getch 0.5.0 → 0.7.3

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 505fe1616a7fbe15dbb126b4a058abebf52f59ca1c047e698e85dc07dc99fd0d
4
- data.tar.gz: 2cd67e6ba44be6558f732aaee0ee4324c76f571c3c53cee6cbaf3648bffef99b
3
+ metadata.gz: e8949c8a35b78615d49e8a79daadbd70052adc9e84291bdc2832ecf58bbb185d
4
+ data.tar.gz: e44e2466636fa47f72be581818f4648e19a7291ccdf435358b97241b1b12c77b
5
5
  SHA512:
6
- metadata.gz: 4fa666326ce8182467755bf8cb6806c03f5fa8a0e99d666d652a5a22d4d0628456364b0fd72382546ecc575e6f3c5d561b9b19d903b00be502b1af561e57f7a8
7
- data.tar.gz: ddf580e37958246f12e00b3331084bdc6f07a3d5dc251ec1051442b632fdf6487d982e82d8bca88180776b280d67c1f22da85093b2b46f8b1f93366c19bc9f37
6
+ metadata.gz: c4fd298a8d04ddabaf2e1bc53f27af50131479190a7df542840f2557ea227677b42bf7b2bfee25185d305e54b71a934c5723f36e4b0631b50eecba186b1b5e90
7
+ data.tar.gz: 31b0a7f44918791c981b8f4af725d3be13565098dec21fd4948619e3edfa4c66f61fd93e4d646921d5df7be315e77c5ac0d4aeb3fb5ea1b26a9deab900520f32
checksums.yaml.gz.sig CHANGED
Binary file
data/CHANGELOG.md CHANGED
@@ -1,3 +1,18 @@
1
+ ## 0.7.3, release 2024-10
2
+ Add a Workflow to build gem on Github
3
+
4
+ ### Fix
5
+ - Voidlinux, remove 'base-container-full' instead of 'base-voidstrap'.
6
+ - Gentoo, use and configure 'sys-kernel/installkernel', sys-kernel/installkernel-systemd was removed from portage.
7
+
8
+ ## 0.7.0, release 2023-12
9
+ * Add support for ssd disk `/dev/nvme*` #5
10
+ * System with systemd may need `systemd-machine-id-setup && systemctl restart systemd-networkd` after the first boot to make the dhcp works.
11
+ * Install of systemd/encrypt for Gentoo use GRUB instead of bootctl.
12
+ * Luks key if `--encrypt` are created earlier.
13
+ * Remove `noauto` and update arguments of fstab, this make futur system updates more easy.
14
+ * Correct lvm `OPTIONS[:lvm]`instead of the old `OPTIONS[:fs] == 'lvm'`.
15
+
1
16
  ## 0.5.0, release 2023-12
2
17
  * Update Voidlinux url https://repo-default.voidlinux.org.
3
18
  * Add global use="modules-sign" for Gentoo.
data/README.md CHANGED
@@ -49,7 +49,8 @@ You can also use your current `linux` host, just pay attention to the disk that
49
49
  ## Dependencies
50
50
  Getch is build without external libs, so it only require `ruby >= 2.5`.
51
51
 
52
- On a live image of Void, you need to install `xbps-install -S ruby xz gptfdisk`.
52
+ On a live image of Void, you need to install `xbps-install -S ruby xz gptfdisk
53
+ openssl`.
53
54
 
54
55
  ## Install
55
56
  Getch is cryptographically signed, so add my public key (if you haven’t already) as a trusted certificate.
data/getch.gemspec CHANGED
@@ -1,4 +1,6 @@
1
- require File.dirname(__FILE__) + '/lib/getch/version'
1
+ # frozen_string_literal: true
2
+
3
+ require_relative 'lib/getch/version'
2
4
 
3
5
  Gem::Specification.new do |s|
4
6
  s.name = 'getch'
@@ -15,7 +17,7 @@ Gem::Specification.new do |s|
15
17
  'wiki_uri' => 'https://github.com/szorfein/getch'
16
18
  }
17
19
  s.license = 'MIT'
18
- s.required_ruby_version = '>= 2.5.0'
20
+ s.required_ruby_version = '>= 2.6'
19
21
 
20
22
  s.files = Dir.glob('{assets,lib}/**/*', File::FNM_DOTMATCH).reject { |f| File.directory?(f) }
21
23
 
@@ -26,6 +28,6 @@ Gem::Specification.new do |s|
26
28
  s.executables << 'getch'
27
29
  s.require_paths = ['lib']
28
30
 
