Open christopinka opened 1 year ago
The intent isn't to sadistically make you enter the password again and again--the script attempts to get auth once and hold it.
Is your timestamp_timeout (https://www.sudo.ws/docs/man/sudoers.man/) set to 0?
If so, I'd follow the uninstall instructions (https://nixos.org/manual/nix/stable/installation/installing-binary.html#macos), temporarily set the timeout to something like a minute, reinstall, and then restore your timeout.
I assumed not. 😬. Thanks for the info. I'll try it out. Any idea what the failure is on the second try?
From: Travis A. Everett @.> Sent: Monday, April 10, 2023 10:43 PM To: NixOS/nix @.> Cc: Topinka, Chris @.>; Author @.> Subject: [EXTERNAL] Re: [NixOS/nix] Failed to find disk Nix Store (Issue #8198)
CAUTION! EXTERNAL SENDER STOP. ASSESS. VERIFY!! Were you expecting this email? Are grammar and spelling correct? Does the content make sense? Can you verify the sender? If suspicious report it, then do not click links, open attachments or enter your ID or password.
The intent isn't to make you sadistically enter the password again and again--the script attempts to get auth once and hold it.
Is your timestamp_timeout (https://www.sudo.ws/docs/man/sudoers.man/) set to 0?
If so, I'd follow the uninstall instructions (https://nixos.org/manual/nix/stable/installation/installing-binary.html#macos), temporarily set the timeout to something like a minute, reinstall, and then restore your timeout.
— Reply to this email directly, view it on GitHubhttps://github.com/NixOS/nix/issues/8198#issuecomment-1502644892, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AAD7JRP4DKUJ35PURHWNEM3XATHNPANCNFSM6AAAAAAWZTLVYA. You are receiving this because you authored the thread.Message ID: @.***>
Not sure. The script is not currently idempotent, but I don't think I've seen this particular failure mode.
Since the script is also not generally built with the idea that you'll auth every command, I have a vague hunch that sudo might be grabbing something from stdin that is meant for the command sudo invokes. But tbh I'm not sure if that's even a sane assertion.
Debugging is tricky down here, especially if we can't get a repro. There's a project afoot that might replace the installer, so I'm not personally inclined to chase this one unless thst effort clearly hits a dead-end.
Platform
Additional information
first install attempt was interrupted. I got tired of entering sudo password at _nixbld16. this is the output of both attempts. How many times I'm I going to need to enter sudo password?
Output
Output
```log WRMYW2L6QQ~/projects/cargo2nix[release-0.11.0|✔] % $ sh <(curl -v -L https://nixos.org/nix/install) zsh: command not found: $ % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 54.84.236.175:443... WRMYW2L6QQ~/projects/cargo2nix[release-0.11.0|✔] % * Connected to nixos.org (54.84.236.175) port 443 (#0) * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/ssl/cert.pem * CApath: none * (304) (OUT), TLS handshake, Client hello (1): } [314 bytes data] * (304) (IN), TLS handshake, Server hello (2): { [87 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2672 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS change cipher, Change cipher spec (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN: server did not agree on a protocol. Uses default. * Server certificate: * subject: CN=*.nixos.org * start date: Mar 22 05:40:33 2023 GMT * expire date: May 11 00:41:32 2023 GMT * subjectAltName: host "nixos.org" matched cert's "nixos.org" * issuer: C=US; ST=North Carolina; L=Charlotte; O=Duke Energy Carolinas, LLC; CN=ASHF5SSL.duke-energy.com; emailAddress=NAMG_ADGMA_25171_Cyber_Systems_DL@duke-energy.com * SSL certificate verify ok. > GET /nix/install HTTP/1.1 > Host: nixos.org > User-Agent: curl/7.86.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 301 Moved Permanently < Accept-Ranges: bytes < Access-Control-Allow-Origin: * < Age: 3514 < Content-Length: 0 < Date: Tue, 11 Apr 2023 00:08:24 GMT < Location: https://releases.nixos.org/nix/nix-2.13.3/install < Server: Netlify < Strict-Transport-Security: max-age=31536000 < Via: 1.1 varnish < X-Cache: HIT < X-Cache-Hits: 1 < X-Nf-Request-Id: 01GXPWTT69ECV5N8FAFGK62DMG < X-Served-By: cache-iad-kcgs7200161-IAD < X-Timer: S1681171705.718661,VS0,VE2 < Connection: Keep-Alive < 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 * Connection #0 to host nixos.org left intact * Issue another request to this URL: 'https://releases.nixos.org/nix/nix-2.13.3/install' 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0* Trying 151.101.46.217:443... * Connected to releases.nixos.org (151.101.46.217) port 443 (#1) * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/ssl/cert.pem * CApath: none * (304) (OUT), TLS handshake, Client hello (1): } [323 bytes data] * (304) (IN), TLS handshake, Server hello (2): { [102 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2826 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [300 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [37 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS change cipher, Change cipher spec (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-CHACHA20-POLY1305 * ALPN: server accepted h2 * Server certificate: * subject: CN=releases.nixos.org * start date: Mar 7 20:47:38 2023 GMT * expire date: Apr 7 20:47:37 2024 GMT * subjectAltName: host "releases.nixos.org" matched cert's "releases.nixos.org" * issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign Atlas R3 DV TLS CA 2023 Q1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * h2h3 [:method: GET] * h2h3 [:path: /nix/nix-2.13.3/install] * h2h3 [:scheme: https] * h2h3 [:authority: releases.nixos.org] * h2h3 [user-agent: curl/7.86.0] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x14100c600) > GET /nix/nix-2.13.3/install HTTP/2 > Host: releases.nixos.org > user-agent: curl/7.86.0 > accept: */* > < HTTP/2 200 < last-modified: Mon, 27 Feb 2023 17:16:07 GMT < etag: "b1a1d53c39d8d12a185f95539f17b96e" < x-amz-server-side-encryption: AES256 < content-type: text/plain < server: AmazonS3 < via: 1.1 varnish, 1.1 varnish < access-control-allow-origin: * < accept-ranges: bytes < date: Tue, 11 Apr 2023 00:53:12 GMT < age: 42680 < x-served-by: cache-iad-kjyo7100128-IAD, cache-nyc-kteb1890022-NYC < x-cache: HIT, HIT < x-cache-hits: 27822, 2 < x-timer: S1681174392.194497,VS0,VE0 < content-length: 4052 < { [1370 bytes data] 100 4052 100 4052 0 0 2574 0 0:00:01 0:00:01 --:--:-- 13689 * Connection #1 to host releases.nixos.org left intact curl: (23) Failed writing body WRMYW2L6QQ~/projects/cargo2nix[release-0.11.0|✔] % sh <(curl -v -L https://nixos.org/nix/install) % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying 54.84.236.175:443... * Connected to nixos.org (54.84.236.175) port 443 (#0) * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/ssl/cert.pem * CApath: none * (304) (OUT), TLS handshake, Client hello (1): } [314 bytes data] * (304) (IN), TLS handshake, Server hello (2): { [87 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2672 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS change cipher, Change cipher spec (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN: server did not agree on a protocol. Uses default. * Server certificate: * subject: CN=*.nixos.org * start date: Mar 22 05:40:33 2023 GMT * expire date: May 11 00:41:32 2023 GMT * subjectAltName: host "nixos.org" matched cert's "nixos.org" * issuer: C=US; ST=North Carolina; L=Charlotte; O=Duke Energy Carolinas, LLC; CN=ASHF5SSL.duke-energy.com; emailAddress=NAMG_ADGMA_25171_Cyber_Systems_DL@duke-energy.com * SSL certificate verify ok. > GET /nix/install HTTP/1.1 > Host: nixos.org > User-Agent: curl/7.86.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 301 Moved Permanently < Accept-Ranges: bytes < Access-Control-Allow-Origin: * < Age: 3299 < Content-Length: 0 < Date: Mon, 10 Apr 2023 23:58:36 GMT < Location: https://releases.nixos.org/nix/nix-2.13.3/install < Server: Netlify < Strict-Transport-Security: max-age=31536000 < Via: 1.1 varnish, 1.1 varnish < X-Cache: HIT, MISS < X-Cache-Hits: 6, 0 < X-Nf-Request-Id: 01GXPWVHSPHNTXZJNEN6PM8E7Y < X-Served-By: cache-iad-kjyo7100101-IAD, cache-ewr18164-EWR < X-Timer: S1681171117.776921,VS0,VE18 < Connection: Keep-Alive < 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 * Connection #0 to host nixos.org left intact * Issue another request to this URL: 'https://releases.nixos.org/nix/nix-2.13.3/install' * Trying 151.101.46.217:443... * Connected to releases.nixos.org (151.101.46.217) port 443 (#1) * ALPN: offers h2 * ALPN: offers http/1.1 * CAfile: /etc/ssl/cert.pem * CApath: none * (304) (OUT), TLS handshake, Client hello (1): } [323 bytes data] * (304) (IN), TLS handshake, Server hello (2): { [102 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2826 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [300 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [37 bytes data] * TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS change cipher, Change cipher spec (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-CHACHA20-POLY1305 * ALPN: server accepted h2 * Server certificate: * subject: CN=releases.nixos.org * start date: Mar 7 20:47:38 2023 GMT * expire date: Apr 7 20:47:37 2024 GMT * subjectAltName: host "releases.nixos.org" matched