mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-22 23:13:19 +00:00
614b83a328
This option has been introduced in 678eed323f
without realizing there was this
PR inflight, unfortunately, it collide with what this PR does and make
it irrelevant.
Therefore, I remove it here.
58 lines
1.6 KiB
Nix
58 lines
1.6 KiB
Nix
{ system ? builtins.currentSystem
|
|
, config ? {}
|
|
, pkgs ? import ../.. { inherit system config; }
|
|
, lib ? pkgs.lib
|
|
, testing ? import ../lib/testing-python.nix { inherit system pkgs; }
|
|
}:
|
|
|
|
let
|
|
secret1InStore = pkgs.writeText "topsecret" "iamasecret1";
|
|
secret2InStore = pkgs.writeText "topsecret" "iamasecret2";
|
|
in
|
|
|
|
testing.makeTest {
|
|
name = "initrd-secrets-changing";
|
|
|
|
nodes.machine = { ... }: {
|
|
virtualisation.useBootLoader = true;
|
|
|
|
boot.loader.grub.device = "/dev/vda";
|
|
|
|
boot.initrd.secrets = {
|
|
"/test" = secret1InStore;
|
|
"/run/keys/test" = secret1InStore;
|
|
};
|
|
boot.initrd.postMountCommands = "cp /test /mnt-root/secret-from-initramfs";
|
|
|
|
specialisation.secrets2System.configuration = {
|
|
boot.initrd.secrets = lib.mkForce {
|
|
"/test" = secret2InStore;
|
|
"/run/keys/test" = secret2InStore;
|
|
};
|
|
};
|
|
};
|
|
|
|
testScript = ''
|
|
start_all()
|
|
|
|
machine.wait_for_unit("multi-user.target")
|
|
print(machine.succeed("cat /run/keys/test"))
|
|
machine.succeed(
|
|
"cmp ${secret1InStore} /secret-from-initramfs",
|
|
"cmp ${secret1InStore} /run/keys/test",
|
|
)
|
|
# Select the second boot entry corresponding to the specialisation secrets2System.
|
|
machine.succeed("grub-reboot 1")
|
|
machine.shutdown()
|
|
|
|
with subtest("Check that the specialisation's secrets are distinct despite identical kernels"):
|
|
machine.wait_for_unit("multi-user.target")
|
|
print(machine.succeed("cat /run/keys/test"))
|
|
machine.succeed(
|
|
"cmp ${secret2InStore} /secret-from-initramfs",
|
|
"cmp ${secret2InStore} /run/keys/test",
|
|
)
|
|
machine.shutdown()
|
|
'';
|
|
}
|