Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2018 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include <cstdio> // fclose |
| 18 | |
| 19 | #include <fstream> |
| 20 | #include <memory> |
| 21 | #include <sstream> |
| 22 | #include <string> |
| 23 | #include <vector> |
| 24 | |
| 25 | #include "gmock/gmock.h" |
| 26 | #include "gtest/gtest.h" |
| 27 | |
| 28 | #include "android-base/macros.h" |
| 29 | #include "androidfw/ApkAssets.h" |
| 30 | |
| 31 | #include "idmap2/BinaryStreamVisitor.h" |
| 32 | #include "idmap2/CommandLineOptions.h" |
| 33 | #include "idmap2/Idmap.h" |
| 34 | |
| 35 | #include "TestHelpers.h" |
| 36 | |
| 37 | using ::testing::IsNull; |
| 38 | using ::testing::NotNull; |
| 39 | |
Mårten Kongstad | 0eba72a | 2018-11-29 08:23:14 +0100 | [diff] [blame] | 40 | namespace android::idmap2 { |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 41 | |
| 42 | TEST(IdmapTests, TestCanonicalIdmapPathFor) { |
| 43 | ASSERT_EQ(Idmap::CanonicalIdmapPathFor("/foo", "/vendor/overlay/bar.apk"), |
| 44 | "/foo/vendor@overlay@bar.apk@idmap"); |
| 45 | } |
| 46 | |
| 47 | TEST(IdmapTests, CreateIdmapHeaderFromBinaryStream) { |
| 48 | std::string raw(reinterpret_cast<const char*>(idmap_raw_data), idmap_raw_data_len); |
| 49 | std::istringstream stream(raw); |
| 50 | std::unique_ptr<const IdmapHeader> header = IdmapHeader::FromBinaryStream(stream); |
| 51 | ASSERT_THAT(header, NotNull()); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 52 | ASSERT_EQ(header->GetMagic(), 0x504d4449U); |
| 53 | ASSERT_EQ(header->GetVersion(), 0x01U); |
| 54 | ASSERT_EQ(header->GetTargetCrc(), 0x1234U); |
| 55 | ASSERT_EQ(header->GetOverlayCrc(), 0x5678U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 56 | ASSERT_EQ(header->GetTargetPath().to_string(), "target.apk"); |
| 57 | ASSERT_EQ(header->GetOverlayPath().to_string(), "overlay.apk"); |
| 58 | } |
| 59 | |
| 60 | TEST(IdmapTests, FailToCreateIdmapHeaderFromBinaryStreamIfPathTooLong) { |
| 61 | std::string raw(reinterpret_cast<const char*>(idmap_raw_data), idmap_raw_data_len); |
| 62 | // overwrite the target path string, including the terminating null, with '.' |
| 63 | for (size_t i = 0x10; i < 0x110; i++) { |
| 64 | raw[i] = '.'; |
| 65 | } |
| 66 | std::istringstream stream(raw); |
| 67 | std::unique_ptr<const IdmapHeader> header = IdmapHeader::FromBinaryStream(stream); |
| 68 | ASSERT_THAT(header, IsNull()); |
| 69 | } |
| 70 | |
| 71 | TEST(IdmapTests, CreateIdmapDataHeaderFromBinaryStream) { |
| 72 | const size_t offset = 0x210; |
| 73 | std::string raw(reinterpret_cast<const char*>(idmap_raw_data + offset), |
| 74 | idmap_raw_data_len - offset); |
| 75 | std::istringstream stream(raw); |
| 76 | |
| 77 | std::unique_ptr<const IdmapData::Header> header = IdmapData::Header::FromBinaryStream(stream); |
| 78 | ASSERT_THAT(header, NotNull()); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 79 | ASSERT_EQ(header->GetTargetPackageId(), 0x7fU); |
| 80 | ASSERT_EQ(header->GetTypeCount(), 2U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 81 | } |
| 82 | |
| 83 | TEST(IdmapTests, CreateIdmapDataResourceTypeFromBinaryStream) { |
| 84 | const size_t offset = 0x214; |
| 85 | std::string raw(reinterpret_cast<const char*>(idmap_raw_data + offset), |
| 86 | idmap_raw_data_len - offset); |
| 87 | std::istringstream stream(raw); |
| 88 | |
| 89 | std::unique_ptr<const IdmapData::TypeEntry> data = IdmapData::TypeEntry::FromBinaryStream(stream); |
| 90 | ASSERT_THAT(data, NotNull()); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 91 | ASSERT_EQ(data->GetTargetTypeId(), 0x02U); |
| 92 | ASSERT_EQ(data->GetOverlayTypeId(), 0x02U); |
| 93 | ASSERT_EQ(data->GetEntryCount(), 1U); |
| 94 | ASSERT_EQ(data->GetEntryOffset(), 0U); |
| 95 | ASSERT_EQ(data->GetEntry(0), 0U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 96 | } |
| 97 | |
| 98 | TEST(IdmapTests, CreateIdmapDataFromBinaryStream) { |
| 99 | const size_t offset = 0x210; |
| 100 | std::string raw(reinterpret_cast<const char*>(idmap_raw_data + offset), |
| 101 | idmap_raw_data_len - offset); |
| 102 | std::istringstream stream(raw); |
| 103 | |
| 104 | std::unique_ptr<const IdmapData> data = IdmapData::FromBinaryStream(stream); |
| 105 | ASSERT_THAT(data, NotNull()); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 106 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 107 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 2U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 108 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 109 | ASSERT_EQ(types.size(), 2U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 110 | |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 111 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x02U); |
