You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
144 lines
5.4 KiB
144 lines
5.4 KiB
/*
|
|
* Copyright (C) 2019 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "linkerconfig/namespace.h"
|
|
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
#include <android-base/strings.h>
|
|
#include <gtest/gtest.h>
|
|
|
|
#include "linkerconfig/configwriter.h"
|
|
#include "linkerconfig/link.h"
|
|
#include "modules_testbase.h"
|
|
|
|
using namespace android::linkerconfig::modules;
|
|
using namespace android::base;
|
|
|
|
constexpr const char* kExpectedSimpleNamespaceConfig =
|
|
R"(namespace.test_namespace.isolated = false
|
|
namespace.test_namespace.search.paths = /search_path1
|
|
namespace.test_namespace.search.paths += /apex/search_path2
|
|
namespace.test_namespace.permitted.paths = /permitted_path1
|
|
namespace.test_namespace.permitted.paths += /apex/permitted_path2
|
|
namespace.test_namespace.asan.search.paths = /data/asan/search_path1
|
|
namespace.test_namespace.asan.search.paths += /search_path1
|
|
namespace.test_namespace.asan.search.paths += /apex/search_path2
|
|
namespace.test_namespace.asan.permitted.paths = /data/asan/permitted_path1
|
|
namespace.test_namespace.asan.permitted.paths += /permitted_path1
|
|
namespace.test_namespace.asan.permitted.paths += /apex/permitted_path2
|
|
)";
|
|
|
|
constexpr const char* kExpectedNamespaceWithLinkConfig =
|
|
R"(namespace.test_namespace.isolated = true
|
|
namespace.test_namespace.visible = true
|
|
namespace.test_namespace.search.paths = /search_path1
|
|
namespace.test_namespace.search.paths += /apex/search_path2
|
|
namespace.test_namespace.permitted.paths = /permitted_path1
|
|
namespace.test_namespace.permitted.paths += /apex/permitted_path2
|
|
namespace.test_namespace.asan.search.paths = /data/asan/search_path1
|
|
namespace.test_namespace.asan.search.paths += /search_path1
|
|
namespace.test_namespace.asan.search.paths += /apex/search_path2
|
|
namespace.test_namespace.asan.permitted.paths = /data/asan/permitted_path1
|
|
namespace.test_namespace.asan.permitted.paths += /permitted_path1
|
|
namespace.test_namespace.asan.permitted.paths += /apex/permitted_path2
|
|
namespace.test_namespace.links = target_namespace1,target_namespace2
|
|
namespace.test_namespace.link.target_namespace1.shared_libs = lib1.so
|
|
namespace.test_namespace.link.target_namespace1.shared_libs += lib2.so
|
|
namespace.test_namespace.link.target_namespace1.shared_libs += lib3.so
|
|
namespace.test_namespace.link.target_namespace2.allow_all_shared_libs = true
|
|
)";
|
|
|
|
constexpr const char* kExpectedNamespaceWithAllowedLibs =
|
|
R"(namespace.test_namespace.isolated = false
|
|
namespace.test_namespace.search.paths = /search_path1
|
|
namespace.test_namespace.search.paths += /apex/search_path2
|
|
namespace.test_namespace.permitted.paths = /permitted_path1
|
|
namespace.test_namespace.permitted.paths += /apex/permitted_path2
|
|
namespace.test_namespace.asan.search.paths = /data/asan/search_path1
|
|
namespace.test_namespace.asan.search.paths += /search_path1
|
|
namespace.test_namespace.asan.search.paths += /apex/search_path2
|
|
namespace.test_namespace.asan.permitted.paths = /data/asan/permitted_path1
|
|
namespace.test_namespace.asan.permitted.paths += /permitted_path1
|
|
namespace.test_namespace.asan.permitted.paths += /apex/permitted_path2
|
|
namespace.test_namespace.allowed_libs = allowed_libs_path1
|
|
namespace.test_namespace.allowed_libs += allowed_libs_path2
|
|
)";
|
|
|
|
TEST(linkerconfig_namespace, simple_namespace) {
|
|
ConfigWriter writer;
|
|
auto ns = CreateNamespaceWithPaths("test_namespace", false, false);
|
|
ns.WriteConfig(writer);
|
|
auto config = writer.ToString();
|
|
|
|
ASSERT_EQ(config, kExpectedSimpleNamespaceConfig);
|
|
}
|
|
|
|
TEST(linkerconfig_namespace, namespace_with_links) {
|
|
ConfigWriter writer;
|
|
|
|
auto ns = CreateNamespaceWithLinks("test_namespace", true, true,
|
|
"target_namespace1", "target_namespace2");
|
|
ns.WriteConfig(writer);
|
|
auto config = writer.ToString();
|
|
|
|
ASSERT_EQ(config, kExpectedNamespaceWithLinkConfig);
|
|
}
|
|
|
|
TEST(linkerconfig_namespace, namespace_with_allowed_libs) {
|
|
ConfigWriter writer;
|
|
auto ns = CreateNamespaceWithPaths("test_namespace", false, false);
|
|
ns.AddAllowedLib("allowed_libs_path1");
|
|
ns.AddAllowedLib("allowed_libs_path2");
|
|
ns.WriteConfig(writer);
|
|
|
|
auto config = writer.ToString();
|
|
|
|
ASSERT_EQ(config, kExpectedNamespaceWithAllowedLibs);
|
|
}
|
|
|
|
TEST(linkerconfig_namespace, namespace_links_should_be_ordered) {
|
|
std::vector<std::string> expected_links = {"z", "a", "o"};
|
|
|
|
Namespace ns("test_namespace");
|
|
for (auto link : expected_links) {
|
|
ns.GetLink(link).AddSharedLib("lib");
|
|
}
|
|
|
|
ConfigWriter writer;
|
|
ns.WriteConfig(writer);
|
|
|
|
std::string actual_links;
|
|
for (auto line : Split(writer.ToString(), "\n")) {
|
|
if (StartsWith(line, "namespace.test_namespace.links")) {
|
|
actual_links = Split(line, " ").back();
|
|
}
|
|
}
|
|
ASSERT_EQ(android::base::Join(expected_links, ","), actual_links);
|
|
}
|
|
|
|
TEST(linkerconfig_namespace, apex_should_not_allow_all_links) {
|
|
Namespace ns("test_namespace");
|
|
ns.SetApexSource("com.android.test");
|
|
ns.GetLink("target_namespace").AllowAllSharedLibs();
|
|
|
|
ConfigWriter writer;
|
|
ns.WriteConfig(writer);
|
|
|
|
ASSERT_EQ("", writer.ToString());
|
|
}
|