2020-01-17 21:05:03 +08:00
|
|
|
// Copyright 2019 Google LLC
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#include "sandboxed_api/sandbox2/namespace.h"
|
|
|
|
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <syscall.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <utility>
|
|
|
|
|
|
|
|
#include <glog/logging.h>
|
|
|
|
#include "gmock/gmock.h"
|
|
|
|
#include "gtest/gtest.h"
|
|
|
|
#include "absl/memory/memory.h"
|
|
|
|
#include "absl/strings/numbers.h"
|
|
|
|
#include "absl/strings/str_cat.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/config.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/sandbox2/comms.h"
|
|
|
|
#include "sandboxed_api/sandbox2/executor.h"
|
|
|
|
#include "sandboxed_api/sandbox2/policy.h"
|
|
|
|
#include "sandboxed_api/sandbox2/policybuilder.h"
|
|
|
|
#include "sandboxed_api/sandbox2/result.h"
|
|
|
|
#include "sandboxed_api/sandbox2/sandbox2.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/testing.h"
|
|
|
|
#include "sandboxed_api/util/fileops.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/util/status_matchers.h"
|
2021-01-14 01:25:25 +08:00
|
|
|
#include "sandboxed_api/util/temp_file.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
namespace sandbox2 {
|
|
|
|
namespace {
|
|
|
|
|
2021-01-14 01:25:25 +08:00
|
|
|
namespace file_util = ::sapi::file_util;
|
|
|
|
using ::sapi::CreateNamedTempFile;
|
|
|
|
using ::sapi::GetTestSourcePath;
|
|
|
|
using ::sapi::GetTestTempPath;
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
TEST(NamespaceTest, FileNamespaceWorks) {
|
2020-01-24 18:37:32 +08:00
|
|
|
// Mount /binary_path RO and check that it exists and is readable.
|
2019-03-19 00:21:48 +08:00
|
|
|
// /etc/passwd should not exist.
|
|
|
|
const std::string path = GetTestSourcePath("sandbox2/testcases/namespace");
|
|
|
|
std::vector<std::string> args = {path, "0", "/binary_path", "/etc/passwd"};
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.AddFileAt(path, "/binary_path")
|
|
|
|
.TryBuild());
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_EQ(result.reason_code(), 2);
|
|
|
|
}
|
|
|
|
|
2020-01-24 18:37:32 +08:00
|
|
|
TEST(NamespaceTest, ReadOnlyIsRespected) {
|
|
|
|
// Mount temporary file as RO and check that it actually is RO.
|
2020-04-02 22:42:17 +08:00
|
|
|
auto [name, fd] = CreateNamedTempFile(GetTestTempPath("temp_file")).value();
|
|
|
|
file_util::fileops::FDCloser temp_closer(fd);
|
2020-01-24 18:37:32 +08:00
|
|
|
|
|
|
|
const std::string path = GetTestSourcePath("sandbox2/testcases/namespace");
|
|
|
|
{
|
|
|
|
// First check that it is readable
|
|
|
|
std::vector<std::string> args = {path, "0", "/temp_file"};
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.AddFileAt(name, "/temp_file")
|
|
|
|
.TryBuild());
|
2020-01-24 18:37:32 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_EQ(result.reason_code(), 0);
|
|
|
|
}
|
|
|
|
{
|
|
|
|
// Then check that it is not writeable
|
|
|
|
std::vector<std::string> args = {path, "1", "/temp_file"};
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.AddFileAt(name, "/temp_file")
|
|
|
|
.TryBuild());
|
2020-01-24 18:37:32 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_EQ(result.reason_code(), 1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
TEST(NamespaceTest, UserNamespaceWorks) {
|
|
|
|
// Check that getpid() returns 2 (which is the case inside pid NS).
|
|
|
|
const std::string path = GetTestSourcePath("sandbox2/testcases/namespace");
|
|
|
|
std::vector<std::string> args = {path, "2"};
|
|
|
|
{
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.TryBuild());
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_EQ(result.reason_code(), 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Validate that getpid() does not return 2 when outside of an pid NS.
