xref: /openbmc/qemu/tests/qemu-iotests/296 (revision c5339030e64781bf8f0d80ab7c5044b5547df79b)
1a2cd85f6SMaxim Levitsky#!/usr/bin/env python3
29dd003a9SVladimir Sementsov-Ogievskiy# group: rw
3a2cd85f6SMaxim Levitsky#
4a2cd85f6SMaxim Levitsky# Test case for encryption key management versus image sharing
5a2cd85f6SMaxim Levitsky#
6a2cd85f6SMaxim Levitsky# Copyright (C) 2019 Red Hat, Inc.
7a2cd85f6SMaxim Levitsky#
8a2cd85f6SMaxim Levitsky# This program is free software; you can redistribute it and/or modify
9a2cd85f6SMaxim Levitsky# it under the terms of the GNU General Public License as published by
10a2cd85f6SMaxim Levitsky# the Free Software Foundation; either version 2 of the License, or
11a2cd85f6SMaxim Levitsky# (at your option) any later version.
12a2cd85f6SMaxim Levitsky#
13a2cd85f6SMaxim Levitsky# This program is distributed in the hope that it will be useful,
14a2cd85f6SMaxim Levitsky# but WITHOUT ANY WARRANTY; without even the implied warranty of
15a2cd85f6SMaxim Levitsky# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16a2cd85f6SMaxim Levitsky# GNU General Public License for more details.
17a2cd85f6SMaxim Levitsky#
18a2cd85f6SMaxim Levitsky# You should have received a copy of the GNU General Public License
19a2cd85f6SMaxim Levitsky# along with this program.  If not, see <http://www.gnu.org/licenses/>.
20a2cd85f6SMaxim Levitsky#
21a2cd85f6SMaxim Levitsky
22a2cd85f6SMaxim Levitskyimport iotests
23a2cd85f6SMaxim Levitskyimport os
24a2cd85f6SMaxim Levitskyimport time
25a2cd85f6SMaxim Levitskyimport json
26a2cd85f6SMaxim Levitsky
27a2cd85f6SMaxim Levitskytest_img = os.path.join(iotests.test_dir, 'test.img')
28a2cd85f6SMaxim Levitsky
29a2cd85f6SMaxim Levitskyclass Secret:
30a2cd85f6SMaxim Levitsky    def __init__(self, index):
31a2cd85f6SMaxim Levitsky        self._id = "keysec" + str(index)
32a2cd85f6SMaxim Levitsky        # you are not supposed to see the password...
33a2cd85f6SMaxim Levitsky        self._secret = "hunter" + str(index)
34a2cd85f6SMaxim Levitsky
35a2cd85f6SMaxim Levitsky    def id(self):
36a2cd85f6SMaxim Levitsky        return self._id
37a2cd85f6SMaxim Levitsky
38a2cd85f6SMaxim Levitsky    def secret(self):
39a2cd85f6SMaxim Levitsky        return self._secret
40a2cd85f6SMaxim Levitsky
41a2cd85f6SMaxim Levitsky    def to_cmdline_object(self):
42a2cd85f6SMaxim Levitsky        return  [ "secret,id=" + self._id + ",data=" + self._secret]
43a2cd85f6SMaxim Levitsky
44a2cd85f6SMaxim Levitsky    def to_qmp_object(self):
45*c5339030SVladimir Sementsov-Ogievskiy        return { "qom-type" : "secret", "id": self.id(),
46fa818b2fSAlberto Garcia                 "data": self.secret() }
47a2cd85f6SMaxim Levitsky
48a2cd85f6SMaxim Levitsky################################################################################
49a2cd85f6SMaxim Levitsky
50a2cd85f6SMaxim Levitskyclass EncryptionSetupTestCase(iotests.QMPTestCase):
51a2cd85f6SMaxim Levitsky
52a2cd85f6SMaxim Levitsky    # test case startup
53a2cd85f6SMaxim Levitsky    def setUp(self):
54a2cd85f6SMaxim Levitsky
55a2cd85f6SMaxim Levitsky        # start the VMs
56a2cd85f6SMaxim Levitsky        self.vm1 = iotests.VM(path_suffix = 'VM1')
