diff options
author | Armin Kuster <akuster808@gmail.com> | 2019-05-06 11:36:58 -0700 |
---|---|---|
committer | Armin Kuster <akuster808@gmail.com> | 2019-05-09 17:45:13 -0700 |
commit | 8eee8727cb09a9fc14e899b4058fcd108f44a0eb (patch) | |
tree | e6cd90e7b08c098e425a8d0efbb29fd88fc9ee2e /lib | |
parent | 5d37937f2e495147fd2a756d22c09f49773ac8ae (diff) | |
download | meta-security-8eee8727cb09a9fc14e899b4058fcd108f44a0eb.tar.gz |
smack-test: add smack tests from meta-intel-iot-security
ported over smack tests
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'lib')
-rw-r--r-- | lib/oeqa/runtime/cases/smack.py | 529 |
1 files changed, 529 insertions, 0 deletions
diff --git a/lib/oeqa/runtime/cases/smack.py b/lib/oeqa/runtime/cases/smack.py new file mode 100644 index 0000000..35e87ef --- /dev/null +++ b/lib/oeqa/runtime/cases/smack.py | |||
@@ -0,0 +1,529 @@ | |||
1 | import unittest | ||
2 | import re | ||
3 | import os | ||
4 | import string | ||
5 | from oeqa.runtime.case import OERuntimeTestCase | ||
6 | from oeqa.core.decorator.depends import OETestDepends | ||
7 | from oeqa.runtime.decorator.package import OEHasPackage | ||
8 | from oeqa.core.decorator.data import skipIfNotFeature | ||
9 | |||
10 | MAX_LABEL_LEN = 255 | ||
11 | LABEL = "a" * MAX_LABEL_LEN | ||
12 | |||
13 | class SmackBasicTest(OERuntimeTestCase): | ||
14 | ''' base smack test ''' | ||
15 | |||
16 | @classmethod | ||
17 | def setUpClass(cls): | ||
18 | cls.smack_path = "" | ||
19 | cls.current_label = "" | ||
20 | cls.uid = 1000 | ||
21 | |||
22 | @skipIfNotFeature('smack', | ||
23 | 'Test requires smack to be in DISTRO_FEATURES') | ||
24 | @OEHasPackage(['smack-test']) | ||
25 | @OETestDepends(['ssh.SSHTest.test_ssh']) | ||
26 | def test_smack_basic(self): | ||
27 | status, output = self.target.run("grep smack /proc/mounts | awk '{print $2}'") | ||
28 | self.smack_path = output | ||
29 | status,output = self.target.run("cat /proc/self/attr/current") | ||
30 | self.current_label = output.strip() | ||
31 | |||
32 | class SmackAccessLabel(SmackBasicTest): | ||
33 | |||
34 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
35 | def test_add_access_label(self): | ||
36 | ''' Test if chsmack can correctly set a SMACK label ''' | ||
37 | filename = "/tmp/test_access_label" | ||
38 | self.target.run("touch %s" %filename) | ||
39 | status, output = self.target.run("chsmack -a %s %s" %(LABEL, filename)) | ||
40 | self.assertEqual( | ||
41 | status, 0, | ||
42 | "Cannot set smack access label. " | ||
43 | "Status and output: %d %s" %(status, output)) | ||
44 | status, output = self.target.run("chsmack %s" %filename) | ||
45 | self.target.run("rm %s" %filename) | ||
46 | m = re.search('(?<=access=")\S+(?=")', output) | ||
47 | if m is None: | ||
48 | self.fail("Did not find access attribute") | ||
49 | else: | ||
50 | label_retrieved = m .group(0) | ||
51 | self.assertEqual( | ||
52 | LABEL, label_retrieved, | ||
53 | "label not set correctly. expected and gotten: " | ||
54 | "%s %s" %(LABEL,label_retrieved)) | ||
55 | |||
56 | |||
57 | class SmackExecLabel(SmackBasicTest): | ||
58 | |||
59 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
60 | def test_add_exec_label(self): | ||
61 | '''Test if chsmack can correctly set a SMACK Exec label''' | ||
62 | filename = "/tmp/test_exec_label" | ||
63 | self.target.run("touch %s" %filename) | ||
64 | status, output = self.target.run("chsmack -e %s %s" %(LABEL, filename)) | ||
65 | self.assertEqual( | ||
66 | status, 0, | ||
67 | "Cannot set smack exec label. " | ||
