diff --git a/docs/source/config_files.rst b/docs/source/config_files.rst index 4b71980cf..a9efcc0d6 100644 --- a/docs/source/config_files.rst +++ b/docs/source/config_files.rst @@ -231,6 +231,27 @@ to produce a reproducible environment. To see an example repository visit `nix binder example `_. +.. _manifest.scm: + +``manifest.scm`` - the Guix package manager +=========================================== + +Specify packages to be installed by the `Guix package manager `_. +All packages specified in |manifest|_ will be installed in a container using |guix_package|_. In addition, you can use different `channels `_ rather +than the ones available by default (official channels of GNU Guix 1.3.0). +You must describe such channels in a ``channels.scm`` file which will be used +alongside ``manifest.scm`` with the |guix_time-machine|_ command. Furthermore, using a ``channels.scm`` file lets you `pin a specific revision `_ of Guix, allowing you to unambiguously specific the software environment to reproduce. + +For more information about Guix please read the `manual `_. + +.. |manifest| replace:: ``manifest.scm`` +.. _manifest: https://guix.gnu.org/manual/en/html_node/Invoking-guix-package.html#index-profile-manifesthy + +.. |guix_package| replace:: ``guix package`` +.. _guix_package: https://guix.gnu.org/manual/en/html_node/Invoking-guix-package.html#Invoking-guix-package + +.. |guix_time-machine| replace:: ``guix time-machine`` +.. _guix_time-machine: https://guix.gnu.org/manual/en/html_node/Invoking-guix-time_002dmachine.html ``Dockerfile`` - Advanced environments ====================================== diff --git a/repo2docker/app.py b/repo2docker/app.py index 8a804905c..6cb173712 100755 --- a/repo2docker/app.py +++ b/repo2docker/app.py @@ -37,6 +37,7 @@ PipfileBuildPack, PythonBuildPack, RBuildPack, + GuixBuildPack, ) from . import contentproviders from .utils import ByteSpecification, chdir @@ -99,6 +100,7 @@ def _default_log_level(self): CondaBuildPack, PipfileBuildPack, PythonBuildPack, + GuixBuildPack, ], config=True, help=""" diff --git a/repo2docker/buildpacks/__init__.py b/repo2docker/buildpacks/__init__.py index 10fe89a4e..cde1fb21c 100644 --- a/repo2docker/buildpacks/__init__.py +++ b/repo2docker/buildpacks/__init__.py @@ -8,3 +8,4 @@ from .legacy import LegacyBinderDockerBuildPack from .r import RBuildPack from .nix import NixBuildPack +from .guix import GuixBuildPack diff --git a/repo2docker/buildpacks/base.py b/repo2docker/buildpacks/base.py index 145d29648..1889bc7ef 100644 --- a/repo2docker/buildpacks/base.py +++ b/repo2docker/buildpacks/base.py @@ -718,3 +718,4 @@ def get_start_script(self): # the only path evaluated at container start time rather than build time return os.path.join("${REPO_DIR}", start) return None + diff --git a/repo2docker/buildpacks/guix/__init__.py b/repo2docker/buildpacks/guix/__init__.py new file mode 100644 index 000000000..3cac63bcd --- /dev/null +++ b/repo2docker/buildpacks/guix/__init__.py @@ -0,0 +1,74 @@ +"""BuildPack for guix environments""" +import os + +from ..base import BuildPack, BaseImage + + +class GuixBuildPack(BaseImage): + """A guix Package Manager BuildPack""" + + def get_path(self): + """Return paths to be added to PATH environment variable""" + return