xref: /openbmc/qemu/tests/qemu-iotests/295 (revision 9dd003a99842d1d82c336e45c5cce656149de382)
1a2cd85f6SMaxim Levitsky#!/usr/bin/env python3
2*9dd003a9SVladimir Sementsov-Ogievskiy# group: rw
3a2cd85f6SMaxim Levitsky#
4a2cd85f6SMaxim Levitsky# Test case QMP's encrypted key management
5a2cd85f6SMaxim Levitsky#
6a2cd85f6SMaxim Levitsky# Copyright (C) 2019 Red Hat, Inc.
7a2cd85f6SMaxim Levitsky#
8a2cd85f6SMaxim Levitsky# This program is free software; you can redistribute it and/or modify
9a2cd85f6SMaxim Levitsky# it under the terms of the GNU General Public License as published by
10a2cd85f6SMaxim Levitsky# the Free Software Foundation; either version 2 of the License, or
11a2cd85f6SMaxim Levitsky# (at your option) any later version.
12a2cd85f6SMaxim Levitsky#
13a2cd85f6SMaxim Levitsky# This program is distributed in the hope that it will be useful,
14a2cd85f6SMaxim Levitsky# but WITHOUT ANY WARRANTY; without even the implied warranty of
15a2cd85f6SMaxim Levitsky# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16a2cd85f6SMaxim Levitsky# GNU General Public License for more details.
17a2cd85f6SMaxim Levitsky#
18a2cd85f6SMaxim Levitsky# You should have received a copy of the GNU General Public License
19a2cd85f6SMaxim Levitsky# along with this program.  If not, see <http://www.gnu.org/licenses/>.
20a2cd85f6SMaxim Levitsky#
21a2cd85f6SMaxim Levitsky
22a2cd85f6SMaxim Levitskyimport iotests
23a2cd85f6SMaxim Levitskyimport os
24a2cd85f6SMaxim Levitskyimport time
25a2cd85f6SMaxim Levitskyimport json
26a2cd85f6SMaxim Levitsky
27a2cd85f6SMaxim Levitskytest_img = os.path.join(iotests.test_dir, 'test.img')
28a2cd85f6SMaxim Levitsky
29a2cd85f6SMaxim Levitskyclass Secret:
30a2cd85f6SMaxim Levitsky    def __init__(self, index):
31a2cd85f6SMaxim Levitsky        self._id = "keysec" + str(index)
32a2cd85f6SMaxim Levitsky        # you are not supposed to see the password...
33a2cd85f6SMaxim Levitsky        self._secret = "hunter" + str(index)
34a2cd85f6SMaxim Levitsky
35a2cd85f6SMaxim Levitsky    def id(self):
36a2cd85f6SMaxim Levitsky        return self._id
37a2cd85f6SMaxim Levitsky
38a2cd85f6SMaxim Levitsky    def secret(self):
39a2cd85f6SMaxim Levitsky        return self._secret
40a2cd85f6SMaxim Levitsky
41a2cd85f6SMaxim Levitsky    def to_cmdline_object(self):
42a2cd85f6SMaxim Levitsky        return  [ "secret,id=" + self._id + ",data=" + self._secret]
43a2cd85f6SMaxim Levitsky
44a2cd85f6SMaxim Levitsky    def to_qmp_object(self):
45a2cd85f6SMaxim Levitsky        return { "qom_type" : "secret", "id": self.id(),
46a2cd85f6SMaxim Levitsky                 "props": { "data": self.secret() } }
47a2cd85f6SMaxim Levitsky
48a2cd85f6SMaxim Levitsky################################################################################
49a2cd85f6SMaxim Levitskyclass EncryptionSetupTestCase(iotests.QMPTestCase):
50a2cd85f6SMaxim Levitsky
51a2cd85f6SMaxim Levitsky    # test case startup
52a2cd85f6SMaxim Levitsky    def setUp(self):
53a2cd85f6SMaxim Levitsky        # start the VM
54a2cd85f6SMaxim Levitsky        self.vm = iotests.VM()
55a2cd85f6SMaxim Levitsky        self.vm.launch()
56a2cd85f6SMaxim Levitsky
57a2cd85f6SMaxim Levitsky        # create the secrets and load 'em into the VM
58a2cd85f6SMaxim Levitsky        self.secrets = [ Secret(i) for i in range(0, 6) ]
59a2cd85f6SMaxim Levitsky        for secret in self.secrets:
60a2cd85f6SMaxim Levitsky            result = self.vm.qmp("object-add", **secret.to_qmp_object())
61a2cd85f6SMaxim Levitsky            self.assert_qmp(result, 'return', {})
62a2cd85f6SMaxim Levitsky
63a2cd85f6SMaxim Levitsky        if iotests.imgfmt == "qcow2":
64a2cd85f6SMaxim Levitsky            self.pfx = "encrypt."
