2016-10-16 13:39:25 +02:00
|
|
|
package cli
|
2015-11-15 13:38:19 +01:00
|
|
|
|
|
|
|
// Test CLI operations like "-init", "-password" etc
|
|
|
|
|
|
|
|
import (
|
2018-04-07 15:46:41 +02:00
|
|
|
"fmt"
|
2016-10-06 22:41:13 +02:00
|
|
|
"io/ioutil"
|
2015-11-15 13:38:19 +01:00
|
|
|
"os"
|
|
|
|
"os/exec"
|
2019-05-13 23:01:44 +02:00
|
|
|
"strconv"
|
2019-09-14 18:32:54 +02:00
|
|
|
"strings"
|
2016-10-16 19:13:00 +02:00
|
|
|
"syscall"
|
2015-11-15 13:38:19 +01:00
|
|
|
"testing"
|
2017-07-23 20:28:41 +02:00
|
|
|
"time"
|
2015-11-15 13:38:19 +01:00
|
|
|
|
2016-02-06 19:20:54 +01:00
|
|
|
"github.com/rfjakob/gocryptfs/internal/configfile"
|
2017-05-07 22:15:01 +02:00
|
|
|
"github.com/rfjakob/gocryptfs/internal/exitcodes"
|
2016-06-06 23:57:42 +02:00
|
|
|
|
|
|
|
"github.com/rfjakob/gocryptfs/tests/test_helpers"
|
2015-11-15 13:38:19 +01:00
|
|
|
)
|
|
|
|
|
2018-02-18 14:26:54 +01:00
|
|
|
var testPw = []byte("test")
|
|
|
|
|
2016-06-30 00:57:14 +02:00
|
|
|
func TestMain(m *testing.M) {
|
|
|
|
test_helpers.ResetTmpDir(false)
|
2019-10-06 19:04:16 +02:00
|
|
|
before := test_helpers.ListFds(0, "")
|
2016-06-30 00:57:14 +02:00
|
|
|
r := m.Run()
|
2019-10-06 19:04:16 +02:00
|
|
|
after := test_helpers.ListFds(0, "")
|
2018-04-07 15:46:41 +02:00
|
|
|
if len(before) != len(after) {
|
2019-10-06 18:48:09 +02:00
|
|
|
fmt.Printf("fd leak in test process? before, after:\n%v\n%v\n", before, after)
|
2018-04-07 15:46:41 +02:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
2016-06-30 00:57:14 +02:00
|
|
|
os.Exit(r)
|
|
|
|
}
|
|
|
|
|
2015-11-15 13:48:30 +01:00
|
|
|
// Test -init flag
|
2015-11-15 13:38:19 +01:00
|
|
|
func TestInit(t *testing.T) {
|
2016-06-16 21:06:03 +02:00
|
|
|
dir := test_helpers.InitFS(t)
|
2018-09-08 12:40:29 +02:00
|
|
|
_, c, err := configfile.LoadAndDecrypt(dir+"/"+configfile.ConfDefaultName, testPw)
|
2015-11-15 13:48:30 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-09-26 23:25:13 +02:00
|
|
|
if c.IsFeatureFlagSet(configfile.FlagAESSIV) {
|
|
|
|
t.Error("AESSIV flag should not be set")
|
2016-09-25 15:05:09 +02:00
|
|
|
}
|
2016-06-14 23:11:54 +02:00
|
|
|
}
|
2015-11-15 13:48:30 +01:00
|
|
|
|
2019-03-30 20:06:40 +01:00
|
|
|
// Test that gocryptfs.conf and gocryptfs.diriv are there with the expected
|
|
|
|
// permissions after -init
|
|
|
|
func TestInitFilePerms(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
var st syscall.Stat_t
|
|
|
|
syscall.Stat(dir+"/gocryptfs.conf", &st)
|
|
|
|
perms := st.Mode & 0777
|
|
|
|
if perms != 0400 {
|
|
|
|
t.Errorf("Wrong permissions for gocryptfs.conf: %#o", perms)
|
|
|
|
}
|
|
|
|
st = syscall.Stat_t{}
|
|
|
|
syscall.Stat(dir+"/gocryptfs.diriv", &st)
|
|
|
|
perms = st.Mode & 0777
|
|
|
|
// From v1.7.1, these are created with 0440 permissions, see
|
|
|
|
// https://github.com/rfjakob/gocryptfs/issues/387
|
|
|
|
if perms != 0440 {
|
|
|
|
t.Errorf("Wrong permissions for gocryptfs.diriv: %#o", perms)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-19 13:30:04 +01:00
|
|
|
// Test -init with -devrandom flag
|
|
|
|
func TestInitDevRandom(t *testing.T) {
|
|
|
|
test_helpers.InitFS(t, "-devrandom")
|
|
|
|
}
|
|
|
|
|
2016-09-26 23:25:13 +02:00
|
|
|
// Test -init with -aessiv
|
|
|
|
func TestInitAessiv(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t, "-aessiv")
|
2018-09-08 12:40:29 +02:00
|
|
|
_, c, err := configfile.LoadAndDecrypt(dir+"/"+configfile.ConfDefaultName, testPw)
|
2016-09-25 15:05:09 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-09-26 23:25:13 +02:00
|
|
|
if !c.IsFeatureFlagSet(configfile.FlagAESSIV) {
|
|
|
|
t.Error("AESSIV flag should be set but is not")
|
2016-09-25 15:05:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test -init with -reverse
|
|
|
|
func TestInitReverse(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t, "-reverse")
|
2018-09-08 12:40:29 +02:00
|
|
|
_, c, err := configfile.LoadAndDecrypt(dir+"/"+configfile.ConfReverseName, testPw)
|
2016-09-25 15:05:09 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2016-09-26 23:25:13 +02:00
|
|
|
if !c.IsFeatureFlagSet(configfile.FlagAESSIV) {
|
|
|
|
t.Error("AESSIV flag should be set but is not")
|
2016-09-25 15:05:09 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-13 23:01:44 +02:00
|
|
|
// testPasswd changes the password from "test" to "test" using
|
|
|
|
// the -extpass method, then from "test" to "newpasswd" using the
|
|
|
|
// stdin method.
|
2016-09-25 15:05:09 +02:00
|
|
|
func testPasswd(t *testing.T, dir string, extraArgs ...string) {
|
2016-06-14 23:11:54 +02:00
|
|
|
// Change password using "-extpass"
|
2016-09-25 15:05:09 +02:00
|
|
|
args := []string{"-q", "-passwd", "-extpass", "echo test"}
|
|
|
|
args = append(args, extraArgs...)
|
|
|
|
args = append(args, dir)
|
|
|
|
cmd := exec.Command(test_helpers.GocryptfsBinary, args...)
|
2016-06-15 22:43:31 +02:00
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
2016-06-16 21:06:03 +02:00
|
|
|
err := cmd.Run()
|
2016-06-15 22:43:31 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
// Change password using stdin
|
2016-10-16 18:12:37 +02:00
|
|
|
args = []string{"-q", "-passwd"}
|
2016-09-25 15:05:09 +02:00
|
|
|
args = append(args, extraArgs...)
|
|
|
|
args = append(args, dir)
|
|
|
|
cmd = exec.Command(test_helpers.GocryptfsBinary, args...)
|
2016-06-15 22:43:31 +02:00
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
p, err := cmd.StdinPipe()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = cmd.Start()
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
// Old password
|
|
|
|
p.Write([]byte("test\n"))
|
|
|
|
// New password
|
|
|
|
p.Write([]byte("newpasswd\n"))
|
|
|
|
p.Close()
|
|
|
|
err = cmd.Wait()
|
2015-11-15 13:38:19 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-09-25 15:05:09 +02:00
|
|
|
// Test -passwd flag
|
|
|
|
func TestPasswd(t *testing.T) {
|
|
|
|
// Create FS
|
|
|
|
dir := test_helpers.InitFS(t)
|
2016-10-16 19:13:00 +02:00
|
|
|
mnt := dir + ".mnt"
|
|
|
|
// Add content
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-extpass", "echo test")
|
|
|
|
file1 := mnt + "/file1"
|
|
|
|
err := ioutil.WriteFile(file1, []byte("somecontent"), 0600)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = test_helpers.UnmountErr(mnt)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// Change password to "newpasswd"
|
2016-09-25 15:05:09 +02:00
|
|
|
testPasswd(t, dir)
|
2016-10-16 19:13:00 +02:00
|
|
|
// Mount and verify
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-extpass", "echo newpasswd")
|
|
|
|
content, err := ioutil.ReadFile(file1)
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
} else if string(content) != "somecontent" {
|
|
|
|
t.Errorf("wrong content: %q", string(content))
|
|
|
|
}
|
|
|
|
err = test_helpers.UnmountErr(mnt)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-09 16:53:25 +02:00
|
|
|
// cp copies file at `src` to `dst`, overwriting
|
|
|
|
// `dst` if it already exists. Calls t.Fatal on failure.
|
|
|
|
func cp(t *testing.T, src string, dst string) {
|
|
|
|
conf, err := ioutil.ReadFile(src)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
syscall.Unlink(dst)
|
|
|
|
err = ioutil.WriteFile(dst, conf, 0600)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-16 19:13:00 +02:00
|
|
|
// Test -passwd with -masterkey
|
|
|
|
func TestPasswdMasterkey(t *testing.T) {
|
|
|
|
// Create FS
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
// Overwrite with config with known master key
|
2020-05-09 16:53:25 +02:00
|
|
|
cp(t, "gocryptfs.conf.b9e5ba23", dir+"/gocryptfs.conf")
|
|
|
|
// Add content
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-extpass", "echo test")
|
|
|
|
file1 := mnt + "/file1"
|
|
|
|
err := ioutil.WriteFile(file1, []byte("somecontent"), 0600)
|
2016-10-16 19:13:00 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-05-09 16:53:25 +02:00
|
|
|
test_helpers.UnmountPanic(mnt)
|
|
|
|
// Change password using stdin
|
|
|
|
args := []string{"-q", "-passwd", "-masterkey",
|
|
|
|
"b9e5ba23-981a22b8-c8d790d8-627add29-f680513f-b7b7035f-d203fb83-21d82205"}
|
|
|
|
args = append(args, dir)
|
|
|
|
cmd := exec.Command(test_helpers.GocryptfsBinary, args...)
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
p, err := cmd.StdinPipe()
|
2016-10-16 19:13:00 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-05-09 16:53:25 +02:00
|
|
|
err = cmd.Start()
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
// New password
|
|
|
|
p.Write([]byte("newpasswd\n"))
|
|
|
|
p.Close()
|
|
|
|
err = cmd.Wait()
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
// Mount and verify
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-extpass", "echo newpasswd")
|
|
|
|
content, err := ioutil.ReadFile(file1)
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
} else if string(content) != "somecontent" {
|
|
|
|
t.Errorf("wrong content: %q", string(content))
|
|
|
|
}
|
|
|
|
test_helpers.UnmountPanic(mnt)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test -passwd with -masterkey=stdin
|
|
|
|
func TestPasswdMasterkeyStdin(t *testing.T) {
|
|
|
|
// Create FS
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
// Overwrite with config with known master key
|
|
|
|
cp(t, "gocryptfs.conf.b9e5ba23", dir+"/gocryptfs.conf")
|
2016-10-16 19:13:00 +02:00
|
|
|
// Add content
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-extpass", "echo test")
|
|
|
|
file1 := mnt + "/file1"
|
2020-05-09 16:53:25 +02:00
|
|
|
err := ioutil.WriteFile(file1, []byte("somecontent"), 0600)
|
2016-10-16 19:13:00 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
test_helpers.UnmountPanic(mnt)
|
|
|
|
// Change password using stdin
|
2020-05-09 16:53:25 +02:00
|
|
|
args := []string{"-q", "-passwd", "-masterkey=stdin"}
|
2016-10-16 19:13:00 +02:00
|
|
|
args = append(args, dir)
|
|
|
|
cmd := exec.Command(test_helpers.GocryptfsBinary, args...)
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
p, err := cmd.StdinPipe()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = cmd.Start()
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
2020-05-09 16:53:25 +02:00
|
|
|
// Masterkey
|
|
|
|
p.Write([]byte("b9e5ba23-981a22b8-c8d790d8-627add29-f680513f-b7b7035f-d203fb83-21d82205\n"))
|
2016-10-16 19:13:00 +02:00
|
|
|
// New password
|
|
|
|
p.Write([]byte("newpasswd\n"))
|
|
|
|
p.Close()
|
|
|
|
err = cmd.Wait()
|
|
|
|
if err != nil {
|
2020-05-09 16:53:25 +02:00
|
|
|
t.Fatal(err)
|
2016-10-16 19:13:00 +02:00
|
|
|
}
|
|
|
|
// Mount and verify
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-extpass", "echo newpasswd")
|
|
|
|
content, err := ioutil.ReadFile(file1)
|
|
|
|
if err != nil {
|
2020-05-09 16:53:25 +02:00
|
|
|
t.Fatal(err)
|
2016-10-16 19:13:00 +02:00
|
|
|
} else if string(content) != "somecontent" {
|
|
|
|
t.Errorf("wrong content: %q", string(content))
|
|
|
|
}
|
|
|
|
test_helpers.UnmountPanic(mnt)
|
2016-09-25 15:05:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Test -passwd with -reverse
|
|
|
|
func TestPasswdReverse(t *testing.T) {
|
|
|
|
// Create FS
|
|
|
|
dir := test_helpers.InitFS(t, "-reverse")
|
|
|
|
testPasswd(t, dir, "-reverse")
|
|
|
|
}
|
|
|
|
|
2019-05-13 23:01:44 +02:00
|
|
|
// Test -passwd with -scryptn
|
|
|
|
func TestPasswdScryptn(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
cf, err := configfile.Load(dir + "/gocryptfs.conf")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
testPasswd(t, dir, "-scryptn", strconv.Itoa(cf.ScryptObject.LogN()+1))
|
|
|
|
cf2, err := configfile.Load(dir + "/gocryptfs.conf")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if cf2.ScryptObject.LogN() != cf.ScryptObject.LogN()+1 {
|
|
|
|
t.Errorf("wrong logN value %d", cf2.ScryptObject.LogN())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-15 13:48:30 +01:00
|
|
|
// Test -init & -config flag
|
|
|
|
func TestInitConfig(t *testing.T) {
|
2016-06-30 00:57:14 +02:00
|
|
|
config := test_helpers.TmpDir + "/TestInitConfig.conf"
|
2016-06-16 21:06:03 +02:00
|
|
|
dir := test_helpers.InitFS(t, "-config="+config)
|
|
|
|
|
|
|
|
_, err := os.Stat(config)
|
2015-11-15 13:48:30 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test -passwd & -config
|
2016-06-14 23:11:54 +02:00
|
|
|
cmd2 := exec.Command(test_helpers.GocryptfsBinary, "-q", "-passwd", "-extpass", "echo test",
|
2015-11-15 13:48:30 +01:00
|
|
|
"-config", config, dir)
|
2016-06-14 23:11:54 +02:00
|
|
|
cmd2.Stdout = os.Stdout
|
|
|
|
cmd2.Stderr = os.Stderr
|
2015-11-15 13:48:30 +01:00
|
|
|
err = cmd2.Run()
|
2015-11-15 13:38:19 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
}
|
2015-12-11 22:21:00 +01:00
|
|
|
|
2016-06-16 21:29:22 +02:00
|
|
|
// Test -ro
|
|
|
|
func TestRo(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-ro", "-extpass=echo test")
|
2016-07-11 20:31:36 +02:00
|
|
|
defer test_helpers.UnmountPanic(mnt)
|
2016-06-16 21:29:22 +02:00
|
|
|
|
|
|
|
file := mnt + "/file"
|
|
|
|
err := os.Mkdir(file, 0777)
|
|
|
|
if err == nil {
|
|
|
|
t.Errorf("Mkdir should have failed")
|
|
|
|
}
|
|
|
|
_, err = os.Create(file)
|
|
|
|
if err == nil {
|
|
|
|
t.Errorf("Create should have failed")
|
|
|
|
}
|
|
|
|
}
|
2016-10-06 22:41:13 +02:00
|
|
|
|
|
|
|
// Test "-nonempty"
|
|
|
|
func TestNonempty(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
err := os.Mkdir(mnt, 0700)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = ioutil.WriteFile(mnt+"/somefile", []byte("xyz"), 0600)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = test_helpers.Mount(dir, mnt, false, "-extpass=echo test")
|
|
|
|
if err == nil {
|
|
|
|
t.Errorf("Mounting over a file should fail per default")
|
|
|
|
}
|
|
|
|
// Should work with "-nonempty"
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-nonempty", "-extpass=echo test")
|
|
|
|
test_helpers.UnmountPanic(mnt)
|
|
|
|
}
|
2016-10-09 00:03:39 +02:00
|
|
|
|
2019-03-31 14:33:02 +02:00
|
|
|
// -nofail should be ignored and the mount should succeed
|
|
|
|
func TestNofail(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-nofail", "-extpass=echo test")
|
|
|
|
defer test_helpers.UnmountPanic(mnt)
|
|
|
|
}
|
|
|
|
|
2016-10-09 00:03:39 +02:00
|
|
|
// Test "mountpoint shadows cipherdir" handling
|
|
|
|
func TestShadows(t *testing.T) {
|
|
|
|
mnt := test_helpers.InitFS(t)
|
|
|
|
cipher := mnt + ".cipher"
|
|
|
|
err := os.Rename(mnt, cipher)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// This should work
|
2016-10-10 20:21:52 +02:00
|
|
|
// (note that MountOrFatal creates "mnt" again)
|
2016-10-09 00:03:39 +02:00
|
|
|
test_helpers.MountOrFatal(t, cipher, mnt, "-extpass=echo test")
|
|
|
|
test_helpers.UnmountPanic(mnt)
|
|
|
|
cipher2 := mnt + "/cipher"
|
|
|
|
err = os.Rename(cipher, cipher2)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// This should fail
|
|
|
|
err = test_helpers.Mount(cipher2, mnt, false, "-extpass=echo test")
|
|
|
|
if err == nil {
|
|
|
|
t.Errorf("Should have failed")
|
|
|
|
}
|
|
|
|
}
|
2017-02-12 15:35:50 +01:00
|
|
|
|
2017-05-14 13:14:00 +02:00
|
|
|
// TestMountPasswordIncorrect makes sure the correct exit code is used when the password
|
|
|
|
// was incorrect while mounting
|
|
|
|
func TestMountPasswordIncorrect(t *testing.T) {
|
|
|
|
cDir := test_helpers.InitFS(t) // Create filesystem with password "test"
|
2017-05-07 22:15:01 +02:00
|
|
|
pDir := cDir + ".mnt"
|
|
|
|
err := test_helpers.Mount(cDir, pDir, false, "-extpass", "echo WRONG", "-wpanic=false")
|
2018-04-01 21:23:32 +02:00
|
|
|
exitCode := test_helpers.ExtractCmdExitCode(err)
|
2017-05-07 22:15:01 +02:00
|
|
|
if exitCode != exitcodes.PasswordIncorrect {
|
|
|
|
t.Errorf("want=%d, got=%d", exitcodes.PasswordIncorrect, exitCode)
|
|
|
|
}
|
|
|
|
}
|
2017-05-14 13:14:00 +02:00
|
|
|
|
|
|
|
// TestPasswdPasswordIncorrect makes sure the correct exit code is used when the password
|
|
|
|
// was incorrect while changing the password
|
|
|
|
func TestPasswdPasswordIncorrect(t *testing.T) {
|
|
|
|
cDir := test_helpers.InitFS(t) // Create filesystem with password "test"
|
|
|
|
// Change password
|
|
|
|
cmd := exec.Command(test_helpers.GocryptfsBinary, "-passwd", cDir)
|
|
|
|
childStdin, err := cmd.StdinPipe()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = cmd.Start()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
_, err = childStdin.Write([]byte("WRONGPASSWORD\nNewPassword"))
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = childStdin.Close()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = cmd.Wait()
|
2018-04-01 21:23:32 +02:00
|
|
|
exitCode := test_helpers.ExtractCmdExitCode(err)
|
2017-05-14 13:14:00 +02:00
|
|
|
if exitCode != exitcodes.PasswordIncorrect {
|
|
|
|
t.Errorf("want=%d, got=%d", exitcodes.PasswordIncorrect, exitCode)
|
|
|
|
}
|
|
|
|
}
|
2017-07-23 20:28:41 +02:00
|
|
|
|
|
|
|
// Check that we correctly background on mount and close stderr and stdout.
|
|
|
|
// Something like
|
|
|
|
// gocryptfs a b | cat
|
|
|
|
// must not hang ( https://github.com/rfjakob/gocryptfs/issues/130 ).
|
|
|
|
func TestMountBackground(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
err := os.Mkdir(mnt, 0700)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// Manually create a pipe pair and connect the child's stdout and stderr
|
|
|
|
// to it. We cannot use StdoutPipe because that will close the pipe
|
|
|
|
// when the child forks away.
|
|
|
|
pr, pw, err := os.Pipe()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
args := []string{"-extpass", "echo test", dir, mnt}
|
|
|
|
cmd := exec.Command(test_helpers.GocryptfsBinary, args...)
|
|
|
|
cmd.Stdout = pw
|
|
|
|
cmd.Stderr = pw
|
|
|
|
err = cmd.Run()
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
pw.Close()
|
|
|
|
defer test_helpers.UnmountPanic(mnt)
|
|
|
|
// Read until we get EOF.
|
|
|
|
c1 := make(chan struct{}, 1)
|
|
|
|
go func() {
|
|
|
|
buf := make([]byte, 1000)
|
|
|
|
for {
|
|
|
|
_, err = pr.Read(buf)
|
|
|
|
// We should get io.EOF when the child closes stdout
|
|
|
|
// and stderr.
|
|
|
|
if err != nil {
|
2018-04-07 15:46:41 +02:00
|
|
|
pr.Close()
|
2017-07-23 20:28:41 +02:00
|
|
|
c1 <- struct{}{}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
select {
|
|
|
|
case <-c1:
|
|
|
|
return
|
|
|
|
case <-time.After(time.Second * 5):
|
|
|
|
t.Fatal("timeout")
|
|
|
|
}
|
|
|
|
}
|
2018-04-01 14:25:10 +02:00
|
|
|
|
|
|
|
// Test that "gocryptfs -init -info CIPHERDIR" returns an error to the
|
|
|
|
// user. Only one operation flag is allowed.
|
|
|
|
func TestMultipleOperationFlags(t *testing.T) {
|
|
|
|
// Test all combinations
|
|
|
|
opFlags := []string{"-init", "-info", "-passwd", "-fsck"}
|
|
|
|
for _, flag1 := range opFlags {
|
|
|
|
var flag2 string
|
|
|
|
for _, flag2 = range opFlags {
|
|
|
|
if flag1 == flag2 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
args := []string{flag1, flag2, "/tmp"}
|
|
|
|
//t.Logf("testing %v", args)
|
|
|
|
cmd := exec.Command(test_helpers.GocryptfsBinary, args...)
|
|
|
|
err := cmd.Run()
|
2018-04-01 21:23:32 +02:00
|
|
|
exitCode := test_helpers.ExtractCmdExitCode(err)
|
2018-04-01 14:25:10 +02:00
|
|
|
if exitCode != exitcodes.Usage {
|
|
|
|
t.Fatalf("this should have failed with code %d, but returned %d",
|
|
|
|
exitcodes.Usage, exitCode)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2018-06-05 21:02:35 +02:00
|
|
|
|
2018-06-07 22:50:30 +02:00
|
|
|
func TestNoexec(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
err := os.Mkdir(mnt, 0700)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-extpass=echo test", "-noexec")
|
|
|
|
defer test_helpers.UnmountPanic(mnt)
|
|
|
|
sh := mnt + "/x.sh"
|
|
|
|
content := `#!/bin/bash
|
|
|
|
echo hello
|
|
|
|
`
|
|
|
|
err = ioutil.WriteFile(sh, []byte(content), 0755)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = exec.Command(sh).Run()
|
|
|
|
exitCode := test_helpers.ExtractCmdExitCode(err)
|
|
|
|
if exitCode != int(syscall.EACCES) {
|
|
|
|
t.Errorf("got exitcode %d instead of EPERM (%d)", exitCode, syscall.EPERM)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-06-05 21:02:35 +02:00
|
|
|
// Test that a missing argument to "-o" triggers exit code 1.
|
|
|
|
// See also cli_args_test.go for comprehensive tests of "-o" parsing.
|
|
|
|
func TestMissingOArg(t *testing.T) {
|
|
|
|
cmd := exec.Command(test_helpers.GocryptfsBinary, "foo", "bar", "-o")
|
|
|
|
err := cmd.Run()
|
|
|
|
exitCode := test_helpers.ExtractCmdExitCode(err)
|
|
|
|
if exitCode != exitcodes.Usage {
|
|
|
|
t.Fatalf("this should have failed with code %d, but returned %d",
|
|
|
|
exitcodes.Usage, exitCode)
|
|
|
|
}
|
|
|
|
}
|
2018-08-11 23:26:49 +02:00
|
|
|
|
|
|
|
// -exclude must return an error in forward mode
|
|
|
|
func TestExcludeForward(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
err := test_helpers.Mount(dir, mnt, false, "-extpass", "echo test", "-exclude", "foo")
|
|
|
|
if err == nil {
|
|
|
|
t.Errorf("-exclude in forward mode should fail")
|
|
|
|
}
|
|
|
|
t.Log(err)
|
|
|
|
}
|
2018-09-08 13:04:33 +02:00
|
|
|
|
|
|
|
// Check that the config file can be read from a named pipe.
|
|
|
|
// Make sure bug https://github.com/rfjakob/gocryptfs/issues/258 does not come
|
|
|
|
// back.
|
|
|
|
func TestConfigPipe(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
err := os.Mkdir(mnt, 0700)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
bashLine := fmt.Sprintf("%s -q -extpass \"echo test\" -config <(cat %s/gocryptfs.conf) %s %s", test_helpers.GocryptfsBinary, dir, dir, mnt)
|
|
|
|
cmd := exec.Command("bash", "-c", bashLine)
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stdout
|
|
|
|
err = cmd.Run()
|
|
|
|
exitCode := test_helpers.ExtractCmdExitCode(err)
|
|
|
|
if exitCode != 0 {
|
|
|
|
t.Errorf("bash command\n%q\nresulted in exit code %d", bashLine, exitCode)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
test_helpers.UnmountPanic(mnt)
|
|
|
|
}
|
2018-09-18 19:35:31 +02:00
|
|
|
|
|
|
|
// Ciphertext dir and mountpoint contains a comma
|
|
|
|
// https://github.com/rfjakob/gocryptfs/issues/262
|
|
|
|
func TestComma(t *testing.T) {
|
|
|
|
dir0 := test_helpers.InitFS(t)
|
|
|
|
dir := dir0 + ",foo,bar"
|
|
|
|
err := os.Rename(dir0, dir)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
err = test_helpers.Mount(dir, mnt, false, "-extpass", "echo test", "-wpanic=0")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to mount %q on %q: %v", dir, mnt, err)
|
|
|
|
}
|
|
|
|
test_helpers.UnmountPanic(mnt)
|
|
|
|
}
|
2018-10-11 20:43:28 +02:00
|
|
|
|
|
|
|
// Mount with idle timeout 10ms and check that the process exits by itself
|
|
|
|
// within 5 seconds.
|
|
|
|
func TestIdle(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
err := os.Mkdir(mnt, 0700)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
cmd := exec.Command(test_helpers.GocryptfsBinary,
|
|
|
|
"-q", "-nosyslog", "-fg", "-extpass", "echo test", "-i", "10ms", dir, mnt)
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
2018-10-11 20:57:52 +02:00
|
|
|
err = cmd.Start()
|
|
|
|
if err != nil {
|
2018-10-11 20:43:28 +02:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
timer := time.AfterFunc(5*time.Second, func() {
|
|
|
|
t.Error("timeout waiting for umount")
|
|
|
|
cmd.Process.Kill()
|
|
|
|
})
|
|
|
|
err = cmd.Wait()
|
|
|
|
timer.Stop()
|
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
}
|
2019-09-08 16:16:18 +02:00
|
|
|
|
|
|
|
// Mount with idle timeout of 100ms read something every 10ms. The fs should
|
|
|
|
// NOT get unmounted. Regression test for https://github.com/rfjakob/gocryptfs/issues/421
|
|
|
|
func TestNotIdle(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
err := os.Mkdir(mnt, 0700)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = test_helpers.Mount(dir, mnt, false, "-extpass", "echo test", "-i=100ms")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
err = ioutil.WriteFile(mnt+"/foo", []byte("foo"), 0600)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// Read every 10 milliseconds for a total of 1 second
|
|
|
|
for i := 1; i < 100; i++ {
|
|
|
|
_, err = ioutil.ReadFile(mnt + "/foo")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("iteration %d failed: %v", i, err)
|
|
|
|
}
|
|
|
|
time.Sleep(10 * time.Millisecond)
|
|
|
|
}
|
|
|
|
// Keep a file handle open for 1 second
|
|
|
|
fd, err := os.Open(mnt + "/foo")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
time.Sleep(1 * time.Second)
|
|
|
|
buf := make([]byte, 100)
|
|
|
|
_, err = fd.Read(buf)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
fd.Close()
|
|
|
|
// All good.
|
|
|
|
test_helpers.UnmountPanic(mnt)
|
|
|
|
}
|
2020-01-25 16:54:57 +01:00
|
|
|
|
|
|
|
// TestSymlinkedCipherdir checks that if CIPHERDIR itself is a symlink, it is
|
|
|
|
// followed.
|
|
|
|
// https://github.com/rfjakob/gocryptfs/issues/450
|
|
|
|
func TestSymlinkedCipherdir(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
dirSymlink := dir + ".symlink"
|
|
|
|
err := os.Symlink(dir, dirSymlink)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
test_helpers.MountOrFatal(t, dirSymlink, mnt, "-extpass=echo test")
|
|
|
|
defer test_helpers.UnmountPanic(mnt)
|
|
|
|
|
|
|
|
file := mnt + "/file"
|
|
|
|
f, err := os.Create(file)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
f.Close()
|
|
|
|
|
|
|
|
f, err = os.Open(mnt)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
names, err := f.Readdirnames(0)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(names) != 1 || names[0] != "file" {
|
|
|
|
t.Errorf("wrong Readdirnames result: %v", names)
|
|
|
|
}
|
|
|
|
}
|
2019-09-14 18:32:54 +02:00
|
|
|
|
2020-05-09 15:29:21 +02:00
|
|
|
// TestBadname tests the `-badname` option
|
|
|
|
func TestBadname(t *testing.T) {
|
2019-09-14 18:32:54 +02:00
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
2020-05-19 13:34:58 +02:00
|
|
|
validFileName := "file"
|
|
|
|
invalidSuffix := ".invalid_file"
|
2019-09-14 18:32:54 +02:00
|
|
|
|
2020-06-06 12:50:39 +02:00
|
|
|
// use static suffix for testing
|
2019-09-14 18:32:54 +02:00
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-badname=*", "-extpass=echo test")
|
|
|
|
defer test_helpers.UnmountPanic(mnt)
|
|
|
|
|
2020-06-06 12:50:39 +02:00
|
|
|
// write one valid filename (empty content)
|
2020-05-19 13:34:58 +02:00
|
|
|
file := mnt + "/" + validFileName
|
2020-06-06 12:50:39 +02:00
|
|
|
err := ioutil.WriteFile(file, nil, 0600)
|
2019-09-14 18:32:54 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2020-06-06 12:50:39 +02:00
|
|
|
// read encrypted file name
|
2020-05-19 13:34:58 +02:00
|
|
|
fread, err := os.Open(dir)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer fread.Close()
|
|
|
|
|
|
|
|
encryptedfilename := ""
|
|
|
|
ciphernames, err := fread.Readdirnames(0)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
for _, ciphername := range ciphernames {
|
|
|
|
if ciphername != "gocryptfs.conf" && ciphername != "gocryptfs.diriv" {
|
|
|
|
encryptedfilename = ciphername
|
2020-06-06 12:50:39 +02:00
|
|
|
// found cipher name of "file"
|
|
|
|
break
|
2020-05-19 13:34:58 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-06 12:50:39 +02:00
|
|
|
// write invalid file which should be decodable
|
|
|
|
err = ioutil.WriteFile(dir+"/"+encryptedfilename+invalidSuffix, nil, 0600)
|
2020-05-19 13:34:58 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2020-06-06 12:50:39 +02:00
|
|
|
// write invalid file which is not decodable (cropping the encrpyted file name)
|
|
|
|
err = ioutil.WriteFile(dir+"/"+encryptedfilename[:len(encryptedfilename)-2]+invalidSuffix, nil, 0600)
|
2019-09-14 18:32:54 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2020-06-06 12:50:39 +02:00
|
|
|
// check for filenames
|
2019-09-14 18:32:54 +02:00
|
|
|
f, err := os.Open(mnt)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
names, err := f.Readdirnames(0)
|
2020-05-19 13:34:58 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
foundDecodable := false
|
|
|
|
foundUndecodable := false
|
2019-09-14 18:32:54 +02:00
|
|
|
for _, name := range names {
|
2020-05-19 13:34:58 +02:00
|
|
|
if strings.Contains(name, validFileName+invalidSuffix+" GOCRYPTFS_BAD_NAME") {
|
|
|
|
foundDecodable = true
|
|
|
|
} else if strings.Contains(name, encryptedfilename[:len(encryptedfilename)-2]+invalidSuffix+" GOCRYPTFS_BAD_NAME") {
|
|
|
|
foundUndecodable = true
|
2019-09-14 18:32:54 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-19 13:34:58 +02:00
|
|
|
if !foundDecodable {
|
|
|
|
t.Errorf("did not find invalid name %s in %v", validFileName+invalidSuffix+" GOCRYPTFS_BAD_NAME", names)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !foundUndecodable {
|
|
|
|
t.Errorf("did not find invalid name %s in %v", encryptedfilename[:len(encryptedfilename)-2]+invalidSuffix+" GOCRYPTFS_BAD_NAME", names)
|
2019-09-14 18:32:54 +02:00
|
|
|
}
|
|
|
|
}
|
2020-05-17 19:31:04 +02:00
|
|
|
|
|
|
|
// TestPassfile tests the `-passfile` option
|
|
|
|
func TestPassfile(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
passfile1 := mnt + ".1.txt"
|
|
|
|
ioutil.WriteFile(passfile1, []byte("test"), 0600)
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-passfile="+passfile1)
|
|
|
|
defer test_helpers.UnmountPanic(mnt)
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestPassfileX2 tests that the `-passfile` option can be passed twice
|
|
|
|
func TestPassfileX2(t *testing.T) {
|
|
|
|
dir := test_helpers.InitFS(t)
|
|
|
|
mnt := dir + ".mnt"
|
|
|
|
passfile1 := mnt + ".1.txt"
|
|
|
|
passfile2 := mnt + ".2.txt"
|
|
|
|
ioutil.WriteFile(passfile1, []byte("te"), 0600)
|
|
|
|
ioutil.WriteFile(passfile2, []byte("st"), 0600)
|
|
|
|
test_helpers.MountOrFatal(t, dir, mnt, "-passfile="+passfile1, "-passfile="+passfile2)
|
|
|
|
defer test_helpers.UnmountPanic(mnt)
|
|
|
|
}
|