29
- s.cert_chain = ['certs/szorfein.pem']
30
- s.signing_key = File.expand_path('~/.ssh/gem-private_key.pem')
31
+ #s.cert_chain = ['certs/szorfein.pem']
32
+ #s.signing_key = File.expand_path('~/.ssh/gem-private_key.pem')
31
33
  end
data/lib/cryptsetup.rb CHANGED
@@ -1,3 +1,5 @@
1
+ # frozen_string_literal: true
2
+
1
3
  require 'luks'
2
4
 
3
5
  # Used to interact with dmcrypt
@@ -1,6 +1,7 @@
1
- # frozen_string_litteral: true
1
+ # frozen_string_literal: true
2
2
 
3
3
  module Dracut
4
+ # configure dracut for encypted system
4
5
  class Encrypt < Root
5
6
  def initialize(devs, options)
6
7
  @luks = options[:luks_name]
@@ -26,6 +27,11 @@ module Dracut
26
27
  echo file, 'install_items+=" /boot/boot.key /boot/root.key /etc/crypttab "'
27
28
  end
28
29
 
30
+ def others
31
+ file = "#{@mountpoint}/etc/dracut.conf.d/mods.conf"
32
+ echo file, 'add_dracutmodules+=" crypt "'
33
+ end
34
+
29
35
  private
30
36
 
31
37
  def get_dm_uuid(name)
data/lib/dracut/root.rb CHANGED
@@ -1,9 +1,10 @@
1
- # frozen_string_litteral: true
1
+ # frozen_string_literal: true
2
2
 
3
3
  require 'nito'
4
4
  require_relative '../getch/log'
5
5
 
6
6
  module Dracut
7
+ # base for other dracut child
7
8
  class Root
8
9
  include NiTo
9
10
 
@@ -37,10 +38,8 @@ module Dracut
37
38
  echo file, "kernel_cmdline=\"#{line}\""
38
39
  end
39
40
 
40
- def get_line
41
- end
41
+ def get_line; end
42
42
 
43
- def others
44
- end
43
+ def others; end
45
44
  end
46
45
  end
data/lib/fstab/encrypt.rb CHANGED
@@ -1,6 +1,7 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Fstab
4
+ # configure fstab for encrypt
4
5
  class Encrypt < Root
5
6
  def initialize(devs, options)
6
7
  super
@@ -12,7 +13,7 @@ module Fstab
12
13
 
13
14
  dm = Getch::Helpers.get_dm "boot-#{@luks}"
14
15
  uuid = gen_uuid dm
15
- line = "UUID=#{uuid} /boot #{@fs} noauto,rw,relatime 0 0"
16
+ line = "UUID=#{uuid} /boot #{@fs} defaults,nosuid,noexec,nodev 0 2"
16
17
  echo_a @conf, line
17
18
  end
18
19
 
@@ -28,7 +29,7 @@ module Fstab
28
29
 
29
30
  dm = Getch::Helpers.get_dm "root-#{@luks}"
30
31
  uuid = gen_uuid dm
31
- line = "UUID=#{uuid} / #{@fs} rw,relatime 0 1"
32
+ line = "UUID=#{uuid} / #{@fs} defaults 1 1"
32
33
  echo_a @conf, line
33
34
  end
34
35
 
@@ -37,7 +38,7 @@ module Fstab
37
38
 
38
39
  dm = Getch::Helpers.get_dm "home-#{@luks}"
39
40
  uuid = gen_uuid dm
40
- line = "UUID=#{uuid} /home #{@fs} rw,relatime 0 2"
41
+ line = "UUID=#{uuid} /home #{@fs} defaults,nosuid,nodev 0 2"
41
42
  echo_a @conf, line
42
43
  end
43
44
  end
data/lib/fstab/minimal.rb CHANGED
@@ -1,4 +1,4 @@
1
- # frozen_string_litteral: true
1
+ # frozen_string_literal: true
2
2
 
3
3
  module Fstab
4
4
  class Minimal < Root
data/lib/fstab/root.rb CHANGED
@@ -1,9 +1,10 @@
1
- # frozen_string_litteral: true
1
+ # frozen_string_literal: true
2
2
 
3
3
  require 'nito'
4
4
  require_relative '../getch/log'
5
5
 
6
6
  module Fstab
7
+ # Generating /etc/fstab
7
8
  class Root
8
9
  include NiTo
9
10
 
@@ -36,7 +37,7 @@ module Fstab
36
37
  @efi || return
37
38
 
38
39
  uuid = gen_uuid @efi
39
- line = "UUID=#{uuid} /efi vfat noauto,rw,relatime 0 0"
40
+ line = "UUID=#{uuid} /efi vfat defaults,nosuid,nodev 0 0"
40
41
  echo_a @conf, line
41
42
  end
42
43
 
