blob: 3a6a8bb0ce4a2ba202a3ee87adfa1028c59af2cd [file] [log] [blame]
#include "estoraged.hpp"
#include "cryptErase.hpp"
#include "cryptsetupInterface.hpp"
#include "pattern.hpp"
#include "sanitize.hpp"
#include "verifyDriveGeometry.hpp"
#include "zero.hpp"
#include <libcryptsetup.h>
#include <openssl/rand.h>
#include <phosphor-logging/lg2.hpp>
#include <sdbusplus/asio/object_server.hpp>
#include <xyz/openbmc_project/Common/error.hpp>
#include <cstdlib>
#include <filesystem>
#include <iostream>
#include <string>
#include <string_view>
#include <utility>
#include <vector>
namespace estoraged
{
using Association = std::tuple<std::string, std::string, std::string>;
using sdbusplus::xyz::openbmc_project::Common::Error::InternalFailure;
using sdbusplus::xyz::openbmc_project::Common::Error::UnsupportedRequest;
using sdbusplus::xyz::openbmc_project::Inventory::Item::server::Drive;
using sdbusplus::xyz::openbmc_project::Inventory::Item::server::Volume;
EStoraged::EStoraged(sdbusplus::asio::object_server& server,
const std::string& configPath, const std::string& devPath,
const std::string& luksName, uint64_t size,
uint8_t lifeTime, const std::string& partNumber,
const std::string& serialNumber,
std::unique_ptr<CryptsetupInterface> cryptInterface,
std::unique_ptr<FilesystemInterface> fsInterface) :
devPath(devPath),
containerName(luksName), mountPoint("/mnt/" + luksName + "_fs"),
cryptIface(std::move(cryptInterface)), fsIface(std::move(fsInterface)),
cryptDevicePath(cryptIface->cryptGetDir() + "/" + luksName),
objectServer(server)
{
/* Get the filename of the device (without "/dev/"). */
std::string deviceName = std::filesystem::path(devPath).filename().string();
/* DBus object path */
std::string objectPath = "/xyz/openbmc_project/inventory/storage/" +
deviceName;
/* Add Volume interface. */
volumeInterface = objectServer.add_interface(
objectPath, "xyz.openbmc_project.Inventory.Item.Volume");
volumeInterface->register_method(
"FormatLuks", [this](const std::vector<uint8_t>& password,
Volume::FilesystemType type) {
this->formatLuks(password, type);
});
volumeInterface->register_method("Erase",
[this](Volume::EraseMethod eraseType) {
this->erase(eraseType);
});
volumeInterface->register_method("Lock", [this]() { this->lock(); });
volumeInterface->register_method("Unlock",
[this](std::vector<uint8_t>& password) {
this->unlock(password);
});
volumeInterface->register_method(
"ChangePassword", [this](const std::vector<uint8_t>& oldPassword,
const std::vector<uint8_t>& newPassword) {
this->changePassword(oldPassword, newPassword);
});
volumeInterface->register_property_r(
"Locked", lockedProperty, sdbusplus::vtable::property_::emits_change,
[this](bool& value) {
value = this->isLocked();
return value;
});
/* Add Drive interface. */
driveInterface = objectServer.add_interface(
objectPath, "xyz.openbmc_project.Inventory.Item.Drive");
driveInterface->register_property("Capacity", size);
driveInterface->register_property("PredictedMediaLifeLeftPercent",
lifeTime);
/* This registers the Locked property for the Drives interface.
* Now it is the same as the volume Locked property */
driveInterface->register_property_r(
"Locked", lockedProperty, sdbusplus::vtable::property_::emits_change,
[this](bool& value) {
value = this->isLocked();
return value;
});
driveInterface->register_property_r(
"EncryptionStatus", encryptionStatus,
sdbusplus::vtable::property_::emits_change,
[this](Drive::DriveEncryptionState& value) {
value = this->findEncryptionStatus();
return value;
});
embeddedLocationInterface = objectServer.add_interface(
objectPath, "xyz.openbmc_project.Inventory.Connector.Embedded");
/* Add Asset interface. */
assetInterface = objectServer.add_interface(
objectPath, "xyz.openbmc_project.Inventory.Decorator.Asset");
assetInterface->register_property("PartNumber", partNumber);
assetInterface->register_property("SerialNumber", serialNumber);
volumeInterface->initialize();
driveInterface->initialize();
embeddedLocationInterface->initialize();
assetInterface->initialize();
/* Set up the association between chassis and drive. */
association = objectServer.add_interface(
objectPath, "xyz.openbmc_project.Association.Definitions");
std::vector<Association> associations;
associations.emplace_back("chassis", "drive",
std::filesystem::path(configPath).parent_path());
association->register_property("Associations", associations);
association->initialize();
}
EStoraged::~EStoraged()
{
objectServer.remove_interface(volumeInterface);
objectServer.remove_interface(driveInterface);
objectServer.remove_interface(embeddedLocationInterface);
objectServer.remove_interface(assetInterface);
objectServer.remove_interface(association);
}
void EStoraged::formatLuks(const std::vector<uint8_t>& password,
Volume::FilesystemType type)
{
std::string msg = "OpenBMC.0.1.DriveFormat";
lg2::info("Starting format", "REDFISH_MESSAGE_ID", msg);
if (type != Volume::FilesystemType::ext4)
{
lg2::error("Only ext4 filesystems are supported currently",
"REDFISH_MESSAGE_ID", std::string("OpenBMC.0.1.FormatFail"));
throw UnsupportedRequest();
}
