Skip to content
Snippets Groups Projects
Commit 84e247ab authored by Tri Vo's avatar Tri Vo
Browse files

Soong module for selinux files including board-specific directories.

se_filegroup is used to export selinux files from board-specific
directories (e.g. device/google/wahoo/sepolicy).

Use se_filegroup module to export partner extension of compatibility
mapping to build logic in system/sepolicy.

Bug: 33691272
Bug: 74669108
Test: .cil mapping files can be correctly added from vendor directory.
Change-Id: Iaa2a95d0e326cb03a478fc12c1a14ba40e57e117
parent a5cfd3e5
No related branches found
No related tags found
No related merge requests found
......@@ -12,16 +12,30 @@
// See the License for the specific language governing permissions and
// limitations under the License.
se_filegroup {
name: "26.0.board.compat.map",
srcs: [
"compat/26.0/26.0.cil",
],
}
se_filegroup {
name: "27.0.board.compat.map",
srcs: [
"compat/27.0/27.0.cil",
],
}
se_cil_compat_map {
name: "26.0.cil",
srcs: [
"private/compat/26.0/26.0.cil",
":26.0.board.compat.map",
],
}
se_cil_compat_map {
name: "27.0.cil",
srcs: [
"private/compat/27.0/27.0.cil",
":27.0.board.compat.map",
],
}
......@@ -16,10 +16,14 @@ bootstrap_go_package {
name: "soong-selinux",
pkgPath: "android/soong/selinux",
deps: [
"blueprint",
"soong",
"soong-android",
"soong-genrule",
],
srcs: [
"cil_compat_map.go",
"filegroup.go"
],
pluginFor: ["soong_build"],
}
......@@ -54,8 +54,34 @@ type cilCompatMap struct {
installSource android.OptionalPath
}
func expandSeSources(ctx android.ModuleContext, srcFiles []string) android.Paths {
expandedSrcFiles := make(android.Paths, 0, len(srcFiles))
for _, s := range srcFiles {
if m := android.SrcIsModule(s); m != "" {
module := ctx.GetDirectDepWithTag(m, android.SourceDepTag)
if module == nil {
// Error will have been handled by ExtractSourcesDeps
continue
}
if fg, ok := module.(*fileGroup); ok {
// Core compatibility mapping files are under system/sepolicy/private.
expandedSrcFiles = append(expandedSrcFiles, fg.SystemPrivateSrcs()...)
// Partner extensions to the compatibility mapping in must be located in
// BOARD_PLAT_PRIVATE_SEPOLICY_DIR
expandedSrcFiles = append(expandedSrcFiles, fg.SystemExtPrivateSrcs()...)
} else {
ctx.ModuleErrorf("srcs dependency %q is not an selinux filegroup", m)
}
} else {
p := android.PathForModuleSrc(ctx, s)
expandedSrcFiles = append(expandedSrcFiles, p)
}
}
return expandedSrcFiles
}
func (c *cilCompatMap) GenerateAndroidBuildActions(ctx android.ModuleContext) {
srcFiles := ctx.ExpandSources(c.properties.Srcs, nil)
srcFiles := expandSeSources(ctx, c.properties.Srcs)
for _, src := range srcFiles {
if src.Ext() != ".cil" {
ctx.PropertyErrorf("srcs", "%s has to be a .cil file.", src.String())
......
// Copyright 2018 Google Inc. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package selinux
import (
"android/soong/android"
"path/filepath"
)
func init() {
android.RegisterModuleType("se_filegroup", FileGroupFactory)
}
func FileGroupFactory() android.Module {
module := &fileGroup{}
module.AddProperties(&module.properties)
android.InitAndroidModule(module)
return module
}
type fileGroupProperties struct {
