core/pkgs/build-support/vm/default.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

1509 lines
41 KiB
Nix
Raw Normal View History

2024-05-02 00:46:19 +00:00
{
lib,
pkgs,
kernel ? pkgs.linux,
img ? pkgs.stdenv.hostPlatform.linux-kernel.target,
storeDir ? builtins.storeDir,
rootModules ? [
"virtio_pci"
"virtio_mmio"
"virtio_blk"
"virtio_balloon"
"virtio_rng"
"ext4"
"unix"
"9p"
"9pnet_virtio"
"crc32c_generic"
] ++ pkgs.lib.optional pkgs.stdenv.hostPlatform.isx86 "rtc_cmos",
}:
let
inherit (pkgs)
bash
bashInteractive
busybox
cpio
coreutils
e2fsprogs
fetchurl
kmod
rpm
stdenv
util-linux
buildPackages
writeScript
writeText
runCommand
;
in
rec {
qemu-common = import ../../../nixos/lib/qemu-common.nix { inherit lib pkgs; };
qemu = buildPackages.qemu_kvm;
modulesClosure = pkgs.makeModulesClosure {
inherit kernel rootModules;
firmware = kernel;
};
hd = "vda"; # either "sda" or "vda"
initrdUtils =
runCommand "initrd-utils"
{
nativeBuildInputs = [ buildPackages.nukeReferences ];
allowedReferences = [
"out"
modulesClosure
]; # prevent accidents like glibc being included in the initrd
}
''
mkdir -p $out/bin
mkdir -p $out/lib
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Copy what we need from Glibc.
cp -p \
${pkgs.stdenv.cc.libc}/lib/ld-*.so.? \
${pkgs.stdenv.cc.libc}/lib/libc.so.* \
${pkgs.stdenv.cc.libc}/lib/libm.so.* \
${pkgs.stdenv.cc.libc}/lib/libresolv.so.* \
$out/lib
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Copy BusyBox.
cp -pd ${pkgs.busybox}/bin/* $out/bin
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Run patchelf to make the programs refer to the copied libraries.
for i in $out/bin/* $out/lib/*; do if ! test -L $i; then nuke-refs $i; fi; done
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
for i in $out/bin/*; do
if [ -f "$i" -a ! -L "$i" ]; then
echo "patching $i..."
patchelf --set-interpreter $out/lib/ld-*.so.? --set-rpath $out/lib $i || true
fi
done
''; # */
stage1Init = writeScript "vm-run-stage1" ''
#! ${initrdUtils}/bin/ash -e
export PATH=${initrdUtils}/bin
mkdir /etc
echo -n > /etc/fstab
mount -t proc none /proc
mount -t sysfs none /sys
echo 2 > /proc/sys/vm/panic_on_oom
for o in $(cat /proc/cmdline); do
case $o in
mountDisk=*)
mountDisk=''${mountDisk#mountDisk=}
;;
command=*)
set -- $(IFS==; echo $o)
command=$2
;;
out=*)
set -- $(IFS==; echo $o)
export out=$2
;;
esac
done
echo "loading kernel modules..."
for i in $(cat ${modulesClosure}/insmod-list); do
insmod $i || echo "warning: unable to load $i"
done
mount -t devtmpfs devtmpfs /dev
ln -s /proc/self/fd /dev/fd
ln -s /proc/self/fd/0 /dev/stdin
ln -s /proc/self/fd/1 /dev/stdout
ln -s /proc/self/fd/2 /dev/stderr
ifconfig lo up
mkdir /fs
if test -z "$mountDisk"; then
mount -t tmpfs none /fs
elif [[ -e "$mountDisk" ]]; then
mount "$mountDisk" /fs
else
mount /dev/${hd} /fs
fi
mkdir -p /fs/dev
mount -o bind /dev /fs/dev
mkdir -p /fs/dev/shm /fs/dev/pts
mount -t tmpfs -o "mode=1777" none /fs/dev/shm
mount -t devpts none /fs/dev/pts
echo "mounting Nix store..."
mkdir -p /fs${storeDir}
mount -t 9p store /fs${storeDir} -o trans=virtio,version=9p2000.L,cache=loose,msize=131072
mkdir -p /fs/tmp /fs/run /fs/var
mount -t tmpfs -o "mode=1777" none /fs/tmp
mount -t tmpfs -o "mode=755" none /fs/run
ln -sfn /run /fs/var/run
echo "mounting host's temporary directory..."
mkdir -p /fs/tmp/xchg
mount -t 9p xchg /fs/tmp/xchg -o trans=virtio,version=9p2000.L,msize=131072
mkdir -p /fs/proc
mount -t proc none /fs/proc
mkdir -p /fs/sys
mount -t sysfs none /fs/sys
mkdir -p /fs/etc
ln -sf /proc/mounts /fs/etc/mtab
echo "127.0.0.1 localhost" > /fs/etc/hosts
# Ensures tools requiring /etc/passwd will work (e.g. nix)
if [ ! -e /fs/etc/passwd ]; then
echo "root:x:0:0:System administrator:/root:/bin/sh" > /fs/etc/passwd
fi
echo "starting stage 2 ($command)"
exec switch_root /fs $command $out
'';
initrd = pkgs.makeInitrd {
contents = [
{
object = stage1Init;
symlink = "/init";
}
];
};
stage2Init = writeScript "vm-run-stage2" ''
