1a2cd85f6SMaxim Levitsky#!/usr/bin/env python3 2*9dd003a9SVladimir Sementsov-Ogievskiy# group: rw 3a2cd85f6SMaxim Levitsky# 4a2cd85f6SMaxim Levitsky# Test case QMP's encrypted key management 5a2cd85f6SMaxim Levitsky# 6a2cd85f6SMaxim Levitsky# Copyright (C) 2019 Red Hat, Inc. 7a2cd85f6SMaxim Levitsky# 8a2cd85f6SMaxim Levitsky# This program is free software; you can redistribute it and/or modify 9a2cd85f6SMaxim Levitsky# it under the terms of the GNU General Public License as published by 10a2cd85f6SMaxim Levitsky# the Free Software Foundation; either version 2 of the License, or 11a2cd85f6SMaxim Levitsky# (at your option) any later version. 12a2cd85f6SMaxim Levitsky# 13a2cd85f6SMaxim Levitsky# This program is distributed in the hope that it will be useful, 14a2cd85f6SMaxim Levitsky# but WITHOUT ANY WARRANTY; without even the implied warranty of 15a2cd85f6SMaxim Levitsky# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 16a2cd85f6SMaxim Levitsky# GNU General Public License for more details. 17a2cd85f6SMaxim Levitsky# 18a2cd85f6SMaxim Levitsky# You should have received a copy of the GNU General Public License 19a2cd85f6SMaxim Levitsky# along with this program. If not, see <http://www.gnu.org/licenses/>. 20a2cd85f6SMaxim Levitsky# 21a2cd85f6SMaxim Levitsky 22a2cd85f6SMaxim Levitskyimport iotests 23a2cd85f6SMaxim Levitskyimport os 24a2cd85f6SMaxim Levitskyimport time 25a2cd85f6SMaxim Levitskyimport json 26a2cd85f6SMaxim Levitsky 27a2cd85f6SMaxim Levitskytest_img = os.path.join(iotests.test_dir, 'test.img') 28a2cd85f6SMaxim Levitsky 29a2cd85f6SMaxim Levitskyclass Secret: 30a2cd85f6SMaxim Levitsky def __init__(self, index): 31a2cd85f6SMaxim Levitsky self._id = "keysec" + str(index) 32a2cd85f6SMaxim Levitsky # you are not supposed to see the password... 33a2cd85f6SMaxim Levitsky self._secret = "hunter" + str(index) 34a2cd85f6SMaxim Levitsky 35a2cd85f6SMaxim Levitsky def id(self): 36a2cd85f6SMaxim Levitsky return self._id 37a2cd85f6SMaxim Levitsky 38a2cd85f6SMaxim Levitsky def secret(self): 39a2cd85f6SMaxim Levitsky return self._secret 40a2cd85f6SMaxim Levitsky 41a2cd85f6SMaxim Levitsky def to_cmdline_object(self): 42a2cd85f6SMaxim Levitsky return [ "secret,id=" + self._id + ",data=" + self._secret] 43a2cd85f6SMaxim Levitsky 44a2cd85f6SMaxim Levitsky def to_qmp_object(self): 45a2cd85f6SMaxim Levitsky return { "qom_type" : "secret", "id": self.id(), 46a2cd85f6SMaxim Levitsky "props": { "data": self.secret() } } 47a2cd85f6SMaxim Levitsky 48a2cd85f6SMaxim Levitsky################################################################################ 49a2cd85f6SMaxim Levitskyclass EncryptionSetupTestCase(iotests.QMPTestCase): 50a2cd85f6SMaxim Levitsky 51a2cd85f6SMaxim Levitsky # test case startup 52a2cd85f6SMaxim Levitsky def setUp(self): 53a2cd85f6SMaxim Levitsky # start the VM 54a2cd85f6SMaxim Levitsky self.vm = iotests.VM() 55a2cd85f6SMaxim Levitsky self.vm.launch() 56a2cd85f6SMaxim Levitsky 57a2cd85f6SMaxim Levitsky # create the secrets and load 'em into the VM 58a2cd85f6SMaxim Levitsky self.secrets = [ Secret(i) for i in range(0, 6) ] 59a2cd85f6SMaxim Levitsky for secret in self.secrets: 60a2cd85f6SMaxim Levitsky result = self.vm.qmp("object-add", **secret.to_qmp_object()) 61a2cd85f6SMaxim Levitsky self.assert_qmp(result, 'return', {}) 62a2cd85f6SMaxim Levitsky 63a2cd85f6SMaxim Levitsky if iotests.imgfmt == "qcow2": 64a2cd85f6SMaxim Levitsky self.pfx = "encrypt." 65a2cd85f6SMaxim Levitsky self.img_opts = [ '-o', "encrypt.format=luks" ] 66a2cd85f6SMaxim Levitsky else: 67a2cd85f6SMaxim Levitsky self.pfx = "" 68a2cd85f6SMaxim Levitsky self.img_opts = [] 69a2cd85f6SMaxim Levitsky 70a2cd85f6SMaxim Levitsky # test case shutdown 71a2cd85f6SMaxim Levitsky def tearDown(self): 72a2cd85f6SMaxim Levitsky # stop the VM 73a2cd85f6SMaxim Levitsky self.vm.shutdown() 74a2cd85f6SMaxim Levitsky 75a2cd85f6SMaxim Levitsky ########################################################################### 76a2cd85f6SMaxim Levitsky # create the encrypted block device 77a2cd85f6SMaxim Levitsky def createImg(self, file, secret): 78a2cd85f6SMaxim Levitsky 79a2cd85f6SMaxim Levitsky iotests.qemu_img( 80a2cd85f6SMaxim Levitsky 'create', 81a2cd85f6SMaxim Levitsky '--object', *secret.to_cmdline_object(), 82a2cd85f6SMaxim Levitsky '-f', iotests.imgfmt, 83a2cd85f6SMaxim Levitsky '-o', self.pfx + 'key-secret=' + secret.id(), 84a2cd85f6SMaxim Levitsky '-o', self.pfx + 'iter-time=10', 85a2cd85f6SMaxim Levitsky *self.img_opts, 86a2cd85f6SMaxim Levitsky file, 87a2cd85f6SMaxim Levitsky '1M') 88a2cd85f6SMaxim Levitsky 89a2cd85f6SMaxim Levitsky ########################################################################### 90a2cd85f6SMaxim Levitsky # open an encrypted block device 91a2cd85f6SMaxim Levitsky def openImageQmp(self, id, file, secret, read_only = False): 92a2cd85f6SMaxim Levitsky 93a2cd85f6SMaxim Levitsky encrypt_options = { 94a2cd85f6SMaxim Levitsky 'key-secret' : secret.id() 95a2cd85f6SMaxim Levitsky } 96a2cd85f6SMaxim Levitsky 97a2cd85f6SMaxim Levitsky if iotests.imgfmt == "qcow2": 98a2cd85f6SMaxim Levitsky encrypt_options = { 99a2cd85f6SMaxim Levitsky 'encrypt': { 100a2cd85f6SMaxim Levitsky 'format':'luks', 101a2cd85f6SMaxim Levitsky **encrypt_options 102a2cd85f6SMaxim Levitsky } 103a2cd85f6SMaxim Levitsky } 104a2cd85f6SMaxim Levitsky 105a2cd85f6SMaxim Levitsky result = self.vm.qmp('blockdev-add', ** 106a2cd85f6SMaxim Levitsky { 107a2cd85f6SMaxim Levitsky 'driver': iotests.imgfmt, 108a2cd85f6SMaxim Levitsky 'node-name': id, 109a2cd85f6SMaxim Levitsky 'read-only': read_only, 110a2cd85f6SMaxim Levitsky 111a2cd85f6SMaxim Levitsky **encrypt_options, 112a2cd85f6SMaxim Levitsky 113a2cd85f6SMaxim Levitsky 