blob: 5d449e96663e17b6113fe72fa501235aacccddf0 [file] [log] [blame]
Mårten Kongstad02751232018-04-27 13:16:32 +02001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <algorithm>
18#include <iostream>
19#include <iterator>
20#include <limits>
21#include <map>
22#include <memory>
23#include <set>
24#include <string>
25#include <utility>
26#include <vector>
27
28#include "android-base/macros.h"
29#include "android-base/stringprintf.h"
30#include "androidfw/AssetManager2.h"
31#include "utils/String16.h"
32#include "utils/String8.h"
33
34#include "idmap2/Idmap.h"
35#include "idmap2/ResourceUtils.h"
Mårten Kongstad0f763112018-11-19 14:14:37 +010036#include "idmap2/Result.h"
Mårten Kongstad02751232018-04-27 13:16:32 +020037#include "idmap2/ZipFile.h"
38
Mårten Kongstad0eba72a2018-11-29 08:23:14 +010039namespace android::idmap2 {
Mårten Kongstad02751232018-04-27 13:16:32 +020040
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010041namespace {
42
Mårten Kongstad02751232018-04-27 13:16:32 +020043#define EXTRACT_TYPE(resid) ((0x00ff0000 & (resid)) >> 16)
44
45#define EXTRACT_ENTRY(resid) (0x0000ffff & (resid))
46
Mårten Kongstadcf281362018-11-28 19:32:25 +010047class MatchingResources {
48 public:
Mårten Kongstad02751232018-04-27 13:16:32 +020049 void Add(ResourceId target_resid, ResourceId overlay_resid) {
50 TypeId target_typeid = EXTRACT_TYPE(target_resid);
Mårten Kongstadcf281362018-11-28 19:32:25 +010051 if (map_.find(target_typeid) == map_.end()) {
52 map_.emplace(target_typeid, std::set<std::pair<ResourceId, ResourceId>>());
Mårten Kongstad02751232018-04-27 13:16:32 +020053 }
Mårten Kongstadcf281362018-11-28 19:32:25 +010054 map_[target_typeid].insert(std::make_pair(target_resid, overlay_resid));
Mårten Kongstad02751232018-04-27 13:16:32 +020055 }
56
Mårten Kongstadcf281362018-11-28 19:32:25 +010057 inline const std::map<TypeId, std::set<std::pair<ResourceId, ResourceId>>>& Map() const {
58 return map_;
59 }
60
61 private:
Mårten Kongstad02751232018-04-27 13:16:32 +020062 // target type id -> set { pair { overlay entry id, overlay entry id } }
Mårten Kongstadcf281362018-11-28 19:32:25 +010063 std::map<TypeId, std::set<std::pair<ResourceId, ResourceId>>> map_;
Mårten Kongstad02751232018-04-27 13:16:32 +020064};
65
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010066bool WARN_UNUSED Read16(std::istream& stream, uint16_t* out) {
Mårten Kongstad02751232018-04-27 13:16:32 +020067 uint16_t value;
68 if (stream.read(reinterpret_cast<char*>(&value), sizeof(uint16_t))) {
69 *out = dtohl(value);
70 return true;
71 }
72 return false;
73}
74
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010075bool WARN_UNUSED Read32(std::istream& stream, uint32_t* out) {
Mårten Kongstad02751232018-04-27 13:16:32 +020076 uint32_t value;
77 if (stream.read(reinterpret_cast<char*>(&value), sizeof(uint32_t))) {
78 *out = dtohl(value);
79 return true;
80 }
81 return false;
82}
83
84// a string is encoded as a kIdmapStringLength char array; the array is always null-terminated
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010085bool WARN_UNUSED ReadString(std::istream& stream, char out[kIdmapStringLength]) {
Mårten Kongstad02751232018-04-27 13:16:32 +020086 char buf[kIdmapStringLength];
87 memset(buf, 0, sizeof(buf));
88 if (!stream.read(buf, sizeof(buf))) {
89 return false;
90 }
91 if (buf[sizeof(buf) - 1] != '\0') {
92 return false;
93 }
94 memcpy(out, buf, sizeof(buf));
95 return true;
96}
97
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010098ResourceId NameToResid(const AssetManager2& am, const std::string& name) {
Mårten Kongstad02751232018-04-27 13:16:32 +020099 return am.GetResourceId(name);
100}
101
102// TODO(martenkongstad): scan for package name instead of assuming package at index 0
103//
104// idmap version 0x01 naively assumes that the package to use is always the first ResTable_package
105// in the resources.arsc blob. In most cases, there is only a single ResTable_package anyway, so
106// this assumption tends to work out. That said, the correct thing to do is to scan
107// resources.arsc for a package with a given name as read from the package manifest instead of
108// relying on a hard-coded index. This however requires storing the package name in the idmap
109// header, which in turn requires incrementing the idmap version. Because the initial version of
110// idmap2 is compatible with idmap, this will have to wait for now.