#! ${bash}/bin/sh
source /tmp/xchg/saved-env
# Set the system time from the hardware clock. Works around an
# apparent KVM > 1.5.2 bug.
${util-linux}/bin/hwclock -s
export NIX_STORE=${storeDir}
export NIX_BUILD_TOP=/tmp
export TMPDIR=/tmp
export PATH=/empty
out="$1"
cd "$NIX_BUILD_TOP"
if ! test -e /bin/sh; then
${coreutils}/bin/mkdir -p /bin
${coreutils}/bin/ln -s ${bash}/bin/sh /bin/sh
fi
# Set up automatic kernel module loading.
export MODULE_DIR=${kernel}/lib/modules/
${coreutils}/bin/cat <<EOF > /run/modprobe
#! ${bash}/bin/sh
export MODULE_DIR=$MODULE_DIR
exec ${kmod}/bin/modprobe "\$@"
EOF
${coreutils}/bin/chmod 755 /run/modprobe
echo /run/modprobe > /proc/sys/kernel/modprobe
# For debugging: if this is the second time this image is run,
# then don't start the build again, but instead drop the user into
# an interactive shell.
if test -n "$origBuilder" -a ! -e /.debug; then
exec < /dev/null
${coreutils}/bin/touch /.debug
$origBuilder $origArgs
echo $? > /tmp/xchg/in-vm-exit
${busybox}/bin/mount -o remount,ro dummy /
${busybox}/bin/poweroff -f
else
export PATH=/bin:/usr/bin:${coreutils}/bin
echo "Starting interactive shell..."
echo "(To run the original builder: \$origBuilder \$origArgs)"
exec ${busybox}/bin/setsid ${bashInteractive}/bin/bash < /dev/${qemu-common.qemuSerialDevice} &> /dev/${qemu-common.qemuSerialDevice}
fi
'';
qemuCommandLinux = ''
${qemu-common.qemuBinary qemu} \
-nographic -no-reboot \
-device virtio-rng-pci \
-virtfs local,path=${storeDir},security_model=none,mount_tag=store \
-virtfs local,path=$TMPDIR/xchg,security_model=none,mount_tag=xchg \
''${diskImage:+-drive file=$diskImage,if=virtio,cache=unsafe,werror=report} \
-kernel ${kernel}/${img} \
-initrd ${initrd}/initrd \
-append "console=${qemu-common.qemuSerialDevice} panic=1 command=${stage2Init} out=$out mountDisk=$mountDisk loglevel=4" \
$QEMU_OPTS
'';
vmRunCommand =
qemuCommand:
writeText "vm-run" ''
export > saved-env
PATH=${coreutils}/bin
mkdir xchg
mv saved-env xchg/
eval "$preVM"
if [ "$enableParallelBuilding" = 1 ]; then
if [ ''${NIX_BUILD_CORES:-0} = 0 ]; then
QEMU_OPTS+=" -smp cpus=$(nproc)"
else
QEMU_OPTS+=" -smp cpus=$NIX_BUILD_CORES"
2024-06-30 08:12:46 +00:00
fi
2024-05-02 00:46:19 +00:00
fi
# Write the command to start the VM to a file so that the user can
# debug inside the VM if the build fails (when Nix is called with
# the -K option to preserve the temporary build directory).
cat > ./run-vm <<EOF
#! ${bash}/bin/sh
''${diskImage:+diskImage=$diskImage}
TMPDIR=$TMPDIR
cd $TMPDIR
${qemuCommand}
2024-06-30 08:12:46 +00:00
EOF
2024-05-02 00:46:19 +00:00
mkdir -p -m 0700 $out
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
chmod +x ./run-vm
source ./run-vm
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
if ! test -e xchg/in-vm-exit; then
echo "Virtual machine didn't produce an exit code."
exit 1
fi
exitCode="$(cat xchg/in-vm-exit)"
if [ "$exitCode" != "0" ]; then
exit "$exitCode"
fi
eval "$postVM"
'';
# A bash script fragment that produces a disk image at `destination`.
createEmptyImage =
{
# Disk image size in MiB
size,
# Name that will be written to ${destination}/nix-support/full-name
fullName,
# Where to write the image files, defaulting to $out
destination ? "$out",
}:
''
mkdir -p ${destination}
diskImage=${destination}/disk-image.qcow2
${qemu}/bin/qemu-img create -f qcow2 $diskImage "${toString size}M"
mkdir ${destination}/nix-support
echo "${fullName}" > ${destination}/nix-support/full-name
2024-06-30 08:12:46 +00:00
'';
2024-05-02 00:46:19 +00:00
defaultCreateRootFS = ''
mkdir /mnt
${e2fsprogs}/bin/mkfs.ext4 /dev/${hd}
${util-linux}/bin/mount -t ext4 /dev/${hd} /mnt
if test -e /mnt/.debug; then
exec ${bash}/bin/sh
fi
touch /mnt/.debug
mkdir /mnt/proc /mnt/dev /mnt/sys
'';
2024-06-30 08:12:46 +00:00
/*
2024-05-02 00:46:19 +00:00
Run a derivation in a Linux virtual machine (using Qemu/KVM). By
default, there is no disk image; the root filesystem is a tmpfs,
and the nix store is shared with the host (via the 9P protocol).
Thus, any pure Nix derivation should run unmodified, e.g. the
2024-06-30 08:12:46 +00:00
call
2024-05-02 00:46:19 +00:00
runInLinuxVM patchelf
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
will build the derivation `patchelf' inside a VM. The attribute
`preVM' can optionally contain a shell command to be evaluated
*before* the VM is started (i.e., on the host). The attribute
`memSize' specifies the memory size of the VM in megabytes,
defaulting to 512. The attribute `diskImage' can optionally
specify a file system image to be attached to /dev/sda. (Note
that currently we expect the image to contain a filesystem, not a
full disk image with a partition table etc.)
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
If the build fails and Nix is run with the `-K' option, a script
`run-vm' will be left behind in the temporary build directory
that allows you to boot into the VM and debug it interactively.
2024-06-30 08:12:46 +00:00
*/
2024-05-02 00:46:19 +00:00
runInLinuxVM =
2024-06-30 08:12:46 +00:00
drv:
2024-05-02 00:46:19 +00:00
lib.overrideDerivation drv (
2024-06-30 08:12:46 +00:00
{
2024-05-02 00:46:19 +00:00
memSize ? 512,
QEMU_OPTS ? "",
2024-06-30 08:12:46 +00:00
args,
builder,
...