68 | "Status and output: %d %s" %(status, output)) | ||
69 | status, output = self.target.run("chsmack %s" %filename) | ||
70 | self.target.run("rm %s" %filename) | ||
71 | m= re.search('(?<=execute=")\S+(?=")', output) | ||
72 | if m is None: | ||
73 | self.fail("Did not find execute attribute") | ||
74 | else: | ||
75 | label_retrieved = m.group(0) | ||
76 | self.assertEqual( | ||
77 | LABEL, label_retrieved, | ||
78 | "label not set correctly. expected and gotten: " + | ||
79 | "%s %s" %(LABEL,label_retrieved)) | ||
80 | |||
81 | |||
82 | class SmackMmapLabel(SmackBasicTest): | ||
83 | |||
84 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
85 | def test_add_mmap_label(self): | ||
86 | '''Test if chsmack can correctly set a SMACK mmap label''' | ||
87 | filename = "/tmp/test_exec_label" | ||
88 | self.target.run("touch %s" %filename) | ||
89 | status, output = self.target.run("chsmack -m %s %s" %(LABEL, filename)) | ||
90 | self.assertEqual( | ||
91 | status, 0, | ||
92 | "Cannot set smack mmap label. " | ||
93 | "Status and output: %d %s" %(status, output)) | ||
94 | status, output = self.target.run("chsmack %s" %filename) | ||
95 | self.target.run("rm %s" %filename) | ||
96 | m = re.search('(?<=mmap=")\S+(?=")', output) | ||
97 | if m is None: | ||
98 | self.fail("Did not find mmap attribute") | ||
99 | else: | ||
100 | label_retrieved = m.group(0) | ||
101 | self.assertEqual( | ||
102 | LABEL, label_retrieved, | ||
103 | "label not set correctly. expected and gotten: " + | ||
104 | "%s %s" %(LABEL,label_retrieved)) | ||
105 | |||
106 | |||
107 | class SmackTransmutable(SmackBasicTest): | ||
108 | |||
109 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
110 | def test_add_transmutable(self): | ||
111 | '''Test if chsmack can correctly set a SMACK transmutable mode''' | ||
112 | |||
113 | directory = "~/test_transmutable" | ||
114 | self.target.run("mkdir -p %s" %directory) | ||
115 | status, output = self.target.run("chsmack -t %s" %directory) | ||
116 | self.assertEqual(status, 0, "Cannot set smack transmutable. " | ||
117 | "Status and output: %d %s" %(status, output)) | ||
118 | status, output = self.target.run("chsmack %s" %directory) | ||
119 | self.target.run("rmdir %s" %directory) | ||
120 | m = re.search('(?<=transmute=")\S+(?=")', output) | ||
121 | if m is None: | ||
122 | self.fail("Did not find transmute attribute") | ||
123 | else: | ||
124 | label_retrieved = m.group(0) | ||
125 | self.assertEqual( | ||
126 | "TRUE", label_retrieved, | ||
127 | "label not set correctly. expected and gotten: " + | ||
128 | "%s %s" %(LABEL,label_retrieved)) | ||
129 | |||
130 | |||
131 | class SmackChangeSelfLabelPrivilege(SmackBasicTest): | ||
132 | |||
133 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
134 | def test_privileged_change_self_label(self): | ||
135 | '''Test if privileged process (with CAP_MAC_ADMIN privilege) | ||
136 | can change its label. | ||
137 | ''' | ||
138 | |||
139 | labelf = "/proc/self/attr/current" | ||
140 | command = "/bin/sh -c 'echo PRIVILEGED >%s; cat %s'" %(labelf, labelf) | ||
141 | |||
142 | status, output = self.target.run( | ||
143 | "notroot.py 0 %s %s" %(self.current_label, command)) | ||
144 | |||
145 | self.assertIn("PRIVILEGED", output, | ||
146 | "Privilege process did not change label.Output: %s" %output) | ||
147 | |||
148 | class SmackChangeSelfLabelUnprivilege(SmackBasicTest): | ||
149 | |||
150 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
151 | def test_unprivileged_change_self_label(self): | ||
