mirror of
https://github.com/SELinuxProject/selinux
synced 2024-12-28 00:42:07 +00:00
76 lines
2.3 KiB
C
76 lines
2.3 KiB
C
/*
|
|
* Authors: Chad Sellers <csellers@tresys.com>
|
|
* Joshua Brindle <jbrindle@tresys.com>
|
|
* Chris PeBenito <cpebenito@tresys.com>
|
|
*
|
|
* Copyright (C) 2006 Tresys Technology, LLC
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
#include "test-expander-users.h"
|
|
|
|
#include <sepol/policydb/policydb.h>
|
|
#include <CUnit/Basic.h>
|
|
#include <stdlib.h>
|
|
|
|
extern policydb_t user_expanded;
|
|
|
|
static void check_user_roles(policydb_t * p, char *user_name, char **role_names, int num_roles)
|
|
{
|
|
user_datum_t *user;
|
|
ebitmap_node_t *tnode;
|
|
unsigned int i;
|
|
int j;
|
|
unsigned char *found; /* array of booleans of roles found */
|
|
int extra = 0; /* number of extra roles found */
|
|
|
|
user = (user_datum_t *) hashtab_search(p->p_users.table, user_name);
|
|
if (!user) {
|
|
printf("%s not found\n", user_name);
|
|
CU_FAIL("user not found");
|
|
return;
|
|
}
|
|
found = calloc(num_roles, sizeof(unsigned char));
|
|
CU_ASSERT_FATAL(found != NULL);
|
|
ebitmap_for_each_bit(&user->roles.roles, tnode, i) {
|
|
if (ebitmap_node_get_bit(tnode, i)) {
|
|
extra++;
|
|
for (j = 0; j < num_roles; j++) {
|
|
if (strcmp(role_names[j], p->p_role_val_to_name[i]) == 0) {
|
|
extra--;
|
|
found[j] += 1;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
for (j = 0; j < num_roles; j++) {
|
|
if (found[j] != 1) {
|
|
printf("role %s associated with user %s %d times\n", role_names[j], user_name, found[j]);
|
|
CU_FAIL("user mapping failure\n");
|
|
}
|
|
}
|
|
free(found);
|
|
CU_ASSERT_EQUAL(extra, 0);
|
|
}
|
|
|
|
void test_expander_user_mapping(void)
|
|
{
|
|
char *roles1[] = { "user_check_1_1_r", "user_check_1_2_r" };
|
|
|
|
check_user_roles(&user_expanded, "user_check_1", roles1, 2);
|
|
}
|