diff options
author | A. Wilcox <AWilcox@Wilcox-Tech.com> | 2019-10-31 21:30:06 -0500 |
---|---|---|
committer | A. Wilcox <AWilcox@Wilcox-Tech.com> | 2019-10-31 21:30:06 -0500 |
commit | 011f7069677c77ee3039d94aef7bc25030ab3309 (patch) | |
tree | 0ac1ae8a99d8f8d58ebb47efb6481289aa570f79 /hscript | |
parent | 1342fe0f855d72642c250c7c4be3509fb2257d7b (diff) | |
download | horizon-011f7069677c77ee3039d94aef7bc25030ab3309.tar.gz horizon-011f7069677c77ee3039d94aef7bc25030ab3309.tar.bz2 horizon-011f7069677c77ee3039d94aef7bc25030ab3309.tar.xz horizon-011f7069677c77ee3039d94aef7bc25030ab3309.zip |
hscript: Implement Encrypt, add tests
Diffstat (limited to 'hscript')
-rw-r--r-- | hscript/disk.cc | 31 | ||||
-rw-r--r-- | hscript/disk.hh | 15 | ||||
-rw-r--r-- | hscript/script.cc | 33 |
3 files changed, 78 insertions, 1 deletions
diff --git a/hscript/disk.cc b/hscript/disk.cc index 05fb6d2..ad253b3 100644 --- a/hscript/disk.cc +++ b/hscript/disk.cc @@ -233,6 +233,37 @@ bool DiskLabel::execute(ScriptOptions options) const { } +Key *Encrypt::parseFromData(const std::string &data, int lineno, int *errors, + int *) { + std::string::size_type sep = data.find(' '); + std::string dev, pass; + + if(sep == std::string::npos) { + dev = data; + } else { + dev = data.substr(0, sep); + pass = data.substr(sep + 1); + } + + if(dev.size() < 6 || dev.compare(0, 5, "/dev/")) { + if(errors) *errors += 1; + output_error("installfile:" + std::to_string(lineno), + "encrypt: expected path to block device"); + return nullptr; + } + + return new Encrypt(lineno, dev, pass); +} + +bool Encrypt::validate(ScriptOptions) const { + return true; +} + +bool Encrypt::execute(ScriptOptions) const { + return false; +} + + /*! Parse a size string into a size and type. * @param in_size (in) The string to parse. * @param out_size (out) Where to which to write the size in bytes or %. diff --git a/hscript/disk.hh b/hscript/disk.hh index f3a8a4c..7722780 100644 --- a/hscript/disk.hh +++ b/hscript/disk.hh @@ -114,6 +114,21 @@ public: }; class Encrypt : public Key { +private: + const std::string _block; + const std::string _pw; + + Encrypt(int _line, const std::string &_b, const std::string &_p) : + Key(_line), _block(_b), _pw(_p) {} +public: + /*! Retrieve the block device that this key encrypts. */ + const std::string device() const { return this->_block; } + /*! Retrieve the passphrase used to encrypt the block device. */ + const std::string passphrase() const { return this->_pw; } + + static Key *parseFromData(const std::string &, int, int*, int*); + bool validate(ScriptOptions) const override; + bool execute(ScriptOptions) const override; }; class LVMPhysical : public StringKey { diff --git a/hscript/script.cc b/hscript/script.cc index ea083a8..cc819e4 100644 --- a/hscript/script.cc +++ b/hscript/script.cc @@ -123,6 +123,8 @@ struct Script::ScriptPrivate { std::vector< std::unique_ptr<LVMGroup> > lvm_vgs; /*! LVM logical volume keys */ std::vector< std::unique_ptr<LVMVolume> > lvm_lvs; + /*! LUKS creation keys */ + std::vector< std::unique_ptr<Encrypt> > luks; /*! Filesystem creation keys */ std::vector< std::unique_ptr<Filesystem> > fses; /*! Target system's mountpoints. */ @@ -211,6 +213,10 @@ struct Script::ScriptPrivate { std::unique_ptr<LVMVolume> lv(dynamic_cast<LVMVolume *>(obj)); this->lvm_lvs.push_back(std::move(lv)); return true; + } else if(key_name == "encrypt") { + std::unique_ptr<Encrypt> e(dynamic_cast<Encrypt *>(obj)); + this->luks.push_back(std::move(e)); + return true; } else if(key_name == "fs") { std::unique_ptr<Filesystem> fs(dynamic_cast<Filesystem *>(obj)); this->fses.push_back(std::move(fs)); @@ -706,7 +712,8 @@ bool add_default_repos(std::vector<std::unique_ptr<Keys::Repository>> &repos) { bool Script::validate() const { int failures = 0; std::set<std::string> seen_diskids, seen_labels, seen_parts, seen_pvs, - seen_vg_names, seen_vg_pvs, seen_lvs, seen_fses, seen_mounts; + seen_vg_names, seen_vg_pvs, seen_lvs, seen_fses, seen_mounts, + seen_luks; std::map<const std::string, int> seen_iface; #ifdef HAS_INSTALL_ENV error_code ec; @@ -1004,6 +1011,30 @@ bool Script::validate() const { " does not exist");\ } + /* REQ: Runner.Validate.encrypt */ + for(auto &crypt : this->internal->luks) { + if(!crypt->validate(this->opts)) { + failures++; + continue; + } + + /* REQ: Runner.Validate.encrypt.Unique */ + if(seen_luks.find(crypt->device()) != seen_luks.end()) { + failures++; + output_error("installfile:" + std::to_string(crypt->lineno()), + "encrypt: encryption is already scheduled for " + + crypt->device()); + } + seen_luks.insert(crypt->device()); + + /* REQ: Runner.Validate.encrypt.Block */ + if(opts.test(InstallEnvironment)) { +#ifdef HAS_INSTALL_ENV + CHECK_EXIST_PART_LV(crypt->device(), "encrypt", crypt->lineno()) +#endif /* HAS_INSTALL_ENV */ + } + } + /* REQ: Runner.Validate.fs */ for(auto &fs : this->internal->fses) { if(!fs->validate(this->opts)) { |