github.com/bugraaydogar/snapd@v0.0.0-20210315170335-8c70bb858939/interfaces/dbus/backend_test.go (about)

     1  // -*- Mode: Go; indent-tabs-mode: t -*-
     2  
     3  /*
     4   * Copyright (C) 2016 Canonical Ltd
     5   *
     6   * This program is free software: you can redistribute it and/or modify
     7   * it under the terms of the GNU General Public License version 3 as
     8   * published by the Free Software Foundation.
     9   *
    10   * This program is distributed in the hope that it will be useful,
    11   * but WITHOUT ANY WARRANTY; without even the implied warranty of
    12   * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    13   * GNU General Public License for more details.
    14   *
    15   * You should have received a copy of the GNU General Public License
    16   * along with this program.  If not, see <http://www.gnu.org/licenses/>.
    17   *
    18   */
    19  
    20  package dbus_test
    21  
    22  import (
    23  	"fmt"
    24  	"io/ioutil"
    25  	"os"
    26  	"path/filepath"
    27  
    28  	. "gopkg.in/check.v1"
    29  
    30  	"github.com/snapcore/snapd/dirs"
    31  	"github.com/snapcore/snapd/interfaces"
    32  	"github.com/snapcore/snapd/interfaces/dbus"
    33  	"github.com/snapcore/snapd/interfaces/ifacetest"
    34  	"github.com/snapcore/snapd/snap"
    35  	"github.com/snapcore/snapd/snap/snaptest"
    36  	"github.com/snapcore/snapd/snapdtool"
    37  	"github.com/snapcore/snapd/testutil"
    38  )
    39  
    40  type backendSuite struct {
    41  	ifacetest.BackendSuite
    42  }
    43  
    44  var _ = Suite(&backendSuite{})
    45  
    46  var testedConfinementOpts = []interfaces.ConfinementOptions{
    47  	{},
    48  	{DevMode: true},
    49  	{JailMode: true},
    50  	{Classic: true},
    51  }
    52  
    53  func (s *backendSuite) SetUpTest(c *C) {
    54  	s.Backend = &dbus.Backend{}
    55  	s.BackendSuite.SetUpTest(c)
    56  	c.Assert(s.Repo.AddBackend(s.Backend), IsNil)
    57  
    58  	// Prepare a directory for DBus configuration files.
    59  	// NOTE: Normally this is a part of the OS snap.
    60  	err := os.MkdirAll(dirs.SnapDBusSystemPolicyDir, 0700)
    61  	c.Assert(err, IsNil)
    62  }
    63  
    64  func (s *backendSuite) TearDownTest(c *C) {
    65  	s.BackendSuite.TearDownTest(c)
    66  }
    67  
    68  // Tests for Setup() and Remove()
    69  func (s *backendSuite) TestName(c *C) {
    70  	c.Check(s.Backend.Name(), Equals, interfaces.SecurityDBus)
    71  }
    72  
    73  func (s *backendSuite) TestInstallingSnapWritesConfigFiles(c *C) {
    74  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
    75  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
    76  		spec.AddSnippet("<policy/>")
    77  		return nil
    78  	}
    79  	for _, opts := range testedConfinementOpts {
    80  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.SambaYamlV1, 0)
    81  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.smbd.conf")
    82  		// file called "snap.sambda.smbd.conf" was created
    83  		_, err := os.Stat(profile)
    84  		c.Check(err, IsNil)
    85  		s.RemoveSnap(c, snapInfo)
    86  	}
    87  }
    88  
    89  func (s *backendSuite) TestInstallingSnapWithHookWritesConfigFiles(c *C) {
    90  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
    91  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
    92  		spec.AddSnippet("<policy/>")
    93  		return nil
    94  	}
    95  	s.Iface.DBusPermanentPlugCallback = func(spec *dbus.Specification, plug *snap.PlugInfo) error {
    96  		spec.AddSnippet("<policy/>")
    97  		return nil
    98  	}
    99  	for _, opts := range testedConfinementOpts {
   100  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.HookYaml, 0)
   101  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.foo.hook.configure.conf")
   102  
   103  		// Verify that "snap.foo.hook.configure.conf" was created
   104  		_, err := os.Stat(profile)
   105  		c.Check(err, IsNil)
   106  		s.RemoveSnap(c, snapInfo)
   107  	}
   108  }
   109  
   110  func (s *backendSuite) TestRemovingSnapRemovesConfigFiles(c *C) {
   111  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
   112  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
   113  		spec.AddSnippet("<policy/>")
   114  		return nil
   115  	}
   116  	for _, opts := range testedConfinementOpts {
   117  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.SambaYamlV1, 0)
   118  		s.RemoveSnap(c, snapInfo)
   119  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.smbd.conf")
   120  		// file called "snap.sambda.smbd.conf" was removed
   121  		_, err := os.Stat(profile)
   122  		c.Check(os.IsNotExist(err), Equals, true)
   123  	}
   124  }
   125  
   126  func (s *backendSuite) TestRemovingSnapWithHookRemovesConfigFiles(c *C) {
   127  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
   128  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
   129  		spec.AddSnippet("<policy/>")
   130  		return nil
   131  	}
   132  	s.Iface.DBusPermanentPlugCallback = func(spec *dbus.Specification, plug *snap.PlugInfo) error {
   133  		spec.AddSnippet("<policy/>")
   134  		return nil
