crypt_reboot 0.3.0.beta.1 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 01bc4b369ba12b4f4197e8935a0b89a2e6f4a95af950e3e1eb048a389ef7672e
4
- data.tar.gz: 98e360717e15344ae14d41dd9557101c833efa75bcfcd01426096015a7faa2b4
3
+ metadata.gz: c87fe69139eb41dd5bf41ec7e790cef1934e4c0c1d9bac7d46990d0a190a4f7f
4
+ data.tar.gz: d9aa729f6fabb43042a260b53a622a1ad33d1d011301719b7e2f1d141f46dcba
5
5
  SHA512:
6
- metadata.gz: 19d4fe5d9a715a8cc8e6f55bea983f3a676b2af1f17fe4705cb68122e90b17ac378da756bb3f1dadcd02df75f578c89105c84b654d6dc5e6837a0eedc6efba9c
7
- data.tar.gz: 9d9010da9c9177229345ce804491593aaa4336bdeda5e92becc268035b539f4387b6b89f0e2b13d769d4a8b6e932981fa9e2b4e1085da65b5c177166e15bf437
6
+ metadata.gz: 24ebddd15821359a61c6eaab3915b0a6bc70b5d3acae7cfd1dee2a0dcaafe749d52abf22d5e8ead46b10b43bcfeaba7ef78bfed325ef360f740b0c40c6a5e192
7
+ data.tar.gz: 4b4a0ddb6a508f3e590ac2c8df6e78730c244fd1860a14fd4035953d4b066b448d56312dfa908151a1a5ff85db0b984142ec3ad8d611020458264ac1358f2cad
data/CHANGELOG.md CHANGED
@@ -1,3 +1,7 @@
1
+ ## [0.3.0] - 2024-09-27
2
+
3
+ - Refactor ZFS keystore encryption support
4
+
1
5
  ## [0.3.0.beta.1] - 2024-09-26
2
6
 
3
7
  - Add preliminary support for LUKS-keystore-based ZFS encryption implemented by Ubuntu
data/README.md CHANGED
@@ -20,6 +20,14 @@ and `/boot/initrd.img` as initramfs.
20
20
  Will work properly when using standard passphrase-based disk unlocking.
21
21
  Fancy methods such as using an external USB with a passphrase file will fail.
22
22
 
23
+ ## Supported disk encryption methods
24
+
25
+ ### LUKS crypttab
26
+ LUKS-based disk-encryption configured with `/etc/crypttab` file.
27
+
28
+ ### ZFS keystore
29
+ Native ZFS encryption with LUKS-encrypted keystore volume.
30
+
23
31
  ## Compatible Linux distributions
24
32
 
25
33
  Currently, cryptreboot depends on `initramfs-tools` package which is available in
@@ -30,26 +38,27 @@ On the other hand, do not expect it to work on other distributions now.
30
38
  But support for them may come in upcoming versions.
31
39
 
32
40
  Following distributions were tested by the author on the AMD64 machine:
33
- - DappNode 0.2.75 is based on Debian 12, see below
34
- - Debian 12 needs [symlinks for kernel and initramfs](#no-symlinks-to-most-recent-kernel-and-initramfs)
35
- - Pop!_OS 22.04 LTS
36
- - Ubuntu 23.04
37
- - Ubuntu 22.04 LTS
38
- - Ubuntu 20.04 LTS needs tiny adjustments to system settings,
39
- specifically [changing compression](#lz4-initramfs-compression) and
40
- [fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd), but still
41
- [sometimes](#unable-to-kexec-on-reboot-using-old-systemd) reboot experience may be suboptimal
42
- - ~~Ubuntu 18.04 LTS~~ is not supported (initramfs uses *pre-crypttab* format)
41
+
42
+ - LUKS crypttab disk encryption method
43
+ - DappNode 0.2.75 is based on Debian 12, see below
44
+ - Debian 12 needs [symlinks for kernel and initramfs](#no-symlinks-to-most-recent-kernel-and-initramfs)
45
+ - Pop!_OS 22.04 LTS
46
+ - Ubuntu 24.04 LTS
47
+ - Ubuntu 23.04
48
+ - Ubuntu 22.04 LTS
49
+ - Ubuntu 20.04 LTS needs tiny adjustments to system settings,
50
+ specifically [changing compression](#lz4-initramfs-compression) and
51
+ [fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd), but still
52
+ [sometimes](#unable-to-kexec-on-reboot-using-old-systemd) reboot experience may be suboptimal
53
+ - ~~Ubuntu 18.04 LTS~~ is not supported (initramfs uses *pre-crypttab* format)
54
+
55
+ - ZFS keystore disk encryption method
56
+ - Ubuntu 24.04 LTS
57
+ - Ubuntu 22.04 LTS
43
58
 
