libcryfs/test/cryfs/config/CryConfigCreatorTest.cpp

206 lines
9.3 KiB
C++
Raw Normal View History

2016-02-11 16:39:42 +01:00
#include <gtest/gtest.h>
#include <gmock/gmock.h>
#include <cryfs/config/CryConfigCreator.h>
#include <cryfs/config/CryCipher.h>
#include <cpp-utils/crypto/symmetric/ciphers.h>
2015-10-22 18:48:14 +02:00
#include "../testutils/MockConsole.h"
#include "../testutils/TestWithFakeHomeDirectory.h"
2016-09-25 02:50:28 +02:00
#include <cpp-utils/io/NoninteractiveConsole.h>
#include <gitversion/gitversion.h>
#include <cryfs/localstate/LocalStateDir.h>
2015-10-22 18:48:14 +02:00
using namespace cryfs;
using boost::none;
2016-09-25 02:50:28 +02:00
using cpputils::NoninteractiveConsole;
2015-10-22 18:48:14 +02:00
using std::string;
using std::shared_ptr;
using std::make_shared;
2015-10-22 18:48:14 +02:00
using ::testing::_;
using ::testing::Return;
using ::testing::HasSubstr;
using ::testing::UnorderedElementsAreArray;
using ::testing::NiceMock;
2015-10-22 18:48:14 +02:00
#define EXPECT_ASK_TO_USE_DEFAULT_SETTINGS() \
2016-09-25 02:50:28 +02:00
EXPECT_CALL(*console, askYesNo("Use default settings?", true)).Times(1)
#define EXPECT_DOES_NOT_ASK_TO_USE_DEFAULT_SETTINGS() \
2016-09-25 02:50:28 +02:00
EXPECT_CALL(*console, askYesNo("Use default settings?", true)).Times(0)
#define EXPECT_ASK_FOR_CIPHER() \
EXPECT_CALL(*console, ask(HasSubstr("block cipher"), UnorderedElementsAreArray(CryCiphers::supportedCipherNames()))).Times(1)
#define EXPECT_DOES_NOT_ASK_FOR_CIPHER() \
EXPECT_CALL(*console, ask(HasSubstr("block cipher"), _)).Times(0)
#define EXPECT_ASK_FOR_BLOCKSIZE() \
EXPECT_CALL(*console, ask(HasSubstr("block size"), _)).Times(1)
#define EXPECT_DOES_NOT_ASK_FOR_BLOCKSIZE() \
EXPECT_CALL(*console, ask(HasSubstr("block size"), _)).Times(0)
#define EXPECT_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION() \
2016-09-25 20:05:38 +02:00
EXPECT_CALL(*console, askYesNo(HasSubstr("missing block"), false)).Times(1)
#define EXPECT_DOES_NOT_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION() \
2016-09-25 20:05:38 +02:00
EXPECT_CALL(*console, askYesNo(HasSubstr("missing block"), false)).Times(0)
#define IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION() \
2016-09-25 20:05:38 +02:00
EXPECT_CALL(*console, askYesNo(HasSubstr("missing block"), false))
class CryConfigCreatorTest: public ::testing::Test, TestWithFakeHomeDirectory {
2015-10-22 18:48:14 +02:00
public:
CryConfigCreatorTest()
: console(make_shared<NiceMock<MockConsole>>()),
tempLocalStateDir(), localStateDir(tempLocalStateDir.path()),
creator(console, cpputils::Random::PseudoRandom(), localStateDir),
noninteractiveCreator(make_shared<NoninteractiveConsole>(console), cpputils::Random::PseudoRandom(), localStateDir) {
EXPECT_CALL(*console, ask(HasSubstr("block cipher"), _)).WillRepeatedly(ChooseAnyCipher());
EXPECT_CALL(*console, ask(HasSubstr("block size"), _)).WillRepeatedly(Return(0));
2015-10-22 18:48:14 +02:00
}
shared_ptr<NiceMock<MockConsole>> console;
cpputils::TempDir tempLocalStateDir;
LocalStateDir localStateDir;
2015-10-22 18:48:14 +02:00
CryConfigCreator creator;
CryConfigCreator noninteractiveCreator;
2015-10-22 18:48:14 +02:00
void AnswerNoToDefaultSettings() {
EXPECT_ASK_TO_USE_DEFAULT_SETTINGS().WillOnce(Return(false));
}
void AnswerYesToDefaultSettings() {
EXPECT_ASK_TO_USE_DEFAULT_SETTINGS().WillOnce(Return(true));
}
};
2015-10-22 18:48:14 +02:00
TEST_F(CryConfigCreatorTest, DoesAskForCipherIfNotSpecified) {
AnswerNoToDefaultSettings();
IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
EXPECT_ASK_FOR_CIPHER().WillOnce(ChooseAnyCipher());
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskForCipherIfSpecified) {
AnswerNoToDefaultSettings();
IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
EXPECT_DOES_NOT_ASK_FOR_CIPHER();
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(string("aes-256-gcm"), none, none, false).config;
2015-10-22 18:48:14 +02:00
}
TEST_F(CryConfigCreatorTest, DoesNotAskForCipherIfUsingDefaultSettings) {
AnswerYesToDefaultSettings();
EXPECT_DOES_NOT_ASK_FOR_CIPHER();
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskForCipherIfNoninteractive) {
EXPECT_DOES_NOT_ASK_TO_USE_DEFAULT_SETTINGS();
EXPECT_DOES_NOT_ASK_FOR_CIPHER();
2018-02-08 08:08:01 +01:00
CryConfig config = noninteractiveCreator.create(none, none, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesAskForBlocksizeIfNotSpecified) {
AnswerNoToDefaultSettings();
IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
EXPECT_ASK_FOR_BLOCKSIZE().WillOnce(Return(1));
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskForBlocksizeIfSpecified) {
AnswerNoToDefaultSettings();
IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
EXPECT_DOES_NOT_ASK_FOR_BLOCKSIZE();
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, 10*1024u, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskForBlocksizeIfNoninteractive) {
EXPECT_DOES_NOT_ASK_TO_USE_DEFAULT_SETTINGS();
EXPECT_DOES_NOT_ASK_FOR_BLOCKSIZE();
2018-02-08 08:08:01 +01:00
CryConfig config = noninteractiveCreator.create(none, none, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskForBlocksizeIfUsingDefaultSettings) {
AnswerYesToDefaultSettings();
EXPECT_DOES_NOT_ASK_FOR_BLOCKSIZE();
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesAskWhetherMissingBlocksAreIntegrityViolationsIfNotSpecified) {
AnswerNoToDefaultSettings();
EXPECT_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION().WillOnce(Return(true));
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskWhetherMissingBlocksAreIntegrityViolationsIfSpecified_True) {
AnswerNoToDefaultSettings();
EXPECT_DOES_NOT_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, true, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskWhetherMissingBlocksAreIntegrityViolationsIfSpecified_False) {
AnswerNoToDefaultSettings();
EXPECT_DOES_NOT_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, false, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskWhetherMissingBlocksAreIntegrityViolationsIfNoninteractive) {
EXPECT_DOES_NOT_ASK_TO_USE_DEFAULT_SETTINGS();
EXPECT_DOES_NOT_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
2018-02-08 08:08:01 +01:00
CryConfig config = noninteractiveCreator.create(none, none, none, false).config;
}
TEST_F(CryConfigCreatorTest, DoesNotAskWhetherMissingBlocksAreIntegrityViolationsIfUsingDefaultSettings) {
AnswerYesToDefaultSettings();
EXPECT_DOES_NOT_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
}
2015-10-22 18:48:14 +02:00
TEST_F(CryConfigCreatorTest, ChoosesEmptyRootBlobId) {
AnswerNoToDefaultSettings();
IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
2015-10-22 18:48:14 +02:00
EXPECT_EQ("", config.RootBlob()); // This tells CryFS to create a new root blob
}
#if CRYPTOPP_VERSION != 564
2015-10-22 18:48:14 +02:00
TEST_F(CryConfigCreatorTest, ChoosesValidEncryptionKey_448) {
AnswerNoToDefaultSettings();
IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
2015-10-22 18:48:14 +02:00
EXPECT_ASK_FOR_CIPHER().WillOnce(ChooseCipher("mars-448-gcm"));
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
2015-10-27 23:46:54 +01:00
cpputils::Mars448_GCM::EncryptionKey::FromString(config.EncryptionKey()); // This crashes if invalid
2015-10-22 18:48:14 +02:00
}
#endif
2015-10-22 18:48:14 +02:00
TEST_F(CryConfigCreatorTest, ChoosesValidEncryptionKey_256) {
AnswerNoToDefaultSettings();
IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
2015-10-22 18:48:14 +02:00
EXPECT_ASK_FOR_CIPHER().WillOnce(ChooseCipher("aes-256-gcm"));
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
cpputils::AES256_GCM::EncryptionKey::FromString(config.EncryptionKey()); // This crashes if invalid
2015-10-22 18:48:14 +02:00
}
TEST_F(CryConfigCreatorTest, ChoosesValidEncryptionKey_128) {
AnswerNoToDefaultSettings();
IGNORE_ASK_FOR_MISSINGBLOCKISINTEGRITYVIOLATION();
2015-10-22 18:48:14 +02:00
EXPECT_ASK_FOR_CIPHER().WillOnce(ChooseCipher("aes-128-gcm"));
2018-02-08 08:08:01 +01:00
CryConfig config = creator.create(none, none, none, false).config;
cpputils::AES128_GCM::EncryptionKey::FromString(config.EncryptionKey()); // This crashes if invalid
2015-10-22 18:48:14 +02:00
}
TEST_F(CryConfigCreatorTest, DoesNotAskForAnythingIfEverythingIsSpecified) {
EXPECT_DOES_NOT_ASK_TO_USE_DEFAULT_SETTINGS();
EXPECT_DOES_NOT_ASK_FOR_CIPHER();
2018-02-08 08:08:01 +01:00
CryConfig config = noninteractiveCreator.create(string("aes-256-gcm"), 10*1024u, none, false).config;
}
TEST_F(CryConfigCreatorTest, SetsCorrectCreatedWithVersion) {
2018-02-08 08:08:01 +01:00
CryConfig config = noninteractiveCreator.create(none, none, none, false).config;
EXPECT_EQ(gitversion::VersionString(), config.CreatedWithVersion());
}
TEST_F(CryConfigCreatorTest, SetsCorrectLastOpenedWithVersion) {
2018-02-08 08:08:01 +01:00
CryConfig config = noninteractiveCreator.create(none, none, none, false).config;
EXPECT_EQ(gitversion::VersionString(), config.CreatedWithVersion());
}
TEST_F(CryConfigCreatorTest, SetsCorrectVersion) {
2018-02-08 08:08:01 +01:00
CryConfig config = noninteractiveCreator.create(none, none, none, false).config;
EXPECT_EQ(CryConfig::FilesystemFormatVersion, config.Version());
}
//TODO Add test cases ensuring that the values entered are correctly taken