57a2cd85f6SMaxim Levitsky        self.vm2 = iotests.VM(path_suffix = 'VM2')
58a2cd85f6SMaxim Levitsky        self.vm1.launch()
59a2cd85f6SMaxim Levitsky        self.vm2.launch()
60a2cd85f6SMaxim Levitsky
61a2cd85f6SMaxim Levitsky        # create the secrets and load 'em into the VMs
62a2cd85f6SMaxim Levitsky        self.secrets = [ Secret(i) for i in range(0, 4) ]
63a2cd85f6SMaxim Levitsky        for secret in self.secrets:
64*c5339030SVladimir Sementsov-Ogievskiy            result = self.vm1.qmp("object-add", secret.to_qmp_object())
65a2cd85f6SMaxim Levitsky            self.assert_qmp(result, 'return', {})
66*c5339030SVladimir Sementsov-Ogievskiy            result = self.vm2.qmp("object-add", secret.to_qmp_object())
67a2cd85f6SMaxim Levitsky            self.assert_qmp(result, 'return', {})
68a2cd85f6SMaxim Levitsky
69a2cd85f6SMaxim Levitsky    # test case shutdown
70a2cd85f6SMaxim Levitsky    def tearDown(self):
71a2cd85f6SMaxim Levitsky        # stop the VM
72a2cd85f6SMaxim Levitsky        self.vm1.shutdown()
73a2cd85f6SMaxim Levitsky        self.vm2.shutdown()
74a2cd85f6SMaxim Levitsky
75a2cd85f6SMaxim Levitsky    ###########################################################################
76a2cd85f6SMaxim Levitsky    # create the encrypted block device using qemu-img
77a2cd85f6SMaxim Levitsky    def createImg(self, file, secret):
78a2cd85f6SMaxim Levitsky
794cf661f2SJohn Snow        iotests.qemu_img(
80a2cd85f6SMaxim Levitsky            'create',
81a2cd85f6SMaxim Levitsky            '--object', *secret.to_cmdline_object(),
82a2cd85f6SMaxim Levitsky            '-f', iotests.imgfmt,
83a2cd85f6SMaxim Levitsky            '-o', 'key-secret=' + secret.id(),
84a2cd85f6SMaxim Levitsky            '-o', 'iter-time=10',
85a2cd85f6SMaxim Levitsky            file,
86a2cd85f6SMaxim Levitsky            '1M')
874cf661f2SJohn Snow        iotests.log('')
88a2cd85f6SMaxim Levitsky
89a2cd85f6SMaxim Levitsky    # attempts to add a key using qemu-img
90a2cd85f6SMaxim Levitsky    def addKey(self, file, secret, new_secret):
91a2cd85f6SMaxim Levitsky
92a2cd85f6SMaxim Levitsky        image_options = {
93a2cd85f6SMaxim Levitsky            'key-secret' : secret.id(),
94a2cd85f6SMaxim Levitsky            'driver' : iotests.imgfmt,
95a2cd85f6SMaxim Levitsky            'file' : {
96a2cd85f6SMaxim Levitsky                'driver':'file',
97a2cd85f6SMaxim Levitsky                'filename': file,
98a2cd85f6SMaxim Levitsky                }
99a2cd85f6SMaxim Levitsky            }
100a2cd85f6SMaxim Levitsky
1014cf661f2SJohn Snow        output = iotests.qemu_img(
102a2cd85f6SMaxim Levitsky            'amend',
103a2cd85f6SMaxim Levitsky            '--object', *secret.to_cmdline_object(),
104a2cd85f6SMaxim Levitsky            '--object', *new_secret.to_cmdline_object(),
105a2cd85f6SMaxim Levitsky
106a2cd85f6SMaxim Levitsky            '-o', 'state=active',
107a2cd85f6SMaxim Levitsky            '-o', 'new-secret=' + new_secret.id(),
108a2cd85f6SMaxim Levitsky            '-o', 'iter-time=10',
109a2cd85f6SMaxim Levitsky
1104cf661f2SJohn Snow            "json:" + json.dumps(image_options),
1114cf661f2SJohn Snow            check=False  # Expected to fail. Log output.
