Files
kubernetes/pkg/util/filesystem/util_windows_test.go
2025-02-27 13:50:24 -08:00

271 lines
8.9 KiB
Go

//go:build windows
// +build windows
/*
Copyright 2023 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package filesystem
import (
"fmt"
"math/rand"
"net"
"os"
"path/filepath"
"strings"
"sync"
"testing"
"time"
winio "github.com/Microsoft/go-winio"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"golang.org/x/sys/windows"
)
func TestIsUnixDomainSocketPipe(t *testing.T) {
generatePipeName := func(suffixLen int) string {
letter := []rune("abcdef0123456789")
b := make([]rune, suffixLen)
for i := range b {
b[i] = letter[rand.Intn(len(letter))]
}
return "\\\\.\\pipe\\test-pipe" + string(b)
}
testFile := generatePipeName(4)
pipeln, err := winio.ListenPipe(testFile, &winio.PipeConfig{SecurityDescriptor: "D:P(A;;GA;;;BA)(A;;GA;;;SY)"})
defer pipeln.Close()
require.NoErrorf(t, err, "Failed to listen on named pipe for test purposes: %v", err)
result, err := IsUnixDomainSocket(testFile)
assert.NoError(t, err, "Unexpected error from IsUnixDomainSocket.")
assert.False(t, result, "Unexpected result: true from IsUnixDomainSocket.")
}
// This is required as on Windows it's possible for the socket file backing a Unix domain socket to
// exist but not be ready for socket communications yet as per
// https://github.com/kubernetes/kubernetes/issues/104584
func TestPendingUnixDomainSocket(t *testing.T) {
// Create a temporary file that will simulate the Unix domain socket file in a
// not-yet-ready state. We need this because the Kubelet keeps an eye on file
// changes and acts on them, leading to potential race issues as described in
// the referenced issue above
f, err := os.CreateTemp("", "test-domain-socket")
require.NoErrorf(t, err, "Failed to create file for test purposes: %v", err)
testFile := f.Name()
f.Close()
// Start the check at this point
wg := sync.WaitGroup{}
wg.Add(1)
go func() {
result, err := IsUnixDomainSocket(testFile)
assert.Nil(t, err, "Unexpected error from IsUnixDomainSocket: %v", err)
assert.True(t, result, "Unexpected result: false from IsUnixDomainSocket.")
wg.Done()
}()
// Wait a sufficient amount of time to make sure the retry logic kicks in
time.Sleep(socketDialRetryPeriod)
// Replace the temporary file with an actual Unix domain socket file
os.Remove(testFile)
ta, err := net.ResolveUnixAddr("unix", testFile)
require.NoError(t, err, "Failed to ResolveUnixAddr.")
unixln, err := net.ListenUnix("unix", ta)
require.NoError(t, err, "Failed to ListenUnix.")
// Wait for the goroutine to finish, then close the socket
wg.Wait()
unixln.Close()
}
func TestWindowsChmod(t *testing.T) {
// Note: OWNER will be replaced with the actual owner SID in the test cases
testCases := []struct {
fileMode os.FileMode
expectedDescriptor string
}{
{
fileMode: 0777,
expectedDescriptor: "O:OWNERG:BAD:PAI(A;OICI;FA;;;OWNER)(A;OICI;FA;;;BA)(A;OICI;FA;;;BU)",
},
{
fileMode: 0750,
expectedDescriptor: "O:OWNERG:BAD:PAI(A;OICI;FA;;;OWNER)(A;OICI;0x1200a9;;;BA)", // 0x1200a9 = GENERIC_READ | GENERIC_EXECUTE
},
{
fileMode: 0664,
expectedDescriptor: "O:OWNERG:BAD:PAI(A;OICI;0x12019f;;;OWNER)(A;OICI;0x12019f;;;BA)(A;OICI;FR;;;BU)", // 0x12019f = GENERIC_READ | GENERIC_WRITE
},
}
for _, testCase := range testCases {
tempDir, err := os.MkdirTemp("", "test-dir")
require.NoError(t, err, "Failed to create temporary directory.")
defer os.RemoveAll(tempDir)
// Set the file OWNER to current user and GROUP to BUILTIN\Administrators (BA) for test determinism
currentUserSID, err := getCurrentUserSID()
require.NoError(t, err, "Failed to get current user SID")
err = setOwnerInfo(tempDir, currentUserSID)
require.NoError(t, err, "Failed to set current owner SID")
err = setGroupInfo(tempDir, "S-1-5-32-544")
require.NoError(t, err, "Failed to set group for directory.")
err = Chmod(tempDir, testCase.fileMode)
require.NoError(t, err, "Failed to set permissions for directory.")
owner, _, descriptor, err := getPermissionsInfo(tempDir)
require.NoError(t, err, "Failed to get permissions for directory.")
