;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2013 Andreas Enge ;;; Copyright © 2016 Ludovic Courtès ;;; Copyright © 2019–2021 Tobias Geerinckx-Rice ;;; ;;; This file is part of GNU Guix. ;;; ;;; GNU Guix is free software; you can redistribute it and/or modify it ;;; under the terms of the GNU General Public License as published by ;;; the Free Software Foundation; either version 3 of the License, or (at ;;; your option) any later version. ;;; ;;; GNU Guix is distributed in the hope that it will be useful, but ;;; WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ;;; GNU General Public License for more details. ;;; ;;; You should have received a copy of the GNU General Public License ;;; along with GNU Guix. If not, see . (define-module (gnu packages cryptsetup) #:use-module ((guix licenses) #:prefix license:) #:use-module (guix packages) #:use-module (guix download) #:use-module (guix build-system gnu) #:use-module (guix utils) #:use-module (gnu packages) #:use-module (gnu packages gnupg) #:use-module (gnu packages password-utils) #:use-module (gnu packages pkg-config) #:use-module (gnu packages popt) #:use-module (gnu packages linux) #:use-module (gnu packages web)) (define-public cryptsetup (package (name "cryptsetup") (version "2.3.7") (source (origin (method url-fetch) (uri (string-append "mirror://kernel.org/linux/utils/cryptsetup/v" (version-major+minor version) "/cryptsetup-" version ".tar.xz")) (sha256 (base32 "1a97rvi6arsj8dikh1qsvixx9rizm89k155q2ypifqlqllr530v1")))) (build-system gnu-build-system) (arguments `(#:configure-flags (list ;; Argon2 is always enabled, this just selects the (faster) full version. "--enable-libargon2" ;; The default is OpenSSL which provides better PBKDF performance. "--with-crypto_backend=gcrypt" ;; GRUB 2.06 supports LUKS2, but does it reliably support all set-ups…? "--with-default-luks-format=LUKS1"))) (native-inputs (list pkg-config)) (inputs (list argon2 json-c libgcrypt lvm2 ; device-mapper popt `(,util-linux "lib"))) ;libuuid (synopsis "Set up transparent encryption of block devices using dm-crypt") (description "Cryptsetup is a utility used to conveniently set up disk encryption based on the @code{dm-crypt} Linux kernel module. It is most often used to manage LUKS volumes but also supports plain dm-crypt volumes and loop-AES, TrueCrypt (including VeraCrypt extension), and BitLocker formats. @acronym{LUKS, Linux Unified Key Setup} is the standard for hard disk encryption with the kernel Linux. It provides a standard on-disk-format compatible amongst distributions as well as secure management of multiple user passwords. LUKS stores all necessary setup information in the partition header to facilitate data transport and migration. The package also includes the @command{veritysetup} and @command{integritysetup} utilities to conveniently configure the @code{dm-verity} and @code{dm-integrity} block integrity kernel modules.") (license license:gpl2) (home-page "https://gitlab.com/cryptsetup/cryptsetup"))) (define (static-library library) "Return a variant of package LIBRARY that provides static libraries ('.a' files). This assumes LIBRARY uses Libtool." (package (inherit library) (name (string-append (package-name library) "-static")) (arguments (substitute-keyword-arguments (package-arguments library) ((#:configure-flags flags ''()) `(append '("--disable-shared" "--enable-static") ,flags)))))) (define-public cryptsetup-static ;; Stripped-down statically-linked 'cryptsetup' command for use in initrds. (package (inherit cryptsetup) (name "cryptsetup-static") (arguments '(#:configure-flags '("--disable-shared" "--enable-static-cryptsetup" "--disable-veritysetup" "--disable-cryptsetup-reencrypt" "--disable-integritysetup" ;; The default is OpenSSL which provides better PBKDF performance. "--with-crypto_backend=gcrypt" "--disable-blkid" ;; 'libdevmapper.a' pulls in libpthread, libudev and libm. "LIBS=-ludev -pthread -lm") #:allowed-references () ;this should be self-contained #:modules ((ice-9 ftw) (ice-9 match) (guix build utils) (guix build gnu-build-system)) #:phases (modify-phases %standard-phases (add-after 'install 'remove-cruft (lambda* (#:key outputs #:allow-other-keys) ;; Remove everything except the 'cryptsetup' command. (let ((out (assoc-ref outputs "out"))) (with-directory-excursion out (let ((dirs (scandir "." (match-lambda ((or "." "..") #f) (_ #t))))) (for-each delete-file-recursively (delete "sbin" dirs)) (for-each (lambda (file) (rename-file (string-append file ".static") file) (remove-store-references file)) '("sbin/cryptsetup")) #t)))))))) (inputs (let ((libgcrypt-static (package (inherit (static-library libgcrypt)) (propagated-inputs `(("libgpg-error-host" ,(static-library libgpg-error))))))) `(("json-c" ,json-c-0.13) ("libgcrypt" ,libgcrypt-static) ("lvm2" ,lvm2-static) ("util-linux" ,util-linux "static") ("util-linux" ,util-linux "lib") ("popt" ,popt)))) (synopsis "Hard disk encryption tool (statically linked)"))) /a>...Reported by John Darrington. * guix/scripts/challenge.scm (guix-challenge): Add an explicit 'exit' call when ISSUES is empty. * scripts/guix.in: Add comment about 'exit'. * doc/guix.texi (Invoking guix challenge): Mention the behavior and exit code. Ludovic Courtès 2014-06-14guix: Look for "guix-packages" messages in $localedir....* scripts/guix.in (run-guix-main): Add 'bindtextdomain' call. Ludovic Courtès