}:
{
2024-05-02 00:46:19 +00:00
requiredSystemFeatures = [ "kvm" ];
builder = "${bash}/bin/sh";
2024-06-30 08:12:46 +00:00
args = [
"-e"
2024-05-02 00:46:19 +00:00
(vmRunCommand qemuCommandLinux)
2024-06-30 08:12:46 +00:00
];
2024-05-02 00:46:19 +00:00
origArgs = args;
origBuilder = builder;
QEMU_OPTS = "${QEMU_OPTS} -m ${toString memSize}";
passAsFile = [ ]; # HACK fix - see https://github.com/NixOS/nixpkgs/issues/16742
2024-06-30 08:12:46 +00:00
}
);
2024-05-02 00:46:19 +00:00
extractFs =
2024-06-30 08:12:46 +00:00
{
2024-05-02 00:46:19 +00:00
file,
fs ? null,
}:
runInLinuxVM (
stdenv.mkDerivation {
name = "extract-file";
buildInputs = [ util-linux ];
buildCommand = ''
ln -s ${kernel}/lib /lib
${kmod}/bin/modprobe loop
${kmod}/bin/modprobe ext4
${kmod}/bin/modprobe hfs
${kmod}/bin/modprobe hfsplus
${kmod}/bin/modprobe squashfs
${kmod}/bin/modprobe iso9660
${kmod}/bin/modprobe ufs
${kmod}/bin/modprobe cramfs
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
mkdir -p $out
mkdir -p tmp
mount -o loop,ro,ufstype=44bsd ${lib.optionalString (fs != null) "-t ${fs} "}${file} tmp ||
mount -o loop,ro ${lib.optionalString (fs != null) "-t ${fs} "}${file} tmp
cp -Rv tmp/* $out/ || exit 0
'';
}
);
extractMTDfs =
{
file,
fs ? null,
}:
runInLinuxVM (
stdenv.mkDerivation {
name = "extract-file-mtd";
buildInputs = [
pkgs.util-linux
pkgs.mtdutils
];
buildCommand = ''
ln -s ${kernel}/lib /lib
${kmod}/bin/modprobe mtd
${kmod}/bin/modprobe mtdram total_size=131072
${kmod}/bin/modprobe mtdchar
${kmod}/bin/modprobe mtdblock
${kmod}/bin/modprobe jffs2
${kmod}/bin/modprobe zlib
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
mkdir -p $out
mkdir -p tmp
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
dd if=${file} of=/dev/mtd0
mount ${lib.optionalString (fs != null) "-t ${fs} "}/dev/mtdblock0 tmp
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
cp -R tmp/* $out/
'';
}
);
2024-06-30 08:12:46 +00:00
/*
2024-05-02 00:46:19 +00:00
Like runInLinuxVM, but run the build not using the stdenv from
the Nix store, but using the tools provided by /bin, /usr/bin
etc. from the specified filesystem image, which typically is a
filesystem containing a non-NixOS Linux distribution.
2024-06-30 08:12:46 +00:00
*/
2024-05-02 00:46:19 +00:00
runInLinuxImage =
2024-06-30 08:12:46 +00:00
drv:
2024-05-02 00:46:19 +00:00
runInLinuxVM (
lib.overrideDerivation drv (attrs: {
mountDisk = attrs.mountDisk or true;
2024-06-30 08:12:46 +00:00
/*
2024-05-02 00:46:19 +00:00
Mount `image' as the root FS, but use a temporary copy-on-write
image since we don't want to (and can't) write to `image'.
2024-06-30 08:12:46 +00:00
*/
2024-05-02 00:46:19 +00:00
preVM = ''
diskImage=$(pwd)/disk-image.qcow2
origImage=${attrs.diskImage}
if test -d "$origImage"; then origImage="$origImage/disk-image.qcow2"; fi
${qemu}/bin/qemu-img create -F ${attrs.diskImageFormat} -b "$origImage" -f qcow2 $diskImage
2024-06-30 08:12:46 +00:00
'';
/*
2024-05-02 00:46:19 +00:00
Inside the VM, run the stdenv setup script normally, but at the
very end set $PATH and $SHELL to the `native' paths for the
distribution inside the VM.
2024-06-30 08:12:46 +00:00
*/
2024-05-02 00:46:19 +00:00
postHook = ''
PATH=/usr/bin:/bin:/usr/sbin:/sbin
SHELL=/bin/sh
eval "$origPostHook"
2024-06-30 08:12:46 +00:00
'';
2024-05-02 00:46:19 +00:00
origPostHook = lib.optionalString (attrs ? postHook) attrs.postHook;
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Don't run Nix-specific build steps like patchelf.
fixupPhase = "true";
2024-06-30 08:12:46 +00:00
})
);
2024-05-02 00:46:19 +00:00
/*
Create a filesystem image of the specified size and fill it with
a set of RPM packages.
*/
fillDiskWithRPMs =
{
size ? 4096,
rpms,
name,
fullName,
preInstall ? "",
postInstall ? "",
runScripts ? true,
createRootFS ? defaultCreateRootFS,
QEMU_OPTS ? "",
memSize ? 512,
unifiedSystemDir ? false,
}:
runInLinuxVM (
stdenv.mkDerivation {
inherit
name
preInstall
postInstall
rpms
QEMU_OPTS
memSize
2024-06-30 08:12:46 +00:00
;
2024-05-02 00:46:19 +00:00
preVM = createEmptyImage { inherit size fullName; };
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
buildCommand = ''
${createRootFS}
chroot=$(type -tP chroot)
# Make the Nix store available in /mnt, because that's where the RPMs live.
mkdir -p /mnt${storeDir}
${util-linux}/bin/mount -o bind ${storeDir} /mnt${storeDir}
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Newer distributions like Fedora 18 require /lib etc. to be
# symlinked to /usr.
${lib.optionalString unifiedSystemDir ''
mkdir -p /mnt/usr/bin /mnt/usr/sbin /mnt/usr/lib /mnt/usr/lib64
ln -s /usr/bin /mnt/bin
ln -s /usr/sbin /mnt/sbin
ln -s /usr/lib /mnt/lib
ln -s /usr/lib64 /mnt/lib64
${util-linux}/bin/mount -t proc none /mnt/proc
''}
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
echo "unpacking RPMs..."
set +o pipefail
for i in $rpms; do
echo "$i..."
