|
2017-02-21 14:56:27 +01:00
|
|
|
packagesLists =
|
|
|
|
[ (fetchurl {
|
2021-05-26 23:11:31 +02:00
|
|
|
url = "mirror://ubuntu/dists/bionic/main/binary-i386/Packages.xz";
|
|
|
|
sha256 = "0f0v4131kwf7m7f8j3288rlqdxk1k3vqy74b7fcfd6jz9j8d840i";
|
2017-02-21 14:56:27 +01:00
|
|
|
})
|
|
|
|
(fetchurl {
|
2021-05-26 23:11:31 +02:00
|
|
|
url = "mirror://ubuntu/dists/bionic/universe/binary-i386/Packages.xz";
|
|
|
|
sha256 = "1v75c0dqr0wp0dqd4hnci92qqs4hll8frqdbpswadgxm5chn91bw";
|
2017-02-21 14:56:27 +01:00
|
|
|
})
|
|
|
|
];
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://ubuntu";
|
2017-02-21 14:56:27 +01:00
|
|
|
packages = commonDebPackages ++ [ "diffutils" "libc-bin" ];
|
|
|
|
};
|
|
|
|
|
2021-05-26 23:11:31 +02:00
|
|
|
ubuntu1804x86_64 = {
|
|
|
|
name = "ubuntu-18.04-bionic-amd64";
|
|
|
|
fullName = "Ubuntu 18.04 Bionic (amd64)";
|
2018-02-19 11:16:31 +01:00
|
|
|
packagesLists =
|
2017-02-21 14:56:27 +01:00
|
|
|
[ (fetchurl {
|
2021-05-26 23:11:31 +02:00
|
|
|
url = "mirror://ubuntu/dists/bionic/main/binary-amd64/Packages.xz";
|
|
|
|
sha256 = "1ls81bjyvmfz6i919kszl7xks1ibrh1xqhsk6698ackndkm0wp39";
|
2017-02-21 14:56:27 +01:00
|
|
|
})
|
|
|
|
(fetchurl {
|
2021-05-26 23:11:31 +02:00
|
|
|
url = "mirror://ubuntu/dists/bionic/universe/binary-amd64/Packages.xz";
|
|
|
|
sha256 = "1832nqpn4ap95b3sj870xqayrza9in4kih9jkmjax27pq6x15v1r";
|
2017-02-21 14:56:27 +01:00
|
|
|
})
|
|
|
|
];
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://ubuntu";
|
2017-02-21 14:56:27 +01:00
|
|
|
packages = commonDebPackages ++ [ "diffutils" "libc-bin" ];
|
|
|
|
};
|
|
|
|
|
2021-05-26 23:11:31 +02:00
|
|
|
ubuntu2004i386 = {
|
|
|
|
name = "ubuntu-20.04-focal-i386";
|
|
|
|
fullName = "Ubuntu 20.04 Focal (i386)";
|
2019-01-26 16:32:19 +01:00
|
|
|
packagesLists =
|
|
|
|
[ (fetchurl {
|
2021-05-26 23:11:31 +02:00
|
|
|
url = "mirror://ubuntu/dists/focal/main/binary-i386/Packages.xz";
|
|
|
|
sha256 = "sha256-7RAYURoN3RKYQAHpwBS9TIV6vCmpURpphyMJQmV4wLc=";
|
2019-01-26 16:32:19 +01:00
|
|
|
})
|
|
|
|
(fetchurl {
|
2021-05-26 23:11:31 +02:00
|
|
|
url = "mirror://ubuntu/dists/focal/universe/binary-i386/Packages.xz";
|
|
|
|
sha256 = "sha256-oA551xVE80volUPgkMyvzpQ1d+GhuZd4DAe7dXZnULM=";
|
2019-01-26 16:32:19 +01:00
|
|
|
})
|
|
|
|
];
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://ubuntu";
|
2019-01-26 16:32:19 +01:00
|
|
|
packages = commonDebPackages ++ [ "diffutils" "libc-bin" ];
|
|
|
|
};
|
|
|
|
|
2021-05-26 23:11:31 +02:00
|
|
|
ubuntu2004x86_64 = {
|
|
|
|
name = "ubuntu-20.04-focal-amd64";
|
|
|
|
fullName = "Ubuntu 20.04 Focal (amd64)";
|
2019-01-26 16:32:19 +01:00
|
|
|
packagesLists =
|
|
|
|
[ (fetchurl {
|
2021-05-26 23:11:31 +02:00
|
|
|
