You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
635 lines
27 KiB
635 lines
27 KiB
/*
|
|
* Copyright (C) 2018 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <android-base/file.h>
|
|
|
|
#include <cstdio> // fclose
|
|
#include <fstream>
|
|
#include <memory>
|
|
#include <sstream>
|
|
#include <string>
|
|
#include <utility>
|
|
#include <vector>
|
|
|
|
#include "R.h"
|
|
#include "TestConstants.h"
|
|
#include "TestHelpers.h"
|
|
#include "android-base/macros.h"
|
|
#include "androidfw/ApkAssets.h"
|
|
#include "androidfw/ResourceUtils.h"
|
|
#include "gmock/gmock.h"
|
|
#include "gtest/gtest.h"
|
|
#include "idmap2/BinaryStreamVisitor.h"
|
|
#include "idmap2/CommandLineOptions.h"
|
|
#include "idmap2/Idmap.h"
|
|
#include "idmap2/LogInfo.h"
|
|
|
|
using android::Res_value;
|
|
using ::testing::NotNull;
|
|
|
|
using PolicyFlags = android::ResTable_overlayable_policy_header::PolicyFlags;
|
|
|
|
namespace android::idmap2 {
|
|
|
|
#define ASSERT_TARGET_ENTRY(entry, target_resid, overlay_resid) \
|
|
ASSERT_EQ((entry).target_id, (target_resid)); \
|
|
ASSERT_EQ((entry).overlay_id, (overlay_resid))
|
|
|
|
#define ASSERT_TARGET_INLINE_ENTRY(entry, target_resid, expected_type, expected_value) \
|
|
ASSERT_EQ((entry).target_id, target_resid); \
|
|
ASSERT_EQ((entry).value.data_type, (expected_type)); \
|
|
ASSERT_EQ((entry).value.data_value, (expected_value))
|
|
|
|
#define ASSERT_OVERLAY_ENTRY(entry, overlay_resid, target_resid) \
|
|
ASSERT_EQ((entry).overlay_id, (overlay_resid)); \
|
|
ASSERT_EQ((entry).target_id, (target_resid))
|
|
|
|
TEST(IdmapTests, TestCanonicalIdmapPathFor) {
|
|
ASSERT_EQ(Idmap::CanonicalIdmapPathFor("/foo", "/vendor/overlay/bar.apk"),
|
|
"/foo/vendor@overlay@bar.apk@idmap");
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapHeaderFromBinaryStream) {
|
|
std::string raw(reinterpret_cast<const char*>(kIdmapRawData), kIdmapRawDataLen);
|
|
std::istringstream stream(raw);
|
|
std::unique_ptr<const IdmapHeader> header = IdmapHeader::FromBinaryStream(stream);
|
|
ASSERT_THAT(header, NotNull());
|
|
ASSERT_EQ(header->GetMagic(), 0x504d4449U);
|
|
ASSERT_EQ(header->GetVersion(), 0x08U);
|
|
ASSERT_EQ(header->GetTargetCrc(), 0x1234U);
|
|
ASSERT_EQ(header->GetOverlayCrc(), 0x5678U);
|
|
ASSERT_EQ(header->GetFulfilledPolicies(), 0x11);
|
|
ASSERT_EQ(header->GetEnforceOverlayable(), true);
|
|
ASSERT_EQ(header->GetTargetPath(), "targetX.apk");
|
|
ASSERT_EQ(header->GetOverlayPath(), "overlayX.apk");
|
|
ASSERT_EQ(header->GetDebugInfo(), "debug");
|
|
}
|
|
|
|
TEST(IdmapTests, IdmapFailParsingDifferentVersion) {
|
|
constexpr size_t kJunkSize = 2000;
|
|
std::stringstream stream;
|
|
stream << android::kIdmapMagic;
|
|
stream << 0xffffffffU;
|
|
stream << std::string(kJunkSize, static_cast<char>(0xffU));
|
|
ASSERT_FALSE(Idmap::FromBinaryStream(stream));
|
|
}
|
|
|
|
TEST(IdmapTests, IdmapFailParsingDifferentMagic) {
|
|
constexpr size_t kJunkSize = 2000;
|
|
std::stringstream stream;
|
|
stream << 0xffffffffU;
|
|
stream << android::kIdmapCurrentVersion;
|
|
stream << std::string(kJunkSize, static_cast<char>(0xffU));
|
|
ASSERT_FALSE(Idmap::FromBinaryStream(stream));
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapDataHeaderFromBinaryStream) {
|
|
const size_t offset = kIdmapRawDataOffset;
|
|
std::string raw(reinterpret_cast<const char*>(kIdmapRawData + offset), kIdmapRawDataLen - offset);
