Files
kubesolo-os/test/integration/test-security-hardening.sh
Adolfo Delorenzo 958524e6d8
Some checks failed
CI / Go Tests (push) Has been cancelled
CI / Build Go Binaries (amd64, linux, linux-amd64) (push) Has been cancelled
CI / Build Go Binaries (arm64, linux, linux-arm64) (push) Has been cancelled
CI / Shellcheck (push) Has been cancelled
fix: Go version, test scripts, and shellcheck warnings from validation
- Dockerfile.builder: Go 1.24.0 → 1.25.5 (go.mod requires it)
- test-boot.sh: use direct kernel boot via ISO extraction instead of
  broken -cdrom + -append; fix boot marker to "KubeSolo is running"
  (Stage 90 blocks on wait, never emits "complete")
- test-security-hardening.sh: same direct kernel boot and marker fixes
- run-vm.sh, dev-vm.sh, dev-vm-arm64.sh: quote QEMU -net args to
  silence shellcheck SC2054
- fetch-components.sh, fetch-rpi-firmware.sh, dev-vm-arm64.sh: fix
  trap quoting (SC2064)

Validated: full Docker build, 94 Go tests pass, QEMU boot (73s),
security hardening test (6/6 pass, 1 AppArmor skip pending kernel
rebuild).

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-12 13:30:55 -06:00

262 lines
8.8 KiB
Bash
Executable File

#!/bin/bash
# test-security-hardening.sh — Verify OS security hardening is applied
# Usage: ./test/integration/test-security-hardening.sh <iso-path>
# Exit 0 = PASS, Exit 1 = FAIL
#
# Tests:
# 1. Kubeconfig server bound to localhost only
# 2. AppArmor profiles loaded (or graceful skip if kernel lacks support)
# 3. Kernel module loading locked
# 4. Mount options (noexec on /tmp, nosuid on /run, noexec on /dev/shm)
# 5. Sysctl hardening values applied
set -euo pipefail
ISO="${1:?Usage: $0 <path-to-iso>}"
TIMEOUT_BOOT=180 # seconds to wait for boot
SERIAL_LOG=$(mktemp /tmp/kubesolo-security-test-XXXXXX.log)
# Temp data disk
DATA_DISK=$(mktemp /tmp/kubesolo-security-data-XXXXXX.img)
dd if=/dev/zero of="$DATA_DISK" bs=1M count=1024 2>/dev/null
mkfs.ext4 -q -L KSOLODATA "$DATA_DISK" 2>/dev/null
QEMU_PID=""
EXTRACT_DIR=""
cleanup() {
[ -n "$QEMU_PID" ] && kill "$QEMU_PID" 2>/dev/null || true
rm -f "$DATA_DISK" "$SERIAL_LOG"
[ -n "$EXTRACT_DIR" ] && rm -rf "$EXTRACT_DIR"
}
trap cleanup EXIT
echo "==> Security Hardening Test: $ISO"
echo " Timeout: ${TIMEOUT_BOOT}s"
echo " Serial log: $SERIAL_LOG"
# Detect KVM
KVM_FLAG=""
[ -w /dev/kvm ] 2>/dev/null && KVM_FLAG="-enable-kvm"
# Extract kernel + initramfs from ISO (direct kernel boot required for -append)
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
PROJECT_ROOT="$(cd "$SCRIPT_DIR/../.." && pwd)"
ROOTFS_DIR="${ROOTFS_DIR:-$PROJECT_ROOT/build/rootfs-work}"
EXTRACT_DIR=""
VMLINUZ=""
INITRAMFS=""
if [ -f "$ROOTFS_DIR/vmlinuz" ] && [ -f "$ROOTFS_DIR/kubesolo-os.gz" ]; then
VMLINUZ="$ROOTFS_DIR/vmlinuz"
INITRAMFS="$ROOTFS_DIR/kubesolo-os.gz"
echo " Using kernel/initramfs from build directory"
else
EXTRACT_DIR="$(mktemp -d /tmp/kubesolo-extract-XXXXXX)"
EXTRACTED=0
echo " Extracting kernel/initramfs from ISO..."