| 112 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x02U); |
| 113 | ASSERT_EQ(types[0]->GetEntryCount(), 1U); |
| 114 | ASSERT_EQ(types[0]->GetEntryOffset(), 0U); |
| 115 | ASSERT_EQ(types[0]->GetEntry(0), 0x0000U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 116 | |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 117 | ASSERT_EQ(types[1]->GetTargetTypeId(), 0x03U); |
| 118 | ASSERT_EQ(types[1]->GetOverlayTypeId(), 0x03U); |
| 119 | ASSERT_EQ(types[1]->GetEntryCount(), 3U); |
| 120 | ASSERT_EQ(types[1]->GetEntryOffset(), 3U); |
| 121 | ASSERT_EQ(types[1]->GetEntry(0), 0x0000U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 122 | ASSERT_EQ(types[1]->GetEntry(1), kNoEntry); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 123 | ASSERT_EQ(types[1]->GetEntry(2), 0x0001U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 124 | } |
| 125 | |
| 126 | TEST(IdmapTests, CreateIdmapFromBinaryStream) { |
| 127 | std::string raw(reinterpret_cast<const char*>(idmap_raw_data), idmap_raw_data_len); |
| 128 | std::istringstream stream(raw); |
| 129 | |
| 130 | std::stringstream error; |
| 131 | std::unique_ptr<const Idmap> idmap = Idmap::FromBinaryStream(stream, error); |
| 132 | ASSERT_THAT(idmap, NotNull()); |
| 133 | |
| 134 | ASSERT_THAT(idmap->GetHeader(), NotNull()); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 135 | ASSERT_EQ(idmap->GetHeader()->GetMagic(), 0x504d4449U); |
| 136 | ASSERT_EQ(idmap->GetHeader()->GetVersion(), 0x01U); |
| 137 | ASSERT_EQ(idmap->GetHeader()->GetTargetCrc(), 0x1234U); |
| 138 | ASSERT_EQ(idmap->GetHeader()->GetOverlayCrc(), 0x5678U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 139 | ASSERT_EQ(idmap->GetHeader()->GetTargetPath().to_string(), "target.apk"); |
| 140 | ASSERT_EQ(idmap->GetHeader()->GetOverlayPath().to_string(), "overlay.apk"); |
| 141 | |
| 142 | const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData(); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 143 | ASSERT_EQ(dataBlocks.size(), 1U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 144 | |
| 145 | const std::unique_ptr<const IdmapData>& data = dataBlocks[0]; |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 146 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 147 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 2U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 148 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 149 | ASSERT_EQ(types.size(), 2U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 150 | |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 151 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x02U); |
| 152 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x02U); |
| 153 | ASSERT_EQ(types[0]->GetEntryCount(), 1U); |
| 154 | ASSERT_EQ(types[0]->GetEntryOffset(), 0U); |
| 155 | ASSERT_EQ(types[0]->GetEntry(0), 0x0000U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 156 | |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 157 | ASSERT_EQ(types[1]->GetTargetTypeId(), 0x03U); |
| 158 | ASSERT_EQ(types[1]->GetOverlayTypeId(), 0x03U); |
| 159 | ASSERT_EQ(types[1]->GetEntryCount(), 3U); |
| 160 | ASSERT_EQ(types[1]->GetEntryOffset(), 3U); |
| 161 | ASSERT_EQ(types[1]->GetEntry(0), 0x0000U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 162 | ASSERT_EQ(types[1]->GetEntry(1), kNoEntry); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 163 | ASSERT_EQ(types[1]->GetEntry(2), 0x0001U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 164 | } |
| 165 | |
| 166 | TEST(IdmapTests, GracefullyFailToCreateIdmapFromCorruptBinaryStream) { |
| 167 | std::string raw(reinterpret_cast<const char*>(idmap_raw_data), |
| 168 | 10); // data too small |
| 169 | std::istringstream stream(raw); |
| 170 | |
| 171 | std::stringstream error; |
| 172 | std::unique_ptr<const Idmap> idmap = Idmap::FromBinaryStream(stream, error); |
| 173 | ASSERT_THAT(idmap, IsNull()); |
| 174 | } |
| 175 | |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 176 | void CreateIdmap(const StringPiece& target_apk_path, const StringPiece& overlay_apk_path, |
| 177 | const PolicyBitmask& fulfilled_policies, bool enforce_overlayable, |
| 178 | std::unique_ptr<const Idmap>* out_idmap) { |
