Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New test: rpm-ostree-container-luks #1119

Merged
merged 1 commit into from
Apr 15, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
# Default storage configuration with LUKS and lvm type enforced
zerombr
clearpart --all
autopart --encrypted --passphrase=passphrase --type=lvm
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
# Default storage configuration with LUKS
zerombr
clearpart --all
autopart --encrypted --passphrase=passphrase
45 changes: 45 additions & 0 deletions rpm-ostree-container-luks.ks.in
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
#test name: rpm-ostree-container-luks
# for bootc/bootupd, remote and stateroot ostreecontainer options
# depends on the referenced ostree container being bootable

# Use the default settings.
%ksappend common/common_no_storage_and_payload.ks

# Validate on the first boot.
%ksappend validation/success_on_first_boot.ks

# Set up RPM ostree container image as installation payload
ostreecontainer --no-signature-verification --remote=test-remote --stateroot=test-stateroot --url=@KSTEST_OSTREECONTAINER_URL@

# Reboot the installed system.
reboot

# On Fedora enforce lvm scheme (overriding btrfs default)
%ksappend storage/ostreecontainer_autopart_encrypted.ks

%post
# Automatically unlock the encrypted filesystems on boot; code
# borrowed from Anabot's profiles/default/hooks/95-add_luks_key-post.hook
keyfile="/root/keyfile"
echo -n "passphrase" > ${keyfile} # actual passphrase
chmod 0400 ${keyfile}
# modify /etc/crypttab, set key file in the third column of the file
awk -v KEYFILE=${keyfile} '{$3=KEYFILE; print $0}' /etc/crypttab > /tmp/crypttab_mod
mv -Z /tmp/crypttab_mod /etc/crypttab
chmod 0600 /etc/crypttab
kernel_version=$(rpm -q kernel | sed 's/^kernel-//')
initrd_file=$(find /boot -name initramfs-${kernel_version}.img)
dracut -f --tmpdir /tmp -I "${keyfile} /etc/crypttab" ${initrd_file} ${kernel_version}

# Checks after boot
cat >> /var/lib/extensions/kickstart-tests/usr/libexec/kickstart-test.sh << 'EOF'

# propagate any errors from %post validations;
# we only check that the system booted, so the following generic
# snippet is left in place just for potential future purposes
if [ -e /root/RESULT ]; then
cat /root/RESULT
fi

EOF
%end
99 changes: 99 additions & 0 deletions rpm-ostree-container-luks.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,99 @@
#
# Copyright (C) 2023 Red Hat, Inc.
#
# This copyrighted material is made available to anyone wishing to use,
# modify, copy, or redistribute it subject to the terms and conditions of
# the GNU General Public License v.2, or (at your option) any later version.
# This program is distributed in the hope that it will be useful, but WITHOUT
# ANY WARRANTY expressed or implied, including the implied warranties of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
# Public License for more details. You should have received a copy of the
# GNU General Public License along with this program; if not, write to the
# Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
# 02110-1301, USA. Any Red Hat trademarks that are incorporated in the
# source code or documentation are not subject to the GNU General Public
# License and may only be used or replicated with the express permission of
# Red Hat, Inc.
#

# Ignore unused variable parsed out by tooling scripts as test tags metadata
# shellcheck disable=SC2034
TESTTYPE="payload ostree bootc luks reboot skip-on-rhel-8 skip-on-rhel-10"

. ${KSTESTDIR}/functions.sh

copy_interesting_files_from_system() {
local disksdir args luks_partition root_lv
disksdir="${1}"

# Find disks.
args=$(echo "--ro"; for d in ${disksdir}/disk-*img; do echo -a ${d}; done)

# Use also iscsi disks if there are any.
# (this has been just copied over from the original function)
if [[ -n ${iscsi_disk_img} ]]; then
args="${args} -a ${disksdir}/${iscsi_disk_img}"
fi

# Grab files out of the installed system while it still exists.
# Grab these files:
#
# logs from Anaconda - whole /var/log/anaconda/ directory is copied out,
# this can be used for saving specific test output
# original-ks.cfg - the kickstart used for the test
# anaconda-ks.cfg - the kickstart saved after installation, useful for
# debugging
# RESULT - file from the test
#
# The location of aforementioned files is different in an ostree system
#
# Please note that all of the 'passphrase' strings should be retained
# UNINDENTED, because they represent the actual passphrase that is
# read by guestfish from standard input

file_list=(
/ostree/deploy/test-stateroot/var/roothome/original-ks.cfg
/ostree/deploy/test-stateroot/var/roothome/anaconda-ks.cfg
/ostree/deploy/test-stateroot/var/roothome/anabot.log
/ostree/deploy/test-stateroot/var/log/anaconda
/ostree/deploy/test-stateroot/var/roothome/RESULT
)

luks_partition=$(
for p in $(guestfish ${args} launch : list-partitions)
do guestfish ${args} --keys-from-stdin &> /dev/null <<< "
launch
cryptsetup-open ${p} encrypted-lv
passphrase
" && echo ${p} && break
done
)

if [ -z "${luks_partition}" ]; then
echo "Couldn't find LUKS-encrypted partition!"
return 1
fi
root_lv=$(
guestfish ${args} --keys-from-stdin <<< "
launch
cryptsetup-open ${luks_partition} encrypted_lv
passphrase
lvs
" | grep /root
)

guestfish ${args} --keys-from-stdin <<< "
launch
cryptsetup-open ${luks_partition} encrypted_lv
passphrase
lvm-scan true
mount ${root_lv} /
$(for f in "${file_list[@]}"; do echo "-copy-out ${f} ${disksdir}"; done)
"
}

additional_runner_args() {
# Wait for reboot and shutdown of the VM,
# but exit after the specified timeout.
echo "--wait $(get_timeout)"
}
Loading