${rpm}/bin/rpm2cpio "$i" | chroot /mnt ${cpio}/bin/cpio -i --make-directories --unconditional
2024-06-30 08:12:46 +00:00
done
2024-05-02 00:46:19 +00:00
eval "$preInstall"
echo "initialising RPM DB..."
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
ldconfig -v || true
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
rpm --initdb
${util-linux}/bin/mount -o bind /tmp /mnt/tmp
echo "installing RPMs..."
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
rpm -iv --nosignature ${lib.optionalString (!runScripts) "--noscripts"} $rpms
echo "running post-install script..."
eval "$postInstall"
rm /mnt/.debug
${util-linux}/bin/umount /mnt${storeDir} /mnt/tmp ${lib.optionalString unifiedSystemDir "/mnt/proc"}
${util-linux}/bin/umount /mnt
'';
passthru = {
inherit fullName;
2024-06-30 08:12:46 +00:00
};
}
);
2024-05-02 00:46:19 +00:00
2024-06-30 08:12:46 +00:00
/*
2024-05-02 00:46:19 +00:00
Generate a script that can be used to run an interactive session
in the given image.
2024-06-30 08:12:46 +00:00
*/
2024-05-02 00:46:19 +00:00
makeImageTestScript =
2024-06-30 08:12:46 +00:00
image:
2024-05-02 00:46:19 +00:00
writeScript "image-test" ''
#! ${bash}/bin/sh
if test -z "$1"; then
echo "Syntax: $0 <copy-on-write-temp-file>"
exit 1
fi
diskImage="$1"
if ! test -e "$diskImage"; then
${qemu}/bin/qemu-img create -b ${image}/disk-image.qcow2 -f qcow2 -F qcow2 "$diskImage"
2024-06-30 08:12:46 +00:00
fi
2024-05-02 00:46:19 +00:00
export TMPDIR=$(mktemp -d)
export out=/dummy
export origBuilder=
export origArgs=
mkdir $TMPDIR/xchg
export > $TMPDIR/xchg/saved-env
mountDisk=1
${qemuCommandLinux}
'';
/*
Build RPM packages from the tarball `src' in the Linux
distribution installed in the filesystem `diskImage'. The
tarball must contain an RPM specfile.
2024-06-30 08:12:46 +00:00
*/
2024-05-02 00:46:19 +00:00
buildRPM =
2024-06-30 08:12:46 +00:00
attrs:
2024-05-02 00:46:19 +00:00
runInLinuxImage (
stdenv.mkDerivation (
2024-06-30 08:12:46 +00:00
{
2024-05-02 00:46:19 +00:00
prePhases = [
"prepareImagePhase"
"sysInfoPhase"
2024-06-30 08:12:46 +00:00
];
2024-05-02 00:46:19 +00:00
dontConfigure = true;
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
outDir = "rpms/${attrs.diskImage.name}";
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
prepareImagePhase = ''
if test -n "$extraRPMs"; then
for rpmdir in $extraRPMs ; do
rpm -iv $(ls $rpmdir/rpms/*/*.rpm | grep -v 'src\.rpm' | sort | head -1)
done
2024-06-30 08:12:46 +00:00
fi
'';
2024-05-02 00:46:19 +00:00
sysInfoPhase = ''
echo "System/kernel: $(uname -a)"
if test -e /etc/fedora-release; then echo "Fedora release: $(cat /etc/fedora-release)"; fi
if test -e /etc/SuSE-release; then echo "SUSE release: $(cat /etc/SuSE-release)"; fi
echo "installed RPM packages"
rpm -qa --qf "%{Name}-%{Version}-%{Release} (%{Arch}; %{Distribution}; %{Vendor})\n"
2024-06-30 08:12:46 +00:00
'';
2024-05-02 00:46:19 +00:00
buildPhase = ''
eval "$preBuild"
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
srcName="$(rpmspec --srpm -q --qf '%{source}' *.spec)"
cp "$src" "$srcName" # `ln' doesn't work always work: RPM requires that the file is owned by root
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
export HOME=/tmp/home
mkdir $HOME
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
rpmout=/tmp/rpmout
mkdir $rpmout $rpmout/SPECS $rpmout/BUILD $rpmout/RPMS $rpmout/SRPMS
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
echo "%_topdir $rpmout" >> $HOME/.rpmmacros
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
if [ `uname -m` = i686 ]; then extra="--target i686-linux"; fi
rpmbuild -vv $extra -ta "$srcName"
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
eval "$postBuild"
'';
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
installPhase = ''
eval "$preInstall"
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
mkdir -p $out/$outDir
find $rpmout -name "*.rpm" -exec cp {} $out/$outDir \;
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
for i in $out/$outDir/*.rpm; do
echo "Generated RPM/SRPM: $i"
rpm -qip $i
done
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
eval "$postInstall"
''; # */
}
// attrs
2024-06-30 08:12:46 +00:00
)
2024-05-02 00:46:19 +00:00
);
/*
Create a filesystem image of the specified size and fill it with
a set of Debian packages. `debs' must be a list of list of
.deb files, namely, the Debian packages grouped together into
strongly connected components. See deb/deb-closure.nix.
*/
fillDiskWithDebs =
{
size ? 4096,
debs,
name,
fullName,
postInstall ? null,
createRootFS ? defaultCreateRootFS,
QEMU_OPTS ? "",
memSize ? 512,
...
}@args:
runInLinuxVM (
stdenv.mkDerivation (
2024-06-30 08:12:46 +00:00
{
inherit
name
2024-05-02 00:46:19 +00:00
postInstall
QEMU_OPTS
2024-06-30 08:12:46 +00:00
memSize
;
2024-05-02 00:46:19 +00:00
debs = (lib.intersperse "|" debs);
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
preVM = createEmptyImage { inherit size fullName; };
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
buildCommand = ''
${createRootFS}
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
PATH=$PATH:${
lib.makeBinPath [
pkgs.dpkg
pkgs.glibc
2024-06-30 08:12:46 +00:00
pkgs.xz
]
}
2024-05-02 00:46:19 +00:00
# Unpack the .debs. We do this to prevent pre-install scripts
# (which have lots of circular dependencies) from barfing.
echo "unpacking Debs..."
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
for deb in $debs; do
if test "$deb" != "|"; then
echo "$deb..."
dpkg-deb --extract "$deb" /mnt
2024-06-30 08:12:46 +00:00
fi
done
2024-05-02 00:46:19 +00:00
# Make the Nix store available in /mnt, because that's where the .debs live.
mkdir -p /mnt/inst${storeDir}
${util-linux}/bin/mount -o bind ${storeDir} /mnt/inst${storeDir}
${util-linux}/bin/mount -o bind /proc /mnt/proc
${util-linux}/bin/mount -o bind /dev /mnt/dev
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Misc. files/directories assumed by various packages.
echo "initialising Dpkg DB..."
touch /mnt/etc/shells
touch /mnt/var/lib/dpkg/status
touch /mnt/var/lib/dpkg/available
touch /mnt/var/lib/dpkg/diversions
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Now install the .debs. This is basically just to register
# them with dpkg and to make their pre/post-install scripts
2024-06-30 08:12:46 +00:00
# run.
2024-05-02 00:46:19 +00:00
echo "installing Debs..."
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
export DEBIAN_FRONTEND=noninteractive
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
oldIFS="$IFS"
2024-06-30 08:12:46 +00:00
IFS="|"
2024-05-02 00:46:19 +00:00
for component in $debs; do
IFS="$oldIFS"
2024-06-30 08:12:46 +00:00
echo
2024-05-02 00:46:19 +00:00
echo ">>> INSTALLING COMPONENT: $component"
2024-06-30 08:12:46 +00:00
debs=
2024-05-02 00:46:19 +00:00
for i in $component; do
debs="$debs /inst/$i";
2024-06-30 08:12:46 +00:00
done
2024-05-02 00:46:19 +00:00
chroot=$(type -tP chroot)
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Create a fake start-stop-daemon script, as done in debootstrap.
mv "/mnt/sbin/start-stop-daemon" "/mnt/sbin/start-stop-daemon.REAL"
echo "#!/bin/true" > "/mnt/sbin/start-stop-daemon"
chmod 755 "/mnt/sbin/start-stop-daemon"
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
PATH=/usr/bin:/bin:/usr/sbin:/sbin $chroot /mnt \
/usr/bin/dpkg --install --force-all $debs < /dev/null || true
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Move the real start-stop-daemon back into its place.
mv "/mnt/sbin/start-stop-daemon.REAL" "/mnt/sbin/start-stop-daemon"
2024-06-30 08:12:46 +00:00
done
2024-05-02 00:46:19 +00:00
echo "running post-install script..."
eval "$postInstall"
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
rm /mnt/.debug
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
${util-linux}/bin/umount /mnt/inst${storeDir}
${util-linux}/bin/umount /mnt/proc
${util-linux}/bin/umount /mnt/dev
${util-linux}/bin/umount /mnt
2024-06-30 08:12:46 +00:00
'';
2024-05-02 00:46:19 +00:00
passthru = {
inherit fullName;
2024-06-30 08:12:46 +00:00
};
}
// args
)
);
2024-05-02 00:46:19 +00:00
/*
Generate a Nix expression containing fetchurl calls for the
closure of a set of top-level RPM packages from the
`primary.xml.gz' file of a Fedora or openSUSE distribution.
*/
rpmClosureGenerator =
{
name,
packagesLists,
urlPrefixes,
packages,
archs ? [ ],
}:
assert (builtins.length packagesLists) == (builtins.length urlPrefixes);
runCommand "${name}.nix"
{
nativeBuildInputs = [
buildPackages.perl
buildPackages.perlPackages.XMLSimple
];
inherit archs;
}
''
${lib.concatImapStrings (i: pl: ''
gunzip < ${pl} > ./packages_${toString i}.xml
'') packagesLists}
perl -w ${rpm/rpm-closure.pl} \
${
lib.concatImapStrings (i: pl: "./packages_${toString i}.xml ${pl.snd} ") (
lib.zipLists packagesLists urlPrefixes
)
} \
${toString packages} > $out
'';
/*
Helper function that combines rpmClosureGenerator and
fillDiskWithRPMs to generate a disk image from a set of package
names.
*/
makeImageFromRPMDist =
{
name,
fullName,
size ? 4096,
urlPrefix ? "",
urlPrefixes ? [ urlPrefix ],
packagesList ? "",
packagesLists ? [ packagesList ],
packages,
extraPackages ? [ ],
preInstall ? "",
postInstall ? "",
archs ? [
"noarch"
"i386"
],
runScripts ? true,
createRootFS ? defaultCreateRootFS,
QEMU_OPTS ? "",
memSize ? 512,
unifiedSystemDir ? false,
}:
fillDiskWithRPMs {
inherit
name
fullName
size
preInstall
postInstall
runScripts
createRootFS
unifiedSystemDir
QEMU_OPTS
memSize
;
rpms = import (rpmClosureGenerator {
inherit
name
packagesLists
urlPrefixes
archs
;
packages = packages ++ extraPackages;
}) { inherit fetchurl; };
};
/*
Like `rpmClosureGenerator', but now for Debian/Ubuntu releases
(i.e. generate a closure from a Packages.bz2 file).
*/
debClosureGenerator =
{
name,
packagesLists,
urlPrefix,
packages,
}:
runCommand "${name}.nix"
{
nativeBuildInputs = [
buildPackages.perl
buildPackages.dpkg
];
}
''
for i in ${toString packagesLists}; do
echo "adding $i..."
case $i in
*.xz | *.lzma)
xz -d < $i >> ./Packages
;;
*.bz2)
bunzip2 < $i >> ./Packages
;;
*.gz)
gzip -dc < $i >> ./Packages
;;
esac
done
perl -w ${deb/deb-closure.pl} \
./Packages ${urlPrefix} ${toString packages} > $out
2024-06-30 08:12:46 +00:00
'';
2024-05-02 00:46:19 +00:00
/*
Helper function that combines debClosureGenerator and
fillDiskWithDebs to generate a disk image from a set of package
names.
*/
makeImageFromDebDist =
{
name,
fullName,
size ? 4096,
urlPrefix,
packagesList ? "",
packagesLists ? [ packagesList ],
packages,
extraPackages ? [ ],
postInstall ? "",
extraDebs ? [ ],
createRootFS ? defaultCreateRootFS,
QEMU_OPTS ? "",
memSize ? 512,
...
}@args:
let
expr = debClosureGenerator {
inherit name packagesLists urlPrefix;
packages = packages ++ extraPackages;
};
in
(fillDiskWithDebs (
{
inherit
name
fullName
size
postInstall
createRootFS
QEMU_OPTS
memSize
;
debs = import expr { inherit fetchurl; } ++ extraDebs;
}
// args
))
// {
inherit expr;
};
# The set of supported RPM-based distributions.
rpmDistros = {
# Note: no i386 release for Fedora >= 26
fedora26x86_64 =
let
version = "26";
in
{
name = "fedora-${version}-x86_64";
fullName = "Fedora ${version} (x86_64)";
packagesList = fetchurl rec {
url = "mirror://fedora/linux/releases/${version}/Everything/x86_64/os/repodata/${sha256}-primary.xml.gz";
sha256 = "880055a50c05b20641530d09b23f64501a000b2f92fe252417c530178730a95e";
};
urlPrefix = "mirror://fedora/linux/releases/${version}/Everything/x86_64/os";
archs = [
"noarch"
"x86_64"
];
packages = commonFedoraPackages ++ [
"cronie"
"util-linux"
2024-06-30 08:12:46 +00:00
];
2024-05-02 00:46:19 +00:00
unifiedSystemDir = true;
};
fedora27x86_64 =
let
version = "27";
in
{
name = "fedora-${version}-x86_64";
fullName = "Fedora ${version} (x86_64)";
packagesList = fetchurl rec {
url = "mirror://fedora/linux/releases/${version}/Everything/x86_64/os/repodata/${sha256}-primary.xml.gz";
sha256 = "48986ce4583cd09825c6d437150314446f0f49fa1a1bd62dcfa1085295030fe9";
};
urlPrefix = "mirror://fedora/linux/releases/${version}/Everything/x86_64/os";
archs = [
"noarch"
"x86_64"
];
packages = commonFedoraPackages ++ [
"cronie"
"util-linux"
2024-06-30 08:12:46 +00:00
];
2024-05-02 00:46:19 +00:00
unifiedSystemDir = true;
};
centos6i386 =
let
version = "6.9";
in
rec {
name = "centos-${version}-i386";
fullName = "CentOS ${version} (i386)";
urlPrefix = "mirror://centos/${version}/os/i386";
packagesList = fetchurl rec {
url = "${urlPrefix}/repodata/${sha256}-primary.xml.gz";
sha256 = "b826a45082ef68340325c0855f3d2e5d5a4d0f77d28ba3b871791d6f14a97aeb";
};
archs = [
"noarch"
"i386"
];
packages = commonCentOSPackages ++ [ "procps" ];
};
centos6x86_64 =
let
version = "6.9";
in
rec {
name = "centos-${version}-x86_64";
fullName = "CentOS ${version} (x86_64)";
urlPrefix = "mirror://centos/${version}/os/x86_64";
packagesList = fetchurl rec {
url = "${urlPrefix}/repodata/${sha256}-primary.xml.gz";
sha256 = "ed2b2d4ac98d774d4cd3e91467e1532f7e8b0275cfc91a0d214b532dcaf1e979";
};
archs = [
"noarch"
"x86_64"
];
packages = commonCentOSPackages ++ [ "procps" ];
};
# Note: no i386 release for 7.x
centos7x86_64 =
let
version = "7.4.1708";
in
rec {
name = "centos-${version}-x86_64";
fullName = "CentOS ${version} (x86_64)";
urlPrefix = "mirror://centos/${version}/os/x86_64";
packagesList = fetchurl rec {
url = "${urlPrefix}/repodata/${sha256}-primary.xml.gz";
sha256 = "b686d3a0f337323e656d9387b9a76ce6808b26255fc3a138b1a87d3b1cb95ed5";
};
archs = [
"noarch"
"x86_64"
];
packages = commonCentOSPackages ++ [ "procps-ng" ];
};
};
