Skip to content

Commit 270145a

Browse files
committed
RuntimeInsideValidate: can now be called several times
Signed-off-by: Alban Crequy <[email protected]>
1 parent 4b49cba commit 270145a

File tree

19 files changed

+46
-26
lines changed

19 files changed

+46
-26
lines changed

validation/default/default.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ func main() {
99
if err != nil {
1010
util.Fatal(err)
1111
}
12-
err = util.RuntimeInsideValidate(g, nil)
12+
err = util.RuntimeInsideValidate(g, nil, nil)
1313
if err != nil {
1414
util.Fatal(err)
1515
}

validation/hostname/hostname.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ func testHostname(t *tap.T, hostname string) error {
1515
}
1616

1717
g.SetHostname(hostname)
18-
err = util.RuntimeInsideValidate(g, nil)
18+
err = util.RuntimeInsideValidate(g, nil, nil)
1919
t.Ok(err == nil, "hostname is set correctly")
2020
if err != nil {
2121
t.Diagnosticf("expect: err == nil, actual: err != nil")

validation/linux_devices/linux_devices.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ func main() {
5151
pdev.FileMode = &pmode
5252
g.AddDevice(pdev)
5353

54-
err = util.RuntimeInsideValidate(g, nil)
54+
err = util.RuntimeInsideValidate(g, nil, nil)
5555
if err != nil {
5656
util.Fatal(err)
5757
}

validation/linux_masked_paths/linux_masked_paths.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ func checkMaskedPaths() error {
3232
g.AddLinuxMaskedPaths(maskedDirSub)
3333
g.AddLinuxMaskedPaths(maskedFileSub)
3434
g.AddLinuxMaskedPaths(maskedFileSubSub)
35-
err = util.RuntimeInsideValidate(g, func(path string) error {
35+
err = util.RuntimeInsideValidate(g, nil, func(path string) error {
3636
testDir := filepath.Join(path, maskedDirSub)
3737
err = os.MkdirAll(testDir, 0777)
3838
if err != nil {
@@ -73,7 +73,7 @@ func checkMaskedRelPaths() error {
7373
maskedRelPath := "masked-relpath"
7474

7575
g.AddLinuxMaskedPaths(maskedRelPath)
76-
err = util.RuntimeInsideValidate(g, func(path string) error {
76+
err = util.RuntimeInsideValidate(g, nil, func(path string) error {
7777
testFile := filepath.Join(path, maskedRelPath)
7878
if _, err := os.Stat(testFile); err != nil && os.IsNotExist(err) {
7979
return err
@@ -98,7 +98,7 @@ func checkMaskedSymlinks() error {
9898
maskedSymlink := "/masked-symlink"
9999

100100
g.AddLinuxMaskedPaths(maskedSymlink)
101-
err = util.RuntimeInsideValidate(g, func(path string) error {
101+
err = util.RuntimeInsideValidate(g, nil, func(path string) error {
102102
testFile := filepath.Join(path, maskedSymlink)
103103
// ln -s .. /masked-symlink ; readlink -f /masked-symlink; ls -L /masked-symlink
104104
if err := os.Symlink("../masked-symlink", testFile); err != nil {
@@ -130,7 +130,7 @@ func checkMaskedDeviceNodes(mode uint32) error {
130130
maskedDevice := "/masked-device"
131131

132132
g.AddLinuxMaskedPaths(maskedDevice)
133-
return util.RuntimeInsideValidate(g, func(path string) error {
133+
return util.RuntimeInsideValidate(g, nil, func(path string) error {
134134
testFile := filepath.Join(path, maskedDevice)
135135

136136
if err := unix.Mknod(testFile, mode, 0); err != nil {

validation/linux_readonly_paths/linux_readonly_paths.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ func checkReadonlyPaths() error {
3232
g.AddLinuxReadonlyPaths(readonlyDirSub)
3333
g.AddLinuxReadonlyPaths(readonlyFileSub)
3434
g.AddLinuxReadonlyPaths(readonlyFileSubSub)
35-
err = util.RuntimeInsideValidate(g, func(path string) error {
35+
err = util.RuntimeInsideValidate(g, nil, func(path string) error {
3636
testDir := filepath.Join(path, readonlyDirSub)
3737
err = os.MkdirAll(testDir, 0777)
3838
if err != nil {
@@ -73,7 +73,7 @@ func checkReadonlyRelPaths() error {
7373
readonlyRelPath := "readonly-relpath"
7474

