#!/bin/bash # SPDX-Version: 3.0 # SPDX-CreationInfo: 2025-02-13; WEIDNER, Marc S.; # SPDX-ExternalRef: GIT https://cendev.eu/marc.weidner/CISS.2025.debian.installer.git # SPDX-FileContributor: WEIDNER, Marc S.; Centurion Intelligence Consulting Agency # SPDX-FileCopyrightText: 2024-2025; WEIDNER, Marc S.; # SPDX-FileType: SOURCE # SPDX-License-Identifier: EUPL-1.2 OR LicenseRef-CCLA-1.0 # SPDX-LicenseComment: This file is part of the CISS.2025.hardened.installer framework. # SPDX-PackageName: CISS.2025.hardened.installer # SPDX-Security-Contact: security@coresecret.eu ########################################################################################### # 3.7.3. Functions - installation - generate crypttab # ########################################################################################### ########################################################################################### # Generate "${TARGET}" /etc/crypttab entries. # Globals: # MAP_PATH_CRYPT # MAP_UUID_CRYPT # MODULE_ERR # MODULE_TXT # TARGET # Arguments: # None ########################################################################################### 3_7_3_functions_installation_generate_crypttab() { declare -g -x MODULE_ERR="3_7_3_functions_installation_generate_crypttab" declare -g -x MODULE_TXT="Generating '${TARGET}/etc/crypttab' entries" do_show_header "${MODULE_TXT}" # Generate '${TARGET}/etc/crypttab'. touch "${TARGET}"/etc/crypttab chmod 0644 "${TARGET}"/etc/crypttab # Generate '${TARGET}/etc/crypttab' header. # shellcheck disable=SC2129 cat << 'EOF' >> "${TARGET}"/etc/crypttab # EOF ### Reminder ### # MAP_UUID_CRYPT["${ENCRYPTION_LABEL}"]="${UUID}" # MAP_PATH_CRYPT["${MOUNT_PATH}"]="${ENCRYPTION_LABEL}" # do_log "info" "false" "Saved in HashMap MAP_UUID_CRYPT: '${ENCRYPTION_LABEL}' -> '${MAP_UUID_CRYPT["${ENCRYPTION_LABEL}"]}'" # do_log "info" "false" "Saved in HashMap MAP_PATH_CRYPT: '${MOUNT_PATH}' -> '${MAP_PATH_CRYPT["${MOUNT_PATH}"]}'" # Generate '${TARGET}/etc/crypttab' entries. declare KEY="" declare ENCRYPTION_LABEL="" for KEY in "${MAP_PATH_CRYPT[@]}"; do ENCRYPTION_LABEL="${MAP_PATH_CRYPT["${KEY}"]}" if [[ ${accounts_dropbear_unlock,,} == "true" ]]; then # shellcheck disable=2129 echo "# ${KEY} was on /dev/mapper/${MAP_PATH_CRYPT["${KEY}"]} during installation" >> "${TARGET}"/etc/crypttab echo "${MAP_PATH_CRYPT["${KEY}"]} UUID=${MAP_UUID_CRYPT["${ENCRYPTION_LABEL}"]} none luks,initramfs" >> "${TARGET}"/etc/crypttab echo "" >> "${TARGET}"/etc/crypttab do_log "info" "false" "'${TARGET}/etc/crypttab' entry generated: '${MAP_PATH_CRYPT["${KEY}"]} UUID=${MAP_UUID_CRYPT[${ENCRYPTION_LABEL}]} none luks,discard,initramfs'." elif [[ ${accounts_dropbear_unlock,,} == "false" ]]; then # shellcheck disable=2129 echo "# ${KEY} was on /dev/mapper/${MAP_PATH_CRYPT["${KEY}"]} during installation" >> "${TARGET}"/etc/crypttab echo "${MAP_PATH_CRYPT["${KEY}"]} UUID=${MAP_UUID_CRYPT["${ENCRYPTION_LABEL}"]} none luks" >> "${TARGET}"/etc/crypttab echo "" >> "${TARGET}"/etc/crypttab do_log "info" "false" "'${TARGET}/etc/crypttab' entry generated: '${MAP_PATH_CRYPT["${KEY}"]} UUID=${MAP_UUID_CRYPT[${ENCRYPTION_LABEL}]} none luks,discard'." fi done # TODO: Update loop to iterate thru dynamic number of ephemeral drives. # Generate '${TARGET}/etc/crypttab' special ephemeral entries. declare -a EPHEMERAL_MOUNT_PATH=("SWAP" "/tmp") declare KEY="" # MAP_EPHEMERAL_DEV["${MOUNT_PATH}"]="/dev/${DEV}${PARTITION}" # MAP_EPHEMERAL_ENCLABEL["${MOUNT_PATH}"]="${ENCRYPTION_LABEL}" for KEY in "${EPHEMERAL_MOUNT_PATH[@]}"; do if [[ ${KEY} == "SWAP" ]]; then # shellcheck disable=2129 echo "# ${KEY} was on ${MAP_EPHEMERAL_DEV[${KEY}]} during installation" >> "${TARGET}"/etc/crypttab # TODO: Change static 'LABEL=' to dynamic extraction of partitioning.yaml 'recipe_..._filesystem_label' recipe string. echo "${MAP_EPHEMERAL_ENCLABEL[${KEY}]} LABEL=SWAP /dev/random swap,offset=2048,cipher=aes-xts-plain64,size=512,sector-size=4096" >> "${TARGET}"/etc/crypttab echo "" >> "${TARGET}"/etc/crypttab do_log "info" "false" "'${TARGET}/etc/crypttab' entry generated: '${MAP_EPHEMERAL_ENCLABEL[${KEY}]} LABEL=SWAP /dev/random swap,offset=2048,cipher=aes-xts-plain64,size=512,sector-size=4096'." elif [[ ${KEY} == "/tmp" ]]; then # shellcheck disable=2129 echo "# ${KEY} was on ${MAP_EPHEMERAL_DEV[${KEY}]} during installation" >> "${TARGET}"/etc/crypttab # TODO: Change static 'LABEL=' to dynamic extraction of partitioning.yaml 'recipe_..._filesystem_label' recipe string. echo "${MAP_EPHEMERAL_ENCLABEL[${KEY}]} LABEL=ext4_tmp /dev/random offset=2048,cipher=aes-xts-plain64,size=512,sector-size=4096,tmp=ext4" >> "${TARGET}"/etc/crypttab echo "" >> "${TARGET}"/etc/crypttab do_log "info" "false" "'${TARGET}/etc/crypttab' entry generated: '${MAP_EPHEMERAL_ENCLABEL[${KEY}]} LABEL=ext4_tmp /dev/random offset=2048,cipher=aes-xts-plain64,size=512,sector-size=4096,tmp=ext4'." else do_log "info" "true" "${TARGET}/etc/crypttab entries written." fi done do_show_footer "${MODULE_TXT}" } # vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh: