You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
162 lines
5.6 KiB
162 lines
5.6 KiB
#!/bin/bash |
|
|
|
# called by dracut |
|
check() { |
|
local _rootdev |
|
# if cryptsetup is not installed, then we cannot support encrypted devices. |
|
require_any_binary $systemdutildir/systemd-cryptsetup cryptsetup || return 1 |
|
|
|
[[ $hostonly ]] || [[ $mount_needs ]] && { |
|
for fs in "${host_fs_types[@]}"; do |
|
[[ $fs = "crypto_LUKS" ]] && return 0 |
|
done |
|
return 255 |
|
} |
|
|
|
return 0 |
|
} |
|
|
|
# called by dracut |
|
depends() { |
|
echo dm rootfs-block |
|
return 0 |
|
} |
|
|
|
# called by dracut |
|
installkernel() { |
|
hostonly="" instmods drbg |
|
instmods dm_crypt |
|
|
|
# in case some of the crypto modules moved from compiled in |
|
# to module based, try to install those modules |
|
# best guess |
|
[[ $hostonly ]] || [[ $mount_needs ]] && { |
|
# dmsetup returns s.th. like |
|
# cryptvol: 0 2064384 crypt aes-xts-plain64 :64:logon:cryptsetup:.... |
|
dmsetup table | while read name _ _ is_crypt cipher _; do |
|
[[ $is_crypt != "crypt" ]] && continue |
|
# get the device name |
|
name=/dev/$(dmsetup info -c --noheadings -o blkdevname ${name%:}) |
|
# check if the device exists as a key in our host_fs_types |
|
if [[ ${host_fs_types[$name]+_} ]]; then |
|
# split the cipher aes-xts-plain64 in pieces |
|
_OLD_IFS=$IFS |
|
IFS='-:' |
|
set -- $cipher |
|
IFS=$_OLD_IFS |
|
# try to load the cipher part with "crypto-" prepended |
|
# in non-hostonly mode |
|
hostonly= instmods $(for k in "$@"; do echo "crypto-$k";done) |
|
fi |
|
done |
|
} |
|
return 0 |
|
} |
|
|
|
# called by dracut |
|
cmdline() { |
|
local dev UUID |
|
for dev in "${!host_fs_types[@]}"; do |
|
[[ "${host_fs_types[$dev]}" != "crypto_LUKS" ]] && continue |
|
|
|
UUID=$( |
|
blkid -u crypto -o export $dev \ |
|
| while read line || [ -n "$line" ]; do |
|
[[ ${line#UUID} = $line ]] && continue |
|
printf "%s" "${line#UUID=}" |
|
break |
|
done |
|
) |
|
[[ ${UUID} ]] || continue |
|
printf "%s" " rd.luks.uuid=luks-${UUID}" |
|
done |
|
} |
|
|
|
# called by dracut |
|
install() { |
|
|
|
if [[ $hostonly_cmdline == "yes" ]]; then |
|
local _cryptconf=$(cmdline) |
|
[[ $_cryptconf ]] && printf "%s\n" "$_cryptconf" >> "${initdir}/etc/cmdline.d/90crypt.conf" |
|
fi |
|
|
|
inst_hook cmdline 30 "$moddir/parse-crypt.sh" |
|
if ! dracut_module_included "systemd"; then |
|
inst_multiple cryptsetup rmdir readlink umount |
|
inst_script "$moddir"/cryptroot-ask.sh /sbin/cryptroot-ask |
|
inst_script "$moddir"/probe-keydev.sh /sbin/probe-keydev |
|
inst_hook cmdline 10 "$moddir/parse-keydev.sh" |
|
inst_hook cleanup 30 "$moddir/crypt-cleanup.sh" |
|
fi |
|
|
|
if [[ $hostonly ]] && [[ -f $dracutsysrootdir/etc/crypttab ]]; then |
|
# filter /etc/crypttab for the devices we need |
|
while read _mapper _dev _luksfile _luksoptions || [ -n "$_mapper" ]; do |
|
[[ $_mapper = \#* ]] && continue |
|
[[ $_dev ]] || continue |
|
|
|
[[ $_dev == PARTUUID=* ]] && \ |
|
_dev="/dev/disk/by-partuuid/${_dev#PARTUUID=}" |
|
|
|
[[ $_dev == UUID=* ]] && \ |
|
_dev="/dev/disk/by-uuid/${_dev#UUID=}" |
|
|
|
[[ $_dev == ID=* ]] && \ |
|
_dev="/dev/disk/by-id/${_dev#ID=}" |
|
|
|
echo "$_dev $(blkid $_dev -s UUID -o value)" >> "${initdir}/etc/block_uuid.map" |
|
|
|
# loop through the options to check for the force option |
|
luksoptions=${_luksoptions} |
|
OLD_IFS="${IFS}" |
|
IFS=, |
|
set -- ${luksoptions} |
|
IFS="${OLD_IFS}" |
|
|
|
forceentry="" |
|
while [ $# -gt 0 ]; do |
|
case $1 in |
|
force) |
|
forceentry="yes" |
|
break |
|
;; |
|
esac |
|
shift |
|
done |
|
|
|
# include the entry regardless |
|
if [ "${forceentry}" = "yes" ]; then |
|
echo "$_mapper $_dev $_luksfile $_luksoptions" |
|
else |
|
for _hdev in "${!host_fs_types[@]}"; do |
|
[[ ${host_fs_types[$_hdev]} == "crypto_LUKS" ]] || continue |
|
if [[ $_hdev -ef $_dev ]] || [[ /dev/block/$_hdev -ef $_dev ]]; then |
|
echo "$_mapper $_dev $_luksfile $_luksoptions" |
|
break |
|
fi |
|
done |
|
fi |
|
done < $dracutsysrootdir/etc/crypttab > $initdir/etc/crypttab |
|
mark_hostonly /etc/crypttab |
|
fi |
|
|
|
inst_simple "$moddir/crypt-lib.sh" "/lib/dracut-crypt-lib.sh" |
|
inst_script "$moddir/crypt-run-generator.sh" "/sbin/crypt-run-generator" |
|
|
|
if dracut_module_included "systemd"; then |
|
# the cryptsetup targets are already pulled in by 00systemd, but not |
|
# the enablement symlinks |
|
inst_multiple -o \ |
|
$systemdutildir/system-generators/systemd-cryptsetup-generator \ |
|
$systemdutildir/systemd-cryptsetup \ |
|
$systemdsystemunitdir/systemd-ask-password-console.path \ |
|
$systemdsystemunitdir/systemd-ask-password-console.service \ |
|
$systemdsystemunitdir/cryptsetup.target \ |
|
$systemdsystemunitdir/sysinit.target.wants/cryptsetup.target \ |
|
$systemdsystemunitdir/remote-cryptsetup.target \ |
|
$systemdsystemunitdir/initrd-root-device.target.wants/remote-cryptsetup.target \ |
|
systemd-ask-password systemd-tty-ask-password-agent |
|
fi |
|
|
|
dracut_need_initqueue |
|
}
|
|
|