260 lines
7.8 KiB
Nix
260 lines
7.8 KiB
Nix
{
|
|
description = "Secure Boot for NixOS";
|
|
|
|
inputs = {
|
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable-small";
|
|
|
|
flake-parts.url = "github:hercules-ci/flake-parts";
|
|
flake-parts.inputs.nixpkgs-lib.follows = "nixpkgs";
|
|
|
|
# Only used during development, can be disabled by flake users like this:
|
|
# lanzaboote.inputs.pre-commit-hooks-nix.follows = "";
|
|
pre-commit-hooks-nix = {
|
|
url = "github:cachix/pre-commit-hooks.nix";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
inputs.flake-utils.follows = "flake-utils";
|
|
inputs.flake-compat.follows = "flake-compat";
|
|
};
|
|
|
|
# We only have this input to pass it to other dependencies and
|
|
# avoid having multiple versions in our dependencies.
|
|
flake-utils.url = "github:numtide/flake-utils";
|
|
|
|
crane = {
|
|
url = "github:ipetkov/crane";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
|
|
rust-overlay = {
|
|
url = "github:oxalica/rust-overlay";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
inputs.flake-utils.follows = "flake-utils";
|
|
};
|
|
|
|
flake-compat = {
|
|
url = "github:edolstra/flake-compat";
|
|
flake = false;
|
|
};
|
|
};
|
|
|
|
outputs = inputs@{ self, nixpkgs, crane, rust-overlay, flake-parts, ... }:
|
|
flake-parts.lib.mkFlake { inherit inputs; } ({ moduleWithSystem, ... }: {
|
|
imports = [
|
|
# Derive the output overlay automatically from all packages that we define.
|
|
inputs.flake-parts.flakeModules.easyOverlay
|
|
|
|
# Formatting and quality checks.
|
|
] ++ (if inputs.pre-commit-hooks-nix ? flakeModule then [ inputs.pre-commit-hooks-nix.flakeModule ] else [ ]);
|
|
|
|
flake.nixosModules.lanzaboote = moduleWithSystem (
|
|
perSystem@{ config }:
|
|
{ ... }: {
|
|
imports = [
|
|
./nix/modules/lanzaboote.nix
|
|
];
|
|
|
|
boot.lanzaboote.package = perSystem.config.packages.tool;
|
|
}
|
|
);
|
|
|
|
flake.nixosModules.uki = moduleWithSystem (
|
|
perSystem@{ config }:
|
|
{ lib, ... }: {
|
|
imports = [
|
|
./nix/modules/uki.nix
|
|
];
|
|
|
|
boot.loader.uki.stub = lib.mkDefault "${perSystem.config.packages.fatStub}/bin/lanzaboote_stub.efi";
|
|
}
|
|
);
|
|
|
|
systems = [
|
|
"x86_64-linux"
|
|
|
|
# Not actively tested, but may work:
|
|
"aarch64-linux"
|
|
];
|
|
|
|
perSystem = { config, system, pkgs, ... }:
|
|
let
|
|
rustTarget = "${pkgs.stdenv.hostPlatform.qemuArch}-unknown-uefi";
|
|
pkgs = import nixpkgs {
|
|
system = system;
|
|
overlays = [
|
|
rust-overlay.overlays.default
|
|
];
|
|
};
|
|
|
|
inherit (pkgs) lib;
|
|
|
|
uefi-rust-stable = pkgs.rust-bin.fromRustupToolchainFile ./rust/uefi/rust-toolchain.toml;
|
|
craneLib = crane.lib.${system}.overrideToolchain uefi-rust-stable;
|
|
|
|
# Build attributes for a Rust application.
|
|
buildRustApp = lib.makeOverridable (
|
|
{ pname
|
|
, src
|
|
, target ? null
|
|
, doCheck ? true
|
|
, extraArgs ? { }
|
|
}:
|
|
let
|
|
commonArgs = {
|
|
inherit pname;
|
|
inherit src;
|
|
CARGO_BUILD_TARGET = target;
|
|
inherit doCheck;
