2020-03-04 12:35:06 +03:00
#!/usr/bin/env bash
2017-08-07 22:09:21 +03:00
set -e
2021-04-19 14:01:59 +03:00
2012-09-14 01:19:05 +04:00
TEST_DESCRIPTION = "cryptsetup systemd setup"
2019-12-12 11:37:19 +03:00
IMAGE_NAME = "cryptsetup"
2017-08-04 15:34:14 +03:00
TEST_NO_NSPAWN = 1
2021-01-07 00:42:28 +03:00
TEST_FORCE_NEWIMAGE = 1
2012-09-14 01:19:05 +04:00
2021-04-19 14:01:59 +03:00
# shellcheck source=test/test-functions
. " ${ TEST_BASE_DIR : ? } /test-functions "
2012-09-14 01:19:05 +04:00
2013-11-06 02:32:56 +04:00
check_result_qemu( ) {
2021-04-19 14:01:59 +03:00
local ret = 1
2020-03-20 22:17:11 +03:00
mount_initdir
2021-04-19 14:01:59 +03:00
[ [ -e " ${ initdir : ? } /testok " ] ] && ret = 0
[ [ -f " $initdir /failed " ] ] && cp -a " $initdir /failed " " ${ TESTDIR : ? } "
cryptsetup luksOpen " ${ LOOPDEV : ? } p2 " varcrypt <" $TESTDIR /keyfile "
mount /dev/mapper/varcrypt " $initdir /var "
save_journal " $initdir /var/log/journal "
_umount_dir " $initdir /var "
_umount_dir " $initdir "
2012-09-14 01:19:05 +04:00
cryptsetup luksClose /dev/mapper/varcrypt
2021-04-19 14:01:59 +03:00
[ [ -f " $TESTDIR /failed " ] ] && cat " $TESTDIR /failed "
echo " ${ JOURNAL_LIST :- No journals were saved } "
2021-04-23 11:55:49 +03:00
test -s " $TESTDIR /failed " && ret = 1
2012-09-14 01:19:05 +04:00
return $ret
}
2019-12-12 11:37:19 +03:00
test_create_image( ) {
2019-07-12 18:47:26 +03:00
create_empty_image_rootdir
2021-04-19 14:01:59 +03:00
echo -n test >" ${ TESTDIR : ? } /keyfile "
cryptsetup -q luksFormat --pbkdf pbkdf2 --pbkdf-force-iterations 1000 " ${ LOOPDEV : ? } p2 " " $TESTDIR /keyfile "
cryptsetup luksOpen " ${ LOOPDEV } p2 " varcrypt <" $TESTDIR /keyfile "
2017-11-07 17:51:30 +03:00
mkfs.ext4 -L var /dev/mapper/varcrypt
2021-04-19 14:01:59 +03:00
mkdir -p " ${ initdir : ? } /var "
mount /dev/mapper/varcrypt " $initdir /var "
2012-09-14 01:19:05 +04:00
# Create what will eventually be our root filesystem onto an overlay
(
LOG_LEVEL = 5
2021-04-19 14:01:59 +03:00
# shellcheck source=/dev/null
source <( udevadm info --export --query= env --name= /dev/mapper/varcrypt)
# shellcheck source=/dev/null
source <( udevadm info --export --query= env --name= " ${ LOOPDEV } p2 " )
2012-09-14 01:19:05 +04:00
2013-11-06 02:32:56 +04:00
setup_basic_environment
2019-10-08 10:10:12 +03:00
mask_supporting_services
2018-11-01 11:26:36 +03:00
2013-11-06 02:32:56 +04:00
install_dmevent
2013-12-08 03:30:16 +04:00
generate_module_dependencies
2021-04-19 14:01:59 +03:00
cat >" $initdir /etc/crypttab " <<EOF
2013-11-06 02:32:56 +04:00
$DM_NAME UUID = $ID_FS_UUID /etc/varkey
2012-09-14 01:19:05 +04:00
EOF
2021-04-19 14:01:59 +03:00
echo -n test >" $initdir /etc/varkey "
ddebug <" $initdir /etc/crypttab "
2012-09-14 01:19:05 +04:00
2021-04-19 14:01:59 +03:00
cat >>" $initdir /etc/fstab " <<EOF
2017-11-07 17:51:30 +03:00
/dev/mapper/varcrypt /var ext4 defaults 0 1
2013-11-06 02:32:56 +04:00
EOF
2020-06-09 17:51:55 +03:00
# Forward journal messages to the console, so we have something
# to investigate even if we fail to mount the encrypted /var
2021-04-19 14:01:59 +03:00
echo ForwardToConsole = yes >> " $initdir /etc/systemd/journald.conf "
2019-07-08 22:11:32 +03:00
)
2019-07-12 18:47:26 +03:00
}
2012-09-14 01:19:05 +04:00
2019-07-12 18:47:26 +03:00
cleanup_root_var( ) {
2021-04-19 14:01:59 +03:00
ddebug " umount ${ initdir : ? } /var "
mountpoint " $initdir /var " && umount " $initdir /var "
2019-07-12 18:47:26 +03:00
[ [ -b /dev/mapper/varcrypt ] ] && cryptsetup luksClose /dev/mapper/varcrypt
2012-09-14 01:19:05 +04:00
}
test_cleanup( ) {
2019-07-12 21:09:48 +03:00
# ignore errors, so cleanup can continue
2019-07-19 03:34:57 +03:00
cleanup_root_var || :
2019-07-12 18:47:26 +03:00
_test_cleanup
}
test_setup_cleanup( ) {
2019-12-13 16:21:31 +03:00
cleanup_root_var || :
cleanup_initdir
2012-09-14 01:19:05 +04:00
}
2021-04-26 20:20:18 +03:00
do_test " $@ "