serval-dna/tests/keyring

515 lines
17 KiB
Plaintext
Raw Normal View History

#!/bin/bash
# Tests for Serval keyring
#
# Copyright 2012-2013 Serval Project, Inc.
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
source "${0%/*}/../testframework.sh"
source "${0%/*}/../testdefs.sh"
shopt -s extglob
setup() {
setup_servald
setup_instances +A
set_instance +A
}
2013-10-24 02:01:35 +00:00
teardown_servald() {
kill_all_servald_processes
assert_no_servald_processes
report_servald_server
}
setup_instances() {
for arg; do
set_instance $arg
executeOk_servald config \
set log.console.level debug \
set debug.keyring on
executeOk_servald keyring list
assert_keyring_list 0
done
}
assert_keyring_list() {
unpack_stdout_list X
assert --stdout --stderr [ $XNROWS -eq $1 ]
assertStdoutGrep --stderr --matches=$1 "^[0-9a-fA-F]\{64\}:[0-9*#+]*:.*\$"
tfw_cat --stdout
}
doc_KeyringCreate="Create keyring destroys existing keys"
test_KeyringCreate() {
executeOk_servald keyring add ''
executeOk_servald keyring add ''
executeOk_servald keyring list
assert_keyring_list 2
executeOk_servald keyring create
assert_keyring_list 0
}
2013-10-16 02:51:03 +00:00
doc_DidName="Create an identity & set the name and number"
test_DidName() {
executeOk_servald keyring add ''
assertStdoutGrep --matches=1 "^sid:"
assertStdoutLineCount '==' 1
extract_stdout_keyvalue SID sid "$rexp_sid"
executeOk_servald keyring set did "$SID" '123456' 'Display Name'
assertStdoutGrep --matches=1 "^sid:$SID\$"
assertStdoutGrep --matches=1 "^did:123456\$"
assertStdoutGrep --matches=1 "^name:Display Name\$"
assertStdoutLineCount '==' 3
executeOk_servald keyring list
assertStdoutGrep --stderr --matches=1 "^$SID:123456:Display Name\$"
}
2013-10-24 02:01:35 +00:00
keyring_set_tag() {
executeOk_servald keyring set tag "$1" "$2" "$3"
assertStdoutGrep --matches=1 "^sid:$1\$"
assertStdoutGrep --matches=1 "^$2:$3\$"
}
doc_SetTag="Set a named tag against an identity"
test_SetTag() {
executeOk_servald keyring add ''
assertStdoutGrep --matches=1 "^sid:"
assertStdoutLineCount '==' 1
extract_stdout_keyvalue SID sid "$rexp_sid"
2013-10-24 02:01:35 +00:00
keyring_set_tag "$SID" 'tag1' 'First Value'
assertStdoutLineCount '==' 2
2013-10-24 02:01:35 +00:00
keyring_set_tag "$SID" 'tag2' 'Second Value'
executeOk_servald keyring set tag "$SID" 'tag2' 'Second Value'
assertStdoutGrep --matches=1 "^tag1:First Value\$"
assertStdoutLineCount '==' 3
2013-10-24 02:01:35 +00:00
keyring_set_tag "$SID" 'tag1' 'Third Value'
assertStdoutGrep --matches=1 "^tag2:Second Value\$"
assertStdoutLineCount '==' 3
executeOk_servald keyring dump --secret
tfw_cat --stdout
}
doc_Pinless="No keyring PIN with PIN-less identities"
test_Pinless() {
executeOk_servald keyring add ''
executeOk_servald keyring list
assert_keyring_list 1
executeOk_servald keyring add ''
executeOk_servald keyring list
assert_keyring_list 2
executeOk_servald keyring add ''
executeOk_servald keyring list
assert_keyring_list 3
}
doc_IdentityPins="No keyring PIN with identity PINs"
test_IdentityPins() {
executeOk_servald keyring add 'one'
executeOk_servald keyring list
assert_keyring_list 0
executeOk_servald keyring list --entry-pin 'one'
assert_keyring_list 1
executeOk_servald keyring add 'two'
executeOk_servald keyring list
