From patchwork Mon May 30 22:02:06 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 8652 X-Patchwork-Delegate: akuster808@gmail.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2203AC433EF for ; Mon, 30 May 2022 22:04:13 +0000 (UTC) Received: from mail-pf1-f171.google.com (mail-pf1-f171.google.com [209.85.210.171]) by mx.groups.io with SMTP id smtpd.web08.42235.1653948252186136397 for ; Mon, 30 May 2022 15:04:12 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=q04T5gtm; spf=pass (domain: gmail.com, ip: 209.85.210.171, mailfrom: akuster808@gmail.com) Received: by mail-pf1-f171.google.com with SMTP id p8so11525550pfh.8 for ; Mon, 30 May 2022 15:04:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=WVM4LaOJ2+mDGrgxznigelkaEByDgtv8rEF2PtiYlD0=; b=q04T5gtmHO9uVq1VPyMsYThhPYkfW+EyEreJ0PQVT3A3VuQJU/Aj+5a3zQY/VTb264 kpmh7KLfOqyiG2fifGttHr6iERALmt4iO2ckivyduli+j33koWEOe0DKNeD5avkNutv7 UHkcn+iZtIBTLrdPSQywL4e2wIcVb9eRduiYiHBWJiX3+crGIA2Egv7EZu6g4MuQ5Tdc fJJ4o/f68KcgfJ4QbDa2gJWfsEF+xoVPBV4/3TYPAEYXCwKHmUU7R0HUpQsnWYbPQaeI 4ari8PD25vLLZnw6uM1OVE6S4vlUZMXS5maDAr11owK0cgCFkuZkuoPEL0BOMX732Yir l+lw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=WVM4LaOJ2+mDGrgxznigelkaEByDgtv8rEF2PtiYlD0=; b=ym18D46MC0nNoN3yFbPzGlI9FlvCY8RbP0nj8tR3svbUH1TxxcYp7IVoPetVLkeKut 1L8yy9JnrSz5b4EySmYRvaZyGBC0Rp+fSaQhpAq+DfFnwUb4yx1dpU6ujhDZIxf4+Av7 ta09LDhwgNoNseoj2EFl2AAlJQL2AIhYbk1TzaB1JP+BkeKujKWwBgc3Vl/iXGGM9p7j IkS5bDWlvxhgGOLvab9F81ahYSxhCq6A+Anv2kEgxr5CK34aKP1jfwC1EgaPKpqJIQQB keqkLviEjjMhlooAKasIh1K2TbzPGQPMB+HfOl4TWg6phV1M4HvsVbt4ikw3JiXiT8ye eksg== X-Gm-Message-State: AOAM531kojitgnQ9MOibzCmmqKs8kKqWtx0mRa0cA4XIjZmVSnaT/eJW ThqUQMppEqE2y0J4/e00HqAsFlNHMow= X-Google-Smtp-Source: ABdhPJy+76q3WWRpCv6LhgSwtlRiIladipYbFo7jrq06kXnmg1sZSXdy7PIQQfIjpQEr50xTSzfLAg== X-Received: by 2002:a05:6a02:11c:b0:3f9:e159:5fa5 with SMTP id bg28-20020a056a02011c00b003f9e1595fa5mr41002289pgb.245.1653948251194; Mon, 30 May 2022 15:04:11 -0700 (PDT) Received: from keaua.hsd1.ca.comcast.net (c-67-181-203-136.hsd1.ca.comcast.net. [67.181.203.136]) by smtp.gmail.com with ESMTPSA id x22-20020a170902b41600b001635a8f9dfdsm9679198plr.26.2022.05.30.15.04.09 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 30 May 2022 15:04:10 -0700 (PDT) From: Armin Kuster To: yocto@lists.yoctoproject.org Subject: [meta-security][PATCH 1/3] tpm2-pkcs11: we really need the symlinks Date: Mon, 30 May 2022 15:02:06 -0700 Message-Id: <20220530220208.477287-1-akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 30 May 2022 22:04:13 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/yocto/message/57224 MASK dev-so Drop un-needed install append steps. Signed-off-by: Armin Kuster --- .../recipes-tpm2/tpm2-pkcs11/tpm2-pkcs11_1.8.0.bb | 11 ++--------- 1 file changed, 2 insertions(+), 9 deletions(-) diff --git a/meta-tpm/recipes-tpm2/tpm2-pkcs11/tpm2-pkcs11_1.8.0.bb b/meta-tpm/recipes-tpm2/tpm2-pkcs11/tpm2-pkcs11_1.8.0.bb index e8812d0..dd0a0b5 100644 --- a/meta-tpm/recipes-tpm2/tpm2-pkcs11/tpm2-pkcs11_1.8.0.bb +++ b/meta-tpm/recipes-tpm2/tpm2-pkcs11/tpm2-pkcs11_1.8.0.bb @@ -25,15 +25,6 @@ do_compile:append() { } do_install:append() { - install -d ${D}${libdir}/pkcs11 - install -d ${D}${datadir}/p11-kit - - # remove symlinks - rm -f ${D}${libdir}/pkcs11/libtpm2_pkcs11.so - - #install lib - install -m 755 ${B}/src/.libs/libtpm2_pkcs11.so ${D}${libdir}/pkcs11/libtpm2_pkcs11.so - cd ${S}/tools export PYTHONPATH="${D}${PYTHON_SITEPACKAGES_DIR}" ${PYTHON_PN} setup.py install --root="${D}" --prefix="${prefix}" --install-lib="${PYTHON_SITEPACKAGES_DIR}" --optimize=1 --skip-build @@ -53,5 +44,7 @@ FILES:${PN} += "\ ${datadir}/p11-kit/* \ " +INSANE_SKIP:${PN} += "dev-so" + RDEPENDS:${PN} = "p11-kit tpm2-tools " RDEPENDS:${PN}-tools = "${PYTHON_PN}-pyyaml ${PYTHON_PN}-cryptography ${PYTHON_PN}-pyasn1-modules" From patchwork Mon May 30 22:02:07 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 8653 X-Patchwork-Delegate: akuster808@gmail.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 062B7C433EF for ; Mon, 30 May 2022 22:04:23 +0000 (UTC) Received: from mail-pj1-f52.google.com (mail-pj1-f52.google.com [209.85.216.52]) by mx.groups.io with SMTP id smtpd.web09.42255.1653948253458037235 for ; Mon, 30 May 2022 15:04:13 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=j595cDrU; spf=pass (domain: gmail.com, ip: 209.85.216.52, mailfrom: akuster808@gmail.com) Received: by mail-pj1-f52.google.com with SMTP id n13-20020a17090a394d00b001e30a60f82dso483328pjf.5 for ; Mon, 30 May 2022 15:04:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=eEX3EZh1lljG51isSBpnDrq+N5jET1ymwffFMttx++8=; b=j595cDrUjIx1JrqZyvbYSCJ9J212v+Px8uwiiffSILbpPEN20Oz/MFMW/MsPQlpem/ ZWmGzgvBH9xCJ1EeaZqzW0Qv1LSWIHG3NLBXWhhCMJ5Bv0f61NoDCJb6bYeOUnXHBsnG tS8dq2x8vDkkPx4XDvLEvJJx4ewupb6WWVL88gAuqjrmpNykdieoPwepln6KQYdQ3M+k Yai1GjG125noSg4feJINJXzjuH58wYb/ANmuH7whH9RTf3yFBpHtgygwNJIWkOP6FPLZ hHKDolbxCxiqNHxAXsUR/mLEHKEqjT0e++Id780CsGHA+kmbIStvPbrIh6kBry4TmGxR Nn9Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=eEX3EZh1lljG51isSBpnDrq+N5jET1ymwffFMttx++8=; b=HxwTimbMkUCTwZCG3lqMiD8IEWM0TiUwien2wrzGeW5/3I8Ep/T7jyw2SvV1eVhwy+ bmbarMCAd1KaE41dG4zHG2YJntDTByqzwwcMWT0I7Xf5xN1lC2hU7wnGmczw7v3epcCS hgP5Xfy/mv/CUzWzYm/j4ATWsM3gyOkTBQ/6tA6sHMpsF5BgWMHI+ME7lMHk1x8iL5si vWPolHqwVD3aJjpJD6Ucba5J/qGUh7NI0hNOJPAvZpTkjK8k9zRTN/DtZ9atk2I2RWXa Os+0ZCKPbFy824+SHusUz5V5ZKXe90OMtKCemAglytLPt2r6iAt5YOH4eKUjuHjj6NKH ZeVA== X-Gm-Message-State: AOAM53013naDDSZXmla1KV7/8V/LsrEAL9q/Es28SGvqlTk7IoCrGx+w DOx654U9mNssuJ6tJhvzev3ANFVBqyc= X-Google-Smtp-Source: ABdhPJyhp18B58tamtV+WclybBealEztAFcDNkHH4DlDgBLsG4L/LtlAqWnmJ8XANPGD8I6zDRihSA== X-Received: by 2002:a17:90a:9505:b0:1df:2162:2bb5 with SMTP id t5-20020a17090a950500b001df21622bb5mr25191907pjo.73.1653948252489; Mon, 30 May 2022 15:04:12 -0700 (PDT) Received: from keaua.hsd1.ca.comcast.net (c-67-181-203-136.hsd1.ca.comcast.net. [67.181.203.136]) by smtp.gmail.com with ESMTPSA id x22-20020a170902b41600b001635a8f9dfdsm9679198plr.26.2022.05.30.15.04.