2020-03-04 12:35:06 +03:00
#!/usr/bin/env bash
2017-08-07 22:09:21 +03:00
set -e
2012-09-14 01:19:05 +04:00
TEST_DESCRIPTION = "cryptsetup systemd setup"
2019-12-12 11:37:19 +03:00
IMAGE_NAME = "cryptsetup"
2017-08-04 15:34:14 +03:00
TEST_NO_NSPAWN = 1
2021-01-07 00:42:28 +03:00
TEST_FORCE_NEWIMAGE = 1
2012-09-14 01:19:05 +04:00
2013-04-23 04:39:40 +04:00
. $TEST_BASE_DIR /test-functions
2012-09-14 01:19:05 +04:00
2013-11-06 02:32:56 +04:00
check_result_qemu( ) {
2012-09-14 01:19:05 +04:00
ret = 1
2020-03-20 22:17:11 +03:00
mount_initdir
2019-08-15 16:39:31 +03:00
[ [ -e $initdir /testok ] ] && ret = 0
[ [ -f $initdir /failed ] ] && cp -a $initdir /failed $TESTDIR
2012-09-14 01:19:05 +04:00
cryptsetup luksOpen ${ LOOPDEV } p2 varcrypt <$TESTDIR /keyfile
2019-08-15 16:39:31 +03:00
mount /dev/mapper/varcrypt $initdir /var
2020-03-30 17:39:31 +03:00
save_journal $initdir /var/log/journal
2020-03-20 22:17:11 +03:00
_umount_dir $initdir /var
_umount_dir $initdir
2012-09-14 01:19:05 +04:00
cryptsetup luksClose /dev/mapper/varcrypt
2013-11-06 02:32:56 +04:00
[ [ -f $TESTDIR /failed ] ] && cat $TESTDIR /failed
2020-03-30 17:39:31 +03:00
echo $JOURNAL_LIST
2012-09-14 01:19:05 +04:00
test -s $TESTDIR /failed && ret = $(( $ret + 1 ))
return $ret
}
2019-12-12 11:37:19 +03:00
test_create_image( ) {
2019-07-12 18:47:26 +03:00
create_empty_image_rootdir
2012-09-14 01:19:05 +04:00
echo -n test >$TESTDIR /keyfile
2019-03-15 12:05:33 +03:00
cryptsetup -q luksFormat --pbkdf pbkdf2 --pbkdf-force-iterations 1000 ${ LOOPDEV } p2 $TESTDIR /keyfile
2012-09-14 01:19:05 +04:00
cryptsetup luksOpen ${ LOOPDEV } p2 varcrypt <$TESTDIR /keyfile
2017-11-07 17:51:30 +03:00
mkfs.ext4 -L var /dev/mapper/varcrypt
2019-08-15 16:39:31 +03:00
mkdir -p $initdir /var
mount /dev/mapper/varcrypt $initdir /var
2012-09-14 01:19:05 +04:00
# Create what will eventually be our root filesystem onto an overlay
(
LOG_LEVEL = 5
eval $( udevadm info --export --query= env --name= /dev/mapper/varcrypt)
eval $( udevadm info --export --query= env --name= ${ LOOPDEV } p2)
2013-11-06 02:32:56 +04:00
setup_basic_environment
2019-10-08 10:10:12 +03:00
mask_supporting_services
2018-11-01 11:26:36 +03:00
2013-11-06 02:32:56 +04:00
install_dmevent
2013-12-08 03:30:16 +04:00
generate_module_dependencies
2013-11-06 02:32:56 +04:00
cat >$initdir /etc/crypttab <<EOF
$DM_NAME UUID = $ID_FS_UUID /etc/varkey
2012-09-14 01:19:05 +04:00
EOF
2019-12-12 11:59:53 +03:00
echo -n test >$initdir /etc/varkey
2013-11-06 02:32:56 +04:00
cat $initdir /etc/crypttab | ddebug
2012-09-14 01:19:05 +04:00
2013-11-06 02:32:56 +04:00
cat >>$initdir /etc/fstab <<EOF
2017-11-07 17:51:30 +03:00
/dev/mapper/varcrypt /var ext4 defaults 0 1
2013-11-06 02:32:56 +04:00
EOF
2020-06-09 17:51:55 +03:00
# Forward journal messages to the console, so we have something
# to investigate even if we fail to mount the encrypted /var
echo ForwardToConsole = yes >> $initdir /etc/systemd/journald.conf
2019-07-08 22:11:32 +03:00
)
2019-07-12 18:47:26 +03:00
}
2012-09-14 01:19:05 +04:00
2019-07-12 18:47:26 +03:00
cleanup_root_var( ) {
2019-08-15 16:39:31 +03:00
ddebug " umount $initdir /var "
mountpoint $initdir /var && umount $initdir /var
2019-07-12 18:47:26 +03:00
[ [ -b /dev/mapper/varcrypt ] ] && cryptsetup luksClose /dev/mapper/varcrypt
2012-09-14 01:19:05 +04:00
}
test_cleanup( ) {
2019-07-12 21:09:48 +03:00
# ignore errors, so cleanup can continue
2019-07-19 03:34:57 +03:00
cleanup_root_var || :
2019-07-12 18:47:26 +03:00
_test_cleanup
}
test_setup_cleanup( ) {
2019-12-13 16:21:31 +03:00
cleanup_root_var || :
cleanup_initdir
2012-09-14 01:19:05 +04:00
}
2020-09-22 19:26:28 +03:00
do_test " $@ " 24