assert_keyring_list 0
executeOk_servald keyring list --entry-pin 'one'
assert_keyring_list 1
executeOk_servald keyring list --entry-pin 'one' --entry-pin 'two'
assert_keyring_list 2
executeOk_servald keyring add 'three'
executeOk_servald keyring list
assert_keyring_list 0
executeOk_servald keyring list --entry-pin 'one'
assert_keyring_list 1
executeOk_servald keyring list --entry-pin 'one' --entry-pin 'two'
assert_keyring_list 2
executeOk_servald keyring list --entry-pin 'one' --entry-pin 'two' --entry-pin 'three'
assert_keyring_list 3
executeOk_servald keyring list --entry-pin 'two' --entry-pin 'three'
assert_keyring_list 2
executeOk_servald keyring list --entry-pin 'three'
assert_keyring_list 1
}
doc_KeyringPinIdentityPinless="Keyring PIN with PIN-less identities"
test_KeyringPinIdentityPinless() {
executeOk_servald keyring add --keyring-pin=hello ''
executeOk_servald keyring list --keyring-pin=hello
assert_keyring_list 1
executeOk_servald keyring add --keyring-pin=hello ''
executeOk_servald keyring list --keyring-pin=hello
assert_keyring_list 2
executeOk_servald keyring add --keyring-pin=hello ''
executeOk_servald keyring list --keyring-pin=hello
assert_keyring_list 3
executeOk_servald keyring list
assert_keyring_list 0
}
2013-04-29 06:30:17 +00:00
doc_KeyringPinIdentityPin="Keyring PIN with identity PINs"
test_KeyringPinIdentityPin() {
executeOk_servald keyring add --keyring-pin=yellow 'duck'
executeOk_servald keyring add --keyring-pin=yellow 'chicken'
executeOk_servald keyring list
assert_keyring_list 0
executeOk_servald keyring list --keyring-pin=yellow
assert_keyring_list 0
executeOk_servald keyring list --keyring-pin=yellow --entry-pin=duck
assert_keyring_list 1
executeOk_servald keyring list --keyring-pin=yellow --entry-pin=chicken
assert_keyring_list 1
executeOk_servald keyring list --keyring-pin=yellow --entry-pin=duck --entry-pin=chicken
assert_keyring_list 2
executeOk_servald keyring list --entry-pin=duck --entry-pin=chicken
assert_keyring_list 0
}
doc_KeyringAutoCreate="Starting a server with no keyring creates a valid identity"
test_KeyringAutoCreate() {
2013-03-06 04:59:27 +00:00
start_servald_server
2013-03-06 03:45:27 +00:00
executeOk_servald keyring list
assert_keyring_list 1
}
finally_KeyringAutoCreate() {
stop_servald_server
}
teardown_KeyringAutoCreate() {
2013-10-24 02:01:35 +00:00
teardown_servald
}
doc_KeyringPinServer="Start daemon with a keyring PIN"
setup_KeyringPinServer() {
setup
create_single_identity --keyring-pin=yellow
}
test_KeyringPinServer() {
start_servald_server --keyring-pin=yellow
executeOk_servald id self
unpack_stdout_list X
assert --stdout --stderr [ $XNROWS -eq 1 ]
assert --stdout --stderr [ ${XSID[0]} = $SIDA ]
}
finally_KeyringPinServer() {
stop_servald_server
}
teardown_KeyringPinServer() {
2013-10-24 02:01:35 +00:00
teardown_servald
}
doc_EntryPinServer="Start daemon with an entry PIN"
setup_EntryPinServer() {
setup
create_single_identity --entry-pin=yodel
}
test_EntryPinServer() {
start_servald_server --entry-pin=yodel
executeOk_servald id self
unpack_stdout_list X
assert --stdout --stderr [ $XNROWS -eq 1 ]
assert --stdout --stderr [ ${XSID[0]} = $SIDA ]
}
2014-02-17 06:43:58 +00:00
finally_EntryPinServer() {
stop_servald_server
}
2014-02-17 06:43:58 +00:00
