migrate to rust
This commit is contained in:
		
							
								
								
									
										325
									
								
								src/cmd/init/bootstrap.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										325
									
								
								src/cmd/init/bootstrap.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,325 @@
 | 
			
		||||
use eyre::{format_err, Result};
 | 
			
		||||
use log::info;
 | 
			
		||||
use std::path::Path;
 | 
			
		||||
use tokio::{
 | 
			
		||||
    fs,
 | 
			
		||||
    io::{AsyncBufReadExt, BufReader},
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
use super::{exec, mount, retry, retry_or_ignore, try_exec};
 | 
			
		||||
use crate::bootstrap::config::Config;
 | 
			
		||||
use crate::{dkl, utils};
 | 
			
		||||
 | 
			
		||||
pub async fn bootstrap(cfg: Config) {
 | 
			
		||||
    let bs = cfg.bootstrap;
 | 
			
		||||
 | 
			
		||||
    retry_or_ignore(async || {
 | 
			
		||||
        fs::create_dir_all("/boostrap").await?;
 | 
			
		||||
        mount(Some(&bs.dev), "/bootstrap", "ext4", None).await;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
 | 
			
		||||
    let boot_version = utils::param("version", "current");
 | 
			
		||||
    let base_dir = &format!("/bootstrap/{boot_version}");
 | 
			
		||||
 | 
			
		||||
    retry_or_ignore(async || {
 | 
			
		||||
        if !fs::try_exists(&base_dir).await? {
 | 
			
		||||
            info!("creating {base_dir}");
 | 
			
		||||
            fs::create_dir_all(&base_dir).await?
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
 | 
			
		||||
    let sys_cfg: dkl::Config = retry(async || {
 | 
			
		||||
        let sys_cfg_bytes = seed_config(base_dir, &bs.seed).await?;
 | 
			
		||||
        Ok(serde_yaml::from_slice(&sys_cfg_bytes)?)
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
 | 
			
		||||
    mount_system(&sys_cfg, base_dir).await;
 | 
			
		||||
 | 
			
		||||
    retry_or_ignore(async || {
 | 
			
		||||
        let path = "/etc/resolv.conf";
 | 
			
		||||
        if fs::try_exists(path).await? {
 | 
			
		||||
            info!("cp /etc/resolv.conf");
 | 
			
		||||
            fs::copy(path, &format!("/system{path}")).await?;
 | 
			
		||||
        }
 | 
			
		||||
        Ok(())
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
 | 
			
		||||
    retry_or_ignore(async || apply_files(&sys_cfg.files, "/system").await).await;
 | 
			
		||||
 | 
			
		||||
    apply_groups(&sys_cfg.groups, "/system").await;
 | 
			
		||||
    apply_users(&sys_cfg.users, "/system").await;
 | 
			
		||||
 | 
			
		||||
    // TODO VPNs
 | 
			
		||||
 | 
			
		||||
    mount_filesystems(&sys_cfg.mounts, "/system").await;
 | 
			
		||||
 | 
			
		||||
    retry_or_ignore(async || {
 | 
			
		||||
        info!("setting up root user");
 | 
			
		||||
        setup_root_user(&sys_cfg.root_user, "/system").await
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
 | 
			
		||||
    exec("chroot", &["/system", "update-ca-certificates"]).await
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn seed_config(base_dir: &str, seed_url: &Option<String>) -> Result<Vec<u8>> {
 | 
			
		||||
    let cfg_path = &format!("{base_dir}/config.yaml");
 | 
			
		||||
 | 
			
		||||
    if fs::try_exists(cfg_path).await? {
 | 
			
		||||
        return Ok(fs::read(cfg_path).await?);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let bs_tar = "/bootstrap.tar";
 | 
			
		||||
    if !fs::try_exists(bs_tar).await? {
 | 
			
		||||
        if let Some(seed_url) = seed_url.as_ref() {
 | 
			
		||||
            fetch_bootstrap(seed_url, bs_tar).await?;
 | 
			
		||||
        } else {
 | 
			
		||||
            return Err(format_err!(
 | 
			
		||||
                "no {cfg_path}, no {bs_tar} and no seed, can't bootstrap"
 | 
			
		||||
            ));
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    try_exec("tar", &["xf", bs_tar, "-C", base_dir]).await?;
 | 
			
		||||
 | 
			
		||||
    if !fs::try_exists(cfg_path).await? {
 | 
			
		||||
        return Err(format_err!("{cfg_path} does not exist after seeding"));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    Ok(fs::read(cfg_path).await?)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn fetch_bootstrap(seed_url: &str, output_file: &str) -> Result<()> {
 | 
			
		||||
    let tmp_file = &format!("{output_file}.new");
 | 
			
		||||
    let _ = fs::remove_file(tmp_file).await;
 | 
			
		||||
    try_exec("wget", &["-O", tmp_file, seed_url]).await?;
 | 
			
		||||
 | 
			
		||||
    fs::rename(tmp_file, output_file)
 | 
			
		||||
        .await
 | 
			
		||||
        .map_err(|e| format_err!("seed rename failed: {e}"))?;
 | 
			
		||||
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn mount_system(cfg: &dkl::Config, bs_dir: &str) {
 | 
			