cert's "releases.nixos.org" * issuer: C=BE; O=GlobalSign nv-sa; CN=GlobalSign Atlas R3 DV TLS CA 2023 Q1 * SSL certificate verify ok. * Using HTTP2, server supports multiplexing * Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0 * h2h3 [:method: GET] * h2h3 [:path: /nix/nix-2.13.3/install] * h2h3 [:scheme: https] * h2h3 [:authority: releases.nixos.org] * h2h3 [user-agent: curl/7.86.0] * h2h3 [accept: */*] * Using Stream ID: 1 (easy handle 0x14380bc00) > GET /nix/nix-2.13.3/install HTTP/2 > Host: releases.nixos.org > user-agent: curl/7.86.0 > accept: */* > < HTTP/2 200 < last-modified: Mon, 27 Feb 2023 17:16:07 GMT < etag: "b1a1d53c39d8d12a185f95539f17b96e" < x-amz-server-side-encryption: AES256 < content-type: text/plain < server: AmazonS3 < via: 1.1 varnish, 1.1 varnish < access-control-allow-origin: * < accept-ranges: bytes < date: Tue, 11 Apr 2023 00:53:35 GMT < age: 42704 < x-served-by: cache-iad-kjyo7100128-IAD, cache-nyc-kteb1890047-NYC < x-cache: HIT, HIT < x-cache-hits: 27822, 1 < x-timer: S1681174415.423225,VS0,VE94 < content-length: 4052 < { [1085 bytes data] 100 4052 100 4052 0 0 5883 0 --:--:-- --:--:-- --:--:-- 5883 * Connection #1 to host releases.nixos.org left intact downloading Nix 2.13.3 binary tarball for aarch64-darwin from 'https://releases.nixos.org/nix/nix-2.13.3/nix-2.13.3-aarch64-darwin.tar.xz' to '/var/folders/l1/z6d4k94x29g2lcm5lnlyrm2r0000gp/T/nix-binary-tarball-unpack.XXXXXXXXXX.OJqRtXFO'... % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 10.3M 100 10.3M 0 0 2756k 0 0:00:03 0:00:03 --:--:-- 2760k Switching to the Multi-user Installer Welcome to the Multi-User Nix Installation This installation tool will set up your computer with the Nix package manager. This will happen in a few stages: 1. Make sure your computer doesn't already have Nix. If it does, I will show you instructions on how to clean up your old install. 2. Show you what I am going to install and where. Then I will ask if you are ready to continue. 3. Create the system users and groups that the Nix daemon uses to run builds. 4. Perform the basic installation of the Nix files daemon. 5. Configure your shell to import special Nix Profile files, so you can use Nix. 6. Start the Nix daemon. Would you like to see a more detailed list of what I will do? [y/n] n ---- let's talk about sudo ----------------------------------------------------- This script is going to call sudo a lot. Every time I do, it'll output exactly what it'll do, and why. Just like this: ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo echo to demonstrate how our sudo prompts look This might look scary, but everything can be undone by running just a few commands. I used to ask you to confirm each time sudo ran, but it was too many times. Instead, I'll just ask you this one time: Can I use sudo? [y/n] y Yay! Thanks! Let's get going! ~~> Fixing any leftover Nix volume state Before I try to install, I'll check for any existing Nix volume config and ask for your permission to remove it (so that the installer can start fresh). I'll also ask for permission to fix any issues I spot. ~~> Checking for artifacts of previous installs Before I try to install, I'll check for signs Nix already is or has been installed on this system. ---- Nix config report --------------------------------------------------------- Temp Dir: /var/folders/l1/z6d4k94x29g2lcm5lnlyrm2r0000gp/T/tmp.01P85KXN Nix Root: /nix Build Users: 32 Build Group ID: 30000 Build Group Name: nixbld build users: Username: UID _nixbld1: 301 _nixbld2: 302 _nixbld3: 303 _nixbld4: 304 _nixbld5: 305 _nixbld6: 306 _nixbld7: 307 _nixbld8: 308 _nixbld9: 309 _nixbld10: 310 _nixbld11: 311 _nixbld12: 312 _nixbld13: 313 _nixbld14: 314 _nixbld15: 315 _nixbld16: 316 _nixbld17: 317 _nixbld18: 318 _nixbld19: 319 _nixbld20: 320 _nixbld21: 321 _nixbld22: 322 _nixbld23: 323 _nixbld24: 324 _nixbld25: 325 _nixbld26: 326 _nixbld27: 327 _nixbld28: 328 _nixbld29: 329 _nixbld30: 330 _nixbld31: 331 _nixbld32: 332 Ready to continue? [y/n] y ---- Preparing a Nix volume ---------------------------------------------------- Nix traditionally stores its data in the root directory /nix, but macOS now (starting in 10.15 Catalina) has a read-only root directory. To support Nix, I will create a volume and configure macOS to mount it at /nix. ~~> Configuring /etc/synthetic.conf to make a mount-point at /nix ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/ex -u NONE -n /etc/synthetic.conf to add Nix to /etc/synthetic.conf Password: ~~> Creating a Nix volume ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil apfs addVolume disk3 APFS Nix Store -nomount to create a new APFS volume 'Nix Store' on disk3 Password: ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil unmount force disk3s7 to ensure the Nix volume is not mounted Password: disk3s7 was already unmounted ~~> Configuring /etc/fstab to specify volume mount options ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/vifs to add nix to fstab Password: ~~> Encrypt the Nix volume ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil mount Nix Store to mount your Nix volume for encrypting Password: Sorry, try again. Password: Volume Nix Store on Nix Store mounted ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/security -i to add your Nix volume's password to Keychain Password: Sorry, try again. Password: ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil apfs encryptVolume Nix Store -user disk -stdinpassphrase to actually encrypt your Nix volume Password: Encrypting with the new "Disk" crypto user on disk3s7 The new "Disk" user will be the only one who has initial access to disk3s7 The new APFS crypto user UUID will be 682B6085-8724-4F7A-8E32-D3D313EC8A35 Encryption has likely completed due to AES hardware; see "diskutil apfs list" ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil unmount force Nix Store to unmount the encrypted volume Password: Volume Nix Store on disk3s7 force-unmounted ~~> Configuring LaunchDaemon to mount 'Nix Store' ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/ex -u NONE -n /Library/LaunchDaemons/org.nixos.darwin-store.plist to install the Nix volume mounter Password: ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo launchctl bootstrap system /Library/LaunchDaemons/org.nixos.darwin-store.plist to launch the Nix volume mounter Password: ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo launchctl kickstart -k system/org.nixos.darwin-store to launch the Nix volume mounter Password: ~~> Setting up the build group nixbld ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o create -r Nix build group for nix-daemon -i 30000 nixbld Create the Nix build group, nixbld Password: Created: Yes ~~> Setting up the build user _nixbld1 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld1 UniqueID 301 Creating the Nix build user (#1), _nixbld1 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld1 IsHidden 1 in order to make _nixbld1 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld1 NFSHomeDirectory /var/empty in order to give _nixbld1 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld1 RealName Nix build user 1 in order to give _nixbld1 a useful note Password: Note: Nix build user 1 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld1 UserShell /sbin/nologin in order to give _nixbld1 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld1 nixbld Add _nixbld1 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld1 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld2 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld2 UniqueID 302 Creating the Nix build user (#2), _nixbld2 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld2 IsHidden 1 in order to make _nixbld2 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld2 NFSHomeDirectory /var/empty in order to give _nixbld2 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld2 RealName Nix build user 2 in order to give _nixbld2 a useful note Password: Note: Nix build user 2 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld2 UserShell /sbin/nologin in order to give _nixbld2 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld2 nixbld Add _nixbld2 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld2 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld3 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld3 UniqueID 303 Creating the Nix build user (#3), _nixbld3 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld3 IsHidden 1 in order to make _nixbld3 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld3 NFSHomeDirectory /var/empty in order to give _nixbld3 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld3 RealName Nix build user 3 in order to give _nixbld3 a useful note Password: Note: Nix build user 3 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld3 UserShell /sbin/nologin in order to give _nixbld3 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld3 nixbld Add _nixbld3 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld3 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld4 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld4 UniqueID 304 Creating the Nix build user (#4), _nixbld4 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld4 IsHidden 1 in order to make _nixbld4 a hidden user Password: Sorry, try again. Password: Sorry, try again. Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld4 NFSHomeDirectory /var/empty in order to give _nixbld4 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld4 RealName Nix build user 4 in order to give _nixbld4 a useful note Password: Note: Nix build user 4 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld4 UserShell /sbin/nologin in order to give _nixbld4 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld4 nixbld Add _nixbld4 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld4 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld5 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld5 UniqueID 305 Creating the Nix build user (#5), _nixbld5 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld5 IsHidden 1 in order to make _nixbld5 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld5 NFSHomeDirectory /var/empty in order to give _nixbld5 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld5 RealName Nix build user 5 in order to give _nixbld5 a useful note Password: Note: Nix build user 5 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld5 UserShell /sbin/nologin in order to give _nixbld5 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld5 nixbld Add _nixbld5 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld5 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld6 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld6 UniqueID 306 Creating the Nix build user (#6), _nixbld6 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld6 IsHidden 1 in order to make _nixbld6 a hidden user Password: Sorry, try again. Password: Sorry, try again. Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld6 NFSHomeDirectory /var/empty in order to give _nixbld6 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld6 RealName Nix build user 6 in order to give _nixbld6 a useful note Password: Note: Nix build user 6 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld6 UserShell /sbin/nologin in order to give _nixbld6 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld6 nixbld Add _nixbld6 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld6 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld7 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld7 UniqueID 307 Creating the Nix build user (#7), _nixbld7 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld7 IsHidden 1 in order to make _nixbld7 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld7 NFSHomeDirectory /var/empty in order to give _nixbld7 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld7 RealName Nix build user 7 in order to give _nixbld7 a useful note Password: Note: Nix build user 7 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld7 UserShell /sbin/nologin in order to give _nixbld7 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld7 nixbld Add _nixbld7 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld7 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld8 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld8 UniqueID 308 Creating the Nix build user (#8), _nixbld8 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld8 IsHidden 1 in order to make _nixbld8 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld8 NFSHomeDirectory /var/empty in order to give _nixbld8 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld8 RealName Nix build user 8 in order to give _nixbld8 a useful note Password: Note: Nix build user 8 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld8 UserShell /sbin/nologin in order to give _nixbld8 a safe shell Password: Sorry, try again. Password: Sorry, try again. Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld8 nixbld Add _nixbld8 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld8 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld9 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld9 UniqueID 309 Creating the Nix build user (#9), _nixbld9 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld9 IsHidden 1 in order to make _nixbld9 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld9 NFSHomeDirectory /var/empty in order to give _nixbld9 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld9 RealName Nix build user 9 in order to give _nixbld9 a useful note Password: Note: Nix build user 9 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld9 UserShell /sbin/nologin in order to give _nixbld9 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld9 nixbld Add _nixbld9 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld9 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld10 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld10 UniqueID 310 Creating the Nix build user (#10), _nixbld10 