7e05e809b7
The files are apparently processed in alphabetic order, so cli_args.go is processed before main.go. In order to run before the go-fuse imports, put the 'ensure fds' code in a separate package. Debug messages are omitted to avoid additional imports (that might contain other code messing up our file descriptors).
331 lines
9.4 KiB
Go
331 lines
9.4 KiB
Go
package main
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/hanwen/go-fuse/fuse"
|
|
|
|
"github.com/rfjakob/gocryptfs/internal/configfile"
|
|
"github.com/rfjakob/gocryptfs/internal/contentenc"
|
|
"github.com/rfjakob/gocryptfs/internal/exitcodes"
|
|
"github.com/rfjakob/gocryptfs/internal/readpassword"
|
|
"github.com/rfjakob/gocryptfs/internal/speed"
|
|
"github.com/rfjakob/gocryptfs/internal/stupidgcm"
|
|
"github.com/rfjakob/gocryptfs/internal/tlog"
|
|
)
|
|
|
|
// GitVersion is the gocryptfs version according to git, set by build.bash
|
|
var GitVersion = "[GitVersion not set - please compile using ./build.bash]"
|
|
|
|
// GitVersionFuse is the go-fuse library version, set by build.bash
|
|
var GitVersionFuse = "[GitVersionFuse not set - please compile using ./build.bash]"
|
|
|
|
// BuildDate is a date string like "2017-09-06", set by build.bash
|
|
var BuildDate = "0000-00-00"
|
|
|
|
// raceDetector is set to true by race.go if we are compiled with "go build -race"
|
|
var raceDetector bool
|
|
|
|
// loadConfig loads the config file "args.config", prompting the user for the password
|
|
func loadConfig(args *argContainer) (masterkey []byte, cf *configfile.ConfFile, err error) {
|
|
// First check if the file can be read at all, and find out if a Trezor should
|
|
// be used instead of a password.
|
|
cf, err = configfile.Load(args.config)
|
|
if err != nil {
|
|
tlog.Fatal.Printf("Cannot open config file: %v", err)
|
|
return nil, nil, err
|
|
}
|
|
// The user has passed the master key on the command line (probably because
|
|
// he forgot the password).
|
|
if args.masterkey != "" {
|
|
masterkey = parseMasterKey(args.masterkey, false)
|
|
return masterkey, cf, nil
|
|
}
|
|
var pw []byte
|
|
if cf.IsFeatureFlagSet(configfile.FlagTrezor) {
|
|
// Get binary data from Trezor
|
|
pw = readpassword.Trezor(cf.TrezorPayload)
|
|
} else {
|
|
// Normal password entry
|
|
pw = readpassword.Once(args.extpass, args.passfile, "")
|
|
}
|
|
tlog.Info.Println("Decrypting master key")
|
|
masterkey, err = cf.DecryptMasterKey(pw)
|
|
for i := range pw {
|
|
pw[i] = 0
|
|
}
|
|
|
|
if err != nil {
|
|
tlog.Fatal.Println(err)
|
|
return nil, nil, err
|
|
}
|
|
return masterkey, cf, nil
|
|
}
|
|
|
|
// changePassword - change the password of config file "filename"
|
|
// Does not return (calls os.Exit both on success and on error).
|
|
func changePassword(args *argContainer) {
|
|
// Parse the config file, but do not unlock the master key. We only want to
|
|
// know if the Trezor flag is set.
|
|
cf1, err := configfile.Load(args.config)
|
|
if err != nil {
|
|
tlog.Fatal.Printf("Cannot open config file: %v", err)
|
|
os.Exit(exitcodes.LoadConf)
|
|
}
|
|
if cf1.IsFeatureFlagSet(configfile.FlagTrezor) {
|
|
tlog.Fatal.Printf("Password change is not supported on Trezor-enabled filesystems.")
|
|
os.Exit(exitcodes.Usage)
|
|
}
|
|
var confFile *configfile.ConfFile
|
|
{
|
|
var masterkey []byte
|
|
masterkey, confFile, err = loadConfig(args)
|
|
if err != nil {
|
|
exitcodes.Exit(err)
|
|
}
|
|
if len(masterkey) == 0 {
|
|
log.Panic("empty masterkey")
|
|
}
|
|
tlog.Info.Println("Please enter your new password.")
|
|
newPw := readpassword.Twice(args.extpass, args.passfile)
|
|
readpassword.CheckTrailingGarbage()
|
|
confFile.EncryptKey(masterkey, newPw, confFile.ScryptObject.LogN())
|
|
for i := range newPw {
|
|
newPw[i] = 0
|
|
}
|
|
for i := range masterkey {
|
|
masterkey[i] = 0
|
|
}
|
|
// masterkey and newPw run out of scope here
|
|
}
|
|
// Are we resetting the password without knowing the old one using
|
|
// "-masterkey"?