		||||
    let mem_dir = "/mem";
 | 
			
		||||
    mount(None, mem_dir, "tmpfs", Some("size=512m")).await;
 | 
			
		||||
 | 
			
		||||
    let layers_dir = &format!("{mem_dir}/layers");
 | 
			
		||||
    let mut lower_dir = String::new();
 | 
			
		||||
 | 
			
		||||
    for layer in &cfg.layers {
 | 
			
		||||
        let src = if layer == "modules" {
 | 
			
		||||
            "/modules.sqfs"
 | 
			
		||||
        } else {
 | 
			
		||||
            &format!("{bs_dir}/{layer}.fs")
 | 
			
		||||
        };
 | 
			
		||||
        let tgt = &format!("{mem_dir}/{layer}.fs");
 | 
			
		||||
        retry(async || {
 | 
			
		||||
            info!("copying layer {layer} from {src}");
 | 
			
		||||
            fs::copy(src, tgt).await?;
 | 
			
		||||
            Ok(())
 | 
			
		||||
        })
 | 
			
		||||
        .await;
 | 
			
		||||
 | 
			
		||||
        let layer_dir = &format!("{layers_dir}/{layer}");
 | 
			
		||||
        mount(Some(tgt), layer_dir, "squashfs", None).await;
 | 
			
		||||
 | 
			
		||||
        if !lower_dir.is_empty() {
 | 
			
		||||
            lower_dir.push(':');
 | 
			
		||||
        }
 | 
			
		||||
        lower_dir.push_str(&layer_dir);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let upper_dir = &format!("{mem_dir}/upper");
 | 
			
		||||
    let work_dir = &format!("{mem_dir}/work");
 | 
			
		||||
 | 
			
		||||
    retry_or_ignore(async || {
 | 
			
		||||
        fs::create_dir_all(upper_dir).await?;
 | 
			
		||||
        fs::create_dir_all(work_dir).await?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
 | 
			
		||||
    mount(
 | 
			
		||||
        None,
 | 
			
		||||
        "/system",
 | 
			
		||||
        "overlay",
 | 
			
		||||
        Some(&format!(
 | 
			
		||||
            "lowerdir={lower_dir},upperdir={upper_dir},workdir={work_dir}"
 | 
			
		||||
        )),
 | 
			
		||||
    )
 | 
			
		||||
    .await;
 | 
			
		||||
 | 
			
		||||
    // make root rshared (default in systemd, required by Kubernetes 1.10+)
 | 
			
		||||
    // equivalent to "mount --make-rshared /"
 | 
			
		||||
    // see kernel's Documentation/sharedsubtree.txt (search rshared)
 | 
			
		||||
    retry_or_ignore(async || {
 | 
			
		||||
        use nix::mount::MsFlags as M;
 | 
			
		||||
        const NONE: Option<&str> = None;
 | 
			
		||||
        nix::mount::mount(NONE, "/system", NONE, M::MS_SHARED | M::MS_REC, NONE)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn chroot(root: &str, path: &str) -> String {
 | 
			
		||||
    format!("{root}/{}", path.trim_start_matches(|c| c == '/'))
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn apply_files(files: &[dkl::File], root: &str) -> Result<()> {
 | 
			
		||||
    for file in files {
 | 
			
		||||
        let path = chroot(root, &file.path);
 | 
			
		||||
        let path = Path::new(&path);
 | 
			
		||||
 | 
			
		||||
        if let Some(parent) = path.parent() {
 | 
			
		||||
            fs::create_dir_all(parent).await?;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        use crate::dkl::FileKind as K;
 | 
			
		||||
        match &file.kind {
 | 
			
		||||
            K::Content(content) => fs::write(path, content.as_bytes()).await?,
 | 
			
		||||
            K::Dir(true) => fs::create_dir(path).await?,
 | 
			
		||||
            K::Dir(false) => {} // shouldn't happen, but semantic is to ignore
 | 
			
		||||
            K::Symlink(tgt) => fs::symlink(tgt, path).await?,
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        match file.kind {
 | 
			
		||||
            K::Symlink(_) => {}
 | 
			
		||||
            _ => set_perms(path, file.mode).await?,
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        info!("created {}", file.path);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn set_perms(path: impl AsRef<Path>, mode: Option<u32>) -> std::io::Result<()> {
 | 
			
		||||
    if let Some(mode) = mode.filter(|m| *m != 0) {
 | 
			
		||||
        use std::os::unix::fs::PermissionsExt;
 | 
			
		||||
        let mode = std::fs::Permissions::from_mode(mode);
 | 
			
		||||
        fs::set_permissions(path, mode).await?;
 | 
			
		||||
    }
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn apply_groups(groups: &[dkl::Group], root: &str) {
 | 
			
		||||
    for group in groups {
 | 
			
		||||
        let mut args = vec![root, "groupadd", "-r"];
 | 
			
		||||
 | 
			
		||||
        let gid = group.gid.map(|s| s.to_string());
 | 
			
		||||
        if let Some(gid) = gid.as_ref() {
 | 
			
		||||
            args.extend(&["-g", gid]);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        args.push(group.name.as_str());
 | 
			
		||||
 | 
			
		||||
        exec("chroot", &args).await;
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn apply_users(users: &[dkl::User], root: &str) {
 | 
			