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld10 IsHidden 1 in order to make _nixbld10 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld10 NFSHomeDirectory /var/empty in order to give _nixbld10 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld10 RealName Nix build user 10 in order to give _nixbld10 a useful note Password: Sorry, try again. Password: Note: Nix build user 10 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld10 UserShell /sbin/nologin in order to give _nixbld10 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld10 nixbld Add _nixbld10 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld10 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld11 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld11 UniqueID 311 Creating the Nix build user (#11), _nixbld11 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld11 IsHidden 1 in order to make _nixbld11 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld11 NFSHomeDirectory /var/empty in order to give _nixbld11 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld11 RealName Nix build user 11 in order to give _nixbld11 a useful note Password: Note: Nix build user 11 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld11 UserShell /sbin/nologin in order to give _nixbld11 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld11 nixbld Add _nixbld11 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld11 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld12 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld12 UniqueID 312 Creating the Nix build user (#12), _nixbld12 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld12 IsHidden 1 in order to make _nixbld12 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld12 NFSHomeDirectory /var/empty in order to give _nixbld12 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld12 RealName Nix build user 12 in order to give _nixbld12 a useful note Password: Note: Nix build user 12 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld12 UserShell /sbin/nologin in order to give _nixbld12 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld12 nixbld Add _nixbld12 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld12 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld13 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld13 UniqueID 313 Creating the Nix build user (#13), _nixbld13 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld13 IsHidden 1 in order to make _nixbld13 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld13 NFSHomeDirectory /var/empty in order to give _nixbld13 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld13 RealName Nix build user 13 in order to give _nixbld13 a useful note Password: Note: Nix build user 13 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld13 UserShell /sbin/nologin in order to give _nixbld13 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld13 nixbld Add _nixbld13 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld13 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld14 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld14 UniqueID 314 Creating the Nix build user (#14), _nixbld14 Password: Sorry, try again. Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld14 IsHidden 1 in order to make _nixbld14 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld14 NFSHomeDirectory /var/empty in order to give _nixbld14 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld14 RealName Nix build user 14 in order to give _nixbld14 a useful note Password: Note: Nix build user 14 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld14 UserShell /sbin/nologin in order to give _nixbld14 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld14 nixbld Add _nixbld14 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld14 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld15 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld15 UniqueID 315 Creating the Nix build user (#15), _nixbld15 Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld15 IsHidden 1 in order to make _nixbld15 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld15 NFSHomeDirectory /var/empty in order to give _nixbld15 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld15 RealName Nix build user 15 in order to give _nixbld15 a useful note Password: Note: Nix build user 15 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld15 UserShell /sbin/nologin in order to give _nixbld15 a safe shell Password: Logins Disabled: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/dseditgroup -o edit -t user -a _nixbld15 nixbld Add _nixbld15 to the nixbld group Password: Member of nixbld: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld15 