mirror of https://github.com/containers/podman.git
				
				
				
			
		
			
				
	
	
		
			173 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			Go
		
	
	
	
			
		
		
	
	
			173 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			Go
		
	
	
	
| //go:build !remote_testing
 | |
| // +build !remote_testing
 | |
| 
 | |
| package integration
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"os"
 | |
| 	"path/filepath"
 | |
| 
 | |
| 	"github.com/containers/common/pkg/apparmor"
 | |
| 	. "github.com/containers/podman/v4/test/utils"
 | |
| 	. "github.com/onsi/ginkgo"
 | |
| 	. "github.com/onsi/gomega"
 | |
| 	. "github.com/onsi/gomega/gexec"
 | |
| )
 | |
| 
 | |
| // wip
 | |
| func skipIfAppArmorEnabled() {
 | |
| 	if apparmor.IsEnabled() {
 | |
| 		Skip("Apparmor is enabled")
 | |
| 	}
 | |
| }
 | |
| func skipIfAppArmorDisabled() {
 | |
| 	if !apparmor.IsEnabled() {
 | |
| 		Skip("Apparmor is not enabled")
 | |
| 	}
 | |
| }
 | |
| 
 | |
| var _ = Describe("Podman run", func() {
 | |
| 	var (
 | |
| 		tempdir    string
 | |
| 		err        error
 | |
| 		podmanTest *PodmanTestIntegration
 | |
| 	)
 | |
| 
 | |
| 	BeforeEach(func() {
 | |
| 		tempdir, err = CreateTempDirInTempDir()
 | |
| 		if err != nil {
 | |
| 			os.Exit(1)
 | |
| 		}
 | |
| 		podmanTest = PodmanTestCreate(tempdir)
 | |
| 		podmanTest.Setup()
 | |
| 	})
 | |
| 
 | |
| 	AfterEach(func() {
 | |
| 		podmanTest.Cleanup()
 | |
| 		f := CurrentGinkgoTestDescription()
 | |
| 		processTestResult(f)
 | |
| 
 | |
| 	})
 | |
| 
 | |
| 	It("podman run apparmor default", func() {
 | |
| 		skipIfAppArmorDisabled()
 | |
| 		session := podmanTest.Podman([]string{"create", ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).Should(Exit(0))
 | |
| 
 | |
| 		cid := session.OutputToString()
 | |
| 		// Verify that apparmor.Profile is being set
 | |
| 		inspect := podmanTest.InspectContainer(cid)
 | |
| 		Expect(inspect[0]).To(HaveField("AppArmorProfile", apparmor.Profile))
 | |
| 	})
 | |
| 
 | |
| 	It("podman run no apparmor --privileged", func() {
 | |
| 		skipIfAppArmorDisabled()
 | |
| 		session := podmanTest.Podman([]string{"create", "--privileged", ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).Should(Exit(0))
 | |
| 
 | |
| 		cid := session.OutputToString()
 | |
| 		// Verify that apparmor.Profile is being set
 | |
| 		inspect := podmanTest.InspectContainer(cid)
 | |
| 		Expect(inspect[0]).To(HaveField("AppArmorProfile", ""))
 | |
| 	})
 | |
| 
 | |
| 	It("podman run no apparmor --security-opt=apparmor.Profile --privileged", func() {
 | |
| 		skipIfAppArmorDisabled()
 | |
| 		session := podmanTest.Podman([]string{"create", "--security-opt", fmt.Sprintf("apparmor=%s", apparmor.Profile), "--privileged", ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).Should(Exit(0))
 | |
| 
 | |
| 		cid := session.OutputToString()
 | |
| 		// Verify that apparmor.Profile is being set
 | |
| 		inspect := podmanTest.InspectContainer(cid)
 | |
| 		Expect(inspect[0]).To(HaveField("AppArmorProfile", apparmor.Profile))
 | |
| 	})
 | |
| 
 | |
| 	It("podman run apparmor aa-test-profile", func() {
 | |
| 		skipIfAppArmorDisabled()
 | |
| 		aaProfile := `
 | |
| #include <tunables/global>
 | |
| profile aa-test-profile flags=(attach_disconnected,mediate_deleted) {
 | |