formatLuksDev(password);
activateLuksDev(password);
createFilesystem();
mountFilesystem();
}
void EStoraged::erase(Volume::EraseMethod inEraseMethod)
{
std::cerr << "Erasing encrypted eMMC" << std::endl;
lg2::info("Starting erase", "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.DriveErase"));
switch (inEraseMethod)
{
case Volume::EraseMethod::CryptoErase:
{
CryptErase myCryptErase(devPath);
myCryptErase.doErase();
break;
}
case Volume::EraseMethod::VerifyGeometry:
{
VerifyDriveGeometry myVerifyGeometry(devPath);
myVerifyGeometry.geometryOkay();
break;
}
case Volume::EraseMethod::LogicalOverWrite:
{
Pattern myErasePattern(devPath);
myErasePattern.writePattern();
break;
}
case Volume::EraseMethod::LogicalVerify:
{
Pattern myErasePattern(devPath);
myErasePattern.verifyPattern();
break;
}
case Volume::EraseMethod::VendorSanitize:
{
Sanitize mySanitize(devPath);
mySanitize.doSanitize();
break;
}
case Volume::EraseMethod::ZeroOverWrite:
{
Zero myZero(devPath);
myZero.writeZero();
break;
}
case Volume::EraseMethod::ZeroVerify:
{
Zero myZero(devPath);
myZero.verifyZero();
break;
}
case Volume::EraseMethod::SecuredLocked:
{
if (!isLocked())
{
lock();
}
// TODO: implement hardware locking
// Until that is done, we can lock using eStoraged::lock()
break;
}
}
}
void EStoraged::lock()
{
std::string msg = "OpenBMC.0.1.DriveLock";
lg2::info("Starting lock", "REDFISH_MESSAGE_ID", msg);
unmountFilesystem();
deactivateLuksDev();
}
void EStoraged::unlock(std::vector<uint8_t> password)
{
std::string msg = "OpenBMC.0.1.DriveUnlock";
lg2::info("Starting unlock", "REDFISH_MESSAGE_ID", msg);
activateLuksDev(std::move(password));
mountFilesystem();
}
void EStoraged::changePassword(const std::vector<uint8_t>& oldPassword,
const std::vector<uint8_t>& newPassword)
{
lg2::info("Starting change password", "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.DrivePasswordChanged"));
CryptHandle cryptHandle = loadLuksHeader();
int retval = cryptIface->cryptKeyslotChangeByPassphrase(
cryptHandle.get(), CRYPT_ANY_SLOT, CRYPT_ANY_SLOT,
reinterpret_cast<const char*>(oldPassword.data()), oldPassword.size(),
reinterpret_cast<const char*>(newPassword.data()), newPassword.size());
if (retval < 0)
{
lg2::error("Failed to change password", "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.DrivePasswordChangeFail"));
throw InternalFailure();
}
lg2::info("Successfully changed password for {DEV}", "DEV", devPath,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.DrivePasswordChangeSuccess"));
}
bool EStoraged::isLocked() const
{
/*
* Check if the mapped virtual device exists. If it exists, the LUKS volume
* is unlocked.
*/
try
{
std::filesystem::path mappedDevicePath(cryptDevicePath);
return (std::filesystem::exists(mappedDevicePath) == false);
}
catch (const std::exception& e)
{
lg2::error("Failed to query locked status: {EXCEPT}", "EXCEPT",
e.what(), "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.IsLockedFail"));
/* If we couldn't query the filesystem path, assume unlocked. */
return false;
}
}
std::string_view EStoraged::getMountPoint() const
{
return mountPoint;
}
void EStoraged::formatLuksDev(std::vector<uint8_t> password)
{
lg2::info("Formatting device {DEV}", "DEV", devPath, "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.FormatLuksDev"));
/* Generate the volume key. */
const std::size_t keySize = 64;
std::vector<uint8_t> volumeKey(keySize);
if (RAND_bytes(volumeKey.data(), keySize) != 1)
{
lg2::error("Failed to create volume key", "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.FormatLuksDevFail"));
throw InternalFailure();
}
/* Create the handle. */
CryptHandle cryptHandle(devPath);
/* Format the LUKS encrypted device. */
int retval = cryptIface->cryptFormat(
cryptHandle.get(), CRYPT_LUKS2, "aes", "xts-plain64", nullptr,
reinterpret_cast<const char*>(volumeKey.data()), volumeKey.size(),
nullptr);
if (retval < 0)
{
lg2::error("Failed to format encrypted device: {RETVAL}", "RETVAL",
retval, "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.FormatLuksDevFail"));
throw InternalFailure();
}
/* Set the password. */
retval = cryptIface->cryptKeyslotAddByVolumeKey(
cryptHandle.get(), CRYPT_ANY_SLOT, nullptr, 0,
reinterpret_cast<const char*>(password.data()), password.size());
if (retval < 0)
{
lg2::error("Failed to set encryption password", "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.FormatLuksDevFail"));
throw InternalFailure();
}
lg2::info("Encrypted device {DEV} successfully formatted", "DEV", devPath,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.FormatLuksDevSuccess"));
}
CryptHandle EStoraged::loadLuksHeader()
{
CryptHandle cryptHandle(devPath);
int retval = cryptIface->cryptLoad(cryptHandle.get(), CRYPT_LUKS2, nullptr);
if (retval < 0)
{
lg2::error("Failed to load LUKS header: {RETVAL}", "RETVAL", retval,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.ActivateLuksDevFail"));
throw InternalFailure();
}
return cryptHandle;
}
Drive::DriveEncryptionState EStoraged::findEncryptionStatus()
{
try
{
loadLuksHeader();
return Drive::DriveEncryptionState::Encrypted;
}
catch (...)