   135  	}
   136  	for _, opts := range testedConfinementOpts {
   137  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.HookYaml, 0)
   138  		s.RemoveSnap(c, snapInfo)
   139  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.foo.hook.configure.conf")
   140  
   141  		// Verify that "snap.foo.hook.configure.conf" was removed
   142  		_, err := os.Stat(profile)
   143  		c.Check(os.IsNotExist(err), Equals, true)
   144  	}
   145  }
   146  
   147  func (s *backendSuite) TestUpdatingSnapToOneWithMoreApps(c *C) {
   148  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
   149  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
   150  		spec.AddSnippet("<policy/>")
   151  		return nil
   152  	}
   153  	for _, opts := range testedConfinementOpts {
   154  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.SambaYamlV1, 0)
   155  		snapInfo = s.UpdateSnap(c, snapInfo, opts, ifacetest.SambaYamlV1WithNmbd, 0)
   156  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.nmbd.conf")
   157  		// file called "snap.sambda.nmbd.conf" was created
   158  		_, err := os.Stat(profile)
   159  		c.Check(err, IsNil)
   160  		s.RemoveSnap(c, snapInfo)
   161  	}
   162  }
   163  
   164  func (s *backendSuite) TestUpdatingSnapToOneWithMoreHooks(c *C) {
   165  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
   166  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
   167  		spec.AddSnippet("<policy/>")
   168  		return nil
   169  	}
   170  	s.Iface.DBusPermanentPlugCallback = func(spec *dbus.Specification, plug *snap.PlugInfo) error {
   171  		spec.AddSnippet("<policy/>")
   172  		return nil
   173  	}
   174  	for _, opts := range testedConfinementOpts {
   175  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.SambaYamlV1, 0)
   176  		snapInfo = s.UpdateSnap(c, snapInfo, opts, ifacetest.SambaYamlWithHook, 0)
   177  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.hook.configure.conf")
   178  
   179  		// Verify that "snap.samba.hook.configure.conf" was created
   180  		_, err := os.Stat(profile)
   181  		c.Check(err, IsNil)
   182  		s.RemoveSnap(c, snapInfo)
   183  	}
   184  }
   185  
   186  func (s *backendSuite) TestUpdatingSnapToOneWithFewerApps(c *C) {
   187  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
   188  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
   189  		spec.AddSnippet("<policy/>")
   190  		return nil
   191  	}
   192  	for _, opts := range testedConfinementOpts {
   193  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.SambaYamlV1WithNmbd, 0)
   194  		snapInfo = s.UpdateSnap(c, snapInfo, opts, ifacetest.SambaYamlV1, 0)
   195  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.nmbd.conf")
   196  		// file called "snap.sambda.nmbd.conf" was removed
   197  		_, err := os.Stat(profile)
   198  		c.Check(os.IsNotExist(err), Equals, true)
   199  		s.RemoveSnap(c, snapInfo)
   200  	}
   201  }
   202  
   203  func (s *backendSuite) TestUpdatingSnapToOneWithFewerHooks(c *C) {
   204  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
   205  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
   206  		spec.AddSnippet("<policy/>")
   207  		return nil
   208  	}
   209  	s.Iface.DBusPermanentPlugCallback = func(spec *dbus.Specification, plug *snap.PlugInfo) error {
   210  		spec.AddSnippet("<policy/>")
   211  		return nil
   212  	}
   213  	for _, opts := range testedConfinementOpts {
   214  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.SambaYamlWithHook, 0)
   215  		snapInfo = s.UpdateSnap(c, snapInfo, opts, ifacetest.SambaYamlV1, 0)
   216  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.hook.configure.conf")
   217  
   218  		// Verify that "snap.samba.hook.configure.conf" was removed
   219  		_, err := os.Stat(profile)
   220  		c.Check(os.IsNotExist(err), Equals, true)
   221  		s.RemoveSnap(c, snapInfo)
   222  	}
   223  }
   224  
   225  func (s *backendSuite) TestCombineSnippetsWithActualSnippets(c *C) {
   226  	// NOTE: replace the real template with a shorter variant
   227  	restore := dbus.MockXMLEnvelope([]byte("<?xml>\n"), []byte("</xml>"))
   228  	defer restore()
   229  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
   230  		spec.AddSnippet("<policy>...</policy>")
   231  		return nil
   232  	}
   233  	for _, opts := range testedConfinementOpts {
   234  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.SambaYamlV1, 0)
   235  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.smbd.conf")
   236  		c.Check(profile, testutil.FileEquals, "<?xml>\n<policy>...</policy>\n</xml>")
   237  		stat, err := os.Stat(profile)
   238  		c.Assert(err, IsNil)
   239  		c.Check(stat.Mode(), Equals, os.FileMode(0644))
   240  		s.RemoveSnap(c, snapInfo)
   241  	}
   242  }
   243  
   244  func (s *backendSuite) TestCombineSnippetsWithoutAnySnippets(c *C) {
   245  	for _, opts := range testedConfinementOpts {
   246  		snapInfo := s.InstallSnap(c, opts, "", ifacetest.SambaYamlV1, 0)
   247  		profile := filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.smbd.conf")
   248  		_, err := os.Stat(profile)
   249  		// Without any snippets, there the .conf file is not created.
