Open philipacarlson opened 2 years ago
I experienced the same error on Fedora 35. Full output available on request
hostnamectl output:
Transient hostname: fedora
Icon name: computer-convertible
Chassis: convertible
Might help get more readers if you put your error message in code blocks - besides making the formatting nicer, and distinguishing the prose from the script output, GitHub will then automatically add scrollbars so your post doesn't look like a novel ;)
SELinux is preventing systemd from read access on the lnk_file default.
***** Plugin catchall_labels (83.8 confidence) suggests *******************
If you want to allow systemd to have read access on the default lnk_file
Then you need to change the label on default
Do
# semanage fcontext -a -t FILE_TYPE 'default'
where FILE_TYPE is one of the following: NetworkManager_etc_rw_t, NetworkManager_etc_t, NetworkManager_unit_file_t, NetworkManager_var_run_t, abrt_etc_t, abrt_unit_file_t, abrt_var_run_t, accountsd_unit_file_t, admin_home_t, aiccu_etc_t, aiccu_var_run_t, ajaxterm_var_run_t, alsa_etc_rw_t, alsa_lock_t, alsa_unit_file_t, alsa_var_run_t, amanda_unit_file_t, antivirus_conf_t, antivirus_unit_file_t, antivirus_var_run_t, apcupsd_lock_t, apcupsd_unit_file_t, apcupsd_var_run_t, apmd_lock_t, apmd_unit_file_t, apmd_var_run_t, arpwatch_unit_file_t, arpwatch_var_run_t, asterisk_etc_t, asterisk_var_run_t, audisp_var_run_t, auditd_unit_file_t, auditd_var_run_t, automount_lock_t, automount_unit_file_t, automount_var_run_t, avahi_conf_t, avahi_unit_file_t, avahi_var_run_t, bacula_var_run_t, bcfg2_unit_file_t, bcfg2_var_run_t, bin_t, bitlbee_conf_t, bitlbee_var_run_t, blkmapd_var_run_t, blktap_var_run_t, blueman_var_run_t, bluetooth_conf_t, bluetooth_lock_t, bluetooth_unit_file_t, bluetooth_var_run_t, boinc_unit_file_t, boltd_var_lib_t, boltd_var_run_t, boot_t, bootloader_etc_t, bootloader_var_run_t, brltty_unit_file_t, brltty_var_run_t, bumblebee_unit_file_t, bumblebee_var_run_t, cache_home_t, cachefilesd_var_run_t, callweaver_var_run_t, canna_var_run_t, cardmgr_var_run_t, ccs_var_run_t, cert_t, certmaster_var_run_t, certmonger_unit_file_t, certmonger_var_run_t, cgconfig_etc_t, cgred_var_run_t, cgroup_t, cgrules_etc_t, chronyd_unit_file_t, chronyd_var_run_t, cinder_api_unit_file_t, cinder_backup_unit_file_t, cinder_scheduler_unit_file_t, cinder_var_run_t, cinder_volume_unit_file_t, clogd_var_run_t, cloud_init_unit_file_t, cluster_conf_t, cluster_unit_file_t, cluster_var_run_t, clvmd_var_run_t, cmirrord_var_run_t, cobbler_etc_t, cockpit_unit_file_t, cockpit_var_run_t, collectd_unit_file_t, collectd_var_run_t, colord_unit_file_t, comsat_var_run_t, condor_conf_t, condor_unit_file_t, condor_var_lock_t, condor_var_run_t, config_home_t, conman_unit_file_t, conman_var_run_t, conntrackd_conf_t, conntrackd_unit_file_t, conntrackd_var_lock_t, conntrackd_var_run_t, consolekit_unit_file_t, consolekit_var_run_t, container_config_t, container_file_t, container_kvm_var_run_t, container_lock_t, container_plugin_var_run_t, container_ro_file_t, container_runtime_tmpfs_t, container_unit_file_t, container_var_lib_t, container_var_run_t, couchdb_conf_t, couchdb_unit_file_t, couchdb_var_run_t, courier_etc_t, courier_var_run_t, cpucontrol_conf_t, cpuplug_lock_t, cpuplug_var_run_t, cpuspeed_var_run_t, cron_var_run_t, crond_unit_file_t, crond_var_run_t, ctdbd_var_run_t, cupsd_config_var_run_t, cupsd_etc_t, cupsd_lock_t, cupsd_lpd_var_run_t, cupsd_rw_etc_t, cupsd_unit_file_t, cupsd_var_run_t, cvs_var_run_t, cyphesis_var_run_t, cyrus_var_run_t, data_home_t, dbskkd_var_run_t, dbus_home_t, dbusd_etc_t, dbusd_unit_file_t, dcc_var_run_t, dccd_var_run_t, dccifd_var_run_t, dccm_var_run_t, dcerpcd_var_run_t, ddclient_etc_t, ddclient_var_run_t, deltacloudd_var_run_t, denyhosts_var_lock_t, device_t, devicekit_var_run_t, devlog_t, dhcp_etc_t, dhcpc_var_run_t, dhcpd_unit_file_t, dhcpd_var_run_t, dictd_etc_t, dictd_var_run_t, dirsrv_snmp_var_run_t, dirsrv_unit_file_t, dirsrv_var_lock_t, dirsrv_var_run_t, dirsrvadmin_lock_t, dirsrvadmin_unit_file_t, dkim_milter_data_t, dlm_controld_var_run_t, dnsmasq_etc_t, dnsmasq_unit_file_t, dnsmasq_var_run_t, dnssec_trigger_unit_file_t, dnssec_trigger_var_run_t, dovecot_etc_t, dovecot_var_run_t, drbd_lock_t, drbd_var_run_t, dspam_var_run_t, entropyd_var_run_t, etc_aliases_t, etc_mail_t, etc_runtime_t, etc_t, eventlogd_var_run_t, evtchnd_var_run_t, exim_var_run_t, exports_t, fail2ban_var_run_t, fcoemon_var_run_t, fenced_lock_t, fenced_var_run_t, fetchmail_etc_t, fetchmail_var_run_t, file_context_t, fingerd_etc_t, fingerd_var_run_t, firewalld_etc_rw_t, firewalld_unit_file_t, firewalld_var_run_t, firstboot_etc_t, foghorn_var_run_t, fonts_cache_t, fonts_t, freeipmi_bmc_watchdog_unit_file_t, freeipmi_bmc_watchdog_var_run_t, freeipmi_ipmidetectd_unit_file_t, freeipmi_ipmidetectd_var_run_t, freeipmi_ipmiseld_unit_file_t, freeipmi_ipmiseld_var_run_t, fsadm_var_run_t, fsdaemon_var_run_t, ftpd_etc_t, ftpd_lock_t, ftpd_unit_file_t, ftpd_var_run_t, fwupd_unit_file_t, games_srv_var_run_t, gconf_etc_t, gconf_home_t, gdomap_conf_t, gdomap_var_run_t, getty_etc_t, getty_lock_t, getty_unit_file_t, getty_var_run_t, gfs_controld_var_run_t, gkeyringd_gnome_home_t, glance_api_unit_file_t, glance_registry_unit_file_t, glance_scrubber_unit_file_t, glance_var_run_t, glusterd_var_run_t, gnome_home_t, gpm_conf_t, gpm_var_run_t, gpsd_var_run_t, greylist_milter_data_t, groupd_var_run_t, gssproxy_unit_file_t, gssproxy_var_run_t, gstreamer_home_t, haproxy_unit_file_t, haproxy_var_run_t, hddtemp_etc_t, home_root_t, hostapd_unit_file_t, hostapd_var_run_t, hostname_etc_t, hsqldb_unit_file_t, httpd_config_t, httpd_lock_t, httpd_unit_file_t, httpd_var_run_t, hwloc_dhwd_unit_t, hwloc_var_run_t, hypervkvp_unit_file_t, hypervvssd_unit_file_t, ibacm_conf_t, ibacm_var_run_t, icc_data_home_t, icecast_var_run_t, ifconfig_var_run_t, inetd_child_var_run_t, inetd_var_run_t, init_tmp_t, init_var_lib_t, init_var_run_t, initrc_var_run_t, innd_etc_t, innd_unit_file_t, innd_var_run_t, iodined_unit_file_t, ipa_dnskey_unit_file_t, ipa_ods_exporter_unit_file_t, ipa_otpd_unit_file_t, ipa_var_run_t, ipmievd_lock_t, ipmievd_unit_file_t, ipmievd_var_run_t, ipsec_mgmt_lock_t, ipsec_mgmt_unit_file_t, ipsec_mgmt_var_run_t, ipsec_var_run_t, iptables