blob: 5cb91d713db7172bc56fc9fd8785fe41830a68fe [file] [log] [blame]
Mårten Kongstad02751232018-04-27 13:16:32 +02001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Ryan Mitchell52e1f7a2019-04-12 12:31:42 -070017#include "idmap2/Idmap.h"
18
Mårten Kongstad02751232018-04-27 13:16:32 +020019#include <algorithm>
20#include <iostream>
21#include <iterator>
22#include <limits>
23#include <map>
24#include <memory>
25#include <set>
26#include <string>
27#include <utility>
28#include <vector>
29
30#include "android-base/macros.h"
31#include "android-base/stringprintf.h"
32#include "androidfw/AssetManager2.h"
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -070033#include "idmap2/ResourceMapping.h"
Mårten Kongstad02751232018-04-27 13:16:32 +020034#include "idmap2/ResourceUtils.h"
Mårten Kongstad0f763112018-11-19 14:14:37 +010035#include "idmap2/Result.h"
Mårten Kongstad4cbb0072018-11-30 16:22:05 +010036#include "idmap2/SysTrace.h"
Mårten Kongstad02751232018-04-27 13:16:32 +020037#include "idmap2/ZipFile.h"
Ryan Mitchell52e1f7a2019-04-12 12:31:42 -070038#include "utils/String16.h"
39#include "utils/String8.h"
Mårten Kongstad02751232018-04-27 13:16:32 +020040
Mårten Kongstad0eba72a2018-11-29 08:23:14 +010041namespace android::idmap2 {
Mårten Kongstad02751232018-04-27 13:16:32 +020042
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010043namespace {
44
Ryan Mitchelle753ffe2019-09-23 09:47:02 -070045bool WARN_UNUSED Read8(std::istream& stream, uint8_t* out) {
46 uint8_t value;
47 if (stream.read(reinterpret_cast<char*>(&value), sizeof(uint8_t))) {
48 *out = value;
Mårten Kongstad02751232018-04-27 13:16:32 +020049 return true;
50 }
51 return false;
52}
53
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010054bool WARN_UNUSED Read32(std::istream& stream, uint32_t* out) {
Mårten Kongstad02751232018-04-27 13:16:32 +020055 uint32_t value;
56 if (stream.read(reinterpret_cast<char*>(&value), sizeof(uint32_t))) {
57 *out = dtohl(value);
58 return true;
59 }
60 return false;
61}
62
Ryan Mitchelle753ffe2019-09-23 09:47:02 -070063bool WARN_UNUSED ReadBuffer(std::istream& stream, std::unique_ptr<uint8_t[]>* out, size_t length) {
64 auto buffer = std::unique_ptr<uint8_t[]>(new uint8_t[length]);
65 if (stream.read(reinterpret_cast<char*>(buffer.get()), length)) {
66 *out = std::move(buffer);
67 return true;
68 }
69 return false;
70}
71
Mårten Kongstad02751232018-04-27 13:16:32 +020072// a string is encoded as a kIdmapStringLength char array; the array is always null-terminated
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010073bool WARN_UNUSED ReadString(std::istream& stream, char out[kIdmapStringLength]) {
Mårten Kongstad02751232018-04-27 13:16:32 +020074 char buf[kIdmapStringLength];
75 memset(buf, 0, sizeof(buf));
76 if (!stream.read(buf, sizeof(buf))) {
77 return false;
78 }
79 if (buf[sizeof(buf) - 1] != '\0') {
80 return false;
81 }
82 memcpy(out, buf, sizeof(buf));
83 return true;
84}
85
Mårten Kongstad9371dc12019-01-22 14:35:12 +010086Result<uint32_t> GetCrc(const ZipFile& zip) {
87 const Result<uint32_t> a = zip.Crc("resources.arsc");
88 const Result<uint32_t> b = zip.Crc("AndroidManifest.xml");
Mårten Kongstad49d835d2019-01-31 10:50:48 +010089 return a && b
90 ? Result<uint32_t>(*a ^ *b)
Mårten Kongstadce424902019-03-01 08:35:37 +010091 : Error("failed to get CRC for \"%s\"", a ? "AndroidManifest.xml" : "resources.arsc");
Mårten Kongstad9371dc12019-01-22 14:35:12 +010092}
93
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010094} // namespace
95
Mårten Kongstad02751232018-04-27 13:16:32 +020096std::unique_ptr<const IdmapHeader> IdmapHeader::FromBinaryStream(std::istream& stream) {
97 std::unique_ptr<IdmapHeader> idmap_header(new IdmapHeader());
98
99 if (!Read32(stream, &idmap_header->magic_) || !Read32(stream, &idmap_header->version_) ||
100 !Read32(stream, &idmap_header->target_crc_) || !Read32(stream, &idmap_header->overlay_crc_) ||
101 !ReadString(stream, idmap_header->target_path_) ||
102 !ReadString(stream, idmap_header->overlay_path_)) {
