John Edward Broadbent | 59dffa6 | 2022-01-13 17:41:32 -0800 | [diff] [blame] | 1 | #include "estoraged_test.hpp" |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 2 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 3 | #include "estoraged.hpp" |
Tom Tung | 043af59 | 2023-11-24 13:37:05 +0800 | [diff] [blame] | 4 | #include "estoraged_conf.hpp" |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 5 | |
| 6 | #include <unistd.h> |
| 7 | |
John Wedig | 67a4744 | 2022-04-05 17:21:29 -0700 | [diff] [blame] | 8 | #include <boost/asio/io_context.hpp> |
| 9 | #include <sdbusplus/asio/connection.hpp> |
| 10 | #include <sdbusplus/asio/object_server.hpp> |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 11 | #include <xyz/openbmc_project/Common/error.hpp> |
Patrick Williams | 0e2a46f | 2023-05-10 14:35:52 -0500 | [diff] [blame] | 12 | #include <xyz/openbmc_project/Inventory/Item/Volume/server.hpp> |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 13 | |
| 14 | #include <exception> |
| 15 | #include <filesystem> |
| 16 | #include <fstream> |
| 17 | #include <iterator> |
John Wedig | 67a4744 | 2022-04-05 17:21:29 -0700 | [diff] [blame] | 18 | #include <memory> |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 19 | #include <string> |
| 20 | #include <vector> |
| 21 | |
| 22 | #include <gmock/gmock.h> |
| 23 | #include <gtest/gtest.h> |
| 24 | |
| 25 | namespace estoraged_test |
| 26 | { |
| 27 | |
Patrick Williams | 0e2a46f | 2023-05-10 14:35:52 -0500 | [diff] [blame] | 28 | using sdbusplus::server::xyz::openbmc_project::inventory::item::Volume; |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 29 | using sdbusplus::xyz::openbmc_project::Common::Error::InternalFailure; |
| 30 | using sdbusplus::xyz::openbmc_project::Common::Error::ResourceNotFound; |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 31 | using std::filesystem::path; |
| 32 | using ::testing::_; |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 33 | using ::testing::Return; |
| 34 | using ::testing::StrEq; |
| 35 | |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 36 | class EStoragedTest : public testing::Test |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 37 | { |
| 38 | public: |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 39 | const char* testFileName = "testfile"; |
| 40 | const char* testLuksDevName = "testfile_luksDev"; |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 41 | const char* testCryptDir = "/tmp"; |
John Wedig | 6c0d8ce | 2022-04-22 14:00:43 -0700 | [diff] [blame] | 42 | const std::string testConfigPath = |
| 43 | "/xyz/openbmc_project/inventory/system/board/test_board/test_emmc"; |
John Wedig | 67a4744 | 2022-04-05 17:21:29 -0700 | [diff] [blame] | 44 | const uint64_t testSize = 24; |
John Edward Broadbent | 5d799bb | 2022-03-22 16:14:24 -0700 | [diff] [blame] | 45 | const uint8_t testLifeTime = 25; |
John Wedig | b483830 | 2022-07-22 13:51:16 -0700 | [diff] [blame] | 46 | const std::string testPartNumber = "12345678"; |
| 47 | const std::string testSerialNumber = "ABCDEF1234"; |
Rahul Kapoor | 1982505 | 2023-05-27 01:52:23 +0000 | [diff] [blame] | 48 | const std::string testLocationCode = "U102020"; |
John Wedig | d7be42b | 2024-01-19 16:07:19 -0800 | [diff] [blame] | 49 | const std::string testDriveType = "SSD"; |
John Wedig | c0d66eb | 2024-02-26 15:54:47 -0800 | [diff] [blame] | 50 | const std::string testDriveProtocol = "eMMC"; |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 51 | std::ofstream testFile; |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 52 | std::string passwordString; |
| 53 | std::vector<uint8_t> password; |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 54 | MockCryptsetupInterface* mockCryptIface{}; |
| 55 | MockFilesystemInterface* mockFsIface{}; |
John Wedig | 67a4744 | 2022-04-05 17:21:29 -0700 | [diff] [blame] | 56 | boost::asio::io_context io; |
| 57 | std::shared_ptr<sdbusplus::asio::connection> conn; |
| 58 | std::unique_ptr<sdbusplus::asio::object_server> objectServer; |
| 59 | std::unique_ptr<estoraged::EStoraged> esObject; |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 60 | |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 61 | EStoragedTest() : |