super().get_path() + ["/home/${NB_USER}/.guix-profile/bin"] + + + def get_build_scripts(self): + """ + Install guix package manager version 1.3.0.x86_64-linux, using + an unmodified installation script found at + https://git.savannah.gnu.org/cgit/guix.git/plain/etc/guix-install.sh + """ + return super().get_build_scripts() + [ + ( + "root", + """ + yes | BIN_VER=1.3.0.x86_64-linux \ + bash /home/${NB_USER}/.local/bin/guix-install.bash + """, + ), + + ] + + def get_build_script_files(self): + + """Copying guix installation script on the image""" + return { + "guix/guix-install.bash": + "/home/${NB_USER}/.local/bin/guix-install.bash", + } + + def get_assemble_scripts(self): + """ + Wake up the guix daemon with root permission, set guix environnement + variables, make sure we never use debian's python by error by + renaming it, then, as an user install packages listed in + manifest.scm, use guix time-machine if channels.scm file exists + """ + assemble_script =""" + /var/guix/profiles/per-user/root/current-guix/bin/guix-daemon \ + --build-users-group=guixbuild --disable-chroot & \ + mv /usr/bin/python /usr/bin/python.debian && \ + su - $NB_USER -c '{}' && \ + echo 'GUIX_PROFILE="$HOME/.guix-profile" ; \ + source "$GUIX_PROFILE/etc/profile"'>> ~/.bash_profile + """ + + if os.path.exists(self.binder_path("channels.scm")): + assemble_script = assemble_script.format( + "guix time-machine -C " + self.binder_path("channels.scm") + + " -- package -m " + self.binder_path("manifest.scm") + ) + else: + assemble_script = assemble_script.format( + "guix package -m " + self.binder_path("manifest.scm") + ) + return super().get_assemble_scripts() + [ + ( "root", + assemble_script, + ) + ] + + def detect(self): + """Check if current repo should be built with the guix BuildPack""" + return os.path.exists(self.binder_path("manifest.scm")) + diff --git a/repo2docker/buildpacks/guix/guix-install.bash b/repo2docker/buildpacks/guix/guix-install.bash new file mode 100755 index 000000000..6a799fa82 --- /dev/null +++ b/repo2docker/buildpacks/guix/guix-install.bash @@ -0,0 +1,610 @@ +#!/bin/sh +# GNU Guix --- Functional package management for GNU +# Copyright © 2017 sharlatan +# Copyright © 2018 Ricardo Wurmus +# Copyright © 2018 Efraim Flashner +# Copyright © 2019, 2020 Tobias Geerinckx-Rice +# Copyright © 2020 Morgan Smith +# Copyright © 2020 Simon Tournier +# Copyright © 2020 Daniel Brooks +# Copyright © 2021 Jakub Kądziołka +# Copyright © 2021 Chris Marusich +# Copyright © 2021 Maxim Cournoyer +# +# This file is part of GNU Guix. +# +# GNU Guix is free software; you can redistribute it and/or modify it +# under the terms of the GNU General Public License as published by +# the Free Software Foundation; either version 3 of the License, or (at +# your option) any later version. +# +# GNU Guix is distributed in the hope that it will be useful, but +# WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with GNU Guix. If not, see . + +# We require Bash but for portability we'd rather not use /bin/bash or +# /usr/bin/env in the shebang, hence this hack. +if [ "x$BASH_VERSION" = "x" ] +then + exec bash "$0" "$@" +fi + +set -e + +[ "$UID" -eq 0 ] || { echo "This script must be run as root."; exit 