| 179 | std::unique_ptr<const ApkAssets> target_apk = ApkAssets::Load(target_apk_path.to_string()); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 180 | ASSERT_THAT(target_apk, NotNull()); |
| 181 | |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 182 | std::unique_ptr<const ApkAssets> overlay_apk = ApkAssets::Load(overlay_apk_path.to_string()); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 183 | ASSERT_THAT(overlay_apk, NotNull()); |
| 184 | |
| 185 | std::stringstream error; |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 186 | *out_idmap = |
| 187 | Idmap::FromApkAssets(target_apk_path.to_string(), *target_apk, overlay_apk_path.to_string(), |
| 188 | *overlay_apk, fulfilled_policies, enforce_overlayable, error); |
| 189 | } |
| 190 | |
| 191 | TEST(IdmapTests, CreateIdmapFromApkAssets) { |
| 192 | std::unique_ptr<const Idmap> idmap; |
| 193 | std::string target_apk_path = GetTestDataPath() + "/target/target.apk"; |
| 194 | std::string overlay_apk_path = GetTestDataPath() + "/overlay/overlay.apk"; |
| 195 | CreateIdmap(target_apk_path, overlay_apk_path, PolicyFlags::POLICY_PUBLIC, |
| 196 | /* enforce_overlayable */ true, &idmap); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 197 | |
| 198 | ASSERT_THAT(idmap->GetHeader(), NotNull()); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 199 | ASSERT_EQ(idmap->GetHeader()->GetMagic(), 0x504d4449U); |
| 200 | ASSERT_EQ(idmap->GetHeader()->GetVersion(), 0x01U); |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 201 | ASSERT_EQ(idmap->GetHeader()->GetTargetCrc(), 0xd513ca1b); |
| 202 | ASSERT_EQ(idmap->GetHeader()->GetOverlayCrc(), 0x8635c2ed); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 203 | ASSERT_EQ(idmap->GetHeader()->GetTargetPath().to_string(), target_apk_path); |
| 204 | ASSERT_EQ(idmap->GetHeader()->GetOverlayPath(), overlay_apk_path); |
| 205 | ASSERT_EQ(idmap->GetHeader()->GetOverlayPath(), overlay_apk_path); |
| 206 | |
| 207 | const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData(); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 208 | ASSERT_EQ(dataBlocks.size(), 1U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 209 | |
| 210 | const std::unique_ptr<const IdmapData>& data = dataBlocks[0]; |
| 211 | |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 212 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 213 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 2U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 214 | |
| 215 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 216 | ASSERT_EQ(types.size(), 2U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 217 | |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 218 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x01U); |
| 219 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x01U); |
| 220 | ASSERT_EQ(types[0]->GetEntryCount(), 1U); |
| 221 | ASSERT_EQ(types[0]->GetEntryOffset(), 0U); |
| 222 | ASSERT_EQ(types[0]->GetEntry(0), 0x0000U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 223 | |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 224 | ASSERT_EQ(types[1]->GetTargetTypeId(), 0x02U); |
| 225 | ASSERT_EQ(types[1]->GetOverlayTypeId(), 0x02U); |
| 226 | ASSERT_EQ(types[1]->GetEntryCount(), 4U); |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 227 | ASSERT_EQ(types[1]->GetEntryOffset(), 10U); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 228 | ASSERT_EQ(types[1]->GetEntry(0), 0x0000U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 229 | ASSERT_EQ(types[1]->GetEntry(1), kNoEntry); |
Mårten Kongstad | b877902 | 2018-11-29 09:53:17 +0100 | [diff] [blame] | 230 | ASSERT_EQ(types[1]->GetEntry(2), 0x0001U); |
| 231 | ASSERT_EQ(types[1]->GetEntry(3), 0x0002U); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 232 | } |
| 233 | |
Ryan Mitchell | 1982345 | 2019-01-29 12:01:24 -0800 | [diff] [blame] | 234 | // Overlays should abide by all overlayable restrictions if enforcement of overlayable is enabled. |
| 235 | TEST(IdmapOverlayableTests, CreateIdmapFromApkAssetsPolicySystemPublic) { |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 236 | std::unique_ptr<const Idmap> idmap; |
| 237 | std::string target_apk_path = GetTestDataPath() + "/target/target.apk"; |
| 238 | std::string overlay_apk_path = GetTestDataPath() + "/system-overlay/system-overlay.apk"; |
| 239 | CreateIdmap(target_apk_path, overlay_apk_path, |
| 240 | PolicyFlags::POLICY_SYSTEM_PARTITION | PolicyFlags::POLICY_PUBLIC, |
| 241 | /* enforce_overlayable */ true, &idmap); |
Mårten Kongstad | d10d06d | 2019-01-07 17:26:25 -0800 | [diff] [blame] | 242 | ASSERT_THAT(idmap, NotNull()); |
| 243 | |
| 244 | const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData(); |
| 245 | ASSERT_EQ(dataBlocks.size(), 1U); |
| 246 | |
| 247 | const std::unique_ptr<const IdmapData>& data = dataBlocks[0]; |
| 248 | |
| 249 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 250 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 1U); |
| 251 | |
| 252 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
| 253 | ASSERT_EQ(types.size(), 1U); |
| 254 | |
| 255 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x02U); |
| 256 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x01U); |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 257 | ASSERT_EQ(types[0]->GetEntryCount(), 4U); |
Ryan Mitchell | a362846 | 2019-01-14 12:19:40 -0800 | [diff] [blame] | 258 | ASSERT_EQ(types[0]->GetEntryOffset(), 6U); |
Mårten Kongstad | 49d835d | 2019-01-31 10:50:48 +0100 | [diff] [blame] | 259 | ASSERT_EQ(types[0]->GetEntry(0), 0x0000U); // string/policy_public |
| 260 | ASSERT_EQ(types[0]->GetEntry(1), kNoEntry); // string/policy_signature |
| 261 | ASSERT_EQ(types[0]->GetEntry(2), 0x0001U); // string/policy_system |
| 262 | ASSERT_EQ(types[0]->GetEntry(3), 0x0002U); // string/policy_system_vendor |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 263 | } |
| 264 | |
| 265 | TEST(IdmapOverlayableTests, CreateIdmapFromApkAssetsPolicySignature) { |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 266 | std::unique_ptr<const Idmap> idmap; |
| 267 | std::string target_apk_path = GetTestDataPath() + "/target/target.apk"; |
| 268 | std::string overlay_apk_path = GetTestDataPath() + "/signature-overlay/signature-overlay.apk"; |
| 269 | CreateIdmap(target_apk_path, overlay_apk_path, |
| 270 | PolicyFlags::POLICY_PUBLIC | PolicyFlags::POLICY_SIGNATURE, |
| 271 | /* enforce_overlayable */ true, &idmap); |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 272 | ASSERT_THAT(idmap, NotNull()); |
| 273 | |
| 274 | const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData(); |
| 275 | ASSERT_EQ(dataBlocks.size(), 1U); |
| 276 | |
| 277 | const std::unique_ptr<const IdmapData>& data = dataBlocks[0]; |
| 278 | |
| 279 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 280 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 1U); |
| 281 | |
| 282 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
| 283 | ASSERT_EQ(types.size(), 1U); |
| 284 | |
| 285 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x02U); |
| 286 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x01U); |
| 287 | ASSERT_EQ(types[0]->GetEntryCount(), 1U); |
| 288 | ASSERT_EQ(types[0]->GetEntryOffset(), 7U); |
Mårten Kongstad | 49d835d | 2019-01-31 10:50:48 +0100 | [diff] [blame] | 289 | ASSERT_EQ(types[0]->GetEntry(0), 0x0000U); // string/policy_signature |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 290 | } |
| 291 | |
Ryan Mitchell | 1982345 | 2019-01-29 12:01:24 -0800 | [diff] [blame] | 292 | // Overlays should abide by all overlayable restrictions if enforcement of overlayable is enabled. |
| 293 | TEST(IdmapOverlayableTests, CreateIdmapFromApkAssetsPolicySystemPublicInvalid) { |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 294 | std::unique_ptr<const Idmap> idmap; |
| 295 | std::string target_apk_path = GetTestDataPath() + "/target/target.apk"; |
| 296 | std::string overlay_apk_path = |
| 297 | GetTestDataPath() + "/system-overlay-invalid/system-overlay-invalid.apk"; |
| 298 | CreateIdmap(target_apk_path, overlay_apk_path, |
| 299 | PolicyFlags::POLICY_SYSTEM_PARTITION | PolicyFlags::POLICY_PUBLIC, |
| 300 | /* enforce_overlayable */ true, &idmap); |
Mårten Kongstad | d10d06d | 2019-01-07 17:26:25 -0800 | [diff] [blame] | 301 | ASSERT_THAT(idmap, NotNull()); |
| 302 | |
| 303 | const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData(); |
| 304 | ASSERT_EQ(dataBlocks.size(), 1U); |
| 305 | |
| 306 | const std::unique_ptr<const IdmapData>& data = dataBlocks[0]; |
| 307 | |
| 308 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 309 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 1U); |
| 310 | |
| 311 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
| 312 | ASSERT_EQ(types.size(), 1U); |
| 313 | |
| 314 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x02U); |
| 315 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x01U); |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 316 | ASSERT_EQ(types[0]->GetEntryCount(), 4U); |
Ryan Mitchell | 1982345 | 2019-01-29 12:01:24 -0800 | [diff] [blame] | 317 | ASSERT_EQ(types[0]->GetEntryOffset(), 6U); |