_lock_t, iptables_unit_file_t, iptables_var_lib_t, iptables_var_run_t, irc_conf_t, irqbalance_var_run_t, irssi_etc_t, iscsi_lock_t, iscsi_unit_file_t, iscsi_var_run_t, isnsd_var_run_t, iwhd_var_run_t, jetty_unit_file_t, jetty_var_run_t, kadmind_var_run_t, kdump_etc_t, kdump_lock_t, kdump_unit_file_t, keepalived_unit_file_t, keepalived_var_run_t, keystone_unit_file_t, keystone_var_run_t, kismet_var_run_t, klogd_var_run_t, kmod_var_run_t, kmscon_conf_t, kmscon_unit_file_t, krb5_conf_t, krb5kdc_conf_t, krb5kdc_lock_t, krb5kdc_var_run_t, ksmtuned_unit_file_t, ksmtuned_var_run_t, ktalkd_unit_file_t, kubernetes_file_t, l2tp_conf_t, l2tpd_var_run_t, ld_so_t, lib_t, likewise_etc_t, likewise_pstore_lock_t, lircd_etc_t, lircd_var_run_t, lldpad_var_run_t, local_login_lock_t, locale_t, locate_var_run_t, lockdev_lock_t, logrotate_lock_t, logwatch_lock_t, logwatch_var_run_t, lpd_var_run_t, lsassd_var_run_t, lsmd_unit_file_t, lsmd_var_run_t, lttng_sessiond_unit_file_t, lttng_sessiond_var_run_t, lvm_etc_t, lvm_lock_t, lvm_unit_file_t, lvm_var_run_t, lwiod_var_run_t, lwregd_var_run_t, lwsmd_var_run_t, machineid_t, mailman_lock_t, mailman_var_run_t, man_cache_t, man_t, mandb_lock_t, mcelog_etc_t, mcelog_var_run_t, mdadm_conf_t, mdadm_unit_file_t, mdadm_var_run_t, memcached_var_run_t, minidlna_conf_t, minidlna_var_run_t, minissdpd_conf_t, minissdpd_var_run_t, mip6d_unit_file_t, mirrormanager_var_run_t, mnt_t, mock_etc_t, mock_var_run_t, modemmanager_unit_file_t, modules_conf_t, modules_object_t, mon_statd_var_run_t, mongod_unit_file_t, mongod_var_run_t, motion_unit_file_t, motion_var_run_t, mount_var_run_t, mozilla_conf_t, mpd_etc_t, mpd_var_run_t, mplayer_etc_t, mrtg_etc_t, mrtg_lock_t, mrtg_var_run_t, mscan_etc_t, mscan_var_run_t, munin_etc_t, munin_var_run_t, mysqld_etc_t, mysqld_unit_file_t, mysqld_var_run_t, mysqlmanagerd_var_run_t, naemon_var_run_t, nagios_etc_t, nagios_var_run_t, named_conf_t, named_unit_file_t, named_var_run_t, net_conf_t, netlabel_mgmt_unit_file_t, netlogond_var_run_t, neutron_unit_file_t, neutron_var_run_t, nfsd_unit_file_t, ninfod_run_t, ninfod_unit_file_t, nis_unit_file_t, nmbd_var_run_t, nova_unit_file_t, nova_var_run_t, nrpe_etc_t, nrpe_var_run_t, nscd_unit_file_t, nscd_var_run_t, nsd_var_run_t, nslcd_conf_t, nslcd_var_run_t, ntop_etc_t, ntop_var_run_t, ntp_conf_t, ntpd_unit_file_t, ntpd_var_run_t, numad_unit_file_t, numad_var_run_t, nut_conf_t, nut_unit_file_t, nut_var_run_t, nx_server_var_run_t, oddjob_unit_file_t, oddjob_var_run_t, opafm_var_run_t, openct_var_run_t, opendnssec_conf_t, opendnssec_unit_file_t, opendnssec_var_run_t, openhpid_var_run_t, openshift_var_run_t, opensm_unit_file_t, openvpn_etc_rw_t, openvpn_etc_t, openvpn_var_run_t, openvswitch_rw_t, openvswitch_unit_file_t, openvswitch_var_run_t, openwsman_run_t, openwsman_unit_file_t, oracleasm_conf_t, osad_var_run_t, pads_config_t, pads_var_run_t, pam_var_console_t, pam_var_run_t, passenger_var_run_t, pcp_var_run_t, pcscd_var_run_t, pdns_conf_t, pdns_unit_file_t, pdns_var_run_t, pegasus_conf_t, pegasus_openlmi_storage_var_run_t, pegasus_var_run_t, pesign_unit_file_t, pesign_var_run_t, phc2sys_unit_file_t, pingd_etc_t, piranha_etc_rw_t, piranha_fos_var_run_t, piranha_lvs_var_run_t, piranha_pulse_var_run_t, piranha_web_conf_t, piranha_web_var_run_t, pkcs11proxyd_unit_file_t, pkcs11proxyd_var_run_t, pkcs_slotd_lock_t, pkcs_slotd_unit_file_t, pkcs_slotd_var_run_t, pki_ra_lock_t, pki_ra_var_run_t, pki_tomcat_lock_t, pki_tomcat_unit_file_t, pki_tomcat_var_run_t, pki_tps_lock_t, pki_tps_var_run_t, plymouthd_var_run_t, policykit_var_run_t, polipo_etc_t, polipo_pid_t, polipo_unit_file_t, portmap_var_run_t, portreserve_etc_t, portreserve_var_run_t, postfix_etc_t, postfix_postdrop_t, postfix_var_run_t, postgresql_etc_t, postgresql_lock_t, postgresql_unit_file_t, postgresql_var_run_t, postgrey_etc_t, postgrey_var_run_t, power_unit_file_t, pppd_etc_t, pppd_lock_t, pppd_unit_file_t, pppd_var_run_t, pptp_var_run_t, prelude_audisp_var_run_t, prelude_correlator_config_t, prelude_lml_var_run_t, prelude_var_run_t, print_spool_t, printconf_t, privoxy_var_run_t, proc_t, prosody_unit_file_t, prosody_var_run_t, psad_etc_t, psad_var_run_t, ptal_etc_t, ptal_var_run_t, ptp4l_unit_file_t, pulseaudio_var_run_t, puppet_etc_t, puppet_var_run_t, pwauth_var_run_t, pyicqt_var_run_t, qdiskd_var_run_t, qemu_var_run_t, qmail_etc_t, qpidd_var_run_t, quota_nld_var_run_t, rabbitmq_conf_t, rabbitmq_unit_file_t, rabbitmq_var_lock_t, rabbitmq_var_run_t, radiusd_etc_t, radiusd_unit_file_t, radiusd_var_run_t, radvd_etc_t, radvd_var_run_t, rasdaemon_unit_file_t, rdisc_unit_file_t, readahead_var_run_t, redis_conf_t, redis_unit_file_t, redis_var_run_t, regex_milter_data_t, restorecond_var_run_t, rhev_agentd_unit_file_t, rhev_agentd_var_run_t, rhnsd_conf_t, rhnsd_unit_file_t, rhnsd_var_run_t, rhsmcertd_config_t, rhsmcertd_lock_t, rhsmcertd_var_run_t, ricci_modcluster_var_run_t, ricci_modstorage_lock_t, ricci_var_run_t, rkt_unit_file_t, rlogind_var_run_t, rngd_unit_file_t, rngd_var_run_t, rolekit_unit_file_t, root_t, roundup_var_run_t, rpcbind_unit_file_t, rpcbind_var_run_t, rpcd_lock_t, rpcd_unit_file_t, rpcd_var_run_t, rpm_script_tmp_t, rpm_var_cache_t, rpm_var_lib_t, rpm_var_run_t, rrdcached_var_run_t, rsync_etc_t, rsync_var_run_t, rtas_errd_unit_file_t, rtas_errd_var_lock_t, rtas_errd_var_run_t, samba_etc_t, samba_unit_file_t, sanlk_resetd_unit_file_t, sanlock_conf_t, sanlock_unit_file_t, sanlock_var_run_t, saslauthd_var_run_t, sbd_unit_file_t, sbd_var_run_t, sblim_var_run_t, screen_var_run_t, security_t, selinux_config_t, selinux_login_config_t, semanage_read_lock_t, semanage_store_t, semanage_trans_lock_t, sendmail_var_run_t, sensord_unit_file_t, sensord_var_run_t, setrans_var_run_t, setroubleshoot_var_run_t, shell_exec_t, shorewall_etc_t, shorewall_lock_t, slapd_etc_t, slapd_lock_t, slapd_unit_file_t, slapd_var_run_t, slpd_var_run_t, smbd_var_run_t, smokeping_var_run_t, smsd_var_run_t, snapperd_conf_t, snmpd_var_run_t, snort_etc_t, snort_var_run_t, sosreport_var_run_t, soundd_etc_t, soundd_var_run_t, spamass_milter_data_t, spamd_etc_t, spamd_var_run_t, spc_var_run_t, speech_dispatcher_unit_file_t, squid_conf_t, squid_var_run_t, src_t, srvsvcd_var_run_t, sshd_keygen_unit_file_t, sshd_unit_file_t, sshd_var