blob: 06dea3bbfe329c058a0178edbf6b23e88c2fe10b [file] [log] [blame]
# Copyright 2014 The ChromiumOS Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
CROS_WORKON_COMMIT="8b6e11a069e490c761cdab7ab3ff59434806cd9c"
CROS_WORKON_TREE=("41d899585b7a07ea908a0cca2944a7b8a4d13655" "0d9d2046eb78dc8620f7594f245298f9fd964832" "faa5b8036561b66b5b9d79ea1af8a95927a0ae0f" "f73f25bb045d099841b3ac929b6d3218060216df" "f91b6afd5f2ae04ee9a2c19109a3a4a36f7659e6")
CROS_WORKON_INCREMENTAL_BUILD=1
CROS_WORKON_LOCALNAME="platform2"
CROS_WORKON_PROJECT="chromiumos/platform2"
CROS_WORKON_OUTOFTREE_BUILD=1
CROS_WORKON_SUBTREE="common-mk libhwsec-foundation metrics trunks .gn"
PLATFORM_SUBDIR="trunks"
inherit cros-workon platform user
DESCRIPTION="Trunks service for Chromium OS"
HOMEPAGE="https://chromium.googlesource.com/chromiumos/platform2/+/HEAD/trunks/"
LICENSE="BSD-Google"
KEYWORDS="*"
IUSE="
cr50_onboard
csme_emulator
fuzzer
ftdi_tpm
generic_tpm2
pinweaver_csme
profiling
test
ti50_onboard
tpm_dynamic
tpm2_simulator
"
REQUIRED_USE="
?? ( cr50_onboard pinweaver_csme )
"
# This depends on protobuf because it uses protoc and needs to be rebuilt
# whenever the protobuf library is updated since generated source files may be
# incompatible across different versions of the protobuf library.
COMMON_DEPEND="
>=chromeos-base/metrics-0.0.1-r3152:=
chromeos-base/minijail:=
chromeos-base/power_manager-client:=
ftdi_tpm? ( dev-embedded/libftdi:= )
test? ( chromeos-base/tpm2:=[test] )
tpm2_simulator? ( chromeos-base/tpm2-simulator:= )
dev-cpp/abseil-cpp:=
dev-libs/openssl:=
dev-libs/protobuf:=
fuzzer? (
dev-cpp/gtest:=
)
chromeos-base/pinweaver:=
"
RDEPEND="
${COMMON_DEPEND}
cr50_onboard? ( chromeos-base/chromeos-cr50 )
ti50_onboard? ( chromeos-base/chromeos-ti50 )
generic_tpm2? ( chromeos-base/chromeos-cr50-scripts )
!tpm_dynamic? ( !app-crypt/tpm-tools )
chromeos-base/libhwsec-foundation
"
DEPEND="
${COMMON_DEPEND}
chromeos-base/chromeos-ec-headers:=
"
BDEPEND="
chromeos-base/minijail
dev-libs/protobuf
"
src_install() {
platform_src_install
insinto /etc/dbus-1/system.d
doins org.chromium.Trunks.conf
if use tpm_dynamic; then
sed -i '/env TPM_DYNAMIC=/s:=.*:=true:' \
"${D}/etc/init/trunksd.conf" ||
die "Can't activate tpm_dynamic in trunksd.conf"
fi
if use pinweaver_csme && use generic_tpm2; then
newins csme/tpm_tunneld.conf tpm_tunneld.conf
fi
dosbin "${OUT}"/pinweaver_client
dosbin "${OUT}"/trunks_client
dosbin "${OUT}"/trunks_send
if use tpm_dynamic; then
newsbin tpm_version tpm2_version
else
dosbin tpm_version
fi
dosbin "${OUT}"/trunksd
dolib.so "${OUT}"/lib/libtrunks.so
# trunks_test library implements trunks mocks which
# are used by unittest and fuzzer.
if use test || use fuzzer; then
dolib.a "${OUT}"/libtrunks_test.a
dolib.a "${OUT}"/libtrunksd_lib.a
fi
if use pinweaver_csme && use generic_tpm2; then
dosbin "${OUT}"/pinweaver_provision
dosbin "${OUT}"/tpm_tunneld
fi
insinto /usr/share/policy
newins "trunksd-seccomp-${ARCH}.policy" trunksd-seccomp.policy
if use pinweaver_csme && use generic_tpm2; then
newins "csme/tpm_tunneld-seccomp-${ARCH}.policy" tpm_tunneld-seccomp.policy
fi
insinto /usr/include/trunks
doins ./*.h
doins "${OUT}"/gen/include/trunks/*.h
insinto /usr/include/trunks/csme
doins csme/pinweaver_provision.h
doins csme/pinweaver_provision_impl.h
insinto /usr/include/proto
doins "${S}"/pinweaver.proto
insinto /usr/include/chromeos/dbus/trunks
doins "${S}"/trunks_interface.proto
insinto "/usr/$(get_libdir)/pkgconfig"
doins "${OUT}"/obj/trunks/libtrunks.pc
local fuzzer_component_id="1281105"
platform_fuzzer_install "${S}"/OWNERS "${OUT}"/trunks_creation_blob_fuzzer \
--comp "${fuzzer_component_id}"
platform_fuzzer_install "${S}"/OWNERS \
"${OUT}"/trunks_hmac_authorization_delegate_fuzzer \
--comp "${fuzzer_component_id}"
platform_fuzzer_install "${S}"/OWNERS "${OUT}"/trunks_key_blob_fuzzer \
--comp "${fuzzer_component_id}"
platform_fuzzer_install "${S}"/OWNERS \
"${OUT}"/trunks_password_authorization_delegate_fuzzer \
--comp "${fuzzer_component_id}"
platform_fuzzer_install "${S}"/OWNERS "${OUT}"/trunks_resource_manager_fuzzer \
--comp "${fuzzer_component_id}"
platform_fuzzer_install "${S}"/OWNERS "${OUT}"/trunks_tpm_pinweaver_fuzzer \
--comp "${fuzzer_component_id}"
# Allow specific syscalls for profiling.
# TODO (b/242806964): Need a better approach for fixing up the seccomp policy
# related issues (i.e. fix with a single function call)
if use profiling; then
echo -e "\n# Syscalls added for profiling case only.\nmkdir: 1\nftruncate: 1\nuname: 1\n" >> \
"${D}/usr/share/policy/trunksd-seccomp.policy"
fi
}
platform_pkg_test() {
"${S}/generator/generator_test.py" || die
local tests=(
trunks_testrunner
)
local test_bin
for test_bin in "${tests[@]}"; do
platform_test "run" "${OUT}/${test_bin}"
done
}
pkg_preinst() {
enewuser trunks
enewgroup trunks
if use pinweaver_csme && use generic_tpm2; then
enewuser tpm_tunneld
enewgroup tpm_tunneld
fi
}