7575
g.AddLinuxReadonlyPaths(readonlyRelPath)
76-
err = util.RuntimeInsideValidate(g, func(path string) error {
76+
err = util.RuntimeInsideValidate(g, nil, func(path string) error {
7777
testFile := filepath.Join(path, readonlyRelPath)
7878
if _, err := os.Stat(testFile); err != nil && os.IsNotExist(err) {
7979
return err
@@ -98,7 +98,7 @@ func checkReadonlySymlinks() error {
9898
readonlySymlink := "/readonly-symlink"
9999

100100
g.AddLinuxReadonlyPaths(readonlySymlink)
101-
err = util.RuntimeInsideValidate(g, func(path string) error {
101+
err = util.RuntimeInsideValidate(g, nil, func(path string) error {
102102
testFile := filepath.Join(path, readonlySymlink)
103103
// ln -s .. /readonly-symlink ; readlink -f /readonly-symlink; ls -L /readonly-symlink
104104
if err := os.Symlink("../readonly-symlink", testFile); err != nil {
@@ -130,7 +130,7 @@ func checkReadonlyDeviceNodes(mode uint32) error {
130130
readonlyDevice := "/readonly-device"
131131

132132
g.AddLinuxReadonlyPaths(readonlyDevice)
133-
return util.RuntimeInsideValidate(g, func(path string) error {
133+
return util.RuntimeInsideValidate(g, nil, func(path string) error {
134134
testFile := filepath.Join(path, readonlyDevice)
135135

136136
if err := unix.Mknod(testFile, mode, 0); err != nil {

validation/linux_rootfs_propagation/linux_rootfs_propagation.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ func testLinuxRootPropagation(propMode string) error {
1212
}
1313
g.SetupPrivileged(true)
1414
g.SetLinuxRootPropagation(propMode)
15-
return util.RuntimeInsideValidate(g, nil)
15+
return util.RuntimeInsideValidate(g, nil, nil)
1616
}
1717

1818
func main() {

validation/linux_seccomp/linux_seccomp.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ func main() {
1616
}
1717
g.SetDefaultSeccompAction("allow")
1818
g.SetSyscallAction(syscallArgs)
19-
err = util.RuntimeInsideValidate(g, nil)
19+
err = util.RuntimeInsideValidate(g, nil, nil)
2020
if err != nil {
2121
util.Fatal(err)
2222
}

validation/linux_sysctl/linux_sysctl.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ func main() {
1010
util.Fatal(err)
1111
}
1212
g.AddLinuxSysctl("net.ipv4.ip_forward", "1")
13-
err = util.RuntimeInsideValidate(g, nil)
13+
err = util.RuntimeInsideValidate(g, nil, nil)
1414
if err != nil {
1515
util.Fatal(err)
1616
}

validation/linux_uid_mappings/linux_uid_mappings.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ func main() {
1212
g.AddOrReplaceLinuxNamespace("user", "")
1313
g.AddLinuxUIDMapping(uint32(1000), uint32(0), uint32(2000))
1414
g.AddLinuxGIDMapping(uint32(1000), uint32(0), uint32(3000))
15-
err = util.RuntimeInsideValidate(g, nil)
15+
err = util.RuntimeInsideValidate(g, nil, nil)
1616
if err != nil {
1717
util.Fatal(err)
1818
}

validation/mounts/mounts.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ func main() {
2222
},
2323
}
2424
g.AddMount(mount)
25-
err = util.RuntimeInsideValidate(g, nil)
25+
err = util.RuntimeInsideValidate(g, nil, nil)
2626
if err != nil {
2727
util.Fatal(err)
2828
}

0 commit comments

Comments
 (0)