_run_t, sslh_config_t, sslh_unit_file_t, sslh_var_run_t, sssd_conf_t, sssd_public_t, sssd_unit_file_t, sssd_var_lib_t, sssd_var_run_t, stapserver_var_run_t, stratisd_data_t, stratisd_var_run_t, stunnel_etc_t, stunnel_var_run_t, svc_conf_t, svirt_home_t, svirt_image_t, svirt_tmp_t, svirt_tmpfs_t, svnserve_unit_file_t, svnserve_var_run_t, swat_var_run_t, swift_lock_t, swift_unit_file_t, swift_var_run_t, sysfs_t, syslog_conf_t, syslogd_unit_file_t, syslogd_var_run_t, system_conf_t, system_cronjob_lock_t, system_cronjob_var_run_t, system_db_t, system_dbusd_var_lib_t, system_dbusd_var_run_t, systemd_bootchart_unit_file_t, systemd_bootchart_var_run_t, systemd_gpt_generator_unit_file_t, systemd_home_t, systemd_hwdb_etc_t, systemd_hwdb_unit_file_t, systemd_importd_var_run_t, systemd_logind_inhibit_var_run_t, systemd_logind_sessions_t, systemd_logind_var_run_t, systemd_machined_unit_file_t, systemd_machined_var_run_t, systemd_modules_load_unit_file_t, systemd_networkd_unit_file_t, systemd_networkd_var_run_t, systemd_passwd_var_run_t, systemd_resolved_unit_file_t, systemd_resolved_var_run_t, systemd_rfkill_unit_file_t, systemd_runtime_unit_file_t, systemd_timedated_unit_file_t, systemd_timedated_var_lib_t, systemd_timedated_var_run_t, systemd_unit_file_t, systemd_userdbd_runtime_t, systemd_userdbd_unit_file_t, systemd_vconsole_unit_file_t, tangd_cache_t, tangd_unit_file_t, targetd_unit_file_t, telnetd_var_run_t, textrel_shlib_t, tftpd_etc_t, tftpd_var_run_t, tgtd_var_run_t, thin_aeolus_configserver_var_run_t, thin_var_run_t, timemaster_unit_file_t, timemaster_var_run_t, tlp_unit_file_t, tlp_var_run_t, tmp_t, tmpfs_t, tomcat_unit_file_t, tomcat_var_run_t, tor_etc_t, tor_unit_file_t, tor_var_run_t, tuned_etc_t, tuned_rw_etc_t, tuned_var_run_t, udev_etc_t, udev_var_run_t, ulogd_etc_t, uml_switch_var_run_t, unlabeled_t, usbmuxd_unit_file_t, usbmuxd_var_run_t, user_home_dir_t, useradd_var_run_t, userhelper_conf_t, usr_t, uucpd_lock_t, uucpd_var_run_t, uuidd_var_run_t, var_lib_t, var_lock_t, var_log_t, var_run_t, var_t, varnishd_etc_t, varnishd_var_run_t, varnishlog_var_run_t, vdagent_var_run_t, vhostmd_var_run_t, virt_common_var_run_t, virt_etc_rw_t, virt_etc_t, virt_lock_t, virt_lxc_var_run_t, virt_qemu_ga_var_run_t, virt_var_lib_t, virt_var_run_t, virtd_unit_file_t, virtlogd_etc_t, virtlogd_unit_file_t, virtlogd_var_run_t, vmtools_unit_file_t, vmware_host_pid_t, vmware_pid_t, vmware_sys_conf_t, vnstatd_var_run_t, vpnc_var_run_t, watchdog_var_run_t, wdmd_var_run_t, webalizer_etc_t, winbind_var_run_t, xdm_etc_t, xdm_lock_t, xdm_rw_etc_t, xdm_unit_file_t, xdm_var_lib_t, xdm_var_run_t, xenconsoled_var_run_t, xend_var_run_t, xenstored_var_run_t, xserver_etc_t, xserver_var_run_t, ypbind_unit_file_t, ypbind_var_run_t, yppasswdd_var_run_t, ypserv_conf_t, ypserv_var_run_t, ypxfr_var_run_t, zabbix_var_run_t, zarafa_deliver_var_run_t, zarafa_etc_t, zarafa_gateway_var_run_t, zarafa_ical_var_run_t, zarafa_indexer_var_run_t, zarafa_monitor_var_run_t, zarafa_server_var_run_t, zarafa_spooler_var_run_t, zebra_conf_t, zebra_unit_file_t, zebra_var_run_t, zoneminder_unit_file_t, zoneminder_var_run_t.
Then execute:
restorecon -v 'default'
***** Plugin catchall (17.1 confidence) suggests **************************
If you believe that systemd should be allowed read access on the default lnk_file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# ausearch -c 'systemd' --raw | audit2allow -M my-systemd
# semodule -X 300 -i my-systemd.pp
Additional Information:
Source Context system_u:system_r:init_t:s0
Target Context unconfined_u:object_r:default_t:s0
Target Objects default [ lnk_file ]
Source systemd
Source Path systemd
Port <Unknown>
Host lakenode
Source RPM Packages
Target RPM Packages
SELinux Policy RPM selinux-policy-targeted-35.15-1.fc35.noarch
Local Policy RPM selinux-policy-targeted-35.15-1.fc35.noarch
Selinux Enabled True
Policy Type targeted
Enforcing Mode Enforcing
Host Name lakenode
Platform Linux lakenode 5.16.18-200.fc35.x86_64 #1 SMP
PREEMPT Mon Mar 28 14:10:07 UTC 2022 x86_64 x86_64
Alert Count 1
First Seen 2022-04-13 04:54:34 EEST
Last Seen 2022-04-13 04:54:34 EEST
Local ID 356702e9-0948-481d-816a-71eff625bf4c
Raw Audit Messages
type=AVC msg=audit(1649814874.7:2216): avc: denied { read } for pid=1 comm="systemd" name="default" dev="dm-0" ino=8657111 scontext=system_u:system_r:init_t:s0 tcontext=unconfined_u:object_r:default_t:s0 tclass=lnk_file permissive=0
Hash: systemd,init_t,default_t,lnk_file,read
Attempting to install nix package manager produced the following output, ending with an Access denied error.
System is Fedora 35. hostnamectl shows the following: ❯ hostnamectl <...snip...> Chassis: laptop <...snip...> Operating System: Fedora Linux 35 (Workstation Edition) CPE OS Name: cpe:/o:fedoraproject:fedora:35 Kernel: Linux 5.16.11-200.fc35.x86_64 Architecture: x86-64 Hardware Vendor: Dell Inc. Hardware Model: Latitude 5520
Here is the full output of the nix install: ❯ sh <(curl -L https://nixos.org/nix/install) --daemon % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4046 100 4046 0 0 2679 0 0:00:01 0:00:01 --:--:-- 9051 downloading Nix 2.7.0 binary tarball for x86_64-linux from 'https://releases.nixos.org/nix/nix-2.7.0/nix-2.7.0-x86_64-linux.tar.xz' to '/tmp/nix-binary-tarball-unpack.8c1ZwhgtgS'... % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 27.4M 100 27.4M 0 0 6919k 0 0:00:04 0:00:04 --:--:-- 6919k Note: a multi-user installation is possible. See https://nixos.org/manual/nix/stable/installation/installing-binary.html#multi-user-installation Switching to the Multi-user Installer Welcome to the Multi-User Nix Installation
This installation tool will set up your computer with the Nix package manager. This will happen in a few stages:
Make sure your computer doesn't already have Nix. If it does, I will show you instructions on how to clean up your old install.
Show you what I am going to install and where. Then I will ask if you are ready to continue.
Create the system users and groups that the Nix daemon uses to run builds.
Perform the basic installation of the Nix files daemon.
Configure your shell to import special Nix Profile files, so you can use Nix.
Start the Nix daemon.
Would you like to see a more detailed list of what I will do? [y/n] n
---- let's talk about sudo ----------------------------------------------------- This script is going to call sudo a lot. Every time I do, it'll output exactly what it'll do, and why.
Just like this:
---- sudo execution ------------------------------------------------------------ I am executing:
to demonstrate how our sudo prompts look
This might look scary, but everything can be undone by running just a few commands. I used to ask you to confirm each time sudo ran, but it was too many times. Instead, I'll just ask you this one time:
Can I use sudo? [y/n] y
Yay! Thanks! Let's get going!
~~> Checking for artifacts of previous installs Before I try to install, I'll check for signs Nix already is or has been installed on this system.