@@ -44,7 +45,7 @@ module Fstab
44
45
  @boot || return
45
46
 
46
47
  uuid = gen_uuid @boot
47
- line = "UUID=#{uuid} /boot #{@fs} noauto,rw,relatime 0 0"
48
+ line = "UUID=#{uuid} /boot #{@fs} defaults,nosuid,noexec,nodev 0 2"
48
49
  echo_a @conf, line
49
50
  end
50
51
 
@@ -60,7 +61,7 @@ module Fstab
60
61
  @root || return
61
62
 
62
63
  uuid = gen_uuid @root
63
- line = "UUID=#{uuid} / #{@fs} rw,relatime 0 1"
64
+ line = "UUID=#{uuid} / #{@fs} defaults 1 1"
64
65
  echo_a @conf, line
65
66
  end
66
67
 
@@ -68,14 +69,14 @@ module Fstab
68
69
  @home || return
69
70
 
70
71
  uuid = gen_uuid @home
71
- line = "UUID=#{uuid} /home #{@fs} rw,relatime 0 2"
72
+ line = "UUID=#{uuid} /home #{@fs} defaults,nosuid,nodev 0 2"
72
73
  echo_a @conf, line
73
74
  end
74
75
 
75
76
  def write_tmp
76
77
  Getch::Helpers.systemd? && return
77
78
 
78
- line = 'tmpfs /tmp tmpfs defaults,nosuid,nodev 0 0'
79
+ line = 'tmpfs /tmp tmpfs defaults,nosuid,noexec,nodev 0 0'
79
80
  echo_a @conf, line
80
81
  end
81
82
 
@@ -5,6 +5,7 @@ require 'nito'
5
5
  require 'cryptsetup'
6
6
 
7
7
  module Getch
8
+ # define steps/order for getch
8
9
  class Assembly
9
10
  include NiTo
10
11
 
@@ -91,13 +92,24 @@ module Getch
91
92
  @state.post_config
92
93
  end
93
94
 
95
+ # Luks_keys
96
+ # Install external keys to avoid enter password multiple times
97
+ def luks_keys
98
+ return unless OPTIONS[:encrypt] && OPTIONS[:fs] != 'zfs'
99
+
100
+ return if STATES[:luks_keys]
101
+
102
+ CryptSetup.new(DEVS, OPTIONS).keys
103
+ @state.luks_keys
104
+ end
105
+
94
106
  # terraform
95
107
  # Install all the required packages
96
108
  # Also add services
97
109
  def terraform
98
110
  return if STATES[:terraform]
99
111
 
100
- #@fs::PreDeps.new
112
+ # @fs::PreDeps.new
101
113
  @os::Terraform.new
102
114
  @fs::Deps.new
103
115
  @state.terraform
@@ -110,17 +122,6 @@ module Getch
110
122
  @state.services
111
123
  end
112
124
 
113
- # Luks_keys
114
- # Install external keys to avoid enter password multiple times
115
- def luks_keys
116
- return if not OPTIONS[:encrypt] or OPTIONS[:fs] == 'zfs'
117
-
118
- return if STATES[:luks_keys]
119
-
120
- CryptSetup.new(DEVS, OPTIONS).keys
121
- @state.luks_keys
122
- end
123
-
124
125
  # bootloader
125
126
  # Install and configure Grub2 or Systemd-boot with Dracut
126
127
  # Adding keys for Luks
@@ -4,7 +4,10 @@ require 'nito'
4
4
 
5
5
  module Getch
6
6
  module Config
7
+ # install grub
7
8
  class Grub
9
+ include NiTo
10
+
8
11
  def initialize
9
12
  @log = Log.new
10
13
  @disk = OPTIONS[:boot_disk] ||= OPTIONS[:disk]
@@ -14,10 +17,12 @@ module Getch
14
17
  x
15
18
  end
16
19
 
20
+ protected
21
+
17
22
  def x
18
23
  @log.info "Installing Grub on #{@disk}...\n"
19
24
  Helpers.efi? ? grub_efi : grub_bios
20
- end
25
+ end
21
26
 
22
27
  private
23
28
 
@@ -35,7 +40,7 @@ module Getch
35
40
  # In case where efivars is not mounted
36
41
  # avoid error with grub
37
42
  def mount_efivars
38
- NiTo.mount '-t efivarfs', 'efivarfs', '/sys/firmware/efi/efivars'
43
+ mount '-t efivarfs', 'efivarfs', '/sys/firmware/efi/efivars'
39
44
  end
40
45
  end
41
46
  end
data/lib/getch/config.rb CHANGED
@@ -1,9 +1,10 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Getch
4
+ # configurations for the new system
4
5
  module Config
5
6
  def sysctl
6
- pwd = File.expand_path(File.dirname(__FILE__))
7
+ pwd = File.expand_path(__dir__)
7
8
  dest = "#{Getch::MOUNTPOINT}/etc/sysctl.d/"
8
9
 
9
10
  mkdir dest
@@ -17,8 +17,8 @@ module Getch
17
17
 
18
18
  def x
19
19
  Fstab::Encrypt.new(DEVS, OPTIONS).generate
20
- Dracut::Encrypt.new(DEVS, OPTIONS).generate
21
20
  CryptSetup.new(DEVS, OPTIONS).configs
21
+ Dracut::Encrypt.new(DEVS, OPTIONS).generate
22
22
  end
23
23
  end
24
24
  end
@@ -21,7 +21,7 @@ module Getch
21
21
  puts " => Creating a key for #{dev}, password required:"
22
22
  chroot "cryptsetup luksAddKey #{dev} /boot/#{name}"
23
23
  command "chmod 000 /boot/#{name}"
24
- #command "chmod -R g-rwx,o-rwx /boot"
24
+ # command "chmod -R g-rwx,o-rwx /boot"
25
25
  end
26
26
 
27
27
  def crypttab
@@ -52,7 +52,7 @@ module Getch
52
52
  conf = "#{MOUNTPOINT}/etc/crypttab"
53
53
  device = s_uuid(dev)
54
54
  raise "No partuuid for #{dev} #{device}" unless device
55
- raise "Bad partuuid for #{dev} #{device}" if device.kind_of? Array
55
+ raise "Bad partuuid for #{dev} #{device}" if device.is_a?(Array)
56
56
 
57
57
  add_line(conf, "#{mapname} PARTUUID=#{device} #{point} #{rest}")
58
58
  end
@@ -2,6 +2,7 @@
2
2
 
3
3
  module Getch
4
4
  module Gentoo
5
+ # install grub or bootctl
5
6
  class Bootloader
6
7
  def initialize
7
8
  @esp = '/efi'
@@ -11,8 +12,7 @@ module Getch
11
12
 
12
13
  # Dracut is used by sys-kernel/gentoo-kernel
13
14
  def dependencies
14
- Install.new('app-shells/dash')
15
- if Helpers.systemd? and Helpers.efi?
15
+ if Helpers.systemd_minimal?
16
16
  Log.new.info "Systemd-boot alrealy installed...\n"
17
17
  else
18
18
  ChrootOutput.new('emerge --update --newuse sys-boot/grub')
@@ -20,18 +20,22 @@ module Getch
20
20
  end
21
21
 
22
22
  def install
23
- Helpers.grub? ?
24
- Config::Grub.new :
23
+ if Helpers.grub?
24
+ Config::Grub.new
25
+ else
25
26
  bootctl
27
+ end
26
28
 
27
- #ChrootOutput.new('emerge --config sys-kernel/gentoo-kernel')
28
- ChrootOutput.new('emerge --config sys-kernel/gentoo-kernel-bin')
29
+ # ChrootOutput.new('emerge --config sys-kernel/gentoo-kernel')
30
+ ChrootOutput.new('emerge --config sys-kernel/gentoo-kernel-bin') # should also reload grub-mkconfig
29
31
  end
30
32
 
31
33
  def bootctl
32
- @boot ?
33
- with_boot :
34
+ if @boot
35
+ with_boot
36
+ else
34
37
  Chroot.new("bootctl --esp-path=#{@esp} install")
38
+ end
35
39
  end
36
40
 
37
41
  # We need to umount the encrypted /boot first
@@ -22,6 +22,7 @@ module Getch
22
22
  bask
23
23
  gen_cmdline
24
24
  grub_mkconfig
25
+ systemd_mkconfig
25
26
  use_flags
26
27
  make
27
28
  end
@@ -43,14 +44,24 @@ module Getch
43
44
  cmdline.main
44
45
  end
45
46
 
47
+ # https://wiki.gentoo.org/wiki/Handbook:X86/Installation/Kernel#GRUB
46
48
  def grub_mkconfig
47
- return if Helpers.systemd? && Helpers.efi?
49
+ return if Helpers.systemd_minimal?
48
50
 
