| #!/usr/bin/env python |
| |
| src_header = """/* |
| * Copyright (C) 2014 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package android.cts.security; |
| |
| import com.android.cts.tradefed.build.CtsBuildHelper; |
| import com.android.tradefed.build.IBuildInfo; |
| import com.android.tradefed.device.ITestDevice; |
| import com.android.tradefed.testtype.DeviceTestCase; |
| import com.android.tradefed.testtype.IBuildReceiver; |
| |
| import java.io.BufferedReader; |
| import java.io.File; |
| import java.io.IOException; |
| import java.io.InputStream; |
| import java.io.InputStreamReader; |
| import java.io.FileOutputStream; |
| import java.lang.String; |
| import java.net.URL; |
| import java.util.Scanner; |
| |
| /** |
| * Neverallow Rules SELinux tests. |
| */ |
| public class SELinuxNeverallowRulesTest extends DeviceTestCase { |
| private File sepolicyAnalyze; |
| private File devicePolicyFile; |
| |
| /** |
| * A reference to the device under test. |
| */ |
| private ITestDevice mDevice; |
| |
| private File copyResourceToTempFile(String resName) throws IOException { |
| InputStream is = this.getClass().getResourceAsStream(resName); |
| File tempFile = File.createTempFile("SELinuxHostTest", ".tmp"); |
| FileOutputStream os = new FileOutputStream(tempFile); |
| int rByte = 0; |
| while ((rByte = is.read()) != -1) { |
| os.write(rByte); |
| } |
| os.flush(); |
| os.close(); |
| tempFile.deleteOnExit(); |
| return tempFile; |
| } |
| |
| @Override |
| protected void setUp() throws Exception { |
| super.setUp(); |
| mDevice = getDevice(); |
| |
| /* retrieve the sepolicy-analyze executable from jar */ |
| sepolicyAnalyze = copyResourceToTempFile("/sepolicy-analyze"); |
| sepolicyAnalyze.setExecutable(true); |
| |
| /* obtain sepolicy file from running device */ |
| devicePolicyFile = File.createTempFile("sepolicy", ".tmp"); |
| devicePolicyFile.deleteOnExit(); |
| mDevice.pullFile("/sys/fs/selinux/policy", devicePolicyFile); |
| } |
| """ |
| src_body = "" |
| src_footer = """} |
| """ |
| |
| src_method = """ |
| public void testNeverallowRules() throws Exception { |
| String neverallowRule = "$NEVERALLOW_RULE_HERE$"; |
| |
| /* run sepolicy-analyze neverallow check on policy file using given neverallow rules */ |
| ProcessBuilder pb = new ProcessBuilder(sepolicyAnalyze.getAbsolutePath(), |
| devicePolicyFile.getAbsolutePath(), "neverallow", "-n", |
| neverallowRule); |
| pb.redirectOutput(ProcessBuilder.Redirect.PIPE); |
| pb.redirectErrorStream(true); |
| Process p = pb.start(); |
| p.waitFor(); |
| BufferedReader result = new BufferedReader(new InputStreamReader(p.getInputStream())); |
| String line; |
| StringBuilder errorString = new StringBuilder(); |
| while ((line = result.readLine()) != null) { |
| errorString.append(line); |
| errorString.append("\\n"); |
| } |
| assertTrue("The following errors were encountered when validating the SELinux" |
| + "neverallow rule:\\n" + neverallowRule + "\\n" + errorString, |
| errorString.length() == 0); |
| } |
| """ |