3 TEST_DESCRIPTION
="cryptsetup systemd setup"
4 IMAGE_NAME
="cryptsetup"
7 .
$TEST_BASE_DIR/test-functions
12 [[ -e $initdir/testok
]] && ret
=0
13 [[ -f $initdir/failed
]] && cp -a $initdir/failed
$TESTDIR
14 cryptsetup luksOpen
${LOOPDEV}p2 varcrypt
<$TESTDIR/keyfile
15 mount
/dev
/mapper
/varcrypt
$initdir/var
16 save_journal
$initdir/var
/log
/journal
17 _umount_dir
$initdir/var
19 cryptsetup luksClose
/dev
/mapper
/varcrypt
20 [[ -f $TESTDIR/failed
]] && cat $TESTDIR/failed
22 test -s $TESTDIR/failed
&& ret
=$
(($ret+1))
27 create_empty_image_rootdir
28 echo -n test >$TESTDIR/keyfile
29 cryptsetup
-q luksFormat
--pbkdf pbkdf2
--pbkdf-force-iterations 1000 ${LOOPDEV}p2
$TESTDIR/keyfile
30 cryptsetup luksOpen
${LOOPDEV}p2 varcrypt
<$TESTDIR/keyfile
31 mkfs.ext4
-L var
/dev
/mapper
/varcrypt
33 mount
/dev
/mapper
/varcrypt
$initdir/var
35 # Create what will eventually be our root filesystem onto an overlay
38 eval $
(udevadm info
--export --query=env
--name=/dev
/mapper
/varcrypt
)
39 eval $
(udevadm info
--export --query=env
--name=${LOOPDEV}p2
)
41 setup_basic_environment
42 mask_supporting_services
45 generate_module_dependencies
46 cat >$initdir/etc
/crypttab
<<EOF
47 $DM_NAME UUID=$ID_FS_UUID /etc/varkey
49 echo -n test >$initdir/etc
/varkey
50 cat $initdir/etc
/crypttab | ddebug
52 cat >>$initdir/etc
/fstab
<<EOF
53 /dev/mapper/varcrypt /var ext4 defaults 0 1
56 # Forward journal messages to the console, so we have something
57 # to investigate even if we fail to mount the encrypted /var
58 echo ForwardToConsole
=yes >> $initdir/etc
/systemd
/journald.conf
63 ddebug
"umount $initdir/var"
64 mountpoint
$initdir/var
&& umount
$initdir/var
65 [[ -b /dev
/mapper
/varcrypt
]] && cryptsetup luksClose
/dev
/mapper
/varcrypt
69 # ignore errors, so cleanup can continue
74 test_setup_cleanup
() {