Compare commits
1 Commits
releases/v
...
check-spac
Author | SHA1 | Date | |
---|---|---|---|
73ea859441 |
52
.github/workflows/test.yml
vendored
52
.github/workflows/test.yml
vendored
@ -2,53 +2,9 @@ name: "install-nix-action test"
|
|||||||
on:
|
on:
|
||||||
pull_request:
|
pull_request:
|
||||||
push:
|
push:
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
simple-build:
|
tests:
|
||||||
strategy:
|
runs-on: ubuntu-latest
|
||||||
matrix:
|
|
||||||
os: [ubuntu-latest, macos-latest]
|
|
||||||
runs-on: ${{ matrix.os }}
|
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v2
|
- run: sudo du -sh /var/*
|
||||||
- run: yarn install --frozen-lockfile
|
- run: sudo du -sh /usr/*
|
||||||
- run: yarn build
|
|
||||||
- name: Install Nix
|
|
||||||
uses: ./
|
|
||||||
- run: nix-env -iA cachix -f https://cachix.org/api/v1/install
|
|
||||||
- run: cat /etc/nix/nix.conf
|
|
||||||
# cachix should be available and be able to configure a cache
|
|
||||||
- run: cachix use cachix
|
|
||||||
- run: nix-build test.nix
|
|
||||||
|
|
||||||
no-channel:
|
|
||||||
strategy:
|
|
||||||
matrix:
|
|
||||||
os: [ubuntu-latest, macos-latest]
|
|
||||||
runs-on: ${{ matrix.os }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v2
|
|
||||||
- run: yarn install --frozen-lockfile
|
|
||||||
- run: yarn build
|
|
||||||
- name: Install Nix
|
|
||||||
uses: ./
|
|
||||||
with:
|
|
||||||
skip_adding_nixpkgs_channel: true
|
|
||||||
- run: nix-build test.nix && exit 1 || echo "OK"
|
|
||||||
- run: NIX_PATH=nixpkgs=https://github.com/NixOS/nixpkgs/tarball/ab5863afada3c1b50fc43bf774b75ea71b287cde nix-build test.nix
|
|
||||||
|
|
||||||
custom-nix-path:
|
|
||||||
strategy:
|
|
||||||
matrix:
|
|
||||||
os: [ubuntu-latest, macos-latest]
|
|
||||||
runs-on: ${{ matrix.os }}
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v2
|
|
||||||
- run: yarn install --frozen-lockfile
|
|
||||||
- run: yarn build
|
|
||||||
- name: Install Nix
|
|
||||||
uses: ./
|
|
||||||
with:
|
|
||||||
nix_path: nixpkgs=channel:nixos-20.03
|
|
||||||
- run: test $NIX_PATH == "nixpkgs=channel:nixos-20.03"
|
|
||||||
- run: nix-build test.nix
|
|
||||||
|
15
README.md
15
README.md
@ -18,24 +18,17 @@ jobs:
|
|||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v2
|
- uses: actions/checkout@v2
|
||||||
- uses: cachix/install-nix-action@v9
|
- uses: cachix/install-nix-action@v7
|
||||||
with:
|
|
||||||
nix_path: nixpkgs=channel:nixos-unstable
|
|
||||||
- run: nix-build
|
- run: nix-build
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
|
See [action.yml](action.yml) for all options.
|
||||||
|
|
||||||
See also [cachix-action](https://github.com/cachix/cachix-action) for
|
See also [cachix-action](https://github.com/cachix/cachix-action) for
|
||||||
simple binary cache setup to speed up your builds and share binaries
|
simple binary cache setup to speed up your builds and share binaries
|
||||||
with developers.
|
with developers.
|
||||||
|
|
||||||
## Options `with: ...`
|
|
||||||
|
|
||||||
- `install_url`: specify URL to install Nix from (mostly useful for testing non-stable releases)
|
|
||||||
|
|
||||||
- `nix_path`: set `NIX_PATH` environment variable (if set `skip_adding_nixpkgs_channel` will be implicitly enabled)
|
|
||||||
|
|
||||||
- `skip_adding_nixpkgs_channel`: set to `true` to skip adding nixpkgs-unstable channel (and save ~5s for each job build)
|
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Hacking
|
## Hacking
|
||||||
|
@ -1,13 +1,6 @@
|
|||||||
name: 'Install Nix'
|
name: 'Install Nix'
|
||||||
description: 'Installs Nix on GitHub Actions for the supported platforms: Linux and macOS.'
|
description: 'Installs Nix on GitHub Actions for the supported platforms: Linux and macOS.'
