Merge pull request #109 from nix-community/correctly-update-initrd-secrets
tool: correctly update initrd secrets
This commit is contained in:
commit
ed1676e544
|
@ -145,6 +145,52 @@ in
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# Test that the secrets configured to be appended to the initrd get updated
|
||||||
|
# when installing a new generation even if the initrd itself (i.e. its store
|
||||||
|
# path) does not change.
|
||||||
|
#
|
||||||
|
# An unfortunate result of this NixOS feature is that updating the secrets
|
||||||
|
# without creating a new initrd might break previous generations. Lanzaboote
|
||||||
|
# has no control over that.
|
||||||
|
#
|
||||||
|
# This tests uses a specialisation to imitate a newer generation. This works
|
||||||
|
# because `lzbt` installs the specialisation of a generation AFTER installing
|
||||||
|
# the generation itself (thus making the specialisation "newer").
|
||||||
|
initrd-secrets-update =
|
||||||
|
let
|
||||||
|
originalSecret = (pkgs.writeText "oh-so-secure" "uhh-ooh-uhh-security");
|
||||||
|
newSecret = (pkgs.writeText "newly-secure" "so-much-better-now");
|
||||||
|
in
|
||||||
|
mkSecureBootTest {
|
||||||
|
name = "lanzaboote-initrd-secrets-update";
|
||||||
|
machine = { pkgs, lib, ... }: {
|
||||||
|
boot.initrd.secrets = {
|
||||||
|
"/test" = lib.mkDefault originalSecret;
|
||||||
|
};
|
||||||
|
boot.initrd.postMountCommands = ''
|
||||||
|
cp /test /mnt-root/secret-from-initramfs
|
||||||
|
'';
|
||||||
|
|
||||||
|
specialisation.variant.configuration = {
|
||||||
|
boot.initrd.secrets = {
|
||||||
|
"/test" = newSecret;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
testScript = ''
|
||||||
|
machine.start()
|
||||||
|
machine.wait_for_unit("multi-user.target")
|
||||||
|
|
||||||
|
# Assert that only two boot files exists (a single kernel and a single
|
||||||
|
# initrd). If there are two initrds, the test would not be able to test
|
||||||
|
# updating the secret of an already existing initrd.
|
||||||
|
assert int(machine.succeed("ls -1 /boot/EFI/nixos | wc -l")) == 2
|
||||||
|
|
||||||
|
# It is expected that the initrd contains the new secret.
|
||||||
|
machine.succeed("cmp ${newSecret} /secret-from-initramfs")
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
modified-initrd-doesnt-boot-with-secure-boot = mkModifiedInitrdTest {
|
modified-initrd-doesnt-boot-with-secure-boot = mkModifiedInitrdTest {
|
||||||
name = "modified-initrd-doesnt-boot-with-secure-boot";
|
name = "modified-initrd-doesnt-boot-with-secure-boot";
|
||||||
useSecureBoot = true;
|
useSecureBoot = true;
|
||||||
|
|
|
@ -61,16 +61,22 @@ impl Installer {
|
||||||
.map(GenerationLink::from_path)
|
.map(GenerationLink::from_path)
|
||||||
.collect::<Result<Vec<GenerationLink>>>()?;
|
.collect::<Result<Vec<GenerationLink>>>()?;
|
||||||
|
|
||||||
// A configuration limit of 0 means there is no limit.
|
// Sort the links by version. The links need to always be sorted to ensure the secrets of
|
||||||
if self.configuration_limit > 0 {
|
// the latest generation are appended to the initrd when multiple generations point to the
|
||||||
// Sort the links by version.
|
// same initrd.
|
||||||
links.sort_by_key(|l| l.version);
|
links.sort_by_key(|l| l.version);
|
||||||
|
|
||||||
// Only install the number of generations configured.
|
// A configuration limit of 0 means there is no limit.
|
||||||
|
if self.configuration_limit > 0 {
|
||||||
|
// Only install the number of generations configured. Reverse the list to only take the
|
||||||
|
// latest generations and then, after taking them, reverse the list again so that the
|
||||||
|
// generations are installed from oldest to newest, i.e. from smallest to largest
|
||||||
|
// generation version.
|
||||||
links = links
|
links = links
|
||||||
.into_iter()
|
.into_iter()
|
||||||
.rev()
|
.rev()
|
||||||
.take(self.configuration_limit)
|
.take(self.configuration_limit)
|
||||||
|
.rev()
|
||||||
.collect()
|
.collect()
|
||||||
};
|
};
|
||||||
self.install_generations_from_links(&links)?;
|
self.install_generations_from_links(&links)?;
|
||||||
|
|
Loading…
Reference in New Issue