Compare commits
No commits in common. "4cc0add2ad0cbfebbf5dd36fd30c712681fae907" and "635590d37a31584557785c7471dfce3bf248db2e" have entirely different histories.
4cc0add2ad
...
635590d37a
@ -102,12 +102,6 @@ in {
|
|||||||
systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ];
|
systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ];
|
||||||
|
|
||||||
virtualisation = {
|
virtualisation = {
|
||||||
forwardPorts = [ {
|
|
||||||
from = "host";
|
|
||||||
host.port = 7654;
|
|
||||||
# guest.address = "10.0.2.15";
|
|
||||||
guest.port =7654;
|
|
||||||
} ];
|
|
||||||
qemu = {
|
qemu = {
|
||||||
networkingOptions = [ ];
|
networkingOptions = [ ];
|
||||||
options =
|
options =
|
||||||
@ -130,12 +124,6 @@ in {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.tang = {
|
|
||||||
enable = true;
|
|
||||||
ipAddressAllow = [ "10.0.0.0/24" "0.0.0.0/0" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
environment.systemPackages =
|
environment.systemPackages =
|
||||||
let wireshark-nogui = pkgs.wireshark.override { withQt = false ; };
|
let wireshark-nogui = pkgs.wireshark.override { withQt = false ; };
|
||||||
in with pkgs; [
|
in with pkgs; [
|
||||||
@ -146,7 +134,6 @@ in {
|
|||||||
iptables
|
iptables
|
||||||
usbutils
|
usbutils
|
||||||
busybox
|
busybox
|
||||||
clevis
|
|
||||||
];
|
];
|
||||||
security.sudo.wheelNeedsPassword = false;
|
security.sudo.wheelNeedsPassword = false;
|
||||||
networking = {
|
networking = {
|
||||||
|
@ -97,7 +97,7 @@ time. For example:
|
|||||||
Logs
|
Logs
|
||||||
====
|
====
|
||||||
|
|
||||||
Logs for all services are collated into :file:`/run/log/current`.
|
Logs for all services are collated into :file:`/run/uncaught-logs/current`.
|
||||||
The log file is rotated when it reaches a threshold size, into another
|
The log file is rotated when it reaches a threshold size, into another
|
||||||
file in the same directory whose name contains a TAI64 timestamp.
|
file in the same directory whose name contains a TAI64 timestamp.
|
||||||
|
|
||||||
@ -108,7 +108,7 @@ human-readable format, use :command:`s6-tai64nlocal`.
|
|||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
# ls -l /run/log/
|
# ls -l /run/uncaught-logs/
|
||||||
-rw-r--r-- 1 0 lock
|
-rw-r--r-- 1 0 lock
|
||||||
-rw-r--r-- 1 0 state
|
-rw-r--r-- 1 0 state
|
||||||
-rwxr--r-- 1 98059 @4000000000025cb629c311ac.s
|
-rwxr--r-- 1 98059 @4000000000025cb629c311ac.s
|
||||||
@ -122,10 +122,10 @@ human-readable format, use :command:`s6-tai64nlocal`.
|
|||||||
-rwxr--r-- 1 98023 @4000000000027e6f0ed24a6c.s
|
-rwxr--r-- 1 98023 @4000000000027e6f0ed24a6c.s
|
||||||
-rw-r--r-- 1 42374 current
|
-rw-r--r-- 1 42374 current
|
||||||
|
|
||||||
# tail -2 /run/log/current
|
# tail -2 /run/uncaught-logs/current
|
||||||
@40000000000284f130747343 wan.link.pppoe Connect: ppp0 <--> /dev/pts/0
|
@40000000000284f130747343 wan.link.pppoe Connect: ppp0 <--> /dev/pts/0
|
||||||
@40000000000284f230acc669 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accomp>]
|
@40000000000284f230acc669 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accomp>]
|
||||||
# tail -2 /run/log/current | s6-tai64nlocal
|
# tail -2 /run/uncaught-logs/current | s6-tai64nlocal
|
||||||
1970-01-02 21:51:45.828598156 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accom
|
1970-01-02 21:51:45.828598156 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accom
|
||||||
p>]
|
p>]
|
||||||
1970-01-02 21:51:48.832588765 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accom
|
1970-01-02 21:51:48.832588765 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accom
|
||||||
|
@ -71,7 +71,7 @@ stdin/stdout.
