blob: f0c1906a0d80b6743eb0e29d46d4a419b80e8db4 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
|
#!/usr/bin/expect -f
# This file is part of Firejail project
# Copyright (C) 2014-2017 Firejail Authors
# License GPL v2
set timeout 10
spawn $env(SHELL)
match_max 100000
send -- "firejail --audit\r"
expect {
timeout {puts "TESTING ERROR 0\n";exit}
"Firejail Audit"
}
expect {
timeout {puts "TESTING ERROR 1\n";exit}
"is running in a PID namespace"
}
expect {
timeout {puts "TESTING ERROR 2\n";exit}
"container/sandbox firejail"
}
expect {
timeout {puts "TESTING ERROR 3\n";exit}
"seccomp BPF enabled"
}
expect {
timeout {puts "TESTING ERROR 4\n";exit}
"all capabilities are disabled"
}
expect {
timeout {puts "TESTING ERROR 5\n";exit}
"dev directory seems to be fully populated"
}
after 100
send -- "firejail --audit\r"
expect {
timeout {puts "TESTING ERROR 6\n";exit}
"Firejail Audit"
}
expect {
timeout {puts "TESTING ERROR 7\n";exit}
"is running in a PID namespace"
}
expect {
timeout {puts "TESTING ERROR 8\n";exit}
"container/sandbox firejail"
}
expect {
timeout {puts "TESTING ERROR 9\n";exit}
"seccomp BPF enabled"
}
expect {
timeout {puts "TESTING ERROR 10\n";exit}
"all capabilities are disabled"
}
expect {
timeout {puts "TESTING ERROR 11\n";exit}
"dev directory seems to be fully populated"
}
after 100
send -- "firejail --audit=blablabla\r"
expect {
timeout {puts "TESTING ERROR 12\n";exit}
"cannot find the audit program"
}
after 100
send -- "firejail --audit=\r"
expect {
timeout {puts "TESTING ERROR 12\n";exit}
"invalid audit program"
}
after 100
puts "\nall done\n"
|