John Wedig | 67a4744 | 2022-04-05 17:21:29 -0700 | [diff] [blame] | 62 | passwordString("password"), |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 63 | password(passwordString.begin(), passwordString.end()) |
| 64 | {} |
| 65 | |
| 66 | void SetUp() override |
| 67 | { |
| 68 | /* Create an empty file that we'll pretend is a 'storage device'. */ |
| 69 | testFile.open(testFileName, |
| 70 | std::ios::out | std::ios::binary | std::ios::trunc); |
| 71 | testFile.close(); |
| 72 | if (testFile.fail()) |
| 73 | { |
| 74 | throw std::runtime_error("Failed to open test file"); |
| 75 | } |
| 76 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 77 | std::unique_ptr<MockCryptsetupInterface> cryptIface = |
| 78 | std::make_unique<MockCryptsetupInterface>(); |
| 79 | mockCryptIface = cryptIface.get(); |
| 80 | std::unique_ptr<MockFilesystemInterface> fsIface = |
| 81 | std::make_unique<MockFilesystemInterface>(); |
| 82 | mockFsIface = fsIface.get(); |
| 83 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 84 | /* Set up location of dummy mapped crypt file. */ |
| 85 | EXPECT_CALL(*cryptIface, cryptGetDir).WillOnce(Return(testCryptDir)); |
| 86 | |
John Wedig | 67a4744 | 2022-04-05 17:21:29 -0700 | [diff] [blame] | 87 | conn = std::make_shared<sdbusplus::asio::connection>(io); |
| 88 | // request D-Bus server name. |
| 89 | conn->request_name("xyz.openbmc_project.eStoraged.test"); |
| 90 | objectServer = std::make_unique<sdbusplus::asio::object_server>(conn); |
| 91 | |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 92 | esObject = std::make_unique<estoraged::EStoraged>( |
John Wedig | 6c0d8ce | 2022-04-22 14:00:43 -0700 | [diff] [blame] | 93 | *objectServer, testConfigPath, testFileName, testLuksDevName, |
John Wedig | b483830 | 2022-07-22 13:51:16 -0700 | [diff] [blame] | 94 | testSize, testLifeTime, testPartNumber, testSerialNumber, |
Tom Tung | 043af59 | 2023-11-24 13:37:05 +0800 | [diff] [blame] | 95 | testLocationCode, ERASE_MAX_GEOMETRY, ERASE_MIN_GEOMETRY, |
John Wedig | c0d66eb | 2024-02-26 15:54:47 -0800 | [diff] [blame] | 96 | testDriveType, testDriveProtocol, std::move(cryptIface), |
| 97 | std::move(fsIface)); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 98 | } |
| 99 | |
| 100 | void TearDown() override |
| 101 | { |
| 102 | EXPECT_EQ(0, unlink(testFileName)); |
| 103 | } |
| 104 | }; |
| 105 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 106 | const char* mappedDevicePath = "/tmp/testfile_luksDev"; |
| 107 | std::ofstream mappedDevice; |
| 108 | |
| 109 | int createMappedDev() |
| 110 | { |
| 111 | mappedDevice.open(mappedDevicePath, |
| 112 | std::ios::out | std::ios::binary | std::ios::trunc); |
| 113 | mappedDevice.close(); |
| 114 | if (mappedDevice.fail()) |
| 115 | { |
| 116 | throw std::runtime_error("Failed to open test mapped device"); |
| 117 | } |
| 118 | |
| 119 | return 0; |
| 120 | } |
| 121 | |
| 122 | int removeMappedDev() |
| 123 | { |
| 124 | EXPECT_EQ(0, unlink(mappedDevicePath)); |
| 125 | |
| 126 | return 0; |
| 127 | } |
| 128 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 129 | /* Test case to format and then lock the LUKS device. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 130 | TEST_F(EStoragedTest, FormatPass) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 131 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 132 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 133 | |
| 134 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 135 | .Times(1); |
| 136 | |
| 137 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 138 | |
| 139 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 140 | .WillOnce(&createMappedDev); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 141 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 142 | EXPECT_CALL(*mockFsIface, runMkfs(StrEq(esObject->getCryptDevicePath()))) |
| 143 | .WillOnce(Return(0)); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 144 | |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 145 | EXPECT_CALL(*mockFsIface, directoryExists(path(esObject->getMountPoint()))) |
| 146 | .WillOnce(Return(false)); |
| 147 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 148 | EXPECT_CALL(*mockFsIface, createDirectory(path(esObject->getMountPoint()))) |
| 149 | .WillOnce(Return(true)); |
| 150 | |