'file': { 114a2cd85f6SMaxim Levitsky 'driver': 'file', 115a2cd85f6SMaxim Levitsky 'filename': test_img, 116a2cd85f6SMaxim Levitsky } 117a2cd85f6SMaxim Levitsky } 118a2cd85f6SMaxim Levitsky ) 119a2cd85f6SMaxim Levitsky self.assert_qmp(result, 'return', {}) 120a2cd85f6SMaxim Levitsky 121a2cd85f6SMaxim Levitsky # close the encrypted block device 122a2cd85f6SMaxim Levitsky def closeImageQmp(self, id): 123a2cd85f6SMaxim Levitsky result = self.vm.qmp('blockdev-del', **{ 'node-name': id }) 124a2cd85f6SMaxim Levitsky self.assert_qmp(result, 'return', {}) 125a2cd85f6SMaxim Levitsky 126a2cd85f6SMaxim Levitsky ########################################################################### 127a2cd85f6SMaxim Levitsky # add a key to an encrypted block device 128a2cd85f6SMaxim Levitsky def addKeyQmp(self, id, new_secret, secret = None, 129a2cd85f6SMaxim Levitsky slot = None, force = False): 130a2cd85f6SMaxim Levitsky 131a2cd85f6SMaxim Levitsky crypt_options = { 132a2cd85f6SMaxim Levitsky 'state' : 'active', 133a2cd85f6SMaxim Levitsky 'new-secret' : new_secret.id(), 134a2cd85f6SMaxim Levitsky 'iter-time' : 10 135a2cd85f6SMaxim Levitsky } 136a2cd85f6SMaxim Levitsky 137a2cd85f6SMaxim Levitsky if slot != None: 138a2cd85f6SMaxim Levitsky crypt_options['keyslot'] = slot 139a2cd85f6SMaxim Levitsky 140a2cd85f6SMaxim Levitsky 141a2cd85f6SMaxim Levitsky if secret != None: 142a2cd85f6SMaxim Levitsky crypt_options['secret'] = secret.id() 143a2cd85f6SMaxim Levitsky 144a2cd85f6SMaxim Levitsky if iotests.imgfmt == "qcow2": 145a2cd85f6SMaxim Levitsky crypt_options['format'] = 'luks' 146a2cd85f6SMaxim Levitsky crypt_options = { 147a2cd85f6SMaxim Levitsky 'encrypt': crypt_options 148a2cd85f6SMaxim Levitsky } 149a2cd85f6SMaxim Levitsky 150a2cd85f6SMaxim Levitsky args = { 151a2cd85f6SMaxim Levitsky 'node-name': id, 152a2cd85f6SMaxim Levitsky 'job-id' : 'job_add_key', 153a2cd85f6SMaxim Levitsky 'options' : { 154a2cd85f6SMaxim Levitsky 'driver' : iotests.imgfmt, 155a2cd85f6SMaxim Levitsky **crypt_options 156a2cd85f6SMaxim Levitsky }, 157a2cd85f6SMaxim Levitsky } 158a2cd85f6SMaxim Levitsky 159a2cd85f6SMaxim Levitsky if force == True: 160a2cd85f6SMaxim Levitsky args['force'] = True 161a2cd85f6SMaxim Levitsky 162a2cd85f6SMaxim Levitsky #TODO: check what jobs return 163a2cd85f6SMaxim Levitsky result = self.vm.qmp('x-blockdev-amend', **args) 164a2cd85f6SMaxim Levitsky assert result['return'] == {} 165a2cd85f6SMaxim Levitsky self.vm.run_job('job_add_key') 166a2cd85f6SMaxim Levitsky 167a2cd85f6SMaxim Levitsky # erase a key from an encrypted block device 168a2cd85f6SMaxim Levitsky def eraseKeyQmp(self, id, old_secret = None, slot = None, force = False): 169a2cd85f6SMaxim Levitsky 170a2cd85f6SMaxim Levitsky crypt_options = { 171a2cd85f6SMaxim Levitsky 'state' : 'inactive', 172a2cd85f6SMaxim Levitsky } 173a2cd85f6SMaxim Levitsky 