|
|
|
|
{
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
.DisableNamespaces()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.TryBuild());
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_NE(result.reason_code(), 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(NamespaceTest, UserNamespaceIDMapWritten) {
|
|
|
|
// Check that the idmap is initialized before the sandbox application is
|
|
|
|
// started.
|
|
|
|
const std::string path = GetTestSourcePath("sandbox2/testcases/namespace");
|
|
|
|
{
|
|
|
|
std::vector<std::string> args = {path, "3", "1000", "1000"};
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.TryBuild());
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_EQ(result.reason_code(), 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check that the uid/gid is the same when not using namespaces.
|
|
|
|
{
|
|
|
|
const std::string uid = absl::StrCat(getuid());
|
|
|
|
const std::string gid = absl::StrCat(getgid());
|
|
|
|
std::vector<std::string> args = {path, "3", uid, gid};
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
.DisableNamespaces()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.TryBuild());
|
2019-03-19 00:21:48 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_EQ(result.reason_code(), 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-11-14 19:51:01 +08:00
|
|
|
TEST(NamespaceTest, RootReadOnly) {
|
|
|
|
// Mount rw tmpfs at /tmp and check it is rw.
|
|
|
|
// Check also that / is ro.
|
|
|
|
const std::string path = GetTestSourcePath("sandbox2/testcases/namespace");
|
|
|
|
std::vector<std::string> args = {path, "4", "/tmp/testfile", "/testfile"};
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.AddTmpfs("/tmp")
|
|
|
|
.TryBuild());
|
2019-11-14 19:51:01 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_EQ(result.reason_code(), 2);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(NamespaceTest, RootWritable) {
|
|
|
|
// Mount root rw and check it
|
|
|
|
const std::string path = GetTestSourcePath("sandbox2/testcases/namespace");
|
|
|
|
std::vector<std::string> args = {path, "4", "/testfile"};
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.SetRootWritable()
|
|
|
|
.TryBuild());
|
2019-11-14 19:51:01 +08:00
|
|
|
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
EXPECT_EQ(result.reason_code(), 0);
|
|
|
|
}
|
|
|
|
|
2019-03-19 00:21:48 +08:00
|
|
|
class HostnameTest : public testing::Test {
|
|
|
|
protected:
|
|
|
|
void Try(std::string arg, std::unique_ptr<Policy> policy) {
|
|
|
|
const std::string path = GetTestSourcePath("sandbox2/testcases/hostname");
|
|
|
|
std::vector<std::string> args = {path, std::move(arg)};
|
|
|
|
auto executor = absl::make_unique<Executor>(path, args);
|
|
|
|
Sandbox2 sandbox(std::move(executor), std::move(policy));
|
|
|
|
auto result = sandbox.Run();
|
|
|
|
ASSERT_EQ(result.final_status(), Result::OK);
|
|
|
|
code_ = result.reason_code();
|
|
|
|
}
|
|
|
|
|
|
|
|
int code_;
|
|
|
|
};
|
|
|
|
|
|
|
|
TEST_F(HostnameTest, None) {
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
.DisableNamespaces()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.TryBuild());
|
2019-03-19 00:21:48 +08:00
|
|
|
Try("sandbox2", std::move(policy));
|
|
|
|
EXPECT_EQ(code_, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(HostnameTest, Default) {
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.TryBuild());
|
2019-03-19 00:21:48 +08:00
|
|
|
Try("sandbox2", std::move(policy));
|
|
|
|
EXPECT_EQ(code_, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST_F(HostnameTest, Configured) {
|
2021-01-22 22:01:05 +08:00
|
|
|
SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
|
|
|
|
PolicyBuilder()
|
|
|
|
// Don't restrict the syscalls at all
|
|
|
|
.DangerDefaultAllowAll()
|
|
|
|
.SetHostname("configured")
|
|
|
|
.TryBuild());
|
2019-03-19 00:21:48 +08:00
|
|
|
Try("configured", std::move(policy));
|
|
|
|
EXPECT_EQ(code_, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
} // namespace sandbox2
|