Skip to content

Commit

Permalink
feat: support systemd-boot ISO enroll keys option
Browse files Browse the repository at this point in the history
Fixes #8196

Example (profile excerpt):

```yaml
output:
  kind: iso
  isoOptions:
    sdBootEnrollKeys: force
  outFormat: raw
```

Defaults are still same (`if-safe` unless explicitly overridden).

Signed-off-by: Andrey Smirnov <andrey.smirnov@siderolabs.com>
  • Loading branch information
smira committed Feb 9, 2024
1 parent afa71d6 commit 087b50f
Show file tree
Hide file tree
Showing 9 changed files with 138 additions and 8 deletions.
14 changes: 14 additions & 0 deletions hack/release.toml
Expand Up @@ -49,6 +49,20 @@ machine:
features:
localDNS: false
```
"""

[notes.secureboot-image]
title = "Secure Boot Image"
description = """\
Talos Linux now provides a way to configure systemd-boot ISO 'secure-boot-enroll' option while generating a SecureBoot ISO image:
```yaml
output:
kind: iso
isoOptions:
sdBootEnrollKeys: force # default is still if-safe
outFormat: raw
```
"""

[notes.rsa-service-account]
Expand Down
5 changes: 0 additions & 5 deletions pkg/imager/iso/loader.conf

This file was deleted.

5 changes: 5 additions & 0 deletions pkg/imager/iso/loader.conf.tmpl
@@ -0,0 +1,5 @@
# systemd-boot configuration

timeout 10

secure-boot-enroll {{ .SecureBootEnroll }}
24 changes: 21 additions & 3 deletions pkg/imager/iso/uefi.go
Expand Up @@ -11,6 +11,7 @@ import (
"fmt"
"os"
"path/filepath"
"text/template"

"github.com/siderolabs/go-cmd/pkg/cmd"

Expand All @@ -24,6 +25,9 @@ type UEFIOptions struct {
UKIPath string
SDBootPath string

// A value in loader.conf secure-boot-enroll: off, manual, if-safe, force.
SDBootSecureBootEnrollKeys string

// optional, for auto-enrolling secureboot keys
PlatformKeyPath string
KeyExchangeKeyPath string
Expand All @@ -41,8 +45,8 @@ const (
mib = 1024 * 1024
)

//go:embed loader.conf
var loaderConfig []byte
//go:embed loader.conf.tmpl
var loaderConfigTemplate string

// CreateUEFI creates an iso using a UKI, systemd-boot.
//
Expand All @@ -54,6 +58,8 @@ func CreateUEFI(printf func(string, ...any), options UEFIOptions) error {
return err
}

printf("preparing raw image")

efiBootImg := filepath.Join(options.ScratchDir, "efiboot.img")

// initial size
Expand All @@ -75,6 +81,18 @@ func CreateUEFI(printf func(string, ...any), options UEFIOptions) error {
return err
}

printf("preparing loader.conf")

var loaderConfigOut bytes.Buffer

if err := template.Must(template.New("loader.conf").Parse(loaderConfigTemplate)).Execute(&loaderConfigOut, struct {
SecureBootEnroll string
}{
SecureBootEnroll: options.SDBootSecureBootEnrollKeys,
}); err != nil {
return fmt.Errorf("error rendering loader.conf: %w", err)
}

printf("creating vFAT EFI image")

fopts := []makefs.Option{
Expand Down Expand Up @@ -125,7 +143,7 @@ func CreateUEFI(printf func(string, ...any), options UEFIOptions) error {
}

if _, err := cmd.RunContext(
cmd.WithStdin(context.Background(), bytes.NewReader(loaderConfig)),
cmd.WithStdin(context.Background(), &loaderConfigOut),
"mcopy", "-i", efiBootImg, "-", "::loader/loader.conf",
); err != nil {
return err
Expand Down
5 changes: 5 additions & 0 deletions pkg/imager/out.go
Expand Up @@ -20,6 +20,7 @@ import (
"github.com/google/go-containerregistry/pkg/v1/mutate"
"github.com/google/go-containerregistry/pkg/v1/tarball"
"github.com/google/go-containerregistry/pkg/v1/types"
"github.com/siderolabs/go-pointer"
"github.com/siderolabs/go-procfs/procfs"

"github.com/siderolabs/talos/cmd/installer/pkg/install"
Expand Down Expand Up @@ -85,10 +86,14 @@ func (i *Imager) outISO(ctx context.Context, path string, report *reporter.Repor
var err error

if i.prof.SecureBootEnabled() {
isoOptions := pointer.SafeDeref(i.prof.Output.ISOOptions)

options := iso.UEFIOptions{
UKIPath: i.ukiPath,
SDBootPath: i.sdBootPath,

SDBootSecureBootEnrollKeys: isoOptions.SDBootEnrollKeys.String(),

PlatformKeyPath: i.prof.Input.SecureBoot.PlatformKeyPath,
KeyExchangeKeyPath: i.prof.Input.SecureBoot.KeyExchangeKeyPath,
SignatureKeyPath: i.prof.Input.SecureBoot.SignatureKeyPath,
Expand Down
4 changes: 4 additions & 0 deletions pkg/imager/profile/deep_copy.generated.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 3 additions & 0 deletions pkg/imager/profile/default.go
Expand Up @@ -37,6 +37,9 @@ var Default = map[string]Profile{
Output: Output{
Kind: OutKindISO,
OutFormat: OutFormatRaw,
ISOOptions: &ISOOptions{
SDBootEnrollKeys: SDBootEnrollKeysIfSafe,
},
},
},
// Metal images
Expand Down
23 changes: 23 additions & 0 deletions pkg/imager/profile/output.go
Expand Up @@ -15,6 +15,8 @@ type Output struct {
Kind OutputKind `yaml:"kind"`
// Options for the 'image' output.
ImageOptions *ImageOptions `yaml:"imageOptions,omitempty"`
// Options for the 'iso' output.
ISOOptions *ISOOptions `yaml:"isoOptions,omitempty"`
// OutFormat is the format for the output:
// * raw - output raw file
// * .tar.gz - output tar.gz archive
Expand All @@ -37,6 +39,14 @@ type ImageOptions struct {
DiskFormatOptions string `yaml:"diskFormatOptions,omitempty"`
}

// ISOOptions describes options for the 'iso' output.
type ISOOptions struct {
// SDBootEnrollKeys is a value in loader.conf secure-boot-enroll: off, manual, if-safe, force.
//
// If not set, it defaults to if-safe.
SDBootEnrollKeys SDBootEnrollKeys `yaml:"sdBootEnrollKeys"`
}

//go:generate enumer -type=OutputKind -linecomment -text

// OutputKind is output specification.
Expand Down Expand Up @@ -81,3 +91,16 @@ const (
DiskFormatVPC // vhd
DiskFormatOVA // ova
)

//go:generate enumer -type SDBootEnrollKeys -linecomment -text

// SDBootEnrollKeys is a value in loader.conf secure-boot-enroll: off, manual, if-safe, force.
type SDBootEnrollKeys int

// SDBootEnrollKeys values.
const (
SDBootEnrollKeysIfSafe SDBootEnrollKeys = iota // if-safe
SDBootEnrollKeysManual // manual
SDBootEnrollKeysForce // force
SDBootEnrollKeysOff // off
)
63 changes: 63 additions & 0 deletions pkg/imager/profile/sdbootenrollkeys_enumer.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

0 comments on commit 087b50f

Please sign in to comment.