Using array to build sub-tests is to avoid random pick. The shuffle thing should be handled by go-test framework. And we should capture range var before runing sub-test. Signed-off-by: Wei Fu <fuweid89@gmail.com>
		
			
				
	
	
		
			181 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			181 lines
		
	
	
		
			4.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
   Copyright The containerd Authors.
 | 
						|
 | 
						|
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
   you may not use this file except in compliance with the License.
 | 
						|
   You may obtain a copy of the License at
 | 
						|
 | 
						|
       http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
   Unless required by applicable law or agreed to in writing, software
 | 
						|
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
   See the License for the specific language governing permissions and
 | 
						|
   limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package server
 | 
						|
 | 
						|
import (
 | 
						|
	"testing"
 | 
						|
 | 
						|
	"github.com/opencontainers/selinux/go-selinux"
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
	runtime "k8s.io/cri-api/pkg/apis/runtime/v1"
 | 
						|
)
 | 
						|
 | 
						|
func TestInitSelinuxOpts(t *testing.T) {
 | 
						|
	if !selinux.GetEnabled() {
 | 
						|
		t.Skip("selinux is not enabled")
 | 
						|
	}
 | 
						|
 | 
						|
	for _, test := range []struct {
 | 
						|
		desc         string
 | 
						|
		selinuxOpt   *runtime.SELinuxOption
 | 
						|
		processLabel string
 | 
						|
		mountLabel   string
 | 
						|
		expectErr    bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			desc:         "Should return empty strings for processLabel and mountLabel when selinuxOpt is nil",
 | 
						|
			selinuxOpt:   nil,
 | 
						|
			processLabel: ".*:c[0-9]{1,3},c[0-9]{1,3}",
 | 
						|
			mountLabel:   ".*:c[0-9]{1,3},c[0-9]{1,3}",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "Should overlay fields on processLabel when selinuxOpt has been initialized partially",
 | 
						|
			selinuxOpt: &runtime.SELinuxOption{
 | 
						|
				User:  "",
 | 
						|
				Role:  "user_r",
 | 
						|
				Type:  "",
 | 
						|
				Level: "s0:c1,c2",
 | 
						|
			},
 | 
						|
			processLabel: "system_u:user_r:(container_file_t|svirt_lxc_net_t):s0:c1,c2",
 | 
						|
			mountLabel:   "system_u:object_r:(container_file_t|svirt_sandbox_file_t):s0:c1,c2",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "Should be resolved correctly when selinuxOpt has been initialized completely",
 | 
						|
			selinuxOpt: &runtime.SELinuxOption{
 | 
						|
				User:  "user_u",
 | 
						|
				Role:  "user_r",
 | 
						|
				Type:  "user_t",
 | 
						|
				Level: "s0:c1,c2",
 | 
						|
			},
 | 
						|
			processLabel: "user_u:user_r:user_t:s0:c1,c2",
 | 
						|
			mountLabel:   "user_u:object_r:(container_file_t|svirt_sandbox_file_t):s0:c1,c2",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "Should be resolved correctly when selinuxOpt has been initialized with level=''",
 | 
						|
			selinuxOpt: &runtime.SELinuxOption{
 | 
						|
				User:  "user_u",
 | 
						|
				Role:  "user_r",
 | 
						|
				Type:  "user_t",
 | 
						|
				Level: "",
 | 
						|
			},
 | 
						|
			processLabel: "user_u:user_r:user_t:s0:c[0-9]{1,3},c[0-9]{1,3}",
 | 
						|
			mountLabel:   "user_u:object_r:(container_file_t|svirt_sandbox_file_t):s0",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc: "Should return error when the format of 'level' is not correct",
 | 
						|
			selinuxOpt: &runtime.SELinuxOption{
 | 
						|
				User:  "user_u",
 | 
						|
				Role:  "user_r",
 | 
						|
				Type:  "user_t",
 | 
						|
				Level: "s0,c1,c2",
 | 
						|
			},
 | 
						|
			expectErr: true,
 | 
						|
		},
 | 
						|
	} {
 | 
						|
		test := test
 | 
						|
		t.Run(test.desc, func(t *testing.T) {
 | 
						|
			processLabel, mountLabel, err := initLabelsFromOpt(test.selinuxOpt)
 | 
						|
			if test.expectErr {
 | 
						|
				assert.Error(t, err)
 | 
						|
			} else {
 | 
						|
				assert.Regexp(t, test.processLabel, processLabel)
 | 
						|
				assert.Regexp(t, test.mountLabel, mountLabel)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func TestCheckSelinuxLevel(t *testing.T) {
 | 
						|
	for _, test := range []struct {
 | 
						|
		desc          string
 | 
						|
		level         string
 | 
						|
		expectNoMatch bool
 | 
						|
	}{
 | 
						|
		{
 | 
						|
			desc:  "s0",
 | 
						|
			level: "s0",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:  "s0-s0",
 | 
						|
			level: "s0-s0",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:  "s0:c0",
 | 
						|
			level: "s0:c0",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:  "s0:c0.c3",
 | 
						|
			level: "s0:c0.c3",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:  "s0:c0,c3",
 | 
						|
			level: "s0:c0,c3",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:  "s0-s0:c0,c3",
 | 
						|
			level: "s0-s0:c0,c3",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:  "s0-s0:c0,c3.c6",
 | 
						|
			level: "s0-s0:c0,c3.c6",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:  "s0-s0:c0,c3.c6,c8.c10",
 | 
						|
			level: "s0-s0:c0,c3.c6,c8.c10",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:  "s0-s0:c0,c3.c6,c8,c10",
 | 
						|
			level: "s0-s0:c0,c3.c6",
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:          "s0,c0,c3",
 | 
						|
			level:         "s0,c0,c3",
 | 
						|
			expectNoMatch: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:          "s0:c0.c3.c6",
 | 
						|
			level:         "s0:c0.c3.c6",
 | 
						|
			expectNoMatch: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:          "s0-s0,c0,c3",
 | 
						|
			level:         "s0-s0,c0,c3",
 | 
						|
			expectNoMatch: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:          "s0-s0:c0.c3.c6",
 | 
						|
			level:         "s0-s0:c0.c3.c6",
 | 
						|
			expectNoMatch: true,
 | 
						|
		},
 | 
						|
		{
 | 
						|
			desc:          "s0-s0:c0,c3.c6.c8",
 | 
						|
			level:         "s0-s0:c0,c3.c6.c8",
 | 
						|
			expectNoMatch: true,
 | 
						|
		},
 | 
						|
	} {
 | 
						|
		test := test
 | 
						|
		t.Run(test.desc, func(t *testing.T) {
 | 
						|
			err := checkSelinuxLevel(test.level)
 | 
						|
			if test.expectNoMatch {
 | 
						|
				assert.Error(t, err)
 | 
						|
			} else {
 | 
						|
				assert.NoError(t, err)
 | 
						|
			}
 | 
						|
		})
 | 
						|
	}
 | 
						|
}
 |