// list of source file suffixes used to collect selinux policy files.
// Source files will be looked up in the following local directories:
// system/sepolicy/{public, private, vendor, reqd_mask}
// and directories specified by following config variables:
// BOARD_SEPOLICY_DIRS, BOARD_ODM_SEPOLICY_DIRS
// BOARD_PLAT_PUBLIC_SEPOLICY_DIR, BOARD_PLAT_PRIVATE_SEPOLICY_DIR
Srcs []string
}
type fileGroup struct {
android.ModuleBase
properties fileGroupProperties
systemPublicSrcs android.Paths
systemPrivateSrcs android.Paths
systemVendorSrcs android.Paths
systemReqdMaskSrcs android.Paths
systemExtPublicSrcs android.Paths
systemExtPrivateSrcs android.Paths
vendorSrcs android.Paths
odmSrcs android.Paths
}
// Source files from system/sepolicy/public
func (fg *fileGroup) SystemPublicSrcs() android.Paths {
return fg.systemPublicSrcs
}
// Source files from system/sepolicy/private
func (fg *fileGroup) SystemPrivateSrcs() android.Paths {
return fg.systemPrivateSrcs
}
// Source files from system/sepolicy/vendor
func (fg *fileGroup) SystemVendorSrcs() android.Paths {
return fg.systemVendorSrcs
}
// Source files from system/sepolicy/reqd_mask
func (fg *fileGroup) SystemReqdMaskSrcs() android.Paths {
return fg.systemReqdMaskSrcs
}
// Source files from BOARD_PLAT_PUBLIC_SEPOLICY_DIR
func (fg *fileGroup) SystemExtPublicSrcs() android.Paths {
return fg.systemExtPublicSrcs
}
// Source files from BOARD_PLAT_PRIVATE_SEPOLICY_DIR
func (fg *fileGroup) SystemExtPrivateSrcs() android.Paths {
return fg.systemExtPrivateSrcs
}
// Source files from BOARD_SEPOLICY_DIRS
func (fg *fileGroup) VendorSrcs() android.Paths {
return fg.vendorSrcs
}
// Source files from BOARD_ODM_SEPOLICY_DIRS
func (fg *fileGroup) OdmSrcs() android.Paths {
return fg.odmSrcs
}
func (fg *fileGroup) findSrcsInDirs(ctx android.ModuleContext, dirs []string) android.Paths {
result := android.Paths{}
for _, f := range fg.properties.Srcs {
for _, d := range dirs {
path := filepath.Join(d, f)
files, _ := ctx.GlobWithDeps(path, nil)
for _, f := range files {
result = append(result, android.PathForSource(ctx, f))
}
}
}
return result
}
func (fg *fileGroup) findSrcsInDir(ctx android.ModuleContext, dir string) android.Paths {
return fg.findSrcsInDirs(ctx, []string{dir})
}
func (fg *fileGroup) DepsMutator(ctx android.BottomUpMutatorContext) {}
func (fg *fileGroup) GenerateAndroidBuildActions(ctx android.ModuleContext) {
fg.systemPublicSrcs = fg.findSrcsInDir(ctx, filepath.Join(ctx.ModuleDir(), "public"))
fg.systemPrivateSrcs = fg.findSrcsInDir(ctx, filepath.Join(ctx.ModuleDir(), "private"))
fg.systemVendorSrcs = fg.findSrcsInDir(ctx, filepath.Join(ctx.ModuleDir(), "vendor"))
fg.systemReqdMaskSrcs = fg.findSrcsInDir(ctx, filepath.Join(ctx.ModuleDir(), "reqd_mask"))
fg.systemExtPublicSrcs = fg.findSrcsInDir(ctx, ctx.DeviceConfig().PlatPublicSepolicyDir())
fg.systemExtPrivateSrcs = fg.findSrcsInDir(ctx, ctx.DeviceConfig().PlatPrivateSepolicyDir())
fg.vendorSrcs = fg.findSrcsInDirs(ctx, ctx.DeviceConfig().VendorSepolicyDirs())
fg.odmSrcs = fg.findSrcsInDirs(ctx, ctx.DeviceConfig().OdmSepolicyDirs())
}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment