#!/bin/ksh -p # # CDDL HEADER START # # The contents of this file are subject to the terms of the # Common Development and Distribution License (the "License"). # You may not use this file except in compliance with the License. # # You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE # or https://opensource.org/licenses/CDDL-1.0. # See the License for the specific language governing permissions # and limitations under the License. # # When distributing Covered Code, include this CDDL HEADER in each # file and include the License file at usr/src/OPENSOLARIS.LICENSE. # If applicable, add the following below this CDDL HEADER, with the # fields enclosed by brackets "[]" replaced with your own identifying # information: Portions Copyright [yyyy] [name of copyright owner] # # CDDL HEADER END # . $STF_SUITE/include/libtest.shlib . $STF_SUITE/tests/functional/rsend/rsend.kshlib # # Description: # Incrementally receiving a snapshot to an encrypted filesystem succeeds. # # Strategy: # 1) Create a pool and an encrypted fs # 2) Create some files and snapshots # 3) Send the first snapshot to a second encrypted as well as an # unencrypted fs. # 4) Incrementally send the second snapshot to the unencrypted fs. # 5) Rollback the second encrypted fs to the first snapshot. # 6) Incrementally send the second snapshot from the unencrypted to the # second encrypted fs. # 7) Incrementally send the third snapshot from the first encrypted to the # unencrypted fs. # 8) Incrementally send the third snapshot from the unencrypted to the second # encrypted fs. # verify_runnable "both" log_assert "Incrementally receiving a snapshot to an encrypted filesystem succeeds" function cleanup { destroy_pool pool_lb log_must rm -f $TESTDIR/vdev_a } log_onexit cleanup typeset passphrase="password" typeset passphrase2="password2" typeset file="/pool_lb/encryptme/$TESTFILE0" typeset file1="/pool_lb/encryptme/$TESTFILE1" typeset file2="/pool_lb/encryptme/$TESTFILE2" # Create pool truncate -s $MINVDEVSIZE $TESTDIR/vdev_a log_must zpool create -f pool_lb $TESTDIR/vdev_a log_must eval "echo $passphrase > /pool_lb/pwd" log_must eval "echo $passphrase2 > /pool_lb/pwd2" log_must zfs create -o encryption=on -o keyformat=passphrase \ -o keylocation=file:///pool_lb/pwd pool_lb/encryptme log_must dd if=/dev/urandom of=$file bs=1024 count=1024 log_must zfs snapshot pool_lb/encryptme@snap1 log_must dd if=/dev/urandom of=$file1 bs=1024 count=1024 log_must zfs snapshot pool_lb/encryptme@snap2 log_must dd if=/dev/urandom of=$file2 bs=1024 count=1024 log_must zfs snapshot pool_lb/encryptme@snap3 log_must eval "zfs send -Lc pool_lb/encryptme@snap1 | zfs recv \ -o encryption=on -o keyformat=passphrase -o keylocation=file:///pool_lb/pwd2 \ pool_lb/encrypttwo" log_must eval "zfs send -Lc pool_lb/encryptme@snap1 | zfs recv \ pool_lb/unencryptme" log_must eval "zfs send -Lc -i pool_lb/encryptme@{snap1,snap2} | zfs recv \ pool_lb/unencryptme" log_must zfs rollback pool_lb/encrypttwo@snap1 log_must eval "zfs send -Lc -i pool_lb/unencryptme@{snap1,snap2} | zfs recv \ pool_lb/encrypttwo" log_must eval "zfs send -Lc -i pool_lb/encryptme@{snap2,snap3} | zfs recv \ pool_lb/unencryptme" log_must eval "zfs send -Lc -i pool_lb/unencryptme@{snap2,snap3} | zfs recv \ -F pool_lb/encrypttwo" log_pass "Incrementally receiving a snapshot to an encrypted filesystem succeeds"