PrimaryGroupID 30000 to let the nix daemon use this user for builds (this might seem redundant, but there are two concepts of group membership) Password: PrimaryGroupID: 30000 ~~> Setting up the build user _nixbld16 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . create /Users/_nixbld16 UniqueID 316 Creating the Nix build user (#16), _nixbld16 Password: Sorry, try again. Password: Created: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld16 IsHidden 1 in order to make _nixbld16 a hidden user Password: Hidden: Yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld16 NFSHomeDirectory /var/empty in order to give _nixbld16 a safe home directory Password: Home Directory: /var/empty ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld16 RealName Nix build user 16 in order to give _nixbld16 a useful note Password: Note: Nix build user 16 ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/dscl . -create /Users/_nixbld16 UserShell /sbin/nologin in order to give _nixbld16 a safe shell Password: sudo: a password is required ---- oh no! -------------------------------------------------------------------- Oh no, something went wrong. If you can take all the output and open an issue, we'd love to fix the problem so nobody else has this issue. :( We'd love to help if you need it. You can open an issue at https://github.com/NixOS/nix/issues/new?labels=installer&template=installer.md Or get in touch with the community: https://nixos.org/community WRMYW2L6QQ~/projects/cargo2nix[release-0.11.0|✔] % sudo sh <(curl -L https://nixos.org/nix/install) % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0Pa 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4052 100 4052 0 0 5570 0 --:--:-- --:--:-- --:--:-- 5570 sh: /dev/fd/11: Bad file descriptor WRMYW2L6QQ~/projects/cargo2nix[release-0.11.0|✔] % sudo sh <(curl -L https://nixos.org/nix/install) % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0Pa 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4052 100 4052 0 0 8843 0 --:--:-- --:--:-- --:--:-- 22764 sh: /dev/fd/11: Bad file descriptor WRMYW2L6QQ~/projects/cargo2nix[release-0.11.0|✔] % sh <(curl -L https://nixos.org/nix/install) % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 4052 100 4052 0 0 4985 0 --:--:-- --:--:-- --:--:-- 47670 downloading Nix 2.13.3 binary tarball for aarch64-darwin from 'https://releases.nixos.org/nix/nix-2.13.3/nix-2.13.3-aarch64-darwin.tar.xz' to '/var/folders/l1/z6d4k94x29g2lcm5lnlyrm2r0000gp/T/nix-binary-tarball-unpack.XXXXXXXXXX.3BkHea5A'... % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 10.3M 100 10.3M 0 0 2792k 0 0:00:03 0:00:03 --:--:-- 2796k Switching to the Multi-user Installer Welcome to the Multi-User Nix Installation This installation tool will set up your computer with the Nix package manager. This will happen in a few stages: 1. Make sure your computer doesn't already have Nix. If it does, I will show you instructions on how to clean up your old install. 2. Show you what I am going to install and where. Then I will ask if you are ready to continue. 3. Create the system users and groups that the Nix daemon uses to run builds. 4. Perform the basic installation of the Nix files daemon. 5. Configure your shell to import special Nix Profile files, so you can use Nix. 6. Start the Nix daemon. Would you like to see a more detailed list of what I will do? [y/n] n ---- let's talk about sudo ----------------------------------------------------- This script is going to call sudo a lot. Every time I do, it'll output exactly what it'll do, and why. Just like this: ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo echo to demonstrate how our sudo prompts look This might look scary, but everything can be undone by running just a few commands. I used to ask you to confirm each time sudo ran, but it was too many times. Instead, I'll just ask you this one time: Can I use sudo? [y/n] y Yay! Thanks! Let's get going! ~~> Fixing any leftover Nix volume state Before I try to install, I'll check for any existing Nix volume config and ask for your permission to remove it (so that the installer can start fresh). I'll also ask for permission to fix any issues I spot. ---- Found existing Nix volume ------------------------------------------------- special: disk3s7 uuid: 682B6085-8724-4F7A-8E32-D3D313EC8A35 encrypted: yes ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo security find-generic-password -s 682B6085-8724-4F7A-8E32-D3D313EC8A35 -w to confirm keychain has a password that unlocks this volume ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil apfs unlockVolume disk3s7 -verify -stdinpassphrase -user 