Compare commits
8 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 4d014f7872 | |||
| e9247c720a | |||
| ce10c41466 | |||
| aadc01383b | |||
| 9c59e78e38 | |||
| 53cd2d35f1 | |||
| 71e20925f6 | |||
| feb22db039 |
87
cmd/add.go
Normal file
87
cmd/add.go
Normal file
@@ -0,0 +1,87 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/config"
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/udisks"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var addAlias string
|
||||||
|
|
||||||
|
var addCmd = &cobra.Command{
|
||||||
|
Use: "add <device>",
|
||||||
|
Short: "Add a device to the config",
|
||||||
|
Long: "Detects a LUKS device via udisks2 and adds it to the config file with a default passphrase method.",
|
||||||
|
Args: cobra.ExactArgs(1),
|
||||||
|
RunE: runAdd,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
addCmd.Flags().StringVarP(&addAlias, "alias", "a", "", "alias name (default: first 8 chars of UUID)")
|
||||||
|
rootCmd.AddCommand(addCmd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func runAdd(cmd *cobra.Command, args []string) error {
|
||||||
|
target := args[0]
|
||||||
|
|
||||||
|
client, err := udisks.NewClient()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("connecting to udisks2: %w", err)
|
||||||
|
}
|
||||||
|
defer client.Close()
|
||||||
|
|
||||||
|
// Find the device to get its UUID.
|
||||||
|
dev, err := client.FindDevice("", target)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !dev.HasEncrypted {
|
||||||
|
return fmt.Errorf("%s is not a LUKS-encrypted device", target)
|
||||||
|
}
|
||||||
|
|
||||||
|
if dev.UUID == "" {
|
||||||
|
return fmt.Errorf("%s has no UUID", target)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg := config.Load()
|
||||||
|
|
||||||
|
// Check if already configured.
|
||||||
|
if existing := cfg.AliasFor(dev.UUID); existing != "" {
|
||||||
|
fmt.Printf("Device %s (UUID %s) already configured as %q\n", dev.DevicePath, dev.UUID, existing)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
alias := addAlias
|
||||||
|
if alias == "" {
|
||||||
|
alias = aliasFromUUID(dev.UUID)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check for alias collision.
|
||||||
|
if _, exists := cfg.Devices[alias]; exists {
|
||||||
|
return fmt.Errorf("alias %q already in use — choose a different name with --alias", alias)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.Devices[alias] = config.DeviceConfig{
|
||||||
|
UUID: dev.UUID,
|
||||||
|
Methods: []string{"passphrase"},
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := cfg.Save(); err != nil {
|
||||||
|
return fmt.Errorf("saving config: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Printf("Added %s (UUID %s) as %q\n", dev.DevicePath, dev.UUID, alias)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func aliasFromUUID(uuid string) string {
|
||||||
|
clean := strings.ReplaceAll(uuid, "-", "")
|
||||||
|
if len(clean) > 8 {
|
||||||
|
clean = clean[:8]
|
||||||
|
}
|
||||||
|
return clean
|
||||||
|
}
|
||||||
45
cmd/config.go
Normal file
45
cmd/config.go
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/config"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var configCmd = &cobra.Command{
|
||||||
|
Use: "config",
|
||||||
|
Short: "Manage arca configuration",
|
||||||
|
}
|
||||||
|
|
||||||
|
var configCheckCmd = &cobra.Command{
|
||||||
|
Use: "check",
|
||||||
|
Short: "Validate the config file",
|
||||||
|
RunE: runConfigCheck,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
configCmd.AddCommand(configCheckCmd)
|
||||||
|
rootCmd.AddCommand(configCmd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func runConfigCheck(cmd *cobra.Command, args []string) error {
|
||||||
|
cfg := config.Load()
|
||||||
|
|
||||||
|
if len(cfg.Devices) == 0 {
|
||||||
|
fmt.Println("No devices configured.")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
errs := config.Validate(cfg)
|
||||||
|
if len(errs) == 0 {
|
||||||
|
fmt.Printf("Config OK (%d device(s))\n", len(cfg.Devices))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, e := range errs {
|
||||||
|
fmt.Fprintln(os.Stderr, e)
|
||||||
|
}
|
||||||
|
return fmt.Errorf("config has %d issue(s)", len(errs))
|
||||||
|
}
|
||||||
19
cmd/format.go
Normal file
19
cmd/format.go
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/unlock"
|
||||||
|
)
|
||||||
|
|
||||||
|
// formatMethod returns a parenthesized string describing how a device
|
||||||
|
// was unlocked, e.g. "(fido2, key slot 1)" or "(passphrase)".