expectedDescriptor := strings.ReplaceAll(testCase.expectedDescriptor, "OWNER", owner)
// In cases where there is a single account in the Administrators group (which the case in CI)
// the SDDL format will simply say LA (for Local Administrator) instead of the actual SID,
// but we want to replace that with the actual SID for determinism
descriptor = strings.ReplaceAll(descriptor, "LA", owner)
assert.Equal(t, expectedDescriptor, descriptor, "Unexpected DACL for directory. when setting permissions to %o", testCase.fileMode)
}
}
// Gets the SID for the current user
func getCurrentUserSID() (string, error) {
token := windows.GetCurrentProcessToken()
user, err := token.GetTokenUser()
if err != nil {
return "", fmt.Errorf("Error getting user SID: %v", err)
}
return user.User.Sid.String(), nil
}
// Gets the owner, group, and entire security descriptor of a file or directory in the SDDL format
// https://learn.microsoft.com/en-us/windows/win32/secauthz/security-descriptor-definition-language
func getPermissionsInfo(path string) (string, string, string, error) {
sd, err := windows.GetNamedSecurityInfo(
path,
windows.SE_FILE_OBJECT,
windows.DACL_SECURITY_INFORMATION|windows.OWNER_SECURITY_INFORMATION|windows.GROUP_SECURITY_INFORMATION)
if err != nil {
return "", "", "", fmt.Errorf("Error getting security descriptor for file %s: %v", path, err)
}
owner, _, err := sd.Owner()
if err != nil {
return "", "", "", fmt.Errorf("Error getting owner SID for file %s: %v", path, err)
}
group, _, err := sd.Group()
if err != nil {
return "", "", "", fmt.Errorf("Error getting group SID for file %s: %v", path, err)
}
sdString := sd.String()
return owner.String(), group.String(), sdString, nil
}
// Sets the OWNER of a file or a directory to the specific SID
func setOwnerInfo(path, owner string) error {
ownerSID, err := windows.StringToSid(owner)
if err != nil {
return fmt.Errorf("Error converting owner SID %s to SID: %v", owner, err)
}
err = windows.SetNamedSecurityInfo(
path, windows.SE_FILE_OBJECT,
windows.OWNER_SECURITY_INFORMATION,
ownerSID, // ownerSID
nil, // Group SID
nil, // DACL
nil, // SACL
)
if err != nil {
return fmt.Errorf("Error setting owner SID for file %s: %v", path, err)
}
return nil
}
// Sets the GROUP of a file or a directory to the specified group
func setGroupInfo(path, group string) error {
groupSID, err := windows.StringToSid(group)
if err != nil {
return fmt.Errorf("Error converting group name %s to SID: %v", group, err)
}
err = windows.SetNamedSecurityInfo(
path,
windows.SE_FILE_OBJECT,
windows.GROUP_SECURITY_INFORMATION,
nil, // owner SID
groupSID,
nil, // DACL
nil, //SACL
)
if err != nil {
return fmt.Errorf("Error setting group SID for file %s: %v", path, err)
}
return nil
}
// TestDeleteFilePermissions tests that when a folder's permissions are set to 0660, child items
// cannot be deleted in the folder but when a folder's permissions are set to 0770, child items can be deleted.
func TestDeleteFilePermissions(t *testing.T) {
// On Windows, connections under an SSH session acquire SeBackupPrivilege and SeRestorePrivilege
// which allows you to delete a file bypassing ACLs (which invalidates this test)
if sshConn := os.Getenv("SSH_CONNECTION"); sshConn != "" {
t.Skip("Skipping test when running over SSH connection.")
}
tempDir, err := os.MkdirTemp("", "test-dir")
require.NoError(t, err, "Failed to create temporary directory.")
err = Chmod(tempDir, 0660)
require.NoError(t, err, "Failed to set permissions for directory to 0660.")
filePath := filepath.Join(tempDir, "test-file")
err = os.WriteFile(filePath, []byte("test"), 0440)
require.NoError(t, err, "Failed to create file in directory.")
err = os.Remove(filePath)
require.Error(t, err, "Expected expected error when trying to remove file in directory.")
err = Chmod(tempDir, 0770)
require.NoError(t, err, "Failed to set permissions for directory to 0770.")
err = os.Remove(filePath)
require.NoError(t, err, "Failed to remove file in directory.")
err = os.Remove(tempDir)
require.NoError(t, err, "Failed to remove directory.")
}
func TestAbsWithSlash(t *testing.T) {
// On Windows, filepath.IsAbs will not return True for paths prefixed with a slash
assert.True(t, IsAbs("/test"))
assert.True(t, IsAbs("\\test"))
assert.False(t, IsAbs("./local"))
assert.False(t, IsAbs("local"))
}