| 151 | EXPECT_CALL(*mockFsIface, |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 152 | doMount(StrEq(esObject->getCryptDevicePath()), |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 153 | StrEq(esObject->getMountPoint()), _, _, _)) |
| 154 | .WillOnce(Return(0)); |
| 155 | |
| 156 | EXPECT_CALL(*mockFsIface, doUnmount(StrEq(esObject->getMountPoint()))) |
| 157 | .WillOnce(Return(0)); |
| 158 | |
| 159 | EXPECT_CALL(*mockFsIface, removeDirectory(path(esObject->getMountPoint()))) |
| 160 | .WillOnce(Return(true)); |
| 161 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 162 | EXPECT_CALL(*mockCryptIface, cryptDeactivate(_, _)) |
| 163 | .WillOnce(&removeMappedDev); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 164 | |
| 165 | /* Format the encrypted device. */ |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 166 | esObject->formatLuks(password, Volume::FilesystemType::ext4); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 167 | EXPECT_FALSE(esObject->isLocked()); |
| 168 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 169 | esObject->lock(); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 170 | EXPECT_TRUE(esObject->isLocked()); |
| 171 | } |
| 172 | |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 173 | /* |
| 174 | * Test case where the mount point directory already exists, so it shouldn't |
| 175 | * try to create it. |
| 176 | */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 177 | TEST_F(EStoragedTest, MountPointExistsPass) |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 178 | { |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 179 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 180 | |
| 181 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 182 | .Times(1); |
| 183 | |
| 184 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 185 | |
| 186 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 187 | .WillOnce(&createMappedDev); |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 188 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 189 | EXPECT_CALL(*mockFsIface, runMkfs(StrEq(esObject->getCryptDevicePath()))) |
| 190 | .WillOnce(Return(0)); |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 191 | |
| 192 | EXPECT_CALL(*mockFsIface, directoryExists(path(esObject->getMountPoint()))) |
| 193 | .WillOnce(Return(true)); |
| 194 | |
| 195 | EXPECT_CALL(*mockFsIface, createDirectory(path(esObject->getMountPoint()))) |
| 196 | .Times(0); |
| 197 | |
| 198 | EXPECT_CALL(*mockFsIface, |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 199 | doMount(StrEq(esObject->getCryptDevicePath()), |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 200 | StrEq(esObject->getMountPoint()), _, _, _)) |
| 201 | .WillOnce(Return(0)); |
| 202 | |
| 203 | EXPECT_CALL(*mockFsIface, doUnmount(StrEq(esObject->getMountPoint()))) |
| 204 | .WillOnce(Return(0)); |
| 205 | |
| 206 | EXPECT_CALL(*mockFsIface, removeDirectory(path(esObject->getMountPoint()))) |
| 207 | .WillOnce(Return(true)); |
| 208 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 209 | EXPECT_CALL(*mockCryptIface, cryptDeactivate(_, _)) |
| 210 | .WillOnce(&removeMappedDev); |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 211 | |
| 212 | /* Format the encrypted device. */ |
| 213 | esObject->formatLuks(password, Volume::FilesystemType::ext4); |
| 214 | EXPECT_FALSE(esObject->isLocked()); |
| 215 | |
| 216 | esObject->lock(); |
| 217 | EXPECT_TRUE(esObject->isLocked()); |
| 218 | } |
| 219 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 220 | /* Test case where the device/file doesn't exist. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 221 | TEST_F(EStoragedTest, FormatNoDeviceFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 222 | { |
| 223 | /* Delete the test file. */ |
| 224 | EXPECT_EQ(0, unlink(testFileName)); |
| 225 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 226 | EXPECT_THROW(esObject->formatLuks(password, Volume::FilesystemType::ext4), |
| 227 | ResourceNotFound); |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 228 | EXPECT_TRUE(esObject->isLocked()); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 229 | |
| 230 | /* Create the test file again, so that the TearDown function works. */ |
| 231 | testFile.open(testFileName, |
| 232 | std::ios::out | std::ios::binary | std::ios::trunc); |