174a2cd85f6SMaxim Levitsky if slot != None: 175a2cd85f6SMaxim Levitsky crypt_options['keyslot'] = slot 176a2cd85f6SMaxim Levitsky if old_secret != None: 177a2cd85f6SMaxim Levitsky crypt_options['old-secret'] = old_secret.id() 178a2cd85f6SMaxim Levitsky 179a2cd85f6SMaxim Levitsky if iotests.imgfmt == "qcow2": 180a2cd85f6SMaxim Levitsky crypt_options['format'] = 'luks' 181a2cd85f6SMaxim Levitsky crypt_options = { 182a2cd85f6SMaxim Levitsky 'encrypt': crypt_options 183a2cd85f6SMaxim Levitsky } 184a2cd85f6SMaxim Levitsky 185a2cd85f6SMaxim Levitsky args = { 186a2cd85f6SMaxim Levitsky 'node-name': id, 187a2cd85f6SMaxim Levitsky 'job-id' : 'job_erase_key', 188a2cd85f6SMaxim Levitsky 'options' : { 189a2cd85f6SMaxim Levitsky 'driver' : iotests.imgfmt, 190a2cd85f6SMaxim Levitsky **crypt_options 191a2cd85f6SMaxim Levitsky }, 192a2cd85f6SMaxim Levitsky } 193a2cd85f6SMaxim Levitsky 194a2cd85f6SMaxim Levitsky if force == True: 195a2cd85f6SMaxim Levitsky args['force'] = True 196a2cd85f6SMaxim Levitsky 197a2cd85f6SMaxim Levitsky result = self.vm.qmp('x-blockdev-amend', **args) 198a2cd85f6SMaxim Levitsky assert result['return'] == {} 199a2cd85f6SMaxim Levitsky self.vm.run_job('job_erase_key') 200a2cd85f6SMaxim Levitsky 201a2cd85f6SMaxim Levitsky ########################################################################### 202a2cd85f6SMaxim Levitsky # create image, and change its key 203a2cd85f6SMaxim Levitsky def testChangeKey(self): 204a2cd85f6SMaxim Levitsky 205a2cd85f6SMaxim Levitsky # create the image with secret0 and open it 206a2cd85f6SMaxim Levitsky self.createImg(test_img, self.secrets[0]); 207a2cd85f6SMaxim Levitsky self.openImageQmp("testdev", test_img, self.secrets[0]) 208a2cd85f6SMaxim Levitsky 209a2cd85f6SMaxim Levitsky # add key to slot 1 210a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[1]) 211a2cd85f6SMaxim Levitsky 212a2cd85f6SMaxim Levitsky # add key to slot 5 213a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[2], slot=5) 214a2cd85f6SMaxim Levitsky 215a2cd85f6SMaxim Levitsky # erase key from slot 0 216a2cd85f6SMaxim Levitsky self.eraseKeyQmp("testdev", old_secret = self.secrets[0]) 217a2cd85f6SMaxim Levitsky 218a2cd85f6SMaxim Levitsky #reopen the image with secret1 219a2cd85f6SMaxim Levitsky self.closeImageQmp("testdev") 220a2cd85f6SMaxim Levitsky self.openImageQmp("testdev", test_img, self.secrets[1]) 221a2cd85f6SMaxim Levitsky 222a2cd85f6SMaxim Levitsky # close and erase the image for good 223a2cd85f6SMaxim Levitsky self.closeImageQmp("testdev") 224a2cd85f6SMaxim Levitsky os.remove(test_img) 225a2cd85f6SMaxim Levitsky 226a2cd85f6SMaxim Levitsky # test that if we erase the old password, 227a2cd85f6SMaxim Levitsky # we can still change the encryption keys using 'old-secret' 228a2cd85f6SMaxim Levitsky def testOldPassword(self): 229a2cd85f6SMaxim Levitsky 230a2cd85f6SMaxim