Build Android (AOSP) images using the Nix package manager for reproducible and customizable builds.
Robotnix is a build system that uses the Nix package manager to compile Android (AOSP) images, along with components like kernels, webviews, and third-party apps. It solves the problem of Android's complex, fragile build processes by providing a reproducible, declarative approach similar to NixOS.
Android enthusiasts, privacy-conscious users, and developers who want to build custom, reproducible Android images for supported devices, particularly those interested in GrapheneOS or LineageOS.
Developers choose Robotnix because it brings Nix's reproducibility and modular configuration to Android builds, making it easier to create secure, customized images with verified boot support and integrated privacy tools like MicroG.
Build Android (AOSP) using Nix [maintainer=@danielfullmer,@Atemu,@cyclic-pentane]
Leverages Nix for declarative and reproducible Android image builds, abstracting away Android's complex tooling as described in the motivation section.
Uses a NixOS-style module system to easily customize flavors, apps, and settings, exemplified in the Quick Start with modules for F-Droid and MicroG.
Enables signed builds for verified boot and bootloader re-locking with user keys, a key feature for security-conscious users.
Integrates privacy-focused tools like MicroG, F-Droid, and alternative webviews (e.g., Bromite) directly into the build process without manual patching.
Explicitly labeled as in-development alpha software with many unmaintained components (e.g., webview, kernels), making it unreliable for daily use as per the README warning.
Requires at least 250GB disk space and 16GB RAM, with build times spanning hours, as detailed in the Requirements section, which can be prohibitive for casual users.
The status table shows critical components like vanilla AOSP, webview, and kernels are not maintained, reducing functionality and long-term support.
Requires familiarity with Nix and Android build systems; features like sandbox signing have specific kernel and daemon requirements, adding to setup complexity.
Instant, easy, and predictable development environments
The Deterministic Foundation for your SDLC
A fast, persistent use_nix/use_flake implementation for direnv [maintainer=@Mic92 / @bbenne10]
Multi-tenant Nix Binary Cache
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.