|
||||||
author: 'Domen Kožar'
|
author: 'Domen Kožar'
|
||||||
inputs:
|
|
||||||
install_url:
|
|
||||||
description: 'Installation URL that will contain a script to install Nix'
|
|
||||||
nix_path:
|
|
||||||
description: 'Set NIX_PATH environment variable. If set "skip_adding_nixpkgs_channel" will be implicitly enabled'
|
|
||||||
skip_adding_nixpkgs_channel:
|
|
||||||
description: 'Skip adding nixpkgs-unstable channel'
|
|
||||||
branding:
|
branding:
|
||||||
color: 'blue'
|
color: 'blue'
|
||||||
icon: 'sun'
|
icon: 'sun'
|
||||||
|
102
lib/create-darwin-volume.sh
Executable file
102
lib/create-darwin-volume.sh
Executable file
@ -0,0 +1,102 @@
|
|||||||
|
#!/usr/bin/env bash
|
||||||
|
set -e
|
||||||
|
|
||||||
|
root_disks() {
|
||||||
|
diskutil list -plist /
|
||||||
|
}
|
||||||
|
|
||||||
|
apfs_volumes_for() {
|
||||||
|
disk=$1
|
||||||
|
diskutil apfs list -plist "$disk"
|
||||||
|
}
|
||||||
|
|
||||||
|
disk_identifier() {
|
||||||
|
xpath "/plist/dict/key[text()='WholeDisks']/following-sibling::array[1]/string/text()" 2>/dev/null
|
||||||
|
}
|
||||||
|
|
||||||
|
volume_get() {
|
||||||
|
key=$1 i=$2
|
||||||
|
xpath "/plist/dict/array/dict/key[text()='Volumes']/following-sibling::array/dict[$i]/key[text()='$key']/following-sibling::string[1]/text()" 2> /dev/null
|
||||||
|
}
|
||||||
|
|
||||||
|
find_nix_volume() {
|
||||||
|
disk=$1
|
||||||
|
i=1
|
||||||
|
volumes=$(apfs_volumes_for "$disk")
|
||||||
|
while true; do
|
||||||
|
name=$(echo "$volumes" | volume_get "Name" "$i")
|
||||||
|
if [ -z "$name" ]; then
|
||||||
|
break
|
||||||
|
fi
|
||||||
|
case "$name" in
|
||||||
|
[Nn]ix*)
|
||||||
|
echo "$name"
|
||||||
|
break
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
i=$((i+1))
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
test_fstab() {
|
||||||
|
grep -q "/nix" /etc/fstab 2>/dev/null
|
||||||
|
}
|
||||||
|
|
||||||
|
test_synthetic_conf() {
|
||||||
|
grep -q "^nix" /etc/synthetic.conf 2>/dev/null
|
||||||
|
}
|
||||||
|
|
||||||
|
test_nix() {
|
||||||
|
test -d "/nix"
|
||||||
|
}
|
||||||
|
|
||||||
|
main() {
|
||||||
|
(
|
||||||
|
echo ""
|
||||||
|
echo " ------------------------------------------------------------------ "
|
||||||
|
echo " | This installer will create a volume for the nix store and |"
|
||||||
|
echo " | configure it to mount at /nix. Follow these steps to uninstall. |"
|
||||||
|
echo " ------------------------------------------------------------------ "
|
||||||
|
echo ""
|
||||||
|
echo " 1. Remove the entry from fstab using 'sudo vifs'"
|
||||||
|
echo " 2. Destroy the data volume using 'diskutil apfs deleteVolume'"
|
||||||
|
echo " 3. Delete /etc/synthetic.conf"
|
||||||
|
echo ""
|
||||||
|
) >&2
|
||||||
|
|
||||||
|
if [ -L "/nix" ]; then
|
||||||
|
echo "error: /nix is a symlink, please remove it or edit synthetic.conf (requires reboot)" >&2
|
||||||
|
echo " /nix -> $(readlink "/nix")" >&2
|
||||||
|
exit 2
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! test_synthetic_conf; then
|
||||||
|
echo "Configuring /etc/synthetic.conf..." >&2
|
||||||
|
echo nix | sudo tee /etc/synthetic.conf
|
||||||
|
/System/Library/Filesystems/apfs.fs/Contents/Resources/apfs.util -B
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! test_nix; then
|
||||||
|
echo "Creating mountpoint for /nix..." >&2
|
||||||
|
sudo mkdir /nix
|
||||||
|
fi
|
||||||
|
|
||||||
|
disk=$(root_disks | disk_identifier)
|
||||||
|
volume=$(find_nix_volume "$disk")
|
||||||
|
if [ -z "$volume" ]; then
|
||||||
|
echo "Creating a Nix Store volume..." >&2
|
||||||
|
sudo diskutil apfs addVolume "$disk" APFS 'Nix Store' -mountpoint /nix
|
||||||
|
volume="Nix Store"
|
||||||