| 233 | testFile.close(); |
| 234 | } |
| 235 | |
| 236 | /* Test case where we fail to format the LUKS device. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 237 | TEST_F(EStoragedTest, FormatFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 238 | { |
| 239 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)) |
| 240 | .WillOnce(Return(-1)); |
| 241 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 242 | EXPECT_THROW(esObject->formatLuks(password, Volume::FilesystemType::ext4), |
| 243 | InternalFailure); |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 244 | EXPECT_TRUE(esObject->isLocked()); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 245 | } |
| 246 | |
| 247 | /* Test case where we fail to set the password for the LUKS device. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 248 | TEST_F(EStoragedTest, AddKeyslotFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 249 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 250 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 251 | |
| 252 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 253 | .WillOnce(Return(-1)); |
| 254 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 255 | EXPECT_THROW(esObject->formatLuks(password, Volume::FilesystemType::ext4), |
| 256 | InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 257 | EXPECT_TRUE(esObject->isLocked()); |
| 258 | } |
| 259 | |
| 260 | /* Test case where we fail to load the LUKS header. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 261 | TEST_F(EStoragedTest, LoadLuksHeaderFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 262 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 263 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 264 | |
| 265 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 266 | .Times(1); |
| 267 | |
| 268 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).WillOnce(Return(-1)); |
| 269 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 270 | EXPECT_THROW(esObject->formatLuks(password, Volume::FilesystemType::ext4), |
| 271 | InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 272 | EXPECT_TRUE(esObject->isLocked()); |
| 273 | } |
| 274 | |
| 275 | /* Test case where we fail to activate the LUKS device. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 276 | TEST_F(EStoragedTest, ActivateFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 277 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 278 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 279 | |
| 280 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 281 | .Times(1); |
| 282 | |
| 283 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 284 | |
| 285 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
| 286 | .WillOnce(Return(-1)); |
| 287 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 288 | EXPECT_THROW(esObject->formatLuks(password, Volume::FilesystemType::ext4), |
| 289 | InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 290 | EXPECT_TRUE(esObject->isLocked()); |
| 291 | } |
| 292 | |
| 293 | /* Test case where we fail to create the filesystem. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 294 | TEST_F(EStoragedTest, CreateFilesystemFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 295 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 296 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 297 | |
| 298 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 299 | .Times(1); |
| 300 | |
| 301 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 302 | |
| 303 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 304 | .WillOnce(&createMappedDev); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 305 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 306 | EXPECT_CALL(*mockFsIface, runMkfs(StrEq(esObject->getCryptDevicePath()))) |
| 307 | .WillOnce(Return(-1)); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 308 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 309 | EXPECT_THROW(esObject->formatLuks(password, Volume::FilesystemType::ext4), |
| 310 | InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 311 | EXPECT_FALSE(esObject->isLocked()); |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 312 | |
| 313 | EXPECT_EQ(0, removeMappedDev()); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 314 | } |
