chiark / gitweb /
manager: add log control via RT signals
[elogind.git] / src / cryptsetup-generator.c
1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <string.h>
23 #include <errno.h>
24 #include <unistd.h>
25
26 #include "log.h"
27 #include "util.h"
28 #include "unit-name.h"
29
30 const char *arg_dest = "/tmp";
31
32 static bool has_option(const char *haystack, const char *needle) {
33         const char *f = haystack;
34         size_t l;
35
36         assert(needle);
37
38         if (!haystack)
39                 return false;
40
41         l = strlen(needle);
42
43         while ((f = strstr(f, needle))) {
44
45                 if (f > haystack && f[-1] != ',') {
46                         f++;
47                         continue;
48                 }
49
50                 if (f[l] != 0 && f[l] != ',') {
51                         f++;
52                         continue;
53                 }
54
55                 return true;
56         }
57
58         return false;
59 }
60
61 static int create_disk(
62                 const char *name,
63                 const char *device,
64                 const char *password,
65                 const char *options) {
66
67         char *p = NULL, *n = NULL, *d = NULL, *u = NULL, *from = NULL, *to = NULL, *e = NULL;
68         int r;
69         FILE *f = NULL;
70         bool noauto, nofail;
71
72         assert(name);
73         assert(device);
74
75         noauto = has_option(options, "noauto");
76         nofail = has_option(options, "nofail");
77
78         if (!(n = unit_name_build_escape("cryptsetup", name, ".service"))) {
79                 r = -ENOMEM;
80                 log_error("Failed to allocate unit name.");
81                 goto fail;
82         }
83
84         if (asprintf(&p, "%s/%s", arg_dest, n) < 0) {
85                 r = -ENOMEM;
86                 log_error("Failed to allocate unit file name.");
87                 goto fail;
88         }
89
90         if (!(u = fstab_node_to_udev_node(device))) {
91                 r = -ENOMEM;
92                 log_error("Failed to allocate device node.");
93                 goto fail;
94         }
95
96         if (!(d = unit_name_from_path(u, ".device"))) {
97                 r = -ENOMEM;
98                 log_error("Failed to allocate device name.");
99                 goto fail;
100         }
101
102         if (!(f = fopen(p, "wxe"))) {
103                 r = -errno;
104                 log_error("Failed to create unit file: %m");
105                 goto fail;
106         }
107
108         fprintf(f,
109                 "[Unit]\n"
110                 "Description=Cryptography Setup for %%I\n"
111                 "Conflicts=umount.target\n"
112                 "DefaultDependencies=no\n"
113                 "BindTo=%s dev-mapper-%%i.device\n"
114                 "After=systemd-readahead-collect.service systemd-readahead-replay.service %s\n"
115                 "Before=umount.target\n",
116                 d, d);
117
118         if (!nofail)
119                 fprintf(f,
120                         "Before=cryptsetup.target\n");
121
122         if (password && (streq(password, "/dev/urandom") ||
123                          streq(password, "/dev/random") ||
124                          streq(password, "/dev/hw_random")))
125                 fprintf(f,
126                         "After=systemd-random-seed-load.service\n");
127
128         fprintf(f,
129                 "\n[Service]\n"
130                 "Type=oneshot\n"
131                 "RemainAfterExit=yes\n"
132                 "TimeoutSec=0\n" /* the binary handles timeouts anyway */
133                 "ExecStart=" SYSTEMD_CRYPTSETUP_PATH " attach '%s' '%s' '%s' '%s'\n"
134                 "ExecStop=" SYSTEMD_CRYPTSETUP_PATH " detach '%s'\n",
135                 name, u, strempty(password), strempty(options),
136                 name);
137
138         if (has_option(options, "tmp"))
139                 fprintf(f,
140                         "ExecStartPost=/sbin/mke2fs '/dev/mapper/%s'\n",
141                         name);
142
143         if (has_option(options, "swap"))
144                 fprintf(f,
145                         "ExecStartPost=/sbin/mkswap '/dev/mapper/%s'\n",
146                         name);
147
148         fflush(f);