65a2cd85f6SMaxim Levitsky            self.img_opts = [ '-o', "encrypt.format=luks" ]
66a2cd85f6SMaxim Levitsky        else:
67a2cd85f6SMaxim Levitsky            self.pfx = ""
68a2cd85f6SMaxim Levitsky            self.img_opts = []
69a2cd85f6SMaxim Levitsky
70a2cd85f6SMaxim Levitsky    # test case shutdown
71a2cd85f6SMaxim Levitsky    def tearDown(self):
72a2cd85f6SMaxim Levitsky        # stop the VM
73a2cd85f6SMaxim Levitsky        self.vm.shutdown()
74a2cd85f6SMaxim Levitsky
75a2cd85f6SMaxim Levitsky    ###########################################################################
76a2cd85f6SMaxim Levitsky    # create the encrypted block device
77a2cd85f6SMaxim Levitsky    def createImg(self, file, secret):
78a2cd85f6SMaxim Levitsky
79a2cd85f6SMaxim Levitsky        iotests.qemu_img(
80a2cd85f6SMaxim Levitsky            'create',
81a2cd85f6SMaxim Levitsky            '--object', *secret.to_cmdline_object(),
82a2cd85f6SMaxim Levitsky            '-f', iotests.imgfmt,
83a2cd85f6SMaxim Levitsky            '-o', self.pfx + 'key-secret=' + secret.id(),
84a2cd85f6SMaxim Levitsky            '-o', self.pfx + 'iter-time=10',
85a2cd85f6SMaxim Levitsky            *self.img_opts,
86a2cd85f6SMaxim Levitsky            file,
87a2cd85f6SMaxim Levitsky            '1M')
88a2cd85f6SMaxim Levitsky
89a2cd85f6SMaxim Levitsky    ###########################################################################
90a2cd85f6SMaxim Levitsky    # open an encrypted block device
91a2cd85f6SMaxim Levitsky    def openImageQmp(self, id, file, secret, read_only = False):
92a2cd85f6SMaxim Levitsky
93a2cd85f6SMaxim Levitsky        encrypt_options = {
94a2cd85f6SMaxim Levitsky            'key-secret' : secret.id()
95a2cd85f6SMaxim Levitsky        }
96a2cd85f6SMaxim Levitsky
97a2cd85f6SMaxim Levitsky        if iotests.imgfmt == "qcow2":
98a2cd85f6SMaxim Levitsky            encrypt_options = {
99a2cd85f6SMaxim Levitsky                'encrypt': {
100a2cd85f6SMaxim Levitsky                    'format':'luks',
101a2cd85f6SMaxim Levitsky                    **encrypt_options
102a2cd85f6SMaxim Levitsky                }
103a2cd85f6SMaxim Levitsky            }
104a2cd85f6SMaxim Levitsky
105a2cd85f6SMaxim Levitsky        result = self.vm.qmp('blockdev-add', **
106a2cd85f6SMaxim Levitsky            {
107a2cd85f6SMaxim Levitsky                'driver': iotests.imgfmt,
108a2cd85f6SMaxim Levitsky                'node-name': id,
109a2cd85f6SMaxim Levitsky                'read-only': read_only,
110a2cd85f6SMaxim Levitsky
111a2cd85f6SMaxim Levitsky                **encrypt_options,
112a2cd85f6SMaxim Levitsky
113a2cd85f6SMaxim Levitsky                'file': {
114a2cd85f6SMaxim Levitsky                    'driver': 'file',
115a2cd85f6SMaxim Levitsky                    'filename': test_img,
116a2cd85f6SMaxim Levitsky                }
117a2cd85f6SMaxim Levitsky            }
118a2cd85f6SMaxim Levitsky        )
119a2cd85f6SMaxim Levitsky        self.assert_qmp(result, 'return', {})
120a2cd85f6SMaxim Levitsky