152 | '''Test if unprivileged process (without CAP_MAC_ADMIN privilege) | ||
153 | cannot change its label''' | ||
154 | |||
155 | command = "/bin/sh -c 'echo %s >/proc/self/attr/current'" %LABEL | ||
156 | status, output = self.target.run( | ||
157 | "notroot.py %d %s %s" | ||
158 | %(self.uid, self.current_label, command) + | ||
159 | " 2>&1 | grep 'Operation not permitted'" ) | ||
160 | |||
161 | self.assertEqual( | ||
162 | status, 0, | ||
163 | "Unprivileged process should not be able to change its label") | ||
164 | |||
165 | |||
166 | class SmackChangeFileLabelPrivilege(SmackBasicTest): | ||
167 | |||
168 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
169 | def test_unprivileged_change_file_label(self): | ||
170 | '''Test if unprivileged process cannot change file labels''' | ||
171 | |||
172 | status, chsmack = self.target.run("which chsmack") | ||
173 | status, touch = self.target.run("which touch") | ||
174 | filename = "/tmp/test_unprivileged_change_file_label" | ||
175 | |||
176 | self.target.run("touch %s" % filename) | ||
177 | self.target.run("notroot.py %d %s" %(self.uid, self.current_label)) | ||
178 | status, output = self.target.run( | ||
179 | "notroot.py " + | ||
180 | "%d unprivileged %s -a %s %s 2>&1 " %(self.uid, chsmack, LABEL, filename) + | ||
181 | "| grep 'Operation not permitted'" ) | ||
182 | |||
183 | self.target.run("rm %s" % filename) | ||
184 | self.assertEqual( status, 0, "Unprivileged process changed label for %s" %filename) | ||
185 | |||
186 | class SmackLoadRule(SmackBasicTest): | ||
187 | |||
188 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
189 | def test_load_smack_rule(self): | ||
190 | '''Test if new smack access rules can be loaded''' | ||
191 | |||
192 | # old 23 character format requires special spaces formatting | ||
193 | # 12345678901234567890123456789012345678901234567890123 | ||
194 | ruleA="TheOne TheOther rwxat" | ||
195 | ruleB="TheOne TheOther r----" | ||
196 | clean="TheOne TheOther -----" | ||
197 | modeA = "rwxat" | ||
198 | modeB = "r" | ||
199 | |||
200 | status, output = self.target.run('echo -n "%s" > %s/load' %(ruleA, self.smack_path)) | ||
201 | status, output = self.target.run( 'cat %s/load | grep "^TheOne" | grep " TheOther "' %self.smack_path) | ||
202 | self.assertEqual(status, 0, "Rule A was not added") | ||
203 | mode = list(filter(bool, output.split(" ")))[2].strip() | ||
204 | self.assertEqual( mode, modeA, "Mode A was not set correctly; mode: %s" %mode) | ||
205 | |||
206 | status, output = self.target.run( 'echo -n "%s" > %s/load' %(ruleB, self.smack_path)) | ||
207 | status, output = self.target.run( 'cat %s/load | grep "^TheOne" | grep " TheOther "' %self.smack_path) | ||
208 | mode = list(filter(bool, output.split(" ")))[2].strip() | ||
209 | self.assertEqual( mode, modeB, "Mode B was not set correctly; mode: %s" %mode) | ||
210 | |||
211 | self.target.run('echo -n "%s" > %s/load' %(clean, self.smack_path)) | ||
212 | |||
213 | |||
214 | class SmackOnlycap(SmackBasicTest): | ||
215 | |||
216 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
217 | def test_smack_onlycap(self): | ||
218 | '''Test if smack onlycap label can be set | ||
219 | |||
220 | test needs to change the running label of the current process, | ||
221 | so whole test takes places on image | ||
222 | ''' | ||
223 | status, output = self.target.run("sh /usr/sbin/test_smack_onlycap.sh") | ||
224 | self.assertEqual(status, 0, output) | ||
225 | |||
226 | class SmackNetlabel(SmackBasicTest): | ||
