X-Git-Url: https://jxself.org/git/?a=blobdiff_plain;f=.github%2Fworkflows%2Ffunctional_test.sh;h=106320c8447516e22c9fb5b1b551b7711ebbe4db;hb=78c65e167ec315fcc5d04e5ca2a2194a18f28f67;hp=f7a384dfd99d36b04c30e8a770bc99481f356890;hpb=f44300ea59e8b87417f085c408b8666814c9268e;p=kconfig-hardened-check.git diff --git a/.github/workflows/functional_test.sh b/.github/workflows/functional_test.sh index f7a384d..106320c 100644 --- a/.github/workflows/functional_test.sh +++ b/.github/workflows/functional_test.sh @@ -9,34 +9,34 @@ git show -s echo "Beginning of the functional tests" echo ">>>>> get help <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -coverage run -a --branch bin/kconfig-hardened-check -h +coverage run -a --branch bin/kernel-hardening-checker +coverage run -a --branch bin/kernel-hardening-checker -h echo ">>>>> get version <<<<<" -coverage run -a --branch bin/kconfig-hardened-check --version +coverage run -a --branch bin/kernel-hardening-checker --version echo ">>>>> print the security hardening recommendations <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m verbose -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m json +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -m verbose +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -m json -coverage run -a --branch bin/kconfig-hardened-check -p X86_32 -coverage run -a --branch bin/kconfig-hardened-check -p X86_32 -m verbose -coverage run -a --branch bin/kconfig-hardened-check -p X86_32 -m json +coverage run -a --branch bin/kernel-hardening-checker -p X86_32 +coverage run -a --branch bin/kernel-hardening-checker -p X86_32 -m verbose +coverage run -a --branch bin/kernel-hardening-checker -p X86_32 -m json -coverage run -a --branch bin/kconfig-hardened-check -p ARM64 -coverage run -a --branch bin/kconfig-hardened-check -p ARM64 -m verbose -coverage run -a --branch bin/kconfig-hardened-check -p ARM64 -m json +coverage run -a --branch bin/kernel-hardening-checker -p ARM64 +coverage run -a --branch bin/kernel-hardening-checker -p ARM64 -m verbose +coverage run -a --branch bin/kernel-hardening-checker -p ARM64 -m json -coverage run -a --branch bin/kconfig-hardened-check -p ARM -coverage run -a --branch bin/kconfig-hardened-check -p ARM -m verbose -coverage run -a --branch bin/kconfig-hardened-check -p ARM -m json +coverage run -a --branch bin/kernel-hardening-checker -p ARM +coverage run -a --branch bin/kernel-hardening-checker -p ARM -m verbose +coverage run -a --branch bin/kernel-hardening-checker -p ARM -m json echo ">>>>> generate the Kconfig fragment <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -coverage run -a --branch bin/kconfig-hardened-check -g X86_32 -coverage run -a --branch bin/kconfig-hardened-check -g ARM64 -coverage run -a --branch bin/kconfig-hardened-check -g ARM +coverage run -a --branch bin/kernel-hardening-checker -g X86_64 +coverage run -a --branch bin/kernel-hardening-checker -g X86_32 +coverage run -a --branch bin/kernel-hardening-checker -g ARM64 +coverage run -a --branch bin/kernel-hardening-checker -g ARM echo ">>>>> check the example kconfig files, cmdline, and sysctl <<<<<" cat /proc/cmdline @@ -51,97 +51,103 @@ for C in $KCONFIGS do COUNT=$(expr $COUNT + 1) echo "\n>>>>> checking kconfig number $COUNT <<<<<" - coverage run -a --branch bin/kconfig-hardened-check -c $C > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -m verbose > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l /proc/cmdline > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -s /tmp/sysctls > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m verbose > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m json > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m show_ok > /dev/null - coverage run -a --branch bin/kconfig-hardened-check -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m show_fail > /dev/null + coverage run -a --branch bin/kernel-hardening-checker -c $C + coverage run -a --branch bin/kernel-hardening-checker -c $C -m verbose > /dev/null + coverage run -a --branch bin/kernel-hardening-checker -c $C -l /proc/cmdline + coverage run -a --branch bin/kernel-hardening-checker -c $C -s /tmp/sysctls + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m verbose > /dev/null + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m json + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m show_ok + coverage run -a --branch bin/kernel-hardening-checker -c $C -l ./cmdline_example -s $SYSCTL_EXAMPLE -m show_fail done echo "\n>>>>> have checked $COUNT kconfigs <<<<<" echo ">>>>> check sysctl separately <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -s $SYSCTL_EXAMPLE > /dev/null -coverage run -a --branch bin/kconfig-hardened-check -s $SYSCTL_EXAMPLE -m verbose > /dev/null -coverage run -a --branch bin/kconfig-hardened-check -s $SYSCTL_EXAMPLE -m json > /dev/null -coverage run -a --branch bin/kconfig-hardened-check -s $SYSCTL_EXAMPLE -m show_ok > /dev/null -coverage run -a --branch bin/kconfig-hardened-check -s $SYSCTL_EXAMPLE -m show_fail > /dev/null +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE -m verbose > /dev/null +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE -m json +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE -m show_ok +coverage run -a --branch bin/kernel-hardening-checker -s $SYSCTL_EXAMPLE -m show_fail echo "Collect coverage for error handling" echo ">>>>> -c and -p together <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -c kconfig_hardened_check/config_files/distros/fedora_34.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -c kernel_hardening_checker/config_files/distros/fedora_34.config && exit 1 echo ">>>>> -c and -g together <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -c kconfig_hardened_check/config_files/distros/fedora_34.config && exit 1 - -echo ">>>>> -p and -g together <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -g X86_64 && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -g X86_64 -c kernel_hardening_checker/config_files/distros/fedora_34.config && exit 1 echo ">>>>> -l without -c <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -l /proc/cmdline && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -l /proc/cmdline && exit 1 + +echo ">>>>> -s and -p together <<<<<" +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -s $SYSCTL_EXAMPLE && exit 1 + +echo ">>>>> -s and -g together <<<<<" +coverage run -a --branch bin/kernel-hardening-checker -g X86_64 -s $SYSCTL_EXAMPLE && exit 1 + +echo ">>>>> -p and -g together <<<<<" +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -g X86_64 && exit 1 echo ">>>>> wrong modes for -p <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m show_ok && exit 1 -coverage run -a --branch bin/kconfig-hardened-check -p X86_64 -m show_fail && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -m show_ok && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -p X86_64 -m show_fail && exit 1 echo ">>>>> wrong mode for -g <<<<<" -coverage run -a --branch bin/kconfig-hardened-check -g X86_64 -m show_ok && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -g X86_64 -m show_ok && exit 1 -cp kconfig_hardened_check/config_files/distros/fedora_34.config ./test.config +cp kernel_hardening_checker/config_files/distros/fedora_34.config ./test.config echo ">>>>> no kernel version <<<<<" sed '3d' test.config > error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> strange kernel version string <<<<<" sed '3 s/5./version 5./' test.config > error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> no arch <<<<<" sed '305d' test.config > error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> more than one arch <<<<<" cp test.config error.config echo 'CONFIG_ARM64=y' >> error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> invalid enabled kconfig option <<<<<" cp test.config error.config echo 'CONFIG_FOO=is not set' >> error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> one config option multiple times <<<<<" cp test.config error.config echo 'CONFIG_BUG=y' >> error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> invalid compiler versions <<<<<" cp test.config error.config sed '8 s/CONFIG_CLANG_VERSION=0/CONFIG_CLANG_VERSION=120000/' test.config > error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> unexpected line in the kconfig file <<<<<" cp test.config error.config echo 'some strange line' >> error.config -coverage run -a --branch bin/kconfig-hardened-check -c error.config && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c error.config && exit 1 echo ">>>>> multi-line cmdline file <<<<<" echo 'hey man 1' > cmdline echo 'hey man 2' >> cmdline -coverage run -a --branch bin/kconfig-hardened-check -c test.config -l cmdline && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c test.config -l cmdline && exit 1 echo ">>>>> unexpected line in the sysctl file <<<<<" cp $SYSCTL_EXAMPLE error_sysctls echo 'some strange line' >> error_sysctls -coverage run -a --branch bin/kconfig-hardened-check -c test.config -s error_sysctls && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c test.config -s error_sysctls && exit 1 echo ">>>>> invalid sysctl file <<<<<" touch empty_file -coverage run -a --branch bin/kconfig-hardened-check -c test.config -s empty_file && exit 1 +coverage run -a --branch bin/kernel-hardening-checker -c test.config -s empty_file && exit 1 echo "The end of the functional tests"