chiark / gitweb /
ask-password: add --console mode to ask questions on /dev/console
[elogind.git] / src / cryptsetup-generator.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <string.h>
23 #include <errno.h>
24 #include <unistd.h>
25
26 #include "log.h"
27 #include "util.h"
28 #include "unit-name.h"
29
30 const char *arg_dest = "/tmp";
31
32 static bool has_option(const char *haystack, const char *needle) {
33         const char *f = haystack;
34         size_t l;
35
36         l = strlen(needle);
37
38         while ((f = strstr(f, needle))) {
39
40                 if (f > haystack && f[-1] != ',') {
41                         f++;
42                         continue;
43                 }
44
45                 if (f[l] != 0 && f[l] == ',') {
46                         f++;
47                         continue;
48                 }
49
50                 return true;
51         }
52
53         return false;
54 }
55
56 static int create_disk(
57                 const char *name,
58                 const char *device,
59                 const char *password,
60                 const char *options) {
61
62         char *p = NULL, *n = NULL, *d = NULL, *u = NULL, *from = NULL, *to = NULL, *e = NULL;
63         int r;
64         FILE *f = NULL;
65
66         assert(name);
67         assert(device);
68
69         if (!(n = unit_name_build_escape("cryptsetup", name, ".service"))) {
70                 r = -ENOMEM;
71                 log_error("Failed to allocate unit name.");
72                 goto fail;
73         }
74
75         if (asprintf(&p, "%s/%s", arg_dest, n) < 0) {
76                 r = -ENOMEM;
77                 log_error("Failed to allocate unit file name.");
78                 goto fail;
79         }
80
81         if (!(u = fstab_node_to_udev_node(device))) {
82                 r = -ENOMEM;
83                 log_error("Failed to allocate device node.");
84                 goto fail;
85         }
86
87         if (!(d = unit_name_from_path(u, ".device"))) {
88                 r = -ENOMEM;
89                 log_error("Failed to allocate device name.");
90                 goto fail;
91         }
92
93         if (!(f = fopen(p, "wxe"))) {
94                 r = -errno;
95                 log_error("Failed to create unit file: %m");
96                 goto fail;
97         }
98
99         fprintf(f,
100                 "[Unit]\n"
101                 "Description=Cryptography Setup for %%f\n"
102                 "DefaultDependencies=no\n"
103                 "BindTo=%s dev-mapper-%%i.device\n"
104                 "After=systemd-readahead-collect.service systemd-readahead-replay.service %s\n"
105                 "Before=dev-mapper-%%i.device shutdown.target local-fs.target\n",
106                 d, d);
107
108         if (password && (streq(password, "/dev/urandom") ||
109                          streq(password, "/dev/random") ||
110                          streq(password, "/dev/hw_random")))
111                 fprintf(f,
112                         "After=systemd-random-seed-load.service\n");
113
114         fprintf(f,
115                 "\n[Service]\n"
116                 "Type=oneshot\n"
117                 "RemainAfterExit=yes\n"
118                 "ExecStart=" SYSTEMD_CRYPTSETUP_PATH " attach '%s' '%s' '%s' '%s'\n"
119                 "ExecStop=" SYSTEMD_CRYPTSETUP_PATH " detach '%s'\n",
120                 name, u, strempty(password), strempty(options),
121                 name);
122
123         if (options && has_option(options, "tmp"))
124                 fprintf(f,
125                         "ExecStartPost=/sbin/mke2fs '%s'",
126                         u);
127
128         if (options && has_option(options, "swap"))
129                 fprintf(f,
130                         "ExecStartPost=/sbin/mkswap '%s'",
131                         u);
132
133         fflush(f);
134
135         if (ferror(f)) {
136                 r = -errno;
137                 log_error("Failed to write file: %m");
138                 goto fail;
139         }
140
141         if (asprintf(&from, "../%s", n) < 0) {
142                 r = -ENOMEM;
143                 goto fail;
144         }
145
146         if (!options || !has_option(options, "noauto")) {
147
148                 if (asprintf(&to, "%s/%s.wants/%s", arg_dest, d, n) < 0) {
149                         r = -ENOMEM;
150                         goto fail;
151                 }
152
153                 mkdir_parents(to, 0755);
154
155                 if (symlink(from, to) < 0) {
156                         log_error("Failed to create symlink '%s' to '%s': %m", from, to);
157                         r = -errno;
158                         goto fail;
159                 }
160         }
161
162         free(to);
163         to = NULL;
164
165         e = unit_name_escape(name);
166         if (asprintf(&to, "%s/dev-mapper-%s.device.requires/%s", arg_dest, e, n) < 0) {
167                 r = -ENOMEM;
168                 goto fail;
169         }
170
171         mkdir_parents(to, 0755);
172
173         if (symlink(from, to) < 0) {
174                 log_error("Failed to create symlink '%s' to '%s': %m", from, to);
175                 r = -errno;
176                 goto fail;
177         }
178
179         r = 0;
180
181 fail:
182         free(p);
183         free(n);
184         free(d);
185         free(e);
186
187         free(from);
188         free(to);
189
190         if (f)
191                 fclose(f);
192
193         return r;
194 }
195
196 int main(int argc, char *argv[]) {
197         FILE *f;
198         int r = EXIT_SUCCESS;
199         unsigned n = 0;
200
201         if (argc > 2) {
202                 log_error("This program takes one or no arguments.");
203                 return EXIT_FAILURE;
204         }
205
206         arg_dest = argv[1];
207
208         log_set_target(LOG_TARGET_SYSLOG_OR_KMSG);
209         log_parse_environment();
210         log_open();
211
212         if (!(f = fopen("/etc/crypttab", "re"))) {
213
214                 if (errno == ENOENT)
215                         r = EXIT_SUCCESS;
216                 else {
217                         r = EXIT_FAILURE;
218                         log_error("Failed to open /etc/crypttab: %m");
219                 }
220
221                 goto finish;
222         }
223
224         for (;;) {
225                 char line[LINE_MAX], *l;
226                 char *name = NULL, *device = NULL, *password = NULL, *options = NULL;
227                 int k;
228
229                 if (!(fgets(line, sizeof(line), f)))
230                         break;
231
232                 n++;
233
234                 l = strstrip(line);
235                 if (*l == '#' || *l == 0)
236                         continue;
237
238                 if ((k = sscanf(l, "%ms %ms %ms %ms", &name, &device, &password, &options)) < 2 || k > 4) {
239                         log_error("Failed to parse /etc/crypttab:%u, ignoring.", n);
240                         r = EXIT_FAILURE;
241                         goto next;
242                 }
243
244                 if (create_disk(name, device, password, options) < 0)
245                         r = EXIT_FAILURE;
246
247         next:
248                 free(name);
249                 free(device);
250                 free(password);
251                 free(options);
252         }
253
254 finish:
255         return r;
256 }