electron/spec/asar-integrity-spec.ts

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

192 строки
7.2 KiB
TypeScript
Исходник Постоянная ссылка Обычный вид История

import { getRawHeader } from '@electron/asar';
import { flipFuses, FuseV1Config, FuseV1Options, FuseVersion } from '@electron/fuses';
import { resedit } from '@electron/packager/dist/resedit';
import { expect } from 'chai';
import * as originalFs from 'node:original-fs';
import * as cp from 'node:child_process';
import * as nodeCrypto from 'node:crypto';
import * as fs from 'node:fs';
import * as os from 'node:os';
import * as path from 'node:path';
import { copyApp } from './lib/fs-helpers';
import { ifdescribe } from './lib/spec-helpers';
const bufferReplace = (haystack: Buffer, needle: string, replacement: string, throwOnMissing = true): Buffer => {
const needleBuffer = Buffer.from(needle);
const idx = haystack.indexOf(needleBuffer);
if (idx === -1) {
if (throwOnMissing) throw new Error(`Needle ${needle} not found in haystack`);
return haystack;
}
const before = haystack.slice(0, idx);
const after = bufferReplace(haystack.slice(idx + needleBuffer.length), needle, replacement, false);
const len = idx + replacement.length + after.length;
return Buffer.concat([before, Buffer.from(replacement), after], len);
};
type SpawnResult = { code: number | null, out: string, signal: NodeJS.Signals | null };
function spawn (cmd: string, args: string[], opts: any = {}) {
let out = '';
const child = cp.spawn(cmd, args, opts);
child.stdout.on('data', (chunk: Buffer) => {
out += chunk.toString();
});
child.stderr.on('data', (chunk: Buffer) => {
out += chunk.toString();
});
return new Promise<SpawnResult>((resolve) => {
child.on('exit', (code, signal) => {
resolve({
code,
signal,
out
});
});
});
};
const expectToHaveCrashed = (res: SpawnResult) => {
if (process.platform === 'win32') {
expect(res.code).to.not.equal(0);
expect(res.code).to.not.equal(null);
expect(res.signal).to.equal(null);
} else {
expect(res.code).to.equal(null);
chore: bump chromium to 131.0.6744.0 (main) (#43948) * chore: bump chromium in DEPS to 131.0.6738.0 * chore: bump chromium in DEPS to 131.0.6740.0 * 5889025: [LaCrOS] Remove LaCrOS screen capturer. | https://chromium-review.googlesource.com/c/chromium/src/+/5889025 * https://boringssl.googlesource.com/boringssl.git/+/40dd94116ba03678226443ba20c5887459c9bf16/crypto/fipsmodule/digest/digests.c.inc * chore: update patches * 5878695: Add IsolationInfo for embedders handling external protocols | https://chromium-review.googlesource.com/c/chromium/src/+/5878695 * 5854304: [UI] Remove alias of mojom | https://chromium-review.googlesource.com/c/chromium/src/+/5854304 * chore: bump chromium in DEPS to 131.0.6742.0 * chore: update patches * chore: bump chromium in DEPS to 131.0.6744.0 * fixup! 5889025: [LaCrOS] Remove LaCrOS screen capturer. | https://chromium-review.googlesource.com/c/chromium/src/+/5889025 * chore: e patches all * chore: update chore_provide_iswebcontentscreationoverridden_with_full_params.patch Xref: https://chromium-review.googlesource.com/c/chromium/src/+/5894233 * [UI] Remove alias of mojom 'WindowShowState' Xref: https://chromium-review.googlesource.com/c/chromium/src/+/5854304 * chore: gen-libc++-filenames.js * chore: partially revert https://chromium-review.googlesource.com/c/chromium/src/+/5894233 see patch commit message for description * Clean up stale base::Feature "kFileSystemAccessLocalUNCPathBlock" This feature is always on by default and doesn't have active finch experiments. Xref: https://chromium-review.googlesource.com/c/chromium/src/+/5881253 * fix: asar integrity test recognizes SIGABRT as a crash https://chromium-review.googlesource.com/c/chromium/src/+/5882758 ValidateIntegrityOrDie() exits via LOG(FATAL)'s call to base::ImmediateCrash(). There's been churn there upstream between 5332940 and 5882758 on whether to use SIGTRAP or SIGABRT. For now, let's accept both until the churn is done. --------- Co-authored-by: electron-roller[bot] <84116207+electron-roller[bot]@users.noreply.github.com> Co-authored-by: alice <alice@makenotion.com> Co-authored-by: Charles Kerr <charles@charleskerr.com>
2024-09-30 15:54:44 +03:00
expect(res.signal).to.be.oneOf(['SIGABRT', 'SIGTRAP']);
}
};
describe('fuses', function () {
this.timeout(120000);
let tmpDir: string;
let appPath: string;
const launchApp = (args: string[] = []) => {
if (process.platform === 'darwin') {
