lanzaboote/flake.nix

274 lines
8.1 KiB
Nix
Raw Normal View History

2022-11-21 05:44:04 -05:00
{
2023-09-14 05:22:22 -04:00
description = "Secure Boot for NixOS";
2022-11-21 05:44:04 -05:00
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable-small";
2022-11-26 10:41:48 -05:00
flake-parts.url = "github:hercules-ci/flake-parts";
2023-04-23 05:55:04 -04:00
flake-parts.inputs.nixpkgs-lib.follows = "nixpkgs";
2023-01-07 14:21:03 -05:00
pre-commit-hooks-nix = {
url = "github:cachix/pre-commit-hooks.nix";
inputs.nixpkgs.follows = "nixpkgs";
inputs.flake-utils.follows = "flake-utils";
2023-04-23 05:55:04 -04:00
inputs.flake-compat.follows = "flake-compat";
2023-01-07 14:21:03 -05:00
};
# We only have this input to pass it to other dependencies and
2023-01-21 04:27:34 -05:00
# avoid having multiple versions in our dependencies.
flake-utils.url = "github:numtide/flake-utils";
crane = {
url = "github:ipetkov/crane";
inputs.nixpkgs.follows = "nixpkgs";
};
rust-overlay = {
url = "github:oxalica/rust-overlay";
inputs.nixpkgs.follows = "nixpkgs";
inputs.flake-utils.follows = "flake-utils";
};
2022-12-25 19:22:13 -05:00
flake-compat = {
url = "github:edolstra/flake-compat";
flake = false;
};
2022-11-21 05:44:04 -05:00
};
outputs = inputs@{ self, nixpkgs, crane, rust-overlay, flake-parts, ... }:
let
# Systems supported in CI
supportedSystems = [ "x86_64-linux" ];
fixupFlakes = outputs: nixpkgs.lib.updateManyAttrsByPath [
# Apply post-flakeparts massaging for limited supported systems, e.g. systems for which
# we don't have KVM support and cannot test in CI, but we still can meaningfully
# build packages.
{
path = [ "checks" ];
update = nixpkgs.lib.filterAttrs (name: _: builtins.elem name supportedSystems);
}
]
outputs;
in
fixupFlakes (flake-parts.lib.mkFlake { inherit inputs; } ({ moduleWithSystem, ... }: {
imports = [
# Derive the output overlay automatically from all packages that we define.
inputs.flake-parts.flakeModules.easyOverlay
2023-01-07 14:21:03 -05:00
# Formatting and quality checks.
inputs.pre-commit-hooks-nix.flakeModule
];
flake.nixosModules.lanzaboote = moduleWithSystem (
perSystem@{ config }:
{ ... }: {
imports = [
./nix/modules/lanzaboote.nix
];
boot.lanzaboote.package = perSystem.config.packages.tool;
}
);
flake.nixosModules.uki = moduleWithSystem (
perSystem@{ config }:
{ lib, ... }: {
imports = [
./nix/modules/uki.nix
];
boot.loader.uki.stub = lib.mkDefault "${perSystem.config.packages.fatStub}/bin/lanzaboote_stub.efi";
}
);
systems = [
"x86_64-linux"
# Not actively tested, but may work:
"aarch64-linux"
];
perSystem = { config, system, pkgs, ... }:
let
rustTarget = "${pkgs.stdenv.hostPlatform.qemuArch}-unknown-uefi";
pkgs = import nixpkgs {
system = system;
overlays = [
rust-overlay.overlays.default
];
};
inherit (pkgs) lib;
uefi-rust-stable = pkgs.rust-bin.fromRustupToolchainFile ./rust/uefi/rust-toolchain.toml;
craneLib = crane.lib.${system}.overrideToolchain uefi-rust-stable;
# Build attributes for a Rust application.
buildRustApp = lib.makeOverridable (
{ pname
, src
, target ? null
, doCheck ? true
, extraArgs ? { }
}:
let
commonArgs = {
inherit pname;
inherit src;
CARGO_BUILD_TARGET = target;
inherit doCheck;