Mårten Kongstad | 49d835d | 2019-01-31 10:50:48 +0100 | [diff] [blame] | 318 | ASSERT_EQ(types[0]->GetEntry(0), 0x0003U); // string/policy_public |
| 319 | ASSERT_EQ(types[0]->GetEntry(1), kNoEntry); // string/policy_signature |
| 320 | ASSERT_EQ(types[0]->GetEntry(2), 0x0005U); // string/policy_system |
| 321 | ASSERT_EQ(types[0]->GetEntry(3), 0x0006U); // string/policy_system_vendor |
Mårten Kongstad | d10d06d | 2019-01-07 17:26:25 -0800 | [diff] [blame] | 322 | } |
| 323 | |
Ryan Mitchell | 1982345 | 2019-01-29 12:01:24 -0800 | [diff] [blame] | 324 | // Overlays should ignore all overlayable restrictions if enforcement of overlayable is disabled. |
| 325 | TEST(IdmapOverlayableTests, CreateIdmapFromApkAssetsPolicySystemPublicInvalidIgnoreOverlayable) { |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 326 | std::unique_ptr<const Idmap> idmap; |
| 327 | std::string target_apk_path = GetTestDataPath() + "/target/target.apk"; |
| 328 | std::string overlay_apk_path = |
| 329 | GetTestDataPath() + "/system-overlay-invalid/system-overlay-invalid.apk"; |
| 330 | CreateIdmap(target_apk_path, overlay_apk_path, |
| 331 | PolicyFlags::POLICY_SYSTEM_PARTITION | PolicyFlags::POLICY_PUBLIC, |
| 332 | /* enforce_overlayable */ false, &idmap); |
Mårten Kongstad | d10d06d | 2019-01-07 17:26:25 -0800 | [diff] [blame] | 333 | ASSERT_THAT(idmap, NotNull()); |
| 334 | |
| 335 | const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData(); |
| 336 | ASSERT_EQ(dataBlocks.size(), 1U); |
| 337 | |
| 338 | const std::unique_ptr<const IdmapData>& data = dataBlocks[0]; |
| 339 | |
| 340 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 341 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 1U); |
| 342 | |
| 343 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
| 344 | ASSERT_EQ(types.size(), 1U); |
| 345 | |
| 346 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x02U); |
| 347 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x01U); |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 348 | ASSERT_EQ(types[0]->GetEntryCount(), 7U); |
Mårten Kongstad | d10d06d | 2019-01-07 17:26:25 -0800 | [diff] [blame] | 349 | ASSERT_EQ(types[0]->GetEntryOffset(), 3U); |
| 350 | ASSERT_EQ(types[0]->GetEntry(0), 0x0000U); // string/not_overlayable |
Ryan Mitchell | a362846 | 2019-01-14 12:19:40 -0800 | [diff] [blame] | 351 | ASSERT_EQ(types[0]->GetEntry(1), 0x0001U); // string/other |
| 352 | ASSERT_EQ(types[0]->GetEntry(2), 0x0002U); // string/policy_product |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 353 | ASSERT_EQ(types[0]->GetEntry(3), 0x0003U); // string/policy_signature |
| 354 | ASSERT_EQ(types[0]->GetEntry(4), 0x0004U); // string/policy_public |
| 355 | ASSERT_EQ(types[0]->GetEntry(5), 0x0005U); // string/policy_system |
| 356 | ASSERT_EQ(types[0]->GetEntry(6), 0x0006U); // string/policy_system_vendor |
Mårten Kongstad | d10d06d | 2019-01-07 17:26:25 -0800 | [diff] [blame] | 357 | } |
| 358 | |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 359 | // Overlays that do not specify a target <overlayable> can overlay resources defined as overlayable. |
Ryan Mitchell | 1982345 | 2019-01-29 12:01:24 -0800 | [diff] [blame] | 360 | TEST(IdmapOverlayableTests, CreateIdmapFromApkAssetsNoDefinedOverlayableAndNoTargetName) { |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 361 | std::unique_ptr<const Idmap> idmap; |
| 362 | std::string target_apk_path = GetTestDataPath() + "/target/target-no-overlayable.apk"; |
| 363 | std::string overlay_apk_path = GetTestDataPath() + "/overlay/overlay-no-name.apk"; |
| 364 | CreateIdmap(target_apk_path, overlay_apk_path, PolicyFlags::POLICY_PUBLIC, |
| 365 | /* enforce_overlayable */ false, &idmap); |
Ryan Mitchell | 1982345 | 2019-01-29 12:01:24 -0800 | [diff] [blame] | 366 | ASSERT_THAT(idmap, NotNull()); |
| 367 | |
| 368 | const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData(); |
| 369 | ASSERT_EQ(dataBlocks.size(), 1U); |
| 370 | |
| 371 | const std::unique_ptr<const IdmapData>& data = dataBlocks[0]; |
| 372 | |
| 373 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 374 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 2U); |
| 375 | |
| 376 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
| 377 | ASSERT_EQ(types.size(), 2U); |
| 378 | |
| 379 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x01U); |
| 380 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x01U); |
| 381 | ASSERT_EQ(types[0]->GetEntryCount(), 1U); |
