blob: 072bb01353af2497b1e02869348cc1e0898bbd82 [file] [log] [blame]
Daniel Norman6d82fa32019-03-22 17:53:04 -07001#
2# Copyright (C) 2017 The Android Open Source Project
3#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16
17import os.path
18
Daniel Normanfdb38812019-04-15 09:47:24 -070019import common
Daniel Norman6d82fa32019-03-22 17:53:04 -070020import test_utils
Daniel Norman48603ff2021-02-22 15:15:24 -080021from merge_target_files import (
22 validate_config_lists, DEFAULT_FRAMEWORK_ITEM_LIST,
23 DEFAULT_VENDOR_ITEM_LIST, DEFAULT_FRAMEWORK_MISC_INFO_KEYS, copy_items,
24 item_list_to_partition_set, process_apex_keys_apk_certs_common,
25 compile_split_sepolicy)
Daniel Norman6d82fa32019-03-22 17:53:04 -070026
27
28class MergeTargetFilesTest(test_utils.ReleaseToolsTestCase):
29
30 def setUp(self):
31 self.testdata_dir = test_utils.get_testdata_dir()
32
Daniel Normanfdb38812019-04-15 09:47:24 -070033 def test_copy_items_CopiesItemsMatchingPatterns(self):
34
35 def createEmptyFile(path):
36 if not os.path.exists(os.path.dirname(path)):
37 os.makedirs(os.path.dirname(path))
38 open(path, 'a').close()
39 return path
40
41 def createSymLink(source, dest):
42 os.symlink(source, dest)
43 return dest
44
45 def getRelPaths(start, filepaths):
46 return set(
47 os.path.relpath(path=filepath, start=start) for filepath in filepaths)
48
49 input_dir = common.MakeTempDir()
50 output_dir = common.MakeTempDir()
51 expected_copied_items = []
52 actual_copied_items = []
53 patterns = ['*.cpp', 'subdir/*.txt']
54
55 # Create various files that we expect to get copied because they
56 # match one of the patterns.
57 expected_copied_items.extend([
58 createEmptyFile(os.path.join(input_dir, 'a.cpp')),
59 createEmptyFile(os.path.join(input_dir, 'b.cpp')),
60 createEmptyFile(os.path.join(input_dir, 'subdir', 'c.txt')),
61 createEmptyFile(os.path.join(input_dir, 'subdir', 'd.txt')),
62 createEmptyFile(
63 os.path.join(input_dir, 'subdir', 'subsubdir', 'e.txt')),
64 createSymLink('a.cpp', os.path.join(input_dir, 'a_link.cpp')),
65 ])
66 # Create some more files that we expect to not get copied.
67 createEmptyFile(os.path.join(input_dir, 'a.h'))
68 createEmptyFile(os.path.join(input_dir, 'b.h'))
69 createEmptyFile(os.path.join(input_dir, 'subdir', 'subsubdir', 'f.gif'))
70 createSymLink('a.h', os.path.join(input_dir, 'a_link.h'))
71
72 # Copy items.
73 copy_items(input_dir, output_dir, patterns)
74
75 # Assert the actual copied items match the ones we expected.
