mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-27 08:29:33 -05:00
bd63aa3c6b
sed -i '1i/*\nCopyright (c) Edgeless Systems GmbH\n\nSPDX-License-Identifier: AGPL-3.0-only\n*/\n' `grep -rL --include='*.go' 'DO NOT EDIT'` gofumpt -w .
126 lines
3.2 KiB
Go
126 lines
3.2 KiB
Go
/*
|
|
Copyright (c) Edgeless Systems GmbH
|
|
|
|
SPDX-License-Identifier: AGPL-3.0-only
|
|
*/
|
|
|
|
package diskencryption
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"sync"
|
|
|
|
"github.com/martinjungblut/go-cryptsetup"
|
|
"github.com/spf13/afero"
|
|
)
|
|
|
|
const (
|
|
stateMapperDevice = "state"
|
|
initialKeyPath = "/run/cryptsetup-keys.d/state.key"
|
|
keyslot = 0
|
|
)
|
|
|
|
var (
|
|
// packageLock is needed to block concurrent use of package functions, since libcryptsetup is not thread safe.
|
|
// See: https://gitlab.com/cryptsetup/cryptsetup/-/issues/710
|
|
// https://stackoverflow.com/questions/30553386/cryptsetup-backend-safe-with-multithreading
|
|
packageLock = sync.Mutex{}
|
|
errDeviceNotOpen = errors.New("cryptdevice not open")
|
|
errDeviceAlreadyOpen = errors.New("cryptdevice already open")
|
|
)
|
|
|
|
// Cryptsetup manages the encrypted state mapper device.
|
|
type Cryptsetup struct {
|
|
fs afero.Fs
|
|
device cryptdevice
|
|
initByName initByName
|
|
}
|
|
|
|
// New creates a new Cryptsetup.
|
|
func New() *Cryptsetup {
|
|
return &Cryptsetup{
|
|
fs: afero.NewOsFs(),
|
|
initByName: func(name string) (cryptdevice, error) {
|
|
return cryptsetup.InitByName(name)
|
|
},
|
|
}
|
|
}
|
|
|
|
// Open opens the cryptdevice.
|
|
func (c *Cryptsetup) Open() error {
|
|
packageLock.Lock()
|
|
defer packageLock.Unlock()
|
|
if c.device != nil {
|
|
return errDeviceAlreadyOpen
|
|
}
|
|
var err error
|
|
c.device, err = c.initByName(stateMapperDevice)
|
|
if err != nil {
|
|
return fmt.Errorf("initializing crypt device for mapped device %q: %w", stateMapperDevice, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Close closes the cryptdevice.
|
|
func (c *Cryptsetup) Close() error {
|
|
packageLock.Lock()
|
|
defer packageLock.Unlock()
|
|
if c.device == nil {
|
|
return errDeviceNotOpen
|
|
}
|
|
c.device.Free()
|
|
c.device = nil
|
|
return nil
|
|
}
|
|
|
|
// UUID gets the device's UUID.
|
|
// Only works after calling Open().
|
|
func (c *Cryptsetup) UUID() (string, error) {
|
|
packageLock.Lock()
|
|
defer packageLock.Unlock()
|
|
if c.device == nil {
|
|
return "", errDeviceNotOpen
|
|
}
|
|
uuid := c.device.GetUUID()
|
|
if uuid == "" {
|
|
return "", fmt.Errorf("unable to get UUID for mapped device %q", stateMapperDevice)
|
|
}
|
|
return uuid, nil
|
|
}
|
|
|
|
// UpdatePassphrase switches the initial random passphrase of the mapped crypt device to a permanent passphrase.
|
|
// Only works after calling Open().
|
|
func (c *Cryptsetup) UpdatePassphrase(passphrase string) error {
|
|
packageLock.Lock()
|
|
defer packageLock.Unlock()
|
|
if c.device == nil {
|
|
return errDeviceNotOpen
|
|
}
|
|
initialPassphrase, err := c.getInitialPassphrase()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err := c.device.KeyslotChangeByPassphrase(keyslot, keyslot, initialPassphrase, passphrase); err != nil {
|
|
return fmt.Errorf("changing passphrase for mapped device %q: %w", stateMapperDevice, err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// getInitialPassphrase retrieves the initial passphrase used on first boot.
|
|
func (c *Cryptsetup) getInitialPassphrase() (string, error) {
|
|
passphrase, err := afero.ReadFile(c.fs, initialKeyPath)
|
|
if err != nil {
|
|
return "", fmt.Errorf("reading first boot encryption passphrase from disk: %w", err)
|
|
}
|
|
return string(passphrase), nil
|
|
}
|
|
|
|
type cryptdevice interface {
|
|
GetUUID() string
|
|
KeyslotChangeByPassphrase(currentKeyslot int, newKeyslot int, currentPassphrase string, newPassphrase string) error
|
|
Free() bool
|
|
}
|
|
|
|
type initByName func(name string) (cryptdevice, error)
|