| 315 | |
| 316 | /* Test case where we fail to create the mount point. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 317 | TEST_F(EStoragedTest, CreateMountPointFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 318 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 319 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 320 | |
| 321 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 322 | .Times(1); |
| 323 | |
| 324 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 325 | |
| 326 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 327 | .WillOnce(&createMappedDev); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 328 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 329 | EXPECT_CALL(*mockFsIface, runMkfs(StrEq(esObject->getCryptDevicePath()))) |
| 330 | .WillOnce(Return(0)); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 331 | |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 332 | EXPECT_CALL(*mockFsIface, directoryExists(path(esObject->getMountPoint()))) |
| 333 | .WillOnce(Return(false)); |
| 334 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 335 | EXPECT_CALL(*mockFsIface, createDirectory(path(esObject->getMountPoint()))) |
| 336 | .WillOnce(Return(false)); |
| 337 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 338 | EXPECT_THROW(esObject->formatLuks(password, Volume::FilesystemType::ext4), |
| 339 | InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 340 | EXPECT_FALSE(esObject->isLocked()); |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 341 | |
| 342 | EXPECT_EQ(0, removeMappedDev()); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 343 | } |
| 344 | |
| 345 | /* Test case where we fail to mount the filesystem. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 346 | TEST_F(EStoragedTest, MountFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 347 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 348 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 349 | |
| 350 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 351 | .Times(1); |
| 352 | |
| 353 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 354 | |
| 355 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 356 | .WillOnce(&createMappedDev); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 357 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 358 | EXPECT_CALL(*mockFsIface, runMkfs(StrEq(esObject->getCryptDevicePath()))) |
| 359 | .WillOnce(Return(0)); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 360 | |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 361 | EXPECT_CALL(*mockFsIface, directoryExists(path(esObject->getMountPoint()))) |
| 362 | .WillOnce(Return(false)); |
| 363 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 364 | EXPECT_CALL(*mockFsIface, createDirectory(path(esObject->getMountPoint()))) |
| 365 | .WillOnce(Return(true)); |
| 366 | |
| 367 | EXPECT_CALL(*mockFsIface, |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 368 | doMount(StrEq(esObject->getCryptDevicePath()), |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 369 | StrEq(esObject->getMountPoint()), _, _, _)) |
| 370 | .WillOnce(Return(-1)); |
| 371 | |
| 372 | EXPECT_CALL(*mockFsIface, removeDirectory(path(esObject->getMountPoint()))) |
| 373 | .WillOnce(Return(true)); |
| 374 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 375 | EXPECT_THROW(esObject->formatLuks(password, Volume::FilesystemType::ext4), |
| 376 | InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 377 | EXPECT_FALSE(esObject->isLocked()); |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 378 | |
| 379 | EXPECT_EQ(0, removeMappedDev()); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 380 | } |
| 381 | |
| 382 | /* Test case where we fail to unmount the filesystem. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 383 | TEST_F(EStoragedTest, UnmountFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 384 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 385 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 386 | |
| 387 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 388 | .Times(1); |
| 389 | |
| 390 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 391 | |