44
59
  If you have successfully run cryptreboot on another distribution,
45
60
  please contact me and I will update the list.
46
61
 
47
- ## Disk encryption method
48
-
49
- Currently, only LUKS-based disk-encryption is supported.
50
- If you use ZFS native encryption, cryptreboot will [downgrade](https://github.com/phantom-node/cryptreboot/issues/2)
51
- to standard reboot (using kexec).
52
-
53
62
  ## Requirements
54
63
 
55
64
  You need to ensure those are installed:
data/lib/basic_loader.rb CHANGED
@@ -15,11 +15,13 @@ require 'crypt_reboot/gziper'
15
15
  require 'crypt_reboot/initramfs_patch_squeezer'
16
16
  require 'crypt_reboot/kexec_patching_loader'
17
17
  require 'crypt_reboot/lazy_config'
18
+ require 'crypt_reboot/luks_crypt_tab_patcher'
18
19
  require 'crypt_reboot/passphrase_asker'
19
20
  require 'crypt_reboot/patched_initramfs_generator'
20
21
  require 'crypt_reboot/rebooter'
21
22
  require 'crypt_reboot/runner'
22
23
  require 'crypt_reboot/single_assign_restricted_map'
24
+ require 'crypt_reboot/zfs_keystore_patcher'
23
25
  require 'crypt_reboot/cli/exiter'
24
26
  require 'crypt_reboot/cli/happy_exiter'
25
27
  require 'crypt_reboot/cli/params_parsing_executor'
@@ -4,7 +4,7 @@ module CryptReboot
4
4
  module CryptTab
5
5
  # Load crypttab file and return array with deserialized entries
6
6
  class Deserializer
7
- def call(filename = nil, content: read_tolerate_missing(filename))
7
+ def call(filename = nil, content: File.read(filename))
8
8
  split_to_important_lines(content).map do |line|
9
9
  entry_deserializer.call line
10
10
  end
@@ -12,12 +12,6 @@ module CryptReboot
12
12
 
13
13
  private
14
14
 
15
- def read_tolerate_missing(filename)
16
- File.read(filename)
17
- rescue Errno::ENOENT
18
- ''
19
- end
20
-
21
15
  def split_to_important_lines(content)
22
16
  content.split(/\n+|\r+/)
23
17
  .reject(&:empty?)
@@ -19,15 +19,23 @@ module CryptReboot
19
19
 
20
20
  def generate_entry(path)
21
21
  pool = File.basename File.dirname(path)
22
- target = "keystore-#{pool}"
23
- entry_class.new target: target, source: path, key_file: 'none', options: {}, flags: %i[luks discard]
22
+ # Target name is the same as produced by /scripts/zfs script within initramfs
23
+ entry_builder.call target: "keystore-#{pool}", source: path
24
24
  end
25
25
 
26
- attr_reader :zvol_dir, :entry_class
26
+ attr_reader :zvol_dir, :entry_builder
27
27
 
