Commit Graph

23 Commits

Author SHA1 Message Date
ajs124
779cca1bd1 tpm2-tss: fix version detection
without this, the version field in the .pc files is empty
leading to tpm2-abrmd failing to build
2022-04-17 19:00:18 +01:00
ajs124
588663ae79 tpm2-tss: 3.0.3 -> 3.2.0 2022-04-09 00:30:48 +01:00
Rick van Schijndel
68b5339f09 tpm2-tss: fix cross-compilation, enable strictDeps
It appears some dependencies were listed in checkInputs, they're moved
to the proper place in buildInputs & nativeBuildInputs.

Since this library was added as dependency of systemd, it's needed for
lots of packages to get cross-compilation working properly.

Also fixes pkgsStatic build, which fails due to cmocka not building.
Since we don't need it anyway when tests are disabled, gate it behind a
test for stdenv.buildPlatform == stdenv.hostPlatform.
2021-09-18 15:16:37 +02:00
Andreas Rammhold
64556974b6
systemd: 247.6 -> 249.4
This updates systemd to version v249.4 from version v247.6.

Besides the many new features that can be found in the upstream
repository they also introduced a bunch of cleanup which ended up
requiring a few more patches on our side.

a) 0022-core-Handle-lookup-paths-being-symlinks.patch:
  The way symlinked units were handled was changed in such that the last
  name of a unit file within one of the unit directories
  (/run/systemd/system, /etc/systemd/system, ...) is used as the name
  for the unit. Unfortunately that code didn't take into account that
  the unit directories themselves could already be symlinks and thus
  caused all our units to be recognized slightly different.

  There is an upstream PR for this new patch:
    https://github.com/systemd/systemd/pull/20479

b) The way the APIVFS is setup has been changed in such a way that we
   now always have /run. This required a few changes to the
   confinement tests which did assert that they didn't exist. Instead of
   adding another patch we can just adopt the upstream behavior. An
   empty /run doesn't seem harmful.

   As part of this work I refactored the confinement test just a little
   bit to allow better debugging of test failures. Previously it would
   just fail at some point and it wasn't obvious which of the many
   commands failed or what the unexpected string was. This should now be
   more obvious.

c) Again related to the confinement tests the way a file was tested for
   being accessible was optimized. Previously systemd would in some
   situations open a file twice during that check. This was reduced to
   one operation but required the procfs to be mounted in a units
   namespace.

   An upstream bug was filed and fixed. We are now carrying the
   essential patch to fix that issue until it is backported to a new
   release (likely only version 250). The good part about this story is
   that upstream systemd now has a test case that looks very similar to
   one of our confinement tests. Hopefully that will lead to less
   friction in the long run.

   https://github.com/systemd/systemd/issues/20514
   https://github.com/systemd/systemd/pull/20515

d) Previously we could grep for dlopen( somewhat reliably but now
   upstream started using a wrapper around dlopen that is most of the
   time used with linebreaks. This makes using grep not ergonomic
   anymore.

   With this bump we are grepping for anything that looks like a
   dynamic library name (in contrast to a dlopen(3) call) and replace
   those instead. That seems more robust. Time will tell if this holds.

   I tried using coccinelle to patch all those call sites using its
   tooling but unfornately it does stumble upon the _cleanup_
   annotations that are very common in the systemd code.

e) We now have some machinery for libbpf support in our systemd build.
   That being said it doesn't actually work as generating some skeletons
   doesn't work just yet. It fails with the below error message and is
   disabled by default (in both minimal and the regular build).

   > FAILED: src/core/bpf/socket_bind/socket-bind.skel.h
   > /build/source/tools/build-bpf-skel.py --clang_exec /nix/store/x1bi2mkapk1m0zq2g02nr018qyjkdn7a-clang-wrapper-12.0.1/bin/clang --llvm_strip_exec /nix/store/zm0kqan9qc77x219yihmmisi9g3sg8ns-llvm-12.0.1/bin/llvm-strip --bpftool_exec /nix/store/l6dg8jlbh8qnqa58mshh3d8r6999dk0p-bpftools-5.13.11/bin/bpftool --arch x86_64 ../src/core/bpf/socket_bind/socket-bind.bpf.c src/core/bpf/socket_bind/socket-bind.skel.h
   > libbpf: elf: socket_bind_bpf is not a valid eBPF object file
   > Error: failed to open BPF object file: BPF object format invalid
   > Traceback (most recent call last):
   >   File "/build/source/tools/build-bpf-skel.py", line 128, in <module>
   >     bpf_build(args)
   >   File "/build/source/tools/build-bpf-skel.py", line 92, in bpf_build
   >     gen_bpf_skeleton(bpftool_exec=args.bpftool_exec,
   >   File "/build/source/tools/build-bpf-skel.py", line 63, in gen_bpf_skeleton
   >     skel = subprocess.check_output(bpftool_args, universal_newlines=True)
   >   File "/nix/store/81lwy2hfqj4c1943b1x8a0qsivjhdhw9-python3-3.9.6/lib/python3.9/subprocess.py", line 424, in check_output
   >     return run(*popenargs, stdout=PIPE, timeout=timeout, check=True,
   >   File "/nix/store/81lwy2hfqj4c1943b1x8a0qsivjhdhw9-python3-3.9.6/lib/python3.9/subprocess.py", line 528, in run
   >     raise CalledProcessError(retcode, process.args,
   > subprocess.CalledProcessError: Command '['/nix/store/l6dg8jlbh8qnqa58mshh3d8r6999dk0p-bpftools-5.13.11/bin/bpftool', 'g', 's', '../src/core/bpf/socket_bind/socket-bind.bpf.o']' returned non-zero exit status 255.
   > [102/1457] Compiling C object src/journal/libjournal-core.a.p/journald-server.c.oapture output)put)ut)
   > ninja: build stopped: subcommand failed.

