/* * Copyright (C) 2017 The Android Open Source Project * * Licensed under the Apache License, version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agree to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "install.h" #include "private/install.h" TEST(InstallTest, verify_package_compatibility_no_entry) { TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); // The archive must have something to be opened correctly. ASSERT_EQ(0, writer.StartEntry("dummy_entry", 0)); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); // Doesn't contain compatibility zip entry. ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); ASSERT_TRUE(verify_package_compatibility(zip)); CloseArchive(zip); } TEST(InstallTest, verify_package_compatibility_invalid_entry) { TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); ASSERT_EQ(0, writer.StartEntry("compatibility.zip", 0)); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); // Empty compatibility zip entry. ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); ASSERT_FALSE(verify_package_compatibility(zip)); CloseArchive(zip); } TEST(InstallTest, read_metadata_from_package_smoke) { TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); ASSERT_EQ(0, writer.StartEntry("META-INF/com/android/metadata", kCompressStored)); const std::string content("abcdefg"); ASSERT_EQ(0, writer.WriteBytes(content.data(), content.size())); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); std::string metadata; ASSERT_TRUE(read_metadata_from_package(zip, &metadata)); ASSERT_EQ(content, metadata); CloseArchive(zip); TemporaryFile temp_file2; FILE* zip_file2 = fdopen(temp_file2.release(), "w"); ZipWriter writer2(zip_file2); ASSERT_EQ(0, writer2.StartEntry("META-INF/com/android/metadata", kCompressDeflated)); ASSERT_EQ(0, writer2.WriteBytes(content.data(), content.size())); ASSERT_EQ(0, writer2.FinishEntry()); ASSERT_EQ(0, writer2.Finish()); ASSERT_EQ(0, fclose(zip_file2)); ASSERT_EQ(0, OpenArchive(temp_file2.path, &zip)); metadata.clear(); ASSERT_TRUE(read_metadata_from_package(zip, &metadata)); ASSERT_EQ(content, metadata); CloseArchive(zip); } TEST(InstallTest, read_metadata_from_package_no_entry) { TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); ASSERT_EQ(0, writer.StartEntry("dummy_entry", kCompressStored)); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); std::string metadata; ASSERT_FALSE(read_metadata_from_package(zip, &metadata)); CloseArchive(zip); } TEST(InstallTest, verify_package_compatibility_with_libvintf_malformed_xml) { TemporaryFile compatibility_zip_file; FILE* compatibility_zip = fdopen(compatibility_zip_file.release(), "w"); ZipWriter compatibility_zip_writer(compatibility_zip); ASSERT_EQ(0, compatibility_zip_writer.StartEntry("system_manifest.xml", kCompressDeflated)); std::string malformed_xml = "malformed"; ASSERT_EQ(0, compatibility_zip_writer.WriteBytes(malformed_xml.data(), malformed_xml.size())); ASSERT_EQ(0, compatibility_zip_writer.FinishEntry()); ASSERT_EQ(0, compatibility_zip_writer.Finish()); ASSERT_EQ(0, fclose(compatibility_zip)); TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); ASSERT_EQ(0, writer.StartEntry("compatibility.zip", kCompressStored)); std::string compatibility_zip_content; ASSERT_TRUE( android::base::ReadFileToString(compatibility_zip_file.path, &compatibility_zip_content)); ASSERT_EQ(0, writer.WriteBytes(compatibility_zip_content.data(), compatibility_zip_content.size())); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); std::vector compatibility_info; compatibility_info.push_back(malformed_xml); // Malformed compatibility zip is expected to be rejected by libvintf. But we defer that to // libvintf. std::string err; bool result = android::vintf::VintfObjectRecovery::CheckCompatibility(compatibility_info, &err) == 0; ASSERT_EQ(result, verify_package_compatibility(zip)); CloseArchive(zip); } TEST(InstallTest, verify_package_compatibility_with_libvintf_system_manifest_xml) { static constexpr const char* system_manifest_xml_path = "/system/manifest.xml"; if (access(system_manifest_xml_path, R_OK) == -1) { GTEST_LOG_(INFO) << "Test skipped on devices w/o /system/manifest.xml."; return; } std::string system_manifest_xml_content; ASSERT_TRUE( android::base::ReadFileToString(system_manifest_xml_path, &system_manifest_xml_content)); TemporaryFile compatibility_zip_file; FILE* compatibility_zip = fdopen(compatibility_zip_file.release(), "w"); ZipWriter compatibility_zip_writer(compatibility_zip); ASSERT_EQ(0, compatibility_zip_writer.StartEntry("system_manifest.xml", kCompressDeflated)); ASSERT_EQ(0, compatibility_zip_writer.WriteBytes(system_manifest_xml_content.data(), system_manifest_xml_content.size())); ASSERT_EQ(0, compatibility_zip_writer.FinishEntry()); ASSERT_EQ(0, compatibility_zip_writer.Finish()); ASSERT_EQ(0, fclose(compatibility_zip)); TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); ASSERT_EQ(0, writer.StartEntry("compatibility.zip", kCompressStored)); std::string compatibility_zip_content; ASSERT_TRUE( android::base::ReadFileToString(compatibility_zip_file.path, &compatibility_zip_content)); ASSERT_EQ(0, writer.WriteBytes(compatibility_zip_content.data(), compatibility_zip_content.size())); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); std::vector compatibility_info; compatibility_info.push_back(system_manifest_xml_content); std::string err; bool result = android::vintf::VintfObjectRecovery::CheckCompatibility(compatibility_info, &err) == 0; // Make sure the result is consistent with libvintf library. ASSERT_EQ(result, verify_package_compatibility(zip)); CloseArchive(zip); } #ifdef AB_OTA_UPDATER static void VerifyAbUpdateBinaryCommand(const std::string& serialno, bool success = true) { TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); ASSERT_EQ(0, writer.StartEntry("payload.bin", kCompressStored)); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.StartEntry("payload_properties.txt", kCompressStored)); const std::string properties = "some_properties"; ASSERT_EQ(0, writer.WriteBytes(properties.data(), properties.size())); ASSERT_EQ(0, writer.FinishEntry()); // A metadata entry is mandatory. ASSERT_EQ(0, writer.StartEntry("META-INF/com/android/metadata", kCompressStored)); std::string device = android::base::GetProperty("ro.product.device", ""); ASSERT_NE("", device); std::string timestamp = android::base::GetProperty("ro.build.date.utc", ""); ASSERT_NE("", timestamp); std::vector meta{ "ota-type=AB", "pre-device=" + device, "post-timestamp=" + timestamp }; if (!serialno.empty()) { meta.push_back("serialno=" + serialno); } std::string metadata = android::base::Join(meta, "\n"); ASSERT_EQ(0, writer.WriteBytes(metadata.data(), metadata.size())); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); ZipString payload_name("payload.bin"); ZipEntry payload_entry; ASSERT_EQ(0, FindEntry(zip, payload_name, &payload_entry)); int status_fd = 10; std::string package = "/path/to/update.zip"; std::string binary_path = "/sbin/update_engine_sideload"; std::vector cmd; if (success) { ASSERT_EQ(0, update_binary_command(package, zip, binary_path, 0, status_fd, &cmd)); ASSERT_EQ(5U, cmd.size()); ASSERT_EQ(binary_path, cmd[0]); ASSERT_EQ("--payload=file://" + package, cmd[1]); ASSERT_EQ("--offset=" + std::to_string(payload_entry.offset), cmd[2]); ASSERT_EQ("--headers=" + properties, cmd[3]); ASSERT_EQ("--status_fd=" + std::to_string(status_fd), cmd[4]); } else { ASSERT_EQ(INSTALL_ERROR, update_binary_command(package, zip, binary_path, 0, status_fd, &cmd)); } CloseArchive(zip); } #endif // AB_OTA_UPDATER TEST(InstallTest, update_binary_command_smoke) { #ifdef AB_OTA_UPDATER // Empty serialno will pass the verification. VerifyAbUpdateBinaryCommand({}); #else TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); static constexpr const char* UPDATE_BINARY_NAME = "META-INF/com/google/android/update-binary"; ASSERT_EQ(0, writer.StartEntry(UPDATE_BINARY_NAME, kCompressStored)); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); int