|
|||||||
You should now see Linux boot messages and after a few seconds be
|
You should now see Linux boot messages and after a few seconds be
|
||||||
presented with a root shell prompt. You can run commands to look at
|
presented with a root shell prompt. You can run commands to look at
|
||||||
the filesystem, see what processes are running, view log messages (in
|
the filesystem, see what processes are running, view log messages (in
|
||||||
:file:/run/log/current), etc. To kill the emulator, press ^P
|
:file:/run/uncaught-logs.current), etc. To kill the emulator, press ^P
|
||||||
(Control P) then c to enter the "QEMU Monitor", then type ``quit`` at
|
(Control P) then c to enter the "QEMU Monitor", then type ``quit`` at
|
||||||
the ``(qemu)`` prompt.
|
the ``(qemu)`` prompt.
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ let
|
|||||||
stdenvNoCC;
|
stdenvNoCC;
|
||||||
inherit (lib.lists) unique concatMap;
|
inherit (lib.lists) unique concatMap;
|
||||||
inherit (pkgs.pseudofile) dir symlink;
|
inherit (pkgs.pseudofile) dir symlink;
|
||||||
inherit (pkgs.liminix.services) oneshot bundle longrun;
|
inherit (pkgs.liminix.services) oneshot bundle;
|
||||||
inherit (lib) mkIf mkEnableOption mkOption types;
|
inherit (lib) mkIf mkEnableOption mkOption types;
|
||||||
cfg = config.logging;
|
cfg = config.logging;
|
||||||
s6-rc-db =
|
s6-rc-db =
|
||||||
@ -237,28 +237,9 @@ in {
|
|||||||
};
|
};
|
||||||
imports = [
|
imports = [
|
||||||
( {config, pkgs, lib, ...}:
|
( {config, pkgs, lib, ...}:
|
||||||
let
|
let cfg = config.logging;
|
||||||
cfg = config.logging;
|
|
||||||
pipeline = shipper: bundle {
|
|
||||||
name = "log-shipping-pipe";
|
|
||||||
contents = let
|
|
||||||
eat = longrun {
|
|
||||||
name = "log-shipping-pipe-eat";
|
|
||||||
run = ''
|
|
||||||
fdmove -c 12 1 \
|
|
||||||
${pkgs.s6}/bin/s6-ipcserver ${cfg.shipping.socket} \
|
|
||||||
fdmove -c 1 12 \
|
|
||||||
cat
|
|
||||||
'';
|
|
||||||
producer-for = spew.name;
|
|
||||||
};
|
|
||||||
spew = shipper.override {
|
|
||||||
consumer-for ="log-shipping-pipe-eat";
|
|
||||||
};
|
|
||||||
in [ eat spew ];
|
|
||||||
};
|
|
||||||
in mkIf cfg.shipping.enable {
|
in mkIf cfg.shipping.enable {
|
||||||
services.${cfg.shipping.service.name} = pipeline cfg.shipping.service;
|
services.${cfg.shipping.service.name} = cfg.shipping.service;
|
||||||
}
|
}
|
||||||
)];
|
)];
|
||||||
|
|
||||||
|
@ -1,21 +0,0 @@
|
|||||||
{ liminix, certifix-client, svc, lib, writeText, serviceFns }:
|
|
||||||
{
|
|
||||||
caCertificate,
|
|
||||||
secret,
|
|
||||||
subject,
|
|
||||||
serviceUrl
|
|
||||||
}:
|
|
||||||
let
|
|
||||||
inherit (builtins) filter isString split;
|
|
||||||
inherit (liminix.services) oneshot;
|
|
||||||
name = "certifix-${lib.strings.sanitizeDerivationName subject}";
|
|
||||||
