| import unittest |
| import re |
| import os |
| import string |
| from oeqa.runtime.case import OERuntimeTestCase |
| from oeqa.core.decorator.depends import OETestDepends |
| from oeqa.runtime.decorator.package import OEHasPackage |
| from oeqa.core.decorator.data import skipIfNotFeature |
| |
| MAX_LABEL_LEN = 255 |
| LABEL = "a" * MAX_LABEL_LEN |
| |
| class SmackBasicTest(OERuntimeTestCase): |
| ''' base smack test ''' |
| |
| @classmethod |
| def setUpClass(cls): |
| cls.smack_path = "" |
| cls.current_label = "" |
| cls.uid = 1000 |
| |
| @skipIfNotFeature('smack', |
| 'Test requires smack to be in DISTRO_FEATURES') |
| @OEHasPackage(['smack-test']) |
| @OETestDepends(['ssh.SSHTest.test_ssh']) |
| def test_smack_basic(self): |
| status, output = self.target.run("grep smack /proc/mounts | awk '{print $2}'") |
| self.smack_path = output |
| status,output = self.target.run("cat /proc/self/attr/current") |
| self.current_label = output.strip() |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_add_access_label(self): |
| ''' Test if chsmack can correctly set a SMACK label ''' |
| filename = "/tmp/test_access_label" |
| self.target.run("touch %s" %filename) |
| status, output = self.target.run("chsmack -a %s %s" %(LABEL, filename)) |
| self.assertEqual( |
| status, 0, |
| "Cannot set smack access label. " |
| "Status and output: %d %s" %(status, output)) |
| status, output = self.target.run("chsmack %s" %filename) |
| self.target.run("rm %s" %filename) |
| m = re.search('(?<=access=")\S+(?=")', output) |
| if m is None: |
| self.fail("Did not find access attribute") |
| else: |
| label_retrieved = m .group(0) |
| self.assertEqual( |
| LABEL, label_retrieved, |
| "label not set correctly. expected and gotten: " |
| "%s %s" %(LABEL,label_retrieved)) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_add_exec_label(self): |
| '''Test if chsmack can correctly set a SMACK Exec label''' |
| filename = "/tmp/test_exec_label" |
| self.target.run("touch %s" %filename) |
| status, output = self.target.run("chsmack -e %s %s" %(LABEL, filename)) |
| self.assertEqual( |
| status, 0, |
| "Cannot set smack exec label. " |
| "Status and output: %d %s" %(status, output)) |
| status, output = self.target.run("chsmack %s" %filename) |
| self.target.run("rm %s" %filename) |
| m= re.search('(?<=execute=")\S+(?=")', output) |
| if m is None: |
| self.fail("Did not find execute attribute") |
| else: |
| label_retrieved = m.group(0) |
| self.assertEqual( |
| LABEL, label_retrieved, |
| "label not set correctly. expected and gotten: " + |
| "%s %s" %(LABEL,label_retrieved)) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_add_mmap_label(self): |
| '''Test if chsmack can correctly set a SMACK mmap label''' |
| filename = "/tmp/test_exec_label" |
| self.target.run("touch %s" %filename) |
| status, output = self.target.run("chsmack -m %s %s" %(LABEL, filename)) |
| self.assertEqual( |
| status, 0, |
| "Cannot set smack mmap label. " |
| "Status and output: %d %s" %(status, output)) |
| status, output = self.target.run("chsmack %s" %filename) |
| self.target.run("rm %s" %filename) |
| m = re.search('(?<=mmap=")\S+(?=")', output) |
| if m is None: |
| self.fail("Did not find mmap attribute") |
| else: |
| label_retrieved = m.group(0) |
| self.assertEqual( |
| LABEL, label_retrieved, |
| "label not set correctly. expected and gotten: " + |
| "%s %s" %(LABEL,label_retrieved)) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_add_transmutable(self): |
| '''Test if chsmack can correctly set a SMACK transmutable mode''' |
| |
| directory = "~/test_transmutable" |
| self.target.run("mkdir -p %s" %directory) |
| status, output = self.target.run("chsmack -t %s" %directory) |
| self.assertEqual(status, 0, "Cannot set smack transmutable. " |
| "Status and output: %d %s" %(status, output)) |
| status, output = self.target.run("chsmack %s" %directory) |
| self.target.run("rmdir %s" %directory) |
| m = re.search('(?<=transmute=")\S+(?=")', output) |
| if m is None: |
| self.fail("Did not find transmute attribute") |
| else: |
| label_retrieved = m.group(0) |
| self.assertEqual( |
| "TRUE", label_retrieved, |
| "label not set correctly. expected and gotten: " + |
| "%s %s" %(LABEL,label_retrieved)) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_privileged_change_self_label(self): |
| '''Test if privileged process (with CAP_MAC_ADMIN privilege) |
| can change its label. |
| ''' |
| |
| labelf = "/proc/self/attr/current" |
| command = "/bin/sh -c 'echo PRIVILEGED >%s; cat %s'" %(labelf, labelf) |
| |
| status, output = self.target.run( |
| "notroot.py 0 %s %s" %(self.current_label, command)) |
| |
| self.assertIn("PRIVILEGED", output, |
| "Privilege process did not change label.Output: %s" %output) |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_unprivileged_change_self_label(self): |
| '''Test if unprivileged process (without CAP_MAC_ADMIN privilege) |
| cannot change its label''' |
| |
| command = "/bin/sh -c 'echo %s >/proc/self/attr/current'" %LABEL |
| status, output = self.target.run( |
| "notroot.py %d %s %s" |
| %(self.uid, self.current_label, command) + |
| " 2>&1 | grep 'Operation not permitted'" ) |
| |
| self.assertEqual( |
| status, 0, |
| "Unprivileged process should not be able to change its label") |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_unprivileged_change_file_label(self): |
| '''Test if unprivileged process cannot change file labels''' |
| |
| status, chsmack = self.target.run("which chsmack") |
| status, touch = self.target.run("which touch") |
| filename = "/tmp/test_unprivileged_change_file_label" |
| |
| self.target.run("touch %s" % filename) |
| self.target.run("notroot.py %d %s" %(self.uid, self.current_label)) |
| status, output = self.target.run( |
| "notroot.py " + |
| "%d unprivileged %s -a %s %s 2>&1 " %(self.uid, chsmack, LABEL, filename) + |
| "| grep 'Operation not permitted'" ) |
| |
| self.target.run("rm %s" % filename) |
| self.assertEqual( status, 0, "Unprivileged process changed label for %s" %filename) |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_load_smack_rule(self): |
| '''Test if new smack access rules can be loaded''' |
| |
| # old 23 character format requires special spaces formatting |
| # 12345678901234567890123456789012345678901234567890123 |
| ruleA="TheOne TheOther rwxat" |
| ruleB="TheOne TheOther r----" |
| clean="TheOne TheOther -----" |
| modeA = "rwxat" |
| modeB = "r" |
| |
| status, output = self.target.run('echo -n "%s" > %s/load' %(ruleA, self.smack_path)) |
| status, output = self.target.run( 'cat %s/load | grep "^TheOne" | grep " TheOther "' %self.smack_path) |
| self.assertEqual(status, 0, "Rule A was not added") |
| mode = list(filter(bool, output.split(" ")))[2].strip() |
| self.assertEqual( mode, modeA, "Mode A was not set correctly; mode: %s" %mode) |
| |
| status, output = self.target.run( 'echo -n "%s" > %s/load' %(ruleB, self.smack_path)) |
| status, output = self.target.run( 'cat %s/load | grep "^TheOne" | grep " TheOther "' %self.smack_path) |
| mode = list(filter(bool, output.split(" ")))[2].strip() |
| self.assertEqual( mode, modeB, "Mode B was not set correctly; mode: %s" %mode) |
| |
| self.target.run('echo -n "%s" > %s/load' %(clean, self.smack_path)) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_onlycap(self): |
| '''Test if smack onlycap label can be set |
| |
| test needs to change the running label of the current process, |
| so whole test takes places on image |
| ''' |
| status, output = self.target.run("sh /usr/sbin/test_smack_onlycap.sh") |