1; } + +REQUIRE=( + "dirname" + "readlink" + "wget" + "gpg" + "grep" + "which" + "sed" + "sort" + "getent" + "mktemp" + "rm" + "chmod" + "uname" + "groupadd" + "tail" + "tr" + "xz" +) + +PAS=$'[ \033[32;1mPASS\033[0m ] ' +ERR=$'[ \033[31;1mFAIL\033[0m ] ' +WAR=$'[ \033[33;1mWARN\033[0m ] ' +INF="[ INFO ] " + +DEBUG=0 +GNU_URL="https://ftp.gnu.org/gnu/guix/" +#GNU_URL="https://alpha.gnu.org/gnu/guix/" + +# The following associative array holds set of GPG keys used to sign the +# releases, keyed by their corresponding Savannah user ID. +declare -A GPG_SIGNING_KEYS +GPG_SIGNING_KEYS[15145]=3CE464558A84FDC69DB40CFB090B11993D9AEBB5 # ludo +GPG_SIGNING_KEYS[127547]=27D586A4F8900854329FF09F1260E46482E63562 # maxim + +# ------------------------------------------------------------------------------ +#+UTILITIES + +_err() +{ # All errors go to stderr. + printf "[%s]: %s\n" "$(date +%s.%3N)" "$1" +} + +_msg() +{ # Default message to stdout. + printf "[%s]: %s\n" "$(date +%s.%3N)" "$1" +} + +_debug() +{ + if [ "${DEBUG}" = '1' ]; then + printf "[%s]: %s\n" "$(date +%s.%3N)" "$1" + fi +} + +# Return true if user answered yes, false otherwise. +# $1: The prompt question. +prompt_yes_no() { + while true; do + read -rp "$1" yn + case $yn in + [Yy]*) return 0;; + [Nn]*) return 1;; + *) _msg "Please answer yes or no." + esac + done +} + +chk_require() +{ # Check that every required command is available. + declare -a warn + local c + + _debug "--- [ ${FUNCNAME[0]} ] ---" + + for c in "$@"; do + command -v "$c" &>/dev/null || warn+=("$c") + done + + [ "${#warn}" -ne 0 ] && + { _err "${ERR}Missing commands: ${warn[*]}."; + return 1; } + + _msg "${PAS}verification of required commands completed" +} + +chk_gpg_keyring() +{ # Check whether the Guix release signing public key is present. + _debug "--- [ ${FUNCNAME[0]} ] ---" + local user_id + local gpg_key_id + local exit_flag + + for user_id in "${!GPG_SIGNING_KEYS[@]}"; do + gpg_key_id=${GPG_SIGNING_KEYS[$user_id]} + # Without --dry-run this command will create a ~/.gnupg owned by root on + # systems where gpg has never been used, causing errors and confusion. + if ! gpg --dry-run --list-keys "$gpg_key_id" >/dev/null 2>&1; then + if prompt_yes_no "${INF}The following OpenPGP public key is \ +required to verify the Guix binary signature: $gpg_key_id. +Would you like me to fetch it for you? (yes/no)"; then + wget "https://sv.gnu.org/people/viewgpg.php?user_id=$user_id" \ + -qO - | gpg --import - + else + _err "${ERR}Missing OpenPGP public key ($gpg_key_id). +Fetch it with this command: + + wget \"https://sv.gnu.org/people/viewgpg.php?user_id=$user_id\" -qO - | \ +sudo -i gpg --import -" + exit_flag=yes + fi + fi + done + if [ "$exit_flag" = yes ]; then + exit 1 + fi +} + +chk_term() +{ # Check for ANSI terminal for color printing. + if [ -t 2 ]; then + if [ "${TERM+set}" = 'set' ]; then + case "$TERM" in + xterm*|rxvt*|urxvt*|linux*|vt*|eterm*|screen*) + ;; + *) + ERR="[ FAIL ] " + PAS="[ PASS ] " + ;; + esac + fi + fi +} + +chk_init_sys() +{ # Return init system type name. + if [[ $(/sbin/init --version 2>/dev/null) =~ upstart ]]; then + _msg "${INF}init system is: upstart" + INIT_SYS="upstart" + return 0 + elif [[ $(systemctl 2>/dev/null) =~ -\.mount ]]; then + _msg "${INF}init system is: systemd" + INIT_SYS="systemd" + return 