@@ -3,6 +3,7 @@ package scc
3
3
import (
4
4
"testing"
5
5
6
+ kapi "k8s.io/kubernetes/pkg/api"
6
7
securityapi "github.com/openshift/origin/pkg/security/apis/security"
7
8
)
8
9
@@ -33,15 +34,15 @@ func TestPointValue(t *testing.T) {
33
34
// run through all combos of user strategy + seLinux strategy + priv
34
35
for userStrategy , userStrategyPoints := range userStrategies {
35
36
for seLinuxStrategy , seLinuxStrategyPoints := range seLinuxStrategies {
36
- expectedPoints := privilegedWeight + userStrategyPoints + seLinuxStrategyPoints
37
+ expectedPoints := privilegedWeight + userStrategyPoints + seLinuxStrategyPoints + runCapsDefaultWeight
37
38
scc := newSCC (true , seLinuxStrategy , userStrategy )
38
39
actualPoints := pointValue (scc )
39
40
40
41
if actualPoints != expectedPoints {
41
42
t .Errorf ("privileged, user: %v, seLinux %v expected %d score but got %d" , userStrategy , seLinuxStrategy , expectedPoints , actualPoints )
42
43
}
43
44
44
- expectedPoints = userStrategyPoints + seLinuxStrategyPoints
45
+ expectedPoints = userStrategyPoints + seLinuxStrategyPoints + runCapsDefaultWeight
45
46
scc = newSCC (false , seLinuxStrategy , userStrategy )
46
47
actualPoints = pointValue (scc )
47
48
@@ -51,14 +52,15 @@ func TestPointValue(t *testing.T) {
51
52
}
52
53
}
53
54
54
- // sanity check to ensure volume score is added (specific volumes scores are tested below
55
+ // sanity check to ensure volume and capabilities scores are added (specific volumes
56
+ // and capabilities scores are tested below)
55
57
scc := newSCC (false , securityapi .SELinuxStrategyMustRunAs , securityapi .RunAsUserStrategyMustRunAs )
56
58
scc .Volumes = []securityapi.FSType {securityapi .FSTypeHostPath }
57
59
actualPoints := pointValue (scc )
58
- // SELinux + User + host path volume
59
- expectedPoints := runAsUserWeight + runAsUserWeight + hostVolumeWeight
60
+ // SELinux + User + host path volume + default capabilities
61
+ expectedPoints := runAsUserWeight + runAsUserWeight + hostVolumeWeight + runCapsDefaultWeight
60
62
if actualPoints != expectedPoints {
61
- t .Errorf ("volume score was not added to the scc point value correctly!" )
63
+ t .Errorf ("volume score was not added to the scc point value correctly, got %d!" , actualPoints )
62
64
}
63
65
}
64
66
@@ -168,3 +170,76 @@ func TestVolumePointValue(t *testing.T) {
168
170
}
169
171
}
170
172
}
173
+
174
+ func TestCapabilitiesPointValue (t * testing.T ) {
175
+ newSCC := func (def []kapi.Capability , allow []kapi.Capability , drop []kapi.Capability ) * securityapi.SecurityContextConstraints {
176
+ return & securityapi.SecurityContextConstraints {
177
+ DefaultAddCapabilities : def ,
178
+ AllowedCapabilities : allow ,
179
+ RequiredDropCapabilities : drop ,
180
+ }
181
+ }
182
+
183
+ tests := map [string ]struct {
184
+ defaultAdd []kapi.Capability
185
+ allowed []kapi.Capability
186
+ requiredDrop []kapi.Capability
187
+ expectedPoints int
188
+ }{
189
+ "nothing specified" : {
190
+ defaultAdd : nil ,
191
+ allowed : nil ,
192
+ requiredDrop : nil ,
193
+ expectedPoints : runCapsDefaultWeight ,
194
+ },
195
+ "default" : {
196
+ defaultAdd : []kapi.Capability {"KILL" , "MKNOD" },
197
+ allowed : nil ,
198
+ requiredDrop : nil ,
199
+ expectedPoints : runCapsDefaultWeight + 2 * runCapsAddOneWeight ,
200
+ },
201
+ "allow" : {
202
+ defaultAdd : nil ,
203
+ allowed : []kapi.Capability {"KILL" , "MKNOD" },
204
+ requiredDrop : nil ,
205
+ expectedPoints : runCapsDefaultWeight + 2 * runCapsAllowOneWeight ,
206
+ },
207
+ "allow star" : {
208
+ defaultAdd : nil ,
209
+ allowed : []kapi.Capability {"*" },
210
+ requiredDrop : nil ,
211
+ expectedPoints : runCapsDefaultWeight + runCapsAllowAllWeight ,
212
+ },
213
+ "allow all" : {
214
+ defaultAdd : nil ,
215
+ allowed : []kapi.Capability {"ALL" },
216
+ requiredDrop : nil ,
217
+ expectedPoints : runCapsDefaultWeight + runCapsAllowAllWeight ,
218
+ },
219
+ "drop" : {
220
+ defaultAdd : nil ,
221
+ allowed : nil ,
222
+ requiredDrop : []kapi.Capability {"KILL" , "MKNOD" },
223
+ expectedPoints : runCapsDefaultWeight + 2 * runCapsDropOneWeight ,
224
+ },
225
+ "drop all" : {
226
+ defaultAdd : nil ,
227
+ allowed : nil ,
228
+ requiredDrop : []kapi.Capability {"ALL" },
229
+ expectedPoints : runCapsDefaultWeight + runCapsDropAllWeight ,
230
+ },
231
+ "mixture" : {
232
+ defaultAdd : []kapi.Capability {"SETUID" , "SETGID" },
233
+ allowed : []kapi.Capability {"*" },
234
+ requiredDrop : []kapi.Capability {"SYS_CHROOT" },
235
+ expectedPoints : runCapsDefaultWeight + 2 * runCapsAddOneWeight + runCapsAllowAllWeight + runCapsDropOneWeight ,
236
+ },
237
+ }
238
+ for k , v := range tests {
239
+ scc := newSCC (v .defaultAdd , v .allowed , v .requiredDrop )
240
+ actualPoints := capabilitiesPointValue (scc )
241
+ if actualPoints != v .expectedPoints {
242
+ t .Errorf ("%s expected %d capability score but got %d" , k , v .expectedPoints , actualPoints )
243
+ }
244
+ }
245
+ }
0 commit comments