X-Git-Url: http://git.scottworley.com/trustix-integration-tests/blobdiff_plain/578e32b36eff2f3b2c381f9ca658c6e8b79aefe0..0d4b0780e7b716ef83d50df06bf22fa74a582b45:/checks/one-publisher.nix?ds=inline diff --git a/checks/one-publisher.nix b/checks/one-publisher.nix index 2099047..7ecec8f 100644 --- a/checks/one-publisher.nix +++ b/checks/one-publisher.nix @@ -18,6 +18,19 @@ let } ''; + binaryCacheKeyConfig = writeText "binaryCacheKeyConfig" '' + { pkgs, ... }: { + config = { + system.activationScripts.trustix-create-key = ''' + if [[ ! -e /keys/cache-priv-key.pem ]];then + mkdir -p /keys + ''${pkgs.nix}/bin/nix-store --generate-binary-cache-key clint /keys/cache-priv-key.pem /keys/cache-pub-key.pem + fi + '''; + }; + } + ''; + publisherConfig = writeText "publisherConfig" '' { services.trustix = { @@ -31,29 +44,62 @@ let protocol = "nix"; publicKey = { type = "ed25519"; - pub = "@pubkey@"; + pub = "@trustixPubKey@"; }; }]; }; } ''; - mkConfig = writeShellScript "mkConfig" '' - set -euxo pipefail - mkdir -p /etc/nixos - ${gnused}/bin/sed "s,@pubkey@,$(< /keys/trustix-pub)," ${publisherConfig} > /etc/nixos/publisher.nix - cat > /etc/nixos/configuration.nix < /etc/nixos/local.nix + cat > /etc/nixos/configuration.nix <' -A hello") + + clint.wait_for_file("/keys/cache-priv-key.pem") + clint.succeed( + "${ + mkConfig { + config = clientConfig; + trustixPubKeyPath = "/keys/alisha-signing-pub"; + binaryCachePubKeyPath = "/keys/cache-priv-key.pem"; + } + }", + "nixos-rebuild switch --show-trace", + ) + clint.succeed("nix-build '' -A hello") ''; }