|
||||||
|
func formatMethod(r *unlock.Result) string {
|
||||||
|
if r.Method == "" {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
if r.KeySlot != "" {
|
||||||
|
return fmt.Sprintf("(%s, key slot %s)", r.Method, r.KeySlot)
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("(%s)", r.Method)
|
||||||
|
}
|
||||||
63
cmd/init.go
63
cmd/init.go
@@ -3,18 +3,17 @@ package cmd
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
|
||||||
"strings"
|
|
||||||
|
|
||||||
|
|
||||||
"git.wntrmute.dev/kyle/arca/internal/config"
|
"git.wntrmute.dev/kyle/arca/internal/config"
|
||||||
"git.wntrmute.dev/kyle/arca/internal/udisks"
|
"git.wntrmute.dev/kyle/arca/internal/udisks"
|
||||||
"github.com/godbus/dbus/v5"
|
"github.com/godbus/dbus/v5"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
"gopkg.in/yaml.v3"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
var forceInit bool
|
var (
|
||||||
|
forceInit bool
|
||||||
|
mergeInit bool
|
||||||
|
)
|
||||||
|
|
||||||
var initCmd = &cobra.Command{
|
var initCmd = &cobra.Command{
|
||||||
Use: "init",
|
Use: "init",
|
||||||
@@ -25,16 +24,25 @@ var initCmd = &cobra.Command{
|
|||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
initCmd.Flags().BoolVarP(&forceInit, "force", "f", false, "overwrite existing config file")
|
initCmd.Flags().BoolVarP(&forceInit, "force", "f", false, "overwrite existing config file")
|
||||||
|
initCmd.Flags().BoolVar(&mergeInit, "merge", false, "add new devices to existing config without overwriting")
|
||||||
|
initCmd.MarkFlagsMutuallyExclusive("force", "merge")
|
||||||
rootCmd.AddCommand(initCmd)
|
rootCmd.AddCommand(initCmd)
|
||||||
}
|
}
|
||||||
|
|
||||||
func runInit(cmd *cobra.Command, args []string) error {
|
func runInit(cmd *cobra.Command, args []string) error {
|
||||||
cfgPath := config.Path()
|
cfgPath := config.Path()
|
||||||
|
|
||||||
if !forceInit {
|
// Load existing config for merge, or start fresh.
|
||||||
if _, err := os.Stat(cfgPath); err == nil {
|
var cfg *config.Config
|
||||||
return fmt.Errorf("config already exists at %s (use --force to overwrite)", cfgPath)
|
if mergeInit {
|
||||||
|
cfg = config.Load()
|
||||||
|
} else {
|
||||||
|
if !forceInit {
|
||||||
|
if _, err := os.Stat(cfgPath); err == nil {
|
||||||
|
return fmt.Errorf("config already exists at %s (use --force to overwrite or --merge to add new devices)", cfgPath)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
cfg = &config.Config{Devices: make(map[string]config.DeviceConfig)}
|
||||||
}
|
}
|
||||||
|
|
||||||
client, err := udisks.NewClient()
|
client, err := udisks.NewClient()
|
||||||
@@ -53,43 +61,42 @@ func runInit(cmd *cobra.Command, args []string) error {
|
|||||||
return fmt.Errorf("detecting root device: %w", err)
|
return fmt.Errorf("detecting root device: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
cfg := config.Config{
|
added := 0
|
||||||
Devices: make(map[string]config.DeviceConfig),
|
|
||||||
}
|
|
||||||
|
|
||||||
for _, dev := range encrypted {
|
for _, dev := range encrypted {
|
||||||
if isRootBacking(dev.ObjectPath, rootBacking) {
|
if isRootBacking(dev.ObjectPath, rootBacking) {
|
||||||
fmt.Fprintf(os.Stderr, "Skipping %s (root filesystem)\n", dev.DevicePath)
|
fmt.Fprintf(os.Stderr, "Skipping %s (root filesystem)\n", dev.DevicePath)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if cfg.HasUUID(dev.UUID) {
|
||||||
|
fmt.Fprintf(os.Stderr, "Skipping %s (already configured)\n", dev.DevicePath)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
alias := aliasFromUUID(dev.UUID)
|
alias := aliasFromUUID(dev.UUID)
|
||||||
cfg.Devices[alias] = config.DeviceConfig{
|
cfg.Devices[alias] = config.DeviceConfig{
|
||||||
UUID: dev.UUID,
|
UUID: dev.UUID,
|
||||||
Methods: []string{"passphrase"},
|
Methods: []string{"passphrase"},
|
||||||
}
|
}
|
||||||
fmt.Fprintf(os.Stderr, "Found %s (UUID %s) -> alias %q\n", dev.DevicePath, dev.UUID, alias)
|
fmt.Fprintf(os.Stderr, "Found %s (UUID %s) -> alias %q\n", dev.DevicePath, dev.UUID, alias)
|
||||||
|
added++
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(cfg.Devices) == 0 {
|
if added == 0 && !mergeInit {
|
||||||
fmt.Println("No non-root LUKS devices found.")
|
fmt.Println("No non-root LUKS devices found.")
