Add support for GPG signature enforcement on booted
[petitboot] / discover / user-event.c
index 15d9c87bebc2213a1cb265b532999921f0e92925..6ea754fea808de474368b887a43278aef8248fbb 100644 (file)
@@ -60,6 +60,8 @@ static const char *event_action_name(enum event_action action)
                return "dhcp";
        case EVENT_ACTION_BOOT:
                return "boot";
+       case EVENT_ACTION_SYNC:
+               return "sync";
        default:
                break;
        }
@@ -80,7 +82,7 @@ static void user_event_print_event(struct event __attribute__((unused)) *event)
 }
 
 static struct resource *user_event_resource(struct discover_boot_option *opt,
-               struct event *event)
+               struct event *event, bool gen_boot_args_sigfile)
 {
        const char *siaddr, *boot_file;
        struct resource *res;
@@ -99,7 +101,16 @@ static struct resource *user_event_resource(struct discover_boot_option *opt,
                return NULL;
        }
 
-       url_str = talloc_asprintf(opt, "%s%s/%s", "tftp://", siaddr, boot_file);
+       if (gen_boot_args_sigfile) {
+               char* args_sigfile_default = talloc_asprintf(opt,
+                       "%s.cmdline.sig", boot_file);
+               url_str = talloc_asprintf(opt, "%s%s/%s", "tftp://", siaddr,
+                       args_sigfile_default);
+               talloc_free(args_sigfile_default);
+       }
+       else
+               url_str = talloc_asprintf(opt, "%s%s/%s", "tftp://", siaddr,
+                       boot_file);
        url = pb_url_parse(opt, url_str);
        talloc_free(url_str);
 
@@ -141,12 +152,13 @@ static int parse_user_event(struct discover_context *ctx, struct event *event)
        opt->id = talloc_asprintf(opt, "%s#%s", dev->id, val);
        opt->name = talloc_strdup(opt, val);
 
-       d_opt->boot_image = user_event_resource(d_opt, event);
+       d_opt->boot_image = user_event_resource(d_opt, event, false);
        if (!d_opt->boot_image) {
                pb_log("%s: no boot image found for %s!\n", __func__,
                                opt->name);
                goto fail_opt;
        }
+       d_opt->args_sig_file = user_event_resource(d_opt, event, true);
 
        val = event_get_param(event, "rootpath");
        if (val) {
@@ -464,6 +476,18 @@ static int user_event_boot(struct user_event *uev, struct event *event)
        return 0;
 }
 
+static int user_event_sync(struct user_event *uev, struct event *event)
+{
+       struct device_handler *handler = uev->handler;
+
+       if (strncasecmp(event->device, "all", strlen("all")) != 0)
+               device_sync_snapshots(handler, event->device);
+       else
+               device_sync_snapshots(handler, NULL);
+
+       return 0;
+}
+
 static void user_event_handle_message(struct user_event *uev, char *buf,
        int len)
 {
@@ -499,6 +523,9 @@ static void user_event_handle_message(struct user_event *uev, char *buf,
        case EVENT_ACTION_BOOT:
                result = user_event_boot(uev, event);
                break;
+       case EVENT_ACTION_SYNC:
+               result = user_event_sync(uev, event);
+               break;
        default:
                break;
        }