4
4
"testing"
5
5
6
6
securityapi "github.com/openshift/origin/pkg/security/apis/security"
7
+ kapi "k8s.io/kubernetes/pkg/api"
7
8
)
8
9
9
10
func TestPointValue (t * testing.T ) {
@@ -33,15 +34,15 @@ func TestPointValue(t *testing.T) {
33
34
// run through all combos of user strategy + seLinux strategy + priv
34
35
for userStrategy , userStrategyPoints := range userStrategies {
35
36
for seLinuxStrategy , seLinuxStrategyPoints := range seLinuxStrategies {
36
- expectedPoints := privilegedPoints + userStrategyPoints + seLinuxStrategyPoints
37
+ expectedPoints := privilegedPoints + userStrategyPoints + seLinuxStrategyPoints + capDefaultPoints
37
38
scc := newSCC (true , seLinuxStrategy , userStrategy )
38
39
actualPoints := pointValue (scc )
39
40
40
41
if actualPoints != expectedPoints {
41
42
t .Errorf ("privileged, user: %v, seLinux %v expected %d score but got %d" , userStrategy , seLinuxStrategy , expectedPoints , actualPoints )
42
43
}
43
44
44
- expectedPoints = userStrategyPoints + seLinuxStrategyPoints
45
+ expectedPoints = userStrategyPoints + seLinuxStrategyPoints + capDefaultPoints
45
46
scc = newSCC (false , seLinuxStrategy , userStrategy )
46
47
actualPoints = pointValue (scc )
47
48
@@ -51,14 +52,15 @@ func TestPointValue(t *testing.T) {
51
52
}
52
53
}
53
54
54
- // sanity check to ensure volume score is added (specific volumes scores are tested below
55
+ // sanity check to ensure volume and capabilities scores are added (specific volumes
56
+ // and capabilities scores are tested below)
55
57
scc := newSCC (false , securityapi .SELinuxStrategyMustRunAs , securityapi .RunAsUserStrategyMustRunAs )
56
58
scc .Volumes = []securityapi.FSType {securityapi .FSTypeHostPath }
57
59
actualPoints := pointValue (scc )
58
- // SELinux + User + host path volume
59
- expectedPoints := runAsUserPoints + runAsUserPoints + hostVolumePoints
60
+ // SELinux + User + host path volume + default capabilities
61
+ expectedPoints := runAsUserPoints + runAsUserPoints + hostVolumePoints + capDefaultPoints
60
62
if actualPoints != expectedPoints {
61
- t .Errorf ("volume score was not added to the scc point value correctly!" )
63
+ t .Errorf ("volume score was not added to the scc point value correctly, got %d!" , actualPoints )
62
64
}
63
65
}
64
66
@@ -168,3 +170,94 @@ func TestVolumePointValue(t *testing.T) {
168
170
}
169
171
}
170
172
}
173
+
174
+ func TestCapabilitiesPointValue (t * testing.T ) {
175
+ newSCC := func (def []kapi.Capability , allow []kapi.Capability , drop []kapi.Capability ) * securityapi.SecurityContextConstraints {
176
+ return & securityapi.SecurityContextConstraints {
177
+ DefaultAddCapabilities : def ,
178
+ AllowedCapabilities : allow ,
179
+ RequiredDropCapabilities : drop ,
180
+ }
181
+ }
182
+
183
+ tests := map [string ]struct {
184
+ defaultAdd []kapi.Capability
185
+ allowed []kapi.Capability
186
+ requiredDrop []kapi.Capability
187
+ expectedPoints points
188
+ }{
189
+ "nothing specified" : {
190
+ defaultAdd : nil ,
191
+ allowed : nil ,
192
+ requiredDrop : nil ,
193
+ expectedPoints : capDefaultPoints ,
194
+ },
195
+ "default" : {
196
+ defaultAdd : []kapi.Capability {"KILL" , "MKNOD" },
197
+ allowed : nil ,
198
+ requiredDrop : nil ,
199
+ expectedPoints : capDefaultPoints + 2 * capAddOnePoints ,
200
+ },
201
+ "allow" : {
202
+ defaultAdd : nil ,
203
+ allowed : []kapi.Capability {"KILL" , "MKNOD" },
204
+ requiredDrop : nil ,
205
+ expectedPoints : capDefaultPoints + 2 * capAllowOnePoints ,
206
+ },
207
+ "allow star" : {
208
+ defaultAdd : nil ,
209
+ allowed : []kapi.Capability {"*" },
210
+ requiredDrop : nil ,
211
+ expectedPoints : capDefaultPoints + capAllowAllPoints ,
212
+ },
213
+ "allow all" : {
214
+ defaultAdd : nil ,
215
+ allowed : []kapi.Capability {"ALL" },
216
+ requiredDrop : nil ,
217
+ expectedPoints : capDefaultPoints + capAllowAllPoints ,
218
+ },
219
+ "allow all case" : {
220
+ defaultAdd : nil ,
221
+ allowed : []kapi.Capability {"All" },
222
+ requiredDrop : nil ,
223
+ expectedPoints : capDefaultPoints + capAllowAllPoints ,
224
+ },
225
+ "drop" : {
226
+ defaultAdd : nil ,
227
+ allowed : nil ,
228
+ requiredDrop : []kapi.Capability {"KILL" , "MKNOD" },
229
+ expectedPoints : capDefaultPoints + 2 * capDropOnePoints ,
230
+ },
231
+ "drop all" : {
232
+ defaultAdd : nil ,
233
+ allowed : nil ,
234
+ requiredDrop : []kapi.Capability {"ALL" },
235
+ expectedPoints : capDefaultPoints + capDropAllPoints ,
236
+ },
237
+ "drop all case" : {
238
+ defaultAdd : nil ,
239
+ allowed : nil ,
240
+ requiredDrop : []kapi.Capability {"all" },
241
+ expectedPoints : capDefaultPoints + capDropAllPoints ,
242
+ },
243
+ "drop star" : {
244
+ defaultAdd : nil ,
245
+ allowed : nil ,
246
+ requiredDrop : []kapi.Capability {"*" },
247
+ expectedPoints : capDefaultPoints + capDropOnePoints ,
248
+ },
249
+ "mixture" : {
250
+ defaultAdd : []kapi.Capability {"SETUID" , "SETGID" },
251
+ allowed : []kapi.Capability {"*" },
252
+ requiredDrop : []kapi.Capability {"SYS_CHROOT" },
253
+ expectedPoints : capDefaultPoints + 2 * capAddOnePoints + capAllowAllPoints + capDropOnePoints ,
254
+ },
255
+ }
256
+ for k , v := range tests {
257
+ scc := newSCC (v .defaultAdd , v .allowed , v .requiredDrop )
258
+ actualPoints := capabilitiesPointValue (scc )
259
+ if actualPoints != v .expectedPoints {
260
+ t .Errorf ("%s expected %d capability score but got %d" , k , v .expectedPoints , actualPoints )
261
+ }
262
+ }
263
+ }
0 commit comments