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 30 May 2022 15:04:11 -0700 (PDT) From: Armin Kuster To: yocto@lists.yoctoproject.org Subject: [meta-security][PATCH 2/3] smack-test: switch to python3 Date: Mon, 30 May 2022 15:02:07 -0700 Message-Id: <20220530220208.477287-2-akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220530220208.477287-1-akuster808@gmail.com> References: <20220530220208.477287-1-akuster808@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 30 May 2022 22:04:23 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/yocto/message/57225 Signed-off-by: Armin Kuster --- recipes-mac/smack/smack-test_1.0.bb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/recipes-mac/smack/smack-test_1.0.bb b/recipes-mac/smack/smack-test_1.0.bb index d7824ae..3ab57c6 100644 --- a/recipes-mac/smack/smack-test_1.0.bb +++ b/recipes-mac/smack/smack-test_1.0.bb @@ -22,4 +22,4 @@ do_install() { install -m 0755 *.sh ${D}${sbindir} } -RDEPENDS:${PN} = "smack python mmap-smack-test tcp-smack-test udp-smack-test" +RDEPENDS:${PN} = "smack python3-core mmap-smack-test tcp-smack-test udp-smack-test" From patchwork Mon May 30 22:02:08 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: akuster808 X-Patchwork-Id: 8654 X-Patchwork-Delegate: akuster808@gmail.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 047C9C433F5 for ; Mon, 30 May 2022 22:04:23 +0000 (UTC) Received: from mail-pg1-f175.google.com (mail-pg1-f175.google.com [209.85.215.175]) by mx.groups.io with SMTP id smtpd.web11.42281.1653948254843978353 for ; Mon, 30 May 2022 15:04:14 -0700 Authentication-Results: mx.groups.io; dkim=pass header.i=@gmail.com header.s=20210112 header.b=ZFJsWEf+; spf=pass (domain: gmail.com, ip: 209.85.215.175, mailfrom: akuster808@gmail.com) Received: by mail-pg1-f175.google.com with SMTP id x12so11102590pgj.7 for ; Mon, 30 May 2022 15:04:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=MH4HJwgskjdLoOcWGbiyb47FjdkDRTN1e7lWAhCSOL0=; b=ZFJsWEf+/ALdZkpQ7CdPU7HnXevvDb/s3/smsbcrxIr1Mlwjv7pPltD63YOMf1CByE mXPIpFO2IXZF/sli60JyWjwYWCtnjxVaN07dpzrGYhthC7c3PK6aRdVzIdMHjAQ1eTBh rDduCYRNh2fnDVv3c95JT3HqLRE/fmBZsy1LTz+y5ADo2TgnfNus2sQcVn7VcUHyzo/3 p5++2URyB/PJeoEBYOOsHratuFsdeJ228SBzpgwsqGqf0zdXDiL+IUj7F2vxbCYe6fpe QklibkNmBY2ZndYFcTprJGCPlU2o+OuA0OQ+TUEPRQI09IG0OUbqoV0OjVuP61BDtkvz wpmA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=MH4HJwgskjdLoOcWGbiyb47FjdkDRTN1e7lWAhCSOL0=; b=SBKp/SwAWbdMY73AC1JoZ/9BBQ13xklhocZyfFfip8j1jsGtTvvx1uTerQrpKnRppF DWwcksBmHAzZBWKgUyyOUX6ptfNxMlnTST7o2jM5V5qr0/wmeE0ogNt2DarNhvuSv5pL Nyia9C8qttny0zmBoyJzmPjhKMI4jxWIcDWpbHwENyCk4WeuzZ4OBNOUvRqBAptOFqK+ RjgUU8Tj+bgkTPzKonsoH55U9c/h6ofUxWc96vDYVK+WaCZPLOWE41AK5c5GBtKxPwKg IhMztn0X3X38NmlLcW+B58BwtCqjzLjQ8ta4uFOcdiSVVkLwhM4GeD65CI5VkLkObAO7 e/WA== X-Gm-Message-State: AOAM533o7iqZAkQmJ9XPGeuXnoEfL4ysyFzy/1A78LvxbXhVAn828NXo 2mn56nbOiF/KExBQA8sYhUsHZUg/3/A= X-Google-Smtp-Source: ABdhPJzwyzOUPQjXEO7ccXNXmdm/gVwpk1vxRvm8r3Og8XYi+3WvuW/3dNQ4yF9vilMppGgMplrFSA== X-Received: by 2002:a63:2107:0:b0:3fb:ac79:50ed with SMTP id h7-20020a632107000000b003fbac7950edmr15393577pgh.105.1653948253983; Mon, 30 May 2022 15:04:13 -0700 (PDT) Received: from keaua.hsd1.ca.comcast.net (c-67-181-203-136.hsd1.ca.comcast.net. [67.181.203.136]) by smtp.gmail.com with ESMTPSA id x22-20020a170902b41600b001635a8f9dfdsm9679198plr.26.2022.05.30.15.04.12 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 30 May 2022 15:04:13 -0700 (PDT) From: Armin Kuster To: yocto@lists.yoctoproject.org Subject: [meta-security][PATCH 3/3] oeqa/smack: consolidate classes Date: Mon, 30 May 2022 15:02:08 -0700 Message-Id: <20220530220208.477287-3-akuster808@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220530220208.477287-1-akuster808@gmail.com> References: <20220530220208.477287-1-akuster808@gmail.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Mon, 30 May 2022 22:04:23 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/yocto/message/57226 Signed-off-by: Armin Kuster --- lib/oeqa/runtime/cases/smack.py | 39 --------------------------------- 1 file changed, 39 deletions(-) diff --git a/lib/oeqa/runtime/cases/smack.py b/lib/oeqa/runtime/cases/smack.py index 35e87ef..b8255c7 100644 --- a/lib/oeqa/runtime/cases/smack.py +++ b/lib/oeqa/runtime/cases/smack.py @@ -29,8 +29,6 @@ class SmackBasicTest(OERuntimeTestCase): status,output = self.target.run("cat /proc/self/attr/current") self.current_label = output.strip() -class SmackAccessLabel(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_add_access_label(self): ''' Test if chsmack can correctly set a SMACK label ''' @@ -54,8 +52,6 @@ class SmackAccessLabel(SmackBasicTest): "%s %s" %(LABEL,label_retrieved)) -class SmackExecLabel(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_add_exec_label(self): '''Test if chsmack can correctly set a SMACK Exec label''' @@ -79,8 +75,6 @@ class SmackExecLabel(SmackBasicTest): "%s %s" %(LABEL,label_retrieved)) -class SmackMmapLabel(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_add_mmap_label(self): '''Test if chsmack can correctly set a SMACK mmap label''' @@ -104,8 +98,6 @@ class SmackMmapLabel(SmackBasicTest): "%s %s" %(LABEL,label_retrieved)) -class SmackTransmutable(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_add_transmutable(self): '''Test if chsmack can correctly set a SMACK transmutable mode''' @@ -128,8 +120,6 @@ class SmackTransmutable(SmackBasicTest): "%s %s" %(LABEL,label_retrieved)) -class SmackChangeSelfLabelPrivilege(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_privileged_change_self_label(self): '''Test if privileged process (with CAP_MAC_ADMIN privilege) @@ -145,8 +135,6 @@ class SmackChangeSelfLabelPrivilege(SmackBasicTest): self.assertIn("PRIVILEGED", output, "Privilege process did not change label.Output: %s" %output) -class SmackChangeSelfLabelUnprivilege(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_unprivileged_change_self_label(self): '''Test if unprivileged process (without CAP_MAC_ADMIN privilege) @@ -163,8 +151,6 @@ class SmackChangeSelfLabelUnprivilege(SmackBasicTest): "Unprivileged process should not be able to change its label") -class SmackChangeFileLabelPrivilege(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_unprivileged_change_file_label(self): '''Test if unprivileged process cannot change file labels''' @@ -183,8 +169,6 @@ class SmackChangeFileLabelPrivilege(SmackBasicTest): self.target.run("rm %s" % filename) self.assertEqual( status, 0, "Unprivileged process changed label for %s" %filename) -class SmackLoadRule(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_load_smack_rule(self): '''Test if new smack access rules can be loaded''' @@ -211,8 +195,6 @@ class SmackLoadRule(SmackBasicTest): self.target.run('echo -n "%s" > %s/load' %(clean, self.smack_path)) -class SmackOnlycap(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_onlycap(self): '''Test if smack onlycap label can be set @@ -223,7 +205,6 @@ class SmackOnlycap(SmackBasicTest): status, output = self.target.run("sh /usr/sbin/test_smack_onlycap.sh") self.assertEqual(status, 0, output) -class SmackNetlabel(SmackBasicTest): @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_netlabel(self): @@ -246,7 +227,6 @@ class SmackNetlabel(SmackBasicTest): test_label, output, "Did not find expected label in output: %s" %output) -class SmackCipso(SmackBasicTest): @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_cipso(self): @@ -287,7 +267,6 @@ class SmackCipso(SmackBasicTest): self.assertEqual(status, 0, "Cipso rule C was not set") self.assertIn("/17,33", output, "Rule C was not set correctly") -class SmackDirect(SmackBasicTest): @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_direct(self): @@ -308,8 +287,6 @@ class SmackDirect(SmackBasicTest): "Smack direct label does not match.") -class SmackAmbient(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_ambient(self): test_ambient = "test_ambient" @@ -330,8 +307,6 @@ class SmackAmbient(SmackBasicTest): "Ambient label does not match") -class SmackloadBinary(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smackload(self): '''Test if smackload command works''' @@ -345,8 +320,6 @@ class SmackloadBinary(SmackBasicTest): self.assertEqual(status, 0, "Smackload rule was loaded correctly") -class SmackcipsoBinary(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smackcipso(self): '''Test if smackcipso command works''' @@ -362,8 +335,6 @@ class SmackcipsoBinary(SmackBasicTest): self.assertIn( "2/2", output, "Rule was not set correctly. Got: %s" %output) -class SmackEnforceFileAccess(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_enforce_file_access(self): '''Test if smack file access is enforced (rwx) @@ -375,8 +346,6 @@ class SmackEnforceFileAccess(SmackBasicTest): self.assertEqual(status, 0, output) -class SmackEnforceMmap(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_mmap_enforced(self): '''Test if smack mmap access is enforced''' @@ -449,8 +418,6 @@ class SmackEnforceMmap(SmackBasicTest): "Output: %s" %output) -class SmackEnforceTransmutable(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_transmute_dir(self): '''Test if smack transmute attribute works @@ -473,8 +440,6 @@ class SmackEnforceTransmutable(SmackBasicTest): "Did not get expected label. Output: %s" % output) -class SmackTcpSockets(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_tcp_sockets(self): '''Test if smack is enforced on tcp sockets @@ -485,8 +450,6 @@ class SmackTcpSockets(SmackBasicTest): self.assertEqual(status, 0, output) -class SmackUdpSockets(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_udp_sockets(self): '''Test if smack is enforced on udp sockets @@ -497,8 +460,6 @@ class SmackUdpSockets(SmackBasicTest): self.assertEqual(status, 0, output) -class SmackFileLabels(SmackBasicTest): - @OETestDepends(['smack.SmackBasicTest.test_smack_basic']) def test_smack_labels(self): '''Check for correct Smack labels.'''