setools/tests/library/test_initsidquery.py
Chris PeBenito 43e764d5ec TestInitialSIDQuery: Update tests to pytest fixtures.
Signed-off-by: Chris PeBenito <chpebeni@linux.microsoft.com>
2024-04-19 13:40:57 -04:00

215 lines
9.8 KiB
Python

# Copyright 2014, Tresys Technology, LLC
#
# SPDX-License-Identifier: GPL-2.0-only
#
import pytest
import setools
@pytest.mark.obj_args("tests/library/initsidquery.conf")
class TestInitialSIDQuery:
def test_unset(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with no criteria"""
# query with no parameters gets all SIDs.
sids = sorted(compiled_policy.initialsids())
q = setools.InitialSIDQuery(compiled_policy)
q_sids = sorted(q.results())
assert sids == q_sids
def test_name_exact(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with exact match"""
q = setools.InitialSIDQuery(compiled_policy, name="kernel", name_regex=False)
sids = sorted(str(s) for s in q.results())
assert ["kernel"] == sids
def test_name_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with regex match"""
q = setools.InitialSIDQuery(compiled_policy, name="(security|unlabeled)", name_regex=True)
sids = sorted(str(s) for s in q.results())
assert ["security", "unlabeled"] == sids
def test_user_exact(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context user exact match"""
q = setools.InitialSIDQuery(compiled_policy, user="user10", user_regex=False)
sids = sorted(str(s) for s in q.results())
assert ["fs"] == sids
def test_user_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context user regex match"""
q = setools.InitialSIDQuery(compiled_policy, user="user11(a|b)", user_regex=True)
sids = sorted(str(s) for s in q.results())
assert ["file", "file_labels"] == sids
def test_role_exact(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context role exact match"""
q = setools.InitialSIDQuery(compiled_policy, role="role20_r", role_regex=False)
sids = sorted(str(s) for s in q.results())
assert ["any_socket"] == sids
def test_role_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context role regex match"""
q = setools.InitialSIDQuery(compiled_policy, role="role21(a|c)_r", role_regex=True)
sids = sorted(str(s) for s in q.results())
assert ["netmsg", "port"] == sids
def test_type_exact(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context type exact match"""
q = setools.InitialSIDQuery(compiled_policy, type_="type30", type_regex=False)
sids = sorted(str(s) for s in q.results())
assert ["node"] == sids
def test_type_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context type regex match"""
q = setools.InitialSIDQuery(compiled_policy, type_="type31(b|c)", type_regex=True)
sids = sorted(str(s) for s in q.results())
assert ["icmp_socket", "tcp_socket"] == sids
def test_range_exact(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range exact match"""
q = setools.InitialSIDQuery(compiled_policy, range_="s0:c1 - s0:c0.c4")
sids = sorted(str(s) for s in q.results())
assert ["sysctl_modprobe"] == sids
def test_range_overlap1(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range overlap match (equal)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s1:c1 - s1:c0.c4", range_overlap=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl"] == sids
def test_range_overlap2(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range overlap match (subset)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s1:c1,c2 - s1:c0.c3",
range_overlap=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl"] == sids
def test_range_overlap3(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range overlap match (superset)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s1 - s1:c0.c4", range_overlap=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl"] == sids
def test_range_overlap4(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range overlap match (overlap low level)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s1 - s1:c1,c2", range_overlap=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl"] == sids
def test_range_overlap5(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range overlap match (overlap high level)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s1:c1,c2 - s1:c0.c4",
range_overlap=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl"] == sids
def test_range_subset1(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range subset match"""
q = setools.InitialSIDQuery(compiled_policy, range_="s2:c1,c2 - s2:c0.c3",
range_overlap=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_fs"] == sids
def test_range_subset2(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range subset match (equal)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s2:c1 - s2:c1.c3", range_overlap=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_fs"] == sids
def test_range_superset1(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range superset match"""
q = setools.InitialSIDQuery(compiled_policy, range_="s3 - s3:c0.c4", range_superset=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_kernel"] == sids
def test_range_superset2(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range superset match (equal)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s3:c1 - s3:c1.c3",
range_superset=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_kernel"] == sids
def test_range_proper_subset1(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range proper subset match"""
q = setools.InitialSIDQuery(compiled_policy, range_="s4:c1,c2", range_subset=True,
range_proper=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_net"] == sids
def test_range_proper_subset2(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range proper subset match (equal)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s4:c1 - s4:c1.c3", range_subset=True,
range_proper=True)
sids = sorted(str(s) for s in q.results())
assert [] == sids
def test_range_proper_subset3(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range proper subset match (equal low only)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s4:c1 - s4:c1.c2", range_subset=True,
range_proper=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_net"] == sids
def test_range_proper_subset4(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range proper subset match (equal high only)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s4:c1,c2 - s4:c1.c3",
range_subset=True, range_proper=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_net"] == sids
def test_range_proper_superset1(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range proper superset match"""
q = setools.InitialSIDQuery(compiled_policy, range_="s5 - s5:c0.c4", range_superset=True,
range_proper=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_net_unix"] == sids
def test_range_proper_superset2(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range proper superset match (equal)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s5:c1 - s5:c1.c3",
range_superset=True, range_proper=True)
sids = sorted(str(s) for s in q.results())
assert [] == sids
def test_range_proper_superset3(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range proper superset match (equal low)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s5:c1 - s5:c1.c4",
range_superset=True, range_proper=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_net_unix"] == sids
def test_range_proper_superset4(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""Initial SID query with context range proper superset match (equal high)"""
q = setools.InitialSIDQuery(compiled_policy, range_="s5 - s5:c1.c3", range_superset=True,
range_proper=True)
sids = sorted(str(s) for s in q.results())
assert ["sysctl_net_unix"] == sids