| self.assertEqual(status, 0, output) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_netlabel(self): |
| |
| test_label="191.191.191.191 TheOne" |
| expected_label="191.191.191.191/32 TheOne" |
| |
| status, output = self.target.run( "echo -n '%s' > %s/netlabel" %(test_label, self.smack_path)) |
| self.assertEqual( status, 0, "Netlabel /32 could not be set. Output: %s" %output) |
| |
| status, output = self.target.run("cat %s/netlabel" %self.smack_path) |
| self.assertIn( expected_label, output, "Did not find expected label in output: %s" %output) |
| |
| test_label="253.253.253.0/24 TheOther" |
| status, output = self.target.run( "echo -n '%s' > %s/netlabel" %(test_label, self.smack_path)) |
| self.assertEqual( status, 0, "Netlabel /24 could not be set. Output: %s" %output) |
| |
| status, output = self.target.run("cat %s/netlabel" %self.smack_path) |
| self.assertIn( |
| test_label, output, |
| "Did not find expected label in output: %s" %output) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_cipso(self): |
| '''Test if smack cipso rules can be set''' |
| # 12345678901234567890123456789012345678901234567890123456 |
| ruleA="TheOneA 2 0 " |
| ruleB="TheOneB 3 1 55 " |
| ruleC="TheOneC 4 2 17 33 " |
| |
| status, output = self.target.run( |
| "echo -n '%s' > %s/cipso" %(ruleA, self.smack_path)) |
| self.assertEqual(status, 0, |
| "Could not set cipso label A. Ouput: %s" %output) |
| |
| status, output = self.target.run( |
| "cat %s/cipso | grep '^TheOneA'" %self.smack_path) |
| self.assertEqual(status, 0, "Cipso rule A was not set") |
| self.assertIn(" 2", output, "Rule A was not set correctly") |
| |
| status, output = self.target.run( |
| "echo -n '%s' > %s/cipso" %(ruleB, self.smack_path)) |
| self.assertEqual(status, 0, |
| "Could not set cipso label B. Ouput: %s" %output) |
| |
| status, output = self.target.run( |
| "cat %s/cipso | grep '^TheOneB'" %self.smack_path) |
| self.assertEqual(status, 0, "Cipso rule B was not set") |
| self.assertIn("/55", output, "Rule B was not set correctly") |
| |
| status, output = self.target.run( |
| "echo -n '%s' > %s/cipso" %(ruleC, self.smack_path)) |
| self.assertEqual( |
| status, 0, |
| "Could not set cipso label C. Ouput: %s" %output) |
| |
| status, output = self.target.run( |
| "cat %s/cipso | grep '^TheOneC'" %self.smack_path) |
| self.assertEqual(status, 0, "Cipso rule C was not set") |
| self.assertIn("/17,33", output, "Rule C was not set correctly") |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_direct(self): |
| status, initial_direct = self.target.run( |
| "cat %s/direct" %self.smack_path) |
| |
| test_direct="17" |
| status, output = self.target.run( |
| "echo '%s' > %s/direct" %(test_direct, self.smack_path)) |
| self.assertEqual(status, 0 , |
| "Could not set smack direct. Output: %s" %output) |
| status, new_direct = self.target.run("cat %s/direct" %self.smack_path) |
| # initial label before checking |
| status, output = self.target.run( |
| "echo '%s' > %s/direct" %(initial_direct, self.smack_path)) |
| self.assertEqual( |
| test_direct, new_direct.strip(), |
| "Smack direct label does not match.") |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_ambient(self): |
| test_ambient = "test_ambient" |
| status, initial_ambient = self.target.run("cat %s/ambient" %self.smack_path) |
| status, output = self.target.run( |
| "echo '%s' > %s/ambient" %(test_ambient, self.smack_path)) |
| self.assertEqual(status, 0, |
| "Could not set smack ambient. Output: %s" %output) |
| |
| status, output = self.target.run("cat %s/ambient" %self.smack_path) |
| # Filter '\x00', which is sometimes added to the ambient label |
| new_ambient = ''.join(filter(lambda x: x in string.printable, output)) |
| initial_ambient = ''.join(filter(lambda x: x in string.printable, initial_ambient)) |
| status, output = self.target.run( |
| "echo '%s' > %s/ambient" %(initial_ambient, self.smack_path)) |
| self.assertEqual( |
| test_ambient, new_ambient.strip(), |
| "Ambient label does not match") |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smackload(self): |
| '''Test if smackload command works''' |
| rule="testobject testsubject rwx" |
| |
| status, output = self.target.run("echo -n '%s' > /tmp/rules" %rule) |
| status, output = self.target.run("smackload /tmp/rules") |
| self.assertEqual( status, 0, "Smackload failed to load rule. Output: %s" %output) |
| |
| status, output = self.target.run( "cat %s/load | grep '%s'" %(self.smack_path, rule)) |
| self.assertEqual(status, 0, "Smackload rule was loaded correctly") |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smackcipso(self): |
| '''Test if smackcipso command works''' |
| # 12345678901234567890123456789012345678901234567890123456 |
| rule="cipsolabel 2 2 " |
| |
| status, output = self.target.run("echo '%s' | smackcipso" %rule) |
| self.assertEqual( status, 0, "Smackcipso failed to load rule. Output: %s" %output) |
| |
| status, output = self.target.run( |
| "cat %s/cipso | grep 'cipsolabel'" %self.smack_path) |
| self.assertEqual(status, 0, "smackcipso rule was loaded correctly") |
| self.assertIn( "2/2", output, "Rule was not set correctly. Got: %s" %output) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_enforce_file_access(self): |
| '''Test if smack file access is enforced (rwx) |
| |
| test needs to change the running label of the current process, |
| so whole test takes places on image |
| ''' |
| status, output = self.target.run("sh /usr/sbin/smack_test_file_access.sh") |
| self.assertEqual(status, 0, output) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_mmap_enforced(self): |
| '''Test if smack mmap access is enforced''' |
| raise unittest.SkipTest("Depends on mmap_test, which was removed from the layer while investigating its license.") |
| |
| # 12345678901234567890123456789012345678901234567890123456 |
| delr1="mmap_label mmap_test_label1 -----" |
| delr2="mmap_label mmap_test_label2 -----" |
| delr3="mmap_file_label mmap_test_label1 -----" |
| delr4="mmap_file_label mmap_test_label2 -----" |
| |
| RuleA="mmap_label mmap_test_label1 rw---" |
| RuleB="mmap_label mmap_test_label2 r--at" |
| RuleC="mmap_file_label mmap_test_label1 rw---" |
| RuleD="mmap_file_label mmap_test_label2 rwxat" |
| |
| mmap_label="mmap_label" |
| file_label="mmap_file_label" |
| test_file = "/usr/sbin/smack_test_mmap" |
| mmap_exe = "/tmp/mmap_test" |
| status, echo = self.target.run("which echo") |
| status, output = self.target.run( |
| "notroot.py %d %s %s 'test' > %s" \ |
| %(self.uid, self.current_label, echo, test_file)) |
| status, output = self.target.run("ls %s" %test_file) |
| self.assertEqual(status, 0, "Could not create mmap test file") |
| self.target.run("chsmack -m %s %s" %(file_label, test_file)) |
| self.target.run("chsmack -e %s %s" %(mmap_label, mmap_exe)) |
| |
| # test with no rules with mmap label or exec label as subject |
| # access should be granted |
| self.target.run('echo -n "%s" > %s/load' %(delr1, self.smack_path)) |
| self.target.run('echo -n "%s" > %s/load' %(delr2, self.smack_path)) |
| self.target.run('echo -n "%s" > %s/load' %(delr3, self.smack_path)) |
| self.target.run('echo -n "%s" > %s/load' %(delr4, self.smack_path)) |
| status, output = self.target.run("%s %s 0 2" % (mmap_exe, test_file)) |
| self.assertEqual( |
| status, 0, |
| "Should have mmap access without rules. Output: %s" %output) |
| |
| # add rules that do not match access required |
| self.target.run('echo -n "%s" > %s/load' %(RuleA, self.smack_path)) |
| self.target.run('echo -n "%s" > %s/load' %(RuleB, self.smack_path)) |
