
Using array to build sub-tests is to avoid random pick. The shuffle thing should be handled by go-test framework. And we should capture range var before runing sub-test. Signed-off-by: Wei Fu <fuweid89@gmail.com>
181 lines
4.2 KiB
Go
181 lines
4.2 KiB
Go
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package server
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/opencontainers/selinux/go-selinux"
|
|
"github.com/stretchr/testify/assert"
|
|
runtime "k8s.io/cri-api/pkg/apis/runtime/v1"
|
|
)
|
|
|
|
func TestInitSelinuxOpts(t *testing.T) {
|
|
if !selinux.GetEnabled() {
|
|
t.Skip("selinux is not enabled")
|
|
}
|
|
|
|
for _, test := range []struct {
|
|
desc string
|
|
selinuxOpt *runtime.SELinuxOption
|
|
processLabel string
|
|
mountLabel string
|
|
expectErr bool
|
|
}{
|
|
{
|
|
desc: "Should return empty strings for processLabel and mountLabel when selinuxOpt is nil",
|
|
selinuxOpt: nil,
|
|
processLabel: ".*:c[0-9]{1,3},c[0-9]{1,3}",
|
|
mountLabel: ".*:c[0-9]{1,3},c[0-9]{1,3}",
|
|
},
|
|
{
|
|
desc: "Should overlay fields on processLabel when selinuxOpt has been initialized partially",
|
|
selinuxOpt: &runtime.SELinuxOption{
|
|
User: "",
|
|
Role: "user_r",
|
|
Type: "",
|
|
Level: "s0:c1,c2",
|
|
},
|
|
processLabel: "system_u:user_r:(container_file_t|svirt_lxc_net_t):s0:c1,c2",
|
|
mountLabel: "system_u:object_r:(container_file_t|svirt_sandbox_file_t):s0:c1,c2",
|
|
},
|
|
{
|
|
desc: "Should be resolved correctly when selinuxOpt has been initialized completely",
|
|
selinuxOpt: &runtime.SELinuxOption{
|
|
User: "user_u",
|
|
Role: "user_r",
|
|
Type: "user_t",
|
|
Level: "s0:c1,c2",
|
|
},
|
|
processLabel: "user_u:user_r:user_t:s0:c1,c2",
|
|
mountLabel: "user_u:object_r:(container_file_t|svirt_sandbox_file_t):s0:c1,c2",
|
|
},
|
|
{
|
|
desc: "Should be resolved correctly when selinuxOpt has been initialized with level=''",
|
|
selinuxOpt: &runtime.SELinuxOption{
|
|
User: "user_u",
|
|
Role: "user_r",
|
|
Type: "user_t",
|
|
Level: "",
|
|
},
|
|
processLabel: "user_u:user_r:user_t:s0:c[0-9]{1,3},c[0-9]{1,3}",
|
|
mountLabel: "user_u:object_r:(container_file_t|svirt_sandbox_file_t):s0",
|
|
},
|
|
{
|
|
desc: "Should return error when the format of 'level' is not correct",
|
|
selinuxOpt: &runtime.SELinuxOption{
|
|
User: "user_u",
|
|
Role: "user_r",
|
|
Type: "user_t",
|
|
Level: "s0,c1,c2",
|
|
},
|
|
expectErr: true,
|
|
},
|
|
} {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
processLabel, mountLabel, err := initLabelsFromOpt(test.selinuxOpt)
|
|
if test.expectErr {
|
|
assert.Error(t, err)
|
|
} else {
|
|
assert.Regexp(t, test.processLabel, processLabel)
|
|
assert.Regexp(t, test.mountLabel, mountLabel)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCheckSelinuxLevel(t *testing.T) {
|
|
for _, test := range []struct {
|
|
desc string
|
|
level string
|
|
expectNoMatch bool
|
|
}{
|
|
{
|
|
desc: "s0",
|
|
level: "s0",
|
|
},
|
|
{
|
|
desc: "s0-s0",
|
|
level: "s0-s0",
|
|
},
|
|
{
|
|
desc: "s0:c0",
|
|
level: "s0:c0",
|
|
},
|
|
{
|
|
desc: "s0:c0.c3",
|
|
level: "s0:c0.c3",
|
|
},
|
|
{
|
|
desc: "s0:c0,c3",
|
|
level: "s0:c0,c3",
|
|
},
|
|
{
|
|
desc: "s0-s0:c0,c3",
|
|
level: "s0-s0:c0,c3",
|
|
},
|
|
{
|
|
desc: "s0-s0:c0,c3.c6",
|
|
level: "s0-s0:c0,c3.c6",
|
|
},
|
|
{
|
|
desc: "s0-s0:c0,c3.c6,c8.c10",
|
|
level: "s0-s0:c0,c3.c6,c8.c10",
|
|
},
|
|
{
|
|
desc: "s0-s0:c0,c3.c6,c8,c10",
|
|
level: "s0-s0:c0,c3.c6",
|
|
},
|
|
{
|
|
desc: "s0,c0,c3",
|
|
level: "s0,c0,c3",
|
|
expectNoMatch: true,
|
|
},
|
|
{
|
|
desc: "s0:c0.c3.c6",
|
|
level: "s0:c0.c3.c6",
|
|
expectNoMatch: true,
|
|
},
|
|
{
|
|
desc: "s0-s0,c0,c3",
|
|
level: "s0-s0,c0,c3",
|
|
expectNoMatch: true,
|
|
},
|
|
{
|
|
desc: "s0-s0:c0.c3.c6",
|
|
level: "s0-s0:c0.c3.c6",
|
|
expectNoMatch: true,
|
|
},
|
|
{
|
|
desc: "s0-s0:c0,c3.c6.c8",
|
|
level: "s0-s0:c0,c3.c6.c8",
|
|
expectNoMatch: true,
|
|
},
|
|
} {
|
|
test := test
|
|
t.Run(test.desc, func(t *testing.T) {
|
|
err := checkSelinuxLevel(test.level)
|
|
if test.expectNoMatch {
|
|
assert.Error(t, err)
|
|
} else {
|
|
assert.NoError(t, err)
|
|
}
|
|
})
|
|
}
|
|
}
|