# The set of supported Dpkg-based distributions.
debDistros = {
ubuntu1404i386 = {
name = "ubuntu-14.04-trusty-i386";
fullName = "Ubuntu 14.04 Trusty (i386)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/trusty/main/binary-i386/Packages.bz2";
sha256 = "1d5y3v3v079gdq45hc07ja0bjlmzqfwdwwlq0brwxi8m75k3iz7x";
})
(fetchurl {
url = "mirror://ubuntu/dists/trusty/universe/binary-i386/Packages.bz2";
sha256 = "03x9w92by320rfklrqhcl3qpwmnxds9c8ijl5zhcb21d6dcz5z1a";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu1404x86_64 = {
name = "ubuntu-14.04-trusty-amd64";
fullName = "Ubuntu 14.04 Trusty (amd64)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/trusty/main/binary-amd64/Packages.bz2";
sha256 = "1hhzbyqfr5i0swahwnl5gfp5l9p9hspywb1vpihr3b74p1z935bh";
})
(fetchurl {
url = "mirror://ubuntu/dists/trusty/universe/binary-amd64/Packages.bz2";
sha256 = "04560ba8s4z4v5iawknagrkn9q1nzvpn081ycmqvhh73p3p3g1jm";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu1604i386 = {
name = "ubuntu-16.04-xenial-i386";
fullName = "Ubuntu 16.04 Xenial (i386)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/xenial/main/binary-i386/Packages.xz";
sha256 = "13r75sp4slqy8w32y5dnr7pp7p3cfvavyr1g7gwnlkyrq4zx4ahy";
})
(fetchurl {
url = "mirror://ubuntu/dists/xenial/universe/binary-i386/Packages.xz";
sha256 = "14fid1rqm3sc0wlygcvn0yx5aljf51c2jpd4x0zxij4019316hsh";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu1604x86_64 = {
name = "ubuntu-16.04-xenial-amd64";
fullName = "Ubuntu 16.04 Xenial (amd64)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/xenial/main/binary-amd64/Packages.xz";
sha256 = "110qnkhjkkwm316fbig3aivm2595ydz6zskc4ld5cr8ngcrqm1bn";
})
(fetchurl {
url = "mirror://ubuntu/dists/xenial/universe/binary-amd64/Packages.xz";
sha256 = "0mm7gj491yi6q4v0n4qkbsm94s59bvqir6fk60j73w7y4la8rg68";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu1804i386 = {
name = "ubuntu-18.04-bionic-i386";
fullName = "Ubuntu 18.04 Bionic (i386)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/bionic/main/binary-i386/Packages.xz";
sha256 = "0f0v4131kwf7m7f8j3288rlqdxk1k3vqy74b7fcfd6jz9j8d840i";
})
(fetchurl {
url = "mirror://ubuntu/dists/bionic/universe/binary-i386/Packages.xz";
sha256 = "1v75c0dqr0wp0dqd4hnci92qqs4hll8frqdbpswadgxm5chn91bw";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu1804x86_64 = {
name = "ubuntu-18.04-bionic-amd64";
fullName = "Ubuntu 18.04 Bionic (amd64)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/bionic/main/binary-amd64/Packages.xz";
sha256 = "1ls81bjyvmfz6i919kszl7xks1ibrh1xqhsk6698ackndkm0wp39";
})
(fetchurl {
url = "mirror://ubuntu/dists/bionic/universe/binary-amd64/Packages.xz";
sha256 = "1832nqpn4ap95b3sj870xqayrza9in4kih9jkmjax27pq6x15v1r";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu2004i386 = {
name = "ubuntu-20.04-focal-i386";
fullName = "Ubuntu 20.04 Focal (i386)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/focal/main/binary-i386/Packages.xz";
sha256 = "sha256-7RAYURoN3RKYQAHpwBS9TIV6vCmpURpphyMJQmV4wLc=";
})
(fetchurl {
url = "mirror://ubuntu/dists/focal/universe/binary-i386/Packages.xz";
sha256 = "sha256-oA551xVE80volUPgkMyvzpQ1d+GhuZd4DAe7dXZnULM=";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu2004x86_64 = {
name = "ubuntu-20.04-focal-amd64";
fullName = "Ubuntu 20.04 Focal (amd64)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/focal/main/binary-amd64/Packages.xz";
sha256 = "sha256-d1eSH/j+7Zw5NKDJk21EG6SiOL7j6myMHfXLzUP8mGE=";
})
(fetchurl {
url = "mirror://ubuntu/dists/focal/universe/binary-amd64/Packages.xz";
sha256 = "sha256-RqdG2seJvZU3rKVNsWgLnf9RwkgVMRE1A4IZnX2WudE=";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu2204i386 = {
name = "ubuntu-22.04-jammy-i386";
fullName = "Ubuntu 22.04 Jammy (i386)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/jammy/main/binary-i386/Packages.xz";
sha256 = "sha256-iZBmwT0ep4v+V3sayybbOgZBOFFZwPGpOKtmuLMMVPQ=";
})
(fetchurl {
url = "mirror://ubuntu/dists/jammy/universe/binary-i386/Packages.xz";
sha256 = "sha256-DO2LdpZ9rDDBhWj2gvDWd0TJJVZHxKsYTKTi6GXjm1E=";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
ubuntu2204x86_64 = {
name = "ubuntu-22.04-jammy-amd64";
fullName = "Ubuntu 22.04 Jammy (amd64)";
packagesLists = [
(fetchurl {
url = "mirror://ubuntu/dists/jammy/main/binary-amd64/Packages.xz";
sha256 = "sha256-N8tX8VVMv6ccWinun/7hipqMF4K7BWjgh0t/9M6PnBE=";
})
(fetchurl {
url = "mirror://ubuntu/dists/jammy/universe/binary-amd64/Packages.xz";
sha256 = "sha256-0pyyTJP+xfQyVXBrzn60bUd5lSA52MaKwbsUpvNlXOI=";
})
];
urlPrefix = "mirror://ubuntu";
packages = commonDebPackages ++ [
"diffutils"
"libc-bin"
];
};
debian10i386 = {
name = "debian-10.13-buster-i386";
fullName = "Debian 10.13 Buster (i386)";
packagesList = fetchurl {
url = "https://snapshot.debian.org/archive/debian/20221126T084953Z/dists/buster/main/binary-i386/Packages.xz";
hash = "sha256-n9JquhtZgxw3qr9BX0MQoY3ZTIHN0dit+iru3DC31UY=";
};