28
- def initialize(zvol_dir: '/dev/zvol', entry_class: Entry)
28
+ def initialize(zvol_dir: '/dev/zvol',
29
+ entry_builder: lambda { |target:, source:|
30
+ # Flags and options are the same as produced by /scripts/zfs script within initramfs
31
+ Entry.new target: target,
32
+ source: source,
33
+ key_file: 'none',
34
+ options: {},
35
+ flags: %i[luks discard]
36
+ })
29
37
  @zvol_dir = zvol_dir
30
- @entry_class = entry_class
38
+ @entry_builder = entry_builder
31
39
  end
32
40
  end
33
41
  end
@@ -5,51 +5,23 @@ module CryptReboot
5
5
  class InitramfsPatchSqueezer
6
6
  def call(initramfs_path)
7
7
  extractor.call(initramfs_path) do |tmp_dir|
8
- main_files(tmp_dir).merge zfs_files(tmp_dir)
8
+ patchers.inject({}) do |files, patcher|
9
+ files.merge patcher.call(tmp_dir)
10
+ end
9
11
  end
10
12
  end
11
13
 
12
14
  private
13
15
 
14
- def main_files(tmp_dir)
15
- full_crypttab_path = File.join(tmp_dir, crypttab_path)
16
- crypttab_entries = crypttab_deserializer.call(full_crypttab_path)
17
- files_generator.call(crypttab_entries, base_dir: tmp_dir, crypttab_path: crypttab_path)
18
- end
19
-
20
- def zfs_files(tmp_dir)
21
- crypttab_entries = zfs_keystore_entries_generator.call
22
- return {} if crypttab_entries.empty?
23
- files = files_generator.call(crypttab_entries, base_dir: tmp_dir, crypttab_path: zfs_crypttab_path)
24
- script_path = File.join(tmp_dir, zfs_script_path)
25
- script = File.read(script_path)
26
- files.merge(zfs_script_path => patch_zfs_script(script))
27
- end
28
-
29
- def patch_zfs_script(script)
30
- patch = "cp #{zfs_crypttab_path} #{crypttab_path}; ${CRYPTROOT}"
31
- script.sub(/^\s*\${CRYPTROOT}\s*$/, patch)
32
- end
33
-
34
- attr_reader :crypttab_path, :zfs_crypttab_path, :zfs_script_path, :extractor,
35
- :crypttab_deserializer, :zfs_keystore_entries_generator, :files_generator
16
+ attr_reader :extractor, :patchers
36
17
 
