2022-03-22 11:03:15 -04:00
|
|
|
package cryptmapper
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"testing"
|
|
|
|
|
2022-03-24 10:17:57 -04:00
|
|
|
"github.com/edgelesssys/constellation/mount/kms"
|
2022-03-23 06:00:07 -04:00
|
|
|
cryptsetup "github.com/martinjungblut/go-cryptsetup"
|
2022-03-22 11:03:15 -04:00
|
|
|
"github.com/stretchr/testify/assert"
|
2022-06-30 09:24:36 -04:00
|
|
|
"go.uber.org/goleak"
|
2022-03-22 11:03:15 -04:00
|
|
|
)
|
|
|
|
|
2022-06-30 09:24:36 -04:00
|
|
|
func TestMain(m *testing.M) {
|
|
|
|
goleak.VerifyTestMain(m)
|
|
|
|
}
|
|
|
|
|
2022-03-22 11:03:15 -04:00
|
|
|
type stubCryptDevice struct {
|
2022-05-10 04:43:48 -04:00
|
|
|
deviceName string
|
2022-05-19 02:47:17 -04:00
|
|
|
uuid string
|
2022-05-10 04:43:48 -04:00
|
|
|
initErr error
|
|
|
|
initByNameErr error
|
|
|
|
activateErr error
|
|
|
|
activatePassErr error
|
|
|
|
deactivateErr error
|
|
|
|
formatErr error
|
|
|
|
loadErr error
|
|
|
|
keySlotAddCalled bool
|
|
|
|
keySlotAddErr error
|
|
|
|
wipeErr error
|
|
|
|
resizeErr error
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
|
2022-05-10 04:43:48 -04:00
|
|
|
func (c *stubCryptDevice) Init(string) error {
|
2022-03-22 11:03:15 -04:00
|
|
|
return c.initErr
|
|
|
|
}
|
|
|
|
|
2022-05-10 04:43:48 -04:00
|
|
|
func (c *stubCryptDevice) InitByName(string) error {
|
|
|
|
return c.initByNameErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *stubCryptDevice) ActivateByVolumeKey(string, string, int, int) error {
|
2022-03-22 11:03:15 -04:00
|
|
|
return c.activateErr
|
|
|
|
}
|
|
|
|
|
2022-05-10 04:43:48 -04:00
|
|
|
func (c *stubCryptDevice) ActivateByPassphrase(string, int, string, int) error {
|
|
|
|
return c.activatePassErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *stubCryptDevice) Deactivate(string) error {
|
2022-03-22 11:03:15 -04:00
|
|
|
return c.deactivateErr
|
|
|
|
}
|
|
|
|
|
2022-05-10 04:43:48 -04:00
|
|
|
func (c *stubCryptDevice) Format(cryptsetup.DeviceType, cryptsetup.GenericParams) error {
|
2022-03-22 11:03:15 -04:00
|
|
|
return c.formatErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *stubCryptDevice) Free() bool {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2022-05-11 05:08:23 -04:00
|
|
|
func (c *stubCryptDevice) GetDeviceName() string {
|
|
|
|
return c.deviceName
|
|
|
|
}
|
|
|
|
|
2022-05-19 02:47:17 -04:00
|
|
|
func (c *stubCryptDevice) GetUUID() string {
|
|
|
|
return c.uuid
|
|
|
|
}
|
|
|
|
|
2022-03-23 06:00:07 -04:00
|
|
|
func (c *stubCryptDevice) Load(cryptsetup.DeviceType) error {
|
2022-03-22 11:03:15 -04:00
|
|
|
return c.loadErr
|
|
|
|
}
|
|
|
|
|
2022-05-10 04:43:48 -04:00
|
|
|
func (c *stubCryptDevice) KeyslotAddByVolumeKey(int, string, string) error {
|
|
|
|
c.keySlotAddCalled = true
|
|
|
|
return c.keySlotAddErr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *stubCryptDevice) Wipe(string, int, uint64, uint64, int, int, func(size, offset uint64) int) error {
|
2022-03-22 11:03:15 -04:00
|
|
|
return c.wipeErr
|
|
|
|
}
|
|
|
|
|
2022-05-10 04:43:48 -04:00
|
|
|
func (c *stubCryptDevice) Resize(string, uint64) error {
|
|
|
|
return c.resizeErr
|
|
|
|
}
|
|
|
|
|
2022-03-22 11:03:15 -04:00
|
|
|
func TestCloseCryptDevice(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
2022-04-26 10:54:05 -04:00
|
|
|
mapper *stubCryptDevice
|
|
|
|
wantErr bool
|
2022-03-22 11:03:15 -04:00
|
|
|
}{
|
|
|
|
"success": {
|
2022-04-26 10:54:05 -04:00
|
|
|
mapper: &stubCryptDevice{},
|
|
|
|
wantErr: false,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
2022-05-10 04:43:48 -04:00
|
|
|
"error on InitByName": {
|
|
|
|
mapper: &stubCryptDevice{initByNameErr: errors.New("error")},
|
2022-04-26 10:54:05 -04:00
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"error on Deactivate": {
|
2022-05-10 04:43:48 -04:00
|
|
|
mapper: &stubCryptDevice{deactivateErr: errors.New("error")},
|
2022-04-26 10:54:05 -04:00
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
err := closeCryptDevice(tc.mapper, "/dev/some-device", "volume0", "test")
|
2022-04-26 10:54:05 -04:00
|
|
|
if tc.wantErr {
|
2022-03-22 11:03:15 -04:00
|
|
|
assert.Error(err)
|
|
|
|
} else {
|
|
|
|
assert.NoError(err)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-03-24 10:21:19 -04:00
|
|
|
mapper := New(kms.NewStaticKMS(), &stubCryptDevice{})
|
2022-03-22 11:03:15 -04:00
|
|
|
err := mapper.CloseCryptDevice("volume01-unit-test")
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestOpenCryptDevice(t *testing.T) {
|
|
|
|
someErr := errors.New("error")
|
2022-05-19 02:47:17 -04:00
|
|
|
getKeyFunc := func(context.Context, string, int) ([]byte, error) {
|
|
|
|
return []byte{
|
|
|
|
0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA,
|
|
|
|
0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA,
|
|
|
|
0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA,
|
|
|
|
0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA, 0xAA,
|
|
|
|
}, nil
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
|
|
|
|
testCases := map[string]struct {
|
2022-05-19 02:47:17 -04:00
|
|
|
source string
|
|
|
|
volumeID string
|
|
|
|
integrity bool
|
|
|
|
mapper *stubCryptDevice
|
|
|
|
getKey func(context.Context, string, int) ([]byte, error)
|
|
|
|
diskInfo func(disk string) (string, error)
|
|
|
|
wantErr bool
|
2022-03-22 11:03:15 -04:00
|
|
|
}{
|
|
|
|
"success with Load": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: false,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"success with error on Load": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: false,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"success with integrity": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
integrity: true,
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: false,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"error on Init": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{initErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"error on Format": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr, formatErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"error on Activate": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{activatePassErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"error on diskInfo": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", someErr },
|
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"disk is already formatted": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "ext4", nil },
|
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"error with integrity on wipe": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
integrity: true,
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr, wipeErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"error with integrity on activate": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
integrity: true,
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr, activateErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
"error with integrity on deactivate": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
integrity: true,
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr, deactivateErr: someErr},
|
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
2022-05-10 04:43:48 -04:00
|
|
|
},
|
|
|
|
"error on adding keyslot": {
|
2022-05-19 02:47:17 -04:00
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
2022-05-10 04:43:48 -04:00
|
|
|
mapper: &stubCryptDevice{
|
|
|
|
loadErr: someErr,
|
|
|
|
keySlotAddErr: someErr,
|
|
|
|
},
|
2022-05-19 02:47:17 -04:00
|
|
|
getKey: getKeyFunc,
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"incorrect key length": {
|
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{},
|
|
|
|
getKey: func(ctx context.Context, s string, i int) ([]byte, error) { return []byte{0x1, 0x2, 0x3}, nil },
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"incorrect key length with error on Load": {
|
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr},
|
|
|
|
getKey: func(ctx context.Context, s string, i int) ([]byte, error) { return []byte{0x1, 0x2, 0x3}, nil },
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"getKey fails": {
|
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{},
|
|
|
|
getKey: func(ctx context.Context, s string, i int) ([]byte, error) { return nil, someErr },
|
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"getKey fails with error on Load": {
|
|
|
|
source: "/dev/some-device",
|
|
|
|
volumeID: "volume0",
|
|
|
|
mapper: &stubCryptDevice{loadErr: someErr},
|
|
|
|
getKey: func(ctx context.Context, s string, i int) ([]byte, error) { return nil, someErr },
|
2022-05-10 04:43:48 -04:00
|
|
|
diskInfo: func(disk string) (string, error) { return "", nil },
|
|
|
|
wantErr: true,
|
2022-03-22 11:03:15 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
2022-05-19 02:47:17 -04:00
|
|
|
out, err := openCryptDevice(
|
|
|
|
context.Background(),
|
|
|
|
tc.mapper,
|
|
|
|
tc.source,
|
|
|
|
tc.volumeID,
|
|
|
|
tc.integrity,
|
|
|
|
tc.getKey,
|
|
|
|
tc.diskInfo,
|
|
|
|
)
|
2022-04-26 10:54:05 -04:00
|
|
|
if tc.wantErr {
|
2022-03-22 11:03:15 -04:00
|
|
|
assert.Error(err)
|
|
|
|
} else {
|
|
|
|
assert.NoError(err)
|
|
|
|
assert.Equal(cryptPrefix+tc.volumeID, out)
|
2022-05-10 04:43:48 -04:00
|
|
|
|
|
|
|
if tc.mapper.loadErr == nil {
|
|
|
|
assert.False(tc.mapper.keySlotAddCalled)
|
|
|
|
} else {
|
|
|
|
assert.True(tc.mapper.keySlotAddCalled)
|
|
|
|
}
|
2022-03-22 11:03:15 -04:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-03-24 10:21:19 -04:00
|
|
|
mapper := New(kms.NewStaticKMS(), &stubCryptDevice{})
|
2022-03-22 11:03:15 -04:00
|
|
|
_, err := mapper.OpenCryptDevice(context.Background(), "/dev/some-device", "volume01", false)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
2022-05-02 07:48:57 -04:00
|
|
|
|
2022-05-10 04:43:48 -04:00
|
|
|
func TestResizeCryptDevice(t *testing.T) {
|
|
|
|
volumeID := "pvc-123"
|
|
|
|
someErr := errors.New("error")
|
|
|
|
testCases := map[string]struct {
|
|
|
|
volumeID string
|
|
|
|
device *stubCryptDevice
|
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
"success": {
|
|
|
|
volumeID: volumeID,
|
|
|
|
device: &stubCryptDevice{},
|
|
|
|
},
|
|
|
|
"InitByName fails": {
|
|
|
|
volumeID: volumeID,
|
|
|
|
device: &stubCryptDevice{initByNameErr: someErr},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"Load fails": {
|
|
|
|
volumeID: volumeID,
|
|
|
|
device: &stubCryptDevice{loadErr: someErr},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"Resize fails": {
|
|
|
|
volumeID: volumeID,
|
|
|
|
device: &stubCryptDevice{resizeErr: someErr},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"ActivateByPassphrase fails": {
|
|
|
|
volumeID: volumeID,
|
|
|
|
device: &stubCryptDevice{activatePassErr: someErr},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
mapper := &CryptMapper{
|
|
|
|
kms: kms.NewStaticKMS(),
|
|
|
|
mapper: tc.device,
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := mapper.ResizeCryptDevice(context.Background(), tc.volumeID)
|
|
|
|
if tc.wantErr {
|
|
|
|
assert.Error(err)
|
|
|
|
} else {
|
|
|
|
assert.NoError(err)
|
|
|
|
assert.Equal(cryptPrefix+tc.volumeID, res)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-11 05:08:23 -04:00
|
|
|
func TestGetDevicePath(t *testing.T) {
|
|
|
|
volumeID := "pvc-123"
|
|
|
|
someErr := errors.New("error")
|
|
|
|
testCases := map[string]struct {
|
|
|
|
volumeID string
|
|
|
|
device *stubCryptDevice
|
|
|
|
wantErr bool
|
|
|
|
}{
|
|
|
|
"success": {
|
|
|
|
volumeID: volumeID,
|
|
|
|
device: &stubCryptDevice{deviceName: volumeID},
|
|
|
|
},
|
|
|
|
"InitByName fails": {
|
|
|
|
volumeID: volumeID,
|
|
|
|
device: &stubCryptDevice{initByNameErr: someErr},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
"GetDeviceName returns nothing": {
|
|
|
|
volumeID: volumeID,
|
|
|
|
device: &stubCryptDevice{},
|
|
|
|
wantErr: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
mapper := &CryptMapper{
|
|
|
|
mapper: tc.device,
|
|
|
|
}
|
|
|
|
|
|
|
|
res, err := mapper.GetDevicePath(tc.volumeID)
|
|
|
|
if tc.wantErr {
|
|
|
|
assert.Error(err)
|
|
|
|
} else {
|
|
|
|
assert.NoError(err)
|
|
|
|
assert.Equal(tc.device.deviceName, res)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-02 07:48:57 -04:00
|
|
|
func TestIsIntegrityFS(t *testing.T) {
|
|
|
|
testCases := map[string]struct {
|
|
|
|
wantIntegrity bool
|
|
|
|
fstype string
|
|
|
|
}{
|
|
|
|
"plain ext4": {
|
|
|
|
wantIntegrity: false,
|
|
|
|
fstype: "ext4",
|
|
|
|
},
|
|
|
|
"integrity ext4": {
|
|
|
|
wantIntegrity: true,
|
|
|
|
fstype: "ext4",
|
|
|
|
},
|
|
|
|
"integrity fs": {
|
|
|
|
wantIntegrity: false,
|
|
|
|
fstype: "integrity",
|
|
|
|
},
|
|
|
|
"double integrity": {
|
|
|
|
wantIntegrity: true,
|
|
|
|
fstype: "ext4-integrity",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, tc := range testCases {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
assert := assert.New(t)
|
|
|
|
|
|
|
|
request := tc.fstype
|
|
|
|
if tc.wantIntegrity {
|
|
|
|
request = tc.fstype + integrityFSSuffix
|
|
|
|
}
|
|
|
|
|
|
|
|
fstype, isIntegrity := IsIntegrityFS(request)
|
|
|
|
|
|
|
|
if tc.wantIntegrity {
|
|
|
|
assert.True(isIntegrity)
|
|
|
|
assert.Equal(tc.fstype, fstype)
|
|
|
|
} else {
|
|
|
|
assert.False(isIntegrity)
|
|
|
|
assert.Equal(tc.fstype, fstype)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|