Add scripts to mount/unmount the Runtime APEX under ART's chroot dir.

These scripts (`tools/` and
`tools/`) emulate the role of `apexd` under
the chroot directory for chroot-based on-device testing.

They currently only handle the Runtime APEX (, but
we plan to use them to also activate/deactivate other packages
(required by ART's standalone test setup) in the future.

- Provide an `/apex' tmpfs under the choot directory as part of the
  device set-up.
- Build and push `unzip` during (chroot-based) on-device testing, as
  it is needed to extract payload (ext4 images) from APEX(ex).

Test: Manual local testing.
Bug: 121117762
Bug: 113373927
Bug: 34729697
Change-Id: Id1a7b3378ea5822c511d6cc74f784fa38ddd4968
5 files changed