diff --git a/packages/tdx_google/configuration.nix b/packages/tdx_google/configuration.nix index 89973a5..1298769 100644 --- a/packages/tdx_google/configuration.nix +++ b/packages/tdx_google/configuration.nix @@ -6,63 +6,11 @@ imports = [ "${toString modulesPath}/profiles/minimal.nix" "${toString modulesPath}/profiles/qemu-guest.nix" + ./metadata.nix + ./vector.nix + ./container.nix ]; - services.vector.enable = true; - services.vector.settings = { - api.enabled = false; - sources = { - otlp = { - type = "opentelemetry"; - grpc = { address = "127.0.0.1:4317"; }; - http = { - address = "127.0.0.1:4318"; - keepalive = { - max_connection_age_jitter_factor = 0.1; - max_connection_age_secs = 300; - }; - }; - }; - }; - sinks = { - console = { - inputs = [ "otlp.logs" ]; - target = "stdout"; - type = "console"; - encoding = { codec = "json"; }; - }; - kafka = { - type = "kafka"; - inputs = [ "otlp.logs" ]; - bootstrap_servers = "\${KAFKA_URLS:-127.0.0.1:0}"; - topic = "\${KAFKA_TOPIC:-tdx-google}"; - encoding = { - codec = "json"; - compression = "lz4"; - }; - }; - }; - }; - systemd.services.vector.path = [ pkgs.curl pkgs.coreutils ]; - # `-` means, that the file can be missing, so that `ExecStartPre` can execute and create it - systemd.services.vector.serviceConfig.EnvironmentFile = "-/run/vector/env"; - # `+` means, that the process has access to all files, to be able to write to `/run` - systemd.services.vector.serviceConfig.ExecStartPre = "+" + toString ( - pkgs.writeShellScript "vector-start-pre" '' - set -eu -o pipefail - : "''${KAFKA_URLS:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kafka_urls" -H "Metadata-Flavor: Google")}" - : "''${KAFKA_TOPIC:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kafka_topic" -H "Metadata-Flavor: Google")}" - - KAFKA_TOPIC="''${KAFKA_TOPIC:-tdx-google}" - - mkdir -p /run/vector - cat >/run/vector/env </run/container/env <&2 - test -c /dev/tdx_guest && tdx-extend --digest "$DIGEST" --rtmr 3 - exec docker run --env "GOOGLE_METADATA=1" --network=host --init --privileged "sha256:$DIGEST" - ''; - - postStop = lib.mkDefault '' - shutdown --reboot +5 - ''; - }; - services.prometheus.exporters.node = { enable = true; port = 9100; @@ -147,10 +43,6 @@ ]; }; - environment.systemPackages = with pkgs; [ - teepot.teepot - ]; - # /var is on tmpfs anyway services.journald.storage = "volatile"; diff --git a/packages/tdx_google/container.nix b/packages/tdx_google/container.nix new file mode 100644 index 0000000..07be8df --- /dev/null +++ b/packages/tdx_google/container.nix @@ -0,0 +1,40 @@ +{ lib +, modulesPath +, pkgs +, ... +}: { + virtualisation.docker.enable = true; + + systemd.services.docker_start_container = { + description = "The main application container"; + wantedBy = [ "multi-user.target" ]; + after = [ "network-online.target" "docker.service" "vector.service" "chronyd.service" "metadata.service" ]; + requires = [ "network-online.target" "docker.service" "vector.service" "metadata.service" ]; + serviceConfig = { + Type = "exec"; + User = "root"; + EnvironmentFile = "-/run/env/env"; + }; + path = [ pkgs.docker pkgs.teepot.teepot.tdx_extend ]; + script = '' + set -eu -o pipefail + + DIGEST=''${CONTAINER_DIGEST#sha256:} + echo "Measuring $DIGEST" >&2 + test -c /dev/tdx_guest && tdx-extend --digest "$DIGEST" --rtmr 3 + + docker run -d --rm \ + --name tdx_container \ + --env "GOOGLE_METADATA=1" \ + --network=host \ + --init \ + --privileged \ + "sha256:$DIGEST" + exec docker wait tdx_container + ''; + + postStop = lib.mkDefault '' + shutdown --reboot +5 + ''; + }; +} diff --git a/packages/tdx_google/metadata.nix b/packages/tdx_google/metadata.nix new file mode 100644 index 0000000..98be396 --- /dev/null +++ b/packages/tdx_google/metadata.nix @@ -0,0 +1,53 @@ +{ lib +, modulesPath +, pkgs +, ... +}: { + systemd.services.metadata = { + serviceConfig = { + Type = "oneshot"; + RemainAfterExit = true; + }; + enable = true; + path = [ pkgs.curl pkgs.docker pkgs.teepot.teepot.tdx_extend pkgs.coreutils ]; + wantedBy = [ "default.target" ]; + after = [ "network-online.target" "docker.service" ]; + requires = [ "network-online.target" "docker.service" ]; + script = '' + set -eu -o pipefail + : "''${CONTAINER_HUB:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/container_hub" -H "Metadata-Flavor: Google")}" + : "''${CONTAINER_IMAGE:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/container_image" -H "Metadata-Flavor: Google")}" + : "''${CONTAINER_TOKEN:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/container_token" -H "Metadata-Flavor: Google")}" + : "''${CONTAINER_USER:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/container_user" -H "Metadata-Flavor: Google")}" + : "''${HOST_ID:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/id" -H "Metadata-Flavor: Google")}" + : "''${HOST_IMAGE:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/image" -H "Metadata-Flavor: Google")}" + : "''${HOST_NAME:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/hostname" -H "Metadata-Flavor: Google")}" + : "''${KAFKA_TOPIC:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kafka_topic" -H "Metadata-Flavor: Google")}" + : "''${KAFKA_URLS:=$(curl --silent --fail "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kafka_urls" -H "Metadata-Flavor: Google")}" + + : "''${CONTAINER_IMAGE:?Error: Missing CONTAINER_IMAGE}" + : "''${CONTAINER_HUB:?Error: Missing CONTAINER_HUB}" + + if [[ $CONTAINER_USER ]] && [[ $CONTAINER_TOKEN ]]; then + docker login -u "$CONTAINER_USER" -p "$CONTAINER_TOKEN" "$CONTAINER_HUB" + fi + + docker pull "''${CONTAINER_HUB}/''${CONTAINER_IMAGE}" + CONTAINER_DIGEST=$(docker inspect --format '{{.Id}}' "''${CONTAINER_HUB}/''${CONTAINER_IMAGE}") + + mkdir -p /run/env + cat >/run/env/env <