Merge "apex: add apex_manifest.pb in file_contexts" am: dd85fd89b0

Original change: https://android-review.googlesource.com/c/platform/build/soong/+/1348942

Change-Id: I1f7e1e6653665faa4cc7a8bc640b3a365a728a23
This commit is contained in:
Jooyung Han
2020-06-25 06:40:25 +00:00
committed by Automerger Merge Worker
3 changed files with 109 additions and 97 deletions

View File

@@ -16,7 +16,6 @@ package apex
import ( import (
"fmt" "fmt"
"path"
"path/filepath" "path/filepath"
"sort" "sort"
"strings" "strings"
@@ -1242,7 +1241,7 @@ type apexBundle struct {
container_certificate_file android.Path container_certificate_file android.Path
container_private_key_file android.Path container_private_key_file android.Path
fileContexts android.Path fileContexts android.WritablePath
// list of files to be included in this apex // list of files to be included in this apex
filesInfo []apexFile filesInfo []apexFile
@@ -2195,22 +2194,6 @@ func (a *apexBundle) GenerateAndroidBuildActions(ctx android.ModuleContext) {
a.installDir = android.PathForModuleInstall(ctx, "apex") a.installDir = android.PathForModuleInstall(ctx, "apex")
a.filesInfo = filesInfo a.filesInfo = filesInfo
if a.properties.ApexType != zipApex {
if a.properties.File_contexts == nil {
a.fileContexts = android.PathForSource(ctx, "system/sepolicy/apex", ctx.ModuleName()+"-file_contexts")
} else {
a.fileContexts = android.PathForModuleSrc(ctx, *a.properties.File_contexts)
if a.Platform() {
if matched, err := path.Match("system/sepolicy/**/*", a.fileContexts.String()); err != nil || !matched {
ctx.PropertyErrorf("file_contexts", "should be under system/sepolicy, but %q", a.fileContexts)
}
}
}
if !android.ExistentPathForSource(ctx, a.fileContexts.String()).Valid() {
ctx.PropertyErrorf("file_contexts", "cannot find file_contexts file: %q", a.fileContexts)
return
}
}
// Optimization. If we are building bundled APEX, for the files that are gathered due to the // Optimization. If we are building bundled APEX, for the files that are gathered due to the
// transitive dependencies, don't place them inside the APEX, but place a symlink pointing // transitive dependencies, don't place them inside the APEX, but place a symlink pointing
// the same library in the system partition, thus effectively sharing the same libraries // the same library in the system partition, thus effectively sharing the same libraries
@@ -2234,6 +2217,8 @@ func (a *apexBundle) GenerateAndroidBuildActions(ctx android.ModuleContext) {
// prepare apex_manifest.json // prepare apex_manifest.json
a.buildManifest(ctx, provideNativeLibs, requireNativeLibs) a.buildManifest(ctx, provideNativeLibs, requireNativeLibs)
a.buildFileContexts(ctx)
a.setCertificateAndPrivateKey(ctx) a.setCertificateAndPrivateKey(ctx)
if a.properties.ApexType == flattenedApex { if a.properties.ApexType == flattenedApex {
a.buildFlattenedApex(ctx) a.buildFlattenedApex(ctx)

