9335a26cbd
When PRODUCT_DEFAULT_DEV_CERTIFICATE is set to /vendor/foo/devkeys/test, then the public/private key pairs for an apex_key is searched at /vendor/foo/devkeys directory. To be specific, /system/timezone/Android.bp: apex_key { name: "timezone.key", public_key: "com.android.tzdata.avbpubkey", private_key: "com.android.tzdata.pem", } When PRODUCT_DEFAULT_DEV_CERTIFICATE isn't set, the keys are searched at /system/timezone, which is the path where Android.bp is located. With PRODUCT_DEFAULT_DEV_CERTIFICATE set to /vendor/foo/devkeys/test, the keys are searched at /vendor/foo/devkeys. Bug: 121224311 Test: m (apex_test updated) Test: m with crosshatch (PRODUCT_DEFAULT_DEV_CERTIFICATE is set to /vendor/google/...) Test: m with cheets (PRODUCT_DEFAULT_DEV_CERTIFICATE is set, but there is no apex key there. The product is with TARGET_FLATTEN_APEX := true) Change-Id: I213bbb96c433d851f9cc982871459fd7fb4fe47d
111 lines
3.5 KiB
Go
111 lines
3.5 KiB
Go
// Copyright (C) 2018 The Android Open Source Project
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package apex
|
|
|
|
import (
|
|
"fmt"
|
|
"io"
|
|
|
|
"android/soong/android"
|
|
"github.com/google/blueprint/proptools"
|
|
)
|
|
|
|
var String = proptools.String
|
|
|
|
func init() {
|
|
android.RegisterModuleType("apex_key", apexKeyFactory)
|
|
}
|
|
|
|
type apexKey struct {
|
|
android.ModuleBase
|
|
|
|
properties apexKeyProperties
|
|
|
|
public_key_file android.Path
|
|
private_key_file android.Path
|
|
|
|
keyName string
|
|
}
|
|
|
|
type apexKeyProperties struct {
|
|
// Path to the public key file in avbpubkey format. Installed to the device.
|
|
// Base name of the file is used as the ID for the key.
|
|
Public_key *string
|
|
// Path to the private key file in pem format. Used to sign APEXs.
|
|
Private_key *string
|
|
|
|
// Whether this key is installable to one of the partitions. Defualt: true.
|
|
Installable *bool
|
|
}
|
|
|
|
func apexKeyFactory() android.Module {
|
|
module := &apexKey{}
|
|
module.AddProperties(&module.properties)
|
|
android.InitAndroidModule(module)
|
|
return module
|
|
}
|
|
|
|
func (m *apexKey) installable() bool {
|
|
return m.properties.Installable == nil || proptools.Bool(m.properties.Installable)
|
|
}
|
|
|
|
func (m *apexKey) DepsMutator(ctx android.BottomUpMutatorContext) {
|
|
}
|
|
|
|
func (m *apexKey) GenerateAndroidBuildActions(ctx android.ModuleContext) {
|
|
if ctx.Config().FlattenApex() && !ctx.Config().UnbundledBuild() {
|
|
// Flattened APEXes are not signed
|
|
return
|
|
}
|
|
|
|
m.public_key_file = ctx.Config().ApexKeyDir(ctx).Join(ctx, String(m.properties.Public_key))
|
|
m.private_key_file = ctx.Config().ApexKeyDir(ctx).Join(ctx, String(m.properties.Private_key))
|
|
|
|
// If not found, fall back to the local key pairs
|
|
if !android.ExistentPathForSource(ctx, m.public_key_file.String()).Valid() {
|
|
m.public_key_file = android.PathForModuleSrc(ctx, String(m.properties.Public_key))
|
|
}
|
|
if !android.ExistentPathForSource(ctx, m.private_key_file.String()).Valid() {
|
|
m.private_key_file = android.PathForModuleSrc(ctx, String(m.properties.Private_key))
|
|
}
|
|
|
|
pubKeyName := m.public_key_file.Base()[0 : len(m.public_key_file.Base())-len(m.public_key_file.Ext())]
|
|
privKeyName := m.private_key_file.Base()[0 : len(m.private_key_file.Base())-len(m.private_key_file.Ext())]
|
|
|
|
if pubKeyName != privKeyName {
|
|
ctx.ModuleErrorf("public_key %q (keyname:%q) and private_key %q (keyname:%q) do not have same keyname",
|
|
m.public_key_file.String(), pubKeyName, m.private_key_file, privKeyName)
|
|
return
|
|
}
|
|
m.keyName = pubKeyName
|
|
|
|
if m.installable() {
|
|
ctx.InstallFile(android.PathForModuleInstall(ctx, "etc/security/apex"), m.keyName, m.public_key_file)
|
|
}
|
|
}
|
|
|
|
func (m *apexKey) AndroidMk() android.AndroidMkData {
|
|
return android.AndroidMkData{
|
|
Class: "ETC",
|
|
OutputFile: android.OptionalPathForPath(m.public_key_file),
|
|
Extra: []android.AndroidMkExtraFunc{
|
|
func(w io.Writer, outputFile android.Path) {
|
|
fmt.Fprintln(w, "LOCAL_MODULE_PATH :=", "$(TARGET_OUT)/etc/security/apex")
|
|
fmt.Fprintln(w, "LOCAL_INSTALLED_MODULE_STEM :=", m.keyName)
|
|
fmt.Fprintln(w, "LOCAL_UNINSTALLABLE_MODULE :=", !m.installable())
|
|
},
|
|
},
|
|
}
|
|
}
|