| status, output = self.target.run("%s %s 0 2" % (mmap_exe, test_file)) |
| self.assertNotEqual( |
| status, 0, |
| "Should not have mmap access with unmatching rules. " + |
| "Output: %s" %output) |
| self.assertIn( |
| "Permission denied", output, |
| "Mmap access should be denied with unmatching rules") |
| |
| # add rule to match only partially (one way) |
| self.target.run('echo -n "%s" > %s/load' %(RuleC, self.smack_path)) |
| status, output = self.target.run("%s %s 0 2" %(mmap_exe, test_file)) |
| self.assertNotEqual( |
| status, 0, |
| "Should not have mmap access with partial matching rules. " + |
| "Output: %s" %output) |
| self.assertIn( |
| "Permission denied", output, |
| "Mmap access should be denied with partial matching rules") |
| |
| # add rule to match fully |
| self.target.run('echo -n "%s" > %s/load' %(RuleD, self.smack_path)) |
| status, output = self.target.run("%s %s 0 2" %(mmap_exe, test_file)) |
| self.assertEqual( |
| status, 0, |
| "Should have mmap access with full matching rules." + |
| "Output: %s" %output) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_transmute_dir(self): |
| '''Test if smack transmute attribute works |
| |
| test needs to change the running label of the current process, |
| so whole test takes places on image |
| ''' |
| test_dir = "/tmp/smack_transmute_dir" |
| label="transmute_label" |
| status, initial_label = self.target.run("cat /proc/self/attr/current") |
| |
| self.target.run("mkdir -p %s" % test_dir) |
| self.target.run("chsmack -a %s %s" % (label, test_dir)) |
| self.target.run("chsmack -t %s" % test_dir) |
| self.target.run("echo -n '%s %s rwxat' | smackload" %(initial_label, label) ) |
| |
| self.target.run("touch %s/test" % test_dir) |
| status, output = self.target.run("chsmack %s/test" % test_dir) |
| self.assertIn( 'access="%s"' %label, output, |
| "Did not get expected label. Output: %s" % output) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_tcp_sockets(self): |
| '''Test if smack is enforced on tcp sockets |
| |
| whole test takes places on image, depends on tcp_server/tcp_client''' |
| |
| status, output = self.target.run("sh /usr/sbin/test_smack_tcp_sockets.sh") |
| self.assertEqual(status, 0, output) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_udp_sockets(self): |
| '''Test if smack is enforced on udp sockets |
| |
| whole test takes places on image, depends on udp_server/udp_client''' |
| |
| status, output = self.target.run("sh /usr/sbin/test_smack_udp_sockets.sh") |
| self.assertEqual(status, 0, output) |
| |
| |
| @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) |
| def test_smack_labels(self): |
| '''Check for correct Smack labels.''' |
| expected = ''' |
| /tmp/ access="*" |
| /etc/ access="System::Shared" transmute="TRUE" |
| /etc/passwd access="System::Shared" |
| /etc/terminfo access="System::Shared" transmute="TRUE" |
| /etc/skel/ access="System::Shared" transmute="TRUE" |
| /etc/skel/.profile access="System::Shared" |
| /var/log/ access="System::Log" transmute="TRUE" |
| /var/tmp/ access="*" |
| ''' |
| files = ' '.join([x.split()[0] for x in expected.split('\n') if x]) |
| files_wildcard = ' '.join([x + '/*' for x in files.split()]) |
| # Auxiliary information. |
| status, output = self.target.run( |
| 'set -x; mount; ls -l -d %s; find %s | xargs ls -d -l; find %s | xargs chsmack' % ( |
| ' '.join([x.rstrip('/') for x in files.split()]), files, files |
| ) |
| ) |
| msg = "File status:\n" + output |
| status, output = self.target.run('chsmack %s' % files) |
| self.assertEqual( |
| status, 0, msg="status and output: %s and %s\n%s" % (status,output, msg)) |
| self.longMessage = True |
| self.maxDiff = None |
| self.assertEqual(output.strip().split('\n'), expected.strip().split('\n'), msg=msg) |