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
data, err := yaml.Marshal(&cfg)
|
if added == 0 && mergeInit {
|
||||||
if err != nil {
|
fmt.Println("No new devices to add.")
|
||||||
return fmt.Errorf("marshaling config: %w", err)
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := os.MkdirAll(filepath.Dir(cfgPath), 0o755); err != nil {
|
if err := cfg.Save(); err != nil {
|
||||||
return fmt.Errorf("creating config directory: %w", err)
|
return fmt.Errorf("saving config: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
if err := os.WriteFile(cfgPath, data, 0o644); err != nil {
|
fmt.Printf("Config written to %s (%d device(s) added)\n", cfgPath, added)
|
||||||
return fmt.Errorf("writing config: %w", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
fmt.Printf("Config written to %s\n", cfgPath)
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -101,13 +108,3 @@ func isRootBacking(path dbus.ObjectPath, rootDevices []dbus.ObjectPath) bool {
|
|||||||
}
|
}
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func aliasFromUUID(uuid string) string {
|
|
||||||
// Use first 8 chars of UUID as a stable alias.
|
|
||||||
// "b8b2f8e3-4cde-4aca-a96e-df9274019f9f" -> "b8b2f8e3"
|
|
||||||
clean := strings.ReplaceAll(uuid, "-", "")
|
|
||||||
if len(clean) > 8 {
|
|
||||||
clean = clean[:8]
|
|
||||||
}
|
|
||||||
return clean
|
|
||||||
}
|
|
||||||
|
|||||||
68
cmd/lock.go
Normal file
68
cmd/lock.go
Normal file
@@ -0,0 +1,68 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/config"
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/cryptsetup"
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/udisks"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var lockCmd = &cobra.Command{
|
||||||
|
Use: "lock <device|alias>",
|
||||||
|
Short: "Lock a LUKS volume without unmounting",
|
||||||
|
Long: "Locks (closes) a LUKS volume. If the volume is mounted, it will be unmounted first.",
|
||||||
|
Args: cobra.ExactArgs(1),
|
||||||
|
RunE: runLock,
|
||||||
|
ValidArgsFunction: completeDeviceOrAlias,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rootCmd.AddCommand(lockCmd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func runLock(cmd *cobra.Command, args []string) error {
|
||||||
|
cfg := config.Load()
|
||||||
|
target := args[0]
|
||||||
|
|
||||||
|
client, err := udisks.NewClient()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("connecting to udisks2: %w", err)
|
||||||
|
}
|
||||||
|
defer client.Close()
|
||||||
|
|
||||||
|
devCfg := cfg.ResolveDevice(target)
|
||||||
|
|
||||||
|
dev, err := client.FindDevice(devCfg.UUID, target)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if already locked.
|
||||||
|
cleartext, err := client.CleartextDevice(dev)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Fprintf(cmd.ErrOrStderr(), "%s is already locked\n", target)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// If mounted, unmount first — can't lock a mounted device.
|
||||||
|
if mp, mounted := client.IsMounted(cleartext); mounted {
|
||||||
|
if err := client.Unmount(cleartext); err != nil {
|
||||||
|
if err := cryptsetup.Unmount(mp); err != nil {
|
||||||
|
return fmt.Errorf("unmounting before lock: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Lock: try udisks2 first, fall back to cryptsetup close.
