iotests: add tests for blockdev-amend
This commit adds two tests that cover the new blockdev-amend functionality of luks and qcow2 driver Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> [mreitz: Let 295 verify that LUKS works; drop 295 and 296 from the auto group] Signed-off-by: Max Reitz <mreitz@redhat.com> Message-Id: <20200625125548.870061-20-mreitz@redhat.com>
This commit is contained in:
parent
8ea1613d91
commit
a2cd85f6ac
280
tests/qemu-iotests/295
Executable file
280
tests/qemu-iotests/295
Executable file
@ -0,0 +1,280 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
#
|
||||||
|
# Test case QMP's encrypted key management
|
||||||
|
#
|
||||||
|
# Copyright (C) 2019 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# This program is free software; you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation; either version 2 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
|
||||||
|
import iotests
|
||||||
|
import os
|
||||||
|
import time
|
||||||
|
import json
|
||||||
|
|
||||||
|
test_img = os.path.join(iotests.test_dir, 'test.img')
|
||||||
|
|
||||||
|
class Secret:
|
||||||
|
def __init__(self, index):
|
||||||
|
self._id = "keysec" + str(index)
|
||||||
|
# you are not supposed to see the password...
|
||||||
|
self._secret = "hunter" + str(index)
|
||||||
|
|
||||||
|
def id(self):
|
||||||
|
return self._id
|
||||||
|
|
||||||
|
def secret(self):
|
||||||
|
return self._secret
|
||||||
|
|
||||||
|
def to_cmdline_object(self):
|
||||||
|
return [ "secret,id=" + self._id + ",data=" + self._secret]
|
||||||
|
|
||||||
|
def to_qmp_object(self):
|
||||||
|
return { "qom_type" : "secret", "id": self.id(),
|
||||||
|
"props": { "data": self.secret() } }
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
class EncryptionSetupTestCase(iotests.QMPTestCase):
|
||||||
|
|
||||||
|
# test case startup
|
||||||
|
def setUp(self):
|
||||||
|
# start the VM
|
||||||
|
self.vm = iotests.VM()
|
||||||
|
self.vm.launch()
|
||||||
|
|
||||||
|
# create the secrets and load 'em into the VM
|
||||||
|
self.secrets = [ Secret(i) for i in range(0, 6) ]
|
||||||
|
for secret in self.secrets:
|
||||||
|
result = self.vm.qmp("object-add", **secret.to_qmp_object())
|
||||||
|
self.assert_qmp(result, 'return', {})
|
||||||
|
|
||||||
|
if iotests.imgfmt == "qcow2":
|
||||||
|
self.pfx = "encrypt."
|
||||||
|
self.img_opts = [ '-o', "encrypt.format=luks" ]
|
||||||
|
else:
|
||||||
|
self.pfx = ""
|
||||||
|
self.img_opts = []
|
||||||
|
|
||||||
|
# test case shutdown
|
||||||
|
def tearDown(self):
|
||||||
|
# stop the VM
|
||||||
|
self.vm.shutdown()
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
# create the encrypted block device
|
||||||
|
def createImg(self, file, secret):
|
||||||
|
|
||||||
|
iotests.qemu_img(
|
||||||
|
'create',
|
||||||
|
'--object', *secret.to_cmdline_object(),
|
||||||
|
'-f', iotests.imgfmt,
|
||||||
|
'-o', self.pfx + 'key-secret=' + secret.id(),
|
||||||
|
'-o', self.pfx + 'iter-time=10',
|
||||||
|
*self.img_opts,
|
||||||
|
file,
|
||||||
|
'1M')
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
# open an encrypted block device
|
||||||
|
def openImageQmp(self, id, file, secret, read_only = False):
|
||||||
|
|
||||||
|
encrypt_options = {
|
||||||
|
'key-secret' : secret.id()
|
||||||
|
}
|
||||||
|
|
||||||
|
if iotests.imgfmt == "qcow2":
|
||||||
|
encrypt_options = {
|
||||||
|
'encrypt': {
|
||||||
|
'format':'luks',
|
||||||
|
**encrypt_options
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