View File

@@ -3480,7 +3480,7 @@ func TestApexInVariousPartition(t *testing.T) {
} }
} }
func TestFileContexts(t *testing.T) { func TestFileContexts_FindInDefaultLocationIfNotSet(t *testing.T) {
ctx, _ := testApex(t, ` ctx, _ := testApex(t, `
apex { apex {
name: "myapex", name: "myapex",
@@ -3494,13 +3494,11 @@ func TestFileContexts(t *testing.T) {
} }
`) `)
module := ctx.ModuleForTests("myapex", "android_common_myapex_image") module := ctx.ModuleForTests("myapex", "android_common_myapex_image")
apexRule := module.Rule("apexRule") rule := module.Output("file_contexts")
actual := apexRule.Args["file_contexts"] ensureContains(t, rule.RuleParams.Command, "cat system/sepolicy/apex/myapex-file_contexts")
expected := "system/sepolicy/apex/myapex-file_contexts"
if actual != expected {
t.Errorf("wrong file_contexts. expected %q. actual %q", expected, actual)
} }
func TestFileContexts_ShouldBeUnderSystemSepolicyForSystemApexes(t *testing.T) {
testApexError(t, `"myapex" .*: file_contexts: should be under system/sepolicy`, ` testApexError(t, `"myapex" .*: file_contexts: should be under system/sepolicy`, `
apex { apex {
name: "myapex", name: "myapex",
@@ -3516,7 +3514,9 @@ func TestFileContexts(t *testing.T) {
`, withFiles(map[string][]byte{ `, withFiles(map[string][]byte{
"my_own_file_contexts": nil, "my_own_file_contexts": nil,
})) }))
}
func TestFileContexts_ProductSpecificApexes(t *testing.T) {
testApexError(t, `"myapex" .*: file_contexts: cannot find`, ` testApexError(t, `"myapex" .*: file_contexts: cannot find`, `
apex { apex {
name: "myapex", name: "myapex",
@@ -3532,7 +3532,7 @@ func TestFileContexts(t *testing.T) {
} }
`) `)
ctx, _ = testApex(t, ` ctx, _ := testApex(t, `
apex { apex {
name: "myapex", name: "myapex",
key: "myapex.key", key: "myapex.key",
@@ -3548,15 +3548,13 @@ func TestFileContexts(t *testing.T) {
`, withFiles(map[string][]byte{ `, withFiles(map[string][]byte{
"product_specific_file_contexts": nil, "product_specific_file_contexts": nil,
})) }))
module = ctx.ModuleForTests("myapex", "android_common_myapex_image") module := ctx.ModuleForTests("myapex", "android_common_myapex_image")
apexRule = module.Rule("apexRule") rule := module.Output("file_contexts")
actual = apexRule.Args["file_contexts"] ensureContains(t, rule.RuleParams.Command, "cat product_specific_file_contexts")
expected = "product_specific_file_contexts"
if actual != expected {
t.Errorf("wrong file_contexts. expected %q. actual %q", expected, actual)
} }
ctx, _ = testApex(t, ` func TestFileContexts_SetViaFileGroup(t *testing.T) {
ctx, _ := testApex(t, `
apex { apex {
name: "myapex", name: "myapex",
key: "myapex.key", key: "myapex.key",
@@ -3577,13 +3575,9 @@ func TestFileContexts(t *testing.T) {
`, withFiles(map[string][]byte{ `, withFiles(map[string][]byte{
"product_specific_file_contexts": nil, "product_specific_file_contexts": nil,
})) }))
module = ctx.ModuleForTests("myapex", "android_common_myapex_image") module := ctx.ModuleForTests("myapex", "android_common_myapex_image")
apexRule = module.Rule("apexRule") rule := module.Output("file_contexts")
actual = apexRule.Args["file_contexts"] ensureContains(t, rule.RuleParams.Command, "cat product_specific_file_contexts")
expected = "product_specific_file_contexts"
if actual != expected {
t.Errorf("wrong file_contexts. expected %q. actual %q", expected, actual)
}
} }
func TestApexKeyFromOtherModule(t *testing.T) { func TestApexKeyFromOtherModule(t *testing.T) {

View File

@@ -17,6 +17,7 @@ package apex
import ( import (
"encoding/json" "encoding/json"
"fmt" "fmt"
"path"
"path/filepath" "path/filepath"
"runtime" "runtime"
"sort" "sort"
@@ -231,6 +232,38 @@ func (a *apexBundle) buildManifest(ctx android.ModuleContext, provideNativeLibs,
}) })
} }
func (a *apexBundle) buildFileContexts(ctx android.ModuleContext) {
if a.properties.ApexType == zipApex {
return
}
var fileContexts android.Path
if a.properties.File_contexts == nil {
fileContexts = android.PathForSource(ctx, "system/sepolicy/apex", ctx.ModuleName()+"-file_contexts")
} else {
fileContexts = android.PathForModuleSrc(ctx, *a.properties.File_contexts)
}
if a.Platform() {
if matched, err := path.Match("system/sepolicy/**/*", fileContexts.String()); err != nil || !matched {
ctx.PropertyErrorf("file_contexts", "should be under system/sepolicy, but %q", fileContexts)
return
}
}
if !android.ExistentPathForSource(ctx, fileContexts.String()).Valid() {
ctx.PropertyErrorf("file_contexts", "cannot find file_contexts file: %q", a.fileContexts)
return
}
output := android.PathForModuleOut(ctx, "file_contexts")
rule := android.NewRuleBuilder()
rule.Command().Text("rm").FlagWithOutput("-f ", output)
rule.Command().Text("cat").Input(fileContexts).Text(">>").Output(output)
rule.Command().Text("echo").Text(">>").Output(output)
rule.Command().Text("echo").Flag("/apex_manifest\\\\.pb u:object_r:system_file:s0").Text(">>").Output(output)
rule.Build(pctx, ctx, "file_contexts."+a.Name(), "Generate file_contexts")
a.fileContexts = output.OutputPath
}
func (a *apexBundle) buildNoticeFiles(ctx android.ModuleContext, apexFileName string) android.NoticeOutputs { func (a *apexBundle) buildNoticeFiles(ctx android.ModuleContext, apexFileName string) android.NoticeOutputs {
var noticeFiles android.Paths var noticeFiles android.Paths