49
- file = "#{OPTIONS[:mountpoint]}/etc/kernel/postinst.d/90-mkconfig.install"
50
- content = grub_script
51
- mkdir "#{OPTIONS[:mountpoint]}/etc/kernel/postinst.d"
52
- File.write file, content
53
- File.chmod('0755', file)
51
+ # https://wiki.gentoo.org/wiki/Project:Distribution_Kernel
52
+ use = Getch::Gentoo::Use.new('sys-kernel/installkernel')
53
+
54
+ use.add(%w[grub dracut])
55
+ end
56
+
57
+ # https://wiki.gentoo.org/wiki/Handbook:X86/Installation/Kernel#systemd-boot
58
+ def systemd_mkconfig
59
+ return unless Helpers.systemd_minimal?
60
+
61
+ use = Getch::Gentoo::Use.new('sys-apps/systemd')
62
+ use.add('boot')
63
+ other_use = Getch::Gentoo::Use.new('sys-kernel/installkernel')
64
+ other_use.add(%w[systemd-boot dracut])
54
65
  end
55
66
 
56
67
  def use_flags
@@ -60,11 +71,7 @@ module Getch
60
71
 
61
72
  # https://wiki.gentoo.org/wiki/Handbook:AMD64/Installation/Kernel#Alternative:_Using_distribution_kernels
62
73
  def make
63
- if Helpers.systemd?
64
- Install.new('sys-kernel/installkernel-systemd')
65
- else
66
- Install.new('sys-kernel/installkernel-gentoo')
67
- end
74
+ Install.new('sys-kernel/installkernel')
68
75
 
69
76
  # Install.new 'sys-kernel/gentoo-kernel'
70
77
  Install.new 'sys-kernel/gentoo-kernel-bin'
@@ -109,19 +116,6 @@ module Getch
109
116
 
110
117
  File.write(file, "#{name}\n", mode: 'a')
111
118
  end
112
-
113
- def grub_script
114
- <<~SHELL
115
- #!/usr/bin/env sh
116
- set -o errexit
117
-
118
- if ! hash grub-mkconfig ; then
119
- exit 0
120
- fi
121
-
122
- grub-mkconfig -o /boot/grub/grub.cfg
123
- SHELL
124
- end
125
119
  end
126
120
  end
127
121
  end
@@ -23,6 +23,7 @@ module Getch
23
23
  @pkgs << ' sys-kernel/linux-firmware'
24
24
  @pkgs << ' sys-firmware/intel-microcode'
25
25
  @pkgs << ' sys-fs/dosfstools' if Helpers.efi?
26
+ @pkgs << ' app-shells/dash'
26
27
  Install.new(@pkgs)
27
28
  end
28
29
 
@@ -60,7 +60,7 @@ module Getch
60
60
  use = Getch::Gentoo::Use.new('sys-boot/grub')
61
61
  flags << '-grub_platforms_efi-64' unless Helpers.efi?
62
62
  flags << 'libzfs' if OPTIONS[:fs] == 'zfs'
63
- flags << 'device-mapper' if OPTIONS[:fs] == 'lvm' || OPTIONS[:encrypt]
63
+ flags << 'device-mapper' if OPTIONS[:lvm] || OPTIONS[:encrypt]
64
64
  use.add(flags)
65
65
  end
66
66
 
@@ -74,7 +74,7 @@ module Getch
74
74
  end
75
75
 
76
76
  def lvm
77
- return unless Getch::OPTIONS[:fs] == 'lvm'
77
+ return unless Getch::OPTIONS[:lvm]
78
78
 
79
79
  use = Getch::Gentoo::Use.new
80
80
  use.add_global('lvm', 'device-mapper')
data/lib/getch/gentoo.rb CHANGED
@@ -5,6 +5,7 @@ require_relative 'gentoo/use'
5
5
  require_relative 'gentoo/use_flag'
6
6
 
7
7
  module Getch
8
+ # all class to install Gentoo linux
8
9
  module Gentoo
9
10
  end
10
11
  end
data/lib/getch/guard.rb CHANGED
@@ -12,11 +12,23 @@ end
12
12
  class InvalidKeymap < StandardError
13
13
  end
14
14
 
15
+ def valid_disk(name)
16
+ case name
17
+ when /^sd|^hd|^vd/
18
+ true
19
+ when /^nvm/
20
+ true
21
+ else
22
+ false
23
+ end
24
+ end
25
+
15
26
  module Getch
27
+ # various guard
16
28
  module Guard
17
29
  def self.disk(name)
18
30
  raise InvalidDisk, 'No disk.' unless name
19
- raise InvalidDisk, "Bad device name #{name}." unless name.match(/^?d[a-z]{1}$/)
31
+ raise InvalidDisk, "Bad device name #{name}." unless valid_disk(name)
20
32
  raise InvalidDisk, "Disk /dev/#{name} no found." unless File.exist? "/dev/#{name}"
21
33
 