|
else
|
||||||
|
echo "Using existing '$volume' volume" >&2
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! test_fstab; then
|
||||||
|
echo "Configuring /etc/fstab..." >&2
|
||||||
|
label=$(echo "$volume" | sed 's/ /\\040/g')
|
||||||
|
printf "\$a\nLABEL=%s /nix apfs rw\n.\nwq\n" "$label" | EDITOR=ed sudo vifs
|
||||||
|
sudo defaults write /Library/Preferences/SystemConfiguration/autodiskmount AutomountDisksWithoutUserLogin -bool true
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
|
main "$@"
|
@ -1,36 +1,48 @@
|
|||||||
#!/usr/bin/env bash
|
#!/usr/bin/env bash
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
|
||||||
# Set jobs to number of cores
|
export here=$(dirname "${BASH_SOURCE[0]}")
|
||||||
sudo sh -c 'echo max-jobs = auto >> /tmp/nix.conf'
|
|
||||||
# Allow binary caches for runner user
|
|
||||||
sudo sh -c 'echo trusted-users = root runner >> /tmp/nix.conf'
|
|
||||||
|
|
||||||
if [[ $INPUT_SKIP_ADDING_NIXPKGS_CHANNEL = "true" || $INPUT_NIX_PATH != "" ]]; then
|
nixConf() {
|
||||||
extra_cmd=--no-channel-add
|
sudo mkdir -p /etc/nix
|
||||||
else
|
# Workaround a segfault: https://github.com/NixOS/nix/issues/2733
|
||||||
extra_cmd=
|
sudo sh -c 'echo http2 = false >> /etc/nix/nix.conf'
|
||||||
INPUT_NIX_PATH="/nix/var/nix/profiles/per-user/root/channels"
|
# Set jobs to number of cores
|
||||||
fi
|
sudo sh -c 'echo max-jobs = auto >> /etc/nix/nix.conf'
|
||||||
|
# Allow binary caches for runner user
|
||||||
sh <(curl -L ${INPUT_INSTALL_URL:-https://nixos.org/nix/install}) \
|
sudo sh -c 'echo trusted-users = root runner >> /etc/nix/nix.conf'
|
||||||
--daemon --daemon-user-count 4 --nix-extra-conf-file /tmp/nix.conf --darwin-use-unencrypted-nix-store-volume $extra_cmd
|
}
|
||||||
|
|
||||||
if [[ $OSTYPE =~ darwin ]]; then
|
if [[ $OSTYPE =~ darwin ]]; then
|
||||||
|
# Catalina workaround https://github.com/NixOS/nix/issues/2925
|
||||||
|
$here/create-darwin-volume.sh
|
||||||
|
|
||||||
# Disable spotlight indexing of /nix to speed up performance
|
# Disable spotlight indexing of /nix to speed up performance
|
||||||
sudo mdutil -i off /nix
|
sudo mdutil -i off /nix
|
||||||
|
fi
|
||||||
|
|
||||||
# macOS needs certificates hints
|
nixConf
|
||||||
|
|
||||||
|
# Needed due to multi-user being too defensive
|
||||||
|
export ALLOW_PREEXISTING_INSTALLATION=1
|
||||||
|
|
||||||
|
sh <(curl -L https://nixos.org/nix/install) --daemon
|
||||||
|
|
||||||
|
# write nix.conf again as installation overwrites it
|
||||||
|
nixConf
|
||||||
|
|
||||||
|
# macOS needs certificates hints
|
||||||
|
if [[ $OSTYPE =~ darwin ]]; then
|
||||||
cert_file=/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt
|
cert_file=/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt
|
||||||
echo "::set-env name=NIX_SSL_CERT_FILE::$cert_file"
|
echo "::set-env name=NIX_SSL_CERT_FILE::$cert_file"
|
||||||
export NIX_SSL_CERT_FILE=$cert_file
|
export NIX_SSL_CERT_FILE=$cert_file
|
||||||
sudo launchctl setenv NIX_SSL_CERT_FILE "$cert_file"
|
sudo launchctl setenv NIX_SSL_CERT_FILE "$cert_file"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# Reload the daemon to pick up changes
|
||||||
|
sudo pkill -HUP nix-daemon
|
||||||
|
|
||||||
# Set paths
|
# Set paths
|
||||||
echo "::add-path::/nix/var/nix/profiles/per-user/runner/profile/bin"
|
echo "::add-path::/nix/var/nix/profiles/per-user/runner/profile/bin"
|
||||||
echo "::add-path::/nix/var/nix/profiles/default/bin"
|
echo "::add-path::/nix/var/nix/profiles/default/bin"
|
||||||
|
echo "::set-env name=NIX_PATH::/nix/var/nix/profiles/per-user/root/channels"
|
||||||
if [[ $INPUT_NIX_PATH != "" ]]; then
|
|
||||||
echo "::set-env name=NIX_PATH::${INPUT_NIX_PATH}"
|
|
||||||
fi
|
|
26
lib/main.js
26
lib/main.js
@ -1,4 +1,30 @@
|
|||||||
"use strict";
|
"use strict";
|
||||||
|
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
||||||
|
function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
|
||||||
|
return new (P || (P = Promise))(function (resolve, reject) {
|
||||||
|
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
||||||
|
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
||||||
|
function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
|
||||||
|
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
||||||
|
});
|
||||||
|
};
|
||||||
Object.defineProperty(exports, "__esModule", { value: true });
|
Object.defineProperty(exports, "__esModule", { value: true });
|
||||||
const child_process_1 = require("child_process");
|
const child_process_1 = require("child_process");
|
||||||
|
const process_1 = require("process");
|
||||||
|
const net_1 = require("net");
|
||||||
|
function awaitSocket() {
|
||||||
|
return __awaiter(this, void 0, void 0, function* () {
|
||||||
|
const daemonSocket = net_1.createConnection({ path: '/nix/var/nix/daemon-socket/socket' });
|
||||||
|
daemonSocket.on('error', () => __awaiter(this, void 0, void 0, function* () {
|
||||||
|
console.log('Waiting for daemon socket to be available, reconnecting...');
|
||||||
|
yield new Promise(resolve => setTimeout(resolve, 500));
|
||||||
|
yield awaitSocket();
|
||||||
|
}));
|
||||||
|
daemonSocket.on('connect', () => {
|
||||||
|
process_1.exit(0);
|
||||||
|
});
|
||||||
|
});
|
||||||
|
}
|
||||||
child_process_1.execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' });
|
child_process_1.execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' });
|
||||||
|
// nc doesn't work correctly on macOS :(
|
||||||
|
awaitSocket();
|
||||||
|
17
src/main.ts
17
src/main.ts
@ -1,3 +1,20 @@
|
|||||||
import { execFileSync } from 'child_process';
|
import { execFileSync } from 'child_process';
|
||||||
|
import { exit } from 'process';
|
||||||
|
import { createConnection } from 'net';
|
||||||
|
|
||||||
|
async function awaitSocket() {
|
||||||
|
const daemonSocket = createConnection({ path: '/nix/var/nix/daemon-socket/socket' });
|
||||||
|
daemonSocket.on('error', async () => {
|
||||||
|
console.log('Waiting for daemon socket to be available, reconnecting...');
|
||||||
|
await new Promise(resolve => setTimeout(resolve, 500));
|
||||||
|
await awaitSocket();
|
||||||
|
});
|
||||||
|
daemonSocket.on('connect', () => {
|
||||||
|
exit(0);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' });
|
execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' });
|
||||||
|
|
||||||
|
// nc doesn't work correctly on macOS :(
|
||||||
|
awaitSocket();
|
@ -424,9 +424,9 @@ acorn-walk@^6.0.1:
|
|||||||
integrity sha512-7evsyfH1cLOCdAzZAd43Cic04yKydNx0cF+7tiA19p1XnLLPU4dpCQOqpjqwokFe//vS0QqfqqjCS2JkiIs0cA==
|
integrity sha512-7evsyfH1cLOCdAzZAd43Cic04yKydNx0cF+7tiA19p1XnLLPU4dpCQOqpjqwokFe//vS0QqfqqjCS2JkiIs0cA==
|
||||||
|
|
||||||
acorn@^5.5.3:
|
acorn@^5.5.3:
|
||||||
version "5.7.4"
|
version "5.7.3"
|
||||||
resolved "https://registry.yarnpkg.com/acorn/-/acorn-5.7.4.tgz#3e8d8a9947d0599a1796d10225d7432f4a4acf5e"
|
resolved "https://registry.yarnpkg.com/acorn/-/acorn-5.7.3.tgz#67aa231bf8812974b85235a96771eb6bd07ea279"
|
||||||
integrity sha512-1D++VG7BhrtvQpNbBzovKNc1FLGGEE/oGe7b9xJm/RFHMBeUaUGpluV9RLjZa47YFdPcDAenEYuq9pQPcMdLJg==
|
integrity sha512-T/zvzYRfbVojPWahDsE5evJdHb3oJoQfFbsrKM7w5Zcs++Tr257tia3BmMP8XYVjp1S9RZXQMh7gao96BlqZOw==
|
||||||
|
|
||||||
acorn@^6.0.1:
|
acorn@^6.0.1:
|
||||||
version "6.3.0"
|
version "6.3.0"
|
||||||
|
Reference in New Issue
Block a user