remove "selinux" build tag
The build tag was removed in go-selinux v1.8.0: opencontainers/selinux#132
Related: remove "apparmor" build tag: 0a9147f3aa
Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
			
			
This commit is contained in:
		
							
								
								
									
										157
									
								
								pkg/cri/server/helpers_selinux_linux_test.go
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										157
									
								
								pkg/cri/server/helpers_selinux_linux_test.go
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,157 @@ | ||||
| /* | ||||
|    Copyright The containerd Authors. | ||||
|  | ||||
|    Licensed under the Apache License, Version 2.0 (the "License"); | ||||
|    you may not use this file except in compliance with the License. | ||||
|    You may obtain a copy of the License at | ||||
|  | ||||
|        http://www.apache.org/licenses/LICENSE-2.0 | ||||
|  | ||||
|    Unless required by applicable law or agreed to in writing, software | ||||
|    distributed under the License is distributed on an "AS IS" BASIS, | ||||
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | ||||
|    See the License for the specific language governing permissions and | ||||
|    limitations under the License. | ||||
| */ | ||||
|  | ||||
| package server | ||||
|  | ||||
| import ( | ||||
| 	"testing" | ||||
|  | ||||
| 	"github.com/opencontainers/selinux/go-selinux" | ||||
| 	"github.com/stretchr/testify/assert" | ||||
| 	runtime "k8s.io/cri-api/pkg/apis/runtime/v1alpha2" | ||||
| ) | ||||
|  | ||||
| func TestInitSelinuxOpts(t *testing.T) { | ||||
| 	if !selinux.GetEnabled() { | ||||
| 		t.Skip("selinux is not enabled") | ||||
| 	} | ||||
|  | ||||
| 	for desc, test := range map[string]struct { | ||||
| 		selinuxOpt   *runtime.SELinuxOption | ||||
| 		processLabel string | ||||
| 		mountLabel   string | ||||
| 		expectErr    bool | ||||
| 	}{ | ||||
| 		"Should return empty strings for processLabel and mountLabel when selinuxOpt is nil": { | ||||
| 			selinuxOpt:   nil, | ||||
| 			processLabel: ".*:c[0-9]{1,3},c[0-9]{1,3}", | ||||
| 			mountLabel:   ".*:c[0-9]{1,3},c[0-9]{1,3}", | ||||
| 		}, | ||||
| 		"Should overlay fields on processLabel when selinuxOpt has been initialized partially": { | ||||
| 			selinuxOpt: &runtime.SELinuxOption{ | ||||
| 				User:  "", | ||||
| 				Role:  "user_r", | ||||
| 				Type:  "", | ||||
| 				Level: "s0:c1,c2", | ||||
| 			}, | ||||
| 			processLabel: "system_u:user_r:(container_file_t|svirt_lxc_net_t):s0:c1,c2", | ||||
| 			mountLabel:   "system_u:object_r:(container_file_t|svirt_sandbox_file_t):s0:c1,c2", | ||||
| 		}, | ||||
| 		"Should be resolved correctly when selinuxOpt has been initialized completely": { | ||||
| 			selinuxOpt: &runtime.SELinuxOption{ | ||||
| 				User:  "user_u", | ||||
| 				Role:  "user_r", | ||||
| 				Type:  "user_t", | ||||
| 				Level: "s0:c1,c2", | ||||
| 			}, | ||||
| 			processLabel: "user_u:user_r:user_t:s0:c1,c2", | ||||
| 			mountLabel:   "user_u:object_r:(container_file_t|svirt_sandbox_file_t):s0:c1,c2", | ||||