76 for dirpath, _, filenames in os.walk(output_dir):
77 actual_copied_items.extend(
78 os.path.join(dirpath, filename) for filename in filenames)
79 self.assertEqual(
80 getRelPaths(output_dir, actual_copied_items),
81 getRelPaths(input_dir, expected_copied_items))
82 self.assertEqual(
83 os.readlink(os.path.join(output_dir, 'a_link.cpp')), 'a.cpp')
84
Daniel Norman6d82fa32019-03-22 17:53:04 -070085 def test_validate_config_lists_ReturnsFalseIfMissingDefaultItem(self):
Daniel Normand5d70ea2019-06-05 15:13:43 -070086 framework_item_list = list(DEFAULT_FRAMEWORK_ITEM_LIST)
87 framework_item_list.remove('SYSTEM/*')
Daniel Norman6d82fa32019-03-22 17:53:04 -070088 self.assertFalse(
Daniel Normand5d70ea2019-06-05 15:13:43 -070089 validate_config_lists(framework_item_list,
90 DEFAULT_FRAMEWORK_MISC_INFO_KEYS,
91 DEFAULT_VENDOR_ITEM_LIST))
Daniel Norman6d82fa32019-03-22 17:53:04 -070092
93 def test_validate_config_lists_ReturnsTrueIfDefaultItemInDifferentList(self):
Daniel Normand5d70ea2019-06-05 15:13:43 -070094 framework_item_list = list(DEFAULT_FRAMEWORK_ITEM_LIST)
95 framework_item_list.remove('ROOT/*')
96 vendor_item_list = list(DEFAULT_VENDOR_ITEM_LIST)
97 vendor_item_list.append('ROOT/*')
Daniel Norman6d82fa32019-03-22 17:53:04 -070098 self.assertTrue(
Daniel Normand5d70ea2019-06-05 15:13:43 -070099 validate_config_lists(framework_item_list,
100 DEFAULT_FRAMEWORK_MISC_INFO_KEYS,
101 vendor_item_list))
Daniel Norman6d82fa32019-03-22 17:53:04 -0700102
103 def test_validate_config_lists_ReturnsTrueIfExtraItem(self):
Daniel Normand5d70ea2019-06-05 15:13:43 -0700104 framework_item_list = list(DEFAULT_FRAMEWORK_ITEM_LIST)
105 framework_item_list.append('MY_NEW_PARTITION/*')
Daniel Norman6d82fa32019-03-22 17:53:04 -0700106 self.assertTrue(
Daniel Normand5d70ea2019-06-05 15:13:43 -0700107 validate_config_lists(framework_item_list,
108 DEFAULT_FRAMEWORK_MISC_INFO_KEYS,
109 DEFAULT_VENDOR_ITEM_LIST))
Daniel Normanedf12472019-05-22 10:47:08 -0700110
111 def test_validate_config_lists_ReturnsFalseIfSharedExtractedPartition(self):
Daniel Normand5d70ea2019-06-05 15:13:43 -0700112 vendor_item_list = list(DEFAULT_VENDOR_ITEM_LIST)
113 vendor_item_list.append('SYSTEM/my_system_file')
Daniel Normanedf12472019-05-22 10:47:08 -0700114 self.assertFalse(
Daniel Normand5d70ea2019-06-05 15:13:43 -0700115 validate_config_lists(DEFAULT_FRAMEWORK_ITEM_LIST,
116 DEFAULT_FRAMEWORK_MISC_INFO_KEYS,
117 vendor_item_list))
Daniel Norman6d82fa32019-03-22 17:53:04 -0700118
Daniel Normandbbf5a32020-10-22 16:03:32 -0700119 def test_validate_config_lists_ReturnsFalseIfSharedExtractedPartitionImage(
120 self):
121 vendor_item_list = list(DEFAULT_VENDOR_ITEM_LIST)
122 vendor_item_list.append('IMAGES/system.img')
123 self.assertFalse(
124 validate_config_lists(DEFAULT_FRAMEWORK_ITEM_LIST,
125 DEFAULT_FRAMEWORK_MISC_INFO_KEYS,
126 vendor_item_list))
127
Daniel Norman6d82fa32019-03-22 17:53:04 -0700128 def test_validate_config_lists_ReturnsFalseIfBadSystemMiscInfoKeys(self):
129 for bad_key in ['dynamic_partition_list', 'super_partition_groups']:
Daniel Normand5d70ea2019-06-05 15:13:43 -0700130 framework_misc_info_keys = list(DEFAULT_FRAMEWORK_MISC_INFO_KEYS)
131 framework_misc_info_keys.append(bad_key)