| 382 | ASSERT_EQ(types[0]->GetEntryOffset(), 0U); |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 383 | ASSERT_EQ(types[0]->GetEntry(0), 0x0000U); // string/int1 |
Ryan Mitchell | 1982345 | 2019-01-29 12:01:24 -0800 | [diff] [blame] | 384 | |
| 385 | ASSERT_EQ(types[1]->GetTargetTypeId(), 0x02U); |
| 386 | ASSERT_EQ(types[1]->GetOverlayTypeId(), 0x02U); |
| 387 | ASSERT_EQ(types[1]->GetEntryCount(), 4U); |
Winson | b410020 | 2019-02-06 12:05:32 -0800 | [diff] [blame] | 388 | ASSERT_EQ(types[1]->GetEntryOffset(), 10U); |
Ryan Mitchell | b863ca3 | 2019-03-07 14:31:54 -0800 | [diff] [blame^] | 389 | ASSERT_EQ(types[1]->GetEntry(0), 0x0000U); // string/str1 |
| 390 | ASSERT_EQ(types[1]->GetEntry(1), kNoEntry); // string/str2 |
| 391 | ASSERT_EQ(types[1]->GetEntry(2), 0x0001U); // string/str3 |
| 392 | ASSERT_EQ(types[1]->GetEntry(3), 0x0002U); // string/str4 |
| 393 | } |
| 394 | |
| 395 | // Overlays that are not pre-installed and are not signed with the same signature as the target |
| 396 | // cannot overlay packages that have not defined overlayable resources. |
| 397 | TEST(IdmapOverlayableTests, CreateIdmapFromApkAssetsDefaultPoliciesPublicFail) { |
| 398 | std::unique_ptr<const Idmap> idmap; |
| 399 | std::string target_apk_path = GetTestDataPath() + "/target/target-no-overlayable.apk"; |
| 400 | std::string overlay_apk_path = GetTestDataPath() + "/overlay/overlay-no-name.apk"; |
| 401 | CreateIdmap(target_apk_path, overlay_apk_path, PolicyFlags::POLICY_PUBLIC, |
| 402 | /* enforce_overlayable */ true, &idmap); |
| 403 | ASSERT_THAT(idmap, IsNull()); |
| 404 | } |
| 405 | |
| 406 | // Overlays that are pre-installed or are signed with the same signature as the target can overlay |
| 407 | // packages that have not defined overlayable resources. |
| 408 | TEST(IdmapOverlayableTests, CreateIdmapFromApkAssetsDefaultPolicies) { |
| 409 | std::unique_ptr<const Idmap> idmap; |
| 410 | std::string target_apk_path = GetTestDataPath() + "/target/target-no-overlayable.apk"; |
| 411 | std::string overlay_apk_path = |
| 412 | GetTestDataPath() + "/system-overlay-invalid/system-overlay-invalid.apk"; |
| 413 | |
| 414 | auto CheckEntries = [&]() -> void { |
| 415 | const std::vector<std::unique_ptr<const IdmapData>>& dataBlocks = idmap->GetData(); |
| 416 | ASSERT_EQ(dataBlocks.size(), 1U); |
| 417 | |
| 418 | const std::unique_ptr<const IdmapData>& data = dataBlocks[0]; |
| 419 | |
| 420 | ASSERT_EQ(data->GetHeader()->GetTargetPackageId(), 0x7fU); |
| 421 | ASSERT_EQ(data->GetHeader()->GetTypeCount(), 1U); |
| 422 | |
| 423 | const std::vector<std::unique_ptr<const IdmapData::TypeEntry>>& types = data->GetTypeEntries(); |
| 424 | ASSERT_EQ(types.size(), 1U); |
| 425 | |
| 426 | ASSERT_EQ(types[0]->GetTargetTypeId(), 0x02U); |
| 427 | ASSERT_EQ(types[0]->GetOverlayTypeId(), 0x01U); |
| 428 | ASSERT_EQ(types[0]->GetEntryCount(), 7U); |
| 429 | ASSERT_EQ(types[0]->GetEntryOffset(), 3U); |
| 430 | ASSERT_EQ(types[0]->GetEntry(0), 0x0000U); // string/not_overlayable |
| 431 | ASSERT_EQ(types[0]->GetEntry(1), 0x0001U); // string/other |
| 432 | ASSERT_EQ(types[0]->GetEntry(2), 0x0002U); // string/policy_product |
| 433 | ASSERT_EQ(types[0]->GetEntry(3), 0x0003U); // string/policy_public |
| 434 | ASSERT_EQ(types[0]->GetEntry(4), 0x0004U); // string/string/policy_signature |
| 435 | ASSERT_EQ(types[0]->GetEntry(5), 0x0005U); // string/policy_system |
| 436 | ASSERT_EQ(types[0]->GetEntry(6), 0x0006U); // string/policy_system_vendor |
| 437 | }; |
| 438 | |
| 439 | CreateIdmap(target_apk_path, overlay_apk_path, PolicyFlags::POLICY_SIGNATURE, |
| 440 | /* enforce_overlayable */ true, &idmap); |
| 441 | ASSERT_THAT(idmap, NotNull()); |
| 442 | CheckEntries(); |
| 443 | |
| 444 | CreateIdmap(target_apk_path, overlay_apk_path, PolicyFlags::POLICY_PRODUCT_PARTITION, |
| 445 | /* enforce_overlayable */ true, &idmap); |
| 446 | ASSERT_THAT(idmap, NotNull()); |
| 447 | CheckEntries(); |
| 448 | |
| 449 | CreateIdmap(target_apk_path, overlay_apk_path, PolicyFlags::POLICY_SYSTEM_PARTITION, |
| 450 | /* enforce_overlayable */ true, &idmap); |
| 451 | ASSERT_THAT(idmap, NotNull()); |
| 452 | CheckEntries(); |
| 453 | |
| 454 | CreateIdmap(target_apk_path, overlay_apk_path, PolicyFlags::POLICY_VENDOR_PARTITION, |
| 455 | /* enforce_overlayable */ true, &idmap); |
| 456 | ASSERT_THAT(idmap, NotNull()); |
| 457 | CheckEntries(); |
Ryan Mitchell | 1982345 | 2019-01-29 12:01:24 -0800 | [diff] [blame] | 458 | } |
| 459 | |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 460 | TEST(IdmapTests, FailToCreateIdmapFromApkAssetsIfPathTooLong) { |