103 return nullptr;
104 }
105
106 return std::move(idmap_header);
107}
108
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100109Result<Unit> IdmapHeader::IsUpToDate() const {
Mårten Kongstad02751232018-04-27 13:16:32 +0200110 if (magic_ != kIdmapMagic) {
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100111 return Error("bad magic: actual 0x%08x, expected 0x%08x", magic_, kIdmapMagic);
Mårten Kongstad02751232018-04-27 13:16:32 +0200112 }
113
114 if (version_ != kIdmapCurrentVersion) {
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100115 return Error("bad version: actual 0x%08x, expected 0x%08x", version_, kIdmapCurrentVersion);
Mårten Kongstad02751232018-04-27 13:16:32 +0200116 }
117
118 const std::unique_ptr<const ZipFile> target_zip = ZipFile::Open(target_path_);
119 if (!target_zip) {
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100120 return Error("failed to open target %s", GetTargetPath().to_string().c_str());
Mårten Kongstad02751232018-04-27 13:16:32 +0200121 }
122
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100123 Result<uint32_t> target_crc = GetCrc(*target_zip);
Mårten Kongstad0f763112018-11-19 14:14:37 +0100124 if (!target_crc) {
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100125 return Error("failed to get target crc");
Mårten Kongstad02751232018-04-27 13:16:32 +0200126 }
127
Mårten Kongstad0f763112018-11-19 14:14:37 +0100128 if (target_crc_ != *target_crc) {
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100129 return Error("bad target crc: idmap version 0x%08x, file system version 0x%08x", target_crc_,
130 *target_crc);
Mårten Kongstad02751232018-04-27 13:16:32 +0200131 }
132
133 const std::unique_ptr<const ZipFile> overlay_zip = ZipFile::Open(overlay_path_);
134 if (!overlay_zip) {
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100135 return Error("failed to open overlay %s", GetOverlayPath().to_string().c_str());
Mårten Kongstad02751232018-04-27 13:16:32 +0200136 }
137
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100138 Result<uint32_t> overlay_crc = GetCrc(*overlay_zip);
Mårten Kongstad0f763112018-11-19 14:14:37 +0100139 if (!overlay_crc) {
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100140 return Error("failed to get overlay crc");
Mårten Kongstad02751232018-04-27 13:16:32 +0200141 }
142
Mårten Kongstad0f763112018-11-19 14:14:37 +0100143 if (overlay_crc_ != *overlay_crc) {
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100144 return Error("bad overlay crc: idmap version 0x%08x, file system version 0x%08x", overlay_crc_,
145 *overlay_crc);
Mårten Kongstad02751232018-04-27 13:16:32 +0200146 }
147
Mårten Kongstad0c6ff1d2019-02-07 02:21:56 +0100148 return Unit{};
Mårten Kongstad02751232018-04-27 13:16:32 +0200149}
150
151std::unique_ptr<const IdmapData::Header> IdmapData::Header::FromBinaryStream(std::istream& stream) {
152 std::unique_ptr<IdmapData::Header> idmap_data_header(new IdmapData::Header());
153
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700154 if (!Read8(stream, &idmap_data_header->target_package_id_) ||
155 !Read8(stream, &idmap_data_header->overlay_package_id_) ||
156 !Read32(stream, &idmap_data_header->target_entry_count) ||
157 !Read32(stream, &idmap_data_header->overlay_entry_count) ||
158 !Read32(stream, &idmap_data_header->string_pool_index_offset) ||
159 !Read32(stream, &idmap_data_header->string_pool_len)) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200160 return nullptr;
161 }
Mårten Kongstad02751232018-04-27 13:16:32 +0200162
163 return std::move(idmap_data_header);
164}
165
Mårten Kongstad02751232018-04-27 13:16:32 +0200166std::unique_ptr<const IdmapData> IdmapData::FromBinaryStream(std::istream& stream) {
167 std::unique_ptr<IdmapData> data(new IdmapData());
168 data->header_ = IdmapData::Header::FromBinaryStream(stream);
169 if (!data->header_) {
170 return nullptr;
171 }
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700172 // Read the mapping of target resource id to overlay resource value.