|
|
std::istringstream stream(raw);
|
|
|
|
std::unique_ptr<const IdmapData::Header> header = IdmapData::Header::FromBinaryStream(stream);
|
|
ASSERT_THAT(header, NotNull());
|
|
ASSERT_EQ(header->GetTargetEntryCount(), 0x03);
|
|
ASSERT_EQ(header->GetOverlayEntryCount(), 0x03);
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapDataFromBinaryStream) {
|
|
const size_t offset = kIdmapRawDataOffset;
|
|
std::string raw(reinterpret_cast<const char*>(kIdmapRawData + offset), kIdmapRawDataLen - offset);
|
|
std::istringstream stream(raw);
|
|
|
|
std::unique_ptr<const IdmapData> data = IdmapData::FromBinaryStream(stream);
|
|
ASSERT_THAT(data, NotNull());
|
|
|
|
const auto& target_entries = data->GetTargetEntries();
|
|
ASSERT_EQ(target_entries.size(), 3U);
|
|
ASSERT_TARGET_ENTRY(target_entries[0], 0x7f020000, 0x7f020000);
|
|
ASSERT_TARGET_ENTRY(target_entries[1], 0x7f030000, 0x7f030000);
|
|
ASSERT_TARGET_ENTRY(target_entries[2], 0x7f030002, 0x7f030001);
|
|
|
|
const auto& target_inline_entries = data->GetTargetInlineEntries();
|
|
ASSERT_EQ(target_inline_entries.size(), 1U);
|
|
ASSERT_TARGET_INLINE_ENTRY(target_inline_entries[0], 0x7f040000, Res_value::TYPE_INT_HEX,
|
|
0x12345678);
|
|
|
|
const auto& overlay_entries = data->GetOverlayEntries();
|
|
ASSERT_EQ(target_entries.size(), 3U);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[0], 0x7f020000, 0x7f020000);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[1], 0x7f030000, 0x7f030000);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[2], 0x7f030001, 0x7f030002);
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapFromBinaryStream) {
|
|
std::string raw(reinterpret_cast<const char*>(kIdmapRawData), kIdmapRawDataLen);
|
|
std::istringstream stream(raw);
|
|
|
|
auto result = Idmap::FromBinaryStream(stream);
|
|
ASSERT_TRUE(result);
|
|
const auto idmap = std::move(*result);
|
|
|
|
ASSERT_THAT(idmap->GetHeader(), NotNull());
|
|
ASSERT_EQ(idmap->GetHeader()->GetMagic(), 0x504d4449U);
|
|
ASSERT_EQ(idmap->GetHeader()->GetVersion(), 0x08U);
|
|
ASSERT_EQ(idmap->GetHeader()->GetTargetCrc(), 0x1234U);
|
|
ASSERT_EQ(idmap->GetHeader()->GetOverlayCrc(), 0x5678U);
|
|
ASSERT_EQ(idmap->GetHeader()->GetFulfilledPolicies(), kIdmapRawDataPolicies);
|
|
ASSERT_EQ(idmap->GetHeader()->GetEnforceOverlayable(), true);
|
|
ASSERT_EQ(idmap->GetHeader()->GetTargetPath(), kIdmapRawTargetPath);
|
|
ASSERT_EQ(idmap->GetHeader()->GetOverlayPath(), kIdmapRawOverlayPath);
|
|
ASSERT_EQ(idmap->GetHeader()->GetOverlayName(), kIdmapRawOverlayName);
|
|
|
|
const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData();
|
|
ASSERT_EQ(dataBlocks.size(), 1U);
|
|
|
|
const std::unique_ptr<const IdmapData>& data = dataBlocks[0];
|
|
ASSERT_THAT(data, NotNull());
|
|
|
|
const auto& target_entries = data->GetTargetEntries();
|
|
ASSERT_EQ(target_entries.size(), 3U);
|
|
ASSERT_TARGET_ENTRY(target_entries[0], 0x7f020000, 0x7f020000);
|
|
ASSERT_TARGET_ENTRY(target_entries[1], 0x7f030000, 0x7f030000);
|
|
ASSERT_TARGET_ENTRY(target_entries[2], 0x7f030002, 0x7f030001);
|
|
|
|
const auto& target_inline_entries = data->GetTargetInlineEntries();
|
|
ASSERT_EQ(target_inline_entries.size(), 1U);
|
|
ASSERT_TARGET_INLINE_ENTRY(target_inline_entries[0], 0x7f040000, Res_value::TYPE_INT_HEX,
|
|
0x12345678);
|
|
|
|
const auto& overlay_entries = data->GetOverlayEntries();
|
|