caCertFile = writeText "ca.crt" caCertificate;
|
|
||||||
secretFile = writeText "secret" secret;
|
|
||||||
in oneshot {
|
|
||||||
inherit name;
|
|
||||||
up = ''
|
|
||||||
(in_outputs ${name}
|
|
||||||
SSL_CA_CERT_FILE=${caCertFile} ${certifix-client}/bin/certifix-client --subject ${subject} --secret ${secretFile} --key-out key --certificate-out cert ${serviceUrl}
|
|
||||||
)
|
|
||||||
'';
|
|
||||||
}
|
|
@ -1,40 +0,0 @@
|
|||||||
|
|
||||||
{ lib, pkgs, config, ...}:
|
|
||||||
let
|
|
||||||
inherit (lib) mkOption types;
|
|
||||||
inherit (pkgs) liminix;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options = {
|
|
||||||
system.service.tls-certificate = {
|
|
||||||
certifix-client = mkOption {
|
|
||||||
type = liminix.lib.types.serviceDefn;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
config.system.service.tls-certificate.certifix-client =
|
|
||||||
config.system.callService ./certifix-client.nix {
|
|
||||||
# this is probably read from files on the build machine,
|
|
||||||
# but are not named with ...File suffix because they are
|
|
||||||
# not files on the device (they get embedded into the store)
|
|
||||||
caCertificate = mkOption {
|
|
||||||
description = "CA certificate in PEM format. This must be the same CA as that which signed the certificate of the Certifix server";
|
|
||||||
type = types.str;
|
|
||||||
};
|
|
||||||
secret = mkOption {
|
|
||||||
description = "The shared secret to embed in signing request. This must match the secret configured in the Certifix service, otherwise it will refuse to sign the CSR.";
|
|
||||||
type = types.str;
|
|
||||||
};
|
|
||||||
subject = mkOption {
|
|
||||||
description = "Subject of the certificate request, as an X509 DN. The CN ('Common Name') you provide here is also used as the value of the SubjectAlternativeName extension.";
|
|
||||||
type = types.str;
|
|
||||||
example = "C=GB,ST=London,O=Liminix,OU=IT,CN=myhostname";
|
|
||||||
};
|
|
||||||
serviceUrl = mkOption {
|
|
||||||
description = "Certifix server endpoint URL";
|
|
||||||
type = types.str;
|
|
||||||
example = "https://certifix.lan:19613/sign";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
}
|
|
36
overlay.nix
36
overlay.nix
@ -6,22 +6,19 @@ let
|
|||||||
inherit (final) lib callPackage;
|
inherit (final) lib callPackage;
|
||||||
};
|
};
|
||||||
inherit (final) fetchpatch;
|
inherit (final) fetchpatch;
|
||||||
luaHost =
|
luaHost = prev.lua5_3.overrideAttrs(o: {
|
||||||
let
|
name = "lua-tty";
|
||||||
l = prev.lua5_3.overrideAttrs(o: {
|
preBuild = ''
|
||||||
name = "lua-tty";
|
makeFlagsArray+=(PLAT="posix" SYSLIBS="-Wl,-E -ldl" CFLAGS="-O2 -fPIC -DLUA_USE_POSIX -DLUA_USE_DLOPEN")
|
||||||
preBuild = ''
|
|
||||||
makeFlagsArray+=(PLAT="posix" SYSLIBS="-Wl,-E -ldl" CFLAGS="-O2 -fPIC -DLUA_USE_POSIX -DLUA_USE_DLOPEN")