682B6085-8724-4F7A-8E32-D3D313EC8A35 to confirm the password actually unlocks the volume Password:Password: ^C sudo: a password is required ---- warning! ------------------------------------------------------------------ This volume is encrypted, but I don't see a password to decrypt it. The quick fix is to let me delete this volume and make you a new one. If that's okay, enter your (sudo) password to continue. If not, you can ensure the decryption password is in your system keychain with a "Where" (service) field set to this volume's UUID: 682B6085-8724-4F7A-8E32-D3D313EC8A35 Can I delete this volume? [y/n] Sorry, I didn't understand. I can only understand answers of y or n [y/n] Enter your password to delete this volume: ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil unmount force disk3s7 to unmount the Nix volume Password: Volume Nix Store on disk3s7 force-unmounted ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil apfs deleteVolume disk3s7 to delete the Nix volume Password: Started APFS operation Deleting APFS Volume from its APFS Container Unmounting disk3s7 Erasing any xART session referenced by 682B6085-8724-4F7A-8E32-D3D313EC8A35 Deleting Volume Removing any Preboot and Recovery Directories Finished APFS operation During install, I add 'nix' to /etc/synthetic.conf, which instructs macOS to create an empty root directory for mounting the Nix volume. Can I remove /etc/synthetic.conf? [y/n] ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo rm /etc/synthetic.conf to remove /etc/synthetic.conf Password: During install, I add '/nix' to /etc/fstab so that macOS knows what mount options to use for the Nix volume. Password: Can I remove /etc/fstab? [y/n] ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo rm /etc/fstab to remove /etc/fstab Password: The installer adds a LaunchDaemon to mount your Nix volume: org.nixos.darwin-store Can I remove it? [y/n] ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo launchctl bootout system/org.nixos.darwin-store to terminate the daemon Password: ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo rm /Library/LaunchDaemons/org.nixos.darwin-store.plist to remove the daemon definition Password: ~~> Checking for artifacts of previous installs Before I try to install, I'll check for signs Nix already is or has been installed on this system. ---- Nix config report --------------------------------------------------------- Temp Dir: /var/folders/l1/z6d4k94x29g2lcm5lnlyrm2r0000gp/T/tmp.rPARlIpg Nix Root: /nix Build Users: 32 Build Group ID: 30000 Build Group Name: nixbld build users: Username: UID _nixbld1: 301 _nixbld2: 302 _nixbld3: 303 _nixbld4: 304 _nixbld5: 305 _nixbld6: 306 _nixbld7: 307 _nixbld8: 308 _nixbld9: 309 _nixbld10: 310 _nixbld11: 311 _nixbld12: 312 _nixbld13: 313 _nixbld14: 314 _nixbld15: 315 _nixbld16: 316 _nixbld17: 317 _nixbld18: 318 _nixbld19: 319 _nixbld20: 320 _nixbld21: 321 _nixbld22: 322 _nixbld23: 323 _nixbld24: 324 _nixbld25: 325 _nixbld26: 326 _nixbld27: 327 _nixbld28: 328 _nixbld29: 329 _nixbld30: 330 _nixbld31: 331 _nixbld32: 332 Ready to continue? [y/n] ---- Preparing a Nix volume ---------------------------------------------------- Nix traditionally stores its data in the root directory /nix, but macOS now (starting in 10.15 Catalina) has a read-only root directory. To support Nix, I will create a volume and configure macOS to mount it at /nix. ~~> Configuring /etc/synthetic.conf to make a mount-point at /nix ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/bin/ex -u NONE -n /etc/synthetic.conf to add Nix to /etc/synthetic.conf Password: ~~> Creating a Nix volume ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil unmount force disk3s7 to ensure the Nix volume is not mounted Password: Unmount failed for disk3s7 ~~> Configuring /etc/fstab to specify volume mount options ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/vifs to add nix to fstab Password: ~~> Encrypt the Nix volume ---- sudo execution ------------------------------------------------------------ I am executing: $ sudo /usr/sbin/diskutil mount Nix Store to mount your Nix volume for encrypting Password: Failed to find disk Nix Store ---- oh no! -------------------------------------------------------------------- Oh no, something went wrong. If you can take all the output and open an issue, we'd love to fix the problem so nobody else has this issue. :( We'd love to help if you need it. You can open an issue at https://github.com/NixOS/nix/issues/new?labels=installer&template=installer.md Or get in touch with the community: https://nixos.org/community WRMYW2L6QQ~/projects/cargo2nix[release-0.11.0|✔] % ```Priorities
Add :+1: to issues you find important.