Daniel Norman6d82fa32019-03-22 17:53:04 -0700132 self.assertFalse(
Daniel Normand5d70ea2019-06-05 15:13:43 -0700133 validate_config_lists(DEFAULT_FRAMEWORK_ITEM_LIST,
134 framework_misc_info_keys,
135 DEFAULT_VENDOR_ITEM_LIST))
Daniel Normana61cde02019-05-03 14:19:13 -0700136
Chris Grossfabf50a2019-05-02 12:42:09 -0700137 def test_process_apex_keys_apk_certs_ReturnsTrueIfNoConflicts(self):
138 output_dir = common.MakeTempDir()
139 os.makedirs(os.path.join(output_dir, 'META'))
140
Daniel Normand5d70ea2019-06-05 15:13:43 -0700141 framework_dir = common.MakeTempDir()
142 os.makedirs(os.path.join(framework_dir, 'META'))
Chris Grossfabf50a2019-05-02 12:42:09 -0700143 os.symlink(
Daniel Normand5d70ea2019-06-05 15:13:43 -0700144 os.path.join(self.testdata_dir, 'apexkeys_framework.txt'),
145 os.path.join(framework_dir, 'META', 'apexkeys.txt'))
Chris Grossfabf50a2019-05-02 12:42:09 -0700146
Daniel Normand5d70ea2019-06-05 15:13:43 -0700147 vendor_dir = common.MakeTempDir()
148 os.makedirs(os.path.join(vendor_dir, 'META'))
Chris Grossfabf50a2019-05-02 12:42:09 -0700149 os.symlink(
Daniel Normand5d70ea2019-06-05 15:13:43 -0700150 os.path.join(self.testdata_dir, 'apexkeys_vendor.txt'),
151 os.path.join(vendor_dir, 'META', 'apexkeys.txt'))
Chris Grossfabf50a2019-05-02 12:42:09 -0700152
Daniel Normand5d70ea2019-06-05 15:13:43 -0700153 process_apex_keys_apk_certs_common(framework_dir, vendor_dir, output_dir,
Bill Peckham19c3feb2020-03-20 18:31:43 -0700154 set(['product', 'system', 'system_ext']),
Daniel Normandbbf5a32020-10-22 16:03:32 -0700155 set(['odm', 'vendor']), 'apexkeys.txt')
Chris Grossfabf50a2019-05-02 12:42:09 -0700156
157 merged_entries = []
158 merged_path = os.path.join(self.testdata_dir, 'apexkeys_merge.txt')
159
160 with open(merged_path) as f:
161 merged_entries = f.read().split('\n')
162
163 output_entries = []
164 output_path = os.path.join(output_dir, 'META', 'apexkeys.txt')
165
166 with open(output_path) as f:
167 output_entries = f.read().split('\n')
168
169 return self.assertEqual(merged_entries, output_entries)
170
171 def test_process_apex_keys_apk_certs_ReturnsFalseIfConflictsPresent(self):
172 output_dir = common.MakeTempDir()
173 os.makedirs(os.path.join(output_dir, 'META'))
174
Daniel Normand5d70ea2019-06-05 15:13:43 -0700175 framework_dir = common.MakeTempDir()
176 os.makedirs(os.path.join(framework_dir, 'META'))
Chris Grossfabf50a2019-05-02 12:42:09 -0700177 os.symlink(
Daniel Normand5d70ea2019-06-05 15:13:43 -0700178 os.path.join(self.testdata_dir, 'apexkeys_framework.txt'),
179 os.path.join(framework_dir, 'META', 'apexkeys.txt'))
Chris Grossfabf50a2019-05-02 12:42:09 -0700180
181 conflict_dir = common.MakeTempDir()
182 os.makedirs(os.path.join(conflict_dir, 'META'))
183 os.symlink(
Daniel Normand5d70ea2019-06-05 15:13:43 -0700184 os.path.join(self.testdata_dir, 'apexkeys_framework_conflict.txt'),
Chris Grossfabf50a2019-05-02 12:42:09 -0700185 os.path.join(conflict_dir, 'META', 'apexkeys.txt'))
186
187 self.assertRaises(ValueError, process_apex_keys_apk_certs_common,
Bill Peckham19c3feb2020-03-20 18:31:43 -0700188 framework_dir, conflict_dir, output_dir,
189 set(['product', 'system', 'system_ext']),
Daniel Normandbbf5a32020-10-22 16:03:32 -0700190 set(['odm', 'vendor']), 'apexkeys.txt')
