!UUYziobKGGxpovWyAN:nixos.org

Robotnix

259 Members
Build Android (AOSP) using Nix | https://github.com/danielfullmer/robotnix83 Servers

Load older messages


SenderMessageTime
30 Apr 2023
@gooberpatrol66:matrix.orggooberpatrol66{ device = "crosshatch"; flavor = "lineageos"; variant = "user"; signing.enable = true; signing.keyStorePath = "/home/nathan/guix-configs/robotnix/keys"; apps.fdroid.enable = true; } 18:24:35
@gooberpatrol66:matrix.orggooberpatrol66the keys from generate_keys.sh are in that directory18:25:12
@gooberpatrol66:matrix.orggooberpatrol66Ideas what the problem is?18:25:30
@gooberpatrol66:matrix.orggooberpatrol66doing nix-build --option extra-sandboxpaths /keys="/home/nathan/guix-configs/robotnix/keys" doesn't help18:32:02
@gooberpatrol66:matrix.orggooberpatrol66*-paths18:32:27
@atemu12:matrix.orgatemu12 gooberpatrol66: Is your user allowed to do add extra sandbox paths? 19:25:33
@gooberpatrol66:matrix.orggooberpatrol66
In reply to @atemu12:matrix.org
gooberpatrol66: Is your user allowed to do add extra sandbox paths?
yeah, that was the problem, thanks
21:13:57
@gooberpatrol66:matrix.orggooberpatrol66I'm getting this now21:14:10
@gooberpatrol66:matrix.orggooberpatrol66nix-build --option extra-sandbox-paths /keys="/home/nathan/guix-configs/robotnix/keys" --arg configuration ~/guix-configs/robotnix/crosshatch.nix -A ota these 2 derivations will be built: /nix/store/vd325v1dk21w4v53kkvlai88ag7s7rk9-crosshatch-signed_target_files-2022041111.zip.drv /nix/store/jhmczwpjhhzwdxfra7fvssqfkiqqdjpx-crosshatch-ota_update-2022041111.zip.drv building '/nix/store/vd325v1dk21w4v53kkvlai88ag7s7rk9-crosshatch-signed_target_files-2022041111.zip.drv'... cp: /dev/shm/robotnix_keys.XXXXUZia63/chromium.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/chromiumwebview.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/com.android.connectivity.resources.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/com.android.hotspot2.osulogin.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/com.android.wifi.resources.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/crosshatch/releasekey.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/crosshatch/platform.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/crosshatch/shared.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/crosshatch/media.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/crosshatch/networkstack.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/crosshatch/avb.pem: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/dre/releasekey.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/dre/platform.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/dre/shared.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/dre/media.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/dre/networkstack.pk8: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/dre/avb.pem: Permission denied cp: /dev/shm/robotnix_keys.XXXXUZia63/f-droid.pk8: Permission denied 21:14:15
@atemu12:matrix.orgatemu12 gooberpatrol66: nixbld group needs access 21:14:51
@gooberpatrol66:matrix.orggooberpatrol66
In reply to @atemu12:matrix.org
gooberpatrol66: nixbld group needs access
how do i do that, is that set in nix.conf?
21:15:25
@atemu12:matrix.orgatemu12 gooberpatrol66: No, the files themselves must be accessible to users belongizg to nixbld 21:24:00
@atemu12:matrix.orgatemu12* gooberpatrol66: No, the files themselves must be accessible to users belonging to nixbld21:24:09
@atemu12:matrix.orgatemu12As in, UNIX access permissions21:24:35
@gooberpatrol66:matrix.orggooberpatrol66
In reply to @atemu12:matrix.org
gooberpatrol66: No, the files themselves must be accessible to users belonging to nixbld
my user is in nixbld group, tried chowning the keys to nathan:nathan and nathan:nixbld, same error
21:32:46
@gooberpatrol66:matrix.orggooberpatrol66tried sysctl fs.protected_regular=0 but didn't help21:38:16
1 May 2023
@therivercass:matrix.orgsilent_waterthe directory needs to be listable (g+x) and the directory + files need a chgrp -R nixbld13:02:39
@therivercass:matrix.orgsilent_waterare resource overlays working for people? my updater app doesn't seem to be picking up the URL I configured.14:45:02
2 May 2023
