1 /*
2 * Copyright (c) 2025-2025 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "params_run_tool.h"
17 #include <unistd.h>
18 #include <memory>
19 #include "constant.h"
20 #include "help.h"
21
22 namespace OHOS {
23 namespace SignatureTools {
24 const std::string ParamsRunTool::VERSION = "1.0.0";
25
26 static std::unordered_map <std::string,
27 std::function<bool(Options* params, SignToolServiceImpl& api)>> DISPATCH_RUN_METHOD {
28 {SIGN_ELF, ParamsRunTool::RunSignApp},
29 {VERIFY_ELF, ParamsRunTool::RunVerifyApp},
30 };
31
ProcessCmd(char ** args,size_t size)32 bool ParamsRunTool::ProcessCmd(char** args, size_t size)
33 {
34 if (size < CmdUtil::ARGS_MIN_LEN) {
35 PrintHelp();
36 return true;
37 }
38 if (args == nullptr || strcmp(args[1], "") == 0) {
39 PrintHelp();
40 return true;
41 } else if (strcmp(args[1], "-h") == 0 || strcmp(args[1], "-help") == 0) {
42 PrintHelp();
43 return true;
44 } else if (strcmp(args[1], "-v") == 0 || strcmp(args[1], "-version") == 0) {
45 Version();
46 return true;
47 } else {
48 std::shared_ptr<SignToolServiceImpl> serviceApi = std::make_shared<SignToolServiceImpl>();
49 ParamsSharedPtr param = std::make_shared<Params>();
50 if (!CmdUtil::Convert2Params(args, size, param)) {
51 PrintMsg(param->GetMethod() + " failed");
52 return false;
53 }
54 SIGNATURE_TOOLS_LOGD("%s run start time ", param->GetMethod().c_str());
55 if (!DispatchParams(param, *serviceApi)) {
56 SIGNATURE_TOOLS_LOGD("%s run end time ", param->GetMethod().c_str());
57 PrintMsg(param->GetMethod() + " failed");
58 return false;
59 }
60 SIGNATURE_TOOLS_LOGD("%s run end time ", param->GetMethod().c_str());
61 }
62 return true;
63 }
64
RunSignApp(Options * params,SignToolServiceImpl & api)65 bool ParamsRunTool::RunSignApp(Options* params, SignToolServiceImpl& api)
66 {
67 if (!params->Required({Options::MODE, Options::IN_FILE, Options::OUT_FILE})) {
68 return false;
69 }
70 if (!CmdUtil::UpdateParamForCheckInFile(params, {Options::IN_FILE, Options::APP_CERT_FILE,
71 Options::PROFILE_FILE, Options::KEY_STORE_FILE, Options::MODULE_FILE,
72 ParamConstants::PARAM_REMOTE_SIGNERPLUGIN})) {
73 return false;
74 }
75 if (!CmdUtil::UpdateParamForCheckOutFile(params, {Options::OUT_FILE})) {
76 return false;
77 }
78 std::string mode = params->GetString(Options::MODE);
79 if (!StringUtils::CaseCompare(mode, LOCAL_SIGN) &&
80 !StringUtils::CaseCompare(mode, REMOTE_SIGN)) {
81 PrintErrorNumberMsg("COMMAND_ERROR", COMMAND_ERROR, "not support command param '" + mode + "'");
82 return false;
83 }
84 if (params->GetString(Options::SELF_SIGN) == ParamConstants::SELF_SIGN_TYPE_1) {
85 return api.Sign(params);
86 }
87 if (StringUtils::CaseCompare(mode, LOCAL_SIGN)) {
88 if (!params->Required({Options::KEY_STORE_FILE, Options::KEY_ALIAS, Options::APP_CERT_FILE})) {
89 return false;
90 }
91 if (!FileUtils::ValidFileType(params->GetString(Options::KEY_STORE_FILE), {"p12", "jks"})) {
92 return false;
93 }
94 }
95 if (!CheckProfile(*params)) {
96 return false;
97 }
98 std::string signAlg = params->GetString(Options::SIGN_ALG);
99 if (!CmdUtil::JudgeSignAlgType(signAlg)) {
100 return false;
101 }
102 return api.Sign(params);
103 }
104
CheckProfile(Options & params)105 bool ParamsRunTool::CheckProfile(Options& params)
106 {
107 std::string profileFile = params.GetString(Options::PROFILE_FILE);
108 std::string profileSigned = params.GetString(Options::PROFILE_SIGNED);
109 if (profileFile.empty()) {
110 SIGNATURE_TOOLS_LOGI("[SignElf] No profile file");
111 return true;
112 }
113 if (profileSigned == DEFAULT_PROFILE_SIGNED_1) {
114 if (!FileUtils::ValidFileType(profileFile, {"p7b"})) {
115 return false;
116 }
117 } else {
118 if (!FileUtils::ValidFileType(profileFile, {"json"})) {
119 return false;
120 }
121 }
122 return true;
123 }
124
DispatchParams(const ParamsSharedPtr & params,SignToolServiceImpl & api)125 bool ParamsRunTool::DispatchParams(const ParamsSharedPtr& params, SignToolServiceImpl& api)
126 {
127 bool isSuccess = false;
128 std::string method = params->GetMethod();
129 auto it = DISPATCH_RUN_METHOD.find(method);
130 if (it == DISPATCH_RUN_METHOD.end()) {
131 PrintErrorNumberMsg("COMMAND_ERROR", COMMAND_ERROR, "Unsupported method: " + method);
132 return false;
133 } else {
134 isSuccess = it->second(params->GetOptions(), api);
135 }
136 return isSuccess;
137 }
138
PrintHelp()139 void ParamsRunTool::PrintHelp()
140 {
141 PrintMsg(HELP_TXT);
142 }
143
Version()144 void ParamsRunTool::Version()
145 {
146 PrintMsg(ParamsRunTool::VERSION);
147 }
148
RunVerifyApp(Options * params,SignToolServiceImpl & api)149 bool ParamsRunTool::RunVerifyApp(Options* params, SignToolServiceImpl& api)
150 {
151 if (!params->Required({Options::IN_FILE})) {
152 return false;
153 }
154 if (!CmdUtil::UpdateParamForCheckInFile(params, {Options::IN_FILE})) {
155 return false;
156 }
157 return api.Verify(params);
158 }
159 } // namespace SignatureTools
160 } // namespace OHOS