{
return Drive::DriveEncryptionState::Unknown;
}
}
void EStoraged::activateLuksDev(std::vector<uint8_t> password)
{
lg2::info("Activating LUKS dev {DEV}", "DEV", devPath, "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.ActivateLuksDev"));
/* Create the handle. */
CryptHandle cryptHandle = loadLuksHeader();
int retval = cryptIface->cryptActivateByPassphrase(
cryptHandle.get(), containerName.c_str(), CRYPT_ANY_SLOT,
reinterpret_cast<const char*>(password.data()), password.size(), 0);
if (retval < 0)
{
lg2::error("Failed to activate LUKS dev: {RETVAL}", "RETVAL", retval,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.ActivateLuksDevFail"));
throw InternalFailure();
}
lg2::info("Successfully activated LUKS dev {DEV}", "DEV", devPath,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.ActivateLuksDevSuccess"));
}
void EStoraged::createFilesystem()
{
/* Run the command to create the filesystem. */
int retval = fsIface->runMkfs(cryptDevicePath);
if (retval != 0)
{
lg2::error("Failed to create filesystem: {RETVAL}", "RETVAL", retval,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.CreateFilesystemFail"));
throw InternalFailure();
}
lg2::info("Successfully created filesystem for {CONTAINER}", "CONTAINER",
cryptDevicePath, "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.CreateFilesystemSuccess"));
}
void EStoraged::mountFilesystem()
{
/*
* Create directory for the filesystem, if it's not already present. It
* might already exist if, for example, the BMC reboots after creating the
* directory.
*/
if (!fsIface->directoryExists(std::filesystem::path(mountPoint)))
{
bool success =
fsIface->createDirectory(std::filesystem::path(mountPoint));
if (!success)
{
lg2::error("Failed to create mount point: {DIR}", "DIR", mountPoint,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.MountFilesystemFail"));
throw InternalFailure();
}
}
/* Run the command to mount the filesystem. */
int retval = fsIface->doMount(cryptDevicePath.c_str(), mountPoint.c_str(),
"ext4", 0, nullptr);
if (retval != 0)
{
lg2::error("Failed to mount filesystem: {RETVAL}", "RETVAL", retval,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.MountFilesystemFail"));
bool removeSuccess =
fsIface->removeDirectory(std::filesystem::path(mountPoint));
if (!removeSuccess)
{
lg2::error("Failed to remove mount point: {DIR}", "DIR", mountPoint,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.MountFilesystemFail"));
}
throw InternalFailure();
}
lg2::info("Successfully mounted filesystem at {DIR}", "DIR", mountPoint,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.MountFilesystemSuccess"));
}
void EStoraged::unmountFilesystem()
{
int retval = fsIface->doUnmount(mountPoint.c_str());
if (retval != 0)
{
lg2::error("Failed to unmount filesystem: {RETVAL}", "RETVAL", retval,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.UnmountFilesystemFail"));
throw InternalFailure();
}
/* Remove the mount point. */
bool success = fsIface->removeDirectory(std::filesystem::path(mountPoint));
if (!success)
{
lg2::error("Failed to remove mount point {DIR}", "DIR", mountPoint,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.UnmountFilesystemFail"));
throw InternalFailure();
}
lg2::info("Successfully unmounted filesystem at {DIR}", "DIR", mountPoint,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.MountFilesystemSuccess"));
}
void EStoraged::deactivateLuksDev()
{
lg2::info("Deactivating LUKS device {DEV}", "DEV", devPath,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.DeactivateLuksDev"));
int retval = cryptIface->cryptDeactivate(nullptr, containerName.c_str());
if (retval < 0)
{
lg2::error("Failed to deactivate crypt device: {RETVAL}", "RETVAL",
retval, "REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.DeactivateLuksDevFail"));
throw InternalFailure();
}
lg2::info("Successfully deactivated LUKS device {DEV}", "DEV", devPath,
"REDFISH_MESSAGE_ID",
std::string("OpenBMC.0.1.DeactivateLuksDevSuccess"));
}
std::string_view EStoraged::getCryptDevicePath() const
{
return cryptDevicePath;
}
} // namespace estoraged