121a2cd85f6SMaxim Levitsky    # close the encrypted block device
122a2cd85f6SMaxim Levitsky    def closeImageQmp(self, id):
123a2cd85f6SMaxim Levitsky        result = self.vm.qmp('blockdev-del', **{ 'node-name': id })
124a2cd85f6SMaxim Levitsky        self.assert_qmp(result, 'return', {})
125a2cd85f6SMaxim Levitsky
126a2cd85f6SMaxim Levitsky    ###########################################################################
127a2cd85f6SMaxim Levitsky    # add a key to an encrypted block device
128a2cd85f6SMaxim Levitsky    def addKeyQmp(self, id, new_secret, secret = None,
129a2cd85f6SMaxim Levitsky                  slot = None, force = False):
130a2cd85f6SMaxim Levitsky
131a2cd85f6SMaxim Levitsky        crypt_options = {
132a2cd85f6SMaxim Levitsky            'state'      : 'active',
133a2cd85f6SMaxim Levitsky            'new-secret' : new_secret.id(),
134a2cd85f6SMaxim Levitsky            'iter-time' : 10
135a2cd85f6SMaxim Levitsky        }
136a2cd85f6SMaxim Levitsky
137a2cd85f6SMaxim Levitsky        if slot != None:
138a2cd85f6SMaxim Levitsky            crypt_options['keyslot'] = slot
139a2cd85f6SMaxim Levitsky
140a2cd85f6SMaxim Levitsky
141a2cd85f6SMaxim Levitsky        if secret != None:
142a2cd85f6SMaxim Levitsky            crypt_options['secret'] = secret.id()
143a2cd85f6SMaxim Levitsky
144a2cd85f6SMaxim Levitsky        if iotests.imgfmt == "qcow2":
145a2cd85f6SMaxim Levitsky            crypt_options['format'] = 'luks'
146a2cd85f6SMaxim Levitsky            crypt_options = {
147a2cd85f6SMaxim Levitsky                'encrypt': crypt_options
148a2cd85f6SMaxim Levitsky            }
149a2cd85f6SMaxim Levitsky
150a2cd85f6SMaxim Levitsky        args = {
151a2cd85f6SMaxim Levitsky            'node-name': id,
152a2cd85f6SMaxim Levitsky            'job-id' : 'job_add_key',
153a2cd85f6SMaxim Levitsky            'options' : {
154a2cd85f6SMaxim Levitsky                    'driver' : iotests.imgfmt,
155a2cd85f6SMaxim Levitsky                    **crypt_options
156a2cd85f6SMaxim Levitsky                },
157a2cd85f6SMaxim Levitsky        }
158a2cd85f6SMaxim Levitsky
159a2cd85f6SMaxim Levitsky        if force == True:
160a2cd85f6SMaxim Levitsky            args['force'] = True
161a2cd85f6SMaxim Levitsky
162a2cd85f6SMaxim Levitsky        #TODO: check what jobs return
163a2cd85f6SMaxim Levitsky        result = self.vm.qmp('x-blockdev-amend', **args)
164a2cd85f6SMaxim Levitsky        assert result['return'] == {}
165a2cd85f6SMaxim Levitsky        self.vm.run_job('job_add_key')
166a2cd85f6SMaxim Levitsky
167a2cd85f6SMaxim Levitsky    # erase a key from an encrypted block device
168a2cd85f6SMaxim Levitsky    def eraseKeyQmp(self, id, old_secret = None, slot = None, force = False):
169a2cd85f6SMaxim Levitsky
170a2cd85f6SMaxim Levitsky        crypt_options = {
171a2cd85f6SMaxim Levitsky            'state'      : 'inactive',
172a2cd85f6SMaxim Levitsky        }
173a2cd85f6SMaxim Levitsky
174a2cd85f6SMaxim Levitsky        if slot != None:
175a2cd85f6SMaxim Levitsky            crypt_options['keyslot'] = slot
