All checks were successful
Test / Create distribution (push) Successful in 32s
Test / Sandbox (push) Successful in 1m56s
Test / Hakurei (push) Successful in 2m42s
Test / Sandbox (race detector) (push) Successful in 3m5s
Test / Planterette (push) Successful in 3m37s
Test / Hakurei (race detector) (push) Successful in 4m19s
Test / Flake checks (push) Successful in 1m7s
It is completely nonsensical and highly error-prone to have multiple implementations of this in the same build. This should be switched at compile time instead therefore the split packages are pointless. Signed-off-by: Ophestra <cat@gensokyo.uk>
150 lines
6.8 KiB
Go
150 lines
6.8 KiB
Go
package app_test
|
|
|
|
import (
|
|
"hakurei.app/container"
|
|
"hakurei.app/container/seccomp"
|
|
"hakurei.app/hst"
|
|
"hakurei.app/internal/app/state"
|
|
"hakurei.app/system"
|
|
"hakurei.app/system/acl"
|
|
"hakurei.app/system/dbus"
|
|
)
|
|
|
|
var testCasesNixos = []sealTestCase{
|
|
{
|
|
"nixos chromium direct wayland", new(stubNixOS),
|
|
&hst.Config{
|
|
ID: "org.chromium.Chromium",
|
|
Path: "/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start",
|
|
Enablements: system.EWayland | system.EDBus | system.EPulse,
|
|
|
|
Container: &hst.ContainerConfig{
|
|
Userns: true, Net: true, MapRealUID: true, Env: nil, AutoEtc: true,
|
|
Filesystem: []*hst.FilesystemConfig{
|
|
{Src: "/bin", Must: true}, {Src: "/usr/bin", Must: true},
|
|
{Src: "/nix/store", Must: true}, {Src: "/run/current-system", Must: true},
|
|
{Src: "/sys/block"}, {Src: "/sys/bus"}, {Src: "/sys/class"}, {Src: "/sys/dev"}, {Src: "/sys/devices"},
|
|
{Src: "/run/opengl-driver", Must: true}, {Src: "/dev/dri", Device: true},
|
|
},
|
|
Cover: []string{"/var/run/nscd"},
|
|
},
|
|
SystemBus: &dbus.Config{
|
|
Talk: []string{"org.bluez", "org.freedesktop.Avahi", "org.freedesktop.UPower"},
|
|
Filter: true,
|
|
},
|
|
SessionBus: &dbus.Config{
|
|
Talk: []string{
|
|
"org.freedesktop.FileManager1", "org.freedesktop.Notifications",
|
|
"org.freedesktop.ScreenSaver", "org.freedesktop.secrets",
|
|
"org.kde.kwalletd5", "org.kde.kwalletd6",
|
|
},
|
|
Own: []string{
|
|
"org.chromium.Chromium.*",
|
|
"org.mpris.MediaPlayer2.org.chromium.Chromium.*",
|
|
"org.mpris.MediaPlayer2.chromium.*",
|
|
},
|
|
Call: map[string]string{}, Broadcast: map[string]string{},
|
|
Filter: true,
|
|
},
|
|
DirectWayland: true,
|
|
|
|
Username: "u0_a1",
|
|
Data: "/var/lib/persist/module/hakurei/0/1",
|
|
Identity: 1, Groups: []string{},
|
|
},
|
|
state.ID{
|
|
0x8e, 0x2c, 0x76, 0xb0,
|
|
0x66, 0xda, 0xbe, 0x57,
|
|
0x4c, 0xf0, 0x73, 0xbd,
|
|
0xb4, 0x6e, 0xb5, 0xc1,
|
|
},
|
|
system.New(1000001).
|
|
Ensure("/tmp/hakurei.1971", 0711).
|
|
Ensure("/tmp/hakurei.1971/runtime", 0700).UpdatePermType(system.User, "/tmp/hakurei.1971/runtime", acl.Execute).
|
|
Ensure("/tmp/hakurei.1971/runtime/1", 0700).UpdatePermType(system.User, "/tmp/hakurei.1971/runtime/1", acl.Read, acl.Write, acl.Execute).
|
|
Ensure("/tmp/hakurei.1971/tmpdir", 0700).UpdatePermType(system.User, "/tmp/hakurei.1971/tmpdir", acl.Execute).
|
|
Ensure("/tmp/hakurei.1971/tmpdir/1", 01700).UpdatePermType(system.User, "/tmp/hakurei.1971/tmpdir/1", acl.Read, acl.Write, acl.Execute).
|
|
Ensure("/run/user/1971/hakurei", 0700).UpdatePermType(system.User, "/run/user/1971/hakurei", acl.Execute).
|
|
Ensure("/run/user/1971", 0700).UpdatePermType(system.User, "/run/user/1971", acl.Execute). // this is ordered as is because the previous Ensure only calls mkdir if XDG_RUNTIME_DIR is unset
|
|
UpdatePermType(system.EWayland, "/run/user/1971/wayland-0", acl.Read, acl.Write, acl.Execute).
|
|
Ephemeral(system.Process, "/run/user/1971/hakurei/8e2c76b066dabe574cf073bdb46eb5c1", 0700).UpdatePermType(system.Process, "/run/user/1971/hakurei/8e2c76b066dabe574cf073bdb46eb5c1", acl.Execute).
|
|
Link("/run/user/1971/pulse/native", "/run/user/1971/hakurei/8e2c76b066dabe574cf073bdb46eb5c1/pulse").
|
|
CopyFile(nil, "/home/ophestra/xdg/config/pulse/cookie", 256, 256).
|
|
Ephemeral(system.Process, "/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1", 0711).
|
|
MustProxyDBus("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", &dbus.Config{
|
|
Talk: []string{
|
|
"org.freedesktop.FileManager1", "org.freedesktop.Notifications",
|
|
"org.freedesktop.ScreenSaver", "org.freedesktop.secrets",
|
|
"org.kde.kwalletd5", "org.kde.kwalletd6",
|
|
},
|
|
Own: []string{
|
|
"org.chromium.Chromium.*",
|
|
"org.mpris.MediaPlayer2.org.chromium.Chromium.*",
|
|
"org.mpris.MediaPlayer2.chromium.*",
|
|
},
|
|
Call: map[string]string{}, Broadcast: map[string]string{},
|
|
Filter: true,
|
|
}, "/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", &dbus.Config{
|
|
Talk: []string{
|
|
"org.bluez",
|
|
"org.freedesktop.Avahi",
|
|
"org.freedesktop.UPower",
|
|
},
|
|
Filter: true,
|
|
}).
|
|
UpdatePerm("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", acl.Read, acl.Write).
|
|
UpdatePerm("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", acl.Read, acl.Write),
|
|
&container.Params{
|
|
Uid: 1971,
|
|
Gid: 100,
|
|
Dir: "/var/lib/persist/module/hakurei/0/1",
|
|
Path: "/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start",
|
|
Args: []string{"/nix/store/yqivzpzzn7z5x0lq9hmbzygh45d8rhqd-chromium-start"},
|
|
Env: []string{
|
|
"DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1971/bus",
|
|
"DBUS_SYSTEM_BUS_ADDRESS=unix:path=/run/dbus/system_bus_socket",
|
|
"HOME=/var/lib/persist/module/hakurei/0/1",
|
|
"PULSE_COOKIE=" + hst.Tmp + "/pulse-cookie",
|
|
"PULSE_SERVER=unix:/run/user/1971/pulse/native",
|
|
"SHELL=/run/current-system/sw/bin/zsh",
|
|
"TERM=xterm-256color",
|
|
"USER=u0_a1",
|
|
"WAYLAND_DISPLAY=wayland-0",
|
|
"XDG_RUNTIME_DIR=/run/user/1971",
|
|
"XDG_SESSION_CLASS=user",
|
|
"XDG_SESSION_TYPE=tty",
|
|
},
|
|
Ops: new(container.Ops).
|
|
Proc("/proc").
|
|
Tmpfs(hst.Tmp, 4096, 0755).
|
|
Dev("/dev").Mqueue("/dev/mqueue").
|
|
Bind("/bin", "/bin", 0).
|
|
Bind("/usr/bin", "/usr/bin", 0).
|
|
Bind("/nix/store", "/nix/store", 0).
|
|
Bind("/run/current-system", "/run/current-system", 0).
|
|
Bind("/sys/block", "/sys/block", container.BindOptional).
|
|
Bind("/sys/bus", "/sys/bus", container.BindOptional).
|
|
Bind("/sys/class", "/sys/class", container.BindOptional).
|
|
Bind("/sys/dev", "/sys/dev", container.BindOptional).
|
|
Bind("/sys/devices", "/sys/devices", container.BindOptional).
|
|
Bind("/run/opengl-driver", "/run/opengl-driver", 0).
|
|
Bind("/dev/dri", "/dev/dri", container.BindDevice|container.BindWritable|container.BindOptional).
|
|
Etc("/etc", "8e2c76b066dabe574cf073bdb46eb5c1").
|
|
Tmpfs("/run/user", 4096, 0755).
|
|
Bind("/tmp/hakurei.1971/runtime/1", "/run/user/1971", container.BindWritable).
|
|
Bind("/tmp/hakurei.1971/tmpdir/1", "/tmp", container.BindWritable).
|
|
Bind("/var/lib/persist/module/hakurei/0/1", "/var/lib/persist/module/hakurei/0/1", container.BindWritable).
|
|
Place("/etc/passwd", []byte("u0_a1:x:1971:100:Hakurei:/var/lib/persist/module/hakurei/0/1:/run/current-system/sw/bin/zsh\n")).
|
|
Place("/etc/group", []byte("hakurei:x:100:\n")).
|
|
Bind("/run/user/1971/wayland-0", "/run/user/1971/wayland-0", 0).
|
|
Bind("/run/user/1971/hakurei/8e2c76b066dabe574cf073bdb46eb5c1/pulse", "/run/user/1971/pulse/native", 0).
|
|
Place(hst.Tmp+"/pulse-cookie", nil).
|
|
Bind("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/bus", "/run/user/1971/bus", 0).
|
|
Bind("/tmp/hakurei.1971/8e2c76b066dabe574cf073bdb46eb5c1/system_bus_socket", "/run/dbus/system_bus_socket", 0).
|
|
Tmpfs("/var/run/nscd", 8192, 0755),
|
|
SeccompPresets: seccomp.PresetExt | seccomp.PresetDenyTTY | seccomp.PresetDenyDevel,
|
|
HostNet: true,
|
|
},
|
|
},
|
|
}
|