Compare commits
	
		
			18 Commits
		
	
	
		
			revert-26-
			...
			releases/v
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
|  | 63cf434de4 | ||
|  | 2ebff14e68 | ||
|  | a744770f4b | ||
|  | 14f0e86ffb | ||
|  | 4cbb444a96 | ||
|  | f68249e909 | ||
|  | 10a7d51bce | ||
|  | 642cfa0200 | ||
|  | d3c3fef7d5 | ||
|  | 1c67340d91 | ||
|  | afb82faed7 | ||
|  | bc19d99f45 | ||
|  | 5ab66ea04b | ||
|  | 1b7507cdbf | ||
|  | 5bba53f2a2 | ||
|  | ebed63b0a2 | ||
|  | 5c21a08208 | ||
|  | 9affe1ce81 | 
							
								
								
									
										44
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										44
									
								
								.github/workflows/test.yml
									
									
									
									
										vendored
									
									
								
							| @@ -2,23 +2,53 @@ name: "install-nix-action test" | |||||||
| on: | on: | ||||||
|   pull_request: |   pull_request: | ||||||
|   push: |   push: | ||||||
|  |  | ||||||
| jobs: | jobs: | ||||||
|   tests: |   simple-build: | ||||||
|     strategy: |     strategy: | ||||||
|       matrix: |       matrix: | ||||||
|         os: [ubuntu-18.04, macos-latest] |         os: [ubuntu-latest, macos-latest] | ||||||
|     runs-on: ${{ matrix.os }} |     runs-on: ${{ matrix.os }} | ||||||
|     steps: |     steps: | ||||||
|     - uses: actions/checkout@v1 |     - uses: actions/checkout@v2 | ||||||
|     - run: yarn install --frozen-lockfile |     - run: yarn install --frozen-lockfile | ||||||
|     - run: yarn build |     - run: yarn build | ||||||
|     # TODO: just commit it using github |  | ||||||
|     - run: git diff --exit-code |  | ||||||
|     - run: yarn test |  | ||||||
|     - name: Install Nix |     - name: Install Nix | ||||||
|       uses: ./ |       uses: ./ | ||||||
|     - run: nix-env -iA cachix -f https://github.com/NixOS/nixpkgs/tarball/ab5863afada3c1b50fc43bf774b75ea71b287cde |     - run: nix-env -iA cachix -f https://cachix.org/api/v1/install | ||||||
|     - run: cat /etc/nix/nix.conf |     - run: cat /etc/nix/nix.conf | ||||||
|     # cachix should be available and be able to configure a cache |     # cachix should be available and be able to configure a cache | ||||||
|     - run: cachix use cachix |     - run: cachix use cachix | ||||||
|     - run: nix-build test.nix |     - run: nix-build test.nix | ||||||
|  |  | ||||||
|  |   no-channel: | ||||||
|  |     strategy: | ||||||
|  |       matrix: | ||||||
|  |         os: [ubuntu-latest, macos-latest] | ||||||
|  |     runs-on: ${{ matrix.os }} | ||||||
|  |     steps: | ||||||
|  |     - uses: actions/checkout@v2 | ||||||
|  |     - run: yarn install --frozen-lockfile | ||||||
|  |     - run: yarn build | ||||||
|  |     - name: Install Nix | ||||||
|  |       uses: ./ | ||||||
|  |       with: | ||||||
|  |         skip_adding_nixpkgs_channel: true | ||||||
|  |     - run: nix-build test.nix && exit 1 || echo "OK" | ||||||
|  |     - run: NIX_PATH=nixpkgs=https://github.com/NixOS/nixpkgs/tarball/ab5863afada3c1b50fc43bf774b75ea71b287cde nix-build test.nix | ||||||
|  |  | ||||||
|  |   custom-nix-path: | ||||||
|  |     strategy: | ||||||
|  |       matrix: | ||||||
|  |         os: [ubuntu-latest, macos-latest] | ||||||
|  |     runs-on: ${{ matrix.os }} | ||||||
|  |     steps: | ||||||
|  |     - uses: actions/checkout@v2 | ||||||
|  |     - run: yarn install --frozen-lockfile | ||||||
|  |     - run: yarn build | ||||||
|  |     - name: Install Nix | ||||||
|  |       uses: ./ | ||||||
|  |       with: | ||||||
|  |         nix_path: nixpkgs=channel:nixos-20.03 | ||||||
|  |     - run: test $NIX_PATH == "nixpkgs=channel:nixos-20.03" | ||||||
|  |     - run: nix-build test.nix | ||||||
|   | |||||||
							
