github.com/bugraaydogar/snapd@v0.0.0-20210315170335-8c70bb858939/interfaces/builtin/firewall_control_test.go (about) 1 // -*- Mode: Go; indent-tabs-mode: t -*- 2 3 /* 4 * Copyright (C) 2016-2017 Canonical Ltd 5 * 6 * This program is free software: you can redistribute it and/or modify 7 * it under the terms of the GNU General Public License version 3 as 8 * published by the Free Software Foundation. 9 * 10 * This program is distributed in the hope that it will be useful, 11 * but WITHOUT ANY WARRANTY; without even the implied warranty of 12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 * GNU General Public License for more details. 14 * 15 * You should have received a copy of the GNU General Public License 16 * along with this program. If not, see <http://www.gnu.org/licenses/>. 17 * 18 */ 19 20 package builtin_test 21 22 import ( 23 . "gopkg.in/check.v1" 24 25 "github.com/snapcore/snapd/interfaces" 26 "github.com/snapcore/snapd/interfaces/apparmor" 27 "github.com/snapcore/snapd/interfaces/builtin" 28 "github.com/snapcore/snapd/interfaces/kmod" 29 "github.com/snapcore/snapd/interfaces/seccomp" 30 "github.com/snapcore/snapd/snap" 31 "github.com/snapcore/snapd/testutil" 32 ) 33 34 type FirewallControlInterfaceSuite struct { 35 iface interfaces.Interface 36 slotInfo *snap.SlotInfo 37 slot *interfaces.ConnectedSlot 38 plugInfo *snap.PlugInfo 39 plug *interfaces.ConnectedPlug 40 } 41 42 const firewallControlConsumerYaml = `name: consumer 43 version: 0 44 apps: 45 app: 46 plugs: [firewall-control] 47 ` 48 49 const firewallControlCoreYaml = `name: core 50 version: 0 51 type: os 52 slots: 53 firewall-control: 54 ` 55 56 var _ = Suite(&FirewallControlInterfaceSuite{ 57 iface: builtin.MustInterface("firewall-control"), 58 }) 59 60 func (s *FirewallControlInterfaceSuite) SetUpTest(c *C) { 61 s.plug, s.plugInfo = MockConnectedPlug(c, firewallControlConsumerYaml, nil, "firewall-control") 62 s.slot, s.slotInfo = MockConnectedSlot(c, firewallControlCoreYaml, nil, "firewall-control") 63 } 64 65 func (s *FirewallControlInterfaceSuite) TestName(c *C) { 66 c.Assert(s.iface.Name(), Equals, "firewall-control") 67 } 68 69 func (s *FirewallControlInterfaceSuite) TestSanitizeSlot(c *C) { 70 c.Assert(interfaces.BeforePrepareSlot(s.iface, s.slotInfo), IsNil) 71 } 72 73 func (s *FirewallControlInterfaceSuite) TestSanitizePlug(c *C) { 74 c.Assert(interfaces.BeforePreparePlug(s.iface, s.plugInfo), IsNil) 75 } 76 77 func (s *FirewallControlInterfaceSuite) TestAppArmorSpec(c *C) { 78 spec := &apparmor.Specification{} 79 c.Assert(spec.AddConnectedPlug(s.iface, s.plug, s.slot), IsNil) 80 c.Assert(spec.SecurityTags(), DeepEquals, []string{"snap.consumer.app"}) 81 c.Assert(spec.SnippetForTag("snap.consumer.app"), testutil.Contains, `capability net_raw`) 82 } 83 84 func (s *FirewallControlInterfaceSuite) TestSecCompSpec(c *C) { 85 spec := &seccomp.Specification{} 86 c.Assert(spec.AddConnectedPlug(s.iface, s.plug, s.slot), IsNil) 87 c.Assert(spec.SecurityTags(), DeepEquals, []string{"snap.consumer.app"}) 88 c.Assert(spec.SnippetForTag("snap.consumer.app"), testutil.Contains, "bind\n") 89 } 90 91 func (s *FirewallControlInterfaceSuite) TestKModSpec(c *C) { 92 spec := &kmod.Specification{} 93 c.Assert(spec.AddConnectedPlug(s.iface, s.plug, s.slot), IsNil) 94 c.Assert(spec.Modules(), DeepEquals, map[string]bool{ 95 "arp_tables": true, 96 "br_netfilter": true, 97 "ip6table_filter": true, 98 "iptable_filter": true, 99 }) 100 } 101 102 func (s *FirewallControlInterfaceSuite) TestStaticInfo(c *C) { 103 si := interfaces.StaticInfoOf(s.iface) 104 c.Assert(si.ImplicitOnCore, Equals, true) 105 c.Assert(si.ImplicitOnClassic, Equals, true) 106 c.Assert(si.Summary, Equals, "allows control over network firewall") 107 c.Assert(si.BaseDeclarationSlots, testutil.Contains, "firewall-control") 108 } 109 110 func (s *FirewallControlInterfaceSuite) TestAutoConnect(c *C) { 111 c.Assert(s.iface.AutoConnect(s.plugInfo, s.slotInfo), Equals, true) 112 } 113 114 func (s *FirewallControlInterfaceSuite) TestInterfaces(c *C) { 115 c.Check(builtin.Interfaces(), testutil.DeepContains, s.iface) 116 }