setools/tests/library/test_rbacrulequery.py
Chris PeBenito 0856100fcb tests/util: Refactor validate_rule() to handle role allows.
Signed-off-by: Chris PeBenito <chpebeni@linux.microsoft.com>
2024-04-19 14:54:13 -04:00

135 lines
5.4 KiB
Python

"""RBAC rule query unit tests."""
# Copyright 2014, Tresys Technology, LLC
#
# SPDX-License-Identifier: GPL-2.0-only
#
# pylint: disable=invalid-name,too-many-public-methods
import pytest
import setools
from setools import RBACRuleQuery
from setools import RBACRuletype as RRT
from setools.exception import RuleUseError, RuleNotConditional
from . import util
@pytest.mark.obj_args("tests/library/rbacrulequery.conf")
class TestRBACRuleQuery:
"""RBAC rule query unit tests."""
def test_unset(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with no criteria."""
# query with no parameters gets all RBAC rules.
rules = sorted(compiled_policy.rbacrules())
q = RBACRuleQuery(compiled_policy)
q_rules = sorted(q.results())
assert rules == q_rules
def test_source_direct(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with exact, direct, source match."""
q = RBACRuleQuery(
compiled_policy, source="test1s", source_indirect=False, source_regex=False)
r = sorted(q.results())
assert len(r) == 2
util.validate_rule(r[0], RRT.allow, "test1s", "test1t")
util.validate_rule(r[1], RRT.role_transition, "test1s", "system", tclass="infoflow",
default="test1t")
def test_source_direct_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with regex, direct, source match."""
q = RBACRuleQuery(
compiled_policy, source="test2s(1|2)", source_indirect=False, source_regex=True)
r = sorted(q.results())
assert len(r) == 1
util.validate_rule(r[0], RRT.allow, "test2s1", "test2t")
def test_target_direct(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with exact, direct, target match."""
q = RBACRuleQuery(
compiled_policy, target="test10t", target_indirect=False, target_regex=False)
r = sorted(q.results())
assert len(r) == 1
util.validate_rule(r[0], RRT.allow, "test10s", "test10t")
def test_target_direct_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with regex, direct, target match."""
q = RBACRuleQuery(
compiled_policy, target="test11t(1|3)", target_indirect=False, target_regex=True)
r = sorted(q.results())
assert len(r) == 1
util.validate_rule(r[0], RRT.allow, "test11s", "test11t1")
def test_target_type(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with a type as target."""
q = RBACRuleQuery(compiled_policy, target="test12t")
r = sorted(q.results())
assert len(r) == 1
util.validate_rule(r[0], RRT.role_transition, "test12s", "test12t", tclass="infoflow",
default="test12d")
def test_class_list(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with object class list match."""
q = RBACRuleQuery(
compiled_policy, tclass=["infoflow3", "infoflow4"], tclass_regex=False)
r = sorted(q.results())
assert len(r) == 2
util.validate_rule(r[0], RRT.role_transition, "test21", "system", tclass="infoflow3",
default="test21d3")
util.validate_rule(r[1], RRT.role_transition, "test21", "system", tclass="infoflow4",
default="test21d2")
def test_class_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with object class regex match."""
q = RBACRuleQuery(compiled_policy, tclass="infoflow(5|6)", tclass_regex=True)
r = sorted(q.results())
assert len(r) == 2
util.validate_rule(r[0], RRT.role_transition, "test22", "system", tclass="infoflow5",
default="test22d2")
util.validate_rule(r[1], RRT.role_transition, "test22", "system", tclass="infoflow6",
default="test22d3")
def test_default(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with exact default match."""
q = RBACRuleQuery(
compiled_policy, default="test30d", default_regex=False)
r = sorted(q.results())
assert len(r) == 1
util.validate_rule(r[0], RRT.role_transition, "test30s", "system", tclass="infoflow",
default="test30d")
def test_default_regex(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with regex default match."""
q = RBACRuleQuery(
compiled_policy, default="test31d(2|3)", default_regex=True)
r = sorted(q.results())
assert len(r) == 2
util.validate_rule(r[0], RRT.role_transition, "test31s", "system", tclass="infoflow7",
default="test31d3")
util.validate_rule(r[1], RRT.role_transition, "test31s", "system", tclass="process",
default="test31d2")
def test_ruletype(self, compiled_policy: setools.SELinuxPolicy) -> None:
"""RBAC rule query with rule type."""
q = RBACRuleQuery(compiled_policy, ruletype=[RRT.allow])
num = 0
for num, r in enumerate(sorted(q.results()), start=1):
assert r.ruletype == RRT.allow
# this will have to be updated as number of
# role allows change in the test policy
assert num == 9