|
|
|
|
# Workaround for https://github.com/ipetkov/crane/issues/262.
|
|
dummyrs = pkgs.writeText "dummy.rs" ''
|
|
#![allow(unused)]
|
|
|
|
#![cfg_attr(
|
|
any(target_os = "none", target_os = "uefi"),
|
|
no_std,
|
|
no_main,
|
|
)]
|
|
|
|
#[cfg_attr(any(target_os = "none", target_os = "uefi"), panic_handler)]
|
|
fn panic(_info: &::core::panic::PanicInfo<'_>) -> ! {
|
|
loop {}
|
|
}
|
|
|
|
#[cfg_attr(any(target_os = "none", target_os = "uefi"), export_name = "efi_main")]
|
|
fn main() {}
|
|
'';
|
|
} // extraArgs;
|
|
|
|
cargoArtifacts = craneLib.buildDepsOnly commonArgs;
|
|
in
|
|
{
|
|
package = craneLib.buildPackage (commonArgs // {
|
|
inherit cargoArtifacts;
|
|
});
|
|
|
|
clippy = craneLib.cargoClippy (commonArgs // {
|
|
inherit cargoArtifacts;
|
|
cargoClippyExtraArgs = "-- --deny warnings";
|
|
});
|
|
|
|
rustfmt = craneLib.cargoFmt (commonArgs // { inherit cargoArtifacts; });
|
|
}
|
|
);
|
|
|
|
stubCrane = buildRustApp {
|
|
pname = "lanzaboote-stub";
|
|
src = craneLib.cleanCargoSource ./rust/uefi;
|
|
target = rustTarget;
|
|
doCheck = false;
|
|
};
|
|
|
|
fatStubCrane = stubCrane.override {
|
|
extraArgs = {
|
|
cargoExtraArgs = "--no-default-features --features fat";
|
|
};
|
|
};
|
|
|
|
stub = stubCrane.package;
|
|
fatStub = fatStubCrane.package;
|
|
|
|
# TODO: when we will have more backends
|
|
# let's generalize this properly.
|
|
toolCrane = buildRustApp {
|
|
pname = "lzbt-systemd";
|
|
src = ./rust/tool;
|
|
extraArgs = {
|
|
TEST_SYSTEMD = pkgs.systemd;
|
|
nativeCheckInputs = with pkgs; [
|
|
binutils-unwrapped
|
|
sbsigntool
|
|
];
|
|
};
|
|
};
|
|
|
|
tool = toolCrane.package;
|
|
|
|
wrappedTool = pkgs.runCommand "lzbt"
|
|
{
|
|
nativeBuildInputs = [ pkgs.makeWrapper ];
|
|
} ''
|
|
mkdir -p $out/bin
|
|
|
|
# Clean PATH to only contain what we need to do objcopy. Also
|
|
# tell lanzatool where to find our UEFI binaries.
|
|
makeWrapper ${tool}/bin/lzbt-systemd $out/bin/lzbt \
|
|
--set PATH ${lib.makeBinPath [ pkgs.binutils-unwrapped pkgs.sbsigntool ]} \
|
|
--set LANZABOOTE_STUB ${stub}/bin/lanzaboote_stub.efi
|
|
'';
|
|
in
|
|
{
|
|
packages = {
|
|
inherit stub fatStub;
|
|
tool = wrappedTool;
|
|
lzbt = wrappedTool;
|
|
};
|
|
|
|
overlayAttrs = {
|
|
inherit (config.packages) tool;
|
|
};
|
|
|
|
checks =
|
|
let
|
|
nixosLib = import (pkgs.path + "/nixos/lib") { };
|
|
runTest = module: nixosLib.runTest {
|
|
imports = [ module ];
|
|
hostPkgs = pkgs;
|
|
};
|
|
in
|
|
{
|
|
toolClippy = toolCrane.clippy;
|
|
stubClippy = stubCrane.clippy;
|
|
fatStubClippy = fatStubCrane.clippy;
|
|
toolFmt = toolCrane.rustfmt;
|
|
stubFmt = stubCrane.rustfmt;
|
|
} // (import ./nix/tests/lanzaboote.nix {
|
|
inherit pkgs;
|
|
lanzabooteModule = self.nixosModules.lanzaboote;
|
|
}) // (import ./nix/tests/stub.nix {
|
|
inherit pkgs runTest;
|
|
ukiModule = self.nixosModules.uki;
|
|
});
|
|
|
|
devShells.default = pkgs.mkShell {
|
|
shellHook = ''
|
|
${config.pre-commit.installationScript}
|
|
'';
|
|
|
|
packages = [
|
|
pkgs.nixpkgs-fmt
|
|
pkgs.statix
|
|
pkgs.cargo-release
|
|
pkgs.cargo-machete
|
|
|
|
# Convenience for test fixtures in nix/tests.
|
|
pkgs.openssl
|
|
|
|
# Needed for `cargo test` in rust/tool. We also need
|
|
# TEST_SYSTEMD below for that.
|
|
pkgs.sbsigntool
|
|
];
|
|
|
|
inputsFrom = [
|
|
config.packages.stub
|
|
config.packages.tool
|
|
];
|
|
|
|
TEST_SYSTEMD = pkgs.systemd;
|
|
};
|
|
} // lib.optionalAttrs (inputs.pre-commit-hooks-nix ? flakeModule) {
|
|
pre-commit = {
|
|
check.enable = true;
|
|
|
|
settings.hooks = {
|
|
nixpkgs-fmt.enable = true;
|
|
typos.enable = true;
|
|
};
|
|
};
|
|
};
|
|
});
|
|
}
|