| 392 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 393 | .WillOnce(&createMappedDev); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 394 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 395 | EXPECT_CALL(*mockFsIface, runMkfs(StrEq(esObject->getCryptDevicePath()))) |
| 396 | .WillOnce(Return(0)); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 397 | |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 398 | EXPECT_CALL(*mockFsIface, directoryExists(path(esObject->getMountPoint()))) |
| 399 | .WillOnce(Return(false)); |
| 400 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 401 | EXPECT_CALL(*mockFsIface, createDirectory(path(esObject->getMountPoint()))) |
| 402 | .WillOnce(Return(true)); |
| 403 | |
| 404 | EXPECT_CALL(*mockFsIface, |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 405 | doMount(StrEq(esObject->getCryptDevicePath()), |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 406 | StrEq(esObject->getMountPoint()), _, _, _)) |
| 407 | .WillOnce(Return(0)); |
| 408 | |
| 409 | EXPECT_CALL(*mockFsIface, doUnmount(StrEq(esObject->getMountPoint()))) |
| 410 | .WillOnce(Return(-1)); |
| 411 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 412 | esObject->formatLuks(password, Volume::FilesystemType::ext4); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 413 | EXPECT_FALSE(esObject->isLocked()); |
| 414 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 415 | EXPECT_THROW(esObject->lock(), InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 416 | EXPECT_FALSE(esObject->isLocked()); |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 417 | |
| 418 | EXPECT_EQ(0, removeMappedDev()); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 419 | } |
| 420 | |
| 421 | /* Test case where we fail to remove the mount point. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 422 | TEST_F(EStoragedTest, RemoveMountPointFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 423 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 424 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 425 | |
| 426 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 427 | .Times(1); |
| 428 | |
| 429 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 430 | |
| 431 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 432 | .WillOnce(&createMappedDev); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 433 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 434 | EXPECT_CALL(*mockFsIface, runMkfs(StrEq(esObject->getCryptDevicePath()))) |
| 435 | .WillOnce(Return(0)); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 436 | |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 437 | EXPECT_CALL(*mockFsIface, directoryExists(path(esObject->getMountPoint()))) |
| 438 | .WillOnce(Return(false)); |
| 439 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 440 | EXPECT_CALL(*mockFsIface, createDirectory(path(esObject->getMountPoint()))) |
| 441 | .WillOnce(Return(true)); |
| 442 | |
| 443 | EXPECT_CALL(*mockFsIface, |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 444 | doMount(StrEq(esObject->getCryptDevicePath()), |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 445 | StrEq(esObject->getMountPoint()), _, _, _)) |
| 446 | .WillOnce(Return(0)); |
| 447 | |
| 448 | EXPECT_CALL(*mockFsIface, doUnmount(StrEq(esObject->getMountPoint()))) |
| 449 | .WillOnce(Return(0)); |
| 450 | |
| 451 | EXPECT_CALL(*mockFsIface, removeDirectory(path(esObject->getMountPoint()))) |
| 452 | .WillOnce(Return(false)); |
| 453 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 454 | esObject->formatLuks(password, Volume::FilesystemType::ext4); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 455 | EXPECT_FALSE(esObject->isLocked()); |
| 456 | |
| 457 | /* This will fail to remove the mount point. */ |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 458 | EXPECT_THROW(esObject->lock(), InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 459 | EXPECT_FALSE(esObject->isLocked()); |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 460 | |
| 461 | EXPECT_EQ(0, removeMappedDev()); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 462 | } |
| 463 | |
| 464 | /* Test case where we fail to deactivate the LUKS device. */ |
Ed Tanous | 82897c3 | 2022-02-21 14:11:59 -0800 | [diff] [blame] | 465 | TEST_F(EStoragedTest, DeactivateFail) |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 466 | { |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 467 | EXPECT_CALL(*mockCryptIface, cryptFormat(_, _, _, _, _, _, _, _)).Times(1); |