22
34
  name
data/lib/getch/helpers.rb CHANGED
@@ -28,6 +28,11 @@ module Getch
28
28
  File.exist? "#{OPTIONS[:mountpoint]}/etc/default/grub"
29
29
  end
30
30
 
31
+ # if systemd without encryption
32
+ def self.systemd_minimal?
33
+ systemd? && efi? && !OPTIONS[:encrypt]
34
+ end
35
+
31
36
  def self.get_file_online(url, dest)
32
37
  URI.open(url) do |l|
33
38
  File.open(dest, 'wb') { |f| f.write(l.read) }
data/lib/getch/log.rb CHANGED
@@ -3,8 +3,8 @@
3
3
  require 'logger'
4
4
 
5
5
  module Getch
6
+ # Display message to stdout and write in a log file.
6
7
  class Log
7
-
8
8
  WHITE = "\033[37m"
9
9
  CYAN = "\033[36m"
10
10
  MAGENTA = "\033[35m"
@@ -16,13 +16,13 @@ module Getch
16
16
  BOLD = "\033[1m"
17
17
  CLEAR = "\033[0m"
18
18
 
19
- def initialize(verbose = false)
19
+ def initialize(verbose: false)
20
20
  @log_file = '/tmp/log_install.txt'
21
21
  @verbose = verbose
22
22
  init
23
23
  end
24
24
 
25
- # TODO remove length
25
+ # TODO, remove length
26
26
  def info(msg)
27
27
  tab = msg.match("\n") ? '' : add_tab(msg)
28
28
  l = msg.length
@@ -62,32 +62,32 @@ module Getch
62
62
 
63
63
  def init_res
64
64
  @result = Logger.new $stdout, level: 'INFO'
65
- @result.formatter = proc do | _, _, _, msg | msg end
65
+ @result.formatter = proc do |_, _, _, msg| msg end
66
66
  end
67
67
 
68
68
  def init_debug
69
69
  @debug = Logger.new $stdout
70
- @debug.formatter = proc do | severity, _, _, msg |
70
+ @debug.formatter = proc do |severity, _, _, msg|
71
71
  "\n#{BLUE}#{BOLD}#{severity[0]}#{CLEAR} [#{Process.pid}]#{CLEAR}#{msg}"
72
72
  end
73
73
  end
74
74
 
75
75
  def init_error
76
76
  @error = Logger.new $stdout
77
- @error.formatter = proc do | severity, _, _, msg |
77
+ @error.formatter = proc do |severity, _, _, msg|
78
78
  "#{RED}#{BOLD}#{severity[0]}#{CLEAR}#{msg}\t"
79
79
  end
80
80
  end
81
81
 
82
82
  def init_fatal
83
83
  @fatal = Logger.new $stdout
84
- @fatal.formatter = proc do | severity, _, _, msg |
84
+ @fatal.formatter = proc do |severity, _, _, msg|
85
85
  "\n#{YELLOW}#{BOLD}#{severity[0]}#{CLEAR}#{msg}"
86
86
  end
87
87
  end
88
88
 
89
89
  def init_save
90
- File.exist? @log_file || puts("Creating log at #{@log_file}")
90
+ File.exist?(@log_file) || puts("Creating log at #{@log_file}")
91
91
  @save = Logger.new(@log_file, 1)
92
92
  @save.level = Logger::DEBUG
93
93
  @save.formatter = proc { |severity, datetime, _, msg|
@@ -108,7 +108,7 @@ module Getch
108
108
 
109
109
  def add_tab(text)
110
110
  case text.length
111
- when 39..47 then "\t\t"
111
+ when 39..46 then "\t\t"
112
112
  when 31..38 then "\t\t\t"
113
113
  when 23..30 then "\t\t\t\t"
114
114
  when 16..22 then "\t\t\t\t\t"
data/lib/getch/tree.rb CHANGED
@@ -2,8 +2,8 @@
2
2
 
3
3
  module Getch
4
4
  module Tree
5
+ # call class depend of the os choosen
5
6
  class Os
6
-
7
7
  OS_TREE = {
8
8
  gentoo: Gentoo,
9
9
  void: Void
@@ -18,26 +18,27 @@ module Getch
18
18
  OS_TREE[@os.to_sym] || @log.fatal('OS no found')
19
19
  end
20
20
  end
21
- class FS
22
21
 