|
|
||||||
'';
|
'';
|
||||||
# lua in nixpkgs has a postInstall stanza that assumes only
|
# lua in nixpkgs has a postInstall stanza that assumes only
|
||||||
# one output, we need to override that if we're going to
|
# one output, we need to override that if we're going to
|
||||||
# convert to multi-output
|
# convert to multi-output
|
||||||
# outputs = ["bin" "man" "out"];
|
# outputs = ["bin" "man" "out"];
|
||||||
makeFlags =
|
makeFlags =
|
||||||
builtins.filter (x: (builtins.match "(PLAT|MYLIBS).*" x) == null)
|
builtins.filter (x: (builtins.match "(PLAT|MYLIBS).*" x) == null)
|
||||||
o.makeFlags;
|
o.makeFlags;
|
||||||
});
|
});
|
||||||
in l.override { self = l; };
|
|
||||||
|
|
||||||
s6 = prev.s6.overrideAttrs(o:
|
s6 = prev.s6.overrideAttrs(o:
|
||||||
let
|
let
|
||||||
@ -208,15 +205,6 @@ extraPkgs // {
|
|||||||
|
|
||||||
lua = crossOnly prev.lua5_3 (_: luaHost);
|
lua = crossOnly prev.lua5_3 (_: luaHost);
|
||||||
|
|
||||||
luaossl' = luaHost.pkgs.luaossl.overrideAttrs(o: {
|
|
||||||
patches = [
|
|
||||||
(fetchpatch {
|
|
||||||
url = "https://patch-diff.githubusercontent.com/raw/wahern/luaossl/pull/218.patch";
|
|
||||||
hash = "sha256-2GOliY4/RUzOgx3rqee3X3szCdUVxYDut7d+XFcUTJw=";
|
|
||||||
})
|
|
||||||
] ++ final.lib.optionals (o ? patches) o.patches;
|
|
||||||
});
|
|
||||||
|
|
||||||
mtdutils = prev.mtdutils.overrideAttrs(o: {
|
mtdutils = prev.mtdutils.overrideAttrs(o: {
|
||||||
patches = (if o ? patches then o.patches else []) ++ [
|
patches = (if o ? patches then o.patches else []) ++ [
|
||||||
./pkgs/mtdutils/0001-mkfs.jffs2-add-graft-option.patch
|
./pkgs/mtdutils/0001-mkfs.jffs2-add-graft-option.patch
|
||||||
|
@ -1,89 +0,0 @@
|
|||||||
(local { : view } (require :fennel))
|
|
||||||
(local { : assoc : split } (require :anoia))
|
|
||||||
|
|
||||||
(local ctx (require :openssl.ssl.context))
|
|
||||||
(local csr (require :openssl.x509.csr))
|
|
||||||
(local altname (require :openssl.x509.altname))
|
|
||||||
(local pkey (require :openssl.pkey))
|
|
||||||
(local xn (require :openssl.x509.name))
|
|
||||||
|
|
||||||
(local http (require :fetch))
|
|
||||||
|
|
||||||
(macro ncall [f]
|
|
||||||
`(case ,f
|
|
||||||
ok# ok#
|
|
||||||
(nil err#) (error err#)))
|
|
||||||
|
|
||||||
|
|
||||||
(fn x509-name [subj]
|
|
||||||
(let [n (xn.new)]
|
|
||||||
(each [_ c (ipairs (split "," subj))]
|
|
||||||
(let [(k v) (string.match c "(.-)=(.+)")]
|
|
||||||
(n:add k v)))
|
|
||||||
n))
|
|
||||||
|
|
||||||
(fn x509-altname [subj]
|
|
||||||
(let [an (altname.new)]
|
|
||||||
(each [_ c (ipairs (split "," subj))]
|
|
||||||
(let [(k v) (string.match c "(.-)=(.+)")]
|
|
||||||
(if (= k "CN") (an:add "DNS" v))))
|
|
||||||
an))
|
|
||||||
|
|
||||||
(fn parse-args [args]
|
|
||||||
(case args
|
|
||||||
