mirror of
https://github.com/postgres/postgres.git
synced 2025-07-14 08:21:07 +03:00
Fix sepgsql regression tests.
The regression tests for sepgsql were broken by changes in the base distro as-shipped policies. Specifically, definition of unconfined_t in the system default policy was changed to bypass multi-category rules, which the regression test depended on. Fix that by defining a custom privileged domain (sepgsql_regtest_superuser_t) and using it instead of system's unconfined_t domain. The new sepgsql_regtest_superuser_t domain performs almost like the current unconfined_t, but restricted by multi-category policy as the traditional unconfined_t was. The custom policy module is a self defined domain, and so should not be affected by related future system policy changes. However, it still uses the unconfined_u:unconfined_r pair for selinux-user and role. Those definitions have not been changed for several years and seem less risky to rely on than the unconfined_t domain. Additionally, if we define custom user/role, they would need to be manually defined at the operating system level, adding more complexity to an already non-standard and complex regression test. Back-patch to 9.3. The regression tests will need more work before working correctly on 9.2. Starting with 9.2, sepgsql has had dependencies on libselinux versions that are only available on newer distros with the changed set of policies (e.g. RHEL 7.x). On 9.1 sepgsql works fine with the older distros with original policy set (e.g. RHEL 6.x), and on which the existing regression tests work fine. We might want eventually change 9.1 sepgsql regression tests to be more independent from the underlying OS policies, however more work will be needed to make that happen and it is not clear that it is worth the effort. Kohei KaiGai with review by Adam Brightwell and me, commentary by Stephen, Alvaro, Tom, Robert, and others.
This commit is contained in:
@ -9,7 +9,7 @@ DROP DATABASE IF EXISTS regtest_sepgsql_test_database;
|
||||
DROP USER IF EXISTS regtest_sepgsql_test_user;
|
||||
RESET client_min_messages;
|
||||
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:unconfined_t:s0
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0
|
||||
|
||||
--
|
||||
-- CREATE Objects to be altered (with debug_audit being silent)
|
||||
|
@ -9,7 +9,7 @@ DROP USER IF EXISTS regtest_sepgsql_test_user;
|
||||
RESET client_min_messages;
|
||||
|
||||
-- confirm required permissions using audit messages
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:unconfined_t:s0
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0
|
||||
SET sepgsql.debug_audit = true;
|
||||
SET client_min_messages = LOG;
|
||||
|
||||
|
@ -126,7 +126,7 @@ SELECT * FROM my_schema_2.ts2; -- failed (policy violation)
|
||||
--
|
||||
-- Clean up
|
||||
--
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0-s0:c0.c255
|
||||
DROP TABLE IF EXISTS t1 CASCADE;
|
||||
DROP TABLE IF EXISTS t2 CASCADE;
|
||||
DROP TABLE IF EXISTS t3 CASCADE;
|
||||
|
@ -110,27 +110,27 @@ SELECT sepgsql_getcon(); -- client's label must be restored
|
||||
--
|
||||
|
||||
-- validation of transaction aware dynamic-transition
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:unconfined_t:s0:c0.c25
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:unconfined_t:s0:c0.c15');
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c25
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c15');
|
||||
SELECT sepgsql_getcon();
|
||||
|
||||
SELECT sepgsql_setcon(NULL); -- failed to reset
|
||||
SELECT sepgsql_getcon();
|
||||
|
||||
BEGIN;
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:unconfined_t:s0:c0.c12');
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c12');
|
||||
SELECT sepgsql_getcon();
|
||||
|
||||
SAVEPOINT svpt_1;
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:unconfined_t:s0:c0.c9');
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c9');
|
||||
SELECT sepgsql_getcon();
|
||||
|
||||
SAVEPOINT svpt_2;
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:unconfined_t:s0:c0.c6');
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c6');
|
||||
SELECT sepgsql_getcon();
|
||||
|
||||
SAVEPOINT svpt_3;
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:unconfined_t:s0:c0.c3');
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c3');
|
||||
SELECT sepgsql_getcon();
|
||||
|
||||
ROLLBACK TO SAVEPOINT svpt_2;
|
||||
@ -143,16 +143,16 @@ ABORT;
|
||||
SELECT sepgsql_getcon(); -- should be 's0:c0.c15'
|
||||
|
||||
BEGIN;
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:unconfined_t:s0:c0.c8');
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c8');
|
||||
SELECT sepgsql_getcon();
|
||||
|
||||
SAVEPOINT svpt_1;
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:unconfined_t:s0:c0.c4');
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c4');
|
||||
SELECT sepgsql_getcon();
|
||||
|
||||
ROLLBACK TO SAVEPOINT svpt_1;
|
||||
SELECT sepgsql_getcon(); -- should be 's0:c0.c8'
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:unconfined_t:s0:c0.c6');
|
||||
SELECT sepgsql_setcon('unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0:c0.c6');
|
||||
|
||||
COMMIT;
|
||||
SELECT sepgsql_getcon(); -- should be 's0:c0.c6'
|
||||
@ -231,7 +231,7 @@ SELECT sepgsql_getcon();
|
||||
--
|
||||
-- Clean up
|
||||
--
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c255
|
||||
-- @SECURITY-CONTEXT=unconfined_u:unconfined_r:sepgsql_regtest_superuser_t:s0-s0:c0.c255
|
||||
DROP TABLE IF EXISTS t1 CASCADE;
|
||||
DROP TABLE IF EXISTS t2 CASCADE;
|
||||
DROP TABLE IF EXISTS t3 CASCADE;
|
||||
|
Reference in New Issue
Block a user