Mårten Kongstad744ccfe2018-12-20 14:56:14 +0100111const LoadedPackage* GetPackageAtIndex0(const LoadedArsc& loaded_arsc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200112 const std::vector<std::unique_ptr<const LoadedPackage>>& packages = loaded_arsc.GetPackages();
113 if (packages.empty()) {
114 return nullptr;
115 }
116 int id = packages[0]->GetPackageId();
117 return loaded_arsc.GetPackageById(id);
118}
119
Mårten Kongstad744ccfe2018-12-20 14:56:14 +0100120} // namespace
121
Mårten Kongstad02751232018-04-27 13:16:32 +0200122std::unique_ptr<const IdmapHeader> IdmapHeader::FromBinaryStream(std::istream& stream) {
123 std::unique_ptr<IdmapHeader> idmap_header(new IdmapHeader());
124
125 if (!Read32(stream, &idmap_header->magic_) || !Read32(stream, &idmap_header->version_) ||
126 !Read32(stream, &idmap_header->target_crc_) || !Read32(stream, &idmap_header->overlay_crc_) ||
127 !ReadString(stream, idmap_header->target_path_) ||
128 !ReadString(stream, idmap_header->overlay_path_)) {
129 return nullptr;
130 }
131
132 return std::move(idmap_header);
133}
134
135bool IdmapHeader::IsUpToDate(std::ostream& out_error) const {
136 if (magic_ != kIdmapMagic) {
137 out_error << base::StringPrintf("error: bad magic: actual 0x%08x, expected 0x%08x", magic_,
138 kIdmapMagic)
139 << std::endl;
140 return false;
141 }
142
143 if (version_ != kIdmapCurrentVersion) {
144 out_error << base::StringPrintf("error: bad version: actual 0x%08x, expected 0x%08x", version_,
145 kIdmapCurrentVersion)
146 << std::endl;
147 return false;
148 }
149
150 const std::unique_ptr<const ZipFile> target_zip = ZipFile::Open(target_path_);
151 if (!target_zip) {
152 out_error << "error: failed to open target " << target_path_ << std::endl;
153 return false;
154 }
155
Mårten Kongstad0f763112018-11-19 14:14:37 +0100156 Result<uint32_t> target_crc = target_zip->Crc("resources.arsc");
157 if (!target_crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200158 out_error << "error: failed to get target crc" << std::endl;
159 return false;
160 }
161
Mårten Kongstad0f763112018-11-19 14:14:37 +0100162 if (target_crc_ != *target_crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200163 out_error << base::StringPrintf(
164 "error: bad target crc: idmap version 0x%08x, file system version 0x%08x",
Mårten Kongstad0f763112018-11-19 14:14:37 +0100165 target_crc_, *target_crc)
Mårten Kongstad02751232018-04-27 13:16:32 +0200166 << std::endl;
167 return false;
168 }
169
170 const std::unique_ptr<const ZipFile> overlay_zip = ZipFile::Open(overlay_path_);
171 if (!overlay_zip) {
172 out_error << "error: failed to open overlay " << overlay_path_ << std::endl;
173 return false;
174 }
175
Mårten Kongstad0f763112018-11-19 14:14:37 +0100176 Result<uint32_t> overlay_crc = overlay_zip->Crc("resources.arsc");
177 if (!overlay_crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200178 out_error << "error: failed to get overlay crc" << std::endl;
179 return false;
180 }
181
Mårten Kongstad0f763112018-11-19 14:14:37 +0100182 if (overlay_crc_ != *overlay_crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200183 out_error << base::StringPrintf(
184 "error: bad overlay crc: idmap version 0x%08x, file system version 0x%08x",
Mårten Kongstad0f763112018-11-19 14:14:37 +0100185 overlay_crc_, *overlay_crc)
Mårten Kongstad02751232018-04-27 13:16:32 +0200186 << std::endl;
187 return false;
188 }
189
190 return true;
191}
192
193std::unique_ptr<const IdmapData::Header> IdmapData::Header::FromBinaryStream(std::istream& stream) {
194 std::unique_ptr<IdmapData::Header> idmap_data_header(new IdmapData::Header());
195
196 uint16_t target_package_id16;
197 if (!Read16(stream, &target_package_id16) || !Read16(stream, &idmap_data_header->type_count_)) {
198 return nullptr;
199 }
200 idmap_data_header->target_package_id_ = target_package_id16;
201
202 return std::move(idmap_data