								
								
									
										17
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										17
									
								
								README.md
									
									
									
									
									
								
							| @@ -17,18 +17,25 @@ jobs: | |||||||
|   tests: |   tests: | ||||||
|     runs-on: ubuntu-latest |     runs-on: ubuntu-latest | ||||||
|     steps: |     steps: | ||||||
|     - uses: actions/checkout@v1 |     - uses: actions/checkout@v2 | ||||||
|     - uses: cachix/install-nix-action@v6 |     - uses: cachix/install-nix-action@v9 | ||||||
|  |       with: | ||||||
|  |         nix_path: nixpkgs=channel:nixos-unstable | ||||||
|     - run: nix-build |     - run: nix-build | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
|  |  | ||||||
| See [action.yml](action.yml) for all options. |  | ||||||
|  |  | ||||||
| See also [cachix-action](https://github.com/cachix/cachix-action) for | See also [cachix-action](https://github.com/cachix/cachix-action) for | ||||||
| simple binary cache setup to speed up your builds and share binaries | simple binary cache setup to speed up your builds and share binaries | ||||||
| with developers. | with developers. | ||||||
|  |  | ||||||
|  | ## Options `with: ...` | ||||||
|  |  | ||||||
|  | - `install_url`: specify URL to install Nix from (mostly useful for testing non-stable releases) | ||||||
|  |  | ||||||
|  | - `nix_path`: set `NIX_PATH` environment variable (if set `skip_adding_nixpkgs_channel` will be implicitly enabled) | ||||||
|  |  | ||||||
|  | - `skip_adding_nixpkgs_channel`: set to `true` to skip adding nixpkgs-unstable channel (and save ~5s for each job build) | ||||||
|  |  | ||||||
| --- | --- | ||||||
|  |  | ||||||
| ## Hacking | ## Hacking | ||||||
|   | |||||||
| @@ -1,6 +1,13 @@ | |||||||
| name: 'Install Nix' | name: 'Install Nix' | ||||||
| description: 'Installs Nix on GitHub Actions for the supported platforms: Linux and macOS.' | description: 'Installs Nix on GitHub Actions for the supported platforms: Linux and macOS.' | ||||||
| author: 'Domen Kožar' | author: 'Domen Kožar' | ||||||
|  | inputs: | ||||||
|  |   install_url: | ||||||
|  |     description: 'Installation URL that will contain a script to install Nix' | ||||||
|  |   nix_path: | ||||||
|  |     description: 'Set NIX_PATH environment variable. If set "skip_adding_nixpkgs_channel" will be implicitly enabled' | ||||||
|  |   skip_adding_nixpkgs_channel: | ||||||
|  |     description: 'Skip adding nixpkgs-unstable channel' | ||||||
| branding: | branding: | ||||||
|   color: 'blue' |   color: 'blue' | ||||||
|   icon: 'sun' |   icon: 'sun' | ||||||
|   | |||||||
| @@ -1,102 +0,0 @@ | |||||||
| #!/usr/bin/env bash |  | ||||||
| set -e |  | ||||||
|  |  | ||||||
| root_disks() { |  | ||||||
|     diskutil list -plist / |  | ||||||
| } |  | ||||||
|  |  | ||||||
| apfs_volumes_for() { |  | ||||||
|     disk=$1 |  | ||||||
|     diskutil apfs list -plist "$disk" |  | ||||||
| } |  | ||||||
|  |  | ||||||
| disk_identifier() { |  | ||||||
|     xpath "/plist/dict/key[text()='WholeDisks']/following-sibling::array[1]/string/text()" 2>/dev/null |  | ||||||
| } |  | ||||||
|  |  | ||||||
| volume_get() { |  | ||||||
|     key=$1 i=$2 |  | ||||||
|     xpath "/plist/dict/array/dict/key[text()='Volumes']/following-sibling::array/dict[$i]/key[text()='$key']/following-sibling::string[1]/text()" 2> /dev/null |  | ||||||
| } |  | ||||||
|  |  | ||||||
| find_nix_volume() { |  | ||||||
|     disk=$1 |  | ||||||
|     i=1 |  | ||||||
|     volumes=$(apfs_volumes_for "$disk") |  | ||||||
|     while true; do |  | ||||||
|         name=$(echo "$volumes" | volume_get "Name" "$i") |  | ||||||
|         if [ -z "$name" ]; then |  | ||||||
|             break |  | ||||||
|         fi |  | ||||||
|         case "$name" in |  | ||||||
|             [Nn]ix*) |  | ||||||
|                 echo "$name" |  | ||||||
|                 break |  | ||||||
|                 ;; |  | ||||||
|         esac |  | ||||||
|         i=$((i+1)) |  | ||||||
|     done |  | ||||||
| } |  | ||||||
|  |  | ||||||
| test_fstab() { |  | ||||||
|     grep -q "/nix" /etc/fstab 2>/dev/null |  | ||||||
| } |  | ||||||
|  |  | ||||||
| test_synthetic_conf() { |  | ||||||
|     grep -q "^nix" /etc/synthetic.conf 2>/dev/null |  | ||||||
| } |  | ||||||
|  |  | ||||||
| test_nix() { |  | ||||||
|     test -d "/nix" |  | ||||||
| } |  | ||||||
|  |  | ||||||
| main() { |  | ||||||
|     ( |  | ||||||
|         echo "" |  | ||||||
|         echo "     ------------------------------------------------------------------ " |  | ||||||
|         echo "    | This installer will create a volume for the nix store and        |" |  | ||||||
|         echo "    | configure it to mount at /nix.  Follow these steps to uninstall. |" |  | ||||||
|         echo "     ------------------------------------------------------------------ " |  | ||||||
|         echo "" |  | ||||||
|         echo "  1. Remove the entry from fstab using 'sudo vifs'" |  | ||||||
|         echo "  2. Destroy the data volume using 'diskutil apfs deleteVolume'" |  | ||||||
|         echo "  3. Delete /etc/synthetic.conf" |  | ||||||
|         echo "" |  | ||||||
|     ) >&2 |  | ||||||
|  |  | ||||||
|     if [ -L "/nix" ]; then |  | ||||||
|         echo "error: /nix is a symlink, please remove it or edit synthetic.conf (requires reboot)" >&2 |  | ||||||
|         echo "  /nix -> $(readlink "/nix")" >&2 |  | ||||||
|         exit 2 |  | ||||||
|     fi |  | ||||||
|  |  | ||||||
|     if ! test_synthetic_conf; then |  | ||||||
|         echo "Configuring /etc/synthetic.conf..." >&2 |  | ||||||
|         echo nix | sudo tee /etc/synthetic.conf |  | ||||||
|         /System/Library/Filesystems/apfs.fs/Contents/Resources/apfs.util -B |  | ||||||
|     fi |  | ||||||
|  |  | ||||||
|     if ! test_nix; then |  | ||||||
|         echo "Creating mountpoint for /nix..." >&2 |  | ||||||
|         sudo mkdir /nix |  | ||||||
|     fi |  | ||||||
|  |  | ||||||
|     disk=$(root_disks | disk_identifier) |  | ||||||
|     volume=$(find_nix_volume "$disk") |  | ||||||
|     if [ -z "$volume" ]; then |  | ||||||
|         echo "Creating a Nix Store volume..." >&2 |  | ||||||
|         sudo diskutil apfs addVolume "$disk" APFS 'Nix Store' -mountpoint /nix |  | ||||||
|         volume="Nix Store" |  | ||||||
|     else |  | ||||||
|         echo "Using existing '$volume' volume" >&2 |  | ||||||
|     fi |  | ||||||
|  |  | ||||||
|     if ! test_fstab; then |  | ||||||
|         echo "Configuring /etc/fstab..." >&2 |  | ||||||
|         label=$(echo "$volume" | sed 's/ /\\040/g') |  | ||||||
|         printf "\$a\nLABEL=%s /nix apfs rw\n.\nwq\n" "$label" | EDITOR=ed sudo vifs |  | ||||||
|         sudo defaults write /Library/Preferences/SystemConfiguration/autodiskmount AutomountDisksWithoutUserLogin -bool true |  | ||||||
|     fi |  | ||||||
| } |  | ||||||
|  |  | ||||||
| main "$@" |  | ||||||
| @@ -1,48 +1,36 @@ | |||||||
