-
-
Notifications
You must be signed in to change notification settings - Fork 14.6k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
pkgs/unl0kr: superseded by pkgs.buffybox
nixos/unl0kr: accomodate for the future
- Loading branch information
1 parent
3de5332
commit eb8db83
Showing
4 changed files
with
122 additions
and
186 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,75 +1,109 @@ | ||
import ./make-test-python.nix ({ lib, pkgs, ... }: let | ||
passphrase = "secret"; | ||
in { | ||
name = "systemd-initrd-luks-unl0kr"; | ||
meta = { | ||
maintainers = []; | ||
}; | ||
import ./make-test-python.nix ( | ||
{ lib, pkgs, ... }: | ||
let | ||
passphrase = "secret"; | ||
|
||
enableOCR = true; | ||
debugPackages = with pkgs; [ | ||
coreutils-prefixed | ||
toybox | ||
|
||
nodes.machine = { pkgs, ... }: { | ||
virtualisation = { | ||
emptyDiskImages = [ 512 512 ]; | ||
useBootLoader = true; | ||
mountHostNixStore = true; | ||
useEFIBoot = true; | ||
qemu.options = [ | ||
"-vga virtio" | ||
]; | ||
micro | ||
nano | ||
]; | ||
in | ||
{ | ||
name = "systemd-initrd-luks-unl0kr"; # How to run an interactive test: `nix run .#nixosTests.systemd-initrd-luks-unl0kr.driverInteractive' | ||
meta = { | ||
maintainers = [ ]; | ||
}; | ||
boot.loader.systemd-boot.enable = true; | ||
|
||
boot.initrd.availableKernelModules = [ | ||
"evdev" # for entering pw | ||
"bochs" | ||
]; | ||
enableOCR = true; | ||
|
||
environment.systemPackages = with pkgs; [ cryptsetup ]; | ||
boot.initrd = { | ||
systemd = { | ||
enable = true; | ||
emergencyAccess = true; | ||
}; | ||
unl0kr.enable = true; | ||
}; | ||
nodes.machine = | ||
{ pkgs, ... }: | ||
{ | ||
virtualisation = { | ||
emptyDiskImages = [ | ||
512 | ||
512 | ||
]; | ||
useBootLoader = true; | ||
mountHostNixStore = true; | ||
useEFIBoot = true; | ||
qemu.options = [ | ||
"-vga virtio" | ||
]; | ||
}; | ||
boot.loader.systemd-boot.enable = true; | ||
|
||
boot.initrd.availableKernelModules = [ | ||
"bochs" # for debugging | ||
]; | ||
|
||
specialisation.boot-luks.configuration = { | ||
boot.initrd.luks.devices = lib.mkVMOverride { | ||
# We have two disks and only type one password - key reuse is in place | ||
cryptroot.device = "/dev/vdb"; | ||
cryptroot2.device = "/dev/vdc"; | ||
boot.kernelParams = [ | ||
"rd.systemd.debug_shell" | ||
]; | ||
|
||
environment.systemPackages = | ||
with pkgs; | ||
[ | ||
cryptsetup | ||
] | ||
++ debugPackages; | ||
boot.initrd = { | ||
systemd = { | ||
enable = true; | ||
emergencyAccess = true; | ||
|
||
storePaths = debugPackages; | ||
}; | ||
unl0kr = { | ||
enable = true; | ||
|
||
settings = { | ||
general.backend = "drm"; | ||
theme.default = "pmos-light"; # Improves contrast quite a bit, helpful for OCR. | ||
}; | ||
}; | ||
}; | ||
|
||
specialisation.boot-luks.configuration = { | ||
boot.initrd.luks.devices = lib.mkVMOverride { | ||
# We have two disks and only type one password - key reuse is in place | ||
cryptroot.device = "/dev/vdb"; | ||
cryptroot2.device = "/dev/vdc"; | ||
}; | ||
virtualisation.rootDevice = "/dev/mapper/cryptroot"; | ||
virtualisation.fileSystems."/".autoFormat = true; | ||
# test mounting device unlocked in initrd after switching root | ||
virtualisation.fileSystems."/cryptroot2".device = "/dev/mapper/cryptroot2"; | ||
}; | ||
}; | ||
virtualisation.rootDevice = "/dev/mapper/cryptroot"; | ||
virtualisation.fileSystems."/".autoFormat = true; | ||
# test mounting device unlocked in initrd after switching root | ||
virtualisation.fileSystems."/cryptroot2".device = "/dev/mapper/cryptroot2"; | ||
}; | ||
}; | ||
|
||
testScript = '' | ||
# Create encrypted volume | ||
machine.wait_for_unit("multi-user.target") | ||
machine.succeed("echo -n ${passphrase} | cryptsetup luksFormat -q --iter-time=1 /dev/vdb -") | ||
machine.succeed("echo -n ${passphrase} | cryptsetup luksFormat -q --iter-time=1 /dev/vdc -") | ||
machine.succeed("echo -n ${passphrase} | cryptsetup luksOpen -q /dev/vdc cryptroot2") | ||
machine.succeed("mkfs.ext4 /dev/mapper/cryptroot2") | ||
testScript = '' | ||
# Create encrypted volume | ||
machine.wait_for_unit("multi-user.target") | ||
machine.succeed("echo -n ${passphrase} | cryptsetup luksFormat -q --iter-time=1 /dev/vdb -") | ||
machine.succeed("echo -n ${passphrase} | cryptsetup luksFormat -q --iter-time=1 /dev/vdc -") | ||
machine.succeed("echo -n ${passphrase} | cryptsetup luksOpen -q /dev/vdc cryptroot2") | ||
machine.succeed("mkfs.ext4 /dev/mapper/cryptroot2") | ||
# Boot from the encrypted disk | ||
machine.succeed("bootctl set-default nixos-generation-1-specialisation-boot-luks.conf") | ||
machine.succeed("sync") | ||
machine.crash() | ||
# Boot from the encrypted disk | ||
machine.succeed("bootctl set-default nixos-generation-1-specialisation-boot-luks.conf") | ||
machine.succeed("sync") | ||
machine.crash() | ||
# Boot and decrypt the disk | ||
machine.start() | ||
machine.wait_for_text("Password required for booting") | ||
machine.screenshot("prompt") | ||
machine.send_chars("${passphrase}") | ||
machine.screenshot("pw") | ||
machine.send_chars("\n") | ||
machine.wait_for_unit("multi-user.target") | ||
# Boot and decrypt the disk. This part of the test is SLOW. | ||
machine.start() | ||
machine.wait_for_text("password") # Come on! | ||
machine.screenshot("prompt") | ||
machine.send_chars("${passphrase}") | ||
machine.screenshot("pw") | ||
machine.send_chars("\n") | ||
machine.wait_for_unit("multi-user.target") | ||
assert "/dev/mapper/cryptroot on / type ext4" in machine.succeed("mount"), "/dev/mapper/cryptroot do not appear in mountpoints list" | ||
assert "/dev/mapper/cryptroot2 on /cryptroot2 type ext4" in machine.succeed("mount") | ||
''; | ||
}) | ||
assert "/dev/mapper/cryptroot on / type ext4" in machine.succeed("mount"), "/dev/mapper/cryptroot do not appear in mountpoints list" | ||
assert "/dev/mapper/cryptroot2 on /cryptroot2 type ext4" in machine.succeed("mount") | ||
''; | ||
} | ||
) |
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters