Tests for fpkg is going to be in ./cmd/fpkg, so this central tests directory is no longer necessary. Signed-off-by: Ophestra <cat@gensokyo.uk>
200 lines
7.3 KiB
Python
200 lines
7.3 KiB
Python
import json
|
|
import shlex
|
|
|
|
q = shlex.quote
|
|
NODE_GROUPS = ["nodes", "floating_nodes"]
|
|
|
|
|
|
def swaymsg(command: str = "", succeed=True, type="command"):
|
|
assert command != "" or type != "command", "Must specify command or type"
|
|
shell = q(f"swaymsg -t {q(type)} -- {q(command)}")
|
|
with machine.nested(
|
|
f"sending swaymsg {shell!r}" + " (allowed to fail)" * (not succeed)
|
|
):
|
|
ret = (machine.succeed if succeed else machine.execute)(
|
|
f"su - alice -c {shell}"
|
|
)
|
|
|
|
# execute also returns a status code, but disregard.
|
|
if not succeed:
|
|
_, ret = ret
|
|
|
|
if not succeed and not ret:
|
|
return None
|
|
|
|
parsed = json.loads(ret)
|
|
return parsed
|
|
|
|
|
|
def walk(tree):
|
|
yield tree
|
|
for group in NODE_GROUPS:
|
|
for node in tree.get(group, []):
|
|
yield from walk(node)
|
|
|
|
|
|
def wait_for_window(pattern):
|
|
def func(last_chance):
|
|
nodes = (node["name"] for node in walk(swaymsg(type="get_tree")))
|
|
|
|
if last_chance:
|
|
nodes = list(nodes)
|
|
machine.log(f"Last call! Current list of windows: {nodes}")
|
|
|
|
return any(pattern in name for name in nodes)
|
|
|
|
retry(func)
|
|
|
|
|
|
def collect_state_ui(name):
|
|
swaymsg(f"exec fortify ps > '/tmp/{name}.ps'")
|
|
machine.copy_from_vm(f"/tmp/{name}.ps", "")
|
|
swaymsg(f"exec fortify --json ps > '/tmp/{name}.json'")
|
|
machine.copy_from_vm(f"/tmp/{name}.json", "")
|
|
machine.screenshot(name)
|
|
|
|
|
|
def check_state(name, enablements):
|
|
instances = json.loads(machine.succeed("sudo -u alice -i XDG_RUNTIME_DIR=/run/user/1000 fortify --json ps"))
|
|
if len(instances) != 1:
|
|
raise Exception(f"unexpected state length {len(instances)}")
|
|
instance = next(iter(instances.values()))
|
|
|
|
config = instance['config']
|
|
|
|
if len(config['command']) != 1 or not (config['command'][0].startswith("/nix/store/")) or not (
|
|
config['command'][0].endswith(f"{name}-start")):
|
|
raise Exception(f"unexpected command {instance['config']['command']}")
|
|
|
|
if config['confinement']['enablements'] != enablements:
|
|
raise Exception(f"unexpected enablements {instance['config']['confinement']['enablements']}")
|
|
|
|
|
|
def fortify(command):
|
|
swaymsg(f"exec fortify {command}")
|
|
|
|
|
|
start_all()
|
|
machine.wait_for_unit("multi-user.target")
|
|
|
|
# Run fortify Go tests outside of nix build in the background:
|
|
machine.succeed("rm -rf /tmp/src && cp -a \"$(fortify-src)\" /tmp/src")
|
|
machine.succeed(
|
|
"fortify-fhs -c '(cd /tmp/src && go generate ./... && go test ./... && touch /tmp/success-gotest)' &> /tmp/gotest &")
|
|
|
|
# To check fortify's version:
|
|
print(machine.succeed("sudo -u alice -i fortify version"))
|
|
|
|
# Wait for Sway to complete startup:
|
|
machine.wait_for_file("/run/user/1000/wayland-1")
|
|
machine.wait_for_file("/tmp/sway-ipc.sock")
|
|
|
|
# Deny unmapped uid:
|
|
denyOutput = machine.fail("sudo -u untrusted -i fortify run &>/dev/stdout")
|
|
print(denyOutput)
|
|
denyOutputVerbose = machine.fail("sudo -u untrusted -i fortify -v run &>/dev/stdout")
|
|
print(denyOutputVerbose)
|
|
|
|
# Verify PrintBaseError behaviour:
|
|
if denyOutput != "fsu: uid 1001 is not in the fsurc file\n":
|
|
raise Exception(f"unexpected deny output:\n{denyOutput}")
|
|
if denyOutputVerbose != "fsu: uid 1001 is not in the fsurc file\nfortify: *cannot obtain uid from fsu: permission denied\n":
|
|
raise Exception(f"unexpected deny verbose output:\n{denyOutputVerbose}")
|
|
|
|
# Start fortify permissive defaults outside Wayland session:
|
|
print(machine.succeed("sudo -u alice -i fortify -v run -a 0 touch /tmp/success-bare"))
|
|
machine.wait_for_file("/tmp/fortify.1000/tmpdir/0/success-bare")
|
|
|
|
# Verify silent output permissive defaults:
|
|
output = machine.succeed("sudo -u alice -i fortify run -a 0 true &>/dev/stdout")