url = "mirror://ubuntu/dists/focal/main/binary-amd64/Packages.xz";
|
|
|
|
sha256 = "sha256-d1eSH/j+7Zw5NKDJk21EG6SiOL7j6myMHfXLzUP8mGE=";
|
2019-01-26 16:32:19 +01:00
|
|
|
})
|
|
|
|
(fetchurl {
|
2021-05-26 23:11:31 +02:00
|
|
|
url = "mirror://ubuntu/dists/focal/universe/binary-amd64/Packages.xz";
|
|
|
|
sha256 = "sha256-RqdG2seJvZU3rKVNsWgLnf9RwkgVMRE1A4IZnX2WudE=";
|
2019-01-26 16:32:19 +01:00
|
|
|
})
|
|
|
|
];
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://ubuntu";
|
2019-01-26 16:32:19 +01:00
|
|
|
packages = commonDebPackages ++ [ "diffutils" "libc-bin" ];
|
|
|
|
};
|
|
|
|
|
2021-05-26 23:12:03 +02:00
|
|
|
debian9i386 = {
|
|
|
|
name = "debian-9.13-stretch-i386";
|
|
|
|
fullName = "Debian 9.13 Stretch (i386)";
|
2011-02-14 17:52:32 +01:00
|
|
|
packagesList = fetchurl {
|
2021-05-26 23:12:03 +02:00
|
|
|
url = "https://snapshot.debian.org/archive/debian/20210526T143040Z/dists/stretch/main/binary-i386/Packages.xz";
|
|
|
|
sha256 = "sha256-fFRumd20wuVaYxzw0VPkAw5mQo8kIg+eXII15VSz9wA=";
|
2011-02-14 17:52:32 +01:00
|
|
|
};
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://debian";
|
2011-02-14 17:52:32 +01:00
|
|
|
packages = commonDebianPackages;
|
|
|
|
};
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2021-05-26 23:12:03 +02:00
|
|
|
debian9x86_64 = {
|
|
|
|
name = "debian-9.13-stretch-amd64";
|
|
|
|
fullName = "Debian 9.13 Stretch (amd64)";
|
2011-02-14 17:52:32 +01:00
|
|
|
packagesList = fetchurl {
|
2021-05-26 23:12:03 +02:00
|
|
|
url = "https://snapshot.debian.org/archive/debian/20210526T143040Z/dists/stretch/main/binary-amd64/Packages.xz";
|
|
|
|
sha256 = "sha256-1p4DEVpTGlBE3PtbQ90kYw4QNHkW0F4rna/Xz+ncMhw=";
|
2009-02-24 11:56:42 +01:00
|
|
|
};
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://debian";
|
2010-06-14 20:42:18 +02:00
|
|
|
packages = commonDebianPackages;
|
|
|
|
};
|
2009-02-24 11:56:42 +01:00
|
|
|
|
2021-05-26 23:12:03 +02:00
|
|
|
debian10i386 = {
|
|
|
|
name = "debian-10.9-buster-i386";
|
|
|
|
fullName = "Debian 10.9 Buster (i386)";
|
2013-05-07 11:15:44 +02:00
|
|
|
packagesList = fetchurl {
|
2021-05-26 23:12:03 +02:00
|
|
|
url = "https://snapshot.debian.org/archive/debian/20210526T143040Z/dists/buster/main/binary-i386/Packages.xz";
|
|
|
|
sha256 = "sha256-zlkbKV+IGBCyWKD4v4LFM/EUA4TYS9fkLBPuF6MgUDo=";
|
2013-05-07 11:15:44 +02:00
|
|
|
};
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://debian";
|
2013-05-07 11:15:44 +02:00
|
|
|
packages = commonDebianPackages;
|
|
|
|
};
|
|
|
|
|
2021-05-26 23:12:03 +02:00
|
|
|
debian10x86_64 = {
|
|
|
|
name = "debian-10.9-buster-amd64";
|
|
|
|
fullName = "Debian 10.9 Buster (amd64)";
|
2013-05-07 11:15:44 +02:00
|
|
|
packagesList = fetchurl {
|