| 468 | |
| 469 | EXPECT_CALL(*mockCryptIface, cryptKeyslotAddByVolumeKey(_, _, _, _, _, _)) |
| 470 | .Times(1); |
| 471 | |
| 472 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 473 | |
| 474 | EXPECT_CALL(*mockCryptIface, cryptActivateByPassphrase(_, _, _, _, _, _)) |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 475 | .WillOnce(&createMappedDev); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 476 | |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 477 | EXPECT_CALL(*mockFsIface, runMkfs(StrEq(esObject->getCryptDevicePath()))) |
| 478 | .WillOnce(Return(0)); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 479 | |
John Wedig | b17f825 | 2022-01-12 14:24:26 -0800 | [diff] [blame] | 480 | EXPECT_CALL(*mockFsIface, directoryExists(path(esObject->getMountPoint()))) |
| 481 | .WillOnce(Return(false)); |
| 482 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 483 | EXPECT_CALL(*mockFsIface, createDirectory(path(esObject->getMountPoint()))) |
| 484 | .WillOnce(Return(true)); |
| 485 | |
| 486 | EXPECT_CALL(*mockFsIface, |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 487 | doMount(StrEq(esObject->getCryptDevicePath()), |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 488 | StrEq(esObject->getMountPoint()), _, _, _)) |
| 489 | .WillOnce(Return(0)); |
| 490 | |
| 491 | EXPECT_CALL(*mockFsIface, doUnmount(StrEq(esObject->getMountPoint()))) |
| 492 | .WillOnce(Return(0)); |
| 493 | |
| 494 | EXPECT_CALL(*mockFsIface, removeDirectory(path(esObject->getMountPoint()))) |
| 495 | .WillOnce(Return(true)); |
| 496 | |
| 497 | EXPECT_CALL(*mockCryptIface, cryptDeactivate(_, _)).WillOnce(Return(-1)); |
| 498 | |
| 499 | /* Format the encrypted device. */ |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 500 | esObject->formatLuks(password, Volume::FilesystemType::ext4); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 501 | EXPECT_FALSE(esObject->isLocked()); |
| 502 | |
John Wedig | 972c3fa | 2021-12-29 17:30:41 -0800 | [diff] [blame] | 503 | EXPECT_THROW(esObject->lock(), InternalFailure); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 504 | EXPECT_FALSE(esObject->isLocked()); |
John Wedig | 2443a02 | 2023-03-17 13:42:32 -0700 | [diff] [blame] | 505 | |
| 506 | EXPECT_EQ(0, removeMappedDev()); |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 507 | } |
| 508 | |
John Wedig | 8d5a3a0 | 2022-09-29 15:25:58 -0700 | [diff] [blame] | 509 | /* Test case where we successfully change the password. */ |
| 510 | TEST_F(EStoragedTest, ChangePasswordSuccess) |
| 511 | { |
| 512 | std::string newPasswordString("newPassword"); |
| 513 | std::vector<uint8_t> newPassword(newPasswordString.begin(), |
| 514 | newPasswordString.end()); |
| 515 | |
| 516 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 517 | |
| 518 | EXPECT_CALL(*mockCryptIface, |
| 519 | cryptKeyslotChangeByPassphrase( |
| 520 | _, _, _, reinterpret_cast<const char*>(password.data()), |
| 521 | password.size(), |
| 522 | reinterpret_cast<const char*>(newPassword.data()), |
| 523 | newPassword.size())) |
| 524 | .WillOnce(Return(0)); |
| 525 | |
| 526 | /* Change the password for the LUKS-encrypted device. */ |
| 527 | esObject->changePassword(password, newPassword); |
| 528 | } |
| 529 | |
| 530 | /* Test case where we fail to change the password. */ |
| 531 | TEST_F(EStoragedTest, ChangePasswordFail) |
| 532 | { |
| 533 | std::string newPasswordString("newPassword"); |
| 534 | std::vector<uint8_t> newPassword(newPasswordString.begin(), |
| 535 | newPasswordString.end()); |
| 536 | |
| 537 | EXPECT_CALL(*mockCryptIface, cryptLoad(_, _, _)).Times(1); |
| 538 | |
| 539 | EXPECT_CALL(*mockCryptIface, |
| 540 | cryptKeyslotChangeByPassphrase( |
| 541 | _, _, _, reinterpret_cast<const char*>(password.data()), |
| 542 | password.size(), |
| 543 | reinterpret_cast<const char*>(newPassword.data()), |
| 544 | newPassword.size())) |
| 545 | .WillOnce(Return(-1)); |
| 546 | |
| 547 | EXPECT_THROW(esObject->changePassword(password, newPassword), |
| 548 | InternalFailure); |
| 549 | } |
| 550 | |
John Wedig | b810c92 | 2021-11-17 16:38:03 -0800 | [diff] [blame] | 551 | } // namespace estoraged_test |