227 | |||
228 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
229 | def test_smack_netlabel(self): | ||
230 | |||
231 | test_label="191.191.191.191 TheOne" | ||
232 | expected_label="191.191.191.191/32 TheOne" | ||
233 | |||
234 | status, output = self.target.run( "echo -n '%s' > %s/netlabel" %(test_label, self.smack_path)) | ||
235 | self.assertEqual( status, 0, "Netlabel /32 could not be set. Output: %s" %output) | ||
236 | |||
237 | status, output = self.target.run("cat %s/netlabel" %self.smack_path) | ||
238 | self.assertIn( expected_label, output, "Did not find expected label in output: %s" %output) | ||
239 | |||
240 | test_label="253.253.253.0/24 TheOther" | ||
241 | status, output = self.target.run( "echo -n '%s' > %s/netlabel" %(test_label, self.smack_path)) | ||
242 | self.assertEqual( status, 0, "Netlabel /24 could not be set. Output: %s" %output) | ||
243 | |||
244 | status, output = self.target.run("cat %s/netlabel" %self.smack_path) | ||
245 | self.assertIn( | ||
246 | test_label, output, | ||
247 | "Did not find expected label in output: %s" %output) | ||
248 | |||
249 | class SmackCipso(SmackBasicTest): | ||
250 | |||
251 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
252 | def test_smack_cipso(self): | ||
253 | '''Test if smack cipso rules can be set''' | ||
254 | # 12345678901234567890123456789012345678901234567890123456 | ||
255 | ruleA="TheOneA 2 0 " | ||
256 | ruleB="TheOneB 3 1 55 " | ||
257 | ruleC="TheOneC 4 2 17 33 " | ||
258 | |||
259 | status, output = self.target.run( | ||
260 | "echo -n '%s' > %s/cipso" %(ruleA, self.smack_path)) | ||
261 | self.assertEqual(status, 0, | ||
262 | "Could not set cipso label A. Ouput: %s" %output) | ||
263 | |||
264 | status, output = self.target.run( | ||
265 | "cat %s/cipso | grep '^TheOneA'" %self.smack_path) | ||
266 | self.assertEqual(status, 0, "Cipso rule A was not set") | ||
267 | self.assertIn(" 2", output, "Rule A was not set correctly") | ||
268 | |||
269 | status, output = self.target.run( | ||
270 | "echo -n '%s' > %s/cipso" %(ruleB, self.smack_path)) | ||
271 | self.assertEqual(status, 0, | ||
272 | "Could not set cipso label B. Ouput: %s" %output) | ||
273 | |||
274 | status, output = self.target.run( | ||
275 | "cat %s/cipso | grep '^TheOneB'" %self.smack_path) | ||
276 | self.assertEqual(status, 0, "Cipso rule B was not set") | ||
277 | self.assertIn("/55", output, "Rule B was not set correctly") | ||
278 | |||
279 | status, output = self.target.run( | ||
280 | "echo -n '%s' > %s/cipso" %(ruleC, self.smack_path)) | ||
281 | self.assertEqual( | ||
282 | status, 0, | ||
283 | "Could not set cipso label C. Ouput: %s" %output) | ||
284 | |||
285 | status, output = self.target.run( | ||
286 | "cat %s/cipso | grep '^TheOneC'" %self.smack_path) | ||
287 | self.assertEqual(status, 0, "Cipso rule C was not set") | ||
288 | self.assertIn("/17,33", output, "Rule C was not set correctly") | ||
289 | |||
290 | class SmackDirect(SmackBasicTest): | ||
291 | |||
292 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
293 | def test_smack_direct(self): | ||
294 | status, initial_direct = self.target.run( | ||
295 | "cat %s/direct" %self.smack_path) | ||
296 | |||
297 | test_direct="17" | ||
298 | status, output = self.target.run( | ||
299 | "echo '%s' > %s/direct" %(test_direct, self.smack_path)) | ||
300 | self.assertEqual(status, 0 , | ||
301 | "Could not set smack direct. Output: %s" %output) | ||
302 | status, new_direct = self.target.run("cat %s/direct" %self.smack_path) | ||