		||||
    for user in users {
 | 
			
		||||
        let mut args = vec![root, "useradd", "-r"];
 | 
			
		||||
 | 
			
		||||
        let uid = user.uid.map(|s| s.to_string());
 | 
			
		||||
        if let Some(uid) = uid.as_ref() {
 | 
			
		||||
            args.extend(&["-u", uid]);
 | 
			
		||||
        }
 | 
			
		||||
        let gid = user.gid.map(|s| s.to_string());
 | 
			
		||||
        if let Some(gid) = gid.as_ref() {
 | 
			
		||||
            args.extend(&["-g", gid]);
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        args.push(user.name.as_str());
 | 
			
		||||
 | 
			
		||||
        exec("chroot", &args).await;
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn mount_filesystems(mounts: &[dkl::Mount], root: &str) {
 | 
			
		||||
    for m in mounts {
 | 
			
		||||
        let path = chroot(root, &m.path);
 | 
			
		||||
 | 
			
		||||
        mount(
 | 
			
		||||
            Some(&m.dev),
 | 
			
		||||
            &path,
 | 
			
		||||
            m.r#type
 | 
			
		||||
                .as_ref()
 | 
			
		||||
                .filter(|s| !s.is_empty())
 | 
			
		||||
                .map_or("ext4", |s| s.as_str()),
 | 
			
		||||
            m.options
 | 
			
		||||
                .as_ref()
 | 
			
		||||
                .filter(|v| !v.is_empty())
 | 
			
		||||
                .map(|s| s.as_str()),
 | 
			
		||||
        )
 | 
			
		||||
        .await;
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn setup_root_user(user: &dkl::RootUser, root: &str) -> Result<()> {
 | 
			
		||||
    if let Some(pw_hash) = user.password_hash.as_ref().filter(|v| !v.is_empty()) {
 | 
			
		||||
        set_user_password("root", &pw_hash, root).await?;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut authorized_keys = Vec::new();
 | 
			
		||||
    for ak in &user.authorized_keys {
 | 
			
		||||
        authorized_keys.extend(ak.as_bytes());
 | 
			
		||||
        authorized_keys.push(b'\n');
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let ssh_dir = &chroot(root, "root/.ssh");
 | 
			
		||||
    fs::create_dir_all(ssh_dir)
 | 
			
		||||
        .await
 | 
			
		||||
        .map_err(|e| format_err!("mkdir -p {ssh_dir} failed: {e}"))?;
 | 
			
		||||
    set_perms(ssh_dir, Some(0o700))
 | 
			
		||||
        .await
 | 
			
		||||
        .map_err(|e| format_err!("chmod {ssh_dir} failed: {e}"))?;
 | 
			
		||||
 | 
			
		||||
    let ak_path = &format!("{ssh_dir}/authorized_keys");
 | 
			
		||||
    fs::write(ak_path, authorized_keys)
 | 
			
		||||
        .await
 | 
			
		||||
        .map_err(|e| format_err!("write {ak_path} failed: {e}"))?;
 | 
			
		||||
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn set_user_password(user: &str, password_hash: &str, root: &str) -> Result<()> {
 | 
			
		||||
    info!("setting password for {user}");
 | 
			
		||||
 | 
			
		||||
    let user = user.as_bytes();
 | 
			
		||||
    let password_hash = password_hash.as_bytes();
 | 
			
		||||
 | 
			
		||||
    let mut buf = Vec::new();
 | 
			
		||||
 | 
			
		||||
    let pw_file = &chroot(root, "etc/shadow");
 | 
			
		||||
    let rd = fs::File::open(pw_file)
 | 
			
		||||
        .await
 | 
			
		||||
        .map_err(|e| format_err!("open {pw_file} failed: {e}"))?;
 | 
			
		||||
    let mut rd = BufReader::new(rd);
 | 
			
		||||
 | 
			
		||||
    let mut line = Vec::new();
 | 
			
		||||
    while (rd.read_until(b'\n', &mut line).await)
 | 
			
		||||
        .map_err(|e| format_err!("read {pw_file} failed: {e}"))?
 | 
			
		||||
        != 0
 | 
			
		||||
    {
 | 
			
		||||
        let mut split: Vec<_> = line.split(|c| *c == b':').collect();
 | 
			
		||||
        if split.len() > 2 && split[0] == user {
 | 
			
		||||
            split[1] = password_hash;
 | 
			
		||||
            buf.extend(split.join(&b':'));
 | 
			
		||||
        } else {
 | 
			
		||||
            buf.extend(&line);
 | 
			
		||||
        }
 | 
			
		||||
        line.clear();
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    fs::write(pw_file, buf).await?;
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										151
									
								
								src/cmd/init/dmcrypt.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										151
									
								
								src/cmd/init/dmcrypt.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,151 @@
 | 
			
		||||
use eyre::{format_err, Result};
 | 
			
		||||
use log::{error, info, warn};
 | 
			
		||||
use std::collections::BTreeSet as Set;
 | 
			
		||||
use std::process::Stdio;
 | 
			
		||||
use tokio::io::AsyncWriteExt;
 | 
			
		||||
use tokio::process::Command;
 | 
			
		||||
use tokio::sync::Mutex;
 | 
			
		||||
 | 
			
		||||
use super::{retry_or_ignore, USED_DEVS};
 | 
			
		||||
use crate::blockdev::{is_uninitialized, uninitialize};
 | 
			
		||||
use crate::bootstrap::config::{CryptDev, DevFilter};
 | 
			
		||||
use crate::fs::walk_dir;
 | 
			
		||||
use crate::input;
 | 
			
		||||
 | 
			
		||||
pub async fn setup(devs: &[CryptDev]) {
 | 
			
		||||
    if devs.is_empty() {
 | 
			
		||||
        return;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut used_devs = USED_DEVS.lock().await;
 | 
			
