fix: cleanup the nix packages

`curl` and `openssl` have to be specified with `.out`

Signed-off-by: Harald Hoyer <harald@matterlabs.dev>
This commit is contained in:
Harald Hoyer 2024-03-07 16:02:44 +01:00
parent 5d2f58d9a2
commit 9680e32e82
Signed by: harald
GPG key ID: F519A1143B3FBE32
10 changed files with 18 additions and 36 deletions

View file

@ -1,14 +1,12 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2024 Matter Labs # Copyright (c) 2024 Matter Labs
{ pkgs { pkgs
, vat
, nixsgx , nixsgx
, curl , curl
, teepot , teepot
, bash , bash
, coreutils , coreutils
, openssl , openssl
, vault
}: }:
let manifest = ./tee-self-attestation-test.manifest.toml; let manifest = ./tee-self-attestation-test.manifest.toml;
in pkgs.dockerTools.buildLayeredImage { in pkgs.dockerTools.buildLayeredImage {

View file

@ -1,7 +1,6 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2024 Matter Labs # Copyright (c) 2024 Matter Labs
{ pkgs { pkgs
, vat
, nixsgx , nixsgx
, curl , curl
, teepot , teepot

View file

@ -1,14 +1,12 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2024 Matter Labs # Copyright (c) 2024 Matter Labs
{ pkgs { pkgs
, vat
, nixsgx , nixsgx
, curl , curl
, teepot , teepot
, bash , bash
, coreutils , coreutils
, openssl , openssl
, vault
}: }:
let manifest = ./tee-vault-admin.manifest.toml; let manifest = ./tee-vault-admin.manifest.toml;
in pkgs.dockerTools.buildLayeredImage { in pkgs.dockerTools.buildLayeredImage {
@ -20,13 +18,12 @@ in pkgs.dockerTools.buildLayeredImage {
contents = pkgs.buildEnv { contents = pkgs.buildEnv {
name = "image-root"; name = "image-root";
paths = with pkgs.dockerTools; with nixsgx; with teepot;[ paths = with pkgs.dockerTools; with nixsgx;[
bash bash
coreutils coreutils
openssl openssl.out
vault
azure-dcap-client azure-dcap-client
curl curl.out
teepot.teepot.tee_vault_admin teepot.teepot.tee_vault_admin
gramine gramine
restart-aesmd restart-aesmd

View file

@ -26,7 +26,8 @@ in pkgs.dockerTools.buildLayeredImage {
teepot.teepot.tee_ratls_preexec teepot.teepot.tee_ratls_preexec
vault vault
azure-dcap-client azure-dcap-client
curl openssl.out
curl.out
vat.vault-auth-tee vat.vault-auth-tee
gramine gramine
restart-aesmd restart-aesmd

View file

@ -1,13 +1,10 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2024 Matter Labs # Copyright (c) 2024 Matter Labs
# TODO: This derivation is a temporary workaround for
# creating a self-signed certificate for Vault and the unseal TEE.
# It will be replaced with real RA-TLS.
{ lib { lib
, stdenv , stdenv
}: }:
stdenv.mkDerivation rec { stdenv.mkDerivation {
name = "container-vault-start-config"; name = "container-vault-start-config";
src = with lib.fileset; toSource { src = with lib.fileset; toSource {
root = ./.; root = ./.;

View file

@ -8,7 +8,6 @@
, bash , bash
, coreutils , coreutils
, openssl , openssl
, vault
}: }:
let manifest = ./tee-vault-unseal.manifest.toml; let manifest = ./tee-vault-unseal.manifest.toml;
in pkgs.dockerTools.buildLayeredImage { in pkgs.dockerTools.buildLayeredImage {
@ -20,13 +19,12 @@ in pkgs.dockerTools.buildLayeredImage {
contents = pkgs.buildEnv { contents = pkgs.buildEnv {
name = "image-root"; name = "image-root";
paths = with pkgs.dockerTools; with nixsgx; with teepot;[ paths = with pkgs.dockerTools; with nixsgx;[
bash bash
coreutils coreutils
openssl openssl.out
vault
azure-dcap-client azure-dcap-client
curl curl.out
vat.vault-auth-tee.sha vat.vault-auth-tee.sha
teepot.teepot.tee_vault_unseal teepot.teepot.tee_vault_unseal
gramine gramine