1124cf661f2SJohn Snow        ).stdout
113a2cd85f6SMaxim Levitsky
114a2cd85f6SMaxim Levitsky        iotests.log(output, filters=[iotests.filter_test_dir])
115a2cd85f6SMaxim Levitsky
116a2cd85f6SMaxim Levitsky    ###########################################################################
117a2cd85f6SMaxim Levitsky    # open an encrypted block device
118a2cd85f6SMaxim Levitsky    def openImageQmp(self, vm, id, file, secret,
119a2cd85f6SMaxim Levitsky                     readOnly = False, reOpen = False):
120a2cd85f6SMaxim Levitsky
121e60edf69SAlberto Garcia        command = 'blockdev-reopen' if reOpen else 'blockdev-add'
122a2cd85f6SMaxim Levitsky
1233908b7a8SAlberto Garcia        opts = {
124a2cd85f6SMaxim Levitsky                'driver': iotests.imgfmt,
125a2cd85f6SMaxim Levitsky                'node-name': id,
126a2cd85f6SMaxim Levitsky                'read-only': readOnly,
127a2cd85f6SMaxim Levitsky                'key-secret' : secret.id(),
128a2cd85f6SMaxim Levitsky                'file': {
129a2cd85f6SMaxim Levitsky                    'driver': 'file',
130a2cd85f6SMaxim Levitsky                    'filename': test_img,
131a2cd85f6SMaxim Levitsky                }
132a2cd85f6SMaxim Levitsky            }
1333908b7a8SAlberto Garcia
1343908b7a8SAlberto Garcia        if reOpen:
1353908b7a8SAlberto Garcia            result = vm.qmp(command, options=[opts])
136d24eb059SVladimir Sementsov-Ogievskiy            self.assert_qmp(result, 'return', {})
1373908b7a8SAlberto Garcia        else:
138*c5339030SVladimir Sementsov-Ogievskiy            result = vm.qmp(command, opts)
139a2cd85f6SMaxim Levitsky            self.assert_qmp(result, 'return', {})
140a2cd85f6SMaxim Levitsky
1410fca43deSMaxim Levitsky
1420fca43deSMaxim Levitsky    ###########################################################################
1430fca43deSMaxim Levitsky    # add virtio-blk consumer for a block device
1440fca43deSMaxim Levitsky    def addImageUser(self, vm, id, disk_id, share_rw=False):
145*c5339030SVladimir Sementsov-Ogievskiy        result = vm.qmp('device_add', {
1460fca43deSMaxim Levitsky                'driver': 'virtio-blk',
1470fca43deSMaxim Levitsky                'id': id,
1480fca43deSMaxim Levitsky                'drive': disk_id,
1490fca43deSMaxim Levitsky                'share-rw' : share_rw
1500fca43deSMaxim Levitsky            }
1510fca43deSMaxim Levitsky        )
1520fca43deSMaxim Levitsky
1530fca43deSMaxim Levitsky        iotests.log(result)
1540fca43deSMaxim Levitsky
155a2cd85f6SMaxim Levitsky    # close the encrypted block device
156a2cd85f6SMaxim Levitsky    def closeImageQmp(self, vm, id):
157*c5339030SVladimir Sementsov-Ogievskiy        result = vm.qmp('blockdev-del', {'node-name': id})
158a2cd85f6SMaxim Levitsky        self.assert_qmp(result, 'return', {})
159a2cd85f6SMaxim Levitsky
160a2cd85f6SMaxim Levitsky    ###########################################################################
161a2cd85f6SMaxim Levitsky
162a2cd85f6SMaxim Levitsky    # add a key to an encrypted block device
163a2cd85f6SMaxim Levitsky    def addKeyQmp(self, vm, id, new_secret):
164a2cd85f6SMaxim Levitsky
165a2cd85f6SMaxim Levitsky        args = {
166a2cd85f6SMaxim Levitsky            'node-name': id,
167a2cd85f6SMaxim Levitsky            'job-id' : 'job0',
168a2cd85f6SMaxim Levitsky            'options' : {
169a2cd85f6SMaxim Levitsky                'state'     : 'active',
170a2cd85f6SMaxim Levitsky                'driver'    : iotests.imgfmt,