149
150         if (ferror(f)) {
151                 r = -errno;
152                 log_error("Failed to write file: %m");
153                 goto fail;
154         }
155
156         if (asprintf(&from, "../%s", n) < 0) {
157                 r = -ENOMEM;
158                 goto fail;
159         }
160
161         if (!noauto) {
162
163                 if (asprintf(&to, "%s/%s.wants/%s", arg_dest, d, n) < 0) {
164                         r = -ENOMEM;
165                         goto fail;
166                 }
167
168                 mkdir_parents(to, 0755);
169
170                 if (symlink(from, to) < 0) {
171                         log_error("Failed to create symlink '%s' to '%s': %m", from, to);
172                         r = -errno;
173                         goto fail;
174                 }
175
176                 free(to);
177                 to = NULL;
178
179                 if (!nofail)
180                         asprintf(&to, "%s/cryptsetup.target.requires/%s", arg_dest, n);
181                 else
182                         asprintf(&to, "%s/cryptsetup.target.wants/%s", arg_dest, n);
183
184                 if (!to) {
185                         r = -ENOMEM;
186                         goto fail;
187                 }
188
189                 mkdir_parents(to, 0755);
190
191                 if (symlink(from, to) < 0) {
192                         log_error("Failed to create symlink '%s' to '%s': %m", from, to);
193                         r = -errno;
194                         goto fail;
195                 }
196         }
197
198         free(to);
199         to = NULL;
200
201         e = unit_name_escape(name);
202         if (asprintf(&to, "%s/dev-mapper-%s.device.requires/%s", arg_dest, e, n) < 0) {
203                 r = -ENOMEM;
204                 goto fail;
205         }
206
207         mkdir_parents(to, 0755);
208
209         if (symlink(from, to) < 0) {
210                 log_error("Failed to create symlink '%s' to '%s': %m", from, to);
211                 r = -errno;
212                 goto fail;
213         }
214
215         r = 0;
216
217 fail:
218         free(p);
219         free(n);
220         free(d);
221         free(e);
222
223         free(from);
224         free(to);
225
226         if (f)
227                 fclose(f);
228
229         return r;
230 }
231
232 int main(int argc, char *argv[]) {
233         FILE *f;
234         int r = EXIT_SUCCESS;
235         unsigned n = 0;
236
237         if (argc > 2) {
238                 log_error("This program takes one or no arguments.");
239                 return EXIT_FAILURE;
240         }
241
242         if (argc > 1)
243                 arg_dest = argv[1];
244
245         log_set_target(LOG_TARGET_SYSLOG_OR_KMSG);
246         log_parse_environment();
247         log_open();
248
249         if (!(f = fopen("/etc/crypttab", "re"))) {
250
251                 if (errno == ENOENT)
252                         r = EXIT_SUCCESS;
253                 else {
254                         r = EXIT_FAILURE;
255                         log_error("Failed to open /etc/crypttab: %m");
256                 }
257
258                 goto finish;
259         }
260
261         for (;;) {
262                 char line[LINE_MAX], *l;
263                 char *name = NULL, *device = NULL, *password = NULL, *options = NULL;
264                 int k;
265
266                 if (!(fgets(line, sizeof(line), f)))
267                         break;
268
269                 n++;
270
271                 l = strstrip(line);
272                 if (*l == '#' || *l == 0)
273                         continue;
274
275                 if ((k = sscanf(l, "%ms %ms %ms %ms", &name, &device, &password, &options)) < 2 || k > 4) {
276                         log_error("Failed to parse /etc/crypttab:%u, ignoring.", n);
277                         r = EXIT_FAILURE;
278                         goto next;
279                 }
280
281                 if (create_disk(name, device, password, options) < 0)
282                         r = EXIT_FAILURE;
283
284         next:
285                 free(name);
286                 free(device);
287                 free(password);
288                 free(options);
289         }
290
291 finish:
292         return r;
293 }