173 for (size_t i = 0; i < data->header_->GetTargetEntryCount(); i++) {
174 TargetEntry target_entry{};
175 if (!Read32(stream, &target_entry.target_id) || !Read8(stream, &target_entry.data_type) ||
176 !Read32(stream, &target_entry.data_value)) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200177 return nullptr;
178 }
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700179 data->target_entries_.emplace_back(target_entry);
Mårten Kongstad02751232018-04-27 13:16:32 +0200180 }
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700181
182 // Read the mapping of overlay resource id to target resource id.
183 for (size_t i = 0; i < data->header_->GetOverlayEntryCount(); i++) {
184 OverlayEntry overlay_entry{};
185 if (!Read32(stream, &overlay_entry.overlay_id) || !Read32(stream, &overlay_entry.target_id)) {
186 return nullptr;
187 }
188 data->overlay_entries_.emplace_back(overlay_entry);
189 }
190
191 // Read raw string pool bytes.
192 if (!ReadBuffer(stream, &data->string_pool_, data->header_->string_pool_len)) {
193 return nullptr;
194 }
195
Mårten Kongstad02751232018-04-27 13:16:32 +0200196 return std::move(data);
197}
198
199std::string Idmap::CanonicalIdmapPathFor(const std::string& absolute_dir,
200 const std::string& absolute_apk_path) {
201 assert(absolute_dir.size() > 0 && absolute_dir[0] == "/");
202 assert(absolute_apk_path.size() > 0 && absolute_apk_path[0] == "/");
203 std::string copy(++absolute_apk_path.cbegin(), absolute_apk_path.cend());
204 replace(copy.begin(), copy.end(), '/', '@');
205 return absolute_dir + "/" + copy + "@idmap";
206}
207
Mårten Kongstadce424902019-03-01 08:35:37 +0100208Result<std::unique_ptr<const Idmap>> Idmap::FromBinaryStream(std::istream& stream) {
Mårten Kongstad4cbb0072018-11-30 16:22:05 +0100209 SYSTRACE << "Idmap::FromBinaryStream";
Mårten Kongstad02751232018-04-27 13:16:32 +0200210 std::unique_ptr<Idmap> idmap(new Idmap());
211
212 idmap->header_ = IdmapHeader::FromBinaryStream(stream);
213 if (!idmap->header_) {
Mårten Kongstadce424902019-03-01 08:35:37 +0100214 return Error("failed to parse idmap header");
Mårten Kongstad02751232018-04-27 13:16:32 +0200215 }
216
217 // idmap version 0x01 does not specify the number of data blocks that follow
218 // the idmap header; assume exactly one data block
219 for (int i = 0; i < 1; i++) {
220 std::unique_ptr<const IdmapData> data = IdmapData::FromBinaryStream(stream);
221 if (!data) {
Mårten Kongstadce424902019-03-01 08:35:37 +0100222 return Error("failed to parse data block %d", i);
Mårten Kongstad02751232018-04-27 13:16:32 +0200223 }
224 idmap->data_.push_back(std::move(data));
225 }
226
Mårten Kongstadce424902019-03-01 08:35:37 +0100227 return {std::move(idmap)};
Mårten Kongstad02751232018-04-27 13:16:32 +0200228}
229
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700230Result<std::unique_ptr<const IdmapData>> IdmapData::FromResourceMapping(
231 const ResourceMapping& resource_mapping) {
232 if (resource_mapping.GetTargetToOverlayMap().empty()) {
233 return Error("no resources were overlaid");
234 }
235
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700236 std::unique_ptr<IdmapData> data(new IdmapData());
237 for (const auto& mappings : resource_mapping.GetTargetToOverlayMap()) {
238 data->target_entries_.emplace_back(IdmapData::TargetEntry{
239 mappings.first, mappings.second.data_type, mappings.second.data_value});
