Compare commits
1 Commits
5adda3f5d4
...
3e78707d81
| Author | SHA1 | Date | |
|---|---|---|---|
| 3e78707d81 |
2
Cargo.lock
generated
2
Cargo.lock
generated
@ -817,7 +817,7 @@ dependencies = [
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "init"
|
name = "init"
|
||||||
version = "2.5.0"
|
version = "2.4.3"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"base64",
|
"base64",
|
||||||
"dkl",
|
"dkl",
|
||||||
|
|||||||
@ -1,6 +1,6 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "init"
|
name = "init"
|
||||||
version = "2.5.0"
|
version = "2.4.3"
|
||||||
edition = "2024"
|
edition = "2024"
|
||||||
|
|
||||||
[profile.release]
|
[profile.release]
|
||||||
|
|||||||
@ -1,4 +1,5 @@
|
|||||||
pub mod bootstrap;
|
pub mod bootstrap;
|
||||||
|
pub mod connect_boot;
|
||||||
pub mod init;
|
pub mod init;
|
||||||
pub mod init_input;
|
pub mod init_input;
|
||||||
pub mod version;
|
pub mod version;
|
||||||
|
|||||||
1
src/cmd/connect_boot.rs
Normal file
1
src/cmd/connect_boot.rs
Normal file
@ -0,0 +1 @@
|
|||||||
|
|
||||||
@ -33,7 +33,6 @@ pub async fn bootstrap(cfg: Config) {
|
|||||||
.await;
|
.await;
|
||||||
}
|
}
|
||||||
|
|
||||||
// prepare system
|
|
||||||
let boot_version = utils::param("version").unwrap_or("current");
|
let boot_version = utils::param("version").unwrap_or("current");
|
||||||
let base_dir = &format!("/bootstrap/{boot_version}");
|
let base_dir = &format!("/bootstrap/{boot_version}");
|
||||||
|
|
||||||
|
|||||||
@ -56,72 +56,27 @@ pub async fn setup(devs: &[CryptDev]) {
|
|||||||
.await;
|
.await;
|
||||||
}
|
}
|
||||||
|
|
||||||
struct PrevPw {
|
static PREV_PW: Mutex<String> = Mutex::const_new(String::new());
|
||||||
pw: String,
|
|
||||||
reuse: bool,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl PrevPw {
|
|
||||||
fn is_set(&self) -> bool {
|
|
||||||
!self.pw.is_empty()
|
|
||||||
}
|
|
||||||
|
|
||||||
fn can_reuse(&self) -> bool {
|
|
||||||
self.reuse && self.is_set()
|
|
||||||
}
|
|
||||||
|
|
||||||
fn invalidate(&mut self) {
|
|
||||||
self.pw = String::new();
|
|
||||||
self.reuse = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
async fn input(&mut self, prompt: impl std::fmt::Display) -> String {
|
|
||||||
if self.can_reuse() {
|
|
||||||
info!("reusing password");
|
|
||||||
self.pw.clone()
|
|
||||||
} else if self.is_set() {
|
|
||||||
let pw =
|
|
||||||
input::read_password(format!("{prompt} (\"\" reuse, \"*\" auto-reuse)? ")).await;
|
|
||||||
|
|
||||||
match pw.as_str() {
|
|
||||||
"" => self.pw.clone(),
|
|
||||||
"*" => {
|
|
||||||
self.reuse = true;
|
|
||||||
self.pw.clone()
|
|
||||||
}
|
|
||||||
_ => {
|
|
||||||
self.pw = pw.clone();
|
|
||||||
pw
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
let pw = loop {
|
|
||||||
let pw = input::read_password(format!("{prompt}? ")).await;
|
|
||||||
if pw.is_empty() {
|
|
||||||
error!("empty password provided!");
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
break pw;
|
|
||||||
};
|
|
||||||
|
|
||||||
self.pw = pw.clone();
|
|
||||||
pw
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
static PREV_PW: Mutex<PrevPw> = Mutex::const_new(PrevPw {
|
|
||||||
pw: String::new(),
|
|
||||||
reuse: false,
|
|
||||||
});
|
|
||||||
|
|
||||||
async fn crypt_open(crypt_dev: &str, dev_path: &str) -> Result<()> {
|
async fn crypt_open(crypt_dev: &str, dev_path: &str) -> Result<()> {
|
||||||
'open_loop: loop {
|
'open_loop: loop {
|
||||||
let mut prev_pw = PREV_PW.lock().await;
|
let mut prev_pw = PREV_PW.lock().await;
|
||||||
|
let prompt = if prev_pw.is_empty() {
|
||||||
|
format!("crypt password for {crypt_dev}? ")
|
||||||
|
} else {
|
||||||
|
format!("crypt password for {crypt_dev} (enter = reuse previous)? ")
|
||||||
|
};
|
||||||
|
|
||||||
let pw = prev_pw
|
let mut pw = input::read_password(prompt).await;
|
||||||
.input(format!("crypt password for {crypt_dev}"))
|
if pw.is_empty() {
|
||||||
.await;
|
pw = prev_pw.clone();
|
||||||
|
}
|
||||||
|
if pw.is_empty() {
|
||||||
|
error!("empty password provided!");
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
*prev_pw = pw.clone();
|
||||||
|
|
||||||
if cryptsetup(&pw, ["open", dev_path, crypt_dev]).await? {
|
if cryptsetup(&pw, ["open", dev_path, crypt_dev]).await? {
|
||||||
return Ok(());
|
return Ok(());
|
||||||
@ -152,17 +107,15 @@ async fn crypt_open(crypt_dev: &str, dev_path: &str) -> Result<()> {
|
|||||||
}
|
}
|
||||||
_ => unreachable!(),
|
_ => unreachable!(),
|
||||||
}
|
}
|
||||||
}
|
} else {
|
||||||
|
// device looks initialized, don't allow format
|
||||||
|
warn!("{dev_path} looks initialized, formatting not allowed from init");
|
||||||
|
|
||||||
// device looks initialized, don't allow format
|
match input::read_choice(["[r]etry", "[i]gnore"]).await {
|
||||||
warn!("{dev_path} looks initialized, formatting not allowed from init");
|
'r' => continue 'open_loop,
|
||||||
|
'i' => return Ok(()),
|
||||||
prev_pw.invalidate();
|
_ => unreachable!(),
|
||||||
|
}
|
||||||
match input::read_choice(["[r]etry", "[i]gnore"]).await {
|
|
||||||
'r' => continue 'open_loop,
|
|
||||||
'i' => return Ok(()),
|
|
||||||
_ => unreachable!(),
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@ -2,10 +2,6 @@ use crate::input;
|
|||||||
|
|
||||||
pub async fn run() {
|
pub async fn run() {
|
||||||
tokio::spawn(async {
|
tokio::spawn(async {
|
||||||
// give a bit of time for stdout
|
|
||||||
use tokio::time::{sleep, Duration};
|
|
||||||
sleep(Duration::from_millis(200)).await;
|
|
||||||
|
|
||||||
if let Err(e) = input::forward_requests_from_socket().await {
|
if let Err(e) = input::forward_requests_from_socket().await {
|
||||||
eprintln!("failed to forwards requests from socket: {e}");
|
eprintln!("failed to forwards requests from socket: {e}");
|
||||||
std::process::exit(1);
|
std::process::exit(1);
|
||||||
|
|||||||
Reference in New Issue
Block a user