303 | # initial label before checking | ||
304 | status, output = self.target.run( | ||
305 | "echo '%s' > %s/direct" %(initial_direct, self.smack_path)) | ||
306 | self.assertEqual( | ||
307 | test_direct, new_direct.strip(), | ||
308 | "Smack direct label does not match.") | ||
309 | |||
310 | |||
311 | class SmackAmbient(SmackBasicTest): | ||
312 | |||
313 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
314 | def test_smack_ambient(self): | ||
315 | test_ambient = "test_ambient" | ||
316 | status, initial_ambient = self.target.run("cat %s/ambient" %self.smack_path) | ||
317 | status, output = self.target.run( | ||
318 | "echo '%s' > %s/ambient" %(test_ambient, self.smack_path)) | ||
319 | self.assertEqual(status, 0, | ||
320 | "Could not set smack ambient. Output: %s" %output) | ||
321 | |||
322 | status, output = self.target.run("cat %s/ambient" %self.smack_path) | ||
323 | # Filter '\x00', which is sometimes added to the ambient label | ||
324 | new_ambient = ''.join(filter(lambda x: x in string.printable, output)) | ||
325 | initial_ambient = ''.join(filter(lambda x: x in string.printable, initial_ambient)) | ||
326 | status, output = self.target.run( | ||
327 | "echo '%s' > %s/ambient" %(initial_ambient, self.smack_path)) | ||
328 | self.assertEqual( | ||
329 | test_ambient, new_ambient.strip(), | ||
330 | "Ambient label does not match") | ||
331 | |||
332 | |||
333 | class SmackloadBinary(SmackBasicTest): | ||
334 | |||
335 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
336 | def test_smackload(self): | ||
337 | '''Test if smackload command works''' | ||
338 | rule="testobject testsubject rwx" | ||
339 | |||
340 | status, output = self.target.run("echo -n '%s' > /tmp/rules" %rule) | ||
341 | status, output = self.target.run("smackload /tmp/rules") | ||
342 | self.assertEqual( status, 0, "Smackload failed to load rule. Output: %s" %output) | ||
343 | |||
344 | status, output = self.target.run( "cat %s/load | grep '%s'" %(self.smack_path, rule)) | ||
345 | self.assertEqual(status, 0, "Smackload rule was loaded correctly") | ||
346 | |||
347 | |||
348 | class SmackcipsoBinary(SmackBasicTest): | ||
349 | |||
350 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
351 | def test_smackcipso(self): | ||
352 | '''Test if smackcipso command works''' | ||
353 | # 12345678901234567890123456789012345678901234567890123456 | ||
354 | rule="cipsolabel 2 2 " | ||
355 | |||
356 | status, output = self.target.run("echo '%s' | smackcipso" %rule) | ||
357 | self.assertEqual( status, 0, "Smackcipso failed to load rule. Output: %s" %output) | ||
358 | |||
359 | status, output = self.target.run( | ||
360 | "cat %s/cipso | grep 'cipsolabel'" %self.smack_path) | ||
361 | self.assertEqual(status, 0, "smackcipso rule was loaded correctly") | ||
362 | self.assertIn( "2/2", output, "Rule was not set correctly. Got: %s" %output) | ||
363 | |||
364 | |||
365 | class SmackEnforceFileAccess(SmackBasicTest): | ||
366 | |||
367 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
368 | def test_smack_enforce_file_access(self): | ||
369 | '''Test if smack file access is enforced (rwx) | ||
370 | |||
371 | test needs to change the running label of the current process, | ||
372 | so whole test takes places on image | ||
373 | ''' | ||
374 | status, output = self.target.run("sh /usr/sbin/smack_test_file_access.sh") | ||
375 | self.assertEqual(status, 0, output) | ||
376 | |||
377 | |||
378 | class SmackEnforceMmap(SmackBasicTest): | ||
379 | |||
380 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