teardown_EntryPinServer() {
2013-10-24 02:01:35 +00:00
teardown_servald
}
doc_KeyringEntryPinServer="Start daemon with a keyring and an entry PIN"
setup_KeyringEntryPinServer() {
setup
create_single_identity --keyring-pin=yellow --entry-pin=yodel
}
test_KeyringEntryPinServer() {
start_servald_server --keyring-pin=yellow --entry-pin=yodel
executeOk_servald id self
unpack_stdout_list X
assert --stdout --stderr [ $XNROWS -eq 1 ]
assert --stdout --stderr [ ${XSID[0]} = $SIDA ]
}
finally_KeyringKeyringPinServer() {
stop_servald_server
}
teardown_KeyringKeyringPinServer() {
2013-10-24 02:01:35 +00:00
teardown_servald
}
doc_KeyringEntryPinServer="Start daemon, unlock and lock identities"
setup_KeyringEntryPinServer() {
setup
executeOk_servald config set debug.mdprequests on
create_single_identity
executeOk_servald keyring add 'one'
extract_stdout_keyvalue ONE sid "$rexp_sid"
executeOk_servald keyring add 'two'
extract_stdout_keyvalue TWOA sid "$rexp_sid"
executeOk_servald keyring add 'two'
extract_stdout_keyvalue TWOB sid "$rexp_sid"
start_servald_server
}
test_KeyringEntryPinServer() {
executeOk_servald id self
assertStdoutLineCount == 3
assertStdoutGrep --matches=1 --fixed-strings "$SIDA"
executeOk_servald id enter pin 'one'
2013-10-24 02:01:35 +00:00
executeOk_servald id list
assertStdoutLineCount == 4
assertStdoutGrep --matches=1 --fixed-strings "$SIDA"
assertStdoutGrep --matches=1 --fixed-strings "$ONE"
executeOk_servald id enter pin 'two'
2013-10-24 02:01:35 +00:00
executeOk_servald id list
assertStdoutLineCount == 6
assertStdoutGrep --matches=1 --fixed-strings "$SIDA"
assertStdoutGrep --matches=1 --fixed-strings "$ONE"
assertStdoutGrep --matches=1 --fixed-strings "$TWOA"
assertStdoutGrep --matches=1 --fixed-strings "$TWOB"
executeOk_servald id relinquish pin 'one'
2013-10-24 02:01:35 +00:00
executeOk_servald id list
assertStdoutLineCount == 5
assertStdoutGrep --matches=1 --fixed-strings "$SIDA"
assertStdoutGrep --matches=1 --fixed-strings "$TWOA"
assertStdoutGrep --matches=1 --fixed-strings "$TWOB"
executeOk_servald id relinquish sid "$TWOB"
tfw_cat --stderr
2013-10-24 02:01:35 +00:00
executeOk_servald id list
assertStdoutLineCount == 4
assertStdoutGrep --matches=1 --fixed-strings "$SIDA"
assertStdoutGrep --matches=1 --fixed-strings "$TWOA"
}
teardown_KeyringEntryPinServer() {
2013-10-24 02:01:35 +00:00
teardown_servald
}
doc_ListTags="Search for unlocked identities by their tags & values"
setup_ListTags() {
setup
executeOk_servald keyring add
extract_stdout_keyvalue ONE sid "$rexp_sid"
keyring_set_tag "$ONE" 'tag1' 'First Value'
executeOk_servald keyring add
extract_stdout_keyvalue TWO sid "$rexp_sid"
keyring_set_tag "$TWO" 'tag1' 'Second Value'
executeOk_servald keyring add
extract_stdout_keyvalue THREE sid "$rexp_sid"
keyring_set_tag "$THREE" 'tag2' 'Third Value'
start_servald_server
}
test_ListTags() {
executeOk_servald id list
assertStdoutLineCount == 5
assertStdoutGrep --fixed-strings "$ONE"
assertStdoutGrep --fixed-strings "$TWO"
assertStdoutGrep --fixed-strings "$THREE"
2013-10-24 02:01:35 +00:00
executeOk_servald id list 'tag1'
assertStdoutLineCount == 4
assertStdoutGrep --fixed-strings "$ONE"
assertStdoutGrep --fixed-strings "$TWO"
2013-10-24 02:01:35 +00:00
executeOk_servald id list 'tag1' 'First Value'
