securedrop-workstation
securedrop-workstation copied to clipboard
Functional RPC policy tests
Status
Ready for review
Description of Changes
Fixes #759.
This was simpler than I first expected it to be.
As discussed in #759, I skipped testing qubes.USBAttach
, qubes.USB
, qubes.OpenInVM
rules, and also GPG-related allow rules, to allow the tests to run without user interaction.
This tests securedrop.Log
(allow and deny), securedrop.Proxy
(allow and deny), and the GPG-related rules (deny). It relies on there existing sys-net
and sys-firewall
VMs, as it uses these as example VMs where various SDW policies should be denied.
Now the securedrop.Log
tests use qubesadmin
to test each running VM with the sd-workstation
to make sure it's allowed, and each running VM without it to make sure it's denied.