   250  		c.Check(os.IsNotExist(err), Equals, true)
   251  		s.RemoveSnap(c, snapInfo)
   252  	}
   253  }
   254  
   255  const sambaYamlWithIfaceBoundToNmbd = `
   256  name: samba
   257  version: 1
   258  developer: acme
   259  apps:
   260      smbd:
   261      nmbd:
   262          slots: [iface]
   263  `
   264  
   265  func (s *backendSuite) TestAppBoundIfaces(c *C) {
   266  	// NOTE: Hand out a permanent snippet so that .conf file is generated.
   267  	s.Iface.DBusPermanentSlotCallback = func(spec *dbus.Specification, slot *snap.SlotInfo) error {
   268  		spec.AddSnippet("<policy/>")
   269  		return nil
   270  	}
   271  	// Install a snap with two apps, only one of which needs a .conf file
   272  	// because the interface is app-bound.
   273  	snapInfo := s.InstallSnap(c, interfaces.ConfinementOptions{}, "", sambaYamlWithIfaceBoundToNmbd, 0)
   274  	defer s.RemoveSnap(c, snapInfo)
   275  	// Check that only one of the .conf files is actually created
   276  	_, err := os.Stat(filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.smbd.conf"))
   277  	c.Check(os.IsNotExist(err), Equals, true)
   278  	_, err = os.Stat(filepath.Join(dirs.SnapDBusSystemPolicyDir, "snap.samba.nmbd.conf"))
   279  	c.Check(err, IsNil)
   280  }
   281  
   282  func (s *backendSuite) TestSandboxFeatures(c *C) {
   283  	c.Assert(s.Backend.SandboxFeatures(), DeepEquals, []string{"mediated-bus-access"})
   284  }
   285  
   286  func makeFakeDbusConfigAndUserdServiceFiles(c *C, coreOrSnapdSnap *snap.Info) {
   287  	err := os.MkdirAll(filepath.Join(coreOrSnapdSnap.MountDir(), "/usr/share/dbus-1/session.d"), 0755)
   288  	c.Assert(err, IsNil)
   289  	content := fmt.Sprintf("content of snapd.session-services.conf for snap %s", coreOrSnapdSnap.InstanceName())
   290  	err = ioutil.WriteFile(filepath.Join(coreOrSnapdSnap.MountDir(), "/usr/share/dbus-1/session.d/snapd.session-services.conf"), []byte(content), 0644)
   291  	c.Assert(err, IsNil)
   292  
   293  	err = os.MkdirAll(filepath.Join(coreOrSnapdSnap.MountDir(), "/usr/share/dbus-1/system.d"), 0755)
   294  	c.Assert(err, IsNil)
   295  	content = fmt.Sprintf("content of snapd.system-services.conf for snap %s", coreOrSnapdSnap.InstanceName())
   296  	err = ioutil.WriteFile(filepath.Join(coreOrSnapdSnap.MountDir(), "/usr/share/dbus-1/system.d/snapd.system-services.conf"), []byte(content), 0644)
   297  	c.Assert(err, IsNil)
   298  
   299  	err = os.MkdirAll(filepath.Join(dirs.GlobalRootDir, "/usr/share/dbus-1/services"), 0755)
   300  	c.Assert(err, IsNil)
   301  
   302  	servicesPath := filepath.Join(coreOrSnapdSnap.MountDir(), "/usr/share/dbus-1/services")
   303  	err = os.MkdirAll(servicesPath, 0755)
   304  	c.Assert(err, IsNil)
   305  
   306  	for _, fn := range []string{
   307  		"io.snapcraft.Launcher.service",
   308  		"io.snapcraft.Settings.service",
   309  	} {
   310  		content := fmt.Sprintf("content of %s for snap %s", fn, coreOrSnapdSnap.InstanceName())
   311  		err = ioutil.WriteFile(filepath.Join(servicesPath, fn), []byte(content), 0644)
   312  		c.Assert(err, IsNil)
   313  	}
   314  }
   315  
   316  var expectedDBusConfigFiles = []string{
   317  	"/usr/share/dbus-1/services/io.snapcraft.Launcher.service",