Ryan Mitchell4c09a4a2019-03-08 08:57:48 -0800240 }
241
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700242 for (const auto& mappings : resource_mapping.GetOverlayToTargetMap()) {
243 data->overlay_entries_.emplace_back(IdmapData::OverlayEntry{mappings.first, mappings.second});
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700244 }
245
246 std::unique_ptr<IdmapData::Header> data_header(new IdmapData::Header());
247 data_header->target_package_id_ = resource_mapping.GetTargetPackageId();
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700248 data_header->overlay_package_id_ = resource_mapping.GetOverlayPackageId();
249 data_header->target_entry_count = static_cast<uint32_t>(data->target_entries_.size());
250 data_header->overlay_entry_count = static_cast<uint32_t>(data->overlay_entries_.size());
251 data_header->string_pool_index_offset = resource_mapping.GetStringPoolOffset();
252
253 const auto string_pool_data = resource_mapping.GetStringPoolData();
254 data_header->string_pool_len = string_pool_data.second;
255 data->string_pool_ = std::unique_ptr<uint8_t[]>(new uint8_t[data_header->string_pool_len]);
256 memcpy(data->string_pool_.get(), string_pool_data.first, data_header->string_pool_len);
257
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700258 data->header_ = std::move(data_header);
259 return {std::move(data)};
Ryan Mitchell4c09a4a2019-03-08 08:57:48 -0800260}
261
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700262Result<std::unique_ptr<const Idmap>> Idmap::FromApkAssets(const ApkAssets& target_apk_assets,
Mårten Kongstadce424902019-03-01 08:35:37 +0100263 const ApkAssets& overlay_apk_assets,
264 const PolicyBitmask& fulfilled_policies,
265 bool enforce_overlayable) {
Mårten Kongstad4cbb0072018-11-30 16:22:05 +0100266 SYSTRACE << "Idmap::FromApkAssets";
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700267 const std::string& target_apk_path = target_apk_assets.GetPath();
268 const std::string& overlay_apk_path = overlay_apk_assets.GetPath();
Mårten Kongstad02751232018-04-27 13:16:32 +0200269
270 const std::unique_ptr<const ZipFile> target_zip = ZipFile::Open(target_apk_path);
271 if (!target_zip) {
Mårten Kongstadce424902019-03-01 08:35:37 +0100272 return Error("failed to open target as zip");
Mårten Kongstad02751232018-04-27 13:16:32 +0200273 }
274
275 const std::unique_ptr<const ZipFile> overlay_zip = ZipFile::Open(overlay_apk_path);
276 if (!overlay_zip) {
Mårten Kongstadce424902019-03-01 08:35:37 +0100277 return Error("failed to open overlay as zip");
Mårten Kongstad02751232018-04-27 13:16:32 +0200278 }
279
280 std::unique_ptr<IdmapHeader> header(new IdmapHeader());
281 header->magic_ = kIdmapMagic;
282 header->version_ = kIdmapCurrentVersion;
Mårten Kongstad0f763112018-11-19 14:14:37 +0100283
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100284 Result<uint32_t> crc = GetCrc(*target_zip);
Mårten Kongstad0f763112018-11-19 14:14:37 +0100285 if (!crc) {
Mårten Kongstadce424902019-03-01 08:35:37 +0100286 return Error(crc.GetError(), "failed to get zip CRC for target");
Mårten Kongstad02751232018-04-27 13:16:32 +0200287 }
Mårten Kongstad0f763112018-11-19 14:14:37 +0100288 header->target_crc_ = *crc;
289
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100290 crc = GetCrc(*overlay_zip);
Mårten Kongstad0f763112018-11-19 14:14:37 +0100291 if (!crc) {