| 		}, | ||||
| 		"Should be resolved correctly when selinuxOpt has been initialized with level=''": { | ||||
| 			selinuxOpt: &runtime.SELinuxOption{ | ||||
| 				User:  "user_u", | ||||
| 				Role:  "user_r", | ||||
| 				Type:  "user_t", | ||||
| 				Level: "", | ||||
| 			}, | ||||
| 			processLabel: "user_u:user_r:user_t:s0:c[0-9]{1,3},c[0-9]{1,3}", | ||||
| 			mountLabel:   "user_u:object_r:(container_file_t|svirt_sandbox_file_t):s0", | ||||
| 		}, | ||||
| 		"Should return error when the format of 'level' is not correct": { | ||||
| 			selinuxOpt: &runtime.SELinuxOption{ | ||||
| 				User:  "user_u", | ||||
| 				Role:  "user_r", | ||||
| 				Type:  "user_t", | ||||
| 				Level: "s0,c1,c2", | ||||
| 			}, | ||||
| 			expectErr: true, | ||||
| 		}, | ||||
| 	} { | ||||
| 		t.Run(desc, func(t *testing.T) { | ||||
| 			processLabel, mountLabel, err := initLabelsFromOpt(test.selinuxOpt) | ||||
| 			if test.expectErr { | ||||
| 				assert.Error(t, err) | ||||
| 			} else { | ||||
| 				assert.Regexp(t, test.processLabel, processLabel) | ||||
| 				assert.Regexp(t, test.mountLabel, mountLabel) | ||||
| 			} | ||||
| 		}) | ||||
| 	} | ||||
| } | ||||
|  | ||||
| func TestCheckSelinuxLevel(t *testing.T) { | ||||
| 	for desc, test := range map[string]struct { | ||||
| 		level         string | ||||
| 		expectNoMatch bool | ||||
| 	}{ | ||||
| 		"s0": { | ||||
| 			level: "s0", | ||||
| 		}, | ||||
| 		"s0-s0": { | ||||
| 			level: "s0-s0", | ||||
| 		}, | ||||
| 		"s0:c0": { | ||||
| 			level: "s0:c0", | ||||
| 		}, | ||||
| 		"s0:c0.c3": { | ||||
| 			level: "s0:c0.c3", | ||||
| 		}, | ||||
| 		"s0:c0,c3": { | ||||
| 			level: "s0:c0,c3", | ||||
| 		}, | ||||
| 		"s0-s0:c0,c3": { | ||||
| 			level: "s0-s0:c0,c3", | ||||
| 		}, | ||||
| 		"s0-s0:c0,c3.c6": { | ||||
| 			level: "s0-s0:c0,c3.c6", | ||||
| 		}, | ||||
| 		"s0-s0:c0,c3.c6,c8.c10": { | ||||
| 			level: "s0-s0:c0,c3.c6,c8.c10", | ||||
| 		}, | ||||
| 		"s0-s0:c0,c3.c6,c8,c10": { | ||||
| 			level: "s0-s0:c0,c3.c6", | ||||
| 		}, | ||||
| 		"s0,c0,c3": { | ||||
| 			level:         "s0,c0,c3", | ||||
| 			expectNoMatch: true, | ||||
| 		}, | ||||
| 		"s0:c0.c3.c6": { | ||||
| 			level:         "s0:c0.c3.c6", | ||||
| 			expectNoMatch: true, | ||||
| 		}, | ||||
| 		"s0-s0,c0,c3": { | ||||
| 			level:         "s0-s0,c0,c3", | ||||
| 			expectNoMatch: true, | ||||
| 		}, | ||||
| 		"s0-s0:c0.c3.c6": { | ||||
| 			level:         "s0-s0:c0.c3.c6", | ||||
| 			expectNoMatch: true, | ||||
| 		}, | ||||
| 		"s0-s0:c0,c3.c6.c8": { | ||||
| 			level:         "s0-s0:c0,c3.c6.c8", | ||||
| 			expectNoMatch: true, | ||||
| 		}, | ||||
| 	} { | ||||
| 		t.Run(desc, func(t *testing.T) { | ||||
| 			err := checkSelinuxLevel(test.level) | ||||
| 			if test.expectNoMatch { | ||||
| 				assert.Error(t, err) | ||||
| 			} else { | ||||
| 				assert.NoError(t, err) | ||||
| 			} | ||||
| 		}) | ||||
| 	} | ||||
| } | ||||
		Reference in New Issue
	
	Block a user
	 Akihiro Suda
					Akihiro Suda