All checks were successful
		
		
	
	Test / Hakurei (push) Successful in 45s
				
			Test / Create distribution (push) Successful in 37s
				
			Test / Hakurei (race detector) (push) Successful in 45s
				
			Test / Hpkg (push) Successful in 45s
				
			Test / Sandbox (push) Successful in 1m26s
				
			Test / Sandbox (race detector) (push) Successful in 2m10s
				
			Test / Flake checks (push) Successful in 1m32s
				
			Since this is going to be placed in a shared directory, it needs to be unique to the identity. Instead of trying to figure out identity from mountinfo, just have the test script pass hardcoded values. Signed-off-by: Ophestra <cat@gensokyo.uk>
		
			
				
	
	
		
			74 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			74 lines
		
	
	
		
			1.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| //go:build testtool
 | |
| 
 | |
| package main
 | |
| 
 | |
| import (
 | |
| 	"flag"
 | |
| 	"fmt"
 | |
| 	"log"
 | |
| 	"os"
 | |
| 	"os/signal"
 | |
| 	"strconv"
 | |
| 	"strings"
 | |
| 	"syscall"
 | |
| 
 | |
| 	"hakurei.app/test/sandbox"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	flagMarkerPath string
 | |
| 	flagTestCase   string
 | |
| 	flagBpfHash    string
 | |
| )
 | |
| 
 | |
| func init() {
 | |
| 	flag.StringVar(&flagMarkerPath, "p", "/tmp/sandbox-ok", "Pathname of completion marker")
 | |
| 	flag.StringVar(&flagTestCase, "t", "", "Nix store path to test case file")
 | |
| 	flag.StringVar(&flagBpfHash, "s", "", "String representation of expected bpf sha512 hash")
 | |
| }
 | |
| 
 | |
| func main() {
 | |
| 	log.SetFlags(0)
 | |
| 	log.SetPrefix("test: ")
 | |
| 	flag.Parse()
 | |
| 
 | |
| 	args := flag.Args()
 | |
| 	if len(args) < 1 {
 | |
| 		s := make(chan os.Signal, 1)
 | |
| 		signal.Notify(s, syscall.SIGINT)
 | |
| 		go func() { <-s; log.Println("exiting on signal (likely from verifier)"); os.Exit(0) }()
 | |
| 
 | |
| 		(&sandbox.T{FS: os.DirFS("/")}).MustCheckFile(flagTestCase)
 | |
| 		if _, err := os.Create(flagMarkerPath); err != nil {
 | |
| 			log.Fatalf("cannot create success marker: %v", err)
 | |
| 		}
 | |
| 		log.Printf("blocking for seccomp check (%s)", flagMarkerPath)
 | |
| 		select {}
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	switch args[0] {
 | |
| 	case "filter":
 | |
| 		if len(args) != 2 {
 | |
| 			log.Fatal("invalid argument")
 | |
| 		}
 | |
| 
 | |
| 		if pid, err := strconv.Atoi(strings.TrimSpace(args[1])); err != nil {
 | |
| 			log.Fatalf("%s", err)
 | |
| 		} else if pid < 1 {
 | |
| 			log.Fatalf("%d out of range", pid)
 | |
| 		} else {
 | |
| 			sandbox.MustCheckFilter(pid, flagBpfHash)
 | |
| 			if err = syscall.Kill(pid, syscall.SIGINT); err != nil {
 | |
| 				log.Fatalf("cannot signal check process: %v", err)
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 	case "hash": // this eases the pain of passing the hash to python
 | |
| 		fmt.Print(flagBpfHash)
 | |
| 
 | |
| 	default:
 | |
| 		log.Fatal("invalid argument")
 | |
| 	}
 | |
| }
 |