nixos/tests/opensnitch: test all possible values for ProcMonitorMethod

This commit is contained in:
Grimmauld 2024-12-26 22:04:37 +01:00
parent ec3661ed7a
commit d14a212615
No known key found for this signature in database

View File

@ -1,5 +1,13 @@
import ./make-test-python.nix (
{ pkgs, ... }:
{ pkgs, lib, ... }:
let
monitorMethods = [
"ebpf"
"proc"
"ftrace"
"audit"
];
in
{
name = "opensnitch";
@ -7,10 +15,9 @@ import ./make-test-python.nix (
maintainers = [ onny ];
};
nodes = {
server =
{ ... }:
{
nodes =
{
server = {
networking.firewall.allowedTCPPorts = [ 80 ];
services.caddy = {
enable = true;
@ -19,50 +26,60 @@ import ./make-test-python.nix (
'';
};
};
clientBlocked =
{ ... }:
{
services.opensnitch = {
enable = true;
settings.DefaultAction = "deny";
};
};
clientAllowed =
{ ... }:
{
services.opensnitch = {
enable = true;
settings.DefaultAction = "deny";
rules = {
curl = {
name = "curl";
enabled = true;
action = "allow";
duration = "always";
operator = {
type = "simple";
sensitive = false;
operand = "process.path";
data = "${pkgs.curl}/bin/curl";
}
// (lib.listToAttrs (
map (
m:
lib.nameValuePair "client_blocked_${m}" {
services.opensnitch = {
enable = true;
settings.DefaultAction = "deny";
settings.ProcMonitorMethod = m;
};
}
) monitorMethods
))
// (lib.listToAttrs (
map (
m:
lib.nameValuePair "client_allowed_${m}" {
services.opensnitch = {
enable = true;
settings.DefaultAction = "deny";
settings.ProcMonitorMethod = m;
rules = {
curl = {
name = "curl";
enabled = true;
action = "allow";
duration = "always";
operator = {
type = "simple";
sensitive = false;
operand = "process.path";
data = "${pkgs.curl}/bin/curl";
};
};
};
};
};
};
};
}
) monitorMethods
));
testScript = ''
start_all()
server.wait_for_unit("caddy.service")
server.wait_for_open_port(80)
testScript =
''
start_all()
server.wait_for_unit("caddy.service")
server.wait_for_open_port(80)
''
+ lib.concatLines (
map (m: ''
client_blocked_${m}.wait_for_unit("opensnitchd.service")
client_blocked_${m}.fail("curl http://server")
clientBlocked.wait_for_unit("opensnitchd.service")
clientBlocked.fail("curl http://server")
clientAllowed.wait_for_unit("opensnitchd.service")
clientAllowed.succeed("curl http://server")
'';
client_allowed_${m}.wait_for_unit("opensnitchd.service")
client_allowed_${m}.succeed("curl http://server")
'') monitorMethods
);
}
)