|
|
if args.masterkey != "" {
|
|
bak := args.config + ".bak"
|
|
err = os.Link(args.config, bak)
|
|
if err != nil {
|
|
tlog.Fatal.Printf("Could not create backup file: %v", err)
|
|
os.Exit(exitcodes.Init)
|
|
}
|
|
tlog.Info.Printf(tlog.ColorGrey+
|
|
"A copy of the old config file has been created at %q.\n"+
|
|
"Delete it after you have verified that you can access your files with the new password."+
|
|
tlog.ColorReset, bak)
|
|
}
|
|
err = confFile.WriteFile()
|
|
if err != nil {
|
|
tlog.Fatal.Println(err)
|
|
os.Exit(exitcodes.WriteConf)
|
|
}
|
|
tlog.Info.Printf(tlog.ColorGreen + "Password changed." + tlog.ColorReset)
|
|
}
|
|
|
|
// printVersion prints a version string like this:
|
|
// gocryptfs v0.12-36-ge021b9d-dirty; go-fuse a4c968c; 2016-07-03 go1.6.2
|
|
func printVersion() {
|
|
var tagsSlice []string
|
|
if stupidgcm.BuiltWithoutOpenssl {
|
|
tagsSlice = append(tagsSlice, "without_openssl")
|
|
}
|
|
if readpassword.TrezorSupport {
|
|
tagsSlice = append(tagsSlice, "enable_trezor")
|
|
}
|
|
tags := ""
|
|
if tagsSlice != nil {
|
|
tags = " " + strings.Join(tagsSlice, " ")
|
|
}
|
|
built := fmt.Sprintf("%s %s", BuildDate, runtime.Version())
|
|
if raceDetector {
|
|
built += " -race"
|
|
}
|
|
fmt.Printf("%s %s%s; go-fuse %s; %s\n",
|
|
tlog.ProgramName, GitVersion, tags, GitVersionFuse, built)
|
|
}
|
|
|
|
func main() {
|
|
mxp := runtime.GOMAXPROCS(0)
|
|
if mxp < 4 {
|
|
// On a 2-core machine, setting maxprocs to 4 gives 10% better performance
|
|
runtime.GOMAXPROCS(4)
|
|
}
|
|
// mount(1) unsets PATH. Since exec.Command does not handle this case, we set
|
|
// PATH to a default value if it's empty or unset.
|
|
if os.Getenv("PATH") == "" {
|
|
os.Setenv("PATH", "/usr/sbin:/usr/bin:/sbin:/bin")
|
|
}
|
|
var err error
|
|
// Parse all command-line options (i.e. arguments starting with "-")
|
|
// into "args". Path arguments are parsed below.
|
|
args := parseCliOpts()
|
|
// Fork a child into the background if "-fg" is not set AND we are mounting
|
|
// a filesystem. The child will do all the work.
|
|
if !args.fg && flagSet.NArg() == 2 {
|
|
ret := forkChild()
|
|
os.Exit(ret)
|
|
}
|
|
if args.debug {
|
|
tlog.Debug.Enabled = true
|
|
}
|
|
// "-v"
|
|
if args.version {
|
|
tlog.Debug.Printf("openssl=%v\n", args.openssl)
|
|
tlog.Debug.Printf("on-disk format %d\n", contentenc.CurrentVersion)
|
|
printVersion()
|
|
os.Exit(0)
|
|
}
|
|
// "-hh"
|
|
if args.hh {
|
|
helpLong()
|
|
os.Exit(0)
|
|
}
|
|
// "-speed"
|
|
if args.speed {
|
|
speed.Run()
|
|
os.Exit(0)
|
|
}
|
|
if args.wpanic {
|
|
tlog.Warn.Wpanic = true
|
|
tlog.Debug.Printf("Panicking on warnings")
|
|
}
|
|
// Every operation below requires CIPHERDIR. Exit if we don't have it.
|
|
if flagSet.NArg() == 0 {
|
|
if flagSet.NFlag() == 0 {
|
|
// Naked call to "gocryptfs". Just print the help text.
|
|
helpShort()
|
|
} else {
|
|
// The user has passed some flags, but CIPHERDIR is missing. State
|
|
// what is wrong.