		||||
 | 
			
		||||
    // CryptDev.name that have a least one assignment done
 | 
			
		||||
    let mut done = Set::new();
 | 
			
		||||
 | 
			
		||||
    // dmcrypt devices opened here
 | 
			
		||||
    let mut done_crypt = Set::new();
 | 
			
		||||
 | 
			
		||||
    retry_or_ignore(async || {
 | 
			
		||||
        let all_devs = walk_dir("/dev").await;
 | 
			
		||||
 | 
			
		||||
        for dev in devs {
 | 
			
		||||
            let mut mappings = find_dev(dev, &all_devs);
 | 
			
		||||
            mappings.retain(|(_, dev_path)| !used_devs.contains(dev_path));
 | 
			
		||||
 | 
			
		||||
            if mappings.is_empty() && !dev.optional() && !done.contains(&dev.name) {
 | 
			
		||||
                return Err(format_err!("no device found for crypt dev {}", dev.name));
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            for (crypt_dev, dev_path) in mappings {
 | 
			
		||||
                if done_crypt.contains(&crypt_dev) {
 | 
			
		||||
                    continue;
 | 
			
		||||
                }
 | 
			
		||||
 | 
			
		||||
                info!("crypt dev {crypt_dev}: using {dev_path}");
 | 
			
		||||
 | 
			
		||||
                crypt_open(&crypt_dev, &dev_path).await?;
 | 
			
		||||
 | 
			
		||||
                done_crypt.insert(crypt_dev);
 | 
			
		||||
                used_devs.insert(dev_path);
 | 
			
		||||
                done.insert(&dev.name);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        Ok(())
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static PREV_PW: Mutex<String> = Mutex::const_new(String::new());
 | 
			
		||||
 | 
			
		||||
async fn crypt_open(crypt_dev: &str, dev_path: &str) -> Result<()> {
 | 
			
		||||
    'open_loop: loop {
 | 
			
		||||
        let mut prev_pw = PREV_PW.lock().await;
 | 
			
		||||
        let prompt = if prev_pw.is_empty() {
 | 
			
		||||
            format!("crypt password for {crypt_dev}? ")
 | 
			
		||||
        } else {
 | 
			
		||||
            format!("crypt password for {crypt_dev} (enter = reuse previous)? ")
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        let mut pw = input::read_password(prompt).await;
 | 
			
		||||
        if pw.is_empty() {
 | 
			
		||||
            pw = prev_pw.clone();
 | 
			
		||||
        }
 | 
			
		||||
        if pw.is_empty() {
 | 
			
		||||
            error!("empty password provided!");
 | 
			
		||||
            continue;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        *prev_pw = pw.clone();
 | 
			
		||||
 | 
			
		||||
        if cryptsetup(&pw, ["open", dev_path, crypt_dev]).await? {
 | 
			
		||||
            return Ok(());
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        error!("crypt open {crypt_dev} from {dev_path} failed");
 | 
			
		||||
 | 
			
		||||
        if is_uninitialized(dev_path).await? {
 | 
			
		||||
            // we can format the device
 | 
			
		||||
            info!("{dev_path} looks uninitialized, it may be formatted");
 | 
			
		||||
 | 
			
		||||
            match input::read_choice(["[f]ormat", "[r]etry", "[i]gnore"]).await {
 | 
			
		||||
                'r' => continue 'open_loop,
 | 
			
		||||
                'i' => return Ok(()),
 | 
			
		||||
                'f' => {
 | 
			
		||||
                    if !cryptsetup(&pw, ["luksFormat", dev_path]).await? {
 | 
			
		||||
                        return Err(format_err!("cryptsetup luksFormat failed"));
 | 
			
		||||
                    }
 | 
			
		||||
                    if !cryptsetup(&pw, ["open", dev_path, crypt_dev]).await? {
 | 
			
		||||
                        return Err(format_err!("open after format failed"));
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                    if let Err(e) = uninitialize(&format!("/dev/mapper/{crypt_dev}")).await {
 | 
			
		||||
                        warn!("uninitialize failed (ignored): {e}");
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                    return Ok(());
 | 
			
		||||
                }
 | 
			
		||||
                _ => unreachable!(),
 | 
			
		||||
            }
 | 
			
		||||
        } else {
 | 
			
		||||
            // device looks initialized, don't allow format
 | 
			
		||||
            warn!("{dev_path} looks initialized, formatting not allowed from init");
 | 
			
		||||
 | 
			
		||||
            match input::read_choice(["[r]etry", "[i]gnore"]).await {
 | 
			
		||||
                'r' => continue 'open_loop,
 | 
			
		||||
                'i' => return Ok(()),
 | 
			
		||||
                _ => unreachable!(),
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn cryptsetup<const N: usize>(pw: &str, args: [&str; N]) -> Result<bool> {
 | 
			
		||||
    let mut child = Command::new("cryptsetup")
 | 
			
		||||
        .args(args)
 | 
			
		||||
        .arg("--key-file=-")
 | 
			
		||||
        .stdin(Stdio::piped())
 | 
			
		||||
        .spawn()?;
 | 
			
		||||
 | 
			
		||||
    (child.stdin.as_mut().unwrap())
 | 
			
		||||
        .write_all(pw.as_bytes())
 | 
			
		||||
        .await?;
 | 
			
		||||
 | 
			
		||||
    Ok(child.wait().await?.success())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn find_dev(dev: &CryptDev, all_devs: &[String]) -> Vec<(String, String)> {
 | 
			
		||||
    let dev_name = &dev.name;
 | 
			
		||||
    match dev.filter {
 | 
			
		||||
        DevFilter::Dev(ref path) => (all_devs.iter())
 | 
			
		||||
            .filter(|dev_path| dev_path == &path)
 | 
			
		||||
            .map(|dev_path| (dev.name.clone(), dev_path.clone()))
 | 
			
		||||
            .collect(),
 | 
			
		||||
        DevFilter::Prefix(ref prefix) => (all_devs.iter())
 | 
			
		||||
            .filter_map(|path| {
 | 
			
		||||
                let suffix = path.strip_prefix(prefix)?;
 | 
			
		||||
                Some((format!("{dev_name}{suffix}"), path.clone()))
 | 
			
		||||
            })
 | 
			
		||||
            .collect(),
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										215
									
								
								src/cmd/init/lvm.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										215
									
								
								src/cmd/init/lvm.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,215 @@
 | 
			
		||||
use eyre::{format_err, Result};
 | 
			
		||||
use log::{error, info, warn};
 | 
			
		||||
use tokio::process::Command;
 | 
			
		||||
 | 
			
		||||
use super::{exec, retry, retry_or_ignore, USED_DEVS};
 | 
			
		||||
use crate::bootstrap::config::{Config, Filesystem, LvSize, LvmLV, LvmVG, TAKE_ALL};
 | 
			
		||||
use crate::fs::walk_dir;
 | 
			
		||||
use crate::{blockdev, lvm};
 | 
			
		||||
 | 
			
		||||
pub async fn setup(cfg: &Config) {
 | 
			
		||||
    if cfg.lvm.is_empty() {
 | 
			
		||||
        info!("no LVM VG configured");
 | 
			
		||||
        return;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    exec("pvscan", &[]).await;
 | 
			
		||||
    exec("vgscan", &["--mknodes"]).await;
 | 
			
		||||
 | 
			
		||||
    for vg in &cfg.lvm {
 | 
			
		||||
        retry_or_ignore(async || setup_vg(vg).await).await
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let lvs = retry(lvm::lvs).await;
 | 
			
		||||
 | 
			
		||||
    for vg in &cfg.lvm {
 | 
			
		||||
        let vg_name = vg.name.as_str();
 | 
			
		||||
 | 
			
		||||
        for lv in &vg.lvs {
 | 
			
		||||
            let lv_name = lv.name.as_str();
 | 
			
		||||
 | 
			
		||||
            if (lvs.iter()).any(|lv| lv.equal_name(vg_name, lv_name)) {
 | 
			
		||||
                info!("LVM LV {vg_name}/{lv_name} exists");
 | 
			
		||||
            } else {
 | 
			
		||||
                retry_or_ignore(async || setup_lv(&vg, &lv).await).await;
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    exec("vgchange", &["--sysinit", "-a", "ly"]).await;
 | 
			
		||||
 | 
			
		||||
    for vg in &cfg.lvm {
 | 
			
		||||
        for lv in &vg.lvs {
 | 
			
		||||
            retry_or_ignore(async || format_lv(&vg, &lv).await).await;
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn setup_vg(vg: &LvmVG) -> Result<()> {
 | 
			
		||||
    let vg_name = vg.name.as_str();
 | 
			
		||||
 | 
			
		||||
    let pvs = retry(lvm::pvs).await;
 | 
			
		||||
 | 
			
		||||
    let mut dev_done = pvs.iter().filter(|pv| pv.vg_name == vg.name).count();
 | 
			
		||||
    let dev_needed = vg.pvs.n;
 | 
			
		||||
    macro_rules! missing_count {
 | 
			
		||||
        () => {
 | 
			
		||||
            (dev_needed as usize) - dev_done
 | 
			
		||||
        };
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if dev_needed == TAKE_ALL {
 | 
			
		||||
        if dev_done == 0 {
 | 
			
		||||
            info!("setting up LVM VG {vg_name} using all matching devices");
 | 
			
		||||
        } else {
 | 
			
		||||
            // in "take all" mode, don't extend as existing vg at boot
 | 
			
		||||
            info!("LVM VG {vg_name} exists");
 | 
			
		||||
            return Ok(());
 | 
			
		||||
        }
 | 
			
		||||
    } else if dev_done >= (dev_needed as usize) {
 | 
			
		||||
        info!("LVM VG {vg_name} exists with enough devices");
 | 
			
		||||
        return Ok(()); // already set up
 | 
			
		||||
    } else {
 | 
			
		||||
        info!("setting up LVM VG {vg_name} ({dev_done}/{dev_needed} devices configured)");
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let regexps: Vec<regex::Regex> = (vg.pvs.regexps.iter())
 | 
			