assertStdoutLineCount == 3
assertStdoutGrep --fixed-strings "$ONE"
2013-10-24 02:01:35 +00:00
}
teardown_ListTags() {
teardown_servald
}
doc_Load="Load keyring entries from a keyring dump"
setup_Load() {
setup_servald
setup_instances +A +B
set_instance +A
executeOk_servald keyring add ''
executeOk_servald keyring add ''
executeOk_servald keyring dump --secret dA
set_instance +B
executeOk_servald keyring add ''
executeOk_servald keyring dump --secret dB
set_instance +A
tfw_cat dA dB
assert ! cmp dA dB
}
test_Load() {
set_instance +B
executeOk_servald keyring load dA
tfw_cat --stderr
executeOk_servald keyring dump --secret dBA
tfw_cat dBA
assert [ $(cat dBA | wc -l) -eq $(( $(cat dA | wc -l) + $(cat dB | wc -l) )) ]
while read line; do
2013-09-04 23:49:45 +00:00
assertGrep --fixed-strings dBA "${line#[0-9]}"
done < dA
while read line; do
2013-09-04 23:49:45 +00:00
assertGrep --fixed-strings dBA "${line#[0-9]}"
done < dB
set_instance +A
executeOk_servald keyring load dB
tfw_cat --stderr
executeOk_servald keyring dump --secret dAB
assert cmp dAB dBA
}
doc_LoadAtomic="Load is atomic: all entries are loaded or none"
setup_LoadAtomic() {
setup_Load
echo blah >>dA
}
test_LoadAtomic() {
set_instance +B
execute --exit-status=255 $servald keyring load dA
executeOk_servald keyring dump --secret dB2
tfw_cat dB2
assert cmp dB2 dB
}
doc_LoadDuplicates="Load de-duplicates keyring entries by SID"
setup_LoadDuplicates() {
setup
executeOk_servald keyring add ''
executeOk_servald keyring dump --secret dA
tfw_cat dA
}
test_LoadDuplicates() {
executeOk_servald keyring load dA
tfw_cat --stderr
executeOk_servald keyring dump --secret dAA
tfw_cat dAA
assert cmp dA dAA
}
doc_LoadPins="Load keyring entries with PIN arguments"
setup_LoadPins() {
setup_servald
setup_instances +A +B
set_instance +A
executeOk_servald keyring add ''
executeOk_servald keyring add ''
executeOk_servald keyring add ''
executeOk_servald keyring dump --secret dA
set_instance +B
executeOk_servald keyring add ''
executeOk_servald keyring dump --secret dB
set_instance +A
tfw_cat dA dB
assert ! cmp dA dB
}
test_LoadPins() {
set_instance +B
executeOk_servald keyring load dA krpin pin1 '' pin3
executeOk_servald keyring dump --secret dBA
tfw_cat dBA
assert cmp dB dBA
tfw_cat --stderr
for pin in '' pin1 pin3; do
executeOk_servald keyring dump --keyring-pin=krpin --entry-pin="$pin" --secret dBA
tfw_cat --stderr dBA
let n=0
while read line; do
case "$pin=$line" in
pin1=0:* | *=1:* | pin3=2:* )
assertGrep --fixed-strings dBA "${line#[0-9]}"
let ++n
;;
esac
done < dA
while read line; do
assertGrep --fixed-strings dBA "${line#[0-9]}"
let ++n
done < dB
assert [ $(cat dBA | wc -l) -eq $n ]
done
}
doc_CompatibleBack1="Can read old keyring file (1)"
setup_CompatibleBack1() {
setup_servald
executeOk_servald config \
set log.console.level debug \
set debug.keyring on
assert mkdir -p "$SERVALINSTANCE_PATH"
assert cp "${TFWSOURCE%/*}/testdata/serval.keyring-1" "$SERVALINSTANCE_PATH/serval.keyring"
}
test_CompatibleBack1() {
executeOk_servald keyring dump --secret
assertStdoutLineCount '==' 11
assertStdoutGrep "^0: type=.*(CRYPTOBOX).*pub=6EE9BCA4AE1A264D18F42C18EF910915F98F0C5D9ECD853ECB1547B752119F05\b"