22
+ # call class depend on filesystem choosen.
23
+ class FS
23
24
  FS_TREE = {
24
25
  true => { # + encrypt
25
26
  true => { # + lvm
26
- ext4: FileSystem::Ext4::Hybrid,
27
+ ext4: FileSystem::Ext4::Hybrid
27
28
  },
28
29
  false => { # - lvm
29
30
  ext4: FileSystem::Ext4::Encrypt,
30
31
  zfs: FileSystem::Zfs::Encrypt
31
- },
32
+ }
32
33
  },
33
34
  false => { # - encrypt
34
35
  true => { # + lvm
35
- ext4: FileSystem::Ext4::Lvm,
36
+ ext4: FileSystem::Ext4::Lvm
36
37
  },
37
38
  false => { # - lvm
38
39
  ext4: FileSystem::Ext4::Minimal,
39
- zfs: FileSystem::Zfs::Minimal,
40
- },
40
+ zfs: FileSystem::Zfs::Minimal
41
+ }
41
42
  }
42
43
  }.freeze
43
44
 
data/lib/getch/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Getch
4
- VERSION = '0.5.0'
4
+ VERSION = '0.7.3'
5
5
  end
@@ -1,7 +1,11 @@
1
+ # frozen_string_literal: true
2
+
1
3
  module Getch
2
4
  module Void
5
+ # install dependencies packages
3
6
  class Terraform
4
7
  def initialize
8
+ @deps = 'sudo'
5
9
  x
6
10
  end
7
11
 
@@ -12,13 +16,13 @@ module Getch
12
16
  end
13
17
 
14
18
  def install_pkgs
15
- @pkgs = 'sudo'
19
+ @pkgs = @deps.dup
16
20
  @pkgs << ' vim'
17
21
  @pkgs << ' iptables'
18
22
  @pkgs << ' runit-iptables'
19
23
  @pkgs << ' iwd'
20
24
  @pkgs << ' dhcpcd'
21
- @pkgs << ' lvm2' if OPTIONS[:fs] == 'lvm'
25
+ @pkgs << ' lvm2' if OPTIONS[:lvm]
22
26
  @pkgs << ' zfs' if OPTIONS[:fs] == 'zfs'
23
27
  @pkgs << ' cryptsetup' if OPTIONS[:encrypt]
24
28
  Install.new(@pkgs)
@@ -26,7 +26,7 @@ module Getch
26
26
  def update
27
27
  ChrootOutput.new '/usr/bin/xbps-install -uy'
28
28
  ChrootOutput.new '/usr/bin/xbps-install', '-Sy', 'base-system'
29
- ChrootOutput.new '/usr/bin/xbps-remove -y base-voidstrap'
29
+ ChrootOutput.new '/usr/bin/xbps-remove -y base-container-full'
30
30
  end
31
31
  end
32
32
  end
data/lib/getch/void.rb CHANGED
@@ -1,6 +1,7 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module Getch
4
+ # All class to install Voidlinux
4
5
  module Void
5
6
  end
6
7
  end
data/lib/luks.rb CHANGED
@@ -3,8 +3,10 @@
3
3
  require 'nito'
4
4
  require 'getch/log'
5
5
  require 'getch/command'
6
+ require 'English'
6
7
 
7
8
  module Luks
9
+ # define luks name, path, etc...
8
10
  class Main
9
11
  include Luks
10
12
  include NiTo
@@ -21,7 +23,7 @@ module Luks
21
23
  @mount = nil
22
24
  @bootloader = false
23
25
  @log = Getch::Log.new
24
- @bs = get_bs
26
+ @bs = sector_size
25
27
  end
26
28
 
27
29
  def encrypt
@@ -32,9 +34,11 @@ module Luks
32
34
 
33
35
  def encrypt_with_key
34
36
  make_key
35
- args = @luks_type == 'luks2' ?
36
- "#{@command_args} -q --sector-size #{@bs} -d #{@full_key_path}" :
37
- "#{@command_args} -q -d #{@full_key_path}"
37
+ args = if @luks_type == 'luks2'
38
+ "#{@command_args} -q --sector-size #{@bs} -d #{@full_key_path}"
39
+ else
40
+ "#{@command_args} -q -d #{@full_key_path}"
41
+ end
38
42
  @log.info "Encrypting #{@luks_name} with #{@full_key_path}...\n"
39
43
  cmd_crypt 'cryptsetup', 'luksFormat', args, "/dev/#{@disk}"
40
44
  end
@@ -44,9 +48,8 @@ module Luks
44
48
 
45
49
  @log.info "Opening #{@luks_name} > #{@disk}...\n"
46
50
  cmd_crypt 'cryptsetup', 'open', @command_args, "/dev/#{@disk}", @luks_name
47
- unless File.exist? "/dev/mapper/#{@luks_name}"
48
- raise "No dev /dev/mapper/#{@luks_name}, open it first..."
49
- end
51
+
52
+ raise "No dev /dev/mapper/#{@luks_name}, open it first..." unless File.exist? "/dev/mapper/#{@luks_name}"
50
53
  end
51
54
 