171a2cd85f6SMaxim Levitsky                'new-secret': new_secret.id(),
172a2cd85f6SMaxim Levitsky                'iter-time' : 10
173a2cd85f6SMaxim Levitsky            },
174a2cd85f6SMaxim Levitsky        }
175a2cd85f6SMaxim Levitsky
176*c5339030SVladimir Sementsov-Ogievskiy        result = vm.qmp('x-blockdev-amend', args)
177c1019d16SEmanuele Giuseppe Esposito        iotests.log(result)
178c1019d16SEmanuele Giuseppe Esposito        # Run the job only if it was created
179c1019d16SEmanuele Giuseppe Esposito        event = ('JOB_STATUS_CHANGE',
180c1019d16SEmanuele Giuseppe Esposito                 {'data': {'id': 'job0', 'status': 'created'}})
181c1019d16SEmanuele Giuseppe Esposito        if vm.events_wait([event], timeout=0.0) is not None:
182a2cd85f6SMaxim Levitsky            vm.run_job('job0')
183a2cd85f6SMaxim Levitsky
184a2cd85f6SMaxim Levitsky    # test that when the image opened by two qemu processes,
1850fca43deSMaxim Levitsky    # neither of them can update the encryption keys
186a2cd85f6SMaxim Levitsky    def test1(self):
187a2cd85f6SMaxim Levitsky        self.createImg(test_img, self.secrets[0]);
188a2cd85f6SMaxim Levitsky
189a2cd85f6SMaxim Levitsky        # VM1 opens the image and adds a key
190a2cd85f6SMaxim Levitsky        self.openImageQmp(self.vm1, "testdev", test_img, self.secrets[0])
191a2cd85f6SMaxim Levitsky        self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[1])
192a2cd85f6SMaxim Levitsky
193a2cd85f6SMaxim Levitsky
194a2cd85f6SMaxim Levitsky        # VM2 opens the image
195a2cd85f6SMaxim Levitsky        self.openImageQmp(self.vm2, "testdev", test_img, self.secrets[0])
196a2cd85f6SMaxim Levitsky
197a2cd85f6SMaxim Levitsky
198a2cd85f6SMaxim Levitsky        # neither VMs now should be able to add a key
199a2cd85f6SMaxim Levitsky        self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[2])
200a2cd85f6SMaxim Levitsky        self.addKeyQmp(self.vm2, "testdev", new_secret = self.secrets[2])
201a2cd85f6SMaxim Levitsky
202a2cd85f6SMaxim Levitsky
203a2cd85f6SMaxim Levitsky        # VM 1 closes the image
204a2cd85f6SMaxim Levitsky        self.closeImageQmp(self.vm1, "testdev")
205a2cd85f6SMaxim Levitsky
206a2cd85f6SMaxim Levitsky
207a2cd85f6SMaxim Levitsky        # now VM2 can add the key
208a2cd85f6SMaxim Levitsky        self.addKeyQmp(self.vm2, "testdev", new_secret = self.secrets[2])
209a2cd85f6SMaxim Levitsky
210a2cd85f6SMaxim Levitsky
211a2cd85f6SMaxim Levitsky        # qemu-img should also not be able to add a key
212a2cd85f6SMaxim Levitsky        self.addKey(test_img, self.secrets[0], self.secrets[2])
213a2cd85f6SMaxim Levitsky
214a2cd85f6SMaxim Levitsky        # cleanup
215a2cd85f6SMaxim Levitsky        self.closeImageQmp(self.vm2, "testdev")
216a2cd85f6SMaxim Levitsky        os.remove(test_img)
217a2cd85f6SMaxim Levitsky
218a2cd85f6SMaxim Levitsky
2190fca43deSMaxim Levitsky    # test that when the image opened by two qemu processes,
2200fca43deSMaxim Levitsky    # even if first VM opens it read-only, the second can't update encryption
2210fca43deSMaxim Levitsky    # keys
222a2cd85f6SMaxim Levitsky    def test2(self):
223a2cd85f6SMaxim Levitsky        self.createImg(test_img, self.secrets[0]);
224a2cd85f6SMaxim Levitsky
225a2cd85f6SMaxim Levitsky        # VM1 opens the image readonly
226a2cd85f6SMaxim Levitsky        self.openImageQmp(self.vm1, "testdev", test_img, self.secrets[0],
227a2cd85f6SMaxim Levitsky                          readOnly = True)
228a2cd85f6SMaxim Levitsky