["--secret" secret & rest]
|
|
||||||
(assoc (parse-args rest)
|
|
||||||
:secret (with-open [f (ncall (io.open secret :r))] (f:read "l")))
|
|
||||||
|
|
||||||
["--subject" subject & rest]
|
|
||||||
(assoc (parse-args rest) :subject subject)
|
|
||||||
|
|
||||||
["--key-out" pathname & rest]
|
|
||||||
(assoc (parse-args rest) :key-out pathname)
|
|
||||||
|
|
||||||
["--certificate-out" pathname & rest]
|
|
||||||
(assoc (parse-args rest) :certificate-out pathname)
|
|
||||||
|
|
||||||
[server] { : server }
|
|
||||||
_ {}))
|
|
||||||
|
|
||||||
|
|
||||||
(local options (parse-args arg))
|
|
||||||
|
|
||||||
(fn private-key []
|
|
||||||
(pkey.new { :type :rsa :bits 1024 }))
|
|
||||||
|
|
||||||
(fn signing-request [pk]
|
|
||||||
(doto (csr.new)
|
|
||||||
(: :setVersion 3)
|
|
||||||
(: :setSubject (x509-name options.subject))
|
|
||||||
(: :setSubjectAlt (x509-altname options.subject))
|
|
||||||
(: :setPublicKey pk)
|
|
||||||
(: :addAttribute :challengePassword [options.secret])
|
|
||||||
(: :sign pk)))
|
|
||||||
|
|
||||||
|
|
||||||
(fn http-post [url body]
|
|
||||||
(match
|
|
||||||
(http.request "POST" url
|
|
||||||
"" 0
|
|
||||||
"application/x-pem-file"
|
|
||||||
body)
|
|
||||||
s s
|
|
||||||
(nil code msg) (error (.. "Error " code " POST " url ": " msg))))
|
|
||||||
|
|
||||||
|
|
||||||
(fn run []
|
|
||||||
(let [pk (private-key)
|
|
||||||
csr (signing-request pk)
|
|
||||||
;; key-out (or options.key-out-handle io.stdout)
|
|
||||||
;; cert-out (or options.cert-out-handle io.stdout)
|
|
||||||
cert (http-post options.server (csr:toPEM))]
|
|
||||||
(with-open [f (ncall (io.open options.key-out :w))]
|
|
||||||
(f:write (pk:toPEM :private)))
|
|
||||||
(with-open [f (ncall (io.open options.certificate-out :w))]
|
|
||||||
(f:write cert))
|
|
||||||
(print "done")))
|
|
||||||
|
|
||||||
|
|
||||||
{ : run }
|
|
@ -1,36 +0,0 @@
|
|||||||
{
|
|
||||||
fetchurl,
|
|
||||||
writeFennel,
|
|
||||||
fennel,
|
|
||||||
fennelrepl,
|
|
||||||
runCommand,
|
|
||||||
lua,
|
|
||||||
anoia,
|
|
||||||
lualinux,
|
|
||||||
fetch-freebsd,
|
|
||||||
openssl,
|
|
||||||
luaossl',
|
|
||||||
stdenv
|
|
||||||
}:
|
|
||||||
let name = "certifix-client";
|
|
||||||
in stdenv.mkDerivation {
|
|
||||||
inherit name;
|
|
||||||
src = ./.;
|
|
||||||
|
|
||||||
buildInputs = [fetch-freebsd openssl lua];
|
|
||||||
|
|
||||||
buildPhase = "";
|
|
||||||
installPhase = ''
|
|
||||||
mkdir -p $out/bin
|
|
||||||
cp -p ${writeFennel name {
|
|
||||||
packages = [
|
|
||||||
fetch-freebsd
|
|
||||||
fennel
|
|
||||||
anoia
|
|
||||||
lualinux
|
|
||||||
luaossl'
|
|
||||||
] ;
|
|
||||||
mainFunction = "run";
|
|
||||||
} ./${name}.fnl } $out/bin/${name}
|
|
||||||
'';
|
|
||||||
}
|
|
@ -1,9 +0,0 @@
|
|||||||
(local { : view } (require :fennel))
|
|
||||||