0 + elif [[ -f /etc/init.d/cron && ! -h /etc/init.d/cron ]]; then + _msg "${INF}init system is: sysv-init" + INIT_SYS="sysv-init" + return 0 + elif [[ $(openrc --version 2>/dev/null) =~ \(OpenRC\) ]]; then + _msg "${INF}init system is: OpenRC" + INIT_SYS="openrc" + return 0 + else + INIT_SYS="NA" + _err "${ERR}Init system could not be detected." + fi +} + +chk_sys_arch() +{ # Check for operating system and architecture type. + local os + local arch + + os="$(uname -s)" + arch="$(uname -m)" + + case "$arch" in + i386 | i486 | i686 | i786 | x86) + local arch=i686 + ;; + x86_64 | x86-64 | x64 | amd64) + local arch=x86_64 + ;; + aarch64) + local arch=aarch64 + ;; + armv7l) + local arch=armhf + ;; + ppc64le | powerpc64le) + local arch=powerpc64le + ;; + *) + _err "${ERR}Unsupported CPU type: ${arch}" + exit 1 + esac + + case "$os" in + Linux | linux) + local os=linux + ;; + *) + _err "${ERR}Your operation system (${os}) is not supported." + exit 1 + esac + + ARCH_OS="${arch}-${os}" +} + +chk_sys_nscd() +{ # Check if nscd is up and suggest to start it or install it + if [ "$(type -P pidof)" ]; then + if [ ! "$(pidof nscd)" ]; then + _msg "${WAR}We recommend installing and/or starting your distribution 'nscd' service" + _msg "${WAR}Please read 'info guix \"Application Setup\"' about \"Name Service Switch\"" + fi + else + _msg "${INF}We cannot determine if your distribution 'nscd' service is running" + _msg "${INF}Please read 'info guix \"Application Setup\"' about \"Name Service Switch\"" + fi +} + +# ------------------------------------------------------------------------------ +#+MAIN + +guix_get_bin_list() +{ # Scan GNU archive and save list of binaries + local gnu_url="$1" + local -a bin_ver_ls + local latest_ver + local default_ver + + _debug "--- [ ${FUNCNAME[0]} ] ---" + + # Filter only version and architecture + bin_ver_ls=("$(wget -qO- "$gnu_url" \ + | sed -n -e 's/.*guix-binary-\([0-9.]*[a-z0-9]*\)\..*.tar.xz.*/\1/p' \ + | sort -Vu)") + + latest_ver="$(echo "${bin_ver_ls[0]}" \ + | grep -oE "([0-9]{1,2}\.){2}[0-9]{1,2}[a-z0-9]*" \ + | tail -n1)" + + default_ver="guix-binary-${latest_ver}.${ARCH_OS}" + + if [[ "${#bin_ver_ls}" -ne "0" ]]; then + _msg "${PAS}Release for your system: ${default_ver}" + else + _err "${ERR}Could not obtain list of Guix releases." + exit 1 + fi + + # Use default to download according to the list and local ARCH_OS. + BIN_VER="${default_ver}" +} + +guix_get_bin() +{ # Download and verify binary package. + local url="$1" + local bin_ver="$2" + local dl_path="$3" + local wget_args=() + + _debug "--- [ ${FUNCNAME[0]} ] ---" + + _msg "${INF}Downloading Guix release archive" + + wget --help | grep -q '\--show-progress' \ + && wget_args=("-q" "--show-progress") + + if wget "${wget_args[@]}" -P "$dl_path" \ + "${url}/${bin_ver}.tar.xz" "${url}/${bin_ver}.tar.xz.sig"; then + _msg "${PAS}download completed." + else + _err "${ERR}could not download ${url}/${bin_ver}.tar.xz." + exit 1 + fi + + pushd "${dl_path}" >/dev/null + if gpg --verify "${bin_ver}.tar.xz.sig" >/dev/null 2>&1; then + _msg "${PAS}Signature is valid." + popd >/dev/null + else + _err "${ERR}could not verify the signature." + exit 1 + fi +} + +sys_create_store() +{ # Unpack and install /gnu/store and /var/guix + local pkg="$1" + local tmp_path="$2" + + _debug "--- [ ${FUNCNAME[0]} ] ---" + + if [[ -e "/var/guix" || -e "/gnu" ]]; then + _err "${ERR}A previous Guix installation was found. Refusing to overwrite." + exit 1 + fi + + cd "$tmp_path" + tar --extract --file "$pkg" && _msg "${PAS}unpacked archive" + + _msg "${INF}Installing /var/guix and /gnu..." + mv "${tmp_path}/var/guix" /var/ + mv "${tmp_path}/gnu" / + + _msg "${INF}Linking the root user's profile" + mkdir -p "~root/.config/guix" + ln -sf /var/guix/profiles/per-user/root/current-guix \ + "~root/.config/guix/current" + + GUIX_PROFILE="~root/.config/guix/current" + # shellcheck disable=SC1090 + source "${GUIX_PROFILE}/etc/profile" + _msg "${PAS}activated root profile at ${GUIX_PROFILE}" +} + +sys_create_build_user() +{ # Create the group and user accounts for build users. + + _debug "--- [ ${FUNCNAME[0]} ] ---" + + if getent group guixbuild > /dev/null; then + _msg "${INF}group guixbuild exists" + else + groupadd --system guixbuild + _msg "${PAS}group created" + fi + + if getent group kvm > /dev/null; then + _msg "${INF}group kvm exists and build users will be added to it" + local KVMGROUP=,kvm + fi + + for i in $(seq -w 1 10); do + if id "guixbuilder${i}" &>/dev/null; then + _msg "${INF}user is already in the system, reset" + usermod -g guixbuild -G guixbuild${KVMGROUP} \ + -d /var/empty -s "$(which nologin)" \ + -c "Guix build user $i" \ + "guixbuilder${i}"; + else + useradd -g guixbuild -G guixbuild${KVMGROUP} \ + -d /var/empty -s "$(which nologin)" \ + -c "Guix build user $i" --system \ + "guixbuilder${i}"; + _msg "${PAS}user added " + fi + done +} + +sys_enable_guix_daemon() +{ # Run the daemon, and set it to automatically start on boot. + + local info_path + local local_bin + local var_guix + + _debug "--- [ ${FUNCNAME[0]} ] ---" + + info_path="/usr/local/share/info" + local_bin="/usr/local/bin" + var_guix="/var/guix/profiles/per-user/root/current-guix" + + case "$INIT_SYS" in + upstart) + { initctl reload-configuration; + cp "~root/.config/guix/current/lib/upstart/system/guix-daemon.conf" \ + /etc/init/ && + start guix-daemon; } && + _msg "${PAS}enabled Guix daemon via upstart" + ;; + systemd) + { # systemd .mount units must be named after the target directory. + # Here we assume a hard-coded name of /gnu/store. + # XXX Work around until next release. + if [ -f "~root/.config/guix/current/lib/systemd/system/gnu-store.mount" ]; then + cp "~root/.config/guix/current/lib/systemd/system/gnu-store.mount" \ + /etc/systemd/system/; + chmod 664 /etc/systemd/system/gnu-store.mount; + systemctl daemon-reload && + systemctl enable gnu-store.mount; + fi + + cp "~root/.config/guix/current/lib/systemd/system/guix-daemon.service" \ + /etc/systemd/system/; + chmod 664 /etc/systemd/system/guix-daemon.service; + + # Work around , present in 1.0.1. + sed -i /etc/systemd/system/guix-daemon.service \ + -e "s/GUIX_LOCPATH='/'GUIX_LOCPATH=/"; + + # Work around , present in 1.0.1. + if ! grep en_US /etc/systemd/system/guix-daemon.service >/dev/null; + then sed -i /etc/systemd/system/guix-daemon.service \ + -e 's/^Environment=\(.