229a2cd85f6SMaxim Levitsky        # VM2 opens the image
230a2cd85f6SMaxim Levitsky        self.openImageQmp(self.vm2, "testdev", test_img, self.secrets[0])
231a2cd85f6SMaxim Levitsky
232a2cd85f6SMaxim Levitsky        # VM1 can't add a key since image is readonly
233a2cd85f6SMaxim Levitsky        self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[2])
234a2cd85f6SMaxim Levitsky
235a2cd85f6SMaxim Levitsky        # VM2 can't add a key since VM is has the image opened
236a2cd85f6SMaxim Levitsky        self.addKeyQmp(self.vm2, "testdev", new_secret = self.secrets[2])
237a2cd85f6SMaxim Levitsky
238a2cd85f6SMaxim Levitsky
239a2cd85f6SMaxim Levitsky        #VM1 reopens the image read-write
240a2cd85f6SMaxim Levitsky        self.openImageQmp(self.vm1, "testdev", test_img, self.secrets[0],
241a2cd85f6SMaxim Levitsky                          reOpen = True, readOnly = False)
242a2cd85f6SMaxim Levitsky
243a2cd85f6SMaxim Levitsky        # VM1 still can't add the key
244a2cd85f6SMaxim Levitsky        self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[2])
245a2cd85f6SMaxim Levitsky
246a2cd85f6SMaxim Levitsky        # VM2 gets away
247a2cd85f6SMaxim Levitsky        self.closeImageQmp(self.vm2, "testdev")
248a2cd85f6SMaxim Levitsky
249a2cd85f6SMaxim Levitsky        # VM1 now can add the key
250a2cd85f6SMaxim Levitsky        self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[2])
251a2cd85f6SMaxim Levitsky
252a2cd85f6SMaxim Levitsky        self.closeImageQmp(self.vm1, "testdev")
253a2cd85f6SMaxim Levitsky        os.remove(test_img)
254a2cd85f6SMaxim Levitsky
2550fca43deSMaxim Levitsky    # test that two VMs can't open the same luks image by default
2560fca43deSMaxim Levitsky    # and attach it to a guest device
2570fca43deSMaxim Levitsky    def test3(self):
2580fca43deSMaxim Levitsky        self.createImg(test_img, self.secrets[0]);
2590fca43deSMaxim Levitsky
2600fca43deSMaxim Levitsky        self.openImageQmp(self.vm1, "testdev", test_img, self.secrets[0])
2610fca43deSMaxim Levitsky        self.addImageUser(self.vm1, "testctrl", "testdev")
2620fca43deSMaxim Levitsky
2630fca43deSMaxim Levitsky        self.openImageQmp(self.vm2, "testdev", test_img, self.secrets[0])
2640fca43deSMaxim Levitsky        self.addImageUser(self.vm2, "testctrl", "testdev")
2650fca43deSMaxim Levitsky
2660fca43deSMaxim Levitsky
2670fca43deSMaxim Levitsky    # test that two VMs can attach the same luks image to a guest device,
2680fca43deSMaxim Levitsky    # if both use share-rw=on
2690fca43deSMaxim Levitsky    def test4(self):
2700fca43deSMaxim Levitsky        self.createImg(test_img, self.secrets[0]);
2710fca43deSMaxim Levitsky
2720fca43deSMaxim Levitsky        self.openImageQmp(self.vm1, "testdev", test_img, self.secrets[0])
2730fca43deSMaxim Levitsky        self.addImageUser(self.vm1, "testctrl", "testdev", share_rw=True)
2740fca43deSMaxim Levitsky
2750fca43deSMaxim Levitsky        self.openImageQmp(self.vm2, "testdev", test_img, self.secrets[0])
2760fca43deSMaxim Levitsky        self.addImageUser(self.vm2, "testctrl", "testdev", share_rw=True)
2770fca43deSMaxim Levitsky
2780fca43deSMaxim Levitsky
279a2cd85f6SMaxim Levitsky
280a2cd85f6SMaxim Levitskyif __name__ == '__main__':
281a2cd85f6SMaxim Levitsky    # support only raw luks since luks encrypted qcow2 is a proper
282a2cd85f6SMaxim Levitsky    # format driver which doesn't allow any sharing
283a2cd85f6SMaxim Levitsky    iotests.activate_logging()
284a2cd85f6SMaxim Levitsky    iotests.main(supported_fmts = ['luks'])
285