allow hot key update even if install_url exists

This commit is contained in:
ghe0 2024-11-11 18:32:56 +02:00
parent 39c2bdb9d8
commit 8c8a60e821
Signed by: ghe0
GPG Key ID: 451028EE56A0FBB4
3 changed files with 6 additions and 9 deletions

@ -156,6 +156,7 @@ install_guest_api() {
# TODO: stick to master branch after code stabilizes # TODO: stick to master branch after code stabilizes
git checkout dtrfs git checkout dtrfs
git pull git pull
# TODO: download the binary from the detee registry
cargo build --release > "${my_location}/guest_api.log" 2>&1 || cargo build --release > "${my_location}/guest_api.log" 2>&1 ||
echo_red "Failed to build guest_api" echo_red "Failed to build guest_api"
strip --discard-all target/release/guest_api strip --discard-all target/release/guest_api

@ -11,8 +11,7 @@ create_mounts
load_modules load_modules
setup_network setup_network
# if you wait a bit, it works. The Kernel works in mysterious ways. # load this module again cause it fails the first time
sleep 2
modprobe sev_guest modprobe sev_guest
snp_key="$(GET_DERIVATION_KEY=yes guest_api)" snp_key="$(GET_DERIVATION_KEY=yes guest_api)"
@ -24,13 +23,13 @@ try_hot_decrypt || {
if [[ -f "$install_url" ]]; then if [[ -f "$install_url" ]]; then
install_os install_os
else else
cryptsetup open -d $root_keyfile /dev/vda1 root
mount /dev/mapper/root /mnt
fi
cryptsetup luksKillSlot -d $root_keyfile /dev/vda1 1 cryptsetup luksKillSlot -d $root_keyfile /dev/vda1 1
[[ -f "$snp_key_file" ]] && cryptsetup luksAddKey \ [[ -f "$snp_key_file" ]] && cryptsetup luksAddKey \
--key-file $root_keyfile \ --key-file $root_keyfile \
--new-keyfile $snp_key_file /dev/vda1 --new-keyfile $snp_key_file /dev/vda1
cryptsetup open -d $root_keyfile /dev/vda1 root
mount /dev/mapper/root /mnt
fi
} }
github_ssh_key github_ssh_key

@ -94,9 +94,6 @@ install_os() {
echo w echo w
) | fdisk /dev/vda ) | fdisk /dev/vda
cryptsetup luksFormat --batch-mode -d $root_keyfile /dev/vda1 cryptsetup luksFormat --batch-mode -d $root_keyfile /dev/vda1
[[ -f "$snp_key_file" ]] && cryptsetup luksAddKey \
--key-file $root_keyfile \
--new-keyfile $snp_key_file /dev/vda1
cryptsetup open -d $root_keyfile /dev/vda1 root cryptsetup open -d $root_keyfile /dev/vda1 root
mkfs.ext4 /dev/mapper/root mkfs.ext4 /dev/mapper/root
mount /dev/mapper/root /mnt mount /dev/mapper/root /mnt