File tree 3 files changed +51
-0
lines changed
e2e_tests/tests/all_providers
3 files changed +51
-0
lines changed Original file line number Diff line number Diff line change @@ -21,6 +21,7 @@ cleanup () {
21
21
rm -f " NVChip"
22
22
rm -f " e2e_tests/provider_cfg/tmp_config.toml"
23
23
rm -f " parsec.sock"
24
+ rm -f parsec_logging.txt
24
25
25
26
if [ -z " $NO_CARGO_CLEAN " ]; then cargo clean; fi
26
27
}
@@ -451,6 +452,17 @@ if [ "$PROVIDER_NAME" = "all" ]; then
451
452
# Last test as it changes the service configuration
452
453
echo " Execute all-providers config tests"
453
454
RUST_BACKTRACE=1 cargo test $TEST_FEATURES --manifest-path ./e2e_tests/Cargo.toml all_providers::config -- --test-threads=1
455
+
456
+ stop_service
457
+ rm -rf mappings/
458
+ rm -rf kim-mappings/
459
+ rm -f * .psa_its
460
+
461
+ # Redirect the parsec service logs to parsec_logging.txt and run "check_log_source" test to ensure that the
462
+ # logs contain the source module path.
463
+ RUST_LOG=info RUST_BACKTRACE=1 cargo run --release $FEATURES -- --config ./e2e_tests/provider_cfg/mbed-crypto/config.toml > parsec_logging.txt 2>&1 &
464
+ wait_for_service
465
+ RUST_BACKTRACE=1 cargo test $TEST_FEATURES --manifest-path ./e2e_tests/Cargo.toml all_providers::logging -- --ignored check_log_source
454
466
else
455
467
setup_mappings ondisk
456
468
# Add the fake mappings for the key mappings test as well. The test will check that
Original file line number Diff line number Diff line change
1
+ // Copyright 2024 Contributors to the Parsec project.
2
+ // SPDX-License-Identifier: Apache-2.0
3
+
4
+ use e2e_tests:: TestClient ;
5
+ use parsec_client:: core:: interface:: requests:: ProviderId ;
6
+ use std:: fs;
7
+
8
+ // Ignore this test case for manual test runs. This is executed on the CI after the parsec service logs are
9
+ // redirected to a log file (parsec_logging.txt) for testing purpose.
10
+ #[ ignore]
11
+ #[ test]
12
+ fn check_log_source ( ) {
13
+ let mut client = TestClient :: new ( ) ;
14
+
15
+ // Perform key generation and encryption to generate expected logs
16
+ client. set_provider ( ProviderId :: MbedCrypto ) ;
17
+ client. set_default_auth ( Some ( "logging" . to_string ( ) ) ) ;
18
+ client
19
+ . generate_rsa_sign_key ( String :: from ( "test_key" ) )
20
+ . unwrap ( ) ;
21
+ let _ = client
22
+ . asymmetric_encrypt_message_with_rsapkcs1v15 ( String :: from ( "test_key" ) , vec ! [ 0xa5 ; 16 ] )
23
+ . unwrap_err ( ) ;
24
+
25
+ // Read parsec log file contents
26
+ let logs: String =
27
+ fs:: read_to_string ( "/tmp/parsec/parsec_logging.txt" ) . expect ( "Failure in reading the file" ) ;
28
+
29
+ // Ensure logs contains INFO, WARN and ERROR message arising from different modules and crates
30
+ assert ! ( logs. contains(
31
+ "[INFO parsec_service::front::front_end] New request received without authentication"
32
+ ) ) ;
33
+ assert ! ( logs
34
+ . contains( "[WARN parsec_service::key_info_managers::on_disk_manager] Saving Key Triple" ) ) ;
35
+ assert ! ( logs. contains(
36
+ "[ERROR psa_crypto::types::key] Key attributes do not permit encrypting messages."
37
+ ) ) ;
38
+ }
Original file line number Diff line number Diff line change 3
3
4
4
mod config;
5
5
mod cross;
6
+ mod logging;
6
7
mod multitenancy;
7
8
mod normal;
You can’t perform that action at this time.
0 commit comments