*\)$/Environment=\1 LC_ALL=en_US.UTF-8'; + fi; + + systemctl daemon-reload && + systemctl enable guix-daemon && + systemctl start guix-daemon; } && + _msg "${PAS}enabled Guix daemon via systemd" + ;; + sysv-init) + { mkdir -p /etc/init.d; + cp "~root/.config/guix/current/etc/init.d/guix-daemon" \ + /etc/init.d/guix-daemon; + chmod 775 /etc/init.d/guix-daemon; + + update-rc.d guix-daemon defaults && + update-rc.d guix-daemon enable && + service guix-daemon start; } && + _msg "${PAS}enabled Guix daemon via sysv" + ;; + openrc) + { mkdir -p /etc/init.d; + cp "~root/.config/guix/current/etc/openrc/guix-daemon" \ + /etc/init.d/guix-daemon; + chmod 775 /etc/init.d/guix-daemon; + + rc-update add guix-daemon default && + rc-service guix-daemon start; } && + _msg "${PAS}enabled Guix daemon via OpenRC" + ;; + NA|*) + _msg "${ERR}unsupported init system; run the daemon manually:" + echo " ~root/.config/guix/current/bin/guix-daemon --build-users-group=guixbuild" + ;; + esac + + _msg "${INF}making the guix command available to other users" + + [ -e "$local_bin" ] || mkdir -p "$local_bin" + ln -sf "${var_guix}/bin/guix" "$local_bin" + + [ -e "$info_path" ] || mkdir -p "$info_path" + for i in "${var_guix}"/share/info/*; do + ln -sf "$i" "$info_path" + done +} + +sys_authorize_build_farms() +{ # authorize the public key of the build farm + if prompt_yes_no "Permit downloading pre-built package binaries from the \ +project's build farm? (yes/no) "; then + guix archive --authorize \ + < "~root/.config/guix/current/share/guix/ci.guix.gnu.org.pub" \ + && _msg "${PAS}Authorized public key for ci.guix.gnu.org" + else + _msg "${INF}Skipped authorizing build farm public keys" + fi +} + +sys_create_init_profile() +{ # Define for better desktop integration + # This will not take effect until the next shell or desktop session! + [ -d "/etc/profile.d" ] || mkdir /etc/profile.d # Just in case + cat <<"EOF" > /etc/profile.d/guix.sh +# _GUIX_PROFILE: `guix pull` profile +_GUIX_PROFILE="$HOME/.config/guix/current" +export PATH="$_GUIX_PROFILE/bin${PATH:+:}$PATH" +# Export INFOPATH so that the updated info pages can be found +# and read by both /usr/bin/info and/or $GUIX_PROFILE/bin/info +# When INFOPATH is unset, add a trailing colon so that Emacs +# searches 'Info-default-directory-list'. +export INFOPATH="$_GUIX_PROFILE/share/info:$INFOPATH" + +# GUIX_PROFILE: User's default profile +GUIX_PROFILE="$HOME/.guix-profile" +[ -L $GUIX_PROFILE ] || return +GUIX_LOCPATH="$GUIX_PROFILE/lib/locale" +export GUIX_PROFILE GUIX_LOCPATH + +[ -f "$GUIX_PROFILE/etc/profile" ] && . "$GUIX_PROFILE/etc/profile" + +# set XDG_DATA_DIRS to include Guix installations +export XDG_DATA_DIRS="$GUIX_PROFILE/share:${XDG_DATA_DIRS:-/usr/local/share/:/usr/share/}" +EOF +} + +sys_create_shell_completion() +{ # Symlink supported shell completions system-wide + + var_guix=/var/guix/profiles/per-user/root/current-guix + bash_completion=/etc/bash_completion.d + zsh_completion=/usr/share/zsh/site-functions + fish_completion=/usr/share/fish/vendor_completions.d + + { # Just in case + for dir_shell in $bash_completion $zsh_completion $fish_completion; do + [ -d "$dir_shell" ] || mkdir -p $dir_shell + done; + + ln -sf ${var_guix}/etc/bash_completion.d/* "$bash_completion"; + ln -sf ${var_guix}/share/zsh/site-functions/* "$zsh_completion"; + ln -sf ${var_guix}/share/fish/vendor_completions.d/* "$fish_completion"; } && + _msg "${PAS}installed shell completion" +} + + +welcome() +{ + cat<<"EOF" + ░░░ ░░░ + ░░▒▒░░░░░░░░░ ░░░░░░░░░▒▒░░ + ░░▒▒▒▒▒░░░░░░░ ░░░░░░░▒▒▒▒▒░ + ░▒▒▒░░▒▒▒▒▒ ░░░░░░░▒▒░ + ░▒▒▒▒░ ░░░░░░ + ▒▒▒▒▒ ░░░░░░ + ▒▒▒▒▒ ░░░░░ + ░▒▒▒▒▒ ░░░░░ + ▒▒▒▒▒ ░░░░░ + ▒▒▒▒▒ ░░░░░ + ░▒▒▒▒▒░░░░░ + ▒▒▒▒▒▒░░░ + ▒▒▒▒▒▒░ + _____ _ _ _ _ _____ _ + / ____| \ | | | | | / ____| (_) + | | __| \| | | | | | | __ _ _ ___ __ + | | |_ | . ' | | | | | | |_ | | | | \ \/ / + | |__| | |\ | |__| | | |__| | |_| | |> < + \_____|_| \_|\____/ \_____|\__,_|_/_/\_\ + +This script installs GNU Guix on your system + +https://www.gnu.org/software/guix/ +EOF + echo -n "Press return to continue..." + read -r +} + +main() +{ + local tmp_path + welcome + + _msg "Starting installation ($(date))" + + chk_term + chk_require "${REQUIRE[@]}" + chk_gpg_keyring + chk_init_sys + chk_sys_arch + chk_sys_nscd + + _msg "${INF}system is ${ARCH_OS}" + + umask 0022 + tmp_path="$(mktemp -t -d guix.XXX)" + + if [ -z "${GUIX_BINARY_FILE_NAME}" ]; then + guix_get_bin_list "${GNU_URL}" + guix_get_bin "${GNU_URL}" "${BIN_VER}" "$tmp_path" + GUIX_BINARY_FILE_NAME=${BIN_VER}.tar.xz + else + if ! [[ $GUIX_BINARY_FILE_NAME =~ $ARCH_OS ]]; then + _err "$ARCH_OS not in ${GUIX_BINARY_FILE_NAME}; aborting" + fi + _msg "${INF}Using manually provided binary ${GUIX_BINARY_FILE_NAME}" + GUIX_BINARY_FILE_NAME=$(realpath "$GUIX_BINARY_FILE_NAME") + fi + + sys_create_store "${GUIX_BINARY_FILE_NAME}" "${tmp_path}" + sys_create_build_user + sys_enable_guix_daemon + sys_authorize_build_farms + sys_create_init_profile + sys_create_shell_completion + + _msg "${INF}cleaning up ${tmp_path}" + rm -r "${tmp_path}" + + _msg "${PAS}Guix has successfully been installed!" + _msg "${INF}Run 'info guix' to read the manual." + + # Required to source /etc/profile in desktop environments. + _msg "${INF}Please log out and back in to complete the installation." + } + +main "$@" diff --git a/tests/guix/binder-dir/README.rst b/tests/guix/binder-dir/README.rst new file mode 100644 index 000000000..ac0bbd5e5 --- /dev/null +++ b/tests/guix/binder-dir/README.rst @@ -0,0 +1,4 @@ +`manifest.scm` in a binder/ directory +------------------------------------- + +Check if we can find and use `manifest.scm` when it is ina `binder/` sub-directory. diff --git a/tests/guix/binder-dir/binder/manifest.scm b/tests/guix/binder-dir/binder/manifest.scm new file mode 100644 index 000000000..c9fdbeb25 --- /dev/null +++ b/tests/guix/binder-dir/binder/manifest.scm @@ -0,0 +1,3 @@ +(specifications->manifest + '("jupyter" + "hello")) diff --git a/tests/guix/binder-dir/verify b/tests/guix/binder-dir/verify new file mode 100755 index 000000000..ecc7f040f --- /dev/null +++ b/tests/guix/binder-dir/verify @@ -0,0 +1,3 @@ +#!/bin/sh + +hello \ No newline at end of file diff --git a/tests/guix/ignore-outside/README.rst b/tests/guix/ignore-outside/README.rst new file mode 100644 index 000000000..b0bb62edc --- /dev/null +++ b/tests/guix/ignore-outside/README.rst @@ -0,0 +1,4 @@ +`manifest.scm` in main directory and in `binder/` +------------------------------------------------- + +Check if `manifest.scm` located in the `binder/` sub-directory is prefered to the one in the main directory. diff --git a/tests/guix/ignore-outside/binder/manifest.scm