		||||
        .filter_map(|re_str| {
 | 
			
		||||
            (re_str.parse())
 | 
			
		||||
                .inspect_err(|e| error!("invalid regex ignored: {re_str:?}: {e}"))
 | 
			
		||||
                .ok()
 | 
			
		||||
        })
 | 
			
		||||
        .collect();
 | 
			
		||||
 | 
			
		||||
    let mut used_devs = USED_DEVS.lock().await;
 | 
			
		||||
 | 
			
		||||
    let matching_devs = (walk_dir("/dev").await.into_iter())
 | 
			
		||||
        .filter(|path| !used_devs.contains(path.as_str()))
 | 
			
		||||
        .filter(|path| regexps.iter().any(|re| re.is_match(path)));
 | 
			
		||||
 | 
			
		||||
    let devs: Vec<_> = if dev_needed == TAKE_ALL {
 | 
			
		||||
        matching_devs.collect()
 | 
			
		||||
    } else {
 | 
			
		||||
        matching_devs.take(missing_count!()).collect()
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let cmd = if dev_done == 0 {
 | 
			
		||||
        if devs.is_empty() {
 | 
			
		||||
            return Err(format_err!("creating but no devices found"));
 | 
			
		||||
        }
 | 
			
		||||
        "vgcreate"
 | 
			
		||||
    } else {
 | 
			
		||||
        "vgextend"
 | 
			
		||||
    };
 | 
			
		||||
    let status = (Command::new(cmd).arg(vg_name).args(&devs))
 | 
			
		||||
        .status()
 | 
			
		||||
        .await?;
 | 
			
		||||
    if !status.success() {
 | 
			
		||||
        return Err(format_err!("{cmd} failed: {status}"));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    dev_done += devs.len();
 | 
			
		||||
    used_devs.extend(devs);
 | 
			
		||||
 | 
			
		||||
    if dev_needed != TAKE_ALL && dev_done < (dev_needed as usize) {
 | 
			
		||||
        return Err(format_err!(
 | 
			
		||||
            "LVM VG {vg_name} needs {} more device(s)",
 | 
			
		||||
            missing_count!()
 | 
			
		||||
        ));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn setup_lv(vg: &LvmVG, lv: &LvmLV) -> Result<()> {
 | 
			
		||||
    let name = format!("{}/{}", vg.name, lv.name);
 | 
			
		||||
    info!("creating LV {name}");
 | 
			
		||||
 | 
			
		||||
    let mut cmd = Command::new("lvcreate");
 | 
			
		||||
    cmd.arg(&vg.name);
 | 
			
		||||
    cmd.args(&["--name", &lv.name]);
 | 
			
		||||
 | 
			
		||||
    match &lv.size {
 | 
			
		||||
        LvSize::Size(sz) => cmd.args(&["-L", sz]),
 | 
			
		||||
        LvSize::Extents(sz) => cmd.args(&["-l", sz]),
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let raid = lv.raid.as_ref().unwrap_or(&vg.defaults.raid);
 | 
			
		||||
 | 
			
		||||
    if let Some(mirrors) = raid.mirrors {
 | 
			
		||||
        cmd.args(&["--mirrors", &mirrors.to_string()]);
 | 
			
		||||
    }
 | 
			
		||||
    if let Some(stripes) = raid.stripes {
 | 
			
		||||
        cmd.args(&["--stripes", &stripes.to_string()]);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let status = cmd.status().await?;
 | 
			
		||||
    if !status.success() {
 | 
			
		||||
        return Err(format_err!("lvcreate failed: {status}"));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if let Err(e) = blockdev::uninitialize(&format!("/dev/{name}")).await {
 | 
			
		||||
        warn!("uninitialize failed (ignored): {e}");
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn format_lv(vg: &LvmVG, lv: &LvmLV) -> Result<()> {
 | 
			
		||||
    let name = &format!("{}/{}", vg.name, lv.name);
 | 
			
		||||
    let dev = &format!("/dev/{name}");
 | 
			
		||||
 | 
			
		||||
    if !blockdev::is_uninitialized(&dev).await? {
 | 
			
		||||
        info!("{dev} looks initialized");
 | 
			
		||||
        return Ok(());
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let fs = lv.fs.as_ref().unwrap_or(&vg.defaults.fs);
 | 
			
		||||
    info!("initializing {} filesystem on {dev}", fs.fstype());
 | 
			
		||||
 | 
			
		||||
    let mkfs = format!("mkfs.{}", fs.fstype());
 | 
			
		||||
 | 
			
		||||
    let mut cmd = Command::new(&mkfs);
 | 
			
		||||
 | 
			
		||||
    // filesystem specific flags
 | 
			
		||||
    match fs {
 | 
			
		||||
        Filesystem::Ext4 => {
 | 
			
		||||
            cmd.arg("-F");
 | 
			
		||||
        }
 | 
			
		||||
        Filesystem::Btrfs | Filesystem::Xfs => {
 | 
			
		||||
            cmd.arg("-f");
 | 
			
		||||
        }
 | 
			
		||||
        &Filesystem::Other(_) => {}
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    cmd.arg(dev);
 | 
			
