android_system_sepolicy/tests
Tri Vo e3f4f77d39 Don't require private types in mapping file.
Private types are not visible to vendor/odm policy, so we don't need mapping
entries for them.

We build platform-only public policy .cil file and give it as input to
treble_sepolicy_tests. Using this public policy the test can now figure out if
the newly added type in public or private.

Bug: 116344577
Test: adding public type triggers mapping test failure, adding private type does
not.
Change-Id: I421f335e37274b24aa73109e260653d7b73788b5
2018-09-28 17:22:25 -07:00
..
include Assert types labeled in genfs_contexts have correct attributes 2018-03-23 14:34:46 -07:00
Android.bp searchpolicy depends on FcSort 2018-04-24 14:12:50 -07:00
FcSort.py Improve data separation test coverage 2018-03-22 22:58:50 -07:00
mini_parser.py Don't require private types in mapping file. 2018-09-28 17:22:25 -07:00
policy.py Assert types labeled in genfs_contexts have correct attributes 2018-03-23 14:34:46 -07:00
searchpolicy.py Sync internal master and AOSP sepolicy. 2017-09-26 14:38:47 -07:00
sepol_wrap.cpp gracefully handle hashtab_search failures 2018-09-26 14:28:44 -07:00
sepolicy_tests.py Introduce system_file_type 2018-09-27 12:52:09 -07:00
treble_sepolicy_tests.py Don't require private types in mapping file. 2018-09-28 17:22:25 -07:00