|
||||||
|
if err := client.Lock(dev); err != nil {
|
||||||
|
mapperName := cryptsetup.MapperName(dev.DevicePath)
|
||||||
|
if err := cryptsetup.Close(mapperName); err != nil {
|
||||||
|
return fmt.Errorf("locking: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Printf("Locked %s\n", target)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
52
cmd/mount.go
52
cmd/mount.go
@@ -3,11 +3,13 @@ package cmd
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"git.wntrmute.dev/kyle/arca/internal/config"
|
"git.wntrmute.dev/kyle/arca/internal/config"
|
||||||
"git.wntrmute.dev/kyle/arca/internal/cryptsetup"
|
"git.wntrmute.dev/kyle/arca/internal/cryptsetup"
|
||||||
"git.wntrmute.dev/kyle/arca/internal/udisks"
|
"git.wntrmute.dev/kyle/arca/internal/udisks"
|
||||||
"git.wntrmute.dev/kyle/arca/internal/unlock"
|
"git.wntrmute.dev/kyle/arca/internal/unlock"
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/verbose"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
"golang.org/x/term"
|
"golang.org/x/term"
|
||||||
)
|
)
|
||||||
@@ -57,7 +59,18 @@ func runMount(cmd *cobra.Command, args []string) error {
|
|||||||
fmt.Println(existing)
|
fmt.Println(existing)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
// Unlocked but not mounted — just mount it.
|
// Unlocked but not mounted — mount it. If the mapper name
|
||||||
|
// indicates arca opened it via cryptsetup (privileged path),
|
||||||
|
// use privileged mount since udisks2 won't authorize it.
|
||||||
|
if isPrivilegedMapping(dev) {
|
||||||
|
verbose.Printf("detected arca-managed mapping, using privileged mount")
|
||||||
|
mnt, err := cryptsetup.Mount(cleartext.DevicePath, mp)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("mounting: %w", err)
|
||||||
|
}
|
||||||
|
fmt.Println(mnt)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
return doMount(client, cleartext, mp)
|
return doMount(client, cleartext, mp)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -72,39 +85,54 @@ func runMount(cmd *cobra.Command, args []string) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
methodInfo := formatMethod(result)
|
||||||
|
|
||||||
if result.Privileged {
|
if result.Privileged {
|
||||||
mnt, err := cryptsetup.Mount(result.Device.DevicePath, mp)
|
mnt, err := cryptsetup.Mount(result.Device.DevicePath, mp)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("mounting: %w", err)
|
return fmt.Errorf("mounting: %w", err)
|
||||||
}
|
}
|
||||||
fmt.Println(mnt)
|
fmt.Printf("%s %s\n", mnt, methodInfo)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
if mp != "" {
|
if mp != "" {
|
||||||
fmt.Fprintf(os.Stderr, "warning: --mountpoint is ignored for udisks2 mounts (passphrase/keyfile path)\n")
|
fmt.Fprintf(os.Stderr, "warning: --mountpoint is ignored for udisks2 mounts (passphrase/keyfile path)\n")
|
||||||
}
|
}
|
||||||
return doMount(client, result.Device, "")
|
return doMountWithInfo(client, result.Device, "", methodInfo)
|
||||||
}
|
}
|
||||||
|
|
||||||
func doMount(client *udisks.Client, cleartext *udisks.BlockDevice, mp string) error {
|
func doMount(client *udisks.Client, cleartext *udisks.BlockDevice, mp string) error {
|
||||||
|
return doMountWithInfo(client, cleartext, mp, "")
|
||||||
|
}
|
||||||
|
|
||||||
|
func doMountWithInfo(client *udisks.Client, cleartext *udisks.BlockDevice, mp, methodInfo string) error {
|
||||||
|
var mnt string
|
||||||
|
var err error
|
||||||
if mp != "" {
|
if mp != "" {
|
||||||
// udisks2 doesn't support custom mount points; use privileged mount.
|
mnt, err = cryptsetup.Mount(cleartext.DevicePath, mp)
|
||||||
mnt, err := cryptsetup.Mount(cleartext.DevicePath, mp)
|
} else {
|
||||||
if err != nil {
|
mnt, err = client.Mount(cleartext)
|
||||||
return fmt.Errorf("mounting: %w", err)
|
|
||||||
}
|
|
||||||
fmt.Println(mnt)
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
mnt, err := client.Mount(cleartext)
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("mounting: %w", err)
|
return fmt.Errorf("mounting: %w", err)
|
||||||
}
|
}
|
||||||
fmt.Println(mnt)
|
if methodInfo != "" {
|
||||||
|
fmt.Printf("%s %s\n", mnt, methodInfo)
|
||||||
|
} else {
|
||||||
|
fmt.Println(mnt)
|
||||||
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// isPrivilegedMapping checks if a LUKS device was opened via arca's
|
||||||
|
// cryptsetup path by checking if the expected mapper name exists.