|
|
if output != "":
|
|
raise Exception(f"unexpected output\n{output}")
|
|
|
|
# Verify graceful failure on bad Wayland display name:
|
|
print(machine.fail("sudo -u alice -i fortify -v run --wayland true"))
|
|
|
|
# Start fortify permissive defaults within Wayland session:
|
|
fortify(
|
|
'-v run --wayland --dbus notify-send -a "NixOS Tests" "Test notification" "Notification from within sandbox." && touch /tmp/dbus-done')
|
|
machine.wait_for_file("/tmp/dbus-done")
|
|
collect_state_ui("dbus_notify_exited")
|
|
machine.succeed("pkill -9 mako")
|
|
|
|
# Start app (foot) with Wayland enablement:
|
|
swaymsg("exec ne-foot")
|
|
wait_for_window("u0_a1@machine")
|
|
machine.send_chars("clear; wayland-info && touch /tmp/success-client\n")
|
|
machine.wait_for_file("/tmp/fortify.1000/tmpdir/1/success-client")
|
|
collect_state_ui("foot_wayland")
|
|
check_state("ne-foot", 1)
|
|
# Verify acl on XDG_RUNTIME_DIR:
|
|
print(machine.succeed("getfacl --absolute-names --omit-header --numeric /run/user/1000 | grep 1000001"))
|
|
machine.send_chars("exit\n")
|
|
machine.wait_until_fails("pgrep foot")
|
|
# Verify acl cleanup on XDG_RUNTIME_DIR:
|
|
machine.wait_until_fails("getfacl --absolute-names --omit-header --numeric /run/user/1000 | grep 1000001")
|
|
|
|
# Start app (foot) with Wayland enablement from a terminal:
|
|
swaymsg(
|
|
"exec foot $SHELL -c '(ne-foot) & sleep 1 && fortify show $(fortify ps --short) && touch /tmp/ps-show-ok && cat'")
|
|
wait_for_window("u0_a1@machine")
|
|
machine.send_chars("clear; wayland-info && touch /tmp/success-client-term\n")
|
|
machine.wait_for_file("/tmp/fortify.1000/tmpdir/1/success-client-term")
|
|
machine.wait_for_file("/tmp/ps-show-ok")
|
|
collect_state_ui("foot_wayland_term")
|
|
check_state("ne-foot", 1)
|
|
machine.send_chars("exit\n")
|
|
wait_for_window("foot")
|
|
machine.send_key("ctrl-c")
|
|
machine.wait_until_fails("pgrep foot")
|
|
|
|
# Test PulseAudio (fortify does not support PipeWire yet):
|
|
swaymsg("exec pa-foot")
|
|
wait_for_window("u0_a2@machine")
|
|
machine.send_chars("clear; pactl info && touch /tmp/success-pulse\n")
|
|
machine.wait_for_file("/tmp/fortify.1000/tmpdir/2/success-pulse")
|
|
collect_state_ui("pulse_wayland")
|
|
check_state("pa-foot", 9)
|
|
machine.send_chars("exit\n")
|
|
machine.wait_until_fails("pgrep foot")
|
|
|
|
# Test XWayland (foot does not support X):
|
|
swaymsg("exec x11-alacritty")
|
|
wait_for_window("u0_a3@machine")
|
|
machine.send_chars("clear; glinfo && touch /tmp/success-client-x11\n")
|
|
machine.wait_for_file("/tmp/fortify.1000/tmpdir/3/success-client-x11")
|
|
collect_state_ui("alacritty_x11")
|
|
check_state("x11-alacritty", 2)
|
|
machine.send_chars("exit\n")
|
|
machine.wait_until_fails("pgrep alacritty")
|
|
|
|
# Start app (foot) with direct Wayland access:
|
|
swaymsg("exec da-foot")
|
|
wait_for_window("u0_a4@machine")
|
|
machine.send_chars("clear; wayland-info && touch /tmp/success-direct\n")
|
|
machine.wait_for_file("/tmp/fortify.1000/tmpdir/4/success-direct")
|
|
collect_state_ui("foot_direct")
|
|
check_state("da-foot", 1)
|
|
# Verify acl on XDG_RUNTIME_DIR:
|
|
print(machine.succeed("getfacl --absolute-names --omit-header --numeric /run/user/1000 | grep 1000004"))
|
|
machine.send_chars("exit\n")
|
|
machine.wait_until_fails("pgrep foot")
|
|
# Verify acl cleanup on XDG_RUNTIME_DIR:
|
|
machine.wait_until_fails("getfacl --absolute-names --omit-header --numeric /run/user/1000 | grep 1000004")
|
|
|
|
# Test syscall filter:
|
|
print(machine.fail("sudo -u alice -i XDG_RUNTIME_DIR=/run/user/1000 strace-failure"))
|
|
|
|
# Exit Sway and verify process exit status 0:
|
|
swaymsg("exit", succeed=False)
|
|
machine.wait_until_fails("pgrep -x sway")
|
|
machine.wait_for_file("/tmp/sway-exit-ok")
|
|
|
|
# Print fortify runDir contents:
|
|
print(machine.succeed("find /run/user/1000/fortify"))
|
|
|
|
# Verify go test status:
|
|
machine.wait_for_file("/tmp/gotest")
|
|
print(machine.succeed("cat /tmp/gotest"))
|
|
machine.wait_for_file("/tmp/success-gotest")
|