ASSERT_EQ(target_entries.size(), 3U);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[0], 0x7f020000, 0x7f020000);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[1], 0x7f030000, 0x7f030000);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[2], 0x7f030001, 0x7f030002);
|
|
}
|
|
|
|
TEST(IdmapTests, GracefullyFailToCreateIdmapFromCorruptBinaryStream) {
|
|
std::string raw(reinterpret_cast<const char*>(kIdmapRawData),
|
|
10); // data too small
|
|
std::istringstream stream(raw);
|
|
|
|
const auto result = Idmap::FromBinaryStream(stream);
|
|
ASSERT_FALSE(result);
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapHeaderFromApkAssets) {
|
|
std::string target_apk_path = GetTestDataPath() + "/target/target.apk";
|
|
std::string overlay_apk_path = GetTestDataPath() + "/overlay/overlay.apk";
|
|
|
|
auto target = TargetResourceContainer::FromPath(target_apk_path);
|
|
ASSERT_TRUE(target);
|
|
|
|
auto overlay = OverlayResourceContainer::FromPath(overlay_apk_path);
|
|
ASSERT_TRUE(overlay);
|
|
|
|
auto idmap_result = Idmap::FromContainers(
|
|
**target, **overlay, TestConstants::OVERLAY_NAME_ALL_POLICIES, PolicyFlags::PUBLIC,
|
|
/* enforce_overlayable */ true);
|
|
ASSERT_TRUE(idmap_result) << idmap_result.GetErrorMessage();
|
|
auto& idmap = *idmap_result;
|
|
ASSERT_THAT(idmap, NotNull());
|
|
|
|
ASSERT_THAT(idmap->GetHeader(), NotNull());
|
|
ASSERT_EQ(idmap->GetHeader()->GetMagic(), 0x504d4449U);
|
|
ASSERT_EQ(idmap->GetHeader()->GetVersion(), 0x08U);
|
|
ASSERT_EQ(idmap->GetHeader()->GetTargetCrc(), android::idmap2::TestConstants::TARGET_CRC);
|
|
ASSERT_EQ(idmap->GetHeader()->GetOverlayCrc(), android::idmap2::TestConstants::OVERLAY_CRC);
|
|
ASSERT_EQ(idmap->GetHeader()->GetFulfilledPolicies(), PolicyFlags::PUBLIC);
|
|
ASSERT_EQ(idmap->GetHeader()->GetEnforceOverlayable(), true);
|
|
ASSERT_EQ(idmap->GetHeader()->GetTargetPath(), target_apk_path);
|
|
ASSERT_EQ(idmap->GetHeader()->GetOverlayPath(), overlay_apk_path);
|
|
ASSERT_EQ(idmap->GetHeader()->GetOverlayName(), TestConstants::OVERLAY_NAME_ALL_POLICIES);
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapDataFromApkAssets) {
|
|
std::string target_apk_path = GetTestDataPath() + "/target/target.apk";
|
|
std::string overlay_apk_path = GetTestDataPath() + "/overlay/overlay.apk";
|
|
|
|
auto target = TargetResourceContainer::FromPath(target_apk_path);
|
|
ASSERT_TRUE(target);
|
|
|
|
auto overlay = OverlayResourceContainer::FromPath(overlay_apk_path);
|
|
ASSERT_TRUE(overlay);
|
|
|
|
auto idmap_result = Idmap::FromContainers(
|
|
**target, **overlay, TestConstants::OVERLAY_NAME_DEFAULT, PolicyFlags::PUBLIC,
|
|
/* enforce_overlayable */ true);
|
|
ASSERT_TRUE(idmap_result) << idmap_result.GetErrorMessage();
|
|
auto& idmap = *idmap_result;
|
|
ASSERT_THAT(idmap, NotNull());
|
|
|
|
const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData();
|
|
ASSERT_EQ(dataBlocks.size(), 1U);
|
|
|
|
const std::unique_ptr<const IdmapData>& data = dataBlocks[0];
|
|
ASSERT_THAT(data, NotNull());
|
|
|
|
const auto& target_entries = data->GetTargetEntries();
|
|
ASSERT_EQ(target_entries.size(), 4U);
|
|
ASSERT_TARGET_ENTRY(target_entries[0], R::target::integer::int1, R::overlay::integer::int1);
|
|
ASSERT_TARGET_ENTRY(target_entries[1], R::target::string::str1, R::overlay::string::str1);
|
|
ASSERT_TARGET_ENTRY(target_entries[2], R::target::string::str3, R::overlay::string::str3);
|
|
ASSERT_TARGET_ENTRY(target_entries[3], R::target::string::str4, R::overlay::string::str4);
|
|
|
|
const auto& target_inline_entries = data->GetTargetInlineEntries();
|
|
ASSERT_EQ(target_inline_entries.size(), 0U);
|
|
|
|
const auto& overlay_entries = data->GetOverlayEntries();
|
|
ASSERT_EQ(target_entries.size(), 4U);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[0], R::overlay::integer::int1, R::target::integer::int1);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[1], R::overlay::string::str1, R::target::string::str1);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[2], R::overlay::string::str3, R::target::string::str3);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[3], R::overlay::string::str4, R::target::string::str4);
|
|
}
|
|
|
|
TEST(IdmapTests, FabricatedOverlay) {
|
|
std::string target_apk_path = GetTestDataPath() + "/target/target.apk";
|
|
auto target = TargetResourceContainer::FromPath(target_apk_path);
|
|
ASSERT_TRUE(target);
|
|
|
|
auto frro = FabricatedOverlay::Builder("com.example.overlay", "SandTheme", "test.target")
|
|
.SetOverlayable("TestResources")
|
|
.SetResourceValue("integer/int1", Res_value::TYPE_INT_DEC, 2U)
|
|
.SetResourceValue("string/str1", Res_value::TYPE_REFERENCE, 0x7f010000)
|
|
.Build();
|
|
|
|
ASSERT_TRUE(frro);
|
|
TemporaryFile tf;
|
|
std::ofstream out(tf.path);
|
|
ASSERT_TRUE((*frro).ToBinaryStream(out));
|
|
out.close();
|
|
|
|
auto overlay = OverlayResourceContainer::FromPath(tf.path);
|
|
ASSERT_TRUE(overlay);
|
|
|
|
auto idmap_result = Idmap::FromContainers(**target, **overlay, "SandTheme", PolicyFlags::PUBLIC,
|
|
/* enforce_overlayable */ true);
|
|
ASSERT_TRUE(idmap_result) << idmap_result.GetErrorMessage();
|
|
auto& idmap = *idmap_result;
|
|
ASSERT_THAT(idmap, NotNull());
|
|
|
|
const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData();
|
|
ASSERT_EQ(dataBlocks.size(), 1U);
|
|
|
|
const std::unique_ptr<const IdmapData>& data = dataBlocks[0];
|
|
ASSERT_THAT(data, NotNull());
|
|
ASSERT_EQ(data->GetTargetEntries().size(), 0U);
|
|
ASSERT_EQ(data->GetOverlayEntries().size(), 0U);
|
|
|
|
const auto& target_inline_entries = data->GetTargetInlineEntries();
|
|
ASSERT_EQ(target_inline_entries.size(), 2U);
|
|
ASSERT_TARGET_INLINE_ENTRY(target_inline_entries[0], R::target::integer::int1,
|
|
Res_value::TYPE_INT_DEC, 2U);
|
|
ASSERT_TARGET_INLINE_ENTRY(target_inline_entries[1], R::target::string::str1,
|
|
Res_value::TYPE_REFERENCE, 0x7f010000);
|
|
}
|
|
|
|
TEST(IdmapTests, FailCreateIdmapInvalidName) {
|
|
std::string target_apk_path = GetTestDataPath() + "/target/target.apk";
|
|
std::string overlay_apk_path = GetTestDataPath() + "/overlay/overlay.apk";
|
|
|
|
auto target = TargetResourceContainer::FromPath(target_apk_path);
|
|
ASSERT_TRUE(target);
|
|
|
|
auto overlay = OverlayResourceContainer::FromPath(overlay_apk_path);
|
|
ASSERT_TRUE(overlay);
|
|
|
|
{
|
|
auto idmap_result = Idmap::FromContainers(**target, **overlay, "", PolicyFlags::PUBLIC,
|
|
/* enforce_overlayable */ true);
|
|
ASSERT_FALSE(idmap_result);
|
|
}
|
|
{
|
|
auto idmap_result = Idmap::FromContainers(**target, **overlay, "unknown", PolicyFlags::PUBLIC,
|
|
/* enforce_overlayable */ true);
|
|
ASSERT_FALSE(idmap_result);
|
|
}
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapDataFromApkAssetsSharedLibOverlay) {
|
|
std::string target_apk_path = GetTestDataPath() + "/target/target.apk";
|
|
std::string overlay_apk_path = GetTestDataPath() + "/overlay/overlay-shared.apk";
|
|
|
|
auto target = TargetResourceContainer::FromPath(target_apk_path);
|
|
ASSERT_TRUE(target);
|
|
|
|
auto overlay = OverlayResourceContainer::FromPath(overlay_apk_path);
|
|
ASSERT_TRUE(overlay);
|
|
|
|
auto idmap_result = Idmap::FromContainers(
|
|
**target, **overlay, TestConstants::OVERLAY_NAME_DEFAULT, PolicyFlags::PUBLIC,
|
|
/* enforce_overlayable */ true);
|
|
ASSERT_TRUE(idmap_result) << idmap_result.GetErrorMessage();
|
|
auto& idmap = *idmap_result;
|
|
ASSERT_THAT(idmap, NotNull());
|
|
|
|
const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData();
|
|
ASSERT_EQ(dataBlocks.size(), 1U);
|
|
|
|
const std::unique_ptr<const IdmapData>& data = dataBlocks[0];
|
|
ASSERT_THAT(data, NotNull());
|
|
|
|
const auto& target_entries = data->GetTargetEntries();
|
|
ASSERT_EQ(target_entries.size(), 4U);
|
|
ASSERT_TARGET_ENTRY(target_entries[0], R::target::integer::int1,
|
|
fix_package_id(R::overlay::integer::int1, 0));
|
|
ASSERT_TARGET_ENTRY(target_entries[1], R::target::string::str1,
|
|
fix_package_id(R::overlay::string::str1, 0));
|
|
ASSERT_TARGET_ENTRY(target_entries[2], R::target::string::str3,
|
|
fix_package_id(R::overlay::string::str3, 0));
|
|
ASSERT_TARGET_ENTRY(target_entries[3], R::target::string::str4,
|
|
fix_package_id(R::overlay::string::str4, 0));
|
|
|
|
const auto& target_inline_entries = data->GetTargetInlineEntries();
|
|
ASSERT_EQ(target_inline_entries.size(), 0U);
|
|
|
|
const auto& overlay_entries = data->GetOverlayEntries();
|
|
ASSERT_EQ(target_entries.size(), 4U);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[0], fix_package_id(R::overlay::integer::int1, 0),
|
|
R::target::integer::int1);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[1], fix_package_id(R::overlay::string::str1, 0),
|
|
R::target::string::str1);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[2], fix_package_id(R::overlay::string::str3, 0),
|
|
R::target::string::str3);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[3], fix_package_id(R::overlay::string::str4, 0),
|
|
R::target::string::str4);
|
|
}
|
|
|
|
Result<std::unique_ptr<const IdmapData>> TestIdmapDataFromApkAssets(
|
|
const std::string& local_target_path, const std::string& local_overlay_path,
|
|
const std::string& overlay_name, const PolicyBitmask& fulfilled_policies,
|
|
bool enforce_overlayable) {
|
|
const std::string target_path(GetTestDataPath() + local_target_path);
|
|
auto target = TargetResourceContainer::FromPath(target_path);
|
|
if (!target) {
|
|
return Error(R"(Failed to load target "%s")", target_path.c_str());
|
|
}
|
|
|
|
const std::string overlay_path(GetTestDataPath() + local_overlay_path);
|
|
auto overlay = OverlayResourceContainer::FromPath(overlay_path);
|
|
if (!overlay) {
|
|
return Error(R"(Failed to load overlay "%s")", overlay_path.c_str());
|
|
}
|
|
|
|
auto overlay_info = (*overlay)->FindOverlayInfo(overlay_name);
|
|
if (!overlay_info) {
|
|
return Error(R"(Failed to find overlay name "%s")", overlay_name.c_str());
|
|
}
|
|
|
|
LogInfo log_info;
|
|
auto mapping = ResourceMapping::FromContainers(**target, **overlay, *overlay_info,
|
|
fulfilled_policies, enforce_overlayable, log_info);
|
|
if (!mapping) {
|
|
return mapping.GetError();
|
|
}
|
|
|
|
return IdmapData::FromResourceMapping(*mapping);
