• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright 2016, The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *     http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 package com.android.managedprovisioning.task;
18 
19 import static android.app.admin.DevicePolicyManager.ACTION_PROVISION_MANAGED_DEVICE;
20 import static com.android.managedprovisioning.task.VerifyPackageTask.ERROR_DEVICE_ADMIN_MISSING;
21 import static com.android.managedprovisioning.task.VerifyPackageTask.ERROR_HASH_MISMATCH;
22 import static org.mockito.Matchers.any;
23 import static org.mockito.Mockito.verify;
24 import static org.mockito.Mockito.verifyNoMoreInteractions;
25 import static org.mockito.Mockito.when;
26 
27 import android.content.ComponentName;
28 import android.content.Context;
29 import android.content.pm.PackageInfo;
30 import android.content.pm.PackageManager;
31 import android.content.pm.Signature;
32 import android.support.test.filters.SmallTest;
33 import android.support.test.runner.AndroidJUnit4;
34 
35 import com.android.managedprovisioning.common.Utils;
36 import com.android.managedprovisioning.model.PackageDownloadInfo;
37 import com.android.managedprovisioning.model.ProvisioningParams;
38 
39 import org.junit.Before;
40 import org.junit.Test;
41 import org.junit.runner.RunWith;
42 import org.mockito.Mock;
43 import org.mockito.MockitoAnnotations;
44 
45 /**
46  * Unit tests for {@link VerifyPackageTask}.
47  */
48 @RunWith(AndroidJUnit4.class)
49 @SmallTest
50 public class VerifyPackageTaskTest {
51 
52     private static final String TEST_PACKAGE_NAME = "sample.package.name";
53     private static final String TEST_ADMIN_NAME = TEST_PACKAGE_NAME + ".DeviceAdmin";
54     private static final String TEST_PACKAGE_LOCATION = "http://www.some.uri.com";
55     private static final String TEST_LOCAL_FILENAME = "/local/filename";
56     private static final int TEST_USER_ID = 123;
57     private static final byte[] TEST_BAD_HASH = new byte[] { 'b', 'a', 'd' };
58     private static final byte[] TEST_PACKAGE_CHECKSUM_HASH = new byte[] { '1', '2', '3', '4', '5' };
59     private static final byte[] TEST_SIGNATURE_HASH = new byte[] {'a', 'b', 'c', 'd'};
60     private static final byte[] EMPTY_BYTE_ARRAY = new byte[] {};
61     private static final Signature[] TEST_SIGNATURES = new Signature[] { new Signature("1986") };
62 
63     @Mock private Context mContext;
64     @Mock private DownloadPackageTask mDownloadPackageTask;
65     @Mock private AbstractProvisioningTask.Callback mCallback;
66     @Mock private PackageManager mPackageManager;
67     @Mock private Utils mUtils;
68     @Mock private PackageInfo mPackageInfo;
69 
70     private AbstractProvisioningTask mTask;
71 
72     @Before
setUp()73     public void setUp() throws Exception {
74         // This is necessary for mockito to work
75         MockitoAnnotations.initMocks(this);
76 
77         when(mContext.getPackageManager()).thenReturn(mPackageManager);
78 
79         mPackageInfo.packageName = TEST_PACKAGE_NAME;
80         mPackageInfo.signatures = TEST_SIGNATURES;
81 
82         when(mPackageManager.getPackageArchiveInfo(TEST_LOCAL_FILENAME,
83                 PackageManager.GET_SIGNATURES | PackageManager.GET_RECEIVERS))
84                 .thenReturn(mPackageInfo);
85 
86         when(mDownloadPackageTask.getDownloadedPackageLocation()).thenReturn(TEST_LOCAL_FILENAME);
87 
88         when(mUtils.findDeviceAdminInPackageInfo(TEST_PACKAGE_NAME, null, mPackageInfo))
89                 .thenReturn(new ComponentName(TEST_PACKAGE_NAME, TEST_ADMIN_NAME));
90     }
91 
92     @Test
testDownloadLocationNull()93     public void testDownloadLocationNull() {
94         // GIVEN that the download package location is null
95         when(mDownloadPackageTask.getDownloadedPackageLocation()).thenReturn(null);
96 
97         // WHEN running the VerifyPackageTask
98         runWithDownloadInfo(TEST_PACKAGE_CHECKSUM_HASH, EMPTY_BYTE_ARRAY, false);
99 
100         // THEN success should be called
101         verify(mCallback).onSuccess(mTask);
102         verifyNoMoreInteractions(mCallback);
103     }
104 
105     @Test
testMissingDeviceAdminComponent()106     public void testMissingDeviceAdminComponent() {
107         // GIVEN that the device admin component cannot be found
108         when(mUtils.findDeviceAdminInPackageInfo(TEST_PACKAGE_NAME, null, mPackageInfo))
109                 .thenReturn(null);
110 
111         // WHEN running the VerifyPackageTask
112         runWithDownloadInfo(TEST_PACKAGE_CHECKSUM_HASH, EMPTY_BYTE_ARRAY, false);
113 
114         // THEN an error should be reported
115         verify(mCallback).onError(mTask, ERROR_DEVICE_ADMIN_MISSING);
116         verifyNoMoreInteractions(mCallback);
117     }
118 
119     @Test
testPackageChecksumSha256_success()120     public void testPackageChecksumSha256_success() throws Exception {
121         // GIVEN the hash of the downloaded file matches the parameter value
122         when(mUtils.computeHashOfFile(TEST_LOCAL_FILENAME, Utils.SHA256_TYPE))
123                 .thenReturn(TEST_PACKAGE_CHECKSUM_HASH);
124 
125         // WHEN running the VerifyPackageTask
126         runWithDownloadInfo(TEST_PACKAGE_CHECKSUM_HASH, EMPTY_BYTE_ARRAY, false);
127 
128         // THEN success should be called
129         verify(mCallback).onSuccess(mTask);
130         verifyNoMoreInteractions(mCallback);
131     }
132 
133     @Test
testPackageChecksumSha1_success()134     public void testPackageChecksumSha1_success() throws Exception {
135         // GIVEN the hash of the downloaded file matches the parameter value in Sha1
136         when(mUtils.computeHashOfFile(TEST_LOCAL_FILENAME, Utils.SHA1_TYPE))
137                 .thenReturn(TEST_PACKAGE_CHECKSUM_HASH);
138 
139         // WHEN running the VerifyPackageTask
140         runWithDownloadInfo(TEST_PACKAGE_CHECKSUM_HASH, EMPTY_BYTE_ARRAY, true);
141 
142         // THEN success should be called
143         verify(mCallback).onSuccess(mTask);
144         verifyNoMoreInteractions(mCallback);
145     }
146 
147     @Test
testPackageChecksumSha1_failure()148     public void testPackageChecksumSha1_failure() throws Exception {
149         // GIVEN the hash of the downloaded file does no match the parameter value in Sha1
150         when(mUtils.computeHashOfFile(TEST_LOCAL_FILENAME, Utils.SHA1_TYPE))
151                 .thenReturn(TEST_BAD_HASH);
152 
153         // WHEN running the VerifyPackageTask
154         runWithDownloadInfo(TEST_PACKAGE_CHECKSUM_HASH, EMPTY_BYTE_ARRAY, true);
155 
156         // THEN hash mismatch error should be called
157         verify(mCallback).onError(mTask, ERROR_HASH_MISMATCH);
158         verifyNoMoreInteractions(mCallback);
159     }
160 
161     @Test
testSignatureHash_success()162     public void testSignatureHash_success() throws Exception {
163         // GIVEN the hash of the signature matches the parameter value
164         when(mUtils.computeHashOfByteArray(TEST_SIGNATURES[0].toByteArray()))
165                 .thenReturn(TEST_SIGNATURE_HASH);
166 
167         // WHEN running the VerifyPackageTask
168         runWithDownloadInfo(EMPTY_BYTE_ARRAY, TEST_SIGNATURE_HASH, true);
169 
170         // THEN success should be called
171         verify(mCallback).onSuccess(mTask);
172         verifyNoMoreInteractions(mCallback);
173     }
174 
175     @Test
testSignatureHash_failure()176     public void testSignatureHash_failure() throws Exception {
177         // GIVEN the hash of the signature does not match the parameter value
178         when(mUtils.computeHashOfByteArray(TEST_SIGNATURES[0].toByteArray()))
179                 .thenReturn(TEST_BAD_HASH);
180 
181         // WHEN running the VerifyPackageTask
182         runWithDownloadInfo(EMPTY_BYTE_ARRAY, TEST_SIGNATURE_HASH, true);
183 
184         // THEN hash mismatch error should be called
185         verify(mCallback).onError(mTask, ERROR_HASH_MISMATCH);
186         verifyNoMoreInteractions(mCallback);
187     }
188 
189     @Test
testSignatureHash_noSignature()190     public void testSignatureHash_noSignature() throws Exception {
191         // GIVEN the package has no signature
192         mPackageInfo.signatures = null;
193 
194         // WHEN running the VerifyPackageTask
195         runWithDownloadInfo(EMPTY_BYTE_ARRAY, TEST_SIGNATURE_HASH, true);
196 
197         // THEN hash mismatch error should be called
198         verify(mCallback).onError(mTask, ERROR_HASH_MISMATCH);
199         verifyNoMoreInteractions(mCallback);
200     }
201 
202     @Test
testSignatureHash_digestFailure()203     public void testSignatureHash_digestFailure() throws Exception {
204         // GIVEN the package has no signature
205         when(mUtils.computeHashOfByteArray(any(byte[].class))).thenReturn(null);
206 
207         // WHEN running the VerifyPackageTask
208         runWithDownloadInfo(EMPTY_BYTE_ARRAY, TEST_SIGNATURE_HASH, true);
209 
210         // THEN hash mismatch error should be called
211         verify(mCallback).onError(mTask, ERROR_HASH_MISMATCH);
212         verifyNoMoreInteractions(mCallback);
213     }
214 
runWithDownloadInfo(byte[] packageChecksum, byte[] signatureChecksum, boolean supportsSha1)215     private void runWithDownloadInfo(byte[] packageChecksum, byte[] signatureChecksum,
216             boolean supportsSha1) {
217         PackageDownloadInfo downloadInfo = new PackageDownloadInfo.Builder()
218                 .setLocation(TEST_PACKAGE_LOCATION)
219                 .setPackageChecksum(packageChecksum)
220                 .setSignatureChecksum(signatureChecksum)
221                 .setPackageChecksumSupportsSha1(supportsSha1)
222                 .build();
223         ProvisioningParams params = new ProvisioningParams.Builder()
224                 .setProvisioningAction(ACTION_PROVISION_MANAGED_DEVICE)
225                 .setDeviceAdminPackageName(TEST_PACKAGE_NAME)
226                 .setDeviceAdminDownloadInfo(downloadInfo)
227                 .build();
228         mTask = new VerifyPackageTask(mUtils, mDownloadPackageTask, mContext, params, mCallback);
229         mTask.run(TEST_USER_ID);
230     }
231 }
232