52
55
  def open_with_key(file = nil)
@@ -94,8 +97,7 @@ module Luks
94
97
  cmd_crypt 'cryptsetup', 'close', @luks_name
95
98
  end
96
99
 
97
- def gen_datas
98
- end
100
+ def gen_datas; end
99
101
 
100
102
  protected
101
103
 
@@ -145,29 +147,28 @@ module Luks
145
147
  end
146
148
 
147
149
  def config_grub
148
- return unless @bootloader
150
+ # return unless Getch::Helpers.grub? && !Getch::Helpers.systemd_minimal?
151
+ return unless @bootloader && Getch::Helpers.grub?
149
152
 
150
- if Getch::Helpers.grub?
151
- @log.info ' * Writing to /etc/default/grub...'
152
- line = 'GRUB_ENABLE_CRYPTODISK=y'
153
- echo_a "#{@mountpoint}/etc/default/grub", line
154
- @log.result_ok
155
- end
153
+ @log.info ' * Writing to /etc/default/grub...'
154
+ line = 'GRUB_ENABLE_CRYPTODISK=y'
155
+ echo_a "#{@mountpoint}/etc/default/grub", line
156
+ @log.result_ok
156
157
  end
157
158
 
158
159
  def perm
159
160
  @key_path = "#{@key_dir}/#{@key_name}"
160
161
  @full_key_path = "#{@mountpoint}#{@key_path}"
161
162
  @log.info "Enforcing permission on #{@full_key_path}..."
162
- File.chmod 0400, "#{@mountpoint}#{@key_dir}"
163
- File.chmod 0000, @full_key_path
164
- File.chown 0, 0, @full_key_path
163
+ File.chmod(0400, "#{@mountpoint}#{@key_dir}")
164
+ File.chmod(0000, @full_key_path)
165
+ File.chown(0, 0, @full_key_path)
165
166
  @log.result_ok
166
167
  end
167
168
 
168
169
  private
169
170
 
170
- def get_bs
171
+ def sector_size
171
172
  @disk || @log.fatal("No disk for #{@luks_name}.")
172
173
 
173
174
  sh 'blockdev', '--getpbsz', "/dev/#{@disk}"
@@ -175,16 +176,16 @@ module Luks
175
176
 
176
177
  def cmd_crypt_raw(*args)
177
178
  system args.join(' ')
178
- return if $?.exitstatus == 0
179
+ return if $CHILD_STATUS.success?
179
180
 
180
181
  @log.dbg args.join(' ')
181
- @log.dbg $?
182
+ @log.dbg $CHILD_STATUS.success
182
183
  @log.fatal 'die'
183
184
  end
184
185
 
185
186
  def cmd_crypt(*args)
186
187
  cmd_crypt_raw args
187
- rescue => e
188
+ rescue StandardError => e
188
189
  @log.fatal e
189
190
  end
190
191
 
@@ -193,7 +194,7 @@ module Luks
193
194
  end
194
195
  end
195
196
 
196
- # Boot can decrypt the root (/)
197
+ # Boot can decrypt all other partitions.
197
198
  class Boot < Main
198
199
  def initialize(disk, options)
199
200
  super
@@ -223,6 +224,7 @@ module Luks
223
224
  end
224
225
  end
225
226
 
227
+ # define home partition for luks
226
228
  class Home < Main
227
229
  def initialize(disk, options)
228
230
  super
data.tar.gz.sig CHANGED
Binary file
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: getch
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.0
4
+ version: 0.7.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - szorfein
@@ -36,7 +36,7 @@ cert_chain:
36
36
  urXgRIzALxd/xazPCnoLSXPzfJSI6Y77S1EBvhPd9RaSO8IyH9RhPDP9mnTvW2Kl
37
37
  NAUnoL+txK5a
38
38
  -----END CERTIFICATE-----
39
- date: 2023-12-07 00:00:00.000000000 Z
39
+ date: 2024-10-03 00:00:00.000000000 Z
40
40
  dependencies: []
41
41
  description:
42
42
  email:
@@ -184,7 +184,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
184
184
  requirements:
185
185
  - - ">="
186
186
  - !ruby/object:Gem::Version
187
- version: 2.5.0
187
+ version: '2.6'
188
188
  required_rubygems_version: !ruby/object:Gem::Requirement
189
189
  requirements:
190
190
  - - ">="
metadata.gz.sig CHANGED
Binary file