| #!/usr/bin/env bash | #!/usr/bin/env bash | ||||||
| set -euo pipefail | set -euo pipefail | ||||||
|  |  | ||||||
| export here=$(dirname "${BASH_SOURCE[0]}") | # Set jobs to number of cores | ||||||
|  | sudo sh -c 'echo max-jobs = auto >> /tmp/nix.conf' | ||||||
|  | # Allow binary caches for runner user | ||||||
|  | sudo sh -c 'echo trusted-users = root runner >> /tmp/nix.conf' | ||||||
|  |  | ||||||
| nixConf() { | if [[ $INPUT_SKIP_ADDING_NIXPKGS_CHANNEL = "true" || $INPUT_NIX_PATH != "" ]]; then | ||||||
|   sudo mkdir -p /etc/nix |   extra_cmd=--no-channel-add | ||||||
|   # Workaround a segfault: https://github.com/NixOS/nix/issues/2733 | else | ||||||
|   sudo sh -c 'echo http2 = false >> /etc/nix/nix.conf' |   extra_cmd= | ||||||
|   # Set jobs to number of cores |   INPUT_NIX_PATH="/nix/var/nix/profiles/per-user/root/channels" | ||||||
|   sudo sh -c 'echo max-jobs = auto >> /etc/nix/nix.conf' |  | ||||||
|   # Allow binary caches for runner user |  | ||||||
|   sudo sh -c 'echo trusted-users = root runner >> /etc/nix/nix.conf' |  | ||||||
| } |  | ||||||
|  |  | ||||||
| if [[ $OSTYPE =~ darwin ]]; then |  | ||||||
|   # Catalina workaround https://github.com/NixOS/nix/issues/2925 |  | ||||||
|   $here/create-darwin-volume.sh |  | ||||||
|  |  | ||||||
|   # Disable spotlight indexing of /nix to speed up performance |  | ||||||
|   sudo mdutil -i off /nix |  | ||||||
| fi | fi | ||||||
|  |  | ||||||
| nixConf | sh <(curl -L ${INPUT_INSTALL_URL:-https://nixos.org/nix/install}) \ | ||||||
|  |   --daemon --daemon-user-count 4 --nix-extra-conf-file /tmp/nix.conf --darwin-use-unencrypted-nix-store-volume $extra_cmd | ||||||
|  |  | ||||||
| # Needed due to multi-user being too defensive |  | ||||||
| export ALLOW_PREEXISTING_INSTALLATION=1 |  | ||||||
|  |  | ||||||
| sh <(curl https://nixos.org/nix/install) --daemon |  | ||||||
|  |  | ||||||
| # write nix.conf again as installation overwrites it |  | ||||||
| nixConf |  | ||||||
|  |  | ||||||
| # macOS needs certificates hints |  | ||||||
| if [[ $OSTYPE =~ darwin ]]; then | if [[ $OSTYPE =~ darwin ]]; then | ||||||
|  |   # Disable spotlight indexing of /nix to speed up performance | ||||||
|  |   sudo mdutil -i off /nix | ||||||
|  |  | ||||||
|  |   # macOS needs certificates hints | ||||||
|   cert_file=/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt |   cert_file=/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt | ||||||
|   echo "::set-env name=NIX_SSL_CERT_FILE::$cert_file" |   echo "::set-env name=NIX_SSL_CERT_FILE::$cert_file" | ||||||
|   export NIX_SSL_CERT_FILE=$cert_file |   export NIX_SSL_CERT_FILE=$cert_file | ||||||
|   sudo launchctl setenv NIX_SSL_CERT_FILE "$cert_file" |   sudo launchctl setenv NIX_SSL_CERT_FILE "$cert_file" | ||||||
| fi | fi | ||||||
|  |  | ||||||
| # Reload the daemon to pick up changes |  | ||||||
| sudo pkill -HUP nix-daemon |  | ||||||
|  |  | ||||||
| # Set paths | # Set paths | ||||||
| echo "::add-path::/nix/var/nix/profiles/per-user/runner/profile/bin" | echo "::add-path::/nix/var/nix/profiles/per-user/runner/profile/bin" | ||||||
| echo "::add-path::/nix/var/nix/profiles/default/bin" | echo "::add-path::/nix/var/nix/profiles/default/bin" | ||||||
| echo "::set-env name=NIX_PATH::/nix/var/nix/profiles/per-user/root/channels" |  | ||||||
|  | if [[ $INPUT_NIX_PATH != "" ]]; then | ||||||
|  |   echo "::set-env name=NIX_PATH::${INPUT_NIX_PATH}" | ||||||
|  | fi | ||||||
|   | |||||||
							
