mirror of
https://github.com/systemd/systemd
synced 2025-10-06 00:13:24 +02:00
test: add coverage for kernel keyring in TEST-50-DISSECT
Use the kernel keyring to verify images in the dissect test. The userspace keyring is still covered by the DDI and mountfsd tests.
This commit is contained in:
@@ -13,3 +13,6 @@ if [ -n "$EFI_ARCHITECTURE" ]; then
|
|||||||
--secureboot-certificate "$SRCDIR/mkosi/mkosi.crt" \
|
--secureboot-certificate "$SRCDIR/mkosi/mkosi.crt" \
|
||||||
--secureboot-private-key "$SRCDIR/mkosi/mkosi.key"
|
--secureboot-private-key "$SRCDIR/mkosi/mkosi.key"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# Used to sign artifacts verified by kernel platform keyring
|
||||||
|
cp "$SRCDIR/mkosi/mkosi.crt" "$SRCDIR/mkosi/mkosi.key" "$BUILDROOT/usr/share/"
|
||||||
|
@@ -4,5 +4,6 @@ integration_tests += [
|
|||||||
integration_test_template + {
|
integration_test_template + {
|
||||||
'name' : fs.name(meson.current_source_dir()),
|
'name' : fs.name(meson.current_source_dir()),
|
||||||
'vm' : true,
|
'vm' : true,
|
||||||
|
'firmware' : 'auto',
|
||||||
},
|
},
|
||||||
]
|
]
|
||||||
|
@@ -9,6 +9,18 @@ set -o pipefail
|
|||||||
# shellcheck source=test/units/util.sh
|
# shellcheck source=test/units/util.sh
|
||||||
. "$(dirname "$0")"/util.sh
|
. "$(dirname "$0")"/util.sh
|
||||||
|
|
||||||
|
# Requires kernel built with certain kconfigs, as listed in README:
|
||||||
|
# https://oracle.github.io/kconfigs/?config=UTS_RELEASE&config=DM_VERITY_VERIFY_ROOTHASH_SIG&config=DM_VERITY_VERIFY_ROOTHASH_SIG_SECONDARY_KEYRING&config=DM_VERITY_VERIFY_ROOTHASH_SIG_PLATFORM_KEYRING&config=IMA_ARCH_POLICY&config=INTEGRITY_MACHINE_KEYRING
|
||||||
|
if grep -q "$(openssl x509 -noout -subject -in /usr/share/mkosi.crt | sed 's/^.*CN=//')" /proc/keys && \
|
||||||
|
( . /etc/os-release; [ "$ID" != "centos" ] || systemd-analyze compare-versions "$VERSION_ID" ge 10 ) && \
|
||||||
|
( . /etc/os-release; [ "$ID" != "debian" ] || systemd-analyze compare-versions "$VERSION_ID" ge 13 ) && \
|
||||||
|
( . /etc/os-release; [ "$ID" != "ubuntu" ] || systemd-analyze compare-versions "$VERSION_ID" ge 24.04 ) && \
|
||||||
|
systemd-analyze compare-versions "$(cryptsetup --version | sed 's/^cryptsetup \([0-9]*\.[0-9]*\.[0-9]*\) .*/\1/')" ge 2.3.0; then
|
||||||
|
verity_sig_supported=1
|
||||||
|
else
|
||||||
|
verity_sig_supported=0
|
||||||
|
fi
|
||||||
|
|
||||||
systemd-dissect --json=short "$MINIMAL_IMAGE.raw" | \
|
systemd-dissect --json=short "$MINIMAL_IMAGE.raw" | \
|
||||||
grep -q -F '{"rw":"ro","designator":"root","partition_uuid":null,"partition_label":null,"fstype":"squashfs","architecture":null,"verity":"external"'
|
grep -q -F '{"rw":"ro","designator":"root","partition_uuid":null,"partition_label":null,"fstype":"squashfs","architecture":null,"verity":"external"'
|
||||||
systemd-dissect "$MINIMAL_IMAGE.raw" | grep -q -F "MARKER=1"
|
systemd-dissect "$MINIMAL_IMAGE.raw" | grep -q -F "MARKER=1"
|
||||||
@@ -71,6 +83,10 @@ if [[ "$verity_count" -lt 1 ]]; then
|
|||||||
echo "Verity device $MINIMAL_IMAGE.raw not found in /dev/mapper/"
|
echo "Verity device $MINIMAL_IMAGE.raw not found in /dev/mapper/"
|
||||||
exit 1
|
exit 1
|
||||||
fi
|
fi
|
||||||
|
# Ensure the kernel is verifying the signature if the mkosi key is in the keyring
|
||||||
|
if [ "$verity_sig_supported" -eq 1 ]; then
|
||||||
|
veritysetup status "$(cat "$MINIMAL_IMAGE.roothash")-verity" | grep -q "verified (with signature)"
|
||||||
|
fi
|
||||||
systemd-dissect --umount "$IMAGE_DIR/mount"
|
systemd-dissect --umount "$IMAGE_DIR/mount"
|
||||||
systemd-dissect --umount "$IMAGE_DIR/mount2"
|
systemd-dissect --umount "$IMAGE_DIR/mount2"
|
||||||
|
|
||||||
@@ -729,6 +745,10 @@ ExecStart=bash -x -c ' \
|
|||||||
EOF
|
EOF
|
||||||
systemctl start testservice-50k.service
|
systemctl start testservice-50k.service
|
||||||
systemctl is-active testservice-50k.service
|
systemctl is-active testservice-50k.service
|
||||||
|
# Ensure the kernel is verifying the signature if the mkosi key is in the keyring
|
||||||
|
if [ "$verity_sig_supported" -eq 1 ]; then
|
||||||
|
veritysetup status "$(cat "$MINIMAL_IMAGE.roothash")-verity" | grep -q "verified (with signature)"
|
||||||
|
fi
|
||||||
# First reload should pick up the v1 marker
|
# First reload should pick up the v1 marker
|
||||||
mksquashfs "$VDIR/${VBASE}_1" "$VDIR2/${VBASE}_1.raw"
|
mksquashfs "$VDIR/${VBASE}_1" "$VDIR2/${VBASE}_1.raw"
|
||||||
systemctl reload testservice-50k.service
|
systemctl reload testservice-50k.service
|
||||||
|
@@ -110,17 +110,9 @@ install_extension_images
|
|||||||
|
|
||||||
OS_RELEASE="$(test -e /etc/os-release && echo /etc/os-release || echo /usr/lib/os-release)"
|
OS_RELEASE="$(test -e /etc/os-release && echo /etc/os-release || echo /usr/lib/os-release)"
|
||||||
|
|
||||||
if systemctl --version | grep -q -- +OPENSSL ; then
|
OPENSSL_CONFIG="$(mktemp)"
|
||||||
# The openssl binary is installed conditionally. If we have OpenSSL support enabled and openssl is
|
# Unfortunately OpenSSL insists on reading some config file, hence provide one with mostly placeholder contents
|
||||||
# missing, fail early with a proper error message.
|
cat >"${OPENSSL_CONFIG:?}" <<EOF
|
||||||
if ! command -v openssl &>/dev/null; then
|
|
||||||
echo "openssl binary is missing" >/failed
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
OPENSSL_CONFIG="$(mktemp)"
|
|
||||||
# Unfortunately OpenSSL insists on reading some config file, hence provide one with mostly placeholder contents
|
|
||||||
cat >"${OPENSSL_CONFIG:?}" <<EOF
|
|
||||||
[ req ]
|
[ req ]
|
||||||
prompt = no
|
prompt = no
|
||||||
distinguished_name = req_distinguished_name
|
distinguished_name = req_distinguished_name
|
||||||
@@ -134,7 +126,6 @@ OU = Org Unit Name
|
|||||||
CN = Common Name
|
CN = Common Name
|
||||||
emailAddress = test@email.com
|
emailAddress = test@email.com
|
||||||
EOF
|
EOF
|
||||||
fi
|
|
||||||
|
|
||||||
# Make a GPT disk on the fly, with the squashfs as partition 1 and the verity hash tree as partition 2
|
# Make a GPT disk on the fly, with the squashfs as partition 1 and the verity hash tree as partition 2
|
||||||
#
|
#
|
||||||
@@ -154,25 +145,17 @@ fi
|
|||||||
verity_size="$((verity_size * 2))KiB"
|
verity_size="$((verity_size * 2))KiB"
|
||||||
signature_size="$((signature_size * 2))KiB"
|
signature_size="$((signature_size * 2))KiB"
|
||||||
|
|
||||||
if [[ -n "${OPENSSL_CONFIG:-}" ]]; then
|
# Sign Verity root hash with mkosi key
|
||||||
# Create key pair
|
openssl smime -sign -nocerts -noattr -binary \
|
||||||
openssl req -config "$OPENSSL_CONFIG" -new -x509 -newkey rsa:1024 \
|
-in "$MINIMAL_IMAGE.roothash" \
|
||||||
-keyout "$MINIMAL_IMAGE.key" -out "$MINIMAL_IMAGE.crt" -days 365 -nodes
|
-inkey /usr/share/mkosi.key \
|
||||||
# Sign Verity root hash with it
|
-signer /usr/share/mkosi.crt \
|
||||||
openssl smime -sign -nocerts -noattr -binary \
|
-outform der \
|
||||||
-in "$MINIMAL_IMAGE.roothash" \
|
-out "$MINIMAL_IMAGE.roothash.p7s"
|
||||||
-inkey "$MINIMAL_IMAGE.key" \
|
# Generate signature partition JSON data
|
||||||
-signer "$MINIMAL_IMAGE.crt" \
|
echo '{"rootHash":"'"$MINIMAL_IMAGE_ROOTHASH"'","signature":"'"$(base64 -w 0 <"$MINIMAL_IMAGE.roothash.p7s")"'"}' >"$MINIMAL_IMAGE.verity-sig"
|
||||||
-outform der \
|
# Pad it
|
||||||
-out "$MINIMAL_IMAGE.roothash.p7s"
|
truncate -s "$signature_size" "$MINIMAL_IMAGE.verity-sig"
|
||||||
# Generate signature partition JSON data
|
|
||||||
echo '{"rootHash":"'"$MINIMAL_IMAGE_ROOTHASH"'","signature":"'"$(base64 -w 0 <"$MINIMAL_IMAGE.roothash.p7s")"'"}' >"$MINIMAL_IMAGE.verity-sig"
|
|
||||||
# Pad it
|
|
||||||
truncate -s "$signature_size" "$MINIMAL_IMAGE.verity-sig"
|
|
||||||
# Register certificate in the (userspace) verity key ring
|
|
||||||
mkdir -p /run/verity.d
|
|
||||||
ln -s "$MINIMAL_IMAGE.crt" /run/verity.d/ok.crt
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Construct a UUID from hash
|
# Construct a UUID from hash
|
||||||
# input: 11111111222233334444555566667777
|