View file

@ -1,12 +1,10 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2024 Matter Labs # Copyright (c) 2024 Matter Labs
{ lib { dockerTools
, dockerTools
, nixsgx , nixsgx
, teepot , teepot
, buildEnv , buildEnv
, curl , curl
, ...
}: }:
dockerTools.buildLayeredImage { dockerTools.buildLayeredImage {
name = "vault-unseal"; name = "vault-unseal";
@ -18,7 +16,7 @@ dockerTools.buildLayeredImage {
name = "image-root"; name = "image-root";
paths = with dockerTools; with nixsgx;[ paths = with dockerTools; with nixsgx;[
azure-dcap-client azure-dcap-client
curl curl.out
sgx-dcap.quote_verify sgx-dcap.quote_verify
usrBinEnv usrBinEnv
binSh binSh

View file

@ -1,13 +1,11 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2024 Matter Labs # Copyright (c) 2024 Matter Labs
{ lib { dockerTools
, dockerTools
, buildEnv , buildEnv
, teepot , teepot
, openssl , openssl
, curl , curl
, nixsgx , nixsgx
, ...
}: }:
dockerTools.buildLayeredImage { dockerTools.buildLayeredImage {
name = "verify-attestation-sgx-azure"; name = "verify-attestation-sgx-azure";
@ -16,8 +14,8 @@ dockerTools.buildLayeredImage {
config.Cmd = [ "${teepot.teepot.verify_attestation}/bin/verify-attestation" ]; config.Cmd = [ "${teepot.teepot.verify_attestation}/bin/verify-attestation" ];
config.Env = [ config.Env = [
"LD_LIBRARY_PATH=/lib" "LD_LIBRARY_PATH=/lib"
"AZDCAP_DEBUG_LOG_LEVEL=ignore" "AZDCAP_DEBUG_LOG_LEVEL=ignore"
"AZDCAP_COLLATERAL_VERSION=v4" "AZDCAP_COLLATERAL_VERSION=v4"
]; ];
contents = buildEnv { contents = buildEnv {
name = "image-root"; name = "image-root";

View file

@ -1,13 +1,11 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2024 Matter Labs # Copyright (c) 2024 Matter Labs
{ lib { dockerTools
, dockerTools
, buildEnv , buildEnv
, teepot , teepot
, openssl , openssl
, curl , curl
, nixsgx , nixsgx
, ...
}: }:
dockerTools.buildLayeredImage { dockerTools.buildLayeredImage {
name = "verify-attestation-sgx-dcap"; name = "verify-attestation-sgx-dcap";

View file

@ -1,15 +1,13 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
# Copyright (c) 2024 Matter Labs # Copyright (c) 2024 Matter Labs
{ lib { lib
, gccStdenv
, makeRustPlatform , makeRustPlatform
, nixsgx , nixsgx
, pkg-config , pkg-config
, rust-bin , rust-bin
, ...
}: }:
let let
cargoToml = (builtins.fromTOML (builtins.readFile ../../Cargo.toml)); cargoToml = builtins.fromTOML (builtins.readFile ../../Cargo.toml);
rustVersion = rust-bin.fromRustupToolchainFile ../../rust-toolchain.toml; rustVersion = rust-bin.fromRustupToolchainFile ../../rust-toolchain.toml;
rustPlatform = makeRustPlatform { rustPlatform = makeRustPlatform {
cargo = rustVersion; cargo = rustVersion;
@ -18,7 +16,7 @@ let
in in
rustPlatform.buildRustPackage { rustPlatform.buildRustPackage {
pname = cargoToml.package.name; pname = cargoToml.package.name;
version = cargoToml.workspace.package.version; inherit (cargoToml.workspace.package) version;
nativeBuildInputs = [ nativeBuildInputs = [
pkg-config pkg-config