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapDataDoNotRewriteNonOverlayResourceId) {
|
|
auto idmap_data = TestIdmapDataFromApkAssets("/target/target.apk", "/overlay/overlay.apk",
|
|
"DifferentPackages", PolicyFlags::PUBLIC,
|
|
/* enforce_overlayable */ false);
|
|
|
|
ASSERT_TRUE(idmap_data) << idmap_data.GetErrorMessage();
|
|
auto& data = *idmap_data;
|
|
|
|
const auto& target_entries = data->GetTargetEntries();
|
|
ASSERT_EQ(target_entries.size(), 2U);
|
|
ASSERT_TARGET_ENTRY(target_entries[0], R::target::string::str1,
|
|
0x0104000a); // -> android:string/ok
|
|
ASSERT_TARGET_ENTRY(target_entries[1], R::target::string::str3, R::overlay::string::str3);
|
|
|
|
const auto& target_inline_entries = data->GetTargetInlineEntries();
|
|
ASSERT_EQ(target_inline_entries.size(), 0U);
|
|
|
|
const auto& overlay_entries = data->GetOverlayEntries();
|
|
ASSERT_EQ(overlay_entries.size(), 1U);
|
|
ASSERT_OVERLAY_ENTRY(overlay_entries[0], R::overlay::string::str3, R::target::string::str3);
|
|
}
|
|
|
|
TEST(IdmapTests, CreateIdmapDataInlineResources) {
|
|
auto idmap_data = TestIdmapDataFromApkAssets("/target/target.apk", "/overlay/overlay.apk",
|
|
"Inline", PolicyFlags::PUBLIC,
|
|
/* enforce_overlayable */ false);
|
|
|
|
ASSERT_TRUE(idmap_data) << idmap_data.GetErrorMessage();
|
|
auto& data = *idmap_data;
|
|
|
|
const auto& target_entries = data->GetTargetEntries();
|
|
ASSERT_EQ(target_entries.size(), 0U);
|
|
|
|
constexpr size_t overlay_string_pool_size = 10U;
|
|
const auto& target_inline_entries = data->GetTargetInlineEntries();
|
|
ASSERT_EQ(target_inline_entries.size(), 2U);
|
|
ASSERT_TARGET_INLINE_ENTRY(target_inline_entries[0], R::target::integer::int1,
|
|
Res_value::TYPE_INT_DEC, 73U); // -> 73
|
|
ASSERT_TARGET_INLINE_ENTRY(target_inline_entries[1], R::target::string::str1,
|
|
Res_value::TYPE_STRING,
|
|
overlay_string_pool_size + 0U); // -> "Hello World"
|
|
|
|
const auto& overlay_entries = data->GetOverlayEntries();
|
|
ASSERT_EQ(overlay_entries.size(), 0U);
|
|
}
|
|
|
|
TEST(IdmapTests, IdmapHeaderIsUpToDate) {
|
|
fclose(stderr); // silence expected warnings from libandroidfw
|
|
|
|
const std::string target_apk_path = kIdmapRawTargetPath;
|
|
const std::string overlay_apk_path = kIdmapRawOverlayPath;
|
|
const std::string overlay_name = kIdmapRawOverlayName;
|
|
const PolicyBitmask policies = kIdmapRawDataPolicies;
|
|
const uint32_t target_crc = kIdmapRawDataTargetCrc;
|
|
const uint32_t overlay_crc = kIdmapRawOverlayCrc;
|
|
|
|
std::string raw(reinterpret_cast<const char*>(kIdmapRawData), kIdmapRawDataLen);
|
|
std::istringstream raw_stream(raw);
|
|
|
|
auto result = Idmap::FromBinaryStream(raw_stream);
|
|
ASSERT_TRUE(result);
|
|
const auto idmap = std::move(*result);
|
|
|
|
std::stringstream stream;
|
|
BinaryStreamVisitor visitor(stream);
|
|
idmap->accept(&visitor);
|
|
|
|
std::unique_ptr<const IdmapHeader> header = IdmapHeader::FromBinaryStream(stream);
|
|
ASSERT_THAT(header, NotNull());
|
|
ASSERT_TRUE(header->IsUpToDate(target_apk_path, overlay_apk_path, overlay_name,
|
|
kIdmapRawDataTargetCrc, overlay_crc, policies,
|
|
/* enforce_overlayable */ true));
|
|
|
|
// magic: bytes (0x0, 0x03)
|
|
std::string bad_magic_string(stream.str());
|
|
bad_magic_string[0x0] = '.';
|
|
bad_magic_string[0x1] = '.';
|
|
bad_magic_string[0x2] = '.';
|
|
bad_magic_string[0x3] = '.';
|
|
