1 /*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include <string>
18
19 #include <android-base/file.h>
20 #include <android-base/logging.h>
21 #include <android-base/scopeguard.h>
22 #include <gtest/gtest.h>
23 #include <libavb/libavb.h>
24 #include <ziparchive/zip_archive.h>
25
26 #include "apex_file.h"
27 #include "apex_preinstalled_data.h"
28
29 using android::base::Result;
30
31 static std::string testDataDir = android::base::GetExecutableDirectory() + "/";
32
33 namespace android {
34 namespace apex {
35 namespace {
36
TEST(ApexFileTest,GetOffsetOfSimplePackage)37 TEST(ApexFileTest, GetOffsetOfSimplePackage) {
38 const std::string filePath = testDataDir + "apex.apexd_test.apex";
39 Result<ApexFile> apexFile = ApexFile::Open(filePath);
40 ASSERT_TRUE(apexFile.ok());
41
42 int32_t zip_image_offset;
43 size_t zip_image_size;
44 {
45 ZipArchiveHandle handle;
46 int32_t rc = OpenArchive(filePath.c_str(), &handle);
47 ASSERT_EQ(0, rc);
48 auto close_guard =
49 android::base::make_scope_guard([&handle]() { CloseArchive(handle); });
50
51 ZipEntry entry;
52 rc = FindEntry(handle, "apex_payload.img", &entry);
53 ASSERT_EQ(0, rc);
54
55 zip_image_offset = entry.offset;
56 EXPECT_EQ(zip_image_offset % 4096, 0);
57 zip_image_size = entry.uncompressed_length;
58 EXPECT_EQ(zip_image_size, entry.compressed_length);
59 }
60
61 EXPECT_EQ(zip_image_offset, apexFile->GetImageOffset());
62 EXPECT_EQ(zip_image_size, apexFile->GetImageSize());
63 }
64
TEST(ApexFileTest,GetOffsetMissingFile)65 TEST(ApexFileTest, GetOffsetMissingFile) {
66 const std::string filePath = testDataDir + "missing.apex";
67 Result<ApexFile> apexFile = ApexFile::Open(filePath);
68 ASSERT_FALSE(apexFile.ok());
69 EXPECT_NE(std::string::npos,
70 apexFile.error().message().find("Failed to open package"))
71 << apexFile.error();
72 }
73
TEST(ApexFileTest,GetApexManifest)74 TEST(ApexFileTest, GetApexManifest) {
75 const std::string filePath = testDataDir + "apex.apexd_test.apex";
76 Result<ApexFile> apexFile = ApexFile::Open(filePath);
77 ASSERT_RESULT_OK(apexFile);
78 EXPECT_EQ("com.android.apex.test_package", apexFile->GetManifest().name());
79 EXPECT_EQ(1u, apexFile->GetManifest().version());
80 }
81
TEST(ApexFileTest,VerifyApexVerity)82 TEST(ApexFileTest, VerifyApexVerity) {
83 ASSERT_RESULT_OK(collectPreinstalledData({"/system_ext/apex"}));
84 const std::string filePath = testDataDir + "apex.apexd_test.apex";
85 Result<ApexFile> apexFile = ApexFile::Open(filePath);
86 ASSERT_RESULT_OK(apexFile);
87
88 auto verity_or = apexFile->VerifyApexVerity();
89 ASSERT_RESULT_OK(verity_or);
90
91 const ApexVerityData& data = *verity_or;
92 EXPECT_NE(nullptr, data.desc.get());
93 EXPECT_EQ(std::string("368a22e64858647bc45498e92f749f85482ac468"
94 "50ca7ec8071f49dfa47a243c"),
95 data.salt);
96 EXPECT_EQ(
97 std::string(
98 "8e841019e41e8c40bca6dd6304cbf163ea257ba0a268304832c4105eba1c2747"),
99 data.root_digest);
100 }
101
102 // TODO: May consider packaging a debug key in debug builds (again).
TEST(ApexFileTest,DISABLED_VerifyApexVerityNoKeyDir)103 TEST(ApexFileTest, DISABLED_VerifyApexVerityNoKeyDir) {
104 const std::string filePath = testDataDir + "apex.apexd_test.apex";
105 Result<ApexFile> apexFile = ApexFile::Open(filePath);
106 ASSERT_RESULT_OK(apexFile);
107
108 auto verity_or = apexFile->VerifyApexVerity();
109 ASSERT_FALSE(verity_or.ok());
110 }
111
TEST(ApexFileTest,VerifyApexVerityNoKeyInst)112 TEST(ApexFileTest, VerifyApexVerityNoKeyInst) {
113 const std::string filePath = testDataDir + "apex.apexd_test_no_inst_key.apex";
114 Result<ApexFile> apexFile = ApexFile::Open(filePath);
115 ASSERT_RESULT_OK(apexFile);
116
117 auto verity_or = apexFile->VerifyApexVerity();
118 ASSERT_FALSE(verity_or.ok());
119 }
120
TEST(ApexFileTest,GetBundledPublicKey)121 TEST(ApexFileTest, GetBundledPublicKey) {
122 const std::string filePath = testDataDir + "apex.apexd_test.apex";
123 Result<ApexFile> apexFile = ApexFile::Open(filePath);
124 ASSERT_RESULT_OK(apexFile);
125
126 const std::string keyPath =
127 testDataDir + "apexd_testdata/com.android.apex.test_package.avbpubkey";
128 std::string keyContent;
129 ASSERT_TRUE(android::base::ReadFileToString(keyPath, &keyContent))
130 << "Failed to read " << keyPath;
131
132 EXPECT_EQ(keyContent, apexFile->GetBundledPublicKey());
133 }
134
TEST(ApexFileTest,CorrutedApex_b146895998)135 TEST(ApexFileTest, CorrutedApex_b146895998) {
136 const std::string apex_path = testDataDir + "corrupted_b146895998.apex";
137 Result<ApexFile> apex = ApexFile::Open(apex_path);
138 ASSERT_RESULT_OK(apex);
139 ASSERT_FALSE(apex->VerifyApexVerity());
140 }
141
142 } // namespace
143 } // namespace apex
144 } // namespace android
145