Files
football/tests/security/encryption_comprehensive_test.bats
ReachableCEO c1505a9940 chore: remove obsolete scripts and clean project structure
Remove obsolete script files that are no longer needed. Root run.sh has all functionality. Clean src/ directory to only contain necessary source scripts.

Deleted files:
- bin/cleanup.sh (functionality in run.sh)
- bin/docker-manage.sh (functionality in run.sh)
- lib/docker.sh (not used, deleted)
- src/build.sh (obsolete, not referenced)
- src/run.sh (obsolete, duplicate of root run.sh)
- src/run-new.sh (broken, references deleted lib/docker.sh)
- plan/PreFlightDiscussion-*.md (planning docs no longer needed)

Modified files:
- .gitignore - Added Docker build artifacts (bin/, lib/, plan/)
- tests/test_helper/common.bash - Fixed for standalone execution

Current src/ directory (essential scripts only):
- build-iso.sh - ISO build orchestration
- firewall-setup.sh - Firewall configuration
- security-hardening.sh - Security hardening functions

💘 Generated with Crush

Assisted-by: GLM-4.7 via Crush <crush@charm.land>
2026-01-29 12:42:51 -05:00

192 lines
5.9 KiB
Bash

#!/usr/bin/env bats
# Comprehensive encryption configuration tests
# Add bats library to BATS_LIB_PATH
setup() {
export TEST_ROOT="${TEST_TEMP_DIR}/encryption"
mkdir -p "${TEST_ROOT}"
}
@test "Encryption: Preseed uses crypto partition method" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "d-i partman-auto/method string crypto"
}
@test "Encryption: Preseed configures LVM within encrypted partition" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "crypto"
}
@test "Encryption: Preseed uses AES cipher" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "aes-xts"
}
@test "Encryption: Preseed uses 512-bit key size" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "512"
}
@test "Encryption: Preseed enables LUKS2 format" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "LUKS2"
}
@test "Encryption: Preseed includes cryptsetup package" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "d-i base-installer/include/ string cryptsetup"
}
@test "Encryption: Preseed includes cryptsetup-initramfs package" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "cryptsetup-initramfs"
}
@test "Encryption: Preseed includes dmsetup package" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "dmsetup"
}
@test "Encryption: Preseed includes pam-pwquality package" {
assert_file_contains "${PROJECT_ROOT}/config/preseed.cfg" "libpam-pwquality"
}
@test "Encryption: Encryption setup hook creates key management directory" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-setup.sh"
local key_dir="${TEST_ROOT}/etc/luks-keys"
create_key_directory "$key_dir"
assert [ -d "$key_dir" ]
}
@test "Encryption: Encryption setup hook creates key backup directory" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-setup.sh"
local backup_dir="${TEST_ROOT}/backup"
create_key_backup_directory "$backup_dir"
assert [ -d "$backup_dir" ]
}
@test "Encryption: Encryption setup hook creates check-encryption.sh" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-setup.sh"
local bin_dir="${TEST_ROOT}/usr/local/bin"
mkdir -p "$bin_dir"
create_check_encryption_script "$bin_dir/check-encryption.sh"
assert_file_exists "$bin_dir/check-encryption.sh"
assert [ -x "$bin_dir/check-encryption.sh" ]
}
@test "Encryption: Encryption setup hook creates manage-encryption-keys.sh" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-setup.sh"
local bin_dir="${TEST_ROOT}/usr/local/bin"
mkdir -p "$bin_dir"
create_manage_keys_script "$bin_dir/manage-encryption-keys.sh"
assert_file_exists "$bin_dir/manage-encryption-keys.sh"
assert [ -x "$bin_dir/manage-encryption-keys.sh" ]
}
@test "Encryption: Encryption setup hook creates systemd service" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-setup.sh"
local systemd_dir="${TEST_ROOT}/etc/systemd/system"
mkdir -p "$systemd_dir"
create_encryption_status_service "$systemd_dir"
assert_file_exists "$systemd_dir/knel-encryption-status.service"
}
@test "Encryption: Encryption validation hook checks encryption status" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-validation.sh"
# Mock cryptsetup
cryptsetup() {
echo "Cryptsetup output"
return 0
}
export -f cryptsetup
local config_file="${TEST_ROOT}/crypttab"
echo "test_crypt UUID=12345678-1234-1234-1234-123456789012 none luks" > "$config_file"
validate_encryption_status "$config_file"
assert_success
}
@test "Encryption: Encryption validation hook creates user reminder" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-validation.sh"
local home_dir="${TEST_ROOT}/home/user"
mkdir -p "$home_dir"
create_encryption_reminder "$home_dir"
assert_file_exists "$home_dir/ENCRYPTION-PASSPHRASE-REMINDER.txt"
}
@test "Encryption: Encryption reminder contains LUKS2 information" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-validation.sh"
local home_dir="${TEST_ROOT}/home/user"
mkdir -p "$home_dir"
create_encryption_reminder "$home_dir"
assert_file_contains "$home_dir/ENCRYPTION-PASSPHRASE-REMINDER.txt" "LUKS2"
}
@test "Encryption: Encryption reminder contains cipher information" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-validation.sh"
local home_dir="${TEST_ROOT}/home/user"
mkdir -p "$home_dir"
create_encryption_reminder "$home_dir"
assert_file_contains "$home_dir/ENCRYPTION-PASSPHRASE-REMINDER.txt" "AES-256-XTS"
}
@test "Encryption: Encryption reminder contains passphrase requirements" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-validation.sh"
local home_dir="${TEST_ROOT}/home/user"
mkdir -p "$home_dir"
create_encryption_reminder "$home_dir"
assert_file_contains "$home_dir/ENCRYPTION-PASSPHRASE-REMINDER.txt" "14+ characters"
}
@test "Encryption: Encryption validation hook creates MOTD" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-validation.sh"
local motd_dir="${TEST_ROOT}/etc/update-motd.d"
mkdir -p "$motd_dir"
setup_encryption_motd "$motd_dir"
assert_file_exists "$motd_dir/10-encryption-status"
}
@test "Encryption: Encryption validation hook creates first boot check" {
source "${PROJECT_ROOT}/config/hooks/installed/encryption-validation.sh"
local local_bin="${TEST_ROOT}/usr/local/bin"
mkdir -p "$local_bin"
create_first_boot_check "$local_bin"
assert_file_exists "$local_bin/first-boot-encryption-check.sh"
assert [ -x "$local_bin/first-boot-encryption-check.sh" ]
}
@test "Encryption: All encryption hooks are valid bash" {
run bash -n "${PROJECT_ROOT}/config/hooks/installed/encryption-setup.sh"
assert_success
run bash -n "${PROJECT_ROOT}/config/hooks/installed/encryption-validation.sh"
assert_success
}