158 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			158 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package server
 | |
| 
 | |
| import (
 | |
| 	"testing"
 | |
| 
 | |
| 	"github.com/opencontainers/selinux/go-selinux"
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| 	runtime "k8s.io/cri-api/pkg/apis/runtime/v1"
 | |
| )
 | |
| 
 | |
| func TestInitSelinuxOpts(t *testing.T) {
 | |
| 	if !selinux.GetEnabled() {
 | |
| 		t.Skip("selinux is not enabled")
 | |
| 	}
 | |
| 
 | |
| 	for desc, test := range map[string]struct {
 | |
| 		selinuxOpt   *runtime.SELinuxOption
 | |
| 		processLabel string
 | |
| 		mountLabel   string
 | |
| 		expectErr    bool
 | |
| 	}{
 | |
| 		"Should return empty strings for processLabel and mountLabel when selinuxOpt is nil": {
 | |
| 			selinuxOpt:   nil,
 | |
| 			processLabel: ".*:c[0-9]{1,3},c[0-9]{1,3}",
 | |
| 			mountLabel:   ".*:c[0-9]{1,3},c[0-9]{1,3}",
 | |
| 		},
 | |
| 		"Should overlay fields on processLabel when selinuxOpt has been initialized partially": {
 | |
| 			selinuxOpt: &runtime.SELinuxOption{
 | |
| 				User:  "",
 | |
| 				Role:  "user_r",
 | |
| 				Type:  "",
 | |
| 				Level: "s0:c1,c2",
 | |
| 			},
 | |
| 			processLabel: "system_u:user_r:(container_file_t|svirt_lxc_net_t):s0:c1,c2",
 | |
| 			mountLabel:   "system_u:object_r:(container_file_t|svirt_sandbox_file_t):s0:c1,c2",
 | |
| 		},
 | |
| 		"Should be resolved correctly when selinuxOpt has been initialized completely": {
 | |
| 			selinuxOpt: &runtime.SELinuxOption{
 | |
| 				User:  "user_u",
 | |
| 				Role:  "user_r",
 | |
| 				Type:  "user_t",
 | |
| 				Level: "s0:c1,c2",
 | |
| 			},
 | |
| 			processLabel: "user_u:user_r:user_t:s0:c1,c2",
 | |
| 			mountLabel:   "user_u:object_r:(container_file_t|svirt_sandbox_file_t):s0:c1,c2",
 | |
| 		},
 | |
| 		"Should be resolved correctly when selinuxOpt has been initialized with level=''": {
 | |
| 			selinuxOpt: &runtime.SELinuxOption{
 | |
| 				User:  "user_u",
 | |
| 				Role:  "user_r",
 | |
| 				Type:  "user_t",
 | |
| 				Level: "",
 | |
| 			},
 | |
| 			processLabel: "user_u:user_r:user_t:s0:c[0-9]{1,3},c[0-9]{1,3}",
 | |
| 			mountLabel:   "user_u:object_r:(container_file_t|svirt_sandbox_file_t):s0",
 | |
| 		},
 | |
| 		"Should return error when the format of 'level' is not correct": {
 | |
| 			selinuxOpt: &runtime.SELinuxOption{
 | |
| 				User:  "user_u",
 | |
| 				Role:  "user_r",
 | |
| 				Type:  "user_t",
 | |
| 				Level: "s0,c1,c2",
 | |
| 			},
 | |
| 			expectErr: true,
 | |
| 		},
 | |
| 	} {
 | |
| 		t.Run(desc, func(t *testing.T) {
 | |
| 			processLabel, mountLabel, err := initLabelsFromOpt(test.selinuxOpt)
 | |
| 			if test.expectErr {
 | |
| 				assert.Error(t, err)
 | |
| 			} else {
 | |
| 				assert.Regexp(t, test.processLabel, processLabel)
 | |
| 				assert.Regexp(t, test.mountLabel, mountLabel)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func TestCheckSelinuxLevel(t *testing.T) {
 | |
| 	for desc, test := range map[string]struct {
 | |
| 		level         string
 | |
| 		expectNoMatch bool
 | |
| 	}{
 | |
| 		"s0": {
 | |
| 			level: "s0",
 | |
| 		},
 | |
| 		"s0-s0": {
 | |
| 			level: "s0-s0",
 | |
| 		},
 | |
| 		"s0:c0": {
 | |
| 			level: "s0:c0",
 | |
| 		},
 | |
| 		"s0:c0.c3": {
 | |
| 			level: "s0:c0.c3",
 | |
| 		},
 | |
| 		"s0:c0,c3": {
 | |
| 			level: "s0:c0,c3",
 | |
| 		},
 | |
| 		"s0-s0:c0,c3": {
 | |
| 			level: "s0-s0:c0,c3",
 | |
| 		},
 | |
| 		"s0-s0:c0,c3.c6": {
 | |
| 			level: "s0-s0:c0,c3.c6",
 | |
| 		},
 | |
| 		"s0-s0:c0,c3.c6,c8.c10": {
 | |
| 			level: "s0-s0:c0,c3.c6,c8.c10",
 | |
| 		},
 | |
| 		"s0-s0:c0,c3.c6,c8,c10": {
 | |
| 			level: "s0-s0:c0,c3.c6",
 | |
| 		},
 | |
| 		"s0,c0,c3": {
 | |
| 			level:         "s0,c0,c3",
 | |
| 			expectNoMatch: true,
 | |
| 		},
 | |
| 		"s0:c0.c3.c6": {
 | |
| 			level:         "s0:c0.c3.c6",
 | |
| 			expectNoMatch: true,
 | |
| 		},
 | |
| 		"s0-s0,c0,c3": {
 | |
| 			level:         "s0-s0,c0,c3",
 | |
| 			expectNoMatch: true,
 | |
| 		},
 | |
| 		"s0-s0:c0.c3.c6": {
 | |
| 			level:         "s0-s0:c0.c3.c6",
 | |
| 			expectNoMatch: true,
 | |
| 		},
 | |
| 		"s0-s0:c0,c3.c6.c8": {
 | |
| 			level:         "s0-s0:c0,c3.c6.c8",
 | |
| 			expectNoMatch: true,
 | |
| 		},
 | |
| 	} {
 | |
| 		t.Run(desc, func(t *testing.T) {
 | |
| 			err := checkSelinuxLevel(test.level)
 | |
| 			if test.expectNoMatch {
 | |
| 				assert.Error(t, err)
 | |
| 			} else {
 | |
| 				assert.NoError(t, err)
 | |
| 			}
 | |
| 		})
 | |
| 	}
 | |
| }
 | 