(local ctx (require openssl.ssl.ctx))
|
|
||||||
|
|
||||||
(fn run []
|
|
||||||
(print "hey"))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
{ : run }
|
|
@ -60,7 +60,6 @@ in {
|
|||||||
# please keep the rest of this list alphabetised :-)
|
# please keep the rest of this list alphabetised :-)
|
||||||
|
|
||||||
anoia = callPackage ./anoia { };
|
anoia = callPackage ./anoia { };
|
||||||
certifix-client = callPackage ./certifix-client { };
|
|
||||||
devout = callPackage ./devout { };
|
devout = callPackage ./devout { };
|
||||||
fetch-freebsd = callPackage ./fetch-freebsd { };
|
fetch-freebsd = callPackage ./fetch-freebsd { };
|
||||||
fennel = callPackage ./fennel { };
|
fennel = callPackage ./fennel { };
|
||||||
|
@ -53,7 +53,6 @@ let
|
|||||||
, run
|
, run
|
||||||
, notification-fd ? null
|
, notification-fd ? null
|
||||||
, buildInputs ? []
|
, buildInputs ? []
|
||||||
, producer-for ? null
|
|
||||||
, ...
|
, ...
|
||||||
} @ args:
|
} @ args:
|
||||||
let logger = service {
|
let logger = service {
|
||||||
@ -65,11 +64,11 @@ let
|
|||||||
pipeline-name = "${name}-pipeline";
|
pipeline-name = "${name}-pipeline";
|
||||||
};
|
};
|
||||||
in service (args // {
|
in service (args // {
|
||||||
buildInputs = buildInputs ++ lib.optional (producer-for == null) logger;
|
buildInputs = buildInputs ++ [ logger ];
|
||||||
serviceType = "longrun";
|
serviceType = "longrun";
|
||||||
run = serviceScript run;
|
run = serviceScript run;
|
||||||
finish = cleanupScript name;
|
finish = cleanupScript name;
|
||||||
producer-for = if producer-for != null then producer-for else "${name}-log";
|
producer-for = "${name}-log";
|
||||||
});
|
});
|
||||||
|
|
||||||
oneshot = {
|
oneshot = {
|
||||||
@ -93,6 +92,5 @@ let
|
|||||||
});
|
});
|
||||||
target = bundle;
|
target = bundle;
|
||||||
in {
|
in {
|
||||||
inherit target bundle oneshot output;
|
inherit target bundle oneshot longrun output;
|
||||||
longrun = lib.makeOverridable longrun;
|
|
||||||
}
|
}
|
||||||
|
@ -14,7 +14,7 @@ expect {
|
|||||||
}
|
}
|
||||||
expect "#"
|
expect "#"
|
||||||
while { $FINISHED < 10 } {
|
while { $FINISHED < 10 } {
|
||||||
send "date && grep AP-ENABLED /run/log/* || echo \$NOT\r\n"
|
send "date && grep AP-ENABLED /run/uncaught-logs/* || echo \$NOT\r\n"
|
||||||
|
|
||||||
expect {
|
expect {
|
||||||
"wlan0: AP-ENABLED" { set FINISHED 999; set EXIT 0; }
|
"wlan0: AP-ENABLED" { set FINISHED 999; set EXIT 0; }
|
||||||
@ -24,7 +24,7 @@ while { $FINISHED < 10 } {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if { $EXIT > 0 } {
|
if { $EXIT > 0 } {
|
||||||
send "tail -40 /run/log/current\r\n"
|
send "tail -40 /run/uncaught-logs/current\r\n"
|
||||||
expect "#"
|
expect "#"
|
||||||
}
|
}
|
||||||
exit $EXIT
|
exit $EXIT
|
||||||
|
Loading…
Reference in New Issue
Block a user