2021-05-26 23:12:03 +02:00
|
|
|
url = "https://snapshot.debian.org/archive/debian/20210526T143040Z/dists/buster/main/binary-amd64/Packages.xz";
|
|
|
|
sha256 = "sha256-k13toY1b3CX7GBPQ7Jm24OMqCEsgPlGK8M99x57o69o=";
|
2013-05-07 11:15:44 +02:00
|
|
|
};
|
2020-04-01 03:11:51 +02:00
|
|
|
urlPrefix = "mirror://debian";
|
2013-05-07 11:15:44 +02:00
|
|
|
packages = commonDebianPackages;
|
|
|
|
};
|
2008-04-09 14:02:15 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/* Common packages for Fedora images. */
|
|
|
|
commonFedoraPackages = [
|
|
|
|
"autoconf"
|
|
|
|
"automake"
|
|
|
|
"basesystem"
|
|
|
|
"bzip2"
|
|
|
|
"curl"
|
|
|
|
"diffutils"
|
|
|
|
"fedora-release"
|
|
|
|
"findutils"
|
|
|
|
"gawk"
|
|
|
|
"gcc-c++"
|
|
|
|
"gzip"
|
|
|
|
"make"
|
|
|
|
"patch"
|
|
|
|
"perl"
|
2018-02-19 11:16:31 +01:00
|
|
|
"pkgconf-pkg-config"
|
2008-04-09 14:02:15 +02:00
|
|
|
"rpm"
|
|
|
|
"rpm-build"
|
|
|
|
"tar"
|
|
|
|
"unzip"
|
|
|
|
];
|
|
|
|
|
2013-07-05 17:52:42 +02:00
|
|
|
commonCentOSPackages = [
|
|
|
|
"autoconf"
|
|
|
|
"automake"
|
|
|
|
"basesystem"
|
|
|
|
"bzip2"
|
|
|
|
"curl"
|
|
|
|
"diffutils"
|
|
|
|
"centos-release"
|
|
|
|
"findutils"
|
|
|
|
"gawk"
|
|
|
|
"gcc-c++"
|
|
|
|
"gzip"
|
|
|
|
"make"
|
|
|
|
"patch"
|
|
|
|
"perl"
|
|
|
|
"pkgconfig"
|
|
|
|
"rpm"
|
|
|
|
"rpm-build"
|
|
|
|
"tar"
|
|
|
|
"unzip"
|
|
|
|
];
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2014-05-01 15:13:26 +02:00
|
|
|
commonRHELPackages = [
|
|
|
|
"autoconf"
|
|
|
|
"automake"
|
|
|
|
"basesystem"
|
|
|
|
"bzip2"
|
|
|
|
"curl"
|
|
|
|
"diffutils"
|
|
|
|
"findutils"
|
|
|
|
"gawk"
|
|
|
|
"gcc-c++"
|
|
|
|
"gzip"
|
|
|
|
"make"
|
|
|
|
"patch"
|
|
|
|
"perl"
|
|
|
|
"pkgconfig"
|
|
|
|
"procps-ng"
|
|
|
|
"rpm"
|
|
|
|
"rpm-build"
|
|
|
|
"tar"
|
|
|
|
"unzip"
|
|
|
|
];
|
|
|
|
|
2008-04-11 13:52:40 +02:00
|
|
|
/* Common packages for openSUSE images. */
|
|
|
|
commonOpenSUSEPackages = [
|
|
|
|
"aaa_base"
|
|
|
|
"autoconf"
|
|
|
|
"automake"
|
|
|
|
"bzip2"
|
|
|
|
"curl"
|
|
|
|
"diffutils"
|
|
|
|
"findutils"
|
|
|
|
"gawk"
|
|
|
|
"gcc-c++"
|
|
|
|
"gzip"
|
|
|
|
"make"
|
|
|
|
"patch"
|
|
|
|
"perl"
|
|
|
|
"pkg-config"
|
|
|
|
"rpm"
|
|
|
|
"tar"
|
|
|
|
"unzip"
|
2008-04-13 23:04:21 +02:00
|
|
|
"util-linux"
|
2009-07-02 14:53:25 +02:00
|
|
|
"gnu-getopt"
|
2008-04-11 13:52:40 +02:00
|
|
|
];
|
|
|
|
|
|
|
|
|
2008-04-09 14:02:15 +02:00
|
|
|
/* Common packages for Debian/Ubuntu images. */
|
2010-06-14 20:42:18 +02:00
|
|
|
commonDebPackages = [
|
2008-04-09 14:02:15 +02:00
|
|
|
"base-passwd"
|
|
|
|
"dpkg"
|
|
|
|
"libc6-dev"
|
|
|
|
"perl"
|
|
|
|
"bash"
|
2009-10-02 11:34:37 +02:00
|
|
|
"dash"
|
2008-04-09 14:02:15 +02:00
|
|
|
"gzip"
|
|
|
|
"bzip2"
|
|
|
|
"tar"
|
|
|
|
"grep"
|
2015-10-26 20:47:16 +01:00
|
|
|
"mawk"
|
2013-05-07 11:15:44 +02:00
|
|
|
"sed"
|
2008-04-09 14:02:15 +02:00
|
|
|
"findutils"
|
|
|
|
"g++"
|
|
|
|
"make"
|
|
|
|
"curl"
|
|
|
|
"patch"
|
2008-11-12 18:15:09 +01:00
|
|
|
"locales"
|
2013-10-23 11:08:12 +02:00
|
|
|
"coreutils"
|
2008-11-25 03:20:41 +01:00
|
|
|
# Needed by checkinstall:
|
2012-08-27 19:39:13 +02:00
|
|
|
"util-linux"
|
2008-11-25 03:20:41 +01:00
|
|
|
"file"
|
|
|
|
"dpkg-dev"
|
2009-07-02 14:53:25 +02:00
|
|
|
"pkg-config"
|
2009-02-24 11:56:42 +01:00
|
|
|
# Needed because it provides /etc/login.defs, whose absence causes
|
|
|
|
# the "passwd" post-installs script to fail.
|
|
|
|
"login"
|
2018-02-19 11:16:31 +01:00
|
|
|
"passwd"
|
2008-04-09 14:02:15 +02:00
|
|
|
];
|
|
|
|
|
2021-05-26 23:12:03 +02:00
|
|
|
commonDebianPackages = commonDebPackages ++ [ "sysvinit" "diff" ];
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2008-04-09 14:02:15 +02:00
|
|
|
|
2010-06-14 20:42:18 +02:00
|
|
|
/* A set of functions that build the Linux distributions specified
|
|
|
|
in `rpmDistros' and `debDistros'. For instance,
|
|
|
|
`diskImageFuns.ubuntu1004x86_64 { }' builds an Ubuntu 10.04 disk
|
|
|
|
image containing the default packages specified above. Overrides
|
|
|
|
of the default image parameters can be given. In particular,
|
|
|
|
`extraPackages' specifies the names of additional packages from
|
|
|
|
the distribution that should be included in the image; `packages'
|
|
|
|
allows the entire set of packages to be overriden; and `size'
|
|
|
|
sets the size of the disk in megabytes. E.g.,
|
|
|
|
`diskImageFuns.ubuntu1004x86_64 { extraPackages = ["firefox"];
|
|
|
|
size = 8192; }' builds an 8 GiB image containing Firefox in
|
|
|
|
addition to the default packages. */
|
2012-08-27 19:39:13 +02:00
|
|
|
diskImageFuns =
|
2010-06-14 20:42:18 +02:00
|
|
|
(lib.mapAttrs (name: as: as2: makeImageFromRPMDist (as // as2)) rpmDistros) //
|
|
|
|
(lib.mapAttrs (name: as: as2: makeImageFromDebDist (as // as2)) debDistros);
|
2009-11-05 15:49:17 +01:00
|
|
|
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2010-06-14 20:42:18 +02:00
|
|
|
/* Shorthand for `diskImageFuns.<attr> { extraPackages = ... }'. */
|
|
|
|
diskImageExtraFuns =
|
|
|
|
lib.mapAttrs (name: f: extraPackages: f { inherit extraPackages; }) diskImageFuns;
|
2009-11-05 15:49:17 +01:00
|
|
|
|
2012-08-27 19:39:13 +02:00
|
|
|
|
2010-06-14 20:42:18 +02:00
|
|
|
/* Default disk images generated from the `rpmDistros' and
|
2015-02-12 16:56:42 +01:00
|
|
|
`debDistros' sets. */
|
|
|
|
diskImages = lib.mapAttrs (name: f: f {}) diskImageFuns;
|
2008-03-18 13:54:21 +01:00
|
|
|
|
2020-12-17 06:58:31 +01:00
|
|
|
}
|