Mårten Kongstadce424902019-03-01 08:35:37 +0100292 return Error(crc.GetError(), "failed to get zip CRC for overlay");
Mårten Kongstad02751232018-04-27 13:16:32 +0200293 }
Mårten Kongstad0f763112018-11-19 14:14:37 +0100294 header->overlay_crc_ = *crc;
Mårten Kongstad02751232018-04-27 13:16:32 +0200295
296 if (target_apk_path.size() > sizeof(header->target_path_)) {
Mårten Kongstadce424902019-03-01 08:35:37 +0100297 return Error("target apk path \"%s\" longer than maximum size %zu", target_apk_path.c_str(),
298 sizeof(header->target_path_));
Mårten Kongstad02751232018-04-27 13:16:32 +0200299 }
300 memset(header->target_path_, 0, sizeof(header->target_path_));
301 memcpy(header->target_path_, target_apk_path.data(), target_apk_path.size());
302
303 if (overlay_apk_path.size() > sizeof(header->overlay_path_)) {
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700304 return Error("overlay apk path \"%s\" longer than maximum size %zu", overlay_apk_path.c_str(),
Mårten Kongstadce424902019-03-01 08:35:37 +0100305 sizeof(header->target_path_));
Mårten Kongstad02751232018-04-27 13:16:32 +0200306 }
307 memset(header->overlay_path_, 0, sizeof(header->overlay_path_));
308 memcpy(header->overlay_path_, overlay_apk_path.data(), overlay_apk_path.size());
309
310 std::unique_ptr<Idmap> idmap(new Idmap());
311 idmap->header_ = std::move(header);
312
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700313 auto overlay_info = utils::ExtractOverlayManifestInfo(overlay_apk_path);
314 if (!overlay_info) {
315 return overlay_info.GetError();
Mårten Kongstad02751232018-04-27 13:16:32 +0200316 }
317
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700318 auto resource_mapping =
319 ResourceMapping::FromApkAssets(target_apk_assets, overlay_apk_assets, *overlay_info,
320 fulfilled_policies, enforce_overlayable);
321 if (!resource_mapping) {
322 return resource_mapping.GetError();
Ryan Mitchellb863ca32019-03-07 14:31:54 -0800323 }
324
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700325 auto idmap_data = IdmapData::FromResourceMapping(*resource_mapping);
326 if (!idmap_data) {
327 return idmap_data.GetError();
Mårten Kongstad02751232018-04-27 13:16:32 +0200328 }
329
Ryan Mitchell9e4f52b2019-09-19 12:15:52 -0700330 idmap->data_.push_back(std::move(*idmap_data));
Mårten Kongstadce424902019-03-01 08:35:37 +0100331 return {std::move(idmap)};
Mårten Kongstad02751232018-04-27 13:16:32 +0200332}
333
334void IdmapHeader::accept(Visitor* v) const {
335 assert(v != nullptr);
336 v->visit(*this);
337}
338
339void IdmapData::Header::accept(Visitor* v) const {
340 assert(v != nullptr);
341 v->visit(*this);
342}
343
Mårten Kongstad02751232018-04-27 13:16:32 +0200344void IdmapData::accept(Visitor* v) const {
345 assert(v != nullptr);
Mårten Kongstad02751232018-04-27 13:16:32 +0200346 header_->accept(v);
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700347 v->visit(*this);
Mårten Kongstad02751232018-04-27 13:16:32 +0200348}
349
350void Idmap::accept(Visitor* v) const {
351 assert(v != nullptr);
Mårten Kongstad02751232018-04-27 13:16:32 +0200352 header_->accept(v);
Ryan Mitchelle753ffe2019-09-23 09:47:02 -0700353 v->visit(*this);
Mårten Kongstad02751232018-04-27 13:16:32 +0200354 auto end = data_.cend();
355 for (auto iter = data_.cbegin(); iter != end; ++iter) {
356 (*iter)->accept(v);
357 }
358}
359
Mårten Kongstad0eba72a2018-11-29 08:23:14 +0100360} // namespace android::idmap2