|
||||||
|
func isPrivilegedMapping(dev *udisks.BlockDevice) bool {
|
||||||
|
expected := cryptsetup.MapperName(dev.DevicePath)
|
||||||
|
_, err := os.Stat("/dev/mapper/" + expected)
|
||||||
|
return err == nil && strings.HasPrefix(expected, "arca-")
|
||||||
|
}
|
||||||
|
|
||||||
func readPassphrase() (string, error) {
|
func readPassphrase() (string, error) {
|
||||||
fmt.Fprint(os.Stderr, "Passphrase: ")
|
fmt.Fprint(os.Stderr, "Passphrase: ")
|
||||||
pass, err := term.ReadPassword(int(os.Stdin.Fd()))
|
pass, err := term.ReadPassword(int(os.Stdin.Fd()))
|
||||||
|
|||||||
38
cmd/remove.go
Normal file
38
cmd/remove.go
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/config"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var removeCmd = &cobra.Command{
|
||||||
|
Use: "remove <alias>",
|
||||||
|
Short: "Remove a device from the config",
|
||||||
|
Args: cobra.ExactArgs(1),
|
||||||
|
RunE: runRemove,
|
||||||
|
ValidArgsFunction: completeDeviceOrAlias,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rootCmd.AddCommand(removeCmd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func runRemove(cmd *cobra.Command, args []string) error {
|
||||||
|
alias := args[0]
|
||||||
|
cfg := config.Load()
|
||||||
|
|
||||||
|
if _, ok := cfg.Devices[alias]; !ok {
|
||||||
|
return fmt.Errorf("no device with alias %q in config", alias)
|
||||||
|
}
|
||||||
|
|
||||||
|
delete(cfg.Devices, alias)
|
||||||
|
|
||||||
|
if err := cfg.Save(); err != nil {
|
||||||
|
return fmt.Errorf("saving config: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Printf("Removed %q from config\n", alias)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -10,6 +10,12 @@ import (
|
|||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
filterMounted bool
|
||||||
|
filterUnlocked bool
|
||||||
|
filterLocked bool
|
||||||
|
)
|
||||||
|
|
||||||
var statusCmd = &cobra.Command{
|
var statusCmd = &cobra.Command{
|
||||||
Use: "status",
|
Use: "status",
|
||||||
Short: "Show LUKS volume status",
|
Short: "Show LUKS volume status",
|
||||||
@@ -17,6 +23,9 @@ var statusCmd = &cobra.Command{
|
|||||||
}
|
}
|
||||||
|
|
||||||
func init() {
|
func init() {
|
||||||
|
statusCmd.Flags().BoolVar(&filterMounted, "mounted", false, "show only mounted devices")
|
||||||
|
statusCmd.Flags().BoolVar(&filterUnlocked, "unlocked", false, "show only unlocked (but not mounted) devices")
|
||||||
|
statusCmd.Flags().BoolVar(&filterLocked, "locked", false, "show only locked devices")
|
||||||
rootCmd.AddCommand(statusCmd)
|
rootCmd.AddCommand(statusCmd)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -34,6 +43,8 @@ func runStatus(cmd *cobra.Command, args []string) error {
|
|||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
filtering := filterMounted || filterUnlocked || filterLocked
|
||||||
|
|
||||||
w := tabwriter.NewWriter(os.Stdout, 0, 4, 2, ' ', 0)
|
w := tabwriter.NewWriter(os.Stdout, 0, 4, 2, ' ', 0)
|
||||||
fmt.Fprintln(w, "DEVICE\tUUID\tALIAS\tSTATE\tMOUNTPOINT")
|
fmt.Fprintln(w, "DEVICE\tUUID\tALIAS\tSTATE\tMOUNTPOINT")
|
||||||
|
|
||||||
@@ -50,6 +61,23 @@ func runStatus(cmd *cobra.Command, args []string) error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if filtering {
|
||||||
|
switch state {
|
||||||
|
case "mounted":
|
||||||
|
if !filterMounted {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
case "unlocked":
|
||||||
|
if !filterUnlocked {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
case "locked":
|
||||||
|
if !filterLocked {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
fmt.Fprintf(w, "%s\t%s\t%s\t%s\t%s\n",
|
fmt.Fprintf(w, "%s\t%s\t%s\t%s\t%s\n",
|
||||||
dev.DevicePath, dev.UUID, alias, state, mountpoint)
|
dev.DevicePath, dev.UUID, alias, state, mountpoint)
|
||||||
}
|
}
|
||||||
|
|||||||
59
cmd/unlock.go
Normal file
59
cmd/unlock.go
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
package cmd
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/config"
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/udisks"
|
||||||
|
"git.wntrmute.dev/kyle/arca/internal/unlock"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var unlockCmd = &cobra.Command{
|
||||||
|
Use: "unlock <device|alias>",
|
||||||
|
Short: "Unlock a LUKS volume without mounting",
|
||||||
|
Args: cobra.ExactArgs(1),
|
||||||
|
RunE: runUnlock,
|
||||||
|
ValidArgsFunction: completeDeviceOrAlias,
|
||||||
|
}
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
rootCmd.AddCommand(unlockCmd)
|
||||||
|
}
|
||||||
|
|
||||||
|
func runUnlock(cmd *cobra.Command, args []string) error {
|
||||||
|
cfg := config.Load()
|
||||||
|
target := args[0]
|
||||||
|
|
||||||
|
client, err := udisks.NewClient()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("connecting to udisks2: %w", err)
|
||||||
|
}
|
||||||
|
defer client.Close()
|
||||||
|
|
||||||
|
devCfg := cfg.ResolveDevice(target)
|
||||||
|
|
||||||
|
dev, err := client.FindDevice(devCfg.UUID, target)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check if already unlocked.