| 461 | std::string target_apk_path(GetTestDataPath()); |
| 462 | for (int i = 0; i < 32; i++) { |
| 463 | target_apk_path += "/target/../"; |
| 464 | } |
| 465 | target_apk_path += "/target/target.apk"; |
| 466 | ASSERT_GT(target_apk_path.size(), kIdmapStringLength); |
| 467 | std::unique_ptr<const ApkAssets> target_apk = ApkAssets::Load(target_apk_path); |
| 468 | ASSERT_THAT(target_apk, NotNull()); |
| 469 | |
| 470 | const std::string overlay_apk_path(GetTestDataPath() + "/overlay/overlay.apk"); |
| 471 | std::unique_ptr<const ApkAssets> overlay_apk = ApkAssets::Load(overlay_apk_path); |
| 472 | ASSERT_THAT(overlay_apk, NotNull()); |
| 473 | |
| 474 | std::stringstream error; |
| 475 | std::unique_ptr<const Idmap> idmap = |
Mårten Kongstad | d10d06d | 2019-01-07 17:26:25 -0800 | [diff] [blame] | 476 | Idmap::FromApkAssets(target_apk_path, *target_apk, overlay_apk_path, *overlay_apk, |
| 477 | PolicyFlags::POLICY_PUBLIC, /* enforce_overlayable */ true, error); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 478 | ASSERT_THAT(idmap, IsNull()); |
| 479 | } |
| 480 | |
| 481 | TEST(IdmapTests, IdmapHeaderIsUpToDate) { |
| 482 | fclose(stderr); // silence expected warnings from libandroidfw |
| 483 | |
| 484 | const std::string target_apk_path(GetTestDataPath() + "/target/target.apk"); |
| 485 | std::unique_ptr<const ApkAssets> target_apk = ApkAssets::Load(target_apk_path); |
| 486 | ASSERT_THAT(target_apk, NotNull()); |
| 487 | |
| 488 | const std::string overlay_apk_path(GetTestDataPath() + "/overlay/overlay.apk"); |
| 489 | std::unique_ptr<const ApkAssets> overlay_apk = ApkAssets::Load(overlay_apk_path); |
| 490 | ASSERT_THAT(overlay_apk, NotNull()); |
| 491 | |
| 492 | std::stringstream error; |
Mårten Kongstad | d10d06d | 2019-01-07 17:26:25 -0800 | [diff] [blame] | 493 | std::unique_ptr<const Idmap> idmap = Idmap::FromApkAssets( |
| 494 | target_apk_path, *target_apk, overlay_apk_path, *overlay_apk, PolicyFlags::POLICY_PUBLIC, |
| 495 | /* enforce_overlayable */ true, error); |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 496 | ASSERT_THAT(idmap, NotNull()); |
| 497 | |
| 498 | std::stringstream stream; |
| 499 | BinaryStreamVisitor visitor(stream); |
| 500 | idmap->accept(&visitor); |
| 501 | |
| 502 | std::unique_ptr<const IdmapHeader> header = IdmapHeader::FromBinaryStream(stream); |
| 503 | ASSERT_THAT(header, NotNull()); |
| 504 | ASSERT_TRUE(header->IsUpToDate(error)) << error.str(); |
| 505 | |
| 506 | // magic: bytes (0x0, 0x03) |
| 507 | std::string bad_magic_string(stream.str()); |
| 508 | bad_magic_string[0x0] = '.'; |
| 509 | bad_magic_string[0x1] = '.'; |
| 510 | bad_magic_string[0x2] = '.'; |
| 511 | bad_magic_string[0x3] = '.'; |
| 512 | std::stringstream bad_magic_stream(bad_magic_string); |
| 513 | std::unique_ptr<const IdmapHeader> bad_magic_header = |
| 514 | IdmapHeader::FromBinaryStream(bad_magic_stream); |
| 515 | ASSERT_THAT(bad_magic_header, NotNull()); |
| 516 | ASSERT_NE(header->GetMagic(), bad_magic_header->GetMagic()); |
| 517 | ASSERT_FALSE(bad_magic_header->IsUpToDate(error)); |
| 518 | |
| 519 | // version: bytes (0x4, 0x07) |
| 520 | std::string bad_version_string(stream.str()); |
| 521 | bad_version_string[0x4] = '.'; |
| 522 | bad_version_string[0x5] = '.'; |
| 523 | bad_version_string[0x6] = '.'; |
| 524 | bad_version_string[0x7] = '.'; |
| 525 | std::stringstream bad_version_stream(bad_version_string); |
| 526 | std::unique_ptr<const IdmapHeader> bad_version_header = |
| 527 | IdmapHeader::FromBinaryStream(bad_version_stream); |
| 528 | ASSERT_THAT(bad_version_header, NotNull()); |
| 529 | ASSERT_NE(header->GetVersion(), bad_version_header->GetVersion()); |
| 530 | ASSERT_FALSE(bad_version_header->IsUpToDate(error)); |
| 531 | |
| 532 | // target crc: bytes (0x8, 0xb) |
| 533 | std::string bad_target_crc_string(stream.str()); |
| 534 | bad_target_crc_string[0x8] = '.'; |
| 535 | bad_target_crc_string[0x9] = '.'; |
| 536 | bad_target_crc_string[0xa] = '.'; |
| 537 | bad_target_crc_string[0xb] = '.'; |
| 538 | std::stringstream bad_target_crc_stream(bad_target_crc_string); |
| 539 | std::unique_ptr<const IdmapHeader> bad_target_crc_header = |
| 540 | IdmapHeader::FromBinaryStream(bad_target_crc_stream); |
| 541 | ASSERT_THAT(bad_target_crc_header, NotNull()); |
| 542 | ASSERT_NE(header->GetTargetCrc(), bad_target_crc_header->GetTargetCrc()); |
| 543 | ASSERT_FALSE(bad_target_crc_header->IsUpToDate(error)); |
| 544 | |
| 545 | // overlay crc: bytes (0xc, 0xf) |