		||||
 | 
			
		||||
    let mut child = match cmd.spawn() {
 | 
			
		||||
        Ok(v) => v,
 | 
			
		||||
        Err(e) => {
 | 
			
		||||
            // try simple fixes
 | 
			
		||||
            match fs {
 | 
			
		||||
                Filesystem::Xfs => install_package("xfsprogs").await?,
 | 
			
		||||
                Filesystem::Btrfs => install_package("btrs-progs").await?,
 | 
			
		||||
                _ => Err(format_err!("{mkfs} failed: {e}"))?,
 | 
			
		||||
            }
 | 
			
		||||
            cmd.spawn().map_err(|e| format_err!("{mkfs} failed: {e}"))?
 | 
			
		||||
        }
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let status = child.wait().await?;
 | 
			
		||||
    if !status.success() {
 | 
			
		||||
        return Err(format_err!("{mkfs} failed: {status}"));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn install_package(pkg: &str) -> Result<()> {
 | 
			
		||||
    let status = Command::new("apk").arg("add").arg(pkg).status().await?;
 | 
			
		||||
    if status.success() {
 | 
			
		||||
        Ok(())
 | 
			
		||||
    } else {
 | 
			
		||||
        Err(format_err!("failed to install package {pkg}: {status}"))
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										94
									
								
								src/cmd/init/networks.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										94
									
								
								src/cmd/init/networks.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,94 @@
 | 
			
		||||
use itertools::Itertools;
 | 
			
		||||
use log::{info, warn};
 | 
			
		||||
use std::collections::BTreeSet as Set;
 | 
			
		||||
use tokio::process::Command;
 | 
			
		||||
 | 
			
		||||
use super::{format_err, retry_or_ignore, Config, Result};
 | 
			
		||||
use crate::{
 | 
			
		||||
    bootstrap::config,
 | 
			
		||||
    udev,
 | 
			
		||||
    utils::{select_n_by_regex, NameAliases},
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
pub async fn setup(cfg: &Config) {
 | 
			
		||||
    if cfg.networks.is_empty() {
 | 
			
		||||
        warn!("no networks configured");
 | 
			
		||||
        return;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut assigned = Set::new();
 | 
			
		||||
 | 
			
		||||
    for net in &cfg.networks {
 | 
			
		||||
        retry_or_ignore(async || setup_network(net, &mut assigned).await).await;
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn setup_network(net: &config::Network, assigned: &mut Set<String>) -> Result<()> {
 | 
			
		||||
    info!("setting up network {}", net.name);
 | 
			
		||||
 | 
			
		||||
    let netdevs = get_interfaces()?
 | 
			
		||||
        .filter(|dev| !assigned.contains(dev.name()))
 | 
			
		||||
        .collect::<Vec<_>>();
 | 
			
		||||
 | 
			
		||||
    for dev in &netdevs {
 | 
			
		||||
        info!(
 | 
			
		||||
            "- available network device: {}, aliases [{}]",
 | 
			
		||||
            dev.name(),
 | 
			
		||||
            dev.aliases().join(", ")
 | 
			
		||||
        );
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut cmd = Command::new("ash");
 | 
			
		||||
    cmd.arg("-c");
 | 
			
		||||
    cmd.arg(&net.script);
 | 
			
		||||
 | 
			
		||||
    let mut selected = Vec::new();
 | 
			
		||||
 | 
			
		||||
    for iface in &net.interfaces {
 | 
			
		||||
        let var = &iface.var;
 | 
			
		||||
 | 
			
		||||
        let netdevs = netdevs.iter().filter(|na| !assigned.contains(na.name()));
 | 
			
		||||
        let if_names = select_n_by_regex(iface.n, &iface.regexps, netdevs);
 | 
			
		||||
 | 
			
		||||
        if if_names.is_empty() {
 | 
			
		||||
            return Err(format_err!("- no interface match for {var:?}"));
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        let value = if_names.join(" ");
 | 
			
		||||
        info!("- {var}={value}");
 | 
			
		||||
        cmd.env(var, value);
 | 
			
		||||
 | 
			
		||||
        selected.extend(if_names);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    info!("- running script");
 | 
			
		||||
    let status = cmd.status().await?;
 | 
			
		||||
    if !status.success() {
 | 
			
		||||
        return Err(format_err!("setup script failed: {status}"));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    assigned.extend(selected);
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn get_interfaces() -> Result<impl Iterator<Item = NameAliases>> {
 | 
			
		||||
    Ok(udev::get_devices("net")?.into_iter().map(|dev| {
 | 
			
		||||
        let mut na = NameAliases::new(dev.sysname().to_string());
 | 
			
		||||
 | 
			
		||||
        for (property, value) in dev.properties() {
 | 
			
		||||
            if [
 | 
			
		||||
                "INTERFACE",
 | 
			
		||||
                "ID_NET_NAME",
 | 
			
		||||
                "ID_NET_NAME_PATH",
 | 
			
		||||
                "ID_NET_NAME_MAC",
 | 
			
		||||
                "ID_NET_NAME_SLOT",
 | 
			
		||||
            ]
 | 
			
		||||
            .contains(&property)
 | 
			
		||||
            {
 | 
			
		||||
                na.push(value.to_string());
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        na
 | 
			
		||||
    }))
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										110
									
								
								src/cmd/init/sshd.rs
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										110
									
								
								src/cmd/init/sshd.rs
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,110 @@
 | 
			