381 | def test_smack_mmap_enforced(self): | ||
382 | '''Test if smack mmap access is enforced''' | ||
383 | raise unittest.SkipTest("Depends on mmap_test, which was removed from the layer while investigating its license.") | ||
384 | |||
385 | # 12345678901234567890123456789012345678901234567890123456 | ||
386 | delr1="mmap_label mmap_test_label1 -----" | ||
387 | delr2="mmap_label mmap_test_label2 -----" | ||
388 | delr3="mmap_file_label mmap_test_label1 -----" | ||
389 | delr4="mmap_file_label mmap_test_label2 -----" | ||
390 | |||
391 | RuleA="mmap_label mmap_test_label1 rw---" | ||
392 | RuleB="mmap_label mmap_test_label2 r--at" | ||
393 | RuleC="mmap_file_label mmap_test_label1 rw---" | ||
394 | RuleD="mmap_file_label mmap_test_label2 rwxat" | ||
395 | |||
396 | mmap_label="mmap_label" | ||
397 | file_label="mmap_file_label" | ||
398 | test_file = "/usr/sbin/smack_test_mmap" | ||
399 | mmap_exe = "/tmp/mmap_test" | ||
400 | status, echo = self.target.run("which echo") | ||
401 | status, output = self.target.run( | ||
402 | "notroot.py %d %s %s 'test' > %s" \ | ||
403 | %(self.uid, self.current_label, echo, test_file)) | ||
404 | status, output = self.target.run("ls %s" %test_file) | ||
405 | self.assertEqual(status, 0, "Could not create mmap test file") | ||
406 | self.target.run("chsmack -m %s %s" %(file_label, test_file)) | ||
407 | self.target.run("chsmack -e %s %s" %(mmap_label, mmap_exe)) | ||
408 | |||
409 | # test with no rules with mmap label or exec label as subject | ||
410 | # access should be granted | ||
411 | self.target.run('echo -n "%s" > %s/load' %(delr1, self.smack_path)) | ||
412 | self.target.run('echo -n "%s" > %s/load' %(delr2, self.smack_path)) | ||
413 | self.target.run('echo -n "%s" > %s/load' %(delr3, self.smack_path)) | ||
414 | self.target.run('echo -n "%s" > %s/load' %(delr4, self.smack_path)) | ||
415 | status, output = self.target.run("%s %s 0 2" % (mmap_exe, test_file)) | ||
416 | self.assertEqual( | ||
417 | status, 0, | ||
418 | "Should have mmap access without rules. Output: %s" %output) | ||
419 | |||
420 | # add rules that do not match access required | ||
421 | self.target.run('echo -n "%s" > %s/load' %(RuleA, self.smack_path)) | ||
422 | self.target.run('echo -n "%s" > %s/load' %(RuleB, self.smack_path)) | ||
423 | status, output = self.target.run("%s %s 0 2" % (mmap_exe, test_file)) | ||
424 | self.assertNotEqual( | ||
425 | status, 0, | ||
426 | "Should not have mmap access with unmatching rules. " + | ||
427 | "Output: %s" %output) | ||
428 | self.assertIn( | ||
429 | "Permission denied", output, | ||
430 | "Mmap access should be denied with unmatching rules") | ||
431 | |||
432 | # add rule to match only partially (one way) | ||
433 | self.target.run('echo -n "%s" > %s/load' %(RuleC, self.smack_path)) | ||
434 | status, output = self.target.run("%s %s 0 2" %(mmap_exe, test_file)) | ||
435 | self.assertNotEqual( | ||
436 | status, 0, | ||
437 | "Should not have mmap access with partial matching rules. " + | ||
438 | "Output: %s" %output) | ||
439 | self.assertIn( | ||
440 | "Permission denied", output, | ||
441 | "Mmap access should be denied with partial matching rules") | ||
442 | |||
443 | # add rule to match fully | ||
444 | self.target.run('echo -n "%s" > %s/load' %(RuleD, self.smack_path)) | ||
445 | status, output = self.target.run("%s %s 0 2" %(mmap_exe, test_file)) | ||
446 | self.assertEqual( | ||
447 | status, 0, | ||
448 | "Should have mmap access with full matching rules." + | ||
449 | "Output: %s" %output) | ||