   318  	"/usr/share/dbus-1/services/io.snapcraft.Settings.service",
   319  	"/usr/share/dbus-1/session.d/snapd.session-services.conf",
   320  	"/usr/share/dbus-1/system.d/snapd.system-services.conf",
   321  }
   322  
   323  func (s *backendSuite) testSetupWritesDbusFilesForCoreOrSnapd(c *C, coreOrSnapdYaml string) {
   324  	coreOrSnapdInfo := snaptest.MockInfo(c, coreOrSnapdYaml, &snap.SideInfo{Revision: snap.R(2)})
   325  	makeFakeDbusConfigAndUserdServiceFiles(c, coreOrSnapdInfo)
   326  
   327  	// Config files are not copied if we haven't reexecuted
   328  	err := s.Backend.Setup(coreOrSnapdInfo, interfaces.ConfinementOptions{}, s.Repo, nil)
   329  	c.Assert(err, IsNil)
   330  
   331  	for _, fn := range expectedDBusConfigFiles {
   332  		c.Check(filepath.Join(dirs.GlobalRootDir, fn), testutil.FileAbsent)
   333  	}
   334  
   335  	// Now make it look like snapd was reexecuted
   336  	restore := snapdtool.MockOsReadlink(func(string) (string, error) {
   337  		return filepath.Join(coreOrSnapdInfo.MountDir(), "/usr/lib/snapd/snapd"), nil
   338  	})
   339  	defer restore()
   340  
   341  	err = s.Backend.Setup(coreOrSnapdInfo, interfaces.ConfinementOptions{}, s.Repo, nil)
   342  	c.Assert(err, IsNil)
   343  
   344  	for _, fn := range expectedDBusConfigFiles {
   345  		c.Check(filepath.Join(dirs.GlobalRootDir, fn), testutil.FilePresent)
   346  	}
   347  }
   348  
   349  var (
   350  	coreYaml  string = "name: core\nversion: 1\ntype: os"
   351  	snapdYaml string = "name: snapd\nversion: 1\ntype: snapd"
   352  )
   353  
   354  func (s *backendSuite) TestSetupWritesDbusFilesForCore(c *C) {
   355  	s.testSetupWritesDbusFilesForCoreOrSnapd(c, coreYaml)
   356  }
   357  
   358  func (s *backendSuite) TestSetupWritesDbusFilesForSnapd(c *C) {
   359  	s.testSetupWritesDbusFilesForCoreOrSnapd(c, snapdYaml)
   360  }
   361  
   362  func (s *backendSuite) TestSetupWritesDbusFilesBothSnapdAndCoreInstalled(c *C) {
   363  	err := os.MkdirAll(filepath.Join(dirs.SnapMountDir, "snapd/current"), 0755)
   364  	c.Assert(err, IsNil)
   365  
   366  	coreInfo := snaptest.MockInfo(c, coreYaml, &snap.SideInfo{Revision: snap.R(2)})
   367  	makeFakeDbusConfigAndUserdServiceFiles(c, coreInfo)
   368  	snapdInfo := snaptest.MockInfo(c, snapdYaml, &snap.SideInfo{Revision: snap.R(3)})
   369  	makeFakeDbusConfigAndUserdServiceFiles(c, snapdInfo)
   370  
   371  	restore := snapdtool.MockOsReadlink(func(string) (string, error) {
   372  		return filepath.Join(snapdInfo.MountDir(), "/usr/lib/snapd/snapd"), nil
   373  	})
   374  	defer restore()
   375  
   376  	// first setup snapd which writes the files
   377  	err = s.Backend.Setup(snapdInfo, interfaces.ConfinementOptions{}, s.Repo, nil)
   378  	c.Assert(err, IsNil)
   379  
   380  	// then setup core - if both are installed snapd should win
   381  	err = s.Backend.Setup(coreInfo, interfaces.ConfinementOptions{}, s.Repo, nil)
   382  	c.Assert(err, IsNil)
   383  
   384  	for _, fn := range expectedDBusConfigFiles {
   385  		c.Check(filepath.Join(dirs.GlobalRootDir, fn), testutil.FileEquals, fmt.Sprintf("content of %s for snap snapd", filepath.Base(fn)))
   386  	}
   387  }