@therivercass:matrix.orgsilent_waternvm got it working with a few updates that I'll push soon (validating the new grapheneos release first)17:07:49
3 May 2023
@gooberpatrol66:matrix.orggooberpatrol66
In reply to @therivercass:matrix.org
the directory needs to be listable (g+x) and the directory + files need a chgrp -R nixbld
that didn't work. i got it to build by chowning the keys to nixbld1:nixbld, so it will break if nix chooses a different nixbld* user
01:11:13
@therivercass:matrix.orgsilent_water
In reply to @gooberpatrol66:matrix.org
that didn't work. i got it to build by chowning the keys to nixbld1:nixbld, so it will break if nix chooses a different nixbld* user
can you send me the output of ls -l on the directory?
12:20:46
@therivercass:matrix.orgsilent_water
In reply to @gooberpatrol66:matrix.org
that didn't work. i got it to build by chowning the keys to nixbld1:nixbld, so it will break if nix chooses a different nixbld* user
* can you send me the output of ls -la on the directory?
12:20:56
@gooberpatrol66:matrix.orggooberpatrol66
In reply to @therivercass:matrix.org
can you send me the output of ls -la on the directory?
ls -la /home/nathan/guix-configs/robotnix/keys.bak
total 48
drwxr-xr-x 1 nixbld1 nixbld 638 Apr 6 17:25 .
drwxr-xr-x 1 nathan nathan 78 Apr 29 17:24 ..
-rw------- 1 nixbld1 nixbld 1216 Apr 6 17:24 chromium.pk8
-rw------- 1 nixbld1 nixbld 1218 Apr 6 17:24 chromiumwebview.pk8
-rw-r--r-- 1 nixbld1 nixbld 1155 Apr 6 17:24 chromiumwebview.x509.pem
-rw-r--r-- 1 nixbld1 nixbld 1139 Apr 6 17:24 chromium.x509.pem
-rw------- 1 nixbld1 nixbld 1218 Apr 6 17:24 com.android.connectivity.resources.pk8
-rw-r--r-- 1 nixbld1 nixbld 1208 Apr 6 17:24 com.android.connectivity.resources.x509.pem
-rw------- 1 nixbld1 nixbld 1216 Apr 6 17:24 com.android.hotspot2.osulogin.pk8
-rw-r--r-- 1 nixbld1 nixbld 1196 Apr 6 17:24 com.android.hotspot2.osulogin.x509.pem
-rw------- 1 nixbld1 nixbld 1219 Apr 6 17:24 com.android.wifi.resources.pk8
-rw-r--r-- 1 nixbld1 nixbld 1188 Apr 6 17:24 com.android.wifi.resources.x509.pem
drwxr-xr-x 1 nixbld1 nixbld 386 May 1 15:51 dre
-rw------- 1 nixbld1 nixbld 1220 Apr 6 17:24 f-droid.pk8
-rw-r--r-- 1 nixbld1 nixbld 1135 Apr 6 17:24 f-droid.x509.pem
21:15:26
@gooberpatrol66:matrix.orggooberpatrol66wait, wrong directory21:46:01
@gooberpatrol66:matrix.orggooberpatrol66ls -la /home/nathan/guix-configs/robotnix/keys total 48 drwxr-xr-x 1 nixbld1 nixbld 658 Apr 29 17:29 . drwxr-xr-x 1 nathan nathan 78 Apr 29 17:24 .. -rw------- 1 nixbld1 nixbld 1217 Apr 13 17:28 chromium.pk8 -rw------- 1 nixbld1 nixbld 1218 Apr 13 17:28 chromiumwebview.pk8 -rw-r--r-- 1 nixbld1 nixbld 1155 Apr 13 17:28 chromiumwebview.x509.pem -rw-r--r-- 1 nixbld1 nixbld 1139 Apr 13 17:28 chromium.x509.pem -rw------- 1 nixbld1 nixbld 1216 Apr 13 17:28 com.android.connectivity.resources.pk8 -rw-r--r-- 1 nixbld1 nixbld 1208 Apr 13 17:28 com.android.connectivity.resources.x509.pem -rw------- 1 nixbld1 nixbld 1216 Apr 13 17:27 com.android.hotspot2.osulogin.pk8 -rw-r--r-- 1 nixbld1 nixbld 1196 Apr 13 17:27 com.android.hotspot2.osulogin.x509.pem -rw------- 1 nixbld1 nixbld 1217 Apr 13 17:28 com.android.wifi.resources.pk8 -rw-r--r-- 1 nixbld1 nixbld 1188 Apr 13 17:28 com.android.wifi.resources.x509.pem drwxr-xr-x 1 nixbld1 nixbld 332 Apr 29 17:30 crosshatch drwxr-xr-x 1 nixbld1 nixbld 332 Apr 13 17:28 dre -rw------- 1 nixbld1 nixbld 1217 Apr 13 17:28 f-droid.pk8 -rw-r--r-- 1 nixbld1 nixbld 1135 Apr 13 17:28 f-droid.x509.pem 21:46:03
@therivercass:matrix.orgsilent_waterseveral of the keys aren't readable by the group. do chmod g+rw -R dirname22:41:53
4 May 2023
@gooberpatrol66:matrix.orggooberpatrol66
In reply to @therivercass:matrix.org
several of the keys aren't readable by the group. do chmod g+rw -R dirname
Ok that worked, thank you.
21:36:00
5 May 2023
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneIs it possible to flash gapps as part of the robotnix build process?14:52:56
@matthewcroughan:defenestrate.itmatthewcroughan - nix.zoneJust wondering if anyone has an example of that?14:53:02
@atemu12:matrix.orgatemu12Robotnix does nothing special w.r.t. the build process here; it's just the regular AOSP build process15:09:07

Show newer messages


Back to Room ListRoom Version: 6