|   #include <abstractions/base>
 | |
|   deny mount,
 | |
|   deny /sys/[^f]*/** wklx,
 | |
|   deny /sys/f[^s]*/** wklx,
 | |
|   deny /sys/fs/[^c]*/** wklx,
 | |
|   deny /sys/fs/c[^g]*/** wklx,
 | |
|   deny /sys/fs/cg[^r]*/** wklx,
 | |
|   deny /sys/firmware/efi/efivars/** rwklx,
 | |
|   deny /sys/kernel/security/** rwklx,
 | |
| }
 | |
| `
 | |
| 		aaFile := filepath.Join(os.TempDir(), "aaFile")
 | |
| 		Expect(os.WriteFile(aaFile, []byte(aaProfile), 0755)).To(Succeed())
 | |
| 		parse := SystemExec("apparmor_parser", []string{"-Kr", aaFile})
 | |
| 		Expect(parse).Should(Exit(0))
 | |
| 
 | |
| 		session := podmanTest.Podman([]string{"create", "--security-opt", "apparmor=aa-test-profile", ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).Should(Exit(0))
 | |
| 
 | |
| 		cid := session.OutputToString()
 | |
| 		// Verify that apparmor.Profile is being set
 | |
| 		inspect := podmanTest.InspectContainer(cid)
 | |
| 		Expect(inspect[0]).To(HaveField("AppArmorProfile", "aa-test-profile"))
 | |
| 	})
 | |
| 
 | |
| 	It("podman run apparmor invalid", func() {
 | |
| 		skipIfAppArmorDisabled()
 | |
| 		session := podmanTest.Podman([]string{"run", "--security-opt", "apparmor=invalid", ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).To(ExitWithError())
 | |
| 	})
 | |
| 
 | |
| 	It("podman run apparmor unconfined", func() {
 | |
| 		skipIfAppArmorDisabled()
 | |
| 		session := podmanTest.Podman([]string{"create", "--security-opt", "apparmor=unconfined", ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).Should(Exit(0))
 | |
| 
 | |
| 		cid := session.OutputToString()
 | |
| 		// Verify that apparmor.Profile is being set
 | |
| 		inspect := podmanTest.InspectContainer(cid)
 | |
| 		Expect(inspect[0]).To(HaveField("AppArmorProfile", "unconfined"))
 | |
| 	})
 | |
| 
 | |
| 	It("podman run apparmor disabled --security-opt apparmor fails", func() {
 | |
| 		skipIfAppArmorEnabled()
 | |
| 		// Should fail if user specifies apparmor on disabled system
 | |
| 		session := podmanTest.Podman([]string{"create", "--security-opt", fmt.Sprintf("apparmor=%s", apparmor.Profile), ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).To(ExitWithError())
 | |
| 	})
 | |
| 
 | |
| 	It("podman run apparmor disabled no default", func() {
 | |
| 		skipIfAppArmorEnabled()
 | |
| 		// Should succeed if user specifies apparmor on disabled system
 | |
| 		session := podmanTest.Podman([]string{"create", ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).Should(Exit(0))
 | |
| 
 | |
| 		cid := session.OutputToString()
 | |
| 		// Verify that apparmor.Profile is being set
 | |
| 		inspect := podmanTest.InspectContainer(cid)
 | |
| 		Expect(inspect[0]).To(HaveField("AppArmorProfile", ""))
 | |
| 	})
 | |
| 
 | |
| 	It("podman run apparmor disabled unconfined", func() {
 | |
| 		skipIfAppArmorEnabled()
 | |
| 
 | |
| 		session := podmanTest.Podman([]string{"create", "--security-opt", "apparmor=unconfined", ALPINE, "ls"})
 | |
| 		session.WaitWithDefaultTimeout()
 | |
| 		Expect(session).Should(Exit(0))
 | |
| 
 | |
| 		cid := session.OutputToString()
 | |
| 		// Verify that apparmor.Profile is being set
 | |
| 		inspect := podmanTest.InspectContainer(cid)
 | |
| 		Expect(inspect[0]).To(HaveField("AppArmorProfile", ""))
 | |
| 	})
 | |
| })
 |