								
								
									
										26
									
								
								lib/main.js
									
									
									
									
									
								
							
							
						
						
									
										26
									
								
								lib/main.js
									
									
									
									
									
								
							| @@ -1,30 +1,4 @@ | |||||||
| "use strict"; | "use strict"; | ||||||
| var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) { |  | ||||||
|     function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); } |  | ||||||
|     return new (P || (P = Promise))(function (resolve, reject) { |  | ||||||
|         function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } } |  | ||||||
|         function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } } |  | ||||||
|         function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); } |  | ||||||
|         step((generator = generator.apply(thisArg, _arguments || [])).next()); |  | ||||||
|     }); |  | ||||||
| }; |  | ||||||
| Object.defineProperty(exports, "__esModule", { value: true }); | Object.defineProperty(exports, "__esModule", { value: true }); | ||||||
| const child_process_1 = require("child_process"); | const child_process_1 = require("child_process"); | ||||||
| const process_1 = require("process"); |  | ||||||
| const net_1 = require("net"); |  | ||||||
| function awaitSocket() { |  | ||||||
|     return __awaiter(this, void 0, void 0, function* () { |  | ||||||
|         const daemonSocket = net_1.createConnection({ path: '/nix/var/nix/daemon-socket/socket' }); |  | ||||||
|         daemonSocket.on('error', () => __awaiter(this, void 0, void 0, function* () { |  | ||||||
|             console.log('Waiting for daemon socket to be available, reconnecting...'); |  | ||||||
|             yield new Promise(resolve => setTimeout(resolve, 500)); |  | ||||||
|             yield awaitSocket(); |  | ||||||
|         })); |  | ||||||
|         daemonSocket.on('connect', () => { |  | ||||||
|             process_1.exit(0); |  | ||||||
|         }); |  | ||||||
|     }); |  | ||||||
| } |  | ||||||
| child_process_1.execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' }); | child_process_1.execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' }); | ||||||
| // nc doesn't work correctly on macOS :( |  | ||||||
| awaitSocket(); |  | ||||||
|   | |||||||
							
								
								
									
										17
									
								
								src/main.ts
									
									
									
									
									
								
							
							
						
						
									
										17
									
								
								src/main.ts
									
									
									
									
									
								
							| @@ -1,20 +1,3 @@ | |||||||
| import { execFileSync } from 'child_process'; | import { execFileSync } from 'child_process'; | ||||||
| import { exit } from 'process'; |  | ||||||
| import { createConnection } from 'net'; |  | ||||||
|  |  | ||||||
| async function awaitSocket() { |  | ||||||
|   const daemonSocket = createConnection({ path: '/nix/var/nix/daemon-socket/socket' }); |  | ||||||
|   daemonSocket.on('error', async () => { |  | ||||||
|     console.log('Waiting for daemon socket to be available, reconnecting...'); |  | ||||||
|     await new Promise(resolve => setTimeout(resolve, 500)); |  | ||||||
|     await awaitSocket(); |  | ||||||
|   }); |  | ||||||
|   daemonSocket.on('connect', () => { |  | ||||||
|     exit(0); |  | ||||||
|   }); |  | ||||||
| } |  | ||||||
|  |  | ||||||
| execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' }); | execFileSync(`${__dirname}/install-nix.sh`, { stdio: 'inherit' }); | ||||||
|  |  | ||||||
| // nc doesn't work correctly on macOS :( |  | ||||||
| awaitSocket(); |  | ||||||
| @@ -424,9 +424,9 @@ acorn-walk@^6.0.1: | |||||||
|   integrity sha512-7evsyfH1cLOCdAzZAd43Cic04yKydNx0cF+7tiA19p1XnLLPU4dpCQOqpjqwokFe//vS0QqfqqjCS2JkiIs0cA== |   integrity sha512-7evsyfH1cLOCdAzZAd43Cic04yKydNx0cF+7tiA19p1XnLLPU4dpCQOqpjqwokFe//vS0QqfqqjCS2JkiIs0cA== | ||||||
|  |  | ||||||
| acorn@^5.5.3: | acorn@^5.5.3: | ||||||
|   version "5.7.3" |   version "5.7.4" | ||||||
|   resolved "https://registry.yarnpkg.com/acorn/-/acorn-5.7.3.tgz#67aa231bf8812974b85235a96771eb6bd07ea279" |   resolved "https://registry.yarnpkg.com/acorn/-/acorn-5.7.4.tgz#3e8d8a9947d0599a1796d10225d7432f4a4acf5e" | ||||||
|   integrity sha512-T/zvzYRfbVojPWahDsE5evJdHb3oJoQfFbsrKM7w5Zcs++Tr257tia3BmMP8XYVjp1S9RZXQMh7gao96BlqZOw== |   integrity sha512-1D++VG7BhrtvQpNbBzovKNc1FLGGEE/oGe7b9xJm/RFHMBeUaUGpluV9RLjZa47YFdPcDAenEYuq9pQPcMdLJg== | ||||||
|  |  | ||||||
| acorn@^6.0.1: | acorn@^6.0.1: | ||||||
|   version "6.3.0" |   version "6.3.0" | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user