|
|
tlog.Fatal.Printf("CIPHERDIR argument is missing")
|
|
}
|
|
os.Exit(exitcodes.Usage)
|
|
}
|
|
// Check that CIPHERDIR exists
|
|
args.cipherdir, _ = filepath.Abs(flagSet.Arg(0))
|
|
err = isDir(args.cipherdir)
|
|
if err != nil {
|
|
tlog.Fatal.Printf("Invalid cipherdir: %v", err)
|
|
os.Exit(exitcodes.CipherDir)
|
|
}
|
|
// "-q"
|
|
if args.quiet {
|
|
tlog.Info.Enabled = false
|
|
}
|
|
// "-reverse" implies "-aessiv"
|
|
if args.reverse {
|
|
args.aessiv = true
|
|
} else {
|
|
if args.exclude != nil {
|
|
tlog.Fatal.Printf("-exclude only works in reverse mode")
|
|
os.Exit(exitcodes.ExcludeError)
|
|
}
|
|
}
|
|
// "-config"
|
|
if args.config != "" {
|
|
args.config, err = filepath.Abs(args.config)
|
|
if err != nil {
|
|
tlog.Fatal.Printf("Invalid \"-config\" setting: %v", err)
|
|
os.Exit(exitcodes.Init)
|
|
}
|
|
tlog.Info.Printf("Using config file at custom location %s", args.config)
|
|
args._configCustom = true
|
|
} else if args.reverse {
|
|
args.config = filepath.Join(args.cipherdir, configfile.ConfReverseName)
|
|
} else {
|
|
args.config = filepath.Join(args.cipherdir, configfile.ConfDefaultName)
|
|
}
|
|
// "-force_owner"
|
|
if args.force_owner != "" {
|
|
var uidNum, gidNum int64
|
|
ownerPieces := strings.SplitN(args.force_owner, ":", 2)
|
|
if len(ownerPieces) != 2 {
|
|
tlog.Fatal.Printf("force_owner must be in form UID:GID")
|
|
os.Exit(exitcodes.Usage)
|
|
}
|
|
uidNum, err = strconv.ParseInt(ownerPieces[0], 0, 32)
|
|
if err != nil || uidNum < 0 {
|
|
tlog.Fatal.Printf("force_owner: Unable to parse UID %v as positive integer", ownerPieces[0])
|
|
os.Exit(exitcodes.Usage)
|
|
}
|
|
gidNum, err = strconv.ParseInt(ownerPieces[1], 0, 32)
|
|
if err != nil || gidNum < 0 {
|
|
tlog.Fatal.Printf("force_owner: Unable to parse GID %v as positive integer", ownerPieces[1])
|
|
os.Exit(exitcodes.Usage)
|
|
}
|
|
args._forceOwner = &fuse.Owner{Uid: uint32(uidNum), Gid: uint32(gidNum)}
|
|
}
|
|
// "-cpuprofile"
|
|
if args.cpuprofile != "" {
|
|
onExitFunc := setupCpuprofile(args.cpuprofile)
|
|
defer onExitFunc()
|
|
}
|
|
// "-memprofile"
|
|
if args.memprofile != "" {
|
|
onExitFunc := setupMemprofile(args.memprofile)
|
|
defer onExitFunc()
|
|
}
|
|
// "-trace"
|
|
if args.trace != "" {
|
|
onExitFunc := setupTrace(args.trace)
|
|
defer onExitFunc()
|
|
}
|
|
if args.cpuprofile != "" || args.memprofile != "" || args.trace != "" {
|
|
tlog.Info.Printf("Note: You must unmount gracefully, otherwise the profile file(s) will stay empty!\n")
|
|
}
|
|
// "-openssl"
|
|
if !args.openssl {
|
|
tlog.Debug.Printf("OpenSSL disabled, using Go GCM")
|
|
} else {
|
|
tlog.Debug.Printf("OpenSSL enabled")
|
|
}
|
|
// Operation flags
|
|
nOps := countOpFlags(&args)
|
|
if nOps == 0 {
|
|
// Default operation: mount.
|
|
if flagSet.NArg() != 2 {
|
|
prettyArgs := prettyArgs()
|
|
tlog.Info.Printf("Wrong number of arguments (have %d, want 2). You passed: %s",
|
|
flagSet.NArg(), prettyArgs)
|
|
tlog.Fatal.Printf("Usage: %s [OPTIONS] CIPHERDIR MOUNTPOINT [-o COMMA-SEPARATED-OPTIONS]", tlog.ProgramName)
|
|
os.Exit(exitcodes.Usage)
|
|
}
|
|
doMount(&args)
|
|
// Don't call os.Exit to give deferred functions a chance to run
|
|
return
|
|
}
|
|
if nOps > 1 {
|
|
tlog.Fatal.Printf("At most one of -info, -init, -passwd, -fsck is allowed")
|
|
os.Exit(exitcodes.Usage)
|
|
}
|
|
if flagSet.NArg() != 1 {
|
|
tlog.Fatal.Printf("The options -info, -init, -passwd, -fsck take exactly one argument, %d given",
|
|
flagSet.NArg())
|
|
os.Exit(exitcodes.Usage)
|
|
}
|
|
// "-info"
|
|
if args.info {
|
|
info(args.config)
|
|
os.Exit(0)
|
|
}
|
|
// "-init"
|
|
if args.init {
|
|
initDir(&args)
|
|
os.Exit(0)
|
|
}
|
|
// "-passwd"
|
|
if args.passwd {
|
|
changePassword(&args)
|
|
os.Exit(0)
|
|
}
|
|
// "-fsck"
|
|
if args.fsck {
|
|
fsck(&args)
|
|
os.Exit(0)
|
|
}
|
|
}
|