| 546 | std::string bad_overlay_crc_string(stream.str()); |
| 547 | bad_overlay_crc_string[0xc] = '.'; |
| 548 | bad_overlay_crc_string[0xd] = '.'; |
| 549 | bad_overlay_crc_string[0xe] = '.'; |
| 550 | bad_overlay_crc_string[0xf] = '.'; |
| 551 | std::stringstream bad_overlay_crc_stream(bad_overlay_crc_string); |
| 552 | std::unique_ptr<const IdmapHeader> bad_overlay_crc_header = |
| 553 | IdmapHeader::FromBinaryStream(bad_overlay_crc_stream); |
| 554 | ASSERT_THAT(bad_overlay_crc_header, NotNull()); |
| 555 | ASSERT_NE(header->GetOverlayCrc(), bad_overlay_crc_header->GetOverlayCrc()); |
| 556 | ASSERT_FALSE(bad_overlay_crc_header->IsUpToDate(error)); |
| 557 | |
| 558 | // target path: bytes (0x10, 0x10f) |
| 559 | std::string bad_target_path_string(stream.str()); |
| 560 | bad_target_path_string[0x10] = '\0'; |
| 561 | std::stringstream bad_target_path_stream(bad_target_path_string); |
| 562 | std::unique_ptr<const IdmapHeader> bad_target_path_header = |
| 563 | IdmapHeader::FromBinaryStream(bad_target_path_stream); |
| 564 | ASSERT_THAT(bad_target_path_header, NotNull()); |
| 565 | ASSERT_NE(header->GetTargetPath(), bad_target_path_header->GetTargetPath()); |
| 566 | ASSERT_FALSE(bad_target_path_header->IsUpToDate(error)); |
| 567 | |
| 568 | // overlay path: bytes (0x110, 0x20f) |
| 569 | std::string bad_overlay_path_string(stream.str()); |
| 570 | bad_overlay_path_string[0x110] = '\0'; |
| 571 | std::stringstream bad_overlay_path_stream(bad_overlay_path_string); |
| 572 | std::unique_ptr<const IdmapHeader> bad_overlay_path_header = |
| 573 | IdmapHeader::FromBinaryStream(bad_overlay_path_stream); |
| 574 | ASSERT_THAT(bad_overlay_path_header, NotNull()); |
| 575 | ASSERT_NE(header->GetOverlayPath(), bad_overlay_path_header->GetOverlayPath()); |
| 576 | ASSERT_FALSE(bad_overlay_path_header->IsUpToDate(error)); |
| 577 | } |
| 578 | |
| 579 | class TestVisitor : public Visitor { |
| 580 | public: |
| 581 | explicit TestVisitor(std::ostream& stream) : stream_(stream) { |
| 582 | } |
| 583 | |
Mårten Kongstad | 0eba72a | 2018-11-29 08:23:14 +0100 | [diff] [blame] | 584 | void visit(const Idmap& idmap ATTRIBUTE_UNUSED) override { |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 585 | stream_ << "TestVisitor::visit(Idmap)" << std::endl; |
| 586 | } |
| 587 | |
Mårten Kongstad | 0eba72a | 2018-11-29 08:23:14 +0100 | [diff] [blame] | 588 | void visit(const IdmapHeader& idmap ATTRIBUTE_UNUSED) override { |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 589 | stream_ << "TestVisitor::visit(IdmapHeader)" << std::endl; |
| 590 | } |
| 591 | |
Mårten Kongstad | 0eba72a | 2018-11-29 08:23:14 +0100 | [diff] [blame] | 592 | void visit(const IdmapData& idmap ATTRIBUTE_UNUSED) override { |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 593 | stream_ << "TestVisitor::visit(IdmapData)" << std::endl; |
| 594 | } |
| 595 | |
Mårten Kongstad | 0eba72a | 2018-11-29 08:23:14 +0100 | [diff] [blame] | 596 | void visit(const IdmapData::Header& idmap ATTRIBUTE_UNUSED) override { |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 597 | stream_ << "TestVisitor::visit(IdmapData::Header)" << std::endl; |
| 598 | } |
| 599 | |
Mårten Kongstad | 0eba72a | 2018-11-29 08:23:14 +0100 | [diff] [blame] | 600 | void visit(const IdmapData::TypeEntry& idmap ATTRIBUTE_UNUSED) override { |
Mårten Kongstad | 0275123 | 2018-04-27 13:16:32 +0200 | [diff] [blame] | 601 | stream_ << "TestVisitor::visit(IdmapData::TypeEntry)" << std::endl; |
| 602 | } |
| 603 | |
| 604 | private: |
| 605 | std::ostream& stream_; |
| 606 | }; |
| 607 | |
| 608 | TEST(IdmapTests, TestVisitor) { |
| 609 | std::string raw(reinterpret_cast<const char*>(idmap_raw_data), idmap_raw_data_len); |
| 610 | std::istringstream stream(raw); |
| 611 | |
| 612 | std::stringstream error; |
| 613 | std::unique_ptr<const Idmap> idmap = Idmap::FromBinaryStream(stream, error); |
| 614 | ASSERT_THAT(idmap, NotNull()); |
| 615 | |
| 616 | std::stringstream test_stream; |
| 617 | TestVisitor visitor(test_stream); |
| 618 | idmap->accept(&visitor); |
| 619 | |
| 620 | ASSERT_EQ(test_stream.str(), |
| 621 | "TestVisitor::visit(Idmap)\n" |
| 622 | "TestVisitor::visit(IdmapHeader)\n" |
| 623 | "TestVisitor::visit(IdmapData)\n" |
| 624 | "TestVisitor::visit(IdmapData::Header)\n" |
| 625 | "TestVisitor::visit(IdmapData::TypeEntry)\n" |
| 626 | "TestVisitor::visit(IdmapData::TypeEntry)\n"); |
| 627 | } |
| 628 | |
Mårten Kongstad | 0eba72a | 2018-11-29 08:23:14 +0100 | [diff] [blame] | 629 | } // namespace android::idmap2 |