---- Nix config report --------------------------------------------------------- Temp Dir: /tmp/tmp.55s9L5aFzV Nix Root: /nix Build Users: 32 Build Group ID: 30000 Build Group Name: nixbld
build users: Username: UID nixbld1: 30001 nixbld2: 30002 nixbld3: 30003 nixbld4: 30004 nixbld5: 30005 nixbld6: 30006 nixbld7: 30007 nixbld8: 30008 nixbld9: 30009 nixbld10: 30010 nixbld11: 30011 nixbld12: 30012 nixbld13: 30013 nixbld14: 30014 nixbld15: 30015 nixbld16: 30016 nixbld17: 30017 nixbld18: 30018 nixbld19: 30019 nixbld20: 30020 nixbld21: 30021 nixbld22: 30022 nixbld23: 30023 nixbld24: 30024 nixbld25: 30025 nixbld26: 30026 nixbld27: 30027 nixbld28: 30028 nixbld29: 30029 nixbld30: 30030 nixbld31: 30031 nixbld32: 30032
Ready to continue? [y/n] y
~~> Setting up the build group nixbld
---- sudo execution ------------------------------------------------------------ I am executing:
Create the Nix build group, nixbld
[sudo] password for phil: Created: Yes
~~> Setting up the build user nixbld1
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld1
useradd warning: nixbld1's uid 30001 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld1 a useful comment
usermod: no changes Note: Nix build user 1 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld2
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld2
useradd warning: nixbld2's uid 30002 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld2 a useful comment
usermod: no changes Note: Nix build user 2 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld3
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld3
useradd warning: nixbld3's uid 30003 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld3 a useful comment
usermod: no changes Note: Nix build user 3 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld4
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld4
useradd warning: nixbld4's uid 30004 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld4 a useful comment
usermod: no changes Note: Nix build user 4 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld5
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld5
useradd warning: nixbld5's uid 30005 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld5 a useful comment
usermod: no changes Note: Nix build user 5 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld6
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld6
useradd warning: nixbld6's uid 30006 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld6 a useful comment
usermod: no changes Note: Nix build user 6 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld7
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld7
useradd warning: nixbld7's uid 30007 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld7 a useful comment
usermod: no changes Note: Nix build user 7 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld8
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld8
useradd warning: nixbld8's uid 30008 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld8 a useful comment
usermod: no changes Note: Nix build user 8 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld9
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld9
useradd warning: nixbld9's uid 30009 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld9 a useful comment
usermod: no changes Note: Nix build user 9 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld10
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld10
useradd warning: nixbld10's uid 30010 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld10 a useful comment
usermod: no changes Note: Nix build user 10 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld11
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld11
useradd warning: nixbld11's uid 30011 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld11 a useful comment
usermod: no changes Note: Nix build user 11 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld12
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld12
useradd warning: nixbld12's uid 30012 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld12 a useful comment
usermod: no changes Note: Nix build user 12 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld13
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld13
useradd warning: nixbld13's uid 30013 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld13 a useful comment
usermod: no changes Note: Nix build user 13 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld14
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld14
useradd warning: nixbld14's uid 30014 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld14 a useful comment
usermod: no changes Note: Nix build user 14 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld15
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld15
useradd warning: nixbld15's uid 30015 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld15 a useful comment
usermod: no changes Note: Nix build user 15 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld16
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld16
useradd warning: nixbld16's uid 30016 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld16 a useful comment
usermod: no changes Note: Nix build user 16 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld17
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld17
useradd warning: nixbld17's uid 30017 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld17 a useful comment
usermod: no changes Note: Nix build user 17 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld18
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld18
useradd warning: nixbld18's uid 30018 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld18 a useful comment
usermod: no changes Note: Nix build user 18 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld19
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld19
useradd warning: nixbld19's uid 30019 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld19 a useful comment
usermod: no changes Note: Nix build user 19 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld20
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld20
useradd warning: nixbld20's uid 30020 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld20 a useful comment
usermod: no changes Note: Nix build user 20 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld21
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld21
useradd warning: nixbld21's uid 30021 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld21 a useful comment
usermod: no changes Note: Nix build user 21 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld22
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld22
useradd warning: nixbld22's uid 30022 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld22 a useful comment
usermod: no changes Note: Nix build user 22 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld23
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld23
useradd warning: nixbld23's uid 30023 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld23 a useful comment
usermod: no changes Note: Nix build user 23 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld24
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld24
useradd warning: nixbld24's uid 30024 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld24 a useful comment
usermod: no changes Note: Nix build user 24 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld25
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld25