b/tests/guix/ignore-outside/binder/manifest.scm new file mode 100644 index 000000000..a262c0505 --- /dev/null +++ b/tests/guix/ignore-outside/binder/manifest.scm @@ -0,0 +1,4 @@ +(specifications->manifest + '("jupyter" + "python" + "python-numpy")) diff --git a/tests/guix/ignore-outside/manifest.scm b/tests/guix/ignore-outside/manifest.scm new file mode 100644 index 000000000..452b8ff0d --- /dev/null +++ b/tests/guix/ignore-outside/manifest.scm @@ -0,0 +1,2 @@ +(specifications->manifest + '("jupyter")) diff --git a/tests/guix/ignore-outside/verify b/tests/guix/ignore-outside/verify new file mode 100755 index 000000000..7fa832bdc --- /dev/null +++ b/tests/guix/ignore-outside/verify @@ -0,0 +1,3 @@ +#!/usr/bin/env python3 + +import numpy diff --git a/tests/guix/simple-channels/README.rst b/tests/guix/simple-channels/README.rst new file mode 100644 index 000000000..5a8949352 --- /dev/null +++ b/tests/guix/simple-channels/README.rst @@ -0,0 +1,4 @@ +`manifest.scm` and `channels.scm` in main directory +--------------------------------------------------- + +CHeck if we can use `manifest.scm` alongside a `channels.scm` file using `guix time-machine ...` diff --git a/tests/guix/simple-channels/channels.scm b/tests/guix/simple-channels/channels.scm new file mode 100644 index 000000000..3ae7063ad --- /dev/null +++ b/tests/guix/simple-channels/channels.scm @@ -0,0 +1,20 @@ +(list (channel + (name 'guix) + (url "https://git.savannah.gnu.org/git/guix.git") + (commit + "f1bfd9f1948a5ff336d737c0614b9a30c2bb3097") + (introduction + (make-channel-introduction + "9edb3f66fd807b096b48283debdcddccfea34bad" + (openpgp-fingerprint + "BBB0 2DDF 2CEA F6A8 0D1D E643 A2A0 6DF2 A33A 54FA")))) + (channel + (name 'nonguix) + (url "https://gitlab.com/nonguix/nonguix") + (commit + "46c1d8bcca674d3a71cd077c52dde9552a89873d") + (introduction + (make-channel-introduction + "897c1a470da759236cc11798f4e0a5f7d4d59fbc" + (openpgp-fingerprint + "2A39 3FFF 68F4 EF7A 3D29 12AF 6F51 20A0 22FB B2D5"))))) diff --git a/tests/guix/simple-channels/manifest.scm b/tests/guix/simple-channels/manifest.scm new file mode 100644 index 000000000..c9fdbeb25 --- /dev/null +++ b/tests/guix/simple-channels/manifest.scm @@ -0,0 +1,3 @@ +(specifications->manifest + '("jupyter" + "hello")) diff --git a/tests/guix/simple-channels/verify b/tests/guix/simple-channels/verify new file mode 100755 index 000000000..1d4239a7a --- /dev/null +++ b/tests/guix/simple-channels/verify @@ -0,0 +1,3 @@ +#!/bin/sh + +hello diff --git a/tests/guix/simple/README.rst b/tests/guix/simple/README.rst new file mode 100644 index 000000000..b0c266935 --- /dev/null +++ b/tests/guix/simple/README.rst @@ -0,0 +1,5 @@ + +`manifest.scm` in the main directory +---------------------------------- + +Check if we can find and use `manifest.scm` when it is in the main directory. diff --git a/tests/guix/simple/manifest.scm b/tests/guix/simple/manifest.scm new file mode 100644 index 000000000..c9fdbeb25 --- /dev/null +++ b/tests/guix/simple/manifest.scm @@ -0,0 +1,3 @@ +(specifications->manifest + '("jupyter" + "hello")) diff --git a/tests/guix/simple/verify b/tests/guix/simple/verify new file mode 100755 index 000000000..1d4239a7a --- /dev/null +++ b/tests/guix/simple/verify @@ -0,0 +1,3 @@ +#!/bin/sh + +hello