urlPrefix = "https://snapshot.debian.org/archive/debian/20221126T084953Z";
packages = commonDebianPackages;
};
debian10x86_64 = {
name = "debian-10.13-buster-amd64";
fullName = "Debian 10.13 Buster (amd64)";
packagesList = fetchurl {
url = "https://snapshot.debian.org/archive/debian/20221126T084953Z/dists/buster/main/binary-amd64/Packages.xz";
hash = "sha256-YukIIB3u87jgp9oudwklsxyKVKjSL618wFgDSXiFmjU=";
};
urlPrefix = "https://snapshot.debian.org/archive/debian/20221126T084953Z";
packages = commonDebianPackages;
};
debian11i386 = {
name = "debian-11.8-bullseye-i386";
fullName = "Debian 11.8 Bullseye (i386)";
packagesList = fetchurl {
url = "https://snapshot.debian.org/archive/debian/20231124T031419Z/dists/bullseye/main/binary-i386/Packages.xz";
hash = "sha256-0bKSLLPhEC7FB5D1NA2jaQP0wTe/Qp1ddiA/NDVjRaI=";
};
urlPrefix = "https://snapshot.debian.org/archive/debian/20231124T031419Z";
packages = commonDebianPackages;
};
debian11x86_64 = {
name = "debian-11.8-bullseye-amd64";
fullName = "Debian 11.8 Bullseye (amd64)";
packagesList = fetchurl {
url = "https://snapshot.debian.org/archive/debian/20231124T031419Z/dists/bullseye/main/binary-amd64/Packages.xz";
hash = "sha256-CYPsGgQgJZkh3JmbcAQkYDWP193qrkOADOgrMETZIeo=";
};
urlPrefix = "https://snapshot.debian.org/archive/debian/20231124T031419Z";
packages = commonDebianPackages;
};
debian12i386 = {
name = "debian-12.2-bookworm-i386";
fullName = "Debian 12.2 Bookworm (i386)";
packagesList = fetchurl {
url = "https://snapshot.debian.org/archive/debian/20231124T031419Z/dists/bookworm/main/binary-i386/Packages.xz";
hash = "sha256-OeN9Q2HFM3GsPNhOa4VhM7qpwT66yUNwC+6Z8SbGEeQ=";
};
urlPrefix = "https://snapshot.debian.org/archive/debian/20231124T031419Z";
packages = commonDebianPackages;
};
debian12x86_64 = {
name = "debian-12.2-bookworm-amd64";
fullName = "Debian 12.2 Bookworm (amd64)";
packagesList = fetchurl {
url = "https://snapshot.debian.org/archive/debian/20231124T031419Z/dists/bookworm/main/binary-amd64/Packages.xz";
hash = "sha256-SZDElRfe9BlBwDlajQB79Qdn08rv8whYoQDeVCveKVs=";
};
urlPrefix = "https://snapshot.debian.org/archive/debian/20231124T031419Z";
packages = commonDebianPackages;
};
};
# Common packages for Fedora images.
commonFedoraPackages = [
"autoconf"
"automake"
"basesystem"
"bzip2"
"curl"
"diffutils"
"fedora-release"
"findutils"
"gawk"
"gcc-c++"
"gzip"
"make"
"patch"
"perl"
"pkgconf-pkg-config"
"rpm"
"rpm-build"
"tar"
"unzip"
];
commonCentOSPackages = [
"autoconf"
"automake"
"basesystem"
"bzip2"
"curl"
"diffutils"
"centos-release"
"findutils"
"gawk"
"gcc-c++"
"gzip"
"make"
"patch"
"perl"
"pkgconfig"
"rpm"
"rpm-build"
"tar"
"unzip"
];
commonRHELPackages = [
"autoconf"
"automake"
"basesystem"
"bzip2"
"curl"
"diffutils"
"findutils"
"gawk"
"gcc-c++"
"gzip"
"make"
"patch"
"perl"
"pkgconfig"
"procps-ng"
"rpm"
"rpm-build"
"tar"
"unzip"
];
# Common packages for openSUSE images.
commonOpenSUSEPackages = [
"aaa_base"
"autoconf"
"automake"
"bzip2"
"curl"
"diffutils"
"findutils"
"gawk"
"gcc-c++"
"gzip"
"make"
"patch"
"perl"
"pkg-config"
"rpm"
"tar"
"unzip"
"util-linux"
"gnu-getopt"
];
# Common packages for Debian/Ubuntu images.
commonDebPackages = [
"base-passwd"
"dpkg"
"libc6-dev"
"perl"
"bash"
"dash"
"gzip"
"bzip2"
"tar"
"grep"
"mawk"
"sed"
"findutils"
"g++"
"make"
"curl"
"patch"
"locales"
"coreutils"
# Needed by checkinstall:
"util-linux"
"file"
"dpkg-dev"
"pkg-config"
# Needed because it provides /etc/login.defs, whose absence causes
# the "passwd" post-installs script to fail.
"login"
"passwd"
];
commonDebianPackages = commonDebPackages ++ [
"sysvinit"
"diff"
];
2024-06-30 08:12:46 +00:00
/*
2024-05-02 00:46:19 +00:00
A set of functions that build the Linux distributions specified
in `rpmDistros' and `debDistros'. For instance,
`diskImageFuns.ubuntu1004x86_64 { }' builds an Ubuntu 10.04 disk
image containing the default packages specified above. Overrides
of the default image parameters can be given. In particular,
`extraPackages' specifies the names of additional packages from
the distribution that should be included in the image; `packages'
allows the entire set of packages to be overridden; and `size'
sets the size of the disk in megabytes. E.g.,
`diskImageFuns.ubuntu1004x86_64 { extraPackages = ["firefox"];
size = 8192; }' builds an 8 GiB image containing Firefox in
addition to the default packages.
2024-06-30 08:12:46 +00:00
*/
2024-05-02 00:46:19 +00:00
diskImageFuns =
(lib.mapAttrs (
name: as: as2:
makeImageFromRPMDist (as // as2)
) rpmDistros)
// (lib.mapAttrs (
name: as: as2:
makeImageFromDebDist (as // as2)
) debDistros);
2024-06-30 08:12:46 +00:00
2024-05-02 00:46:19 +00:00
# Shorthand for `diskImageFuns.<attr> { extraPackages = ... }'.
diskImageExtraFuns = lib.mapAttrs (
name: f: extraPackages:
f { inherit extraPackages; }
) diskImageFuns;
/*
Default disk images generated from the `rpmDistros' and
`debDistros' sets.
*/
diskImages = lib.mapAttrs (name: f: f { }) diskImageFuns;
}