|
||||||
|
if cleartext, err := client.CleartextDevice(dev); err == nil {
|
||||||
|
fmt.Printf("%s is already unlocked (%s)\n", target, cleartext.DevicePath)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
u := unlock.New(client, unlock.Options{
|
||||||
|
ReadPassphrase: readPassphrase,
|
||||||
|
KeyfilePath: devCfg.Keyfile,
|
||||||
|
})
|
||||||
|
|
||||||
|
result, err := u.Unlock(dev, devCfg.Methods)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Printf("Unlocked %s -> %s %s\n", target, result.Device.DevicePath, formatMethod(result))
|
||||||
|
return nil
|
||||||
|
}
|
||||||
@@ -10,7 +10,7 @@
|
|||||||
let
|
let
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
pkgs = nixpkgs.legacyPackages.${system};
|
pkgs = nixpkgs.legacyPackages.${system};
|
||||||
version = "1.1.0";
|
version = "1.3.0";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
packages.${system}.default = pkgs.buildGoModule {
|
packages.${system}.default = pkgs.buildGoModule {
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
package config
|
package config
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
|
||||||
@@ -76,6 +77,31 @@ func resolvedFrom(dev DeviceConfig) ResolvedDevice {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// HasUUID returns true if a device with the given UUID is already configured.
|
||||||
|
func (c *Config) HasUUID(uuid string) bool {
|
||||||
|
for _, dev := range c.Devices {
|
||||||
|
if dev.UUID == uuid {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Save writes the config to the config file.
|
||||||
|
func (c *Config) Save() error {
|
||||||
|
path := configPath()
|
||||||
|
if err := os.MkdirAll(filepath.Dir(path), 0o755); err != nil {
|
||||||
|
return fmt.Errorf("creating config directory: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
data, err := yaml.Marshal(c)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("marshaling config: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return os.WriteFile(path, data, 0o644)
|
||||||
|
}
|
||||||
|
|
||||||
// AliasFor returns the config alias for a given UUID, or "" if none.
|
// AliasFor returns the config alias for a given UUID, or "" if none.
|
||||||
func (c *Config) AliasFor(uuid string) string {
|
func (c *Config) AliasFor(uuid string) string {
|
||||||
for name, dev := range c.Devices {
|
for name, dev := range c.Devices {
|
||||||
|
|||||||
60
internal/config/validate.go
Normal file
60
internal/config/validate.go
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"regexp"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
ValidMethods = []string{"passphrase", "keyfile", "fido2", "tpm2"}
|
||||||
|
uuidPattern = regexp.MustCompile(`^[0-9a-fA-F]{8}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{4}-[0-9a-fA-F]{12}$`)
|
||||||
|
)
|
||||||
|
|
||||||
|
// Validate checks the config for common issues. Returns a list of errors.