  f) We do now have support for TPM2 based disk encryption in our
     systemd build. The actual bits and pieces to make use of that are
     missing but there are various ongoing efforts in that direction.
     There is also the story about systemd in our initrd to enable this
     being used for root volumes. None of this will yet work out of the
     box but we can start improving on that front.

  g) FIDO2 support was added systemd and consequently we can now use
     that. Just with TPM2 there hasn't been any integration work with
     NixOS and instead this just adds that capability to work on that.

Co-Authored-By: Jörg Thalheim <joerg@thalheim.io>
2021-09-12 23:45:49 +02:00
Arthur Gautier
0d8df51c23 tpm2-tss: fix support for abrmd
When introduced in #114080, the full path dlopen lookup patch introduced
a regression which made it impossible to load tabrmd modules

see https://github.com/NixOS/nixpkgs/issues/133248
    https://github.com/NixOS/nixpkgs/pull/114080

Fixes #133248

Signed-off-by: Arthur Gautier <baloo@superbaloo.net>
2021-08-10 15:17:45 +00:00
Sandro Jäckel
9378fdf87e
iproute: deprecate alias 2021-04-04 01:43:46 +02:00
Arthur Gautier
eea5575bd3 tpm-tss2: do not rely on a dynamic load path for tcti modules
Signed-off-by: Arthur Gautier <baloo@superbaloo.net>
2021-02-23 08:34:27 +00:00
R. RyanTM
c97d0d50e1 tpm2-tss: 3.0.2 -> 3.0.3 2020-11-26 23:23:59 +00:00
R. RyanTM
f9d14ca7b4 tpm2-tss: 3.0.1 -> 3.0.2 2020-11-22 14:16:36 +00:00
Pierre Bourdon
d134095d67
tpm2-tss: 2.4.1 -> 3.0.1 2020-09-24 20:16:16 +02:00
Leon Schuermann
ef9e6b3aa8 tpm2-tss: remove libgcrypt from explicit build inputs 2020-06-17 16:46:18 +02:00
Leon Schuermann
09791689df tpm2-tss: build from source instead of release tarball 2020-06-17 16:46:18 +02:00
Leon Schuermann
1ec50ac39e tpm2-tss: extract checkPhase dependencies into checkInputs 2020-06-17 16:46:18 +02:00
Leon Schuermann
de064be984 tpm2-tss: enable parallel building 2020-06-17 16:46:18 +02:00
Leon Schuermann
8e94e61aec tpm2-tss: 2.3.2 -> 2.4.1 2020-06-17 16:46:18 +02:00
Michael Reilly
84cf00f980
treewide: Per RFC45, remove all unquoted URLs 2020-04-10 17:54:53 +01:00
worldofpeace
5b0c0bbc08 tpm2-tss: fix build
Channel blocker https://hydra.nixos.org/build/109901320
2020-01-08 10:38:28 -05:00
R. RyanTM
16a7c38151 tpm2-tss: 2.3.1 -> 2.3.2 2019-12-24 15:29:07 -08:00
R. RyanTM
2c389b4098 tpm2-tss: 2.2.3 -> 2.3.1
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/tpm2-tss/versions
2019-09-29 01:13:39 -07:00
R. RyanTM
7080e6ec1d tpm2-tss: 2.2.2 -> 2.2.3
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/tpm2-tss/versions
2019-06-02 23:40:13 -07:00
R. RyanTM
9efb27e878 tpm2-tss: 2.2.1 -> 2.2.2
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/tpm2-tss/versions
2019-04-02 23:38:31 -07:00
Pierre Bourdon
b5d341e7f9
tpm2-tss: 2.2.0 -> 2.2.1 2019-03-01 01:25:38 +01:00
Pierre Bourdon
0cb599293b
tpm2-tss: init at 2.2.0 2019-02-19 20:02:31 +01:00