Levitsky # create the image with secret0 and open it 231a2cd85f6SMaxim Levitsky self.createImg(test_img, self.secrets[0]); 232a2cd85f6SMaxim Levitsky self.openImageQmp("testdev", test_img, self.secrets[0]) 233a2cd85f6SMaxim Levitsky 234a2cd85f6SMaxim Levitsky # add key to slot 1 235a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[1]) 236a2cd85f6SMaxim Levitsky 237a2cd85f6SMaxim Levitsky # erase key from slot 0 238a2cd85f6SMaxim Levitsky self.eraseKeyQmp("testdev", old_secret = self.secrets[0]) 239a2cd85f6SMaxim Levitsky 240a2cd85f6SMaxim Levitsky # this will fail as the old password is no longer valid 241a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[2]) 242a2cd85f6SMaxim Levitsky 243a2cd85f6SMaxim Levitsky # this will work 244a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[2], secret = self.secrets[1]) 245a2cd85f6SMaxim Levitsky 246a2cd85f6SMaxim Levitsky # close and erase the image for good 247a2cd85f6SMaxim Levitsky self.closeImageQmp("testdev") 248a2cd85f6SMaxim Levitsky os.remove(test_img) 249a2cd85f6SMaxim Levitsky 250a2cd85f6SMaxim Levitsky def testUseForceLuke(self): 251a2cd85f6SMaxim Levitsky 252a2cd85f6SMaxim Levitsky self.createImg(test_img, self.secrets[0]); 253a2cd85f6SMaxim Levitsky self.openImageQmp("testdev", test_img, self.secrets[0]) 254a2cd85f6SMaxim Levitsky 255a2cd85f6SMaxim Levitsky # Add bunch of secrets 256a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[1], slot=4) 257a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[4], slot=2) 258a2cd85f6SMaxim Levitsky 259a2cd85f6SMaxim Levitsky # overwrite an active secret 260a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[5], slot=2) 261a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[5], slot=2, force=True) 262a2cd85f6SMaxim Levitsky 263a2cd85f6SMaxim Levitsky self.addKeyQmp("testdev", new_secret = self.secrets[0]) 264a2cd85f6SMaxim Levitsky 265a2cd85f6SMaxim Levitsky # Now erase all the secrets 266a2cd85f6SMaxim Levitsky self.eraseKeyQmp("testdev", old_secret = self.secrets[5]) 267a2cd85f6SMaxim Levitsky self.eraseKeyQmp("testdev", slot=4) 268a2cd85f6SMaxim Levitsky 269a2cd85f6SMaxim Levitsky # erase last keyslot 270a2cd85f6SMaxim Levitsky self.eraseKeyQmp("testdev", old_secret = self.secrets[0]) 271a2cd85f6SMaxim Levitsky self.eraseKeyQmp("testdev", old_secret = self.secrets[0], force=True) 272a2cd85f6SMaxim Levitsky 273a2cd85f6SMaxim Levitsky self.closeImageQmp("testdev") 274a2cd85f6SMaxim Levitsky os.remove(test_img) 275a2cd85f6SMaxim Levitsky 276a2cd85f6SMaxim Levitsky 277a2cd85f6SMaxim Levitskyif __name__ == '__main__': 278a2cd85f6SMaxim Levitsky iotests.verify_working_luks() 279a2cd85f6SMaxim Levitsky # Encrypted formats support 280a2cd85f6SMaxim Levitsky iotests.activate_logging() 281a2cd85f6SMaxim Levitsky iotests.main(supported_fmts = ['qcow2', 'luks']) 282