Skip RemoteProvisioner tests if read-only flag is set

Add a second, read-only build flag indicating that rkpd is enabled.
This flag is not server controlled, and thus cannot be disabled.

Platforms, such as cuttlefish, are RKP only, and are using a new
version of keymint that is not compatible with the old
RemoteProvisioner. Therefore, we must ensure that the configuration
is fixed and cannot be turned off.

Bug: 266482839
Test: RemoteProvisionerUnitTests
Test: keystore2_client_tests
Test: RkpdAppUnitTests
Change-Id: I882ad4c833984ed96fd21997c517770b9d4c8c02
7 files changed
tree: f6112a277cdb7bce7883e0d18bade592db0b6b08
  1. res/
  2. src/
  3. tests/
  4. Android.bp
  5. AndroidManifest.xml
  6. OWNERS
  7. PREUPLOAD.cfg
  8. proguard.flags
  9. README.md
  10. TEST_MAPPING
README.md

RemoteProvisioner Platform Application

RemoteProvisioner is the application responsible for driving the provisioning process for Remote Key Provisioning (RKP) between the device and server.

Primary Features

Periodic Provisioning

The application registers a periodic job using WorkManager. This job is scheduled to run once every ~24 hours in order to check the status of the attestation key pool and determine if further provisioning is needed. An active network connection is set as a prerequisite for the job to be executed.

On Demand Provisioning

RemoteProvisioner publishes an implementation of the IGenerateRkpKeyService. The Keystore frameworks code registers with this interface and notifies the application whenever the following conditions are met:

  1. An attested key is generated by an application, meaning an RKP key may have been consumed.
  2. Key generation is attempted, but fails due to no available attestation keys.

In the event of (1), the application will just check the key pool state in Keystore to determine if provisioning should be executed immediately, rather than waiting for the periodic provisioning check. In the event of (2), the binder call will block until the RemoteProvisioner can complete a provisioning step, allowing the original key generation request from the frameworks to seamlessly attempt generation again using one of the newly provisioned keys.

Widevine Provisioning

The RemoteProvisioner will also check the status of Widevine on device during boot. There are two relevant details to check before the application will take any further action related to Widevine:

  1. Check if the Widevine instance on device is based on the Provisioning 4.0 model.
  2. If (1) then check if the device is unprovisioned.

If (1) and (2) are both true, the application will create a separate Widevine job which will trigger once network is made available in order to attempt to provision the stage 1 Widevine certificate before it's needed by other streaming services on device.

This exists as a convenience step, and should only ever run one time for a given device unless it is factory reset.

Device to Server Communication

Server-controlled Device Configuration

The device code is written such that a backing server implementation can set some variables on the application side, stored in SharedPreferences. These preferences are managed by SettingsManager. Server configurable variables include:

  • Key Expiration: How many hours into the future should the application check when considering if a key will be expiring soon.
  • Extra Keys: How many additional unassigned attestation keys should the device ideally keep ready in order to service attestation requests from new applications.
  • URL: A new URL to use, intended to be used to migrate a device to newer versions of the backing web API if necessary.

All or none of these variables may be present when the device receives them during a fetchEek request. Notably, the device also generates and sets an ID that it sends to the server during this fetchEek request, along with its build fingerprint. This allows the backend to configure different options for different device models if necessary, while supporting controlled rollout of new changes.

Testing

There are several test build targets defined within this repository. Each suite can be run by executing atest <<name>> from a terminal and Android checkout that is initialized with lunch.

RemoteProvisionerUnitTests

These tests exercise and validate the expected functionality of the entire remote provisioning tech stack for the device. This suite includes full end-to-end tests which coordinate a provisioning step between the device and the backend server infrastructure.

RemoteProvisionerRegistrationTest

This test verifies that the device has been registered with the backend server. It sends a CSR to the backend and waits to see if the server returns a response indicating that the device public key was not recognized - HTTP Error 444.

RemoteProvisionerHostTests

These tests validate behavior which requires host orchestration that would not be doable in RemoteProvisionerUnitTests. This is primarily related to validation of service behavior along with metrics collection.

RemoteProvisionerPerfTests

These tests measure the round-trip performance in terms of time taken to send a certificate request and receive the certificates from the remote provisioning server.