|
||||||
|
func Validate(cfg *Config) []error {
|
||||||
|
var errs []error
|
||||||
|
|
||||||
|
for alias, dev := range cfg.Devices {
|
||||||
|
if dev.UUID == "" {
|
||||||
|
errs = append(errs, fmt.Errorf("%s: missing uuid", alias))
|
||||||
|
} else if !uuidPattern.MatchString(dev.UUID) {
|
||||||
|
errs = append(errs, fmt.Errorf("%s: malformed uuid %q", alias, dev.UUID))
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, m := range dev.Methods {
|
||||||
|
if !isValidMethod(m) {
|
||||||
|
errs = append(errs, fmt.Errorf("%s: unknown method %q (valid: %v)", alias, m, ValidMethods))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
hasKeyfileMethod := false
|
||||||
|
for _, m := range dev.Methods {
|
||||||
|
if m == "keyfile" {
|
||||||
|
hasKeyfileMethod = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if hasKeyfileMethod && dev.Keyfile == "" {
|
||||||
|
errs = append(errs, fmt.Errorf("%s: method 'keyfile' listed but no keyfile path set", alias))
|
||||||
|
}
|
||||||
|
|
||||||
|
if dev.Keyfile != "" {
|
||||||
|
if _, err := os.Stat(dev.Keyfile); err != nil {
|
||||||
|
errs = append(errs, fmt.Errorf("%s: keyfile %q not found (may be on removable media)", alias, dev.Keyfile))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return errs
|
||||||
|
}
|
||||||
|
|
||||||
|
func isValidMethod(m string) bool {
|
||||||
|
for _, v := range ValidMethods {
|
||||||
|
if m == v {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
@@ -1,31 +1,49 @@
|
|||||||
package cryptsetup
|
package cryptsetup
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"bytes"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"io"
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
"regexp"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"git.wntrmute.dev/kyle/arca/internal/verbose"
|
"git.wntrmute.dev/kyle/arca/internal/verbose"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// OpenResult holds information about a successful cryptsetup open.
|
||||||
|
type OpenResult struct {
|
||||||
|
KeySlot string // e.g., "1", or "" if not parsed
|
||||||
|
}
|
||||||
|
|
||||||
|
var keySlotPattern = regexp.MustCompile(`Key slot (\d+) unlocked`)
|
||||||
|
|
||||||
// Open opens a LUKS device using cryptsetup with token-based unlock.
|
// Open opens a LUKS device using cryptsetup with token-based unlock.
|
||||||
func Open(devicePath, mapperName string) error {
|
// Returns info about which key slot was used.
|
||||||
args := withTokenPluginEnv([]string{"cryptsetup", "open", devicePath, mapperName, "--token-only"})
|
func Open(devicePath, mapperName string) (OpenResult, error) {
|
||||||
|
args := withTokenPluginEnv([]string{"cryptsetup", "open", devicePath, mapperName, "--token-only", "-v"})
|
||||||
args = withPrivilege(args)
|
args = withPrivilege(args)
|
||||||
|
|
||||||
verbose.Printf("exec: %s", strings.Join(args, " "))
|
verbose.Printf("exec: %s", strings.Join(args, " "))
|
||||||
|
|
||||||
|
var buf bytes.Buffer
|
||||||
cmd := exec.Command(args[0], args[1:]...)
|
cmd := exec.Command(args[0], args[1:]...)
|
||||||
cmd.Stdin = os.Stdin
|
cmd.Stdin = os.Stdin
|
||||||
cmd.Stdout = os.Stdout
|
cmd.Stdout = os.Stdout
|
||||||
cmd.Stderr = os.Stderr
|
cmd.Stderr = io.MultiWriter(os.Stderr, &buf)
|
||||||
|
|
||||||
if err := cmd.Run(); err != nil {
|
if err := cmd.Run(); err != nil {
|
||||||
return fmt.Errorf("cryptsetup open --token-only: %w", err)
|
return OpenResult{}, fmt.Errorf("cryptsetup open --token-only: %w", err)
|
||||||
}
|
}
|
||||||
return nil
|
|
||||||
|
var result OpenResult
|
||||||
|
if m := keySlotPattern.FindStringSubmatch(buf.String()); len(m) > 1 {
|
||||||
|
result.KeySlot = m[1]
|
||||||
|
}
|
||||||
|
|
||||||
|
return result, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Close closes a LUKS mapping.
|
// Close closes a LUKS mapping.
|
||||||
@@ -64,7 +82,8 @@ func Mount(devicePath, mountpoint string) (string, error) {
|
|||||||
return mountpoint, nil
|
return mountpoint, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// Unmount unmounts the given mountpoint using privileged umount.
|
// Unmount unmounts the given mountpoint using privileged umount, then
|
||||||
|
// removes the mount directory if it is empty.
|
||||||
func Unmount(mountpoint string) error {
|
func Unmount(mountpoint string) error {
|
||||||
args := withPrivilege([]string{"umount", mountpoint})
|
args := withPrivilege([]string{"umount", mountpoint})
|
||||||
cmd := exec.Command(args[0], args[1:]...)
|
cmd := exec.Command(args[0], args[1:]...)