std::stringstream bad_magic_stream(bad_magic_string);
|
|
std::unique_ptr<const IdmapHeader> bad_magic_header =
|
|
IdmapHeader::FromBinaryStream(bad_magic_stream);
|
|
ASSERT_EQ(nullptr, bad_magic_header);
|
|
|
|
// version: bytes (0x4, 0x07)
|
|
std::string bad_version_string(stream.str());
|
|
bad_version_string[0x4] = '.';
|
|
bad_version_string[0x5] = '.';
|
|
bad_version_string[0x6] = '.';
|
|
bad_version_string[0x7] = '.';
|
|
std::stringstream bad_version_stream(bad_version_string);
|
|
std::unique_ptr<const IdmapHeader> bad_version_header =
|
|
IdmapHeader::FromBinaryStream(bad_version_stream);
|
|
ASSERT_EQ(nullptr, bad_version_header);
|
|
|
|
// target crc: bytes (0x8, 0xb)
|
|
std::string bad_target_crc_string(stream.str());
|
|
bad_target_crc_string[0x8] = '.';
|
|
bad_target_crc_string[0x9] = '.';
|
|
bad_target_crc_string[0xa] = '.';
|
|
bad_target_crc_string[0xb] = '.';
|
|
std::stringstream bad_target_crc_stream(bad_target_crc_string);
|
|
std::unique_ptr<const IdmapHeader> bad_target_crc_header =
|
|
IdmapHeader::FromBinaryStream(bad_target_crc_stream);
|
|
ASSERT_THAT(bad_target_crc_header, NotNull());
|
|
ASSERT_NE(header->GetTargetCrc(), bad_target_crc_header->GetTargetCrc());
|
|
ASSERT_FALSE(bad_target_crc_header->IsUpToDate(target_apk_path, overlay_apk_path, overlay_name,
|
|
target_crc, overlay_crc, policies,
|
|
/* enforce_overlayable */ true));
|
|
|
|
// overlay crc: bytes (0xc, 0xf)
|
|
std::string bad_overlay_crc_string(stream.str());
|
|
bad_overlay_crc_string[0xc] = '.';
|
|
bad_overlay_crc_string[0xd] = '.';
|
|
bad_overlay_crc_string[0xe] = '.';
|
|
bad_overlay_crc_string[0xf] = '.';
|
|
std::stringstream bad_overlay_crc_stream(bad_overlay_crc_string);
|
|
std::unique_ptr<const IdmapHeader> bad_overlay_crc_header =
|
|
IdmapHeader::FromBinaryStream(bad_overlay_crc_stream);
|
|
ASSERT_THAT(bad_overlay_crc_header, NotNull());
|
|
ASSERT_NE(header->GetOverlayCrc(), bad_overlay_crc_header->GetOverlayCrc());
|
|
ASSERT_FALSE(bad_overlay_crc_header->IsUpToDate(target_apk_path, overlay_apk_path, overlay_name,
|
|
target_crc, overlay_crc, policies,
|
|
/* enforce_overlayable */ true));
|
|
|
|
// fulfilled policy: bytes (0x10, 0x13)
|
|
std::string bad_policy_string(stream.str());
|
|
bad_policy_string[0x10] = '.';
|
|
bad_policy_string[0x11] = '.';
|
|
bad_policy_string[0x12] = '.';
|
|
bad_policy_string[0x13] = '.';
|
|
std::stringstream bad_policy_stream(bad_policy_string);
|
|
std::unique_ptr<const IdmapHeader> bad_policy_header =
|
|
IdmapHeader::FromBinaryStream(bad_policy_stream);
|
|
ASSERT_THAT(bad_policy_header, NotNull());
|
|
ASSERT_NE(header->GetFulfilledPolicies(), bad_policy_header->GetFulfilledPolicies());
|
|
ASSERT_FALSE(bad_policy_header->IsUpToDate(target_apk_path, overlay_apk_path, overlay_name,
|
|
target_crc, overlay_crc, policies,
|
|
/* enforce_overlayable */ true));
|
|
|
|
// enforce overlayable: bytes (0x14)
|
|
std::string bad_enforce_string(stream.str());
|
|
bad_enforce_string[0x14] = '\0';
|
|
std::stringstream bad_enforce_stream(bad_enforce_string);
|
|
std::unique_ptr<const IdmapHeader> bad_enforce_header =
|
|
IdmapHeader::FromBinaryStream(bad_enforce_stream);
|
|
ASSERT_THAT(bad_enforce_header, NotNull());
|
|
ASSERT_NE(header->GetEnforceOverlayable(), bad_enforce_header->GetEnforceOverlayable());
|
|
ASSERT_FALSE(bad_enforce_header->IsUpToDate(target_apk_path, overlay_apk_path, overlay_name,
|
|
target_crc, overlay_crc, policies,
|
|
/* enforce_overlayable */ true));
|
|
|
|
// target path: bytes (0x1c, 0x27)
|
|
std::string bad_target_path_string(stream.str());
|
|
bad_target_path_string[0x1c] = '\0';
|
|
std::stringstream bad_target_path_stream(bad_target_path_string);
|
|
std::unique_ptr<const IdmapHeader> bad_target_path_header =
|
|
IdmapHeader::FromBinaryStream(bad_target_path_stream);
|
|
ASSERT_THAT(bad_target_path_header, NotNull());
|
|
ASSERT_NE(header->GetTargetPath(), bad_target_path_header->GetTargetPath());
|
|
ASSERT_FALSE(bad_target_path_header->IsUpToDate(target_apk_path, overlay_apk_path, overlay_name,
|
|
target_crc, overlay_crc, policies,
|
|
/* enforce_overlayable */ true));
|
|
|
|
// overlay path: bytes (0x2c, 0x37)
|
|
std::string bad_overlay_path_string(stream.str());
|
|
bad_overlay_path_string[0x33] = '\0';
|
|
std::stringstream bad_overlay_path_stream(bad_overlay_path_string);
|
|
std::unique_ptr<const IdmapHeader> bad_overlay_path_header =
|
|
IdmapHeader::FromBinaryStream(bad_overlay_path_stream);
|
|
ASSERT_THAT(bad_overlay_path_header, NotNull());
|
|
ASSERT_NE(header->GetOverlayPath(), bad_overlay_path_header->GetOverlayPath());
|
|
ASSERT_FALSE(bad_overlay_path_header->IsUpToDate(target_apk_path, overlay_apk_path, overlay_name,
|
|
target_crc, overlay_crc, policies,
|
|
/* enforce_overlayable */ true));
|
|
|
|
// overlay name: bytes (0x3c, 0x47)
|
|
std::string bad_overlay_name_string(stream.str());
|
|
bad_overlay_name_string[0x3c] = '\0';
|
|
std::stringstream bad_overlay_name_stream(bad_overlay_name_string);
|
|
std::unique_ptr<const IdmapHeader> bad_overlay_name_header =
|
|
IdmapHeader::FromBinaryStream(bad_overlay_name_stream);
|
|
ASSERT_THAT(bad_overlay_name_header, NotNull());
|
|
ASSERT_NE(header->GetOverlayName(), bad_overlay_name_header->GetOverlayName());
|
|
ASSERT_FALSE(bad_overlay_name_header->IsUpToDate(target_apk_path, overlay_apk_path, overlay_name,
|
|
target_crc, overlay_crc, policies,
|
|
/* enforce_overlayable */ true));
|
|
}
|
|
|
|
class TestVisitor : public Visitor {
|
|
public:
|
|
explicit TestVisitor(std::ostream& stream) : stream_(stream) {
|
|
}
|
|
|
|
void visit(const Idmap& idmap ATTRIBUTE_UNUSED) override {
|
|
stream_ << "TestVisitor::visit(Idmap)" << std::endl;
|
|
}
|
|
|
|
void visit(const IdmapHeader& idmap ATTRIBUTE_UNUSED) override {
|
|
stream_ << "TestVisitor::visit(IdmapHeader)" << std::endl;
|
|
}
|
|
|
|
void visit(const IdmapData& idmap ATTRIBUTE_UNUSED) override {
|
|
stream_ << "TestVisitor::visit(IdmapData)" << std::endl;
|
|
}
|
|
|
|
void visit(const IdmapData::Header& idmap ATTRIBUTE_UNUSED) override {
|
|
stream_ << "TestVisitor::visit(IdmapData::Header)" << std::endl;
|
|
}
|
|
|
|
private:
|
|
std::ostream& stream_;
|
|
};
|
|
|
|
TEST(IdmapTests, TestVisitor) {
|
|
std::string raw(reinterpret_cast<const char*>(kIdmapRawData), kIdmapRawDataLen);
|
|
std::istringstream stream(raw);
|
|
|
|
const auto idmap = Idmap::FromBinaryStream(stream);
|
|
ASSERT_TRUE(idmap);
|
|
|
|
std::stringstream test_stream;
|
|
TestVisitor visitor(test_stream);
|
|
(*idmap)->accept(&visitor);
|
|
|
|
ASSERT_EQ(test_stream.str(),
|
|
"TestVisitor::visit(IdmapHeader)\n"
|
|
"TestVisitor::visit(Idmap)\n"
|
|
"TestVisitor::visit(IdmapData::Header)\n"
|
|
"TestVisitor::visit(IdmapData)\n");
|
|
}
|
|
|
|
} // namespace android::idmap2
|