mirror of
https://github.com/aquasecurity/kube-bench.git
synced 2024-12-20 21:58:06 +00:00
192 lines
4.7 KiB
Go
192 lines
4.7 KiB
Go
// Copyright © 2017 Aqua Security Software Ltd. <info@aquasec.com>
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package check
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"strings"
|
|
"testing"
|
|
)
|
|
|
|
var (
|
|
in []byte
|
|
controls *Controls
|
|
)
|
|
|
|
func init() {
|
|
var err error
|
|
in, err = ioutil.ReadFile("data")
|
|
if err != nil {
|
|
panic("Failed reading test data: " + err.Error())
|
|
}
|
|
|
|
// substitute variables in data file
|
|
user := os.Getenv("USER")
|
|
s := strings.Replace(string(in), "$user", user, -1)
|
|
|
|
controls, err = NewControls(MASTER, []byte(s))
|
|
// controls, err = NewControls(MASTER, in)
|
|
if err != nil {
|
|
panic("Failed creating test controls: " + err.Error())
|
|
}
|
|
}
|
|
|
|
func TestTestExecute(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
*Check
|
|
str string
|
|
}{
|
|
{
|
|
controls.Groups[0].Checks[0],
|
|
"2:45 ../kubernetes/kube-apiserver --allow-privileged=false --option1=20,30,40",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[1],
|
|
"2:45 ../kubernetes/kube-apiserver --allow-privileged=false",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[2],
|
|
"niinai 13617 2635 99 19:26 pts/20 00:03:08 ./kube-apiserver --insecure-port=0 --anonymous-auth",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[3],
|
|
"2:45 ../kubernetes/kube-apiserver --secure-port=0 --audit-log-maxage=40 --option",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[4],
|
|
"2:45 ../kubernetes/kube-apiserver --max-backlog=20 --secure-port=0 --audit-log-maxage=40 --option",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[5],
|
|
"2:45 ../kubernetes/kube-apiserver --option --admission-control=WebHook,RBAC ---audit-log-maxage=40",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[6],
|
|
"2:45 .. --kubelet-clientkey=foo --kubelet-client-certificate=bar --admission-control=Webhook,RBAC",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[7],
|
|
"2:45 .. --secure-port=0 --kubelet-client-certificate=bar --admission-control=Webhook,RBAC",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[8],
|
|
"644",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[9],
|
|
"640",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[9],
|
|
"600",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[10],
|
|
"2:45 ../kubernetes/kube-apiserver --option --admission-control=WebHook,RBAC ---audit-log-maxage=40",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[11],
|
|
"2:45 ../kubernetes/kube-apiserver --option --admission-control=WebHook,RBAC ---audit-log-maxage=40",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[12],
|
|
"2:45 ../kubernetes/kube-apiserver --option --admission-control=WebHook,Something,RBAC ---audit-log-maxage=40",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[13],
|
|
"2:45 ../kubernetes/kube-apiserver --option --admission-control=Something ---audit-log-maxage=40",
|
|
},
|
|
{
|
|
// check for ':' as argument-value separator, with space between arg and val
|
|
controls.Groups[0].Checks[14],
|
|
"2:45 kube-apiserver some-arg: some-val --admission-control=Something ---audit-log-maxage=40",
|
|
},
|
|
{
|
|
// check for ':' as argument-value separator, with no space between arg and val
|
|
controls.Groups[0].Checks[14],
|
|
"2:45 kube-apiserver some-arg:some-val --admission-control=Something ---audit-log-maxage=40",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[15],
|
|
"{\"readOnlyPort\": 15000}",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[16],
|
|
"{\"stringValue\": \"WebHook,Something,RBAC\"}",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[17],
|
|
"{\"trueValue\": true}",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[18],
|
|
"{\"readOnlyPort\": 15000}",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[19],
|
|
"{\"authentication\": { \"anonymous\": {\"enabled\": false}}}",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[20],
|
|
"readOnlyPort: 15000",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[21],
|
|
"readOnlyPort: 15000",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[22],
|
|
"authentication:\n anonymous:\n enabled: false",
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
res := c.Tests.execute(c.str).testResult
|
|
if !res {
|
|
t.Errorf("%s, expected:%v, got:%v\n", c.Text, true, res)
|
|
}
|
|
}
|
|
}
|
|
|
|
func TestTestExecuteExceptions(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
*Check
|
|
str string
|
|
}{
|
|
{
|
|
controls.Groups[0].Checks[23],
|
|
"this is not valid json {} at all",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[24],
|
|
"{\"key\": \"value\"}",
|
|
},
|
|
{
|
|
controls.Groups[0].Checks[25],
|
|
"broken } yaml\nenabled: true",
|
|
},
|
|
}
|
|
|
|
for _, c := range cases {
|
|
res := c.Tests.execute(c.str).testResult
|
|
if res {
|
|
t.Errorf("%s, expected:%v, got:%v\n", c.Text, false, res)
|
|
}
|
|
}
|
|
}
|