176a2cd85f6SMaxim Levitsky        if old_secret != None:
177a2cd85f6SMaxim Levitsky            crypt_options['old-secret'] = old_secret.id()
178a2cd85f6SMaxim Levitsky
179a2cd85f6SMaxim Levitsky        if iotests.imgfmt == "qcow2":
180a2cd85f6SMaxim Levitsky            crypt_options['format'] = 'luks'
181a2cd85f6SMaxim Levitsky            crypt_options = {
182a2cd85f6SMaxim Levitsky                'encrypt': crypt_options
183a2cd85f6SMaxim Levitsky            }
184a2cd85f6SMaxim Levitsky
185a2cd85f6SMaxim Levitsky        args = {
186a2cd85f6SMaxim Levitsky            'node-name': id,
187a2cd85f6SMaxim Levitsky            'job-id' : 'job_erase_key',
188a2cd85f6SMaxim Levitsky            'options' : {
189a2cd85f6SMaxim Levitsky                    'driver' : iotests.imgfmt,
190a2cd85f6SMaxim Levitsky                    **crypt_options
191a2cd85f6SMaxim Levitsky                },
192a2cd85f6SMaxim Levitsky        }
193a2cd85f6SMaxim Levitsky
194a2cd85f6SMaxim Levitsky        if force == True:
195a2cd85f6SMaxim Levitsky            args['force'] = True
196a2cd85f6SMaxim Levitsky
197a2cd85f6SMaxim Levitsky        result = self.vm.qmp('x-blockdev-amend', **args)
198a2cd85f6SMaxim Levitsky        assert result['return'] == {}
199a2cd85f6SMaxim Levitsky        self.vm.run_job('job_erase_key')
200a2cd85f6SMaxim Levitsky
201a2cd85f6SMaxim Levitsky    ###########################################################################
202a2cd85f6SMaxim Levitsky    # create image, and change its key
203a2cd85f6SMaxim Levitsky    def testChangeKey(self):
204a2cd85f6SMaxim Levitsky
205a2cd85f6SMaxim Levitsky        # create the image with secret0 and open it
206a2cd85f6SMaxim Levitsky        self.createImg(test_img, self.secrets[0]);
207a2cd85f6SMaxim Levitsky        self.openImageQmp("testdev", test_img, self.secrets[0])
208a2cd85f6SMaxim Levitsky
209a2cd85f6SMaxim Levitsky        # add key to slot 1
210a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[1])
211a2cd85f6SMaxim Levitsky
212a2cd85f6SMaxim Levitsky        # add key to slot 5
213a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[2], slot=5)
214a2cd85f6SMaxim Levitsky
215a2cd85f6SMaxim Levitsky        # erase key from slot 0
216a2cd85f6SMaxim Levitsky        self.eraseKeyQmp("testdev", old_secret = self.secrets[0])
217a2cd85f6SMaxim Levitsky
218a2cd85f6SMaxim Levitsky        #reopen the image with secret1
219a2cd85f6SMaxim Levitsky        self.closeImageQmp("testdev")
220a2cd85f6SMaxim Levitsky        self.openImageQmp("testdev", test_img, self.secrets[1])
221a2cd85f6SMaxim Levitsky
222a2cd85f6SMaxim Levitsky        # close and erase the image for good
223a2cd85f6SMaxim Levitsky        self.closeImageQmp("testdev")
224a2cd85f6SMaxim Levitsky        os.remove(test_img)
225a2cd85f6SMaxim Levitsky
226a2cd85f6SMaxim Levitsky    # test that if we erase the old password,
227a2cd85f6SMaxim Levitsky    # we can still change the encryption keys using 'old-secret'
228a2cd85f6SMaxim Levitsky    def testOldPassword(self):
229a2cd85f6SMaxim Levitsky