if [ $EXTRACTED -eq 0 ] && command -v bsdtar >/dev/null 2>&1; then
if bsdtar -xf "$ISO" -C "$EXTRACT_DIR" boot/vmlinuz boot/kubesolo-os.gz 2>/dev/null; then
EXTRACTED=1
fi
fi
if [ $EXTRACTED -eq 0 ] && command -v isoinfo >/dev/null 2>&1; then
mkdir -p "$EXTRACT_DIR/boot"
isoinfo -i "$ISO" -x "/BOOT/VMLINUZ;1" > "$EXTRACT_DIR/boot/vmlinuz" 2>/dev/null || true
isoinfo -i "$ISO" -x "/BOOT/KUBESOLO-OS.GZ;1" > "$EXTRACT_DIR/boot/kubesolo-os.gz" 2>/dev/null || true
if [ -s "$EXTRACT_DIR/boot/vmlinuz" ] && [ -s "$EXTRACT_DIR/boot/kubesolo-os.gz" ]; then
EXTRACTED=1
else
rm -f "$EXTRACT_DIR/boot/vmlinuz" "$EXTRACT_DIR/boot/kubesolo-os.gz"
fi
fi
if [ $EXTRACTED -eq 0 ] && [ "$(uname)" = "Linux" ]; then
ISO_MOUNT="$EXTRACT_DIR/mnt"
mkdir -p "$ISO_MOUNT"
if mount -o loop,ro "$ISO" "$ISO_MOUNT" 2>/dev/null; then
mkdir -p "$EXTRACT_DIR/boot"
cp "$ISO_MOUNT/boot/vmlinuz" "$EXTRACT_DIR/boot/" 2>/dev/null || true
cp "$ISO_MOUNT/boot/kubesolo-os.gz" "$EXTRACT_DIR/boot/" 2>/dev/null || true
umount "$ISO_MOUNT" 2>/dev/null || true
if [ -f "$EXTRACT_DIR/boot/vmlinuz" ] && [ -f "$EXTRACT_DIR/boot/kubesolo-os.gz" ]; then
EXTRACTED=1
fi
fi
fi
if [ $EXTRACTED -eq 0 ]; then
echo "ERROR: Failed to extract kernel/initramfs from ISO."
exit 1
fi
VMLINUZ="$EXTRACT_DIR/boot/vmlinuz"
INITRAMFS="$EXTRACT_DIR/boot/kubesolo-os.gz"
fi
# Launch QEMU in background with direct kernel boot
# shellcheck disable=SC2086
qemu-system-x86_64 \
-m 2048 -smp 2 \
-nographic \
$KVM_FLAG \
-kernel "$VMLINUZ" \
-initrd "$INITRAMFS" \
-drive "file=$DATA_DISK,format=raw,if=virtio" \
-net "nic,model=virtio" \
-net "user,hostfwd=tcp::18080-:8080" \
-serial "file:$SERIAL_LOG" \
-append "console=ttyS0,115200n8 kubesolo.data=/dev/vda kubesolo.debug" \
&
QEMU_PID=$!
# Wait for boot to complete (stage 90)
echo " Waiting for boot..."
ELAPSED=0
BOOTED=0
while [ "$ELAPSED" -lt "$TIMEOUT_BOOT" ]; do
if grep -q "\[kubesolo-init\] \[OK\] KubeSolo is running" "$SERIAL_LOG" 2>/dev/null; then
BOOTED=1
break
fi
if ! kill -0 "$QEMU_PID" 2>/dev/null; then
echo ""
echo "==> FAIL: QEMU exited prematurely"
echo " Last 20 lines of serial log:"
tail -20 "$SERIAL_LOG" 2>/dev/null
exit 1
fi
sleep 2
ELAPSED=$((ELAPSED + 2))
printf "\r Elapsed: %ds / %ds" "$ELAPSED" "$TIMEOUT_BOOT"
done
echo ""
if [ "$BOOTED" = "0" ]; then
echo "==> FAIL: Boot did not complete within ${TIMEOUT_BOOT}s"
echo " Last 30 lines:"
tail -30 "$SERIAL_LOG" 2>/dev/null
exit 1
fi
echo " Boot completed in ${ELAPSED}s"
echo ""
# Give the system a moment to finish post-boot setup
sleep 5
# ============================================================
# Security checks against serial log output
# ============================================================
PASS=0
FAIL=0
SKIP=0
check_pass() { echo " PASS: $1"; PASS=$((PASS + 1)); }
check_fail() { echo " FAIL: $1"; FAIL=$((FAIL + 1)); }
check_skip() { echo " SKIP: $1"; SKIP=$((SKIP + 1)); }
echo "--- Test 1: Kubeconfig server bound to localhost ---"
