Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handling encryption logic when only one non-root partition is encrypted (such as /home) #2575

Draft
wants to merge 4 commits into
base: master
Choose a base branch
from

Conversation

Torxed
Copy link
Member

@Torxed Torxed commented Jul 12, 2024

PR Description:

This should make single-non-root-encrypted-partitions be unlocked via /etc/crypttab instead of via keyfile, as the keyfile would be unprotected.

Tests and Checks

  • I have tested the code!

def should_generate_encryption_keyfile(self, dev: PartitionModification | LvmVolume) -> bool:
# If all partitions being encrypted, are non-root file systems
# we will not generate key-files as their safety can not be guaranteed.
if all([part.mountpoint != Path('/') for part in self.partitions]):
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just FYI there's a part.is_root() :)

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This check doesn't feel right here...on the caller side this is run for each partition now, but we can probably short circuit it

	def generate_keyfile_for_dev(self, dev: PartitionModification | LvmVolume) -> bool:
		# If all partitions being encrypted, are non-root file systems
		# we will not generate key-files as their safety can not be guaranteed.
		if isinstance(dev, PartitionModification):
			return dev in self.partitions and dev.mountpoint != Path('/')
		elif isinstance(dev, LvmVolume):
			return dev in self.lvm_volumes and dev.mountpoint != Path('/')

		return False

	def generate_keyfiles(self) -> bool:
		# If all partitions being encrypted, are non-root file systems
		# we will not generate key-files as their safety can not be guaranteed.
		if all([part.mountpoint != Path('/') for part in self.partitions]):
			return True
		return False

And on the caller

	def _setup_luks_unlock_partitions(self) -> None:
		if not self._disk_encryption.generate_keyfiles():
			return
		...

What do you think?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just FYI there's a part.is_root() :)

Silly me just copied the code from two rows down, but now that you mention it I do remember seeing that function, I'll change!

for index, existing_row in enumerate(existing_data):
if uuid in existing_row:
if override is False:
print(f"Found {uuid} in {existing_row}")
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we change this to debug(...) rather as it's not really relevant for the user

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Of course, it's still a draft and used print when executing blocks of code in isolated test.py outside of archinstall :) but good reminder!

if uuid in existing_row:
if override is False:
print(f"Found {uuid} in {existing_row}")
return True
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this return here right? If override is passed into the function should this terminate ?

Copy link
Member Author

@Torxed Torxed Jul 13, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's checking if we don't want to override - but it found that we already have added the data - so it's happy and returns "done" :)


existing_data.append(new_row)

print(f"Writing {existing_data}")
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This will show up during the installation for the user probably not very useful, debug(...) probably better here

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants