sl@0
|
1 |
/*
|
sl@0
|
2 |
* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
|
sl@0
|
3 |
* All rights reserved.
|
sl@0
|
4 |
* This component and the accompanying materials are made available
|
sl@0
|
5 |
* under the terms of the License "Eclipse Public License v1.0"
|
sl@0
|
6 |
* which accompanies this distribution, and is available
|
sl@0
|
7 |
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
|
sl@0
|
8 |
*
|
sl@0
|
9 |
* Initial Contributors:
|
sl@0
|
10 |
* Nokia Corporation - initial contribution.
|
sl@0
|
11 |
*
|
sl@0
|
12 |
* Contributors:
|
sl@0
|
13 |
*
|
sl@0
|
14 |
* Description:
|
sl@0
|
15 |
* tpolicy.h
|
sl@0
|
16 |
*
|
sl@0
|
17 |
*/
|
sl@0
|
18 |
|
sl@0
|
19 |
|
sl@0
|
20 |
#ifndef __TPOLICY_H__
|
sl@0
|
21 |
#define __TPOLICY_H__
|
sl@0
|
22 |
|
sl@0
|
23 |
#include "t_testaction.h"
|
sl@0
|
24 |
|
sl@0
|
25 |
/**
|
sl@0
|
26 |
* This action is used to test whether security policies are correctly enforced.
|
sl@0
|
27 |
* This is done by specifying another test action to run, and the security
|
sl@0
|
28 |
* policy that is under test. The action is then run in a seprate process.
|
sl@0
|
29 |
* This happens multiple times, to test that it passes when the process has the
|
sl@0
|
30 |
* required security settings and failes when it does not.
|
sl@0
|
31 |
*
|
sl@0
|
32 |
* The action body can contain the the following elements:
|
sl@0
|
33 |
*
|
sl@0
|
34 |
* testexe: The path of the executable to use to run the test
|
sl@0
|
35 |
* excludedcapabilities: Capabilites not to assign to the test executable when performing failure tests
|
sl@0
|
36 |
* policy: The security policy to be tested for
|
sl@0
|
37 |
* preactions: Optional, contains test actions to run to perform setup before the test
|
sl@0
|
38 |
* passaction: The action under test, when expected to pass
|
sl@0
|
39 |
* failaction: The action under test, when expected to fail
|
sl@0
|
40 |
* postactions: Optonal, contains test actions to run to perform cleanup after the test
|
sl@0
|
41 |
*
|
sl@0
|
42 |
* A new script is created containing the preactions if present, the test action
|
sl@0
|
43 |
* and the postactions (if present). For failure tests, the testaction's expect
|
sl@0
|
44 |
* results is changed to KErrPermissionDenied.
|
sl@0
|
45 |
*/
|
sl@0
|
46 |
class CPolicyTest : public CTestAction
|
sl@0
|
47 |
{
|
sl@0
|
48 |
public:
|
sl@0
|
49 |
static CPolicyTest* NewL(CConsoleBase& aConsole, Output& aOut,
|
sl@0
|
50 |
const TTestActionSpec& aTestActionSpec);
|
sl@0
|
51 |
static CPolicyTest* NewLC(CConsoleBase& aConsole, Output& aOut,
|
sl@0
|
52 |
const TTestActionSpec& aTestActionSpec);
|
sl@0
|
53 |
~CPolicyTest();
|
sl@0
|
54 |
|
sl@0
|
55 |
private:
|
sl@0
|
56 |
CPolicyTest(CConsoleBase& aConsole, Output& aOut);
|
sl@0
|
57 |
void ConstructL(const TTestActionSpec& aTestActionSpec);
|
sl@0
|
58 |
|
sl@0
|
59 |
public:
|
sl@0
|
60 |
virtual void PerformAction(TRequestStatus& aStatus);
|
sl@0
|
61 |
|
sl@0
|
62 |
private:
|
sl@0
|
63 |
// Methods overriden from CTestAction
|
sl@0
|
64 |
virtual void DoReportAction();
|
sl@0
|
65 |
virtual void DoCheckResult(TInt aError);
|
sl@0
|
66 |
virtual void PerformCancel();
|
sl@0
|
67 |
virtual void Reset();
|
sl@0
|
68 |
|
sl@0
|
69 |
// Methods for parsing the test spec
|
sl@0
|
70 |
void BadUsageL(const TDesC& aMessage);
|
sl@0
|
71 |
void SetTestExeL(const TDesC8& aPath);
|
sl@0
|
72 |
void SetPolicyL(const TDesC8& aSpec);
|
sl@0
|
73 |
void SetTestActionL(const TDesC8& aPassAction, const TDesC8& aFailAction);
|
sl@0
|
74 |
|
sl@0
|
75 |
// Methods for running the test
|
sl@0
|
76 |
void GetNextTest();
|
sl@0
|
77 |
void StartProcessL(const TDesC& aExe, const TDesC& aCommandLine, TRequestStatus& aStatus);
|
sl@0
|
78 |
void CheckProcessTermintationL();
|
sl@0
|
79 |
void SetupTestL(TRequestStatus& aStatus);
|
sl@0
|
80 |
void SetTestSecurityInfoL(TInt aSecureId, TInt aVendorId, TUint aCapSet, TRequestStatus& aStatus);
|
sl@0
|
81 |
void CheckSetCapsResultL();
|
sl@0
|
82 |
void RunTestL(TRequestStatus& aStatus);
|
sl@0
|
83 |
void ProcessResultsL(TRequestStatus& aStatus);
|
sl@0
|
84 |
void WriteScriptFileL(const TDesC& aPath, const TDesC8& aAction);
|
sl@0
|
85 |
|
sl@0
|
86 |
private:
|
sl@0
|
87 |
enum TState
|
sl@0
|
88 |
{
|
sl@0
|
89 |
EInit,
|
sl@0
|
90 |
ESetupTest,
|
sl@0
|
91 |
ERunTest,
|
sl@0
|
92 |
EProcessResults,
|
sl@0
|
93 |
EFinished
|
sl@0
|
94 |
};
|
sl@0
|
95 |
|
sl@0
|
96 |
enum TTestState
|
sl@0
|
97 |
{
|
sl@0
|
98 |
ETestNone,
|
sl@0
|
99 |
ETestFailSID,
|
sl@0
|
100 |
ETestFailVID,
|
sl@0
|
101 |
ETestFailCap,
|
sl@0
|
102 |
ETestPass,
|
sl@0
|
103 |
ETestFinished
|
sl@0
|
104 |
};
|
sl@0
|
105 |
|
sl@0
|
106 |
private:
|
sl@0
|
107 |
RFs iFs; ///< File server handle
|
sl@0
|
108 |
TInt iProcessSecureId; ///< The secure id of this process
|
sl@0
|
109 |
TInt iProcessVendorId; ///< The vendor id of this process
|
sl@0
|
110 |
|
sl@0
|
111 |
HBufC* iTestExe; ///< The path of the test harness to run
|
sl@0
|
112 |
TCapabilitySet iExcludedCaps; ///< Capabilties to exclude from failure tests
|
sl@0
|
113 |
TUint iSecureId; ///< The secure id of the policy under test, or zero
|
sl@0
|
114 |
TUint iVendorId; ///< The secure id of the policy under test, or zero
|
sl@0
|
115 |
RArray<TCapability> iCapabilities; ///< The capabilities of the policy under test
|
sl@0
|
116 |
HBufC8* iPreActions; ///< Script fragment for setup test actions
|
sl@0
|
117 |
HBufC8* iPassAction; ///< The action under test
|
sl@0
|
118 |
HBufC8* iFailAction; ///< The action under test
|
sl@0
|
119 |
HBufC8* iPostActions; ///< Script fragment for cleanup test actions
|
sl@0
|
120 |
|
sl@0
|
121 |
TState iState; ///< The state we're in
|
sl@0
|
122 |
TTestState iTestState; ///< The test we're running when iState is ESetCaps or ERunTest
|
sl@0
|
123 |
TInt iCapIndex; ///< The capability we're testing when iTestState is ECapFailTests
|
sl@0
|
124 |
RProcess iProcess; ///< Used for running setcap and test harness
|
sl@0
|
125 |
TInt iFailCount; ///< Running count of tests failed
|
sl@0
|
126 |
TBuf16<50> iTestExeTmpNewPath; ///< stores the executable as executable_policytest.exe
|
sl@0
|
127 |
};
|
sl@0
|
128 |
|
sl@0
|
129 |
#endif
|