{ config, lib, pkgs, ... }: with lib; let cfg = config.boot.loader.systemd-boot-secure; efi = config.boot.loader.efi; gummibootBuilder = pkgs.substituteAll { src = ./systemd-boot-builder.py; isExecutable = true; inherit (pkgs.buildPackages) python3 sbsigntool; binutils = pkgs.buildPackages.binutils-unwrapped; systemd = config.systemd.package; nix = config.nix.package.out; timeout = if config.boot.loader.timeout != null then config.boot.loader.timeout else ""; editor = if cfg.editor then "True" else "False"; configurationLimit = if cfg.configurationLimit == null then 0 else cfg.configurationLimit; inherit (cfg) consoleMode; inherit (efi) efiSysMountPoint canTouchEfiVariables; memtest86 = if cfg.memtest86.enable then pkgs.memtest86-efi else ""; inherit (cfg) signed; signingKey = if cfg.signed then cfg.signing-key else "/no-signing-key"; signingCertificate = if cfg.signed then cfg.signing-certificate else "/no-signing-crt"; }; in { options.boot.loader.systemd-boot-secure = { enable = mkOption { default = false; type = types.bool; description = "Whether to enable the systemd-boot (formerly gummiboot) EFI boot manager"; }; signed = mkOption { default = false; type = types.bool; description = '' Whether or not the bootloader files, including systemd-boot EFI programs should be signed. ''; }; signing-key = mkOption { type = types.path; example = "/root/secure-boot/db.key"; description = '' The db.key signing key, for signing EFI programs. Note: Do not pass a store path. Passing the key like signing-key = ./db.key; will copy the private key in to the Nix store and make it world-readable. Instead, pass the path as an absolute path string, like: signing-key = "/root/secure-boot/db.key";. ''; }; signing-certificate = mkOption { type = types.path; example = "/root/secure-boot/db.crt"; description = '' The db.crt signing certificate, for signing EFI programs. Note: certificate files are not private. ''; }; editor = mkOption { default = true; type = types.bool; description = '' Whether to allow editing the kernel command-line before boot. It is recommended to set this to false, as it allows gaining root access by passing init=/bin/sh as a kernel parameter. However, it is enabled by default for backwards compatibility. ''; }; configurationLimit = mkOption { default = null; example = 120; type = types.nullOr types.int; description = '' Maximum number of latest generations in the boot menu. Useful to prevent boot partition running out of disk space. null means no limit i.e. all generations that were not garbage collected yet. ''; }; consoleMode = mkOption { default = "keep"; type = types.enum [ "0" "1" "2" "auto" "max" "keep" ]; description = '' The resolution of the console. The following values are valid: "0": Standard UEFI 80x25 mode "1": 80x50 mode, not supported by all devices "2": The first non-standard mode provided by the device firmware, if any "auto": Pick a suitable mode automatically using heuristics "max": Pick the highest-numbered available mode "keep": Keep the mode selected by firmware (the default) ''; }; memtest86 = { enable = mkOption { default = false; type = types.bool; description = '' Make MemTest86 available from the systemd-boot menu. MemTest86 is a program for testing memory. MemTest86 is an unfree program, so this requires allowUnfree to be set to true. ''; }; }; }; config = mkIf cfg.enable { assertions = [{ assertion = (config.boot.kernelPackages.kernel.features or { efiBootStub = true; }) ? efiBootStub; message = "This kernel does not support the EFI boot stub"; }]; boot.loader.grub.enable = mkDefault false; boot.loader.supportsInitrdSecrets = true; system = { build.installBootLoader = gummibootBuilder; boot.loader.id = "systemd-boot"; requiredKernelConfig = with config.lib.kernelConfig; [ (isYes "EFI_STUB") ]; }; }; }