		||||
use log::{info, warn};
 | 
			
		||||
use std::fs;
 | 
			
		||||
use std::io::Write;
 | 
			
		||||
use std::os::unix::fs::PermissionsExt;
 | 
			
		||||
use std::process::Stdio;
 | 
			
		||||
use tokio::net;
 | 
			
		||||
use tokio::process::Command;
 | 
			
		||||
 | 
			
		||||
use super::retry_or_ignore;
 | 
			
		||||
use crate::bootstrap::config::{Config, SSHServer};
 | 
			
		||||
 | 
			
		||||
pub async fn start(cfg: &Config) {
 | 
			
		||||
    retry_or_ignore(async || {
 | 
			
		||||
        info!("ssh: writing authorized keys");
 | 
			
		||||
 | 
			
		||||
        let ssh_dir = "/root/.ssh";
 | 
			
		||||
        let authorized_keys = format!("{ssh_dir}/authorized_keys");
 | 
			
		||||
 | 
			
		||||
        fs::create_dir_all(ssh_dir)?;
 | 
			
		||||
        fs::set_permissions(ssh_dir, fs::Permissions::from_mode(0o700))?;
 | 
			
		||||
 | 
			
		||||
        let mut ak = Vec::new();
 | 
			
		||||
 | 
			
		||||
        for auth in &cfg.auths {
 | 
			
		||||
            let Some(ref key) = auth.ssh_key else {
 | 
			
		||||
                continue;
 | 
			
		||||
            };
 | 
			
		||||
            writeln!(ak, "{key} {}", auth.name)?;
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        fs::write(authorized_keys, ak)?;
 | 
			
		||||
        Ok(())
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
 | 
			
		||||
    let cfg = cfg.ssh.clone();
 | 
			
		||||
    retry_or_ignore(async move || {
 | 
			
		||||
        // don't pre-start sshd as it should rarely be useful at this stage, use inetd-style.
 | 
			
		||||
        let listen_addr = cfg.listen.clone();
 | 
			
		||||
        info!("ssh: starting listener on {listen_addr}");
 | 
			
		||||
 | 
			
		||||
        let listener = net::TcpListener::bind(listen_addr).await?;
 | 
			
		||||
 | 
			
		||||
        tokio::spawn(handle_ssh_connections(listener, cfg.clone()));
 | 
			
		||||
 | 
			
		||||
        Ok(())
 | 
			
		||||
    })
 | 
			
		||||
    .await;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
async fn handle_ssh_connections(listener: net::TcpListener, cfg: SSHServer) {
 | 
			
		||||
    let mut sshd_args = Vec::new();
 | 
			
		||||
 | 
			
		||||
    sshd_args.extend(["-i", "-E", "/var/log/sshd.log"]);
 | 
			
		||||
 | 
			
		||||
    let mut options = Vec::new();
 | 
			
		||||
 | 
			
		||||
    if let Some(ref user_ca) = cfg.user_ca {
 | 
			
		||||
        options.push(format!("TrustedUserCAKeys={user_ca}"));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    for opt in &options {
 | 
			
		||||
        sshd_args.extend(["-o", &opt]);
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut keygen_done = false;
 | 
			
		||||
 | 
			
		||||
    loop {
 | 
			
		||||
        let (stream, remote) = match listener.accept().await {
 | 
			
		||||
            Ok(v) => v,
 | 
			
		||||
            Err(e) => {
 | 
			
		||||
                warn!("ssh: listener stopped: {e}");
 | 
			
		||||
                return;
 | 
			
		||||
            }
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        if !keygen_done {
 | 
			
		||||
            // make sure we have ssh host keys even if not provided
 | 
			
		||||
            if (Command::new("ssh-keygen").arg("-A").status().await)
 | 
			
		||||
                .inspect_err(|e| warn!("ssh-keygen failed: {e}"))
 | 
			
		||||
                .is_ok_and(|s| s.success())
 | 
			
		||||
            {
 | 
			
		||||
                keygen_done = true
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        use std::os::unix::io::{AsRawFd, FromRawFd};
 | 
			
		||||
        let fd = stream.as_raw_fd();
 | 
			
		||||
 | 
			
		||||
        let mut cmd = Command::new("/usr/sbin/sshd");
 | 
			
		||||
        cmd.args(&sshd_args);
 | 
			
		||||
 | 
			
		||||
        cmd.stdin(unsafe { Stdio::from_raw_fd(fd) });
 | 
			
		||||
        cmd.stdout(unsafe { Stdio::from_raw_fd(fd) });
 | 
			
		||||
        cmd.stderr(Stdio::null());
 | 
			
		||||
 | 
			
		||||
        let Ok(mut child) =
 | 
			
		||||
            (cmd.spawn()).inspect_err(|e| warn!("ssh: failed to start server: {e}"))
 | 
			
		||||
        else {
 | 
			
		||||
            continue;
 | 
			
		||||
        };
 | 
			
		||||
 | 
			
		||||
        let pid = child.id().unwrap();
 | 
			
		||||
        info!("ssh: new connection from {remote}, sshd PID {pid}");
 | 
			
		||||
 | 
			
		||||
        tokio::spawn(async move {
 | 
			
		||||
            let _ = child.wait().await;
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
		Reference in New Issue
	
	Block a user