useradd warning: nixbld25's uid 30025 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld25 a useful comment
usermod: no changes Note: Nix build user 25 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld26
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld26
useradd warning: nixbld26's uid 30026 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld26 a useful comment
usermod: no changes Note: Nix build user 26 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld27
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld27
useradd warning: nixbld27's uid 30027 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld27 a useful comment
usermod: no changes Note: Nix build user 27 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld28
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld28
useradd warning: nixbld28's uid 30028 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld28 a useful comment
usermod: no changes Note: Nix build user 28 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld29
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld29
useradd warning: nixbld29's uid 30029 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld29 a useful comment
usermod: no changes Note: Nix build user 29 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld30
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld30
useradd warning: nixbld30's uid 30030 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld30 a useful comment
usermod: no changes Note: Nix build user 30 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld31
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld31
useradd warning: nixbld31's uid 30031 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld31 a useful comment
usermod: no changes Note: Nix build user 31 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the build user nixbld32
---- sudo execution ------------------------------------------------------------ I am executing:
Creating the Nix build user, nixbld32
useradd warning: nixbld32's uid 30032 outside of the SYS_UID_MIN 201 and SYS_UID_MAX 999 range. Created: Yes Hidden: Yes Home Directory: /var/empty
---- sudo execution ------------------------------------------------------------ I am executing:
in order to give nixbld32 a useful comment
usermod: no changes Note: Nix build user 32 Logins Disabled: Yes Member of nixbld: Yes PrimaryGroupID: 30000
~~> Setting up the basic directory structure
---- sudo execution ------------------------------------------------------------ I am executing:
to make the basic directory structure of Nix (part 1)
install: creating directory '/nix' install: creating directory '/nix/var' install: creating directory '/nix/var/log' install: creating directory '/nix/var/log/nix' install: creating directory '/nix/var/log/nix/drvs' install: creating directory '/nix/var/nix' install: creating directory '/nix/var/nix/db' install: creating directory '/nix/var/nix/gcroots' install: creating directory '/nix/var/nix/profiles' install: creating directory '/nix/var/nix/temproots' install: creating directory '/nix/var/nix/userpool' install: creating directory '/nix/var/nix/daemon-socket' install: creating directory '/nix/var/nix/gcroots/per-user' install: creating directory '/nix/var/nix/profiles/per-user'
---- sudo execution ------------------------------------------------------------ I am executing:
to make the basic directory structure of Nix (part 2)
install: creating directory '/nix/store'
---- sudo execution ------------------------------------------------------------ I am executing:
to place the default nix daemon configuration (part 1)
install: creating directory '/etc/nix'
---- sudo execution ------------------------------------------------------------ I am executing:
to set up the default system channel (part 1)
~~> Installing Nix
---- sudo execution ------------------------------------------------------------ I am executing:
to copy the basic Nix files to the new store at /nix/store
---- sudo execution ------------------------------------------------------------ I am executing:
to make the new store non-writable at /nix/store
---- sudo execution ------------------------------------------------------------ I am executing:
to load data for the first time in to the Nix Database
~~> Setting up shell profiles: /etc/bashrc /etc/profile.d/nix.sh /etc/zshrc /etc/bash.bashrc /etc/zsh/zshrc
---- sudo execution ------------------------------------------------------------ I am executing:
to back up your current /etc/bashrc to /etc/bashrc.backup-before-nix
---- sudo execution ------------------------------------------------------------ I am executing:
extend your /etc/bashrc with nix-daemon settings
Nix
if [ -e '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then . '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' fi
End Nix
---- sudo execution ------------------------------------------------------------ I am executing:
to create a stub /etc/profile.d/nix.sh which will be updated
---- sudo execution ------------------------------------------------------------ I am executing:
extend your /etc/profile.d/nix.sh with nix-daemon settings
Nix
if [ -e '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then . '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' fi
End Nix
---- sudo execution ------------------------------------------------------------ I am executing:
to create a stub /etc/zshrc which will be updated
---- sudo execution ------------------------------------------------------------ I am executing:
extend your /etc/zshrc with nix-daemon settings
Nix
if [ -e '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then . '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' fi
End Nix
---- sudo execution ------------------------------------------------------------ I am executing:
to create a stub /etc/bash.bashrc which will be updated
---- sudo execution ------------------------------------------------------------ I am executing:
extend your /etc/bash.bashrc with nix-daemon settings
Nix
if [ -e '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' ]; then . '/nix/var/nix/profiles/default/etc/profile.d/nix-daemon.sh' fi
End Nix
~~> Setting up the default profile
---- sudo execution ------------------------------------------------------------ I am executing:
to install a bootstrapping Nix in to the default profile
installing 'nix-2.7.0' building '/nix/store/gfivzi28pmihjakm38wj42n1693w1pj0-user-environment.drv'...
---- sudo execution ------------------------------------------------------------ I am executing:
to install a bootstrapping SSL certificate just for Nix in to the default profile
installing 'nss-cacert-3.66' building '/nix/store/6a54k4ji47g1hsl1lch4dk31ywfz77hk-user-environment.drv'...
---- sudo execution ------------------------------------------------------------ I am executing:
to update the default channel in the default profile
unpacking channels...
---- sudo execution ------------------------------------------------------------ I am executing:
to place the default nix daemon configuration (part 2)
~~> Setting up the nix-daemon systemd service
---- sudo execution ------------------------------------------------------------ I am executing:
to set up the nix-daemon service
Failed to link unit: Access denied
---- oh no! -------------------------------------------------------------------- Jeeze, something went wrong. If you can take all the output and open an issue, we'd love to fix the problem so nobody else has this issue.
:(
We'd love to help if you need it.
You can open an issue at https://github.com/nixos/nix/issues
Or feel free to contact the team: