Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

misc: add fips test #459

Merged
merged 1 commit into from
Oct 10, 2023
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
65 changes: 65 additions & 0 deletions kola/tests/misc/fips.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
// Copyright The Mantle Authors.
// SPDX-License-Identifier: Apache-2.0
package misc

import (
"github.com/coreos/go-semver/semver"
"github.com/flatcar/mantle/kola/cluster"
"github.com/flatcar/mantle/kola/register"
"github.com/flatcar/mantle/platform/conf"
)

func init() {
register.Register(&register.Test{
Run: fipsTest,
ClusterSize: 1,
Name: `misc.fips`,
MinVersion: semver.Version{Major: 3549},
Distros: []string{"cl"},
// This test is normally not related to the cloud environment
Platforms: []string{"qemu", "qemu-unpriv"},
UserData: conf.Butane(`---
version: 1.0.0
variant: flatcar
kernel_arguments:
should_exist:
- fips=1
storage:
files:
- path: /etc/system-fips
- path: /etc/ssl/openssl.cnf
overwrite: true
mode: 0644
contents:
inline: |
config_diagnostics = 1
openssl_conf = openssl_init
# includes the fipsmodule configuration
.include /etc/ssl/fipsmodule.cnf
[openssl_init]
providers = provider_sect
[provider_sect]
fips = fips_sect
base = base_sect
[base_sect]
activate = 1`),
})

}

func fipsTest(c cluster.TestCluster) {
m := c.Machines()[0]

// It works because SHA is FIPS compliant.
c.MustSSH(m, "echo Flatcar | openssl sha512 -")

// Should exit with 0.
c.MustSSH(m, "openssl list -provider fips")

// It does not work because MD5 is not FIPS compliant.
if _, err := c.SSH(m, "echo Flatcar | openssl md5 -"); err == nil {
c.Fatal("MD5 hash algorithm should raise an error with FIPS mode.")
}

c.AssertCmdOutputContains(m, "cat /proc/sys/crypto/fips_enabled", "1")
}