|
||||||
@@ -73,6 +92,12 @@ func Unmount(mountpoint string) error {
|
|||||||
if err := cmd.Run(); err != nil {
|
if err := cmd.Run(); err != nil {
|
||||||
return fmt.Errorf("umount %s: %w", mountpoint, err)
|
return fmt.Errorf("umount %s: %w", mountpoint, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Clean up empty mount directory. Best-effort — ignore errors
|
||||||
|
// (directory may not be empty or may be a system path).
|
||||||
|
rmdirArgs := withPrivilege([]string{"rmdir", mountpoint})
|
||||||
|
exec.Command(rmdirArgs[0], rmdirArgs[1:]...).Run()
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -14,7 +14,9 @@ import (
|
|||||||
// Result holds the outcome of a successful unlock.
|
// Result holds the outcome of a successful unlock.
|
||||||
type Result struct {
|
type Result struct {
|
||||||
Device *udisks.BlockDevice
|
Device *udisks.BlockDevice
|
||||||
Privileged bool // true if unlock required root (cryptsetup path)
|
Privileged bool // true if unlock required root (cryptsetup path)
|
||||||
|
Method string // which method succeeded: "fido2", "tpm2", "passphrase", "keyfile"
|
||||||
|
KeySlot string // key slot used, from cryptsetup verbose output (or "")
|
||||||
}
|
}
|
||||||
|
|
||||||
// Options configures the unlock behavior.
|
// Options configures the unlock behavior.
|
||||||
@@ -58,19 +60,19 @@ func (u *Unlocker) tryMethod(dev *udisks.BlockDevice, method string) (*Result, e
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &Result{Device: ct, Privileged: false}, nil
|
return &Result{Device: ct, Privileged: false, Method: method}, nil
|
||||||
case "keyfile":
|
case "keyfile":
|
||||||
ct, err := u.unlockKeyfile(dev)
|
ct, err := u.unlockKeyfile(dev)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &Result{Device: ct, Privileged: false}, nil
|
return &Result{Device: ct, Privileged: false, Method: method}, nil
|
||||||
case "fido2", "tpm2":
|
case "fido2", "tpm2":
|
||||||
ct, err := u.unlockCryptsetup(dev)
|
ct, openResult, err := u.unlockCryptsetup(dev)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
return &Result{Device: ct, Privileged: true}, nil
|
return &Result{Device: ct, Privileged: true, Method: method, KeySlot: openResult.KeySlot}, nil
|
||||||
default:
|
default:
|
||||||
return nil, fmt.Errorf("unknown unlock method: %s", method)
|
return nil, fmt.Errorf("unknown unlock method: %s", method)
|
||||||
}
|
}
|
||||||
@@ -98,19 +100,20 @@ func (u *Unlocker) unlockKeyfile(dev *udisks.BlockDevice) (*udisks.BlockDevice,
|
|||||||
return u.client.UnlockWithKeyfile(dev, contents)
|
return u.client.UnlockWithKeyfile(dev, contents)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (u *Unlocker) unlockCryptsetup(dev *udisks.BlockDevice) (*udisks.BlockDevice, error) {
|
func (u *Unlocker) unlockCryptsetup(dev *udisks.BlockDevice) (*udisks.BlockDevice, cryptsetup.OpenResult, error) {
|
||||||
name := cryptsetup.MapperName(dev.DevicePath)
|
name := cryptsetup.MapperName(dev.DevicePath)
|
||||||
if err := cryptsetup.Open(dev.DevicePath, name); err != nil {
|
openResult, err := cryptsetup.Open(dev.DevicePath, name)
|
||||||
return nil, fmt.Errorf("%w (is the FIDO2/TPM2 key plugged in?)", err)
|
if err != nil {
|
||||||
|
return nil, openResult, fmt.Errorf("%w (is the FIDO2/TPM2 key plugged in?)", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Wait for udisks2 to pick up the new dm device.
|
// Wait for udisks2 to pick up the new dm device.
|
||||||
for i := 0; i < 10; i++ {
|
for i := 0; i < 10; i++ {
|
||||||
ct, err := u.client.CleartextDevice(dev)
|
ct, err := u.client.CleartextDevice(dev)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
return ct, nil
|
return ct, openResult, nil
|
||||||
}
|
}
|
||||||
time.Sleep(200 * time.Millisecond)
|
time.Sleep(200 * time.Millisecond)
|
||||||
}
|
}
|
||||||
return nil, fmt.Errorf("timed out waiting for udisks2 to discover cleartext device")
|
return nil, openResult, fmt.Errorf("timed out waiting for udisks2 to discover cleartext device")
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user