3 # Copyright (C) 2018-2022 Red Hat Inc.
5 # Redistribution and use in source and binary forms, with or without
6 # modification, are permitted provided that the following conditions are
9 # * Redistributions of source code must retain the above copyright
10 # notice, this list of conditions and the following disclaimer.
12 # * Redistributions in binary form must reproduce the above copyright
13 # notice, this list of conditions and the following disclaimer in the
14 # documentation and/or other materials provided with the distribution.
16 # * Neither the name of Red Hat nor the names of its contributors may be
17 # used to endorse or promote products derived from this software without
18 # specific prior written permission.
20 # THIS SOFTWARE IS PROVIDED BY RED HAT AND CONTRIBUTORS ''AS IS'' AND
21 # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
22 # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
23 # PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RED HAT OR
24 # CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
27 # USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
28 # ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
29 # OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
30 # OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37 requires nbdcopy
--version
38 requires nbdsh
--version
40 requires qemu-img
--version
41 requires bash
-c 'qemu-img --help | grep -- --target-image-opts'
42 requires
hexdump --version
43 requires
$TRUNCATE --version
46 # Test fails on macOS (darwin) because of:
47 # qemu-img: luks-copy-zero1.img: Unsupported cipher mode xts
48 requires_not
test "$(uname)" = "Darwin"
50 encrypt_disk
=luks-copy1.img
51 plain_disk
=luks-copy2.img
53 sock
=$
(mktemp
-u /tmp
/nbdkit-test-sock.XXXXXX
)
54 cleanup_fn
rm -f $encrypt_disk $plain_disk $pid $sock
55 rm -f $encrypt_disk $plain_disk $pid $sock
57 # Create an empty encrypted disk container.
59 # NB: This is complicated because qemu doesn't create an all-zeroes
60 # plaintext disk for some reason when you use create -f luks. It
61 # starts with random plaintext.
63 # https://stackoverflow.com/a/44669936
64 qemu-img create
-f luks \
65 --object secret
,data
=123456,id
=sec0 \
68 $TRUNCATE -s 1M
$plain_disk
69 qemu-img convert
--target-image-opts -n \
70 --object secret
,data
=123456,id
=sec0 \
72 driver
=luks
,file.filename
=$encrypt_disk,key-secret
=sec0
75 # Start nbdkit on the encrypted disk.
76 start_nbdkit
-P $pid -U $sock \
77 file $encrypt_disk --filter=luks passphrase
=123456
78 uri
="nbd+unix:///?socket=$sock"
80 # Copy the whole disk out. It should be empty.
81 nbdcopy
-C 1 "$uri" $plain_disk
83 if [ "$(hexdump -C $plain_disk)" != '00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
86 echo "$0: expected plaintext disk to be empty"
90 # Use nbdsh to overwrite with some known data and check we can read
93 -c 'h.pwrite(b"1"*65536, 0)' \
94 -c 'h.pwrite(b"2"*65536, 128*1024)' \
95 -c 'h.pwrite(b"3"*65536, 900*1024)' \
96 -c 'buf = h.pread(65536, 0)' \
97 -c 'assert buf == b"1"*65536' \
98 -c 'buf = h.pread(65536, 65536)' \
99 -c 'assert buf == bytearray(65536)' \
100 -c 'buf = h.pread(65536, 128*1024)' \
101 -c 'assert buf == b"2"*65536' \
102 -c 'buf = h.pread(65536, 900*1024)' \
103 -c 'assert buf == b"3"*65536' \
106 # Use qemu to copy out the whole disk. Note we called flush() above
107 # so the disk should be synchronised.
108 qemu-img convert
--image-opts \
109 --object secret
,data
=123456,id
=sec0 \
110 driver
=luks
,file.filename
=$encrypt_disk,key-secret
=sec0 \
113 # Check the contents are expected.
114 if [ "$(hexdump -C $plain_disk)" != '00000000 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 31 |1111111111111111|
116 00010000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
118 00020000 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 |2222222222222222|
120 00030000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
122 000e1000 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 33 |3333333333333333|
124 000f1000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
127 echo "$0: unexpected content"