# The kubeconfig server should bind to 127.0.0.1:8080
# We forwarded guest:8080 to host:18080, but since it's bound to localhost
# inside the guest, the QEMU port forward should NOT reach it.
# Try to connect — it should fail or timeout.
if curl -s --connect-timeout 3 "http://localhost:18080" >/dev/null 2>&1; then
check_fail "Kubeconfig server reachable from external interface (port forward worked)"
else
check_pass "Kubeconfig server NOT reachable externally (bound to localhost)"
fi
echo ""
echo "--- Test 2: AppArmor ---"
if grep -q "AppArmor profiles loaded" "$SERIAL_LOG" 2>/dev/null; then
check_pass "AppArmor profiles loaded"
elif grep -q "AppArmor not available" "$SERIAL_LOG" 2>/dev/null; then
check_skip "AppArmor not in kernel (expected before kernel rebuild)"
elif grep -q "AppArmor disabled" "$SERIAL_LOG" 2>/dev/null; then
check_skip "AppArmor disabled via boot parameter"
else
# Check if the 35-apparmor stage ran at all
if grep -q "Stage 35-apparmor.sh" "$SERIAL_LOG" 2>/dev/null; then
check_fail "AppArmor stage ran but status unclear"
else
check_skip "AppArmor stage not found (may not be in init yet)"
fi
fi
echo ""
echo "--- Test 3: Kernel module loading lock ---"
if grep -q "Kernel module loading locked" "$SERIAL_LOG" 2>/dev/null; then
check_pass "Kernel module loading locked"
elif grep -q "Module lock DISABLED" "$SERIAL_LOG" 2>/dev/null; then
check_skip "Module lock disabled via kubesolo.nomodlock"
elif grep -q "Stage 85-security-lockdown.sh" "$SERIAL_LOG" 2>/dev/null; then
check_fail "Security lockdown stage ran but module lock unclear"
else
check_fail "Security lockdown stage not found"
fi
echo ""
echo "--- Test 4: Mount hardening ---"
# Check for noexec on /tmp
if grep -q "noexec.*nosuid.*nodev.*tmpfs.*/tmp" "$SERIAL_LOG" 2>/dev/null || \
grep -q "mount.*tmpfs.*/tmp.*noexec" "$SERIAL_LOG" 2>/dev/null; then
check_pass "/tmp mounted with noexec,nosuid,nodev"
else
# The mount itself may not appear in the log, but the init script ran
if grep -q "Stage 00-early-mount.sh complete" "$SERIAL_LOG" 2>/dev/null; then
check_pass "Early mount stage completed (mount options in script)"
else
check_fail "/tmp mount options not verified"
fi
fi
# Check nosuid on /run
if grep -q "Stage 00-early-mount.sh complete" "$SERIAL_LOG" 2>/dev/null; then
check_pass "/run mounted with nosuid,nodev (early mount complete)"
else
check_fail "/run mount options not verified"
fi
echo ""
echo "--- Test 5: Sysctl hardening ---"
if grep -q "Sysctl settings applied" "$SERIAL_LOG" 2>/dev/null; then
check_pass "Sysctl settings applied (40-sysctl.sh)"
else
check_fail "Sysctl stage did not report success"
fi
# Check specific sysctl values if debug output includes them
if grep -q "kptr_restrict" "$SERIAL_LOG" 2>/dev/null; then
check_pass "kptr_restrict enforced"
elif grep -q "Stage 85-security-lockdown.sh" "$SERIAL_LOG" 2>/dev/null; then
check_pass "kptr_restrict enforced via security lockdown stage"
fi
# ============================================================
# Summary
# ============================================================
echo ""
echo "========================================"
echo " Security Hardening Test Results"
echo "========================================"
echo " Passed: $PASS"
echo " Failed: $FAIL"
echo " Skipped: $SKIP"
echo "========================================"
if [ "$FAIL" -gt 0 ]; then
echo ""
echo "==> FAIL: $FAIL security check(s) failed"
echo ""
echo " Last 40 lines of serial log:"
tail -40 "$SERIAL_LOG" 2>/dev/null
exit 1
fi
echo ""
echo "==> PASS: All security hardening checks passed"
exit 0