# Workaround for https://github.com/ipetkov/crane/issues/262.
dummyrs = pkgs.writeText "dummy.rs" ''
#![allow(unused)]
#![cfg_attr(
any(target_os = "none", target_os = "uefi"),
no_std,
no_main,
)]
#[cfg_attr(any(target_os = "none", target_os = "uefi"), panic_handler)]
fn panic(_info: &::core::panic::PanicInfo<'_>) -> ! {
loop {}
}
#[cfg_attr(any(target_os = "none", target_os = "uefi"), export_name = "efi_main")]
fn main() {}
'';
} // extraArgs;
cargoArtifacts = craneLib.buildDepsOnly commonArgs;
in
{
package = craneLib.buildPackage (commonArgs // {
inherit cargoArtifacts;
});
clippy = craneLib.cargoClippy (commonArgs // {
inherit cargoArtifacts;
cargoClippyExtraArgs = "-- --deny warnings";
});
rustfmt = craneLib.cargoFmt (commonArgs // { inherit cargoArtifacts; });
}
);
stubCrane = buildRustApp {
pname = "lanzaboote-stub";
src = craneLib.cleanCargoSource ./rust/uefi;
target = rustTarget;
doCheck = false;
};
fatStubCrane = stubCrane.override {
extraArgs = {
cargoExtraArgs = "--no-default-features --features fat";
};
};
stub = stubCrane.package;
fatStub = fatStubCrane.package;
# TODO: when we will have more backends
# let's generalize this properly.
toolCrane = buildRustApp {
pname = "lzbt-systemd";
src = ./rust/tool;
extraArgs = {
TEST_SYSTEMD = pkgs.systemd;
nativeCheckInputs = with pkgs; [
binutils-unwrapped
sbsigntool
];
};
};
tool = toolCrane.package;
wrappedTool = pkgs.runCommand "lzbt"
{
nativeBuildInputs = [ pkgs.makeWrapper ];
} ''
mkdir -p $out/bin
# Clean PATH to only contain what we need to do objcopy. Also
# tell lanzatool where to find our UEFI binaries.
makeWrapper ${tool}/bin/lzbt-systemd $out/bin/lzbt \
--set PATH ${lib.makeBinPath [ pkgs.binutils-unwrapped pkgs.sbsigntool ]} \
--set LANZABOOTE_STUB ${stub}/bin/lanzaboote_stub.efi
'';
in
{
packages = {
inherit stub fatStub;
tool = wrappedTool;
lzbt = wrappedTool;
};
overlayAttrs = {
inherit (config.packages) tool;
};
2023-01-07 14:21:03 -05:00
checks =
let
nixosLib = import (pkgs.path + "/nixos/lib") { };
runTest = module: nixosLib.runTest {
imports = [ module ];
hostPkgs = pkgs;
};
in
{
toolClippy = toolCrane.clippy;
stubClippy = stubCrane.clippy;
fatStubClippy = fatStubCrane.clippy;
toolFmt = toolCrane.rustfmt;
stubFmt = stubCrane.rustfmt;
} // (import ./nix/tests/lanzaboote.nix {
inherit pkgs;
lanzabooteModule = self.nixosModules.lanzaboote;
}) // (import ./nix/tests/stub.nix {
inherit pkgs runTest;
ukiModule = self.nixosModules.uki;
});
pre-commit = {
check.enable = true;
2023-01-07 14:21:03 -05:00
settings.hooks = {
nixpkgs-fmt.enable = true;
2023-01-21 04:28:02 -05:00
typos.enable = true;
};
};
devShells.default = pkgs.mkShell {
2023-10-29 14:39:28 -04:00
shellHook = ''
${config.pre-commit.installationScript}
'';
packages = [
pkgs.nixpkgs-fmt
pkgs.statix
pkgs.cargo-release
pkgs.cargo-machete
2023-10-29 14:39:28 -04:00
# Convenience for test fixtures in nix/tests.
pkgs.openssl
(pkgs.sbctl.override { databasePath = "pki"; })
# Needed for `cargo test` in rust/tool. We also need
# TEST_SYSTEMD below for that.
pkgs.sbsigntool
];
inputsFrom = [
config.packages.stub
config.packages.tool
];
TEST_SYSTEMD = pkgs.systemd;
};
};
}));
2022-11-21 05:44:04 -05:00
}