3
0
Fork 0
forked from mirrors/nixpkgs

nixos/tests: add test for firejail

This commit is contained in:
Stig Palmquist 2020-08-07 18:45:20 +02:00
parent 3a9145523a
commit 15c53cf0fa
No known key found for this signature in database
GPG key ID: DA4C335C11D70DA7
3 changed files with 86 additions and 1 deletions

View file

@ -101,6 +101,7 @@ in
ferm = handleTest ./ferm.nix {};
firefox = handleTest ./firefox.nix {};
firefox-esr = handleTest ./firefox.nix { esr = true; };
firejail = handleTest ./firejail.nix {};
firewall = handleTest ./firewall.nix {};
fish = handleTest ./fish.nix {};
flannel = handleTestOn ["x86_64-linux"] ./flannel.nix {};

82
nixos/tests/firejail.nix Normal file
View file

@ -0,0 +1,82 @@
import ./make-test-python.nix ({ pkgs, ...} : {
name = "firejail";
meta = with pkgs.stdenv.lib.maintainers; {
maintainers = [ sgo ];
};
nodes.machine = { ... }: {
imports = [ ./common/user-account.nix ];
programs.firejail = {
enable = true;
wrappedBinaries = {
bash-jailed = "${pkgs.bash}/bin/bash";
};
};
systemd.services.setupFirejailTest = {
wantedBy = [ "multi-user.target" ];
before = [ "multi-user.target" ];
environment = {
HOME = "/home/alice";
};
unitConfig = {
type = "oneshot";
RemainAfterExit = true;
user = "alice";
};
script = ''
cd $HOME
mkdir .password-store && echo s3cret > .password-store/secret
mkdir my-secrets && echo s3cret > my-secrets/secret
echo publ1c > public
mkdir -p .config/firejail
echo 'blacklist ''${HOME}/my-secrets' > .config/firejail/globals.local
'';
};
};
testScript = ''
start_all()
machine.wait_for_unit("multi-user.target")
# Test path acl with wrapper
machine.succeed("sudo -u alice bash-jailed -c 'cat ~/public' | grep -q publ1c")
machine.fail(
"sudo -u alice bash-jailed -c 'cat ~/.password-store/secret' | grep -q s3cret"
)
machine.fail("sudo -u alice bash-jailed -c 'cat ~/my-secrets/secret' | grep -q s3cret")
# Test path acl with firejail executable
machine.succeed("sudo -u alice firejail -- bash -c 'cat ~/public' | grep -q publ1c")
machine.fail(
"sudo -u alice firejail -- bash -c 'cat ~/.password-store/secret' | grep -q s3cret"
)
machine.fail(
"sudo -u alice firejail -- bash -c 'cat ~/my-secrets/secret' | grep -q s3cret"
)
# Disabling profiles
machine.succeed(
"sudo -u alice bash -c 'firejail --noprofile -- cat ~/.password-store/secret' | grep -q s3cret"
)
# CVE-2020-17367
machine.fail(
"sudo -u alice firejail --private-tmp id --output=/tmp/vuln1 && cat /tmp/vuln1"
)
# CVE-2020-17368
machine.fail(
"sudo -u alice firejail --private-tmp --output=/tmp/foo 'bash -c $(id>/tmp/vuln2;echo id)' && cat /tmp/vuln2"
)
'';
})

View file

@ -1,4 +1,4 @@
{stdenv, fetchurl, fetchpatch, which}:
{stdenv, fetchurl, fetchpatch, which, nixosTests}:
let
s = # Generated upstream information
rec {
@ -76,6 +76,8 @@ stdenv.mkDerivation {
# bash: src/fsec-optimize/fsec-optimize: No such file or directory
enableParallelBuilding = false;
passthru.tests = nixosTests.firejail;
meta = {
inherit (s) version;
description = ''Namespace-based sandboxing tool for Linux'';