return spawn(path.resolve(appPath, 'Contents/MacOS/Electron'), args);
}
return spawn(appPath, args);
};
const ensureFusesBeforeEach = (fuses: Omit<FuseV1Config<boolean>, 'version' | 'strictlyRequireAllFuses' | 'resetAdhocDarwinSignature'>) => {
beforeEach(async () => {
await flipFuses(appPath, {
version: FuseVersion.V1,
resetAdHocDarwinSignature: true,
...fuses
});
});
};
beforeEach(async () => {
tmpDir = await fs.promises.mkdtemp(path.resolve(os.tmpdir(), 'electron-asar-integrity-spec-'));
appPath = await copyApp(tmpDir);
});
afterEach(async () => {
for (let attempt = 0; attempt <= 3; attempt++) {
// Sometimes windows holds on to a DLL during the crash for a little bit, so we try a few times to delete it
if (attempt > 0) await new Promise((resolve) => setTimeout(resolve, 500 * attempt));
try {
await originalFs.promises.rm(tmpDir, { recursive: true });
break;
} catch {}
}
});
ifdescribe((process.platform === 'win32' && process.arch !== 'arm64') || process.platform === 'darwin')('ASAR Integrity', () => {
let pathToAsar: string;
beforeEach(async () => {
if (process.platform === 'darwin') {
pathToAsar = path.resolve(appPath, 'Contents', 'Resources', 'default_app.asar');
} else {
pathToAsar = path.resolve(path.dirname(appPath), 'resources', 'default_app.asar');
}
if (process.platform === 'win32') {
await resedit(appPath, {
asarIntegrity: {
'resources\\default_app.asar': {
algorithm: 'SHA256',
hash: nodeCrypto.createHash('sha256').update(getRawHeader(pathToAsar).headerString).digest('hex')
}
}
});
}
});
describe('when enabled', () => {
ensureFusesBeforeEach({
[FuseV1Options.EnableEmbeddedAsarIntegrityValidation]: true
});
it('opens normally when unmodified', async () => {
const res = await launchApp([path.resolve(__dirname, 'fixtures/apps/hello/hello.js')]);
expect(res.code).to.equal(0);
expect(res.signal).to.equal(null);
expect(res.out).to.include('alive');
});
it('fatals if the integrity header does not match', async () => {
const asar = await originalFs.promises.readFile(pathToAsar);
// Ensure that the header still starts with the same thing, if build system
// things result in the header changing we should update this test
expect(asar.toString()).to.contain('{"files":{"default_app.js"');
await originalFs.promises.writeFile(pathToAsar, bufferReplace(asar, '{"files":{"default_app.js"', '{"files":{"default_oop.js"'));
const res = await launchApp(['--version']);
expectToHaveCrashed(res);
expect(res.out).to.include('Integrity check failed for asar archive');
});
it('fatals if a loaded main process JS file does not match', async () => {
const asar = await originalFs.promises.readFile(pathToAsar);
// Ensure that the header still starts with the same thing, if build system
// things result in the header changing we should update this test
expect(asar.toString()).to.contain('Invalid Usage');
await originalFs.promises.writeFile(pathToAsar, bufferReplace(asar, 'Invalid Usage', 'VVValid Usage'));
const res = await launchApp(['--version']);
expect(res.code).to.equal(1);
expect(res.signal).to.equal(null);
expect(res.out).to.include('ASAR Integrity Violation: got a hash mismatch');
});
it('fatals if a renderer content file does not match', async () => {
const asar = await originalFs.promises.readFile(pathToAsar);
// Ensure that the header still starts with the same thing, if build system
// things result in the header changing we should update this test
expect(asar.toString()).to.contain('require-trusted-types-for');
await originalFs.promises.writeFile(pathToAsar, bufferReplace(asar, 'require-trusted-types-for', 'require-trusted-types-not'));
const res = await launchApp();
expectToHaveCrashed(res);
expect(res.out).to.include('Failed to validate block while ending ASAR file stream');
});
});
describe('when disabled', () => {
ensureFusesBeforeEach({
[FuseV1Options.EnableEmbeddedAsarIntegrityValidation]: false
});
it('does nothing if the integrity header does not match', async () => {
const asar = await originalFs.promises.readFile(pathToAsar);
// Ensure that the header still starts with the same thing, if build system
// things result in the header changing we should update this test
expect(asar.toString()).to.contain('{"files":{"default_app.js"');
await originalFs.promises.writeFile(pathToAsar, bufferReplace(asar, '{"files":{"default_app.js"', '{"files":{"default_oop.js"'));
const res = await launchApp(['--version']);
expect(res.code).to.equal(0);
});
});
});
});