230a2cd85f6SMaxim Levitsky        # create the image with secret0 and open it
231a2cd85f6SMaxim Levitsky        self.createImg(test_img, self.secrets[0]);
232a2cd85f6SMaxim Levitsky        self.openImageQmp("testdev", test_img, self.secrets[0])
233a2cd85f6SMaxim Levitsky
234a2cd85f6SMaxim Levitsky        # add key to slot 1
235a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[1])
236a2cd85f6SMaxim Levitsky
237a2cd85f6SMaxim Levitsky        # erase key from slot 0
238a2cd85f6SMaxim Levitsky        self.eraseKeyQmp("testdev", old_secret = self.secrets[0])
239a2cd85f6SMaxim Levitsky
240a2cd85f6SMaxim Levitsky        # this will fail as the old password is no longer valid
241a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[2])
242a2cd85f6SMaxim Levitsky
243a2cd85f6SMaxim Levitsky        # this will work
244a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[2], secret = self.secrets[1])
245a2cd85f6SMaxim Levitsky
246a2cd85f6SMaxim Levitsky        # close and erase the image for good
247a2cd85f6SMaxim Levitsky        self.closeImageQmp("testdev")
248a2cd85f6SMaxim Levitsky        os.remove(test_img)
249a2cd85f6SMaxim Levitsky
250a2cd85f6SMaxim Levitsky    def testUseForceLuke(self):
251a2cd85f6SMaxim Levitsky
252a2cd85f6SMaxim Levitsky        self.createImg(test_img, self.secrets[0]);
253a2cd85f6SMaxim Levitsky        self.openImageQmp("testdev", test_img, self.secrets[0])
254a2cd85f6SMaxim Levitsky
255a2cd85f6SMaxim Levitsky        # Add bunch of secrets
256a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[1], slot=4)
257a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[4], slot=2)
258a2cd85f6SMaxim Levitsky
259a2cd85f6SMaxim Levitsky        # overwrite an active secret
260a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[5], slot=2)
261a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[5], slot=2, force=True)
262a2cd85f6SMaxim Levitsky
263a2cd85f6SMaxim Levitsky        self.addKeyQmp("testdev", new_secret = self.secrets[0])
264a2cd85f6SMaxim Levitsky
265a2cd85f6SMaxim Levitsky        # Now erase all the secrets
266a2cd85f6SMaxim Levitsky        self.eraseKeyQmp("testdev", old_secret = self.secrets[5])
267a2cd85f6SMaxim Levitsky        self.eraseKeyQmp("testdev", slot=4)
268a2cd85f6SMaxim Levitsky
269a2cd85f6SMaxim Levitsky        # erase last keyslot
270a2cd85f6SMaxim Levitsky        self.eraseKeyQmp("testdev", old_secret = self.secrets[0])
271a2cd85f6SMaxim Levitsky        self.eraseKeyQmp("testdev", old_secret = self.secrets[0], force=True)
272a2cd85f6SMaxim Levitsky
273a2cd85f6SMaxim Levitsky        self.closeImageQmp("testdev")
274a2cd85f6SMaxim Levitsky        os.remove(test_img)
275a2cd85f6SMaxim Levitsky
276a2cd85f6SMaxim Levitsky
277a2cd85f6SMaxim Levitskyif __name__ == '__main__':
278a2cd85f6SMaxim Levitsky    iotests.verify_working_luks()
279a2cd85f6SMaxim Levitsky    # Encrypted formats support
280a2cd85f6SMaxim Levitsky    iotests.activate_logging()
281a2cd85f6SMaxim Levitsky    iotests.main(supported_fmts = ['qcow2', 'luks'])
282