37
- # rubocop:disable Metrics/ParameterLists
38
- def initialize(crypttab_path = '/cryptroot/crypttab',
39
- zfs_crypttab_path = '/cryptreboot/zfs_crypttab',
40
- zfs_script_path = '/scripts/zfs',
41
- extractor: Initramfs::Extractor.new,
42
- crypttab_deserializer: CryptTab::Deserializer.new,
43
- zfs_keystore_entries_generator: CryptTab::ZfsKeystoreEntriesGenerator.new,
44
- files_generator: FilesGenerator.new)
45
- @crypttab_path = crypttab_path
46
- @zfs_crypttab_path = zfs_crypttab_path
47
- @zfs_script_path = zfs_script_path
18
+ def initialize(extractor: Initramfs::Extractor.new,
19
+ patchers: [
20
+ LuksCryptTabPatcher.new,
21
+ ZfsKeystorePatcher.new
22
+ ])
48
23
  @extractor = extractor
49
- @crypttab_deserializer = crypttab_deserializer
50
- @zfs_keystore_entries_generator = zfs_keystore_entries_generator
51
- @files_generator = files_generator
24
+ @patchers = patchers
52
25
  end
53
- # rubocop:enable Metrics/ParameterLists
54
26
  end
55
27
  end
@@ -0,0 +1,26 @@
1
+ # frozen_string_literal: true
2
+
3
+ module CryptReboot
4
+ # Generate patch (files hash) from files in a directory containing uncompressed initramfs
5
+ class LuksCryptTabPatcher
6
+ def call(dir)
7
+ full_crypttab_path = File.join(dir, crypttab_path)
8
+ return {} unless File.exist?(full_crypttab_path)
9
+
10
+ crypttab_entries = crypttab_deserializer.call(full_crypttab_path)
11
+ files_generator.call(crypttab_entries, base_dir: dir, crypttab_path: crypttab_path)
12
+ end
13
+
14
+ private
15
+
16
+ attr_reader :crypttab_path, :crypttab_deserializer, :files_generator
17
+
18
+ def initialize(crypttab_path: '/cryptroot/crypttab',
19
+ crypttab_deserializer: CryptTab::Deserializer.new,
20
+ files_generator: FilesGenerator.new)
21
+ @crypttab_path = crypttab_path
22
+ @crypttab_deserializer = crypttab_deserializer
23
+ @files_generator = files_generator
24
+ end
25
+ end
26
+ end
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module CryptReboot
4
- VERSION = '0.3.0.beta.1'
4
+ VERSION = '0.3.0'
5
5
  end
@@ -0,0 +1,46 @@
1
+ # frozen_string_literal: true
2
+
3
+ module CryptReboot
4
+ # Generate patch (files hash) from files in a directory containing uncompressed initramfs
5
+ class ZfsKeystorePatcher
6
+ def call(dir)
7
+ crypttab_entries = entries_generator.call
8
+ return {} if crypttab_entries.empty?
9
+
10
+ files_generator
11
+ .call(crypttab_entries, base_dir: dir, crypttab_path: tmp_crypttab_path)
12
+ .merge(script_patch_files(dir))
13
+ end
14
+
15
+ private
16
+
17
+ def script_patch_files(dir)
18
+ path = File.join(dir, script_path)
19
+ content = File.read(path)
20
+ { script_path => patch_script(content) }
21
+ rescue Errno::ENOENT
22
+ {}
23
+ end
24
+
25
+ def patch_script(script)
26
+ comment = '# Following line has been added by cryptreboot'
27
+ patch = "cp #{tmp_crypttab_path} #{crypttab_path}"
28
+ script.sub(/^(\s*)(\${CRYPTROOT})\s*$/, "\n\\1#{comment}\n\\1#{patch}\n\n\\1\\2")
29
+ end
30
+
31
+ attr_reader :crypttab_path, :tmp_crypttab_path, :script_path,
32
+ :entries_generator, :files_generator
33
+
34
+ def initialize(crypttab_path: '/cryptroot/crypttab',
35
+ tmp_crypttab_path: '/cryptreboot/zfs_crypttab',
36
+ script_path: '/scripts/zfs',
37
+ entries_generator: CryptTab::ZfsKeystoreEntriesGenerator.new,
38
+ files_generator: FilesGenerator.new)
39
+ @crypttab_path = crypttab_path
40
+ @tmp_crypttab_path = tmp_crypttab_path
41
+ @script_path = script_path
42
+ @entries_generator = entries_generator
43
+ @files_generator = files_generator
44
+ end
45
+ end
46
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: crypt_reboot
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.3.0.beta.1
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Paweł Pokrywka
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2024-09-26 00:00:00.000000000 Z
11
+ date: 2024-09-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: tty-command
@@ -109,6 +109,7 @@ files:
109
109
  - lib/crypt_reboot/luks/dumper/luks_v2_parser.rb
110
110
  - lib/crypt_reboot/luks/key_fetcher.rb
111
111
  - lib/crypt_reboot/luks/version_detector.rb
112
+ - lib/crypt_reboot/luks_crypt_tab_patcher.rb
112
113
  - lib/crypt_reboot/passphrase_asker.rb
113
114
  - lib/crypt_reboot/patched_initramfs_generator.rb
114
115
  - lib/crypt_reboot/rebooter.rb
@@ -124,6 +125,7 @@ files:
124
125
  - lib/crypt_reboot/safe_temp/mounter.rb
125
126
  - lib/crypt_reboot/single_assign_restricted_map.rb
126
127
  - lib/crypt_reboot/version.rb
128
+ - lib/crypt_reboot/zfs_keystore_patcher.rb
127
129
  homepage: https://phantomno.de/cryptreboot
128
130
  licenses:
129
131
  - MIT