450 | |||
451 | |||
452 | class SmackEnforceTransmutable(SmackBasicTest): | ||
453 | |||
454 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
455 | def test_smack_transmute_dir(self): | ||
456 | '''Test if smack transmute attribute works | ||
457 | |||
458 | test needs to change the running label of the current process, | ||
459 | so whole test takes places on image | ||
460 | ''' | ||
461 | test_dir = "/tmp/smack_transmute_dir" | ||
462 | label="transmute_label" | ||
463 | status, initial_label = self.target.run("cat /proc/self/attr/current") | ||
464 | |||
465 | self.target.run("mkdir -p %s" % test_dir) | ||
466 | self.target.run("chsmack -a %s %s" % (label, test_dir)) | ||
467 | self.target.run("chsmack -t %s" % test_dir) | ||
468 | self.target.run("echo -n '%s %s rwxat' | smackload" %(initial_label, label) ) | ||
469 | |||
470 | self.target.run("touch %s/test" % test_dir) | ||
471 | status, output = self.target.run("chsmack %s/test" % test_dir) | ||
472 | self.assertIn( 'access="%s"' %label, output, | ||
473 | "Did not get expected label. Output: %s" % output) | ||
474 | |||
475 | |||
476 | class SmackTcpSockets(SmackBasicTest): | ||
477 | |||
478 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
479 | def test_smack_tcp_sockets(self): | ||
480 | '''Test if smack is enforced on tcp sockets | ||
481 | |||
482 | whole test takes places on image, depends on tcp_server/tcp_client''' | ||
483 | |||
484 | status, output = self.target.run("sh /usr/sbin/test_smack_tcp_sockets.sh") | ||
485 | self.assertEqual(status, 0, output) | ||
486 | |||
487 | |||
488 | class SmackUdpSockets(SmackBasicTest): | ||
489 | |||
490 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
491 | def test_smack_udp_sockets(self): | ||
492 | '''Test if smack is enforced on udp sockets | ||
493 | |||
494 | whole test takes places on image, depends on udp_server/udp_client''' | ||
495 | |||
496 | status, output = self.target.run("sh /usr/sbin/test_smack_udp_sockets.sh") | ||
497 | self.assertEqual(status, 0, output) | ||
498 | |||
499 | |||
500 | class SmackFileLabels(SmackBasicTest): | ||
501 | |||
502 | @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) | ||
503 | def test_smack_labels(self): | ||
504 | '''Check for correct Smack labels.''' | ||
505 | expected = ''' | ||
506 | /tmp/ access="*" | ||
507 | /etc/ access="System::Shared" transmute="TRUE" | ||
508 | /etc/passwd access="System::Shared" | ||
509 | /etc/terminfo access="System::Shared" transmute="TRUE" | ||
510 | /etc/skel/ access="System::Shared" transmute="TRUE" | ||
511 | /etc/skel/.profile access="System::Shared" | ||
512 | /var/log/ access="System::Log" transmute="TRUE" | ||
513 | /var/tmp/ access="*" | ||
514 | ''' | ||
515 | files = ' '.join([x.split()[0] for x in expected.split('\n') if x]) | ||
516 | files_wildcard = ' '.join([x + '/*' for x in files.split()]) | ||
517 | # Auxiliary information. | ||
518 | status, output = self.target.run( | ||
519 | 'set -x; mount; ls -l -d %s; find %s | xargs ls -d -l; find %s | xargs chsmack' % ( | ||
520 | ' '.join([x.rstrip('/') for x in files.split()]), files, files | ||
521 | ) | ||
522 | ) | ||
523 | msg = "File status:\n" + output | ||
524 | status, output = self.target.run('chsmack %s' % files) | ||
525 | self.assertEqual( | ||
526 | status, 0, msg="status and output: %s and %s\n%s" % (status,output, msg)) | ||
527 | self.longMessage = True | ||
528 | self.maxDiff = None | ||
529 | self.assertEqual(output.strip().split('\n'), expected.strip().split('\n'), msg=msg) | ||