{ lib, pkgs, patosPkgs, version, runCommand, updateUrl, cpuArch ? "", secureBoot ? "false" }: let pname = "patos-image"; in runCommand pname { inherit version cpuArch updateUrl secureBoot; microcode = lib.optionalString (cpuArch == "amd") "--microcode ${pkgs.microcode-amd}/amd-ucode.img" + lib.optionalString (cpuArch == "intel") "--microcode ${pkgs.microcode-intel}/intel-ucode.img"; buildInputs = with pkgs; [ erofs-utils dosfstools mtools jq ]; env = { # vfat options won't efi won't find the fs otherwise. SYSTEMD_REPART_MKFS_OPTIONS_VFAT = "-S 512 -c"; SYSTEMD_REPART_MKFS_OPTIONS_EROFS = "--all-root -zlz4hc,12 -C1048576 -Efragments,dedupe,ztailpacking"; }; kernelCmdLine = "console=ttyS0 patos.secureboot=${secureBoot}"; } '' mkdir -p $out/init.repart.d $out/final.repart.d pushd $out mkdir rootfs cp -prP ${patosPkgs.rootfs}/* rootfs/ find rootfs/ -type d -exec chmod 755 {} \; # package kernel modules as sysext (will reduce the image size a little bit (~3MB)) mkdir rootfs/etc/extensions rm -rf rootfs/usr/lib/modules cp ${patosPkgs.kernel}/patos-kernel-modules* rootfs/etc/extensions/ # set default target to multi-user ln -sf multi-user.target rootfs/usr/lib/systemd/system/default.target # enable dbus ln -sf ../dbus.service rootfs/usr/lib/systemd/system/multi-user.target.wants/dbus.service ln -sf ../dbus.socket rootfs/usr/lib/systemd/system/sockets.target.wants/dbus.socket # enable network services ln -sf ../systemd-networkd.service rootfs/usr/lib/systemd/system/sysinit.target.wants/systemd-networkd.service ln -sf ../systemd-resolved.service rootfs/usr/lib/systemd/system/sysinit.target.wants/systemd-resolved.service ln -sf ../systemd-timesyncd.service rootfs/usr/lib/systemd/system/multi-user.target.wants/systemd-timesyncd.service # enable default network config mv rootfs/usr/lib/systemd/network/89-ethernet.network.example rootfs/usr/lib/systemd/network/89-ethernet.network # enable confext/sysext services ln -sf ../systemd-confext.service rootfs/usr/lib/systemd/system/sysinit.target.wants/systemd-confext.service ln -sf ../systemd-sysext.service rootfs/usr/lib/systemd/system/sysinit.target.wants/systemd-sysext.service cat <<EOF > rootfs/usr/lib/systemd/system/secure-boot-import-keys.service [Unit] Description=Import Secure Boot keys DefaultDependencies=no RequiresMountsFor=/var/lib/sbctl /boot ConditionPathExists=/boot/sbctl/keys After=local-fs.target [Service] Type=oneshot RemainAfterExit=yes ExecStart=sbctl import-keys -d /boot/sbctl/keys ExecStartPost=rm -rf /boot/sbctl EOF ln -sf ../secure-boot-import-keys.service rootfs/usr/lib/systemd/system/sysinit.target.wants/secure-boot-import-keys.service # sysupdate mkdir -p rootfs/etc/sysupdate.d cat <<EOF > rootfs/etc/sysupdate.d/10-uki.transfer [Source] Path=${updateUrl} MatchPattern=patos_@v.efi Type=url-file [Target] InstancesMax=2 MatchPattern=patos_@v+@l-@d.efi patos_@v+@l.efi patos_@v.efi Mode=0444 Path=/EFI/Linux PathRelativeTo=esp TriesDone=0 TriesLeft=3 Type=regular-file [Transfer] Verify=no EOF cat <<EOF > rootfs/etc/sysupdate.d/20-root-verity.transfer [Source] Type=url-file Path=${updateUrl} MatchPattern=patos_@v_@u.verity [Target] Type=partition Path=auto MatchPattern=verity-@v MatchPartitionType=root-verity ReadOnly=1 [Transfer] Verify=no EOF cat <<EOF > rootfs/etc/sysupdate.d/22-root.transfer [Source] Type=url-file Path=${updateUrl} MatchPattern=patos_@v_@u.root [Target] Type=partition Path=auto MatchPattern=root-@v MatchPartitionType=root ReadOnly=1 [Transfer] Verify=no EOF # Initial partitioning cat <<EOF > init.repart.d/10-root.conf [Partition] Type=root Format=erofs Minimize=best CopyFiles=/rootfs:/ Verity=data VerityMatchKey=root SplitName=root EOF cat <<EOF > init.repart.d/20-root-verity.conf [Partition] Type=root-verity Verity=hash VerityMatchKey=root Minimize=best SplitName=verity EOF #TODO: Add verity signature partition ${patosPkgs.systemd}/usr/bin/systemd-repart \ --no-pager \ --empty=create \ --size=auto \ --definitions=./init.repart.d \ --split=true \ --json=pretty \ --root=$out \ patos_$version.raw > init-repart-output.json && rm -f patos_$version.raw roothash=$(jq -r '.[0].roothash' init-repart-output.json) rootPart=$(jq -r '.[0].split_path' init-repart-output.json) rootUuid=$(jq -r '.[0].uuid' init-repart-output.json) verityPart=$(jq -r '.[1].split_path' init-repart-output.json) verityUuid=$(jq -r '.[1].uuid' init-repart-output.json) ln -sf patos_$version.verity.raw patos_${version}_$verityUuid.verity ln -sf patos_$version.root.raw patos_${version}_$rootUuid.root ${patosPkgs.systemd}/usr/bin/ukify build \ --linux ${patosPkgs.kernel}/bzImage \ --initrd ${patosPkgs.initrd}/initrd.xz \ $microcode \ --os-release @rootfs/etc/os-release \ --cmdline "$kernelCmdLine roothash=$roothash" \ -o patos_${version}.efi # install ESP SYSTEMD_RELAX_ESP_CHECKS=1 ${patosPkgs.systemd}/usr/bin/bootctl install --root ./rootfs --esp-path /boot # setup factory reset mkdir -p rootfs/boot/EFI/tools cp ${pkgs.edk2-uefi-shell}/shell.efi rootfs/boot/EFI/tools/ cat <<EOF > rootfs/boot/EFI/tools/factoryreset.nsh setvar FactoryReset -guid 8cf2644b-4b0b-428f-9387-6d876050dc67 -nv -rt =%1 reset EOF cat <<EOF > rootfs/boot/loader/entries/factoryreset.conf title Enable Factory Reset options -nostartup -nomap options \EFI\tools\factoryreset.nsh L"t" efi EFI/tools/shell.efi EOF echo "timeout 2" > rootfs/boot/loader/loader.conf # install UKI cp patos_${version}.efi rootfs/boot/EFI/Linux # Final partitioning cat <<EOF > final.repart.d/10-esp.conf [Partition] Type=esp Format=vfat SizeMinBytes=128M SizeMaxBytes=128M CopyFiles=/rootfs/boot:/ EOF cat <<EOF > final.repart.d/20-root.conf [Partition] Type=root Label=root-${version} CopyBlocks=/$rootPart UUID=$rootUuid SizeMinBytes=64M SizeMaxBytes=64M ReadOnly=1 EOF cat <<EOF > final.repart.d/22-root-verity.conf [Partition] Type=root-verity Label=verity-${version} CopyBlocks=/$verityPart UUID=$verityUuid ReadOnly=1 EOF # finalize image ready for boot ${patosPkgs.systemd}/usr/bin/systemd-repart \ --no-pager \ --empty=create \ --size=auto \ --definitions=./final.repart.d \ --root=$out \ patos_${version}.img > final-repart-output.json rm -rf rootfs init.repart.d final.repart.d *.json sha256sum *.root *.verity *.efi *.tar.xz > SHA256SUMS popd ''