2020-03-04 09:35:06 +00:00
#!/usr/bin/env bash
2021-10-17 18:13:06 +02:00
# SPDX-License-Identifier: LGPL-2.1-or-later
2017-08-07 21:09:21 +02:00
set -e
2021-04-19 13:01:59 +02:00
2012-09-13 23:19:05 +02:00
TEST_DESCRIPTION = "cryptsetup systemd setup"
2019-12-12 09:37:19 +01:00
IMAGE_NAME = "cryptsetup"
2017-08-04 14:34:14 +02:00
TEST_NO_NSPAWN = 1
2021-01-06 21:42:28 +00:00
TEST_FORCE_NEWIMAGE = 1
2012-09-13 23:19:05 +02:00
2021-04-19 13:01:59 +02:00
# shellcheck source=test/test-functions
. " ${ TEST_BASE_DIR : ? } /test-functions "
2012-09-13 23:19:05 +02:00
2013-11-05 23:32:56 +01:00
check_result_qemu( ) {
2021-04-19 13:01:59 +02:00
local ret = 1
2020-03-20 20:17:11 +01:00
mount_initdir
2021-04-19 13:01:59 +02:00
[ [ -e " ${ initdir : ? } /testok " ] ] && ret = 0
[ [ -f " $initdir /failed " ] ] && cp -a " $initdir /failed " " ${ TESTDIR : ? } "
cryptsetup luksOpen " ${ LOOPDEV : ? } p2 " varcrypt <" $TESTDIR /keyfile "
mount /dev/mapper/varcrypt " $initdir /var "
save_journal " $initdir /var/log/journal "
2021-10-21 18:12:06 +02:00
check_coverage_reports " ${ initdir : ? } " || ret = 5
2021-04-19 13:01:59 +02:00
_umount_dir " $initdir /var "
_umount_dir " $initdir "
2012-09-13 23:19:05 +02:00
cryptsetup luksClose /dev/mapper/varcrypt
2021-04-19 13:01:59 +02:00
[ [ -f " $TESTDIR /failed " ] ] && cat " $TESTDIR /failed "
echo " ${ JOURNAL_LIST :- No journals were saved } "
2021-04-23 10:55:49 +02:00
test -s " $TESTDIR /failed " && ret = 1
2012-09-13 23:19:05 +02:00
return $ret
}
2019-12-12 09:37:19 +01:00
test_create_image( ) {
2019-07-12 11:47:26 -04:00
create_empty_image_rootdir
2021-04-19 13:01:59 +02:00
echo -n test >" ${ TESTDIR : ? } /keyfile "
cryptsetup -q luksFormat --pbkdf pbkdf2 --pbkdf-force-iterations 1000 " ${ LOOPDEV : ? } p2 " " $TESTDIR /keyfile "
cryptsetup luksOpen " ${ LOOPDEV } p2 " varcrypt <" $TESTDIR /keyfile "
2017-11-07 09:51:30 -05:00
mkfs.ext4 -L var /dev/mapper/varcrypt
2021-04-19 13:01:59 +02:00
mkdir -p " ${ initdir : ? } /var "
mount /dev/mapper/varcrypt " $initdir /var "
2012-09-13 23:19:05 +02:00
# Create what will eventually be our root filesystem onto an overlay
(
LOG_LEVEL = 5
2021-04-19 13:01:59 +02:00
# shellcheck source=/dev/null
source <( udevadm info --export --query= env --name= /dev/mapper/varcrypt)
# shellcheck source=/dev/null
source <( udevadm info --export --query= env --name= " ${ LOOPDEV } p2 " )
2012-09-13 23:19:05 +02:00
2013-11-05 23:32:56 +01:00
setup_basic_environment
2019-10-08 09:10:12 +02:00
mask_supporting_services
2018-11-01 17:26:36 +09:00
2013-11-05 23:32:56 +01:00
install_dmevent
2013-12-08 00:30:16 +01:00
generate_module_dependencies
2021-04-19 13:01:59 +02:00
cat >" $initdir /etc/crypttab " <<EOF
2013-11-05 23:32:56 +01:00
$DM_NAME UUID = $ID_FS_UUID /etc/varkey
2012-09-13 23:19:05 +02:00
EOF
2021-04-19 13:01:59 +02:00
echo -n test >" $initdir /etc/varkey "
ddebug <" $initdir /etc/crypttab "
2012-09-13 23:19:05 +02:00
2021-04-19 13:01:59 +02:00
cat >>" $initdir /etc/fstab " <<EOF
2017-11-07 09:51:30 -05:00
/dev/mapper/varcrypt /var ext4 defaults 0 1
2013-11-05 23:32:56 +01:00
EOF
2020-06-09 16:51:55 +02:00
# Forward journal messages to the console, so we have something
# to investigate even if we fail to mount the encrypted /var
2021-04-19 13:01:59 +02:00
echo ForwardToConsole = yes >> " $initdir /etc/systemd/journald.conf "
2019-07-08 21:11:32 +02:00
)
2019-07-12 11:47:26 -04:00
}
2012-09-13 23:19:05 +02:00
2019-07-12 11:47:26 -04:00
cleanup_root_var( ) {
2021-04-19 13:01:59 +02:00
ddebug " umount ${ initdir : ? } /var "
mountpoint " $initdir /var " && umount " $initdir /var "
2019-07-12 11:47:26 -04:00
[ [ -b /dev/mapper/varcrypt ] ] && cryptsetup luksClose /dev/mapper/varcrypt
2012-09-13 23:19:05 +02:00
}
test_cleanup( ) {
2019-07-12 14:09:48 -04:00
# ignore errors, so cleanup can continue
2019-07-18 20:34:57 -04:00
cleanup_root_var || :
2019-07-12 11:47:26 -04:00
_test_cleanup
}
test_setup_cleanup( ) {
2019-12-13 14:21:31 +01:00
cleanup_root_var || :
cleanup_initdir
2012-09-13 23:19:05 +02:00
}
2021-04-26 19:20:18 +02:00
do_test " $@ "