result = self.vm.qmp('blockdev-add', **
|
||||||
|
{
|
||||||
|
'driver': iotests.imgfmt,
|
||||||
|
'node-name': id,
|
||||||
|
'read-only': read_only,
|
||||||
|
|
||||||
|
**encrypt_options,
|
||||||
|
|
||||||
|
'file': {
|
||||||
|
'driver': 'file',
|
||||||
|
'filename': test_img,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
)
|
||||||
|
self.assert_qmp(result, 'return', {})
|
||||||
|
|
||||||
|
# close the encrypted block device
|
||||||
|
def closeImageQmp(self, id):
|
||||||
|
result = self.vm.qmp('blockdev-del', **{ 'node-name': id })
|
||||||
|
self.assert_qmp(result, 'return', {})
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
# add a key to an encrypted block device
|
||||||
|
def addKeyQmp(self, id, new_secret, secret = None,
|
||||||
|
slot = None, force = False):
|
||||||
|
|
||||||
|
crypt_options = {
|
||||||
|
'state' : 'active',
|
||||||
|
'new-secret' : new_secret.id(),
|
||||||
|
'iter-time' : 10
|
||||||
|
}
|
||||||
|
|
||||||
|
if slot != None:
|
||||||
|
crypt_options['keyslot'] = slot
|
||||||
|
|
||||||
|
|
||||||
|
if secret != None:
|
||||||
|
crypt_options['secret'] = secret.id()
|
||||||
|
|
||||||
|
if iotests.imgfmt == "qcow2":
|
||||||
|
crypt_options['format'] = 'luks'
|
||||||
|
crypt_options = {
|
||||||
|
'encrypt': crypt_options
|
||||||
|
}
|
||||||
|
|
||||||
|
args = {
|
||||||
|
'node-name': id,
|
||||||
|
'job-id' : 'job_add_key',
|
||||||
|
'options' : {
|
||||||
|
'driver' : iotests.imgfmt,
|
||||||
|
**crypt_options
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
if force == True:
|
||||||
|
args['force'] = True
|
||||||
|
|
||||||
|
#TODO: check what jobs return
|
||||||
|
result = self.vm.qmp('x-blockdev-amend', **args)
|
||||||
|
assert result['return'] == {}
|
||||||
|
self.vm.run_job('job_add_key')
|
||||||
|
|
||||||
|
# erase a key from an encrypted block device
|
||||||
|
def eraseKeyQmp(self, id, old_secret = None, slot = None, force = False):
|
||||||
|
|
||||||
|
crypt_options = {
|
||||||
|
'state' : 'inactive',
|
||||||
|
}
|
||||||
|
|
||||||
|
if slot != None:
|
||||||
|
crypt_options['keyslot'] = slot
|
||||||
|
if old_secret != None:
|
||||||
|
crypt_options['old-secret'] = old_secret.id()
|
||||||
|
|
||||||
|
if iotests.imgfmt == "qcow2":
|
||||||
|
crypt_options['format'] = 'luks'
|
||||||
|
crypt_options = {
|
||||||
|
'encrypt': crypt_options
|
||||||
|
}
|
||||||
|
|
||||||
|
args = {
|
||||||
|
'node-name': id,
|
||||||
|
'job-id' : 'job_erase_key',
|
||||||
|
'options' : {
|
||||||
|
'driver' : iotests.imgfmt,
|
||||||
|
**crypt_options
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
if force == True:
|
||||||
|
args['force'] = True
|
||||||
|
|
||||||
|
result = self.vm.qmp('x-blockdev-amend', **args)
|
||||||
|
assert result['return'] == {}
|
||||||
|
self.vm.run_job('job_erase_key')
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
# create image, and change its key
|
||||||
|
def testChangeKey(self):
|
||||||
|
|
||||||
|
# create the image with secret0 and open it
|
||||||
|
self.createImg(test_img, self.secrets[0]);
|
||||||
|
self.openImageQmp("testdev", test_img, self.secrets[0])
|
||||||
|
|
||||||
|
# add key to slot 1
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[1])
|
||||||
|
|
||||||
|
# add key to slot 5
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[2], slot=5)
|
||||||
|
|
||||||
|
# erase key from slot 0
|
||||||
|
self.eraseKeyQmp("testdev", old_secret = self.secrets[0])
|
||||||
|
|
||||||
|
#reopen the image with secret1
|
||||||
|
self.closeImageQmp("testdev")
|
||||||
|
self.openImageQmp("testdev", test_img, self.secrets[1])
|
||||||
|
|
||||||
|
# close and erase the image for good
|
||||||
|
self.closeImageQmp("testdev")
|
||||||
|
os.remove(test_img)
|
||||||
|
|
||||||
|
# test that if we erase the old password,
|
||||||
|
# we can still change the encryption keys using 'old-secret'
|
||||||
|
def testOldPassword(self):
|
||||||
|
|
||||||
|
# create the image with secret0 and open it
|
||||||
|
self.createImg(test_img, self.secrets[0]);
|
||||||
|
self.openImageQmp("testdev", test_img, self.secrets[0])
|
||||||
|
|
||||||
|
# add key to slot 1
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[1])
|
||||||
|
|
||||||
|
# erase key from slot 0
|
||||||
|
self.eraseKeyQmp("testdev", old_secret = self.secrets[0])
|
||||||
|
|
||||||
|
# this will fail as the old password is no longer valid
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[2])
|
||||||
|
|
||||||
|
# this will work
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[2], secret = self.secrets[1])
|
||||||
|
|
||||||
|
# close and erase the image for good
|
||||||
|
self.closeImageQmp("testdev")
|
||||||
|
os.remove(test_img)
|
||||||
|
|
||||||
|
def testUseForceLuke(self):
|
||||||
|
|
||||||
|
self.createImg(test_img, self.secrets[0]);
|
||||||
|
self.openImageQmp("testdev", test_img, self.secrets[0])
|
||||||
|
|
||||||
|
# Add bunch of secrets
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[1], slot=4)
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[4], slot=2)
|
||||||
|
|
||||||
|
# overwrite an active secret
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[5], slot=2)
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[5], slot=2, force=True)
|
||||||
|
|
||||||
|
self.addKeyQmp("testdev", new_secret = self.secrets[0])
|
||||||
|
|
||||||
|
# Now erase all the secrets
|
||||||
|
self.eraseKeyQmp("testdev", old_secret = self.secrets[5])
|
||||||
|
self.eraseKeyQmp("testdev", slot=4)
|
||||||
|
|
||||||
|
# erase last keyslot
|
||||||
|
self.eraseKeyQmp("testdev", old_secret = self.secrets[0])
|
||||||
|
self.eraseKeyQmp("testdev", old_secret = self.secrets[0], force=True)
|
||||||
|
|
||||||
|
self.closeImageQmp("testdev")
|
||||||
|
os.remove(test_img)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
iotests.verify_working_luks()
|
||||||
|
# Encrypted formats support
|
||||||
|
iotests.activate_logging()
|
||||||
|
iotests.main(supported_fmts = ['qcow2', 'luks'])
|
40
tests/qemu-iotests/295.out
Normal file
40
tests/qemu-iotests/295.out
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_erase_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_erase_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
Job failed: Invalid password, cannot unlock any keyslot
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
Job failed: Refusing to overwrite active keyslot 2 - please erase it first
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_add_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_erase_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_erase_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
Job failed: All the active keyslots match the (old) password that was given and erasing them will erase all the data in the image irreversibly - refusing operation
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_erase_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job_erase_key"}}
|
||||||
|
{"return": {}}
|
||||||
|
...
|
||||||
|
----------------------------------------------------------------------
|
||||||
|
Ran 3 tests
|
||||||
|
|
||||||
|
OK
|
234
tests/qemu-iotests/296
Executable file
234
tests/qemu-iotests/296
Executable file
@ -0,0 +1,234 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
#
|
||||||
|
# Test case for encryption key management versus image sharing
|
||||||
|
#
|
||||||
|
# Copyright (C) 2019 Red Hat, Inc.
|
||||||
|
#
|
||||||
|
# This program is free software; you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation; either version 2 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
|
||||||
|
import iotests
|
||||||
|
import os
|
||||||
|
import time
|
||||||
|
import json
|
||||||
|
|
||||||
|
test_img = os.path.join(iotests.test_dir, 'test.img')
|
||||||
|
|
||||||
|
class Secret:
|
||||||
|
def __init__(self, index):
|
||||||
|
self._id = "keysec" + str(index)
|
||||||
|
# you are not supposed to see the password...
|
||||||
|
self._secret = "hunter" + str(index)
|
||||||
|
|
||||||
|
def id(self):
|
||||||
|
return self._id
|
||||||
|
|
||||||
|
def secret(self):
|
||||||
|
return self._secret
|
||||||
|
|
||||||
|
def to_cmdline_object(self):
|
||||||
|
return [ "secret,id=" + self._id + ",data=" + self._secret]
|
||||||
|
|
||||||
|
def to_qmp_object(self):
|
||||||
|
return { "qom_type" : "secret", "id": self.id(),
|
||||||
|
"props": { "data": self.secret() } }
|
||||||
|
|
||||||
|
################################################################################
|
||||||
|
|
||||||
|
class EncryptionSetupTestCase(iotests.QMPTestCase):
|
||||||
|
|
||||||
|
# test case startup
|
||||||
|
def setUp(self):
|
||||||
|
|
||||||
|
# start the VMs
|
||||||
|
self.vm1 = iotests.VM(path_suffix = 'VM1')
|
||||||
|
self.vm2 = iotests.VM(path_suffix = 'VM2')
|
||||||
|
self.vm1.launch()
|
||||||
|
self.vm2.launch()
|
||||||
|
|
||||||
|
# create the secrets and load 'em into the VMs
|
||||||
|
self.secrets = [ Secret(i) for i in range(0, 4) ]
|
||||||
|
for secret in self.secrets:
|
||||||
|
result = self.vm1.qmp("object-add", **secret.to_qmp_object())
|
||||||
|
self.assert_qmp(result, 'return', {})
|
||||||
|
result = self.vm2.qmp("object-add", **secret.to_qmp_object())
|
||||||
|
self.assert_qmp(result, 'return', {})
|
||||||
|
|
||||||
|
# test case shutdown
|
||||||
|
def tearDown(self):
|
||||||
|
# stop the VM
|
||||||
|
self.vm1.shutdown()
|
||||||
|
self.vm2.shutdown()
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
# create the encrypted block device using qemu-img
|
||||||
|
def createImg(self, file, secret):
|
||||||
|
|
||||||
|
output = iotests.qemu_img_pipe(
|
||||||
|
'create',
|
||||||
|
'--object', *secret.to_cmdline_object(),
|
||||||
|
'-f', iotests.imgfmt,
|
||||||
|
'-o', 'key-secret=' + secret.id(),
|
||||||
|
'-o', 'iter-time=10',
|
||||||
|
file,
|
||||||
|
'1M')
|
||||||
|
|
||||||
|
iotests.log(output, filters=[iotests.filter_test_dir])
|
||||||
|
|
||||||
|
# attempts to add a key using qemu-img
|
||||||
|
def addKey(self, file, secret, new_secret):
|
||||||
|
|
||||||
|
image_options = {
|
||||||
|
'key-secret' : secret.id(),
|
||||||
|
'driver' : iotests.imgfmt,
|
||||||
|
'file' : {
|
||||||
|
'driver':'file',
|
||||||
|
'filename': file,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
