]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/cryptsetup-generator.c
cryptsetup: automatically order crypt partitions before cryptsetup.target
[thirdparty/systemd.git] / src / cryptsetup-generator.c
CommitLineData
e23a0ce8
LP
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <string.h>
23#include <errno.h>
24#include <unistd.h>
25
26#include "log.h"
27#include "util.h"
28#include "unit-name.h"
29
30const char *arg_dest = "/tmp";
31
32static bool has_option(const char *haystack, const char *needle) {
33 const char *f = haystack;
34 size_t l;
35
36 l = strlen(needle);
37
38 while ((f = strstr(f, needle))) {
39
40 if (f > haystack && f[-1] != ',') {
41 f++;
42 continue;
43 }
44
45 if (f[l] != 0 && f[l] == ',') {
46 f++;
47 continue;
48 }
49
50 return true;
51 }
52
53 return false;
54}
55
56static int create_disk(
57 const char *name,
58 const char *device,
59 const char *password,
60 const char *options) {
61
74715b82 62 char *p = NULL, *n = NULL, *d = NULL, *u = NULL, *from = NULL, *to = NULL, *e = NULL;
e23a0ce8
LP
63 int r;
64 FILE *f = NULL;
65
66 assert(name);
67 assert(device);
68
69 if (!(n = unit_name_build_escape("cryptsetup", name, ".service"))) {
70 r = -ENOMEM;
71 log_error("Failed to allocate unit name.");
72 goto fail;
73 }
74
75 if (asprintf(&p, "%s/%s", arg_dest, n) < 0) {
76 r = -ENOMEM;
77 log_error("Failed to allocate unit file name.");
78 goto fail;
79 }
80
81 if (!(u = fstab_node_to_udev_node(device))) {
82 r = -ENOMEM;
83 log_error("Failed to allocate device node.");
84 goto fail;
85 }
86
87 if (!(d = unit_name_from_path(u, ".device"))) {
88 r = -ENOMEM;
89 log_error("Failed to allocate device name.");
90 goto fail;
91 }
92
93 if (!(f = fopen(p, "wxe"))) {
94 r = -errno;
95 log_error("Failed to create unit file: %m");
96 goto fail;
97 }
98
99 fprintf(f,
100 "[Unit]\n"
101 "Description=Cryptography Setup for %%f\n"
102 "DefaultDependencies=no\n"
49d50c55 103 "BindTo=%s dev-mapper-%%i.device\n"
e23a0ce8 104 "After=systemd-readahead-collect.service systemd-readahead-replay.service %s\n"
2f8cd170 105 "Before=dev-mapper-%%i.device shutdown.target cryptsetup.target\n",
e23a0ce8
LP
106 d, d);
107
108 if (password && (streq(password, "/dev/urandom") ||
109 streq(password, "/dev/random") ||
110 streq(password, "/dev/hw_random")))
111 fprintf(f,
112 "After=systemd-random-seed-load.service\n");
113
114 fprintf(f,
115 "\n[Service]\n"
116 "Type=oneshot\n"
117 "RemainAfterExit=yes\n"
260ab287 118 "ExecStart=" SYSTEMD_CRYPTSETUP_PATH " attach '%s' '%s' '%s' '%s'\n"
7f4e0805 119 "ExecStop=" SYSTEMD_CRYPTSETUP_PATH " detach '%s'\n",
e23a0ce8
LP
120 name, u, strempty(password), strempty(options),
121 name);
122
123 if (options && has_option(options, "tmp"))
124 fprintf(f,
125 "ExecStartPost=/sbin/mke2fs '%s'",
126 u);
127
128 if (options && has_option(options, "swap"))
129 fprintf(f,
130 "ExecStartPost=/sbin/mkswap '%s'",
131 u);
132
133 fflush(f);
134
135 if (ferror(f)) {
136 r = -errno;
137 log_error("Failed to write file: %m");
138 goto fail;
139 }
140
74715b82
LP
141 if (asprintf(&from, "../%s", n) < 0) {
142 r = -ENOMEM;
143 goto fail;
144 }
145
e23a0ce8
LP
146 if (!options || !has_option(options, "noauto")) {
147
148 if (asprintf(&to, "%s/%s.wants/%s", arg_dest, d, n) < 0) {
149 r = -ENOMEM;
150 goto fail;
151 }
152
e23a0ce8
LP
153 mkdir_parents(to, 0755);
154
155 if (symlink(from, to) < 0) {
156 log_error("Failed to create symlink '%s' to '%s': %m", from, to);
157 r = -errno;
158 goto fail;
159 }
2f8cd170
LP
160
161 free(to);
162 to = NULL;
163
164 if (!options || !has_option(options, "nofail")) {
165
166 if (asprintf(&to, "%s/cryptsetup.target.wants/%s", arg_dest, n) < 0) {
167 r = -ENOMEM;
168 goto fail;
169 }
170
171 mkdir_parents(to, 0755);
172
173 if (symlink(from, to) < 0) {
174 log_error("Failed to create symlink '%s' to '%s': %m", from, to);
175 r = -errno;
176 goto fail;
177 }
178 }
e23a0ce8
LP
179 }
180
74715b82
LP
181 free(to);
182 to = NULL;
183
184 e = unit_name_escape(name);
8c4dd542 185 if (asprintf(&to, "%s/dev-mapper-%s.device.requires/%s", arg_dest, e, n) < 0) {
74715b82
LP
186 r = -ENOMEM;
187 goto fail;
188 }
189
190 mkdir_parents(to, 0755);
191
192 if (symlink(from, to) < 0) {
193 log_error("Failed to create symlink '%s' to '%s': %m", from, to);
194 r = -errno;
195 goto fail;
196 }
197
e23a0ce8
LP
198 r = 0;
199
200fail:
201 free(p);
202 free(n);
203 free(d);
74715b82 204 free(e);
e23a0ce8
LP
205
206 free(from);
207 free(to);
208
209 if (f)
210 fclose(f);
211
212 return r;
213}
214
215int main(int argc, char *argv[]) {
216 FILE *f;
217 int r = EXIT_SUCCESS;
218 unsigned n = 0;
219
220 if (argc > 2) {
221 log_error("This program takes one or no arguments.");
222 return EXIT_FAILURE;
223 }
224
225 arg_dest = argv[1];
226
227 log_set_target(LOG_TARGET_SYSLOG_OR_KMSG);
228 log_parse_environment();
229 log_open();
230
231 if (!(f = fopen("/etc/crypttab", "re"))) {
232
233 if (errno == ENOENT)
234 r = EXIT_SUCCESS;
235 else {
236 r = EXIT_FAILURE;
237 log_error("Failed to open /etc/crypttab: %m");
238 }
239
240 goto finish;
241 }
242
243 for (;;) {
244 char line[LINE_MAX], *l;
245 char *name = NULL, *device = NULL, *password = NULL, *options = NULL;
246 int k;
247
248 if (!(fgets(line, sizeof(line), f)))
249 break;
250
251 n++;
252
253 l = strstrip(line);
254 if (*l == '#' || *l == 0)
255 continue;
256
257 if ((k = sscanf(l, "%ms %ms %ms %ms", &name, &device, &password, &options)) < 2 || k > 4) {
258 log_error("Failed to parse /etc/crypttab:%u, ignoring.", n);
259 r = EXIT_FAILURE;
260 goto next;
261 }
262
263 if (create_disk(name, device, password, options) < 0)
264 r = EXIT_FAILURE;
265
266 next:
267 free(name);
268 free(device);
269 free(password);
270 free(options);
271 }
272
273finish:
274 return r;
275}