2018-03-11 05:41:16 +01:00
|
|
|
#
|
|
|
|
# Copyright (C) 2018 The Android Open Source Project
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
#
|
|
|
|
|
2018-03-16 07:21:28 +01:00
|
|
|
"""Unittests for validate_target_files.py."""
|
2018-03-11 05:41:16 +01:00
|
|
|
|
|
|
|
from __future__ import print_function
|
|
|
|
|
|
|
|
import os
|
|
|
|
import os.path
|
|
|
|
import shutil
|
|
|
|
import subprocess
|
|
|
|
import unittest
|
|
|
|
|
|
|
|
import build_image
|
|
|
|
import common
|
|
|
|
import test_utils
|
|
|
|
from validate_target_files import ValidateVerifiedBootImages
|
|
|
|
|
|
|
|
|
|
|
|
class ValidateTargetFilesTest(unittest.TestCase):
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
self.testdata_dir = test_utils.get_testdata_dir()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
common.Cleanup()
|
|
|
|
|
|
|
|
def _generate_boot_image(self, output_file):
|
|
|
|
kernel = common.MakeTempFile(prefix='kernel-')
|
|
|
|
with open(kernel, 'wb') as kernel_fp:
|
|
|
|
kernel_fp.write(os.urandom(10))
|
|
|
|
|
|
|
|
cmd = ['mkbootimg', '--kernel', kernel, '-o', output_file]
|
|
|
|
proc = common.Run(cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
|
|
|
stdoutdata, _ = proc.communicate()
|
|
|
|
self.assertEqual(
|
|
|
|
0, proc.returncode,
|
|
|
|
"Failed to run mkbootimg: {}".format(stdoutdata))
|
|
|
|
|
|
|
|
cmd = ['boot_signer', '/boot', output_file,
|
|
|
|
os.path.join(self.testdata_dir, 'testkey.pk8'),
|
|
|
|
os.path.join(self.testdata_dir, 'testkey.x509.pem'), output_file]
|
|
|
|
proc = common.Run(cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
|
|
|
stdoutdata, _ = proc.communicate()
|
|
|
|
self.assertEqual(
|
|
|
|
0, proc.returncode,
|
|
|
|
"Failed to sign boot image with boot_signer: {}".format(stdoutdata))
|
|
|
|
|
|
|
|
def test_ValidateVerifiedBootImages_bootImage(self):
|
|
|
|
input_tmp = common.MakeTempDir()
|
|
|
|
os.mkdir(os.path.join(input_tmp, 'IMAGES'))
|
|
|
|
boot_image = os.path.join(input_tmp, 'IMAGES', 'boot.img')
|
|
|
|
self._generate_boot_image(boot_image)
|
|
|
|
|
|
|
|
info_dict = {
|
|
|
|
'boot_signer' : 'true',
|
|
|
|
}
|
|
|
|
options = {
|
|
|
|
'verity_key' : os.path.join(self.testdata_dir, 'testkey.x509.pem'),
|
|
|
|
}
|
|
|
|
ValidateVerifiedBootImages(input_tmp, info_dict, options)
|
|
|
|
|
|
|
|
def test_ValidateVerifiedBootImages_bootImage_wrongKey(self):
|
|
|
|
input_tmp = common.MakeTempDir()
|
|
|
|
os.mkdir(os.path.join(input_tmp, 'IMAGES'))
|
|
|
|
boot_image = os.path.join(input_tmp, 'IMAGES', 'boot.img')
|
|
|
|
self._generate_boot_image(boot_image)
|
|
|
|
|
|
|
|
info_dict = {
|
|
|
|
'boot_signer' : 'true',
|
|
|
|
}
|
|
|
|
options = {
|
|
|
|
'verity_key' : os.path.join(self.testdata_dir, 'verity.x509.pem'),
|
|
|
|
}
|
|
|
|
self.assertRaises(
|
|
|
|
AssertionError, ValidateVerifiedBootImages, input_tmp, info_dict,
|
|
|
|
options)
|
|
|
|
|
|
|
|
def test_ValidateVerifiedBootImages_bootImage_corrupted(self):
|
|
|
|
input_tmp = common.MakeTempDir()
|
|
|
|
os.mkdir(os.path.join(input_tmp, 'IMAGES'))
|
|
|
|
boot_image = os.path.join(input_tmp, 'IMAGES', 'boot.img')
|
|
|
|
self._generate_boot_image(boot_image)
|
|
|
|
|
|
|
|
# Corrupt the late byte of the image.
|
|
|
|
with open(boot_image, 'r+b') as boot_fp:
|
|
|
|
boot_fp.seek(-1, os.SEEK_END)
|
|
|
|
last_byte = boot_fp.read(1)
|
|
|
|
last_byte = chr(255 - ord(last_byte))
|
|
|
|
boot_fp.seek(-1, os.SEEK_END)
|
|
|
|
boot_fp.write(last_byte)
|
|
|
|
|
|
|
|
info_dict = {
|
|
|
|
'boot_signer' : 'true',
|
|
|
|
}
|
|
|
|
options = {
|
|
|
|
'verity_key' : os.path.join(self.testdata_dir, 'testkey.x509.pem'),
|
|
|
|
}
|
|
|
|
self.assertRaises(
|
|
|
|
AssertionError, ValidateVerifiedBootImages, input_tmp, info_dict,
|
|
|
|
options)
|
|
|
|
|
|
|
|
def _generate_system_image(self, output_file):
|
|
|
|
verity_fec = True
|
|
|
|
partition_size = 1024 * 1024
|
|
|
|
adjusted_size, verity_size = build_image.AdjustPartitionSizeForVerity(
|
|
|
|
partition_size, verity_fec)
|
|
|
|
|
|
|
|
# Use an empty root directory.
|
|
|
|
system_root = common.MakeTempDir()
|
|
|
|
cmd = ['mkuserimg_mke2fs.sh', '-s', system_root, output_file, 'ext4',
|
|
|
|
'/system', str(adjusted_size), '-j', '0']
|
|
|
|
proc = common.Run(cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
|
|
|
stdoutdata, _ = proc.communicate()
|
|
|
|
self.assertEqual(
|
|
|
|
0, proc.returncode,
|
|
|
|
"Failed to create system image with mkuserimg_mke2fs.sh: {}".format(
|
|
|
|
stdoutdata))
|
|
|
|
|
|
|
|
# Append the verity metadata.
|
|
|
|
prop_dict = {
|
|
|
|
'original_partition_size' : str(partition_size),
|
|
|
|
'partition_size' : str(adjusted_size),
|
|
|
|
'verity_block_device' : '/dev/block/system',
|
|
|
|
'verity_key' : os.path.join(self.testdata_dir, 'testkey'),
|
|
|
|
'verity_signer_cmd' : 'verity_signer',
|
|
|
|
'verity_size' : str(verity_size),
|
|
|
|
}
|
|
|
|
self.assertTrue(
|
|
|
|
build_image.MakeVerityEnabledImage(output_file, verity_fec, prop_dict))
|
|
|
|
|
|
|
|
def test_ValidateVerifiedBootImages_systemImage(self):
|
|
|
|
input_tmp = common.MakeTempDir()
|
|
|
|
os.mkdir(os.path.join(input_tmp, 'IMAGES'))
|
|
|
|
system_image = os.path.join(input_tmp, 'IMAGES', 'system.img')
|
|
|
|
self._generate_system_image(system_image)
|
|
|
|
|
|
|
|
# Pack the verity key.
|
|
|
|
verity_key_mincrypt = os.path.join(
|
|
|
|
input_tmp, 'BOOT', 'RAMDISK', 'verity_key')
|
|
|
|
os.makedirs(os.path.dirname(verity_key_mincrypt))
|
|
|
|
shutil.copyfile(
|
|
|
|
os.path.join(self.testdata_dir, 'testkey_mincrypt'),
|
|
|
|
verity_key_mincrypt)
|
|
|
|
|
|
|
|
info_dict = {
|
|
|
|
'verity' : 'true',
|
|
|
|
}
|
|
|
|
options = {
|
|
|
|
'verity_key' : os.path.join(self.testdata_dir, 'testkey.x509.pem'),
|
|
|
|
'verity_key_mincrypt' : verity_key_mincrypt,
|
|
|
|
}
|
|
|
|
ValidateVerifiedBootImages(input_tmp, info_dict, options)
|