2017-05-07 21:01:39 +02:00
|
|
|
package defaults
|
|
|
|
|
|
|
|
import (
|
|
|
|
"os"
|
|
|
|
"syscall"
|
|
|
|
"testing"
|
|
|
|
|
2021-08-23 15:05:15 +02:00
|
|
|
"github.com/rfjakob/gocryptfs/v2/ctlsock"
|
|
|
|
"github.com/rfjakob/gocryptfs/v2/tests/test_helpers"
|
2017-05-07 21:01:39 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestCtlSock(t *testing.T) {
|
|
|
|
cDir := test_helpers.InitFS(t)
|
|
|
|
pDir := cDir + ".mnt"
|
|
|
|
sock := cDir + ".sock"
|
|
|
|
test_helpers.MountOrFatal(t, cDir, pDir, "-ctlsock="+sock, "-extpass", "echo test")
|
|
|
|
defer test_helpers.UnmountPanic(pDir)
|
|
|
|
req := ctlsock.RequestStruct{
|
|
|
|
EncryptPath: "foobar",
|
|
|
|
}
|
|
|
|
response := test_helpers.QueryCtlSock(t, sock, req)
|
|
|
|
if response.Result == "" || response.ErrNo != 0 {
|
|
|
|
t.Errorf("got an error reply: %+v", response)
|
|
|
|
}
|
|
|
|
req.EncryptPath = "not-existing-dir/xyz"
|
|
|
|
response = test_helpers.QueryCtlSock(t, sock, req)
|
|
|
|
if response.ErrNo != int32(syscall.ENOENT) || response.Result != "" {
|
2018-04-02 18:32:30 +02:00
|
|
|
t.Errorf("incorrect error handling: wanted ErrNo=%d, have %+v", syscall.ENOENT, response)
|
2017-05-07 21:01:39 +02:00
|
|
|
}
|
|
|
|
// Strange paths should not cause a crash
|
|
|
|
crashers := []string{"/foo", "foo/", "/foo/", ".", "/////", "/../../."}
|
|
|
|
for _, c := range crashers {
|
|
|
|
req.EncryptPath = c
|
|
|
|
// QueryCtlSock calls t.Fatal if it gets EOF when gocryptfs panics
|
|
|
|
response = test_helpers.QueryCtlSock(t, sock, req)
|
|
|
|
if response.WarnText == "" {
|
|
|
|
t.Errorf("We should get a warning about non-canonical paths here")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCtlSockDecrypt(t *testing.T) {
|
|
|
|
cDir := test_helpers.InitFS(t)
|
|
|
|
pDir := cDir + ".mnt"
|
|
|
|
sock := cDir + ".sock"
|
|
|
|
test_helpers.MountOrFatal(t, cDir, pDir, "-ctlsock="+sock, "-extpass", "echo test")
|
|
|
|
defer test_helpers.UnmountPanic(pDir)
|
|
|
|
|
|
|
|
paths := []string{
|
|
|
|
"xxxxxxx123456789",
|
|
|
|
"foo/bar/baz",
|
|
|
|
test_helpers.X255,
|
|
|
|
"123/" + test_helpers.X255,
|
|
|
|
"123/" + test_helpers.X255 + "/456",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, p := range paths {
|
|
|
|
// Create path
|
|
|
|
err := os.MkdirAll(pDir+"/"+p, 0700)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// Encrypt the path through the ctlsock
|
|
|
|
req := ctlsock.RequestStruct{
|
|
|
|
EncryptPath: p,
|
|
|
|
}
|
|
|
|
response := test_helpers.QueryCtlSock(t, sock, req)
|
|
|
|
if response.Result == "" || response.ErrNo != 0 {
|
2021-06-26 18:43:15 +02:00
|
|
|
t.Fatalf("got an error for query %+v: %+v", req, response)
|
2017-05-07 21:01:39 +02:00
|
|
|
}
|
|
|
|
// Check if the encrypted path actually exists
|
|
|
|
cPath := response.Result
|
|
|
|
_, err = os.Stat(cDir + "/" + cPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
// Decrypt the path through the ctlsock and see if we get the original path
|
|
|
|
req = ctlsock.RequestStruct{
|
|
|
|
DecryptPath: cPath,
|
|
|
|
}
|
|
|
|
response = test_helpers.QueryCtlSock(t, sock, req)
|
|
|
|
if response.Result == "" || response.ErrNo != 0 {
|
|
|
|
t.Errorf("query=%+v, response=%+v", req, response)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if response.Result != p {
|
|
|
|
t.Errorf("want=%q got=%q", p, response.Result)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestCtlSockDecryptCrash(t *testing.T) {
|
|
|
|
cDir := test_helpers.InitFS(t)
|
|
|
|
pDir := cDir + ".mnt"
|
|
|
|
sock := cDir + ".sock"
|
|
|
|
test_helpers.MountOrFatal(t, cDir, pDir, "-ctlsock="+sock, "-extpass", "echo test")
|
|
|
|
defer test_helpers.UnmountPanic(pDir)
|
|
|
|
}
|