status_fd = 10; std::string package = "/path/to/update.zip"; TemporaryDir td; std::string binary_path = std::string(td.path) + "/update_binary"; std::vector cmd; ASSERT_EQ(0, update_binary_command(package, zip, binary_path, 0, status_fd, &cmd)); ASSERT_EQ(4U, cmd.size()); ASSERT_EQ(binary_path, cmd[0]); ASSERT_EQ("3", cmd[1]); // RECOVERY_API_VERSION ASSERT_EQ(std::to_string(status_fd), cmd[2]); ASSERT_EQ(package, cmd[3]); struct stat sb; ASSERT_EQ(0, stat(binary_path.c_str(), &sb)); ASSERT_EQ(static_cast(0755), sb.st_mode & (S_IRWXU | S_IRWXG | S_IRWXO)); // With non-zero retry count. update_binary will be removed automatically. cmd.clear(); ASSERT_EQ(0, update_binary_command(package, zip, binary_path, 2, status_fd, &cmd)); ASSERT_EQ(5U, cmd.size()); ASSERT_EQ(binary_path, cmd[0]); ASSERT_EQ("3", cmd[1]); // RECOVERY_API_VERSION ASSERT_EQ(std::to_string(status_fd), cmd[2]); ASSERT_EQ(package, cmd[3]); ASSERT_EQ("retry", cmd[4]); sb = {}; ASSERT_EQ(0, stat(binary_path.c_str(), &sb)); ASSERT_EQ(static_cast(0755), sb.st_mode & (S_IRWXU | S_IRWXG | S_IRWXO)); CloseArchive(zip); #endif // AB_OTA_UPDATER } TEST(InstallTest, update_binary_command_invalid) { #ifdef AB_OTA_UPDATER TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); // Missing payload_properties.txt. ASSERT_EQ(0, writer.StartEntry("payload.bin", kCompressStored)); ASSERT_EQ(0, writer.FinishEntry()); // A metadata entry is mandatory. ASSERT_EQ(0, writer.StartEntry("META-INF/com/android/metadata", kCompressStored)); std::string device = android::base::GetProperty("ro.product.device", ""); ASSERT_NE("", device); std::string timestamp = android::base::GetProperty("ro.build.date.utc", ""); ASSERT_NE("", timestamp); std::string metadata = android::base::Join( std::vector{ "ota-type=AB", "pre-device=" + device, "post-timestamp=" + timestamp, }, "\n"); ASSERT_EQ(0, writer.WriteBytes(metadata.data(), metadata.size())); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); int status_fd = 10; std::string package = "/path/to/update.zip"; std::string binary_path = "/sbin/update_engine_sideload"; std::vector cmd; ASSERT_EQ(INSTALL_CORRUPT, update_binary_command(package, zip, binary_path, 0, status_fd, &cmd)); CloseArchive(zip); #else TemporaryFile temp_file; FILE* zip_file = fdopen(temp_file.release(), "w"); ZipWriter writer(zip_file); // The archive must have something to be opened correctly. ASSERT_EQ(0, writer.StartEntry("dummy_entry", 0)); ASSERT_EQ(0, writer.FinishEntry()); ASSERT_EQ(0, writer.Finish()); ASSERT_EQ(0, fclose(zip_file)); // Missing update binary. ZipArchiveHandle zip; ASSERT_EQ(0, OpenArchive(temp_file.path, &zip)); int status_fd = 10; std::string package = "/path/to/update.zip"; TemporaryDir td; std::string binary_path = std::string(td.path) + "/update_binary"; std::vector cmd; ASSERT_EQ(INSTALL_CORRUPT, update_binary_command(package, zip, binary_path, 0, status_fd, &cmd)); CloseArchive(zip); #endif // AB_OTA_UPDATER } #ifdef AB_OTA_UPDATER TEST(InstallTest, update_binary_command_multiple_serialno) { std::string serialno = android::base::GetProperty("ro.serialno", ""); ASSERT_NE("", serialno); // Single matching serialno will pass the verification. VerifyAbUpdateBinaryCommand(serialno); static constexpr char alphabet[] = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"; auto generator = []() { return alphabet[rand() % (sizeof(alphabet) - 1)]; }; // Generate 900 random serial numbers. std::string random_serial; for (size_t i = 0; i < 900; i++) { generate_n(back_inserter(random_serial), serialno.size(), generator); random_serial.append("|"); } // Random serialnos should fail the verification. VerifyAbUpdateBinaryCommand(random_serial, false); std::string long_serial = random_serial + serialno + "|"; for (size_t i = 0; i < 99; i++) { generate_n(back_inserter(long_serial), serialno.size(), generator); long_serial.append("|"); } // String with the matching serialno should pass the verification. VerifyAbUpdateBinaryCommand(long_serial); } #endif // AB_OTA_UPDATER