Skip to content

Commit 83f5a79

Browse files
committed
e2e_tests: Add logging tests
This test case covers mitigation 3 of the threat model. https://parallaxsecond.github.io/parsec-book/parsec_security/parsec_threat_model/threat_model.html It's ignored by default so that local testing is unaffected by it. On the CI we explicity run the test after diverting the parsec service logs to a log file. Signed-off-by: Gowtham Suresh Kumar <[email protected]>
1 parent 8442fb4 commit 83f5a79

File tree

3 files changed

+51
-0
lines changed

3 files changed

+51
-0
lines changed

ci.sh

+12
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ cleanup () {
2121
rm -f "NVChip"
2222
rm -f "e2e_tests/provider_cfg/tmp_config.toml"
2323
rm -f "parsec.sock"
24+
rm -f parsec_logging.txt
2425

2526
if [ -z "$NO_CARGO_CLEAN" ]; then cargo clean; fi
2627
}
@@ -451,6 +452,17 @@ if [ "$PROVIDER_NAME" = "all" ]; then
451452
# Last test as it changes the service configuration
452453
echo "Execute all-providers config tests"
453454
RUST_BACKTRACE=1 cargo test $TEST_FEATURES --manifest-path ./e2e_tests/Cargo.toml all_providers::config -- --test-threads=1
455+
456+
stop_service
457+
rm -rf mappings/
458+
rm -rf kim-mappings/
459+
rm -f *.psa_its
460+
461+
# Redirect the parsec service logs to parsec_logging.txt and run "check_log_source" test to ensure that the
462+
# logs contain the source module path.
463+
RUST_LOG=info RUST_BACKTRACE=1 cargo run --release $FEATURES -- --config ./e2e_tests/provider_cfg/mbed-crypto/config.toml > parsec_logging.txt 2>&1 &
464+
wait_for_service
465+
RUST_BACKTRACE=1 cargo test $TEST_FEATURES --manifest-path ./e2e_tests/Cargo.toml all_providers::logging -- --ignored check_log_source
454466
else
455467
setup_mappings ondisk
456468
# Add the fake mappings for the key mappings test as well. The test will check that
+38
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
// Copyright 2024 Contributors to the Parsec project.
2+
// SPDX-License-Identifier: Apache-2.0
3+
4+
use e2e_tests::TestClient;
5+
use parsec_client::core::interface::requests::ProviderId;
6+
use std::fs;
7+
8+
// Ignore this test case for manual test runs. This is executed on the CI after the parsec service logs are
9+
// redirected to a log file (parsec_logging.txt) for testing purpose.
10+
#[ignore]
11+
#[test]
12+
fn check_log_source() {
13+
let mut client = TestClient::new();
14+
15+
// Perform key generation and encryption to generate expected logs
16+
client.set_provider(ProviderId::MbedCrypto);
17+
client.set_default_auth(Some("logging".to_string()));
18+
client
19+
.generate_rsa_sign_key(String::from("test_key"))
20+
.unwrap();
21+
let _ = client
22+
.asymmetric_encrypt_message_with_rsapkcs1v15(String::from("test_key"), vec![0xa5; 16])
23+
.unwrap_err();
24+
25+
// Read parsec log file contents
26+
let logs: String =
27+
fs::read_to_string("/tmp/parsec/parsec_logging.txt").expect("Failure in reading the file");
28+
29+
// Ensure logs contains INFO, WARN and ERROR message arising from different modules and crates
30+
assert!(logs.contains(
31+
"[INFO parsec_service::front::front_end] New request received without authentication"
32+
));
33+
assert!(logs
34+
.contains("[WARN parsec_service::key_info_managers::on_disk_manager] Saving Key Triple"));
35+
assert!(logs.contains(
36+
"[ERROR psa_crypto::types::key] Key attributes do not permit encrypting messages."
37+
));
38+
}

e2e_tests/tests/all_providers/mod.rs

+1
Original file line numberDiff line numberDiff line change
@@ -3,5 +3,6 @@
33

44
mod config;
55
mod cross;
6+
mod logging;
67
mod multitenancy;
78
mod normal;

0 commit comments

Comments
 (0)