]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/cryptsetup-generator.c
manager: call generators with umask 0022
[thirdparty/systemd.git] / src / cryptsetup-generator.c
CommitLineData
e23a0ce8
LP
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <string.h>
23#include <errno.h>
24#include <unistd.h>
25
26#include "log.h"
27#include "util.h"
28#include "unit-name.h"
29
30const char *arg_dest = "/tmp";
31
32static bool has_option(const char *haystack, const char *needle) {
33 const char *f = haystack;
34 size_t l;
35
f653f683
LP
36 assert(needle);
37
38 if (!haystack)
39 return false;
40
e23a0ce8
LP
41 l = strlen(needle);
42
43 while ((f = strstr(f, needle))) {
44
45 if (f > haystack && f[-1] != ',') {
46 f++;
47 continue;
48 }
49
aae5220d 50 if (f[l] != 0 && f[l] != ',') {
e23a0ce8
LP
51 f++;
52 continue;
53 }
54
55 return true;
56 }
57
58 return false;
59}
60
61static int create_disk(
62 const char *name,
63 const char *device,
64 const char *password,
65 const char *options) {
66
74715b82 67 char *p = NULL, *n = NULL, *d = NULL, *u = NULL, *from = NULL, *to = NULL, *e = NULL;
e23a0ce8
LP
68 int r;
69 FILE *f = NULL;
155da457 70 bool noauto, nofail;
e23a0ce8
LP
71
72 assert(name);
73 assert(device);
74
155da457
LP
75 noauto = has_option(options, "noauto");
76 nofail = has_option(options, "nofail");
77
e23a0ce8
LP
78 if (!(n = unit_name_build_escape("cryptsetup", name, ".service"))) {
79 r = -ENOMEM;
80 log_error("Failed to allocate unit name.");
81 goto fail;
82 }
83
84 if (asprintf(&p, "%s/%s", arg_dest, n) < 0) {
85 r = -ENOMEM;
86 log_error("Failed to allocate unit file name.");
87 goto fail;
88 }
89
90 if (!(u = fstab_node_to_udev_node(device))) {
91 r = -ENOMEM;
92 log_error("Failed to allocate device node.");
93 goto fail;
94 }
95
96 if (!(d = unit_name_from_path(u, ".device"))) {
97 r = -ENOMEM;
98 log_error("Failed to allocate device name.");
99 goto fail;
100 }
101
102 if (!(f = fopen(p, "wxe"))) {
103 r = -errno;
104 log_error("Failed to create unit file: %m");
105 goto fail;
106 }
107
108 fprintf(f,
109 "[Unit]\n"
a4477e68 110 "Description=Cryptography Setup for %%I\n"
155da457 111 "Conflicts=umount.target\n"
e23a0ce8 112 "DefaultDependencies=no\n"
49d50c55 113 "BindTo=%s dev-mapper-%%i.device\n"
e23a0ce8 114 "After=systemd-readahead-collect.service systemd-readahead-replay.service %s\n"
155da457 115 "Before=umount.target\n",
e23a0ce8
LP
116 d, d);
117
155da457
LP
118 if (!nofail)
119 fprintf(f,
120 "Before=cryptsetup.target\n");
121
e23a0ce8
LP
122 if (password && (streq(password, "/dev/urandom") ||
123 streq(password, "/dev/random") ||
124 streq(password, "/dev/hw_random")))
125 fprintf(f,
126 "After=systemd-random-seed-load.service\n");
127
128 fprintf(f,
129 "\n[Service]\n"
130 "Type=oneshot\n"
131 "RemainAfterExit=yes\n"
90724929 132 "TimeoutSec=0\n" /* the binary handles timeouts anyway */
260ab287 133 "ExecStart=" SYSTEMD_CRYPTSETUP_PATH " attach '%s' '%s' '%s' '%s'\n"
7f4e0805 134 "ExecStop=" SYSTEMD_CRYPTSETUP_PATH " detach '%s'\n",
e23a0ce8
LP
135 name, u, strempty(password), strempty(options),
136 name);
137
f653f683 138 if (has_option(options, "tmp"))
e23a0ce8 139 fprintf(f,
50109038 140 "ExecStartPost=/sbin/mke2fs '/dev/mapper/%s'\n",