assertStdoutGrep "^0: type=.*(CRYPTOBOX).*sec=3611C4CC6BC7A167088492AD021103048C78F16AC22724B06B96A3E865163137\b"
assertStdoutGrep "^0: type=.*(CRYPTOSIGN).*pub=DA75D0A0EFCC75A9CCA634C2FC36EC19416B0CDE2A014520F911B95D1DB6224A\b"
assertStdoutGrep "^0: type=.*(CRYPTOSIGN).*sec=A90608CE5135D54CDBA922426D425F9D5494C8DB83D658EE518D88BCDAF04B1EDA75D0A0EFCC75A9CCA634C2FC36EC19416B0CDE2A014520F911B95D1DB6224A\b"
assertStdoutGrep "^0: type=.*(DID).*DID=\"555001234\""
assertStdoutGrep "^0: type=.*(DID).*Name=\"Jones\""
assertStdoutGrep "^0: type=.*(RHIZOME).*sec=6FBCD69A8DE983324C414F8B5BA83646EF4421AA877BB06F18AFA78EEC42A4BC\b"
assertStdoutGrep "^1: type=.*(CRYPTOBOX).*pub=C10C91D24BF210DD6733ED2424B4509E6CC4402D34055B6D29F7A778701AA542\b"
assertStdoutGrep "^1: type=.*(CRYPTOBOX).*sec=9D22FF754D90971B062A26BAA1D2E95C03B67688B3C71334C3512DB8FA996570\b"
assertStdoutGrep "^1: type=.*(CRYPTOSIGN).*pub=9F40922AD9435B1AD2880442B43D32CC345CAAFF13599DC241C13E421A4D672A\b"
assertStdoutGrep "^1: type=.*(CRYPTOSIGN).*sec=648F3171A612F82ED01BA1475AD9F538F97C1D95067D1D9F7F324B8F9C0489289F40922AD9435B1AD2880442B43D32CC345CAAFF13599DC241C13E421A4D672A\b"
assertStdoutGrep "^1: type=.*(DID).*DID=\"55500000\""
assertStdoutGrep "^1: type=.*(DID).*Name=\"Smith\""
assertStdoutGrep "^1: type=.*(RHIZOME).*sec=E78E7F80CCEC0179A07E1DECC9D6C3C89089A9FD3787CF5273FD0F8E9CE62780\b"
assertStdoutGrep "^2: type=.*(CRYPTOBOX).*pub=EEBF3AC19E7EE58722A0F6D4A4D5894A72F5C71030C3399FE75808DCF6C6254B\b"
assertStdoutGrep "^2: type=.*(CRYPTOBOX).*sec=5822F44BF118F7A533B74046A400FA8C83A6B69EDD0166D8175D0B70267A2CA1\b"
assertStdoutGrep "^2: type=.*(CRYPTOSIGN).*pub=13A4B69DE4D4A1D89DB22E1D433B0C7DEB2E9C86A2FD98D9F689B7EDEFB64E20\b"
assertStdoutGrep "^2: type=.*(CRYPTOSIGN).*sec=2B221014CED25245A181B5164030D7823B8FC288DE724CAC029CE6A5E195A12713A4B69DE4D4A1D89DB22E1D433B0C7DEB2E9C86A2FD98D9F689B7EDEFB64E20\b"
assertStdoutGrep "^2: type=.*(RHIZOME).*sec=4483DF66540740736A05055A96D8C8B84F05D52808380DD52462B8EA5CCAB0D3\b"
assertStdoutGrep --matches=0 "^2: type=.*(DID)"
assertStdoutGrep --matches=0 "^3:"
}
doc_KeyringPathEnv="Use keyring specified by environment variable"
setup_KeyringPathEnv() {
setup
executeOk_servald keyring add ''
executeOk_servald keyring list
assert_keyring_list 1
orig="$(replayStdout)"
}
test_KeyringPathEnv() {
export SERVALD_KEYRING_PATH="$PWD/keyring"
executeOk_servald keyring list
assert_keyring_list 0
assert --message="created 'keyring' file" [ -s keyring ]
executeOk_servald keyring add ''
executeOk_servald keyring list
assert_keyring_list 1
assert [ "$(replayStdout)" != "$orig" ]
unset SERVALD_KEYRING_PATH
executeOk_servald keyring list
assert_keyring_list 1
assert [ "$(replayStdout)" == "$orig" ]
}
2013-09-03 07:35:50 +00:00
doc_ReadOnlyEnv="Read-only keyring environment variable"
setup_ReadOnlyEnv() {
setup
executeOk_servald keyring add ''
executeOk_servald keyring list
assert_keyring_list 1
orig="$(replayStdout)"
}
test_ReadOnlyEnv() {
export SERVALD_KEYRING_READONLY="true"
execute --exit-status=255 $servald keyring add ''
tfw_cat --stderr
executeOk_servald keyring list
assert_keyring_list 1
assert [ "$(replayStdout)" == "$orig" ]
export SERVALD_KEYRING_READONLY="false"
executeOk_servald keyring add ''
executeOk_servald keyring list
assert_keyring_list 2
}
runTests "$@"