output = iotests.qemu_img_pipe(
|
||||||
|
'amend',
|
||||||
|
'--object', *secret.to_cmdline_object(),
|
||||||
|
'--object', *new_secret.to_cmdline_object(),
|
||||||
|
|
||||||
|
'-o', 'state=active',
|
||||||
|
'-o', 'new-secret=' + new_secret.id(),
|
||||||
|
'-o', 'iter-time=10',
|
||||||
|
|
||||||
|
"json:" + json.dumps(image_options)
|
||||||
|
)
|
||||||
|
|
||||||
|
iotests.log(output, filters=[iotests.filter_test_dir])
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
# open an encrypted block device
|
||||||
|
def openImageQmp(self, vm, id, file, secret,
|
||||||
|
readOnly = False, reOpen = False):
|
||||||
|
|
||||||
|
command = 'x-blockdev-reopen' if reOpen else 'blockdev-add'
|
||||||
|
|
||||||
|
result = vm.qmp(command, **
|
||||||
|
{
|
||||||
|
'driver': iotests.imgfmt,
|
||||||
|
'node-name': id,
|
||||||
|
'read-only': readOnly,
|
||||||
|
'key-secret' : secret.id(),
|
||||||
|
'file': {
|
||||||
|
'driver': 'file',
|
||||||
|
'filename': test_img,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
)
|
||||||
|
self.assert_qmp(result, 'return', {})
|
||||||
|
|
||||||
|
# close the encrypted block device
|
||||||
|
def closeImageQmp(self, vm, id):
|
||||||
|
result = vm.qmp('blockdev-del', **{ 'node-name': id })
|
||||||
|
self.assert_qmp(result, 'return', {})
|
||||||
|
|
||||||
|
###########################################################################
|
||||||
|
|
||||||
|
# add a key to an encrypted block device
|
||||||
|
def addKeyQmp(self, vm, id, new_secret):
|
||||||
|
|
||||||
|
args = {
|
||||||
|
'node-name': id,
|
||||||
|
'job-id' : 'job0',
|
||||||
|
'options' : {
|
||||||
|
'state' : 'active',
|
||||||
|
'driver' : iotests.imgfmt,
|
||||||
|
'new-secret': new_secret.id(),
|
||||||
|
'iter-time' : 10
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
result = vm.qmp('x-blockdev-amend', **args)
|
||||||
|
assert result['return'] == {}
|
||||||
|
vm.run_job('job0')
|
||||||
|
|
||||||
|
# test that when the image opened by two qemu processes,
|
||||||
|
# neither of them can update the image
|
||||||
|
def test1(self):
|
||||||
|
self.createImg(test_img, self.secrets[0]);
|
||||||
|
|
||||||
|
# VM1 opens the image and adds a key
|
||||||
|
self.openImageQmp(self.vm1, "testdev", test_img, self.secrets[0])
|
||||||
|
self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[1])
|
||||||
|
|
||||||
|
|
||||||
|
# VM2 opens the image
|
||||||
|
self.openImageQmp(self.vm2, "testdev", test_img, self.secrets[0])
|
||||||
|
|
||||||
|
|
||||||
|
# neither VMs now should be able to add a key
|
||||||
|
self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[2])
|
||||||
|
self.addKeyQmp(self.vm2, "testdev", new_secret = self.secrets[2])
|
||||||
|
|
||||||
|
|
||||||
|
# VM 1 closes the image
|
||||||
|
self.closeImageQmp(self.vm1, "testdev")
|
||||||
|
|
||||||
|
|
||||||
|
# now VM2 can add the key
|
||||||
|
self.addKeyQmp(self.vm2, "testdev", new_secret = self.secrets[2])
|
||||||
|
|
||||||
|
|
||||||
|
# qemu-img should also not be able to add a key
|
||||||
|
self.addKey(test_img, self.secrets[0], self.secrets[2])
|
||||||
|
|
||||||
|
# cleanup
|
||||||
|
self.closeImageQmp(self.vm2, "testdev")
|
||||||
|
os.remove(test_img)
|
||||||
|
|
||||||
|
|
||||||
|
def test2(self):
|
||||||
|
self.createImg(test_img, self.secrets[0]);