1d3399e6 141 name);
e23a0ce8 142
f653f683 143 if (has_option(options, "swap"))
e23a0ce8 144 fprintf(f,
50109038 145 "ExecStartPost=/sbin/mkswap '/dev/mapper/%s'\n",
1d3399e6 146 name);
e23a0ce8
LP
147
148 fflush(f);
149
150 if (ferror(f)) {
151 r = -errno;
152 log_error("Failed to write file: %m");
153 goto fail;
154 }
155
74715b82
LP
156 if (asprintf(&from, "../%s", n) < 0) {
157 r = -ENOMEM;
158 goto fail;
159 }
160
155da457 161 if (!noauto) {
e23a0ce8
LP
162
163 if (asprintf(&to, "%s/%s.wants/%s", arg_dest, d, n) < 0) {
164 r = -ENOMEM;
165 goto fail;
166 }
167
e23a0ce8
LP
168 mkdir_parents(to, 0755);
169
170 if (symlink(from, to) < 0) {
171 log_error("Failed to create symlink '%s' to '%s': %m", from, to);
172 r = -errno;
173 goto fail;
174 }
2f8cd170
LP
175
176 free(to);
177 to = NULL;
178
155da457
LP
179 if (!nofail)
180 asprintf(&to, "%s/cryptsetup.target.requires/%s", arg_dest, n);
181 else
182 asprintf(&to, "%s/cryptsetup.target.wants/%s", arg_dest, n);
2f8cd170 183
155da457
LP
184 if (!to) {
185 r = -ENOMEM;
186 goto fail;
187 }
2f8cd170 188
155da457 189 mkdir_parents(to, 0755);
2f8cd170 190
155da457
LP
191 if (symlink(from, to) < 0) {
192 log_error("Failed to create symlink '%s' to '%s': %m", from, to);
193 r = -errno;
194 goto fail;
2f8cd170 195 }
e23a0ce8
LP
196 }
197
74715b82
LP
198 free(to);
199 to = NULL;
200
201 e = unit_name_escape(name);
8c4dd542 202 if (asprintf(&to, "%s/dev-mapper-%s.device.requires/%s", arg_dest, e, n) < 0) {
74715b82
LP
203 r = -ENOMEM;
204 goto fail;
205 }
206
207 mkdir_parents(to, 0755);
208
209 if (symlink(from, to) < 0) {
210 log_error("Failed to create symlink '%s' to '%s': %m", from, to);
211 r = -errno;
212 goto fail;
213 }
214
e23a0ce8
LP
215 r = 0;
216
217fail:
218 free(p);
219 free(n);
220 free(d);
74715b82 221 free(e);
e23a0ce8
LP
222
223 free(from);
224 free(to);
225
226 if (f)
227 fclose(f);
228
229 return r;
230}
231
232int main(int argc, char *argv[]) {
233 FILE *f;
234 int r = EXIT_SUCCESS;
235 unsigned n = 0;
236
237 if (argc > 2) {
238 log_error("This program takes one or no arguments.");
239 return EXIT_FAILURE;
240 }
241
2a796654
LP
242 if (argc > 1)
243 arg_dest = argv[1];
e23a0ce8
LP
244
245 log_set_target(LOG_TARGET_SYSLOG_OR_KMSG);
246 log_parse_environment();
247 log_open();
248
249 if (!(f = fopen("/etc/crypttab", "re"))) {
250
251 if (errno == ENOENT)
252 r = EXIT_SUCCESS;
253 else {
254 r = EXIT_FAILURE;
255 log_error("Failed to open /etc/crypttab: %m");
256 }
257
258 goto finish;
259 }
260
261 for (;;) {
262 char line[LINE_MAX], *l;
263 char *name = NULL, *device = NULL, *password = NULL, *options = NULL;
264 int k;
265
266 if (!(fgets(line, sizeof(line), f)))
267 break;
268
269 n++;
270
271 l = strstrip(line);
272 if (*l == '#' || *l == 0)
273 continue;
274
275 if ((k = sscanf(l, "%ms %ms %ms %ms", &name, &device, &password, &options)) < 2 || k > 4) {
276 log_error("Failed to parse /etc/crypttab:%u, ignoring.", n);
277 r = EXIT_FAILURE;
278 goto next;
279 }
280
281 if (create_disk(name, device, password, options) < 0)
282 r = EXIT_FAILURE;
283
284 next:
285 free(name);
286 free(device);
287 free(password);
288 free(options);
289 }
290
291finish:
292 return r;
293}