Bill Peckham19c3feb2020-03-20 18:31:43 -0700191
192 def test_process_apex_keys_apk_certs_HandlesApkCertsSyntax(self):
193 output_dir = common.MakeTempDir()
194 os.makedirs(os.path.join(output_dir, 'META'))
195
196 framework_dir = common.MakeTempDir()
197 os.makedirs(os.path.join(framework_dir, 'META'))
198 os.symlink(
199 os.path.join(self.testdata_dir, 'apkcerts_framework.txt'),
200 os.path.join(framework_dir, 'META', 'apkcerts.txt'))
201
202 vendor_dir = common.MakeTempDir()
203 os.makedirs(os.path.join(vendor_dir, 'META'))
204 os.symlink(
205 os.path.join(self.testdata_dir, 'apkcerts_vendor.txt'),
206 os.path.join(vendor_dir, 'META', 'apkcerts.txt'))
207
208 process_apex_keys_apk_certs_common(framework_dir, vendor_dir, output_dir,
209 set(['product', 'system', 'system_ext']),
Daniel Normandbbf5a32020-10-22 16:03:32 -0700210 set(['odm', 'vendor']), 'apkcerts.txt')
Bill Peckham19c3feb2020-03-20 18:31:43 -0700211
212 merged_entries = []
213 merged_path = os.path.join(self.testdata_dir, 'apkcerts_merge.txt')
214
215 with open(merged_path) as f:
216 merged_entries = f.read().split('\n')
217
218 output_entries = []
219 output_path = os.path.join(output_dir, 'META', 'apkcerts.txt')
220
221 with open(output_path) as f:
222 output_entries = f.read().split('\n')
223
224 return self.assertEqual(merged_entries, output_entries)
225
226 def test_item_list_to_partition_set(self):
227 item_list = [
228 'META/apexkeys.txt',
229 'META/apkcerts.txt',
230 'META/filesystem_config.txt',
231 'PRODUCT/*',
232 'SYSTEM/*',
233 'SYSTEM_EXT/*',
234 ]
235 partition_set = item_list_to_partition_set(item_list)
236 self.assertEqual(set(['product', 'system', 'system_ext']), partition_set)
Daniel Norman48603ff2021-02-22 15:15:24 -0800237
238 def test_compile_split_sepolicy(self):
239 product_out_dir = common.MakeTempDir()
240
241 def write_temp_file(path, data=''):
242 full_path = os.path.join(product_out_dir, path)
243 if not os.path.exists(os.path.dirname(full_path)):
244 os.makedirs(os.path.dirname(full_path))
245 with open(full_path, 'w') as f:
246 f.write(data)
247
248 write_temp_file(
249 'system/etc/vintf/compatibility_matrix.device.xml', """
250 <compatibility-matrix>
251 <sepolicy>
252 <kernel-sepolicy-version>30</kernel-sepolicy-version>
253 </sepolicy>
254 </compatibility-matrix>""")
255 write_temp_file('vendor/etc/selinux/plat_sepolicy_vers.txt', '30.0')
256
257 write_temp_file('system/etc/selinux/plat_sepolicy.cil')
258 write_temp_file('system/etc/selinux/mapping/30.0.cil')
259 write_temp_file('product/etc/selinux/mapping/30.0.cil')
260 write_temp_file('vendor/etc/selinux/vendor_sepolicy.cil')
261 write_temp_file('vendor/etc/selinux/plat_pub_versioned.cil')
262
263 cmd = compile_split_sepolicy(product_out_dir, {
264 'system': 'system',
265 'product': 'product',
266 'vendor': 'vendor',
267 }, os.path.join(product_out_dir, 'policy'))
268 self.assertEqual(' '.join(cmd),
269 ('secilc -m -M true -G -N -c 30 '
270 '-o {OTP}/policy -f /dev/null '
271 '{OTP}/system/etc/selinux/plat_sepolicy.cil '
272 '{OTP}/system/etc/selinux/mapping/30.0.cil '
273 '{OTP}/vendor/etc/selinux/vendor_sepolicy.cil '
274 '{OTP}/vendor/etc/selinux/plat_pub_versioned.cil '
275 '{OTP}/product/etc/selinux/mapping/30.0.cil').format(
276 OTP=product_out_dir))