|
||||||
|
|
||||||
|
# VM1 opens the image readonly
|
||||||
|
self.openImageQmp(self.vm1, "testdev", test_img, self.secrets[0],
|
||||||
|
readOnly = True)
|
||||||
|
|
||||||
|
# VM2 opens the image
|
||||||
|
self.openImageQmp(self.vm2, "testdev", test_img, self.secrets[0])
|
||||||
|
|
||||||
|
# VM1 can't add a key since image is readonly
|
||||||
|
self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[2])
|
||||||
|
|
||||||
|
# VM2 can't add a key since VM is has the image opened
|
||||||
|
self.addKeyQmp(self.vm2, "testdev", new_secret = self.secrets[2])
|
||||||
|
|
||||||
|
|
||||||
|
#VM1 reopens the image read-write
|
||||||
|
self.openImageQmp(self.vm1, "testdev", test_img, self.secrets[0],
|
||||||
|
reOpen = True, readOnly = False)
|
||||||
|
|
||||||
|
# VM1 still can't add the key
|
||||||
|
self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[2])
|
||||||
|
|
||||||
|
# VM2 gets away
|
||||||
|
self.closeImageQmp(self.vm2, "testdev")
|
||||||
|
|
||||||
|
# VM1 now can add the key
|
||||||
|
self.addKeyQmp(self.vm1, "testdev", new_secret = self.secrets[2])
|
||||||
|
|
||||||
|
self.closeImageQmp(self.vm1, "testdev")
|
||||||
|
os.remove(test_img)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
# support only raw luks since luks encrypted qcow2 is a proper
|
||||||
|
# format driver which doesn't allow any sharing
|
||||||
|
iotests.activate_logging()
|
||||||
|
iotests.main(supported_fmts = ['luks'])
|
33
tests/qemu-iotests/296.out
Normal file
33
tests/qemu-iotests/296.out
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
Formatting 'TEST_DIR/test.img', fmt=luks size=1048576 key-secret=keysec0 iter-time=10
|
||||||
|
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job0"}}
|
||||||
|
{"return": {}}
|
||||||
|
Job failed: Failed to get shared "consistent read" lock
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job0"}}
|
||||||
|
{"return": {}}
|
||||||
|
Job failed: Failed to get shared "consistent read" lock
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job0"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job0"}}
|
||||||
|
{"return": {}}
|
||||||
|
qemu-img: Failed to get shared "consistent read" lock
|
||||||
|
Is another process using the image [TEST_DIR/test.img]?
|
||||||
|
|
||||||
|
Formatting 'TEST_DIR/test.img', fmt=luks size=1048576 key-secret=keysec0 iter-time=10
|
||||||
|
|
||||||
|
Job failed: Block node is read-only
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job0"}}
|
||||||
|
{"return": {}}
|
||||||
|
Job failed: Failed to get shared "consistent read" lock
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job0"}}
|
||||||
|
{"return": {}}
|
||||||
|
Job failed: Failed to get shared "consistent read" lock
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job0"}}
|
||||||
|
{"return": {}}
|
||||||
|
{"execute": "job-dismiss", "arguments": {"id": "job0"}}
|
||||||
|
{"return": {}}
|
||||||
|
..
|
||||||
|
----------------------------------------------------------------------
|
||||||
|
Ran 2 tests
|
||||||
|
|
||||||
|
OK
|
@ -303,4 +303,6 @@
|
|||||||
292 rw auto quick
|
292 rw auto quick
|
||||||
293 rw
|
293 rw
|
||||||
294 rw quick
|
294 rw quick
|
||||||
|
295 rw
|
||||||
|
296 rw
|
||||||
297 meta
|
297 meta
|
||||||
|
Loading…
Reference in New Issue
Block a user