# input: 11111111222233334444555566667777
|
||||||
@@ -181,30 +164,23 @@ uuid="$(head -c 32 "$MINIMAL_IMAGE.roothash" | sed -r 's/(.{8})(.{4})(.{4})(.{4}
|
|||||||
echo -e "label: gpt\nsize=$root_size, type=$ROOT_GUID, uuid=$uuid" | sfdisk "$MINIMAL_IMAGE.gpt"
|
echo -e "label: gpt\nsize=$root_size, type=$ROOT_GUID, uuid=$uuid" | sfdisk "$MINIMAL_IMAGE.gpt"
|
||||||
uuid="$(tail -c 32 "$MINIMAL_IMAGE.roothash" | sed -r 's/(.{8})(.{4})(.{4})(.{4})(.+)/\1-\2-\3-\4-\5/')"
|
uuid="$(tail -c 32 "$MINIMAL_IMAGE.roothash" | sed -r 's/(.{8})(.{4})(.{4})(.{4})(.+)/\1-\2-\3-\4-\5/')"
|
||||||
echo -e "size=$verity_size, type=$VERITY_GUID, uuid=$uuid" | sfdisk "$MINIMAL_IMAGE.gpt" --append
|
echo -e "size=$verity_size, type=$VERITY_GUID, uuid=$uuid" | sfdisk "$MINIMAL_IMAGE.gpt" --append
|
||||||
if [[ -n "${OPENSSL_CONFIG:-}" ]]; then
|
echo -e "size=$signature_size, type=$SIGNATURE_GUID" | sfdisk "$MINIMAL_IMAGE.gpt" --append
|
||||||
echo -e "size=$signature_size, type=$SIGNATURE_GUID" | sfdisk "$MINIMAL_IMAGE.gpt" --append
|
|
||||||
fi
|
|
||||||
sfdisk --part-label "$MINIMAL_IMAGE.gpt" 1 "Root Partition"
|
sfdisk --part-label "$MINIMAL_IMAGE.gpt" 1 "Root Partition"
|
||||||
sfdisk --part-label "$MINIMAL_IMAGE.gpt" 2 "Verity Partition"
|
sfdisk --part-label "$MINIMAL_IMAGE.gpt" 2 "Verity Partition"
|
||||||
if [[ -n "${OPENSSL_CONFIG:-}" ]]; then
|
sfdisk --part-label "$MINIMAL_IMAGE.gpt" 3 "Signature Partition"
|
||||||
sfdisk --part-label "$MINIMAL_IMAGE.gpt" 3 "Signature Partition"
|
|
||||||
fi
|
|
||||||
loop="$(losetup --show -P -f "$MINIMAL_IMAGE.gpt")"
|
loop="$(losetup --show -P -f "$MINIMAL_IMAGE.gpt")"
|
||||||
partitions=(
|
partitions=(
|
||||||
"${loop:?}p1"
|
"${loop:?}p1"
|
||||||
"${loop:?}p2"
|
"${loop:?}p2"
|
||||||
|
"${loop:?}p3"
|
||||||
)
|
)
|
||||||
if [[ -n "${OPENSSL_CONFIG:-}" ]]; then
|
|
||||||
partitions+=("${loop:?}p3")
|
|
||||||
fi
|
|
||||||
# The kernel sometimes(?) does not emit "add" uevent for loop block partition devices.
|
# The kernel sometimes(?) does not emit "add" uevent for loop block partition devices.
|
||||||
# Let's not expect the devices to be initialized.
|
# Let's not expect the devices to be initialized.
|
||||||
udevadm wait --timeout=60 --settle --initialized=no "${partitions[@]}"
|
udevadm wait --timeout=60 --settle --initialized=no "${partitions[@]}"
|
||||||
udevadm lock --timeout=60 --device="${loop}p1" dd if="$MINIMAL_IMAGE.raw" of="${loop}p1"
|
udevadm lock --timeout=60 --device="${loop}p1" dd if="$MINIMAL_IMAGE.raw" of="${loop}p1"
|
||||||
udevadm lock --timeout=60 --device="${loop}p2" dd if="$MINIMAL_IMAGE.verity" of="${loop}p2"
|
udevadm lock --timeout=60 --device="${loop}p2" dd if="$MINIMAL_IMAGE.verity" of="${loop}p2"
|
||||||
if [[ -n "${OPENSSL_CONFIG:-}" ]]; then
|
udevadm lock --timeout=60 --device="${loop}p3" dd if="$MINIMAL_IMAGE.verity-sig" of="${loop}p3"
|
||||||
udevadm lock --timeout=60 --device="${loop}p3" dd if="$MINIMAL_IMAGE.verity-sig" of="${loop}p3"
|
|
||||||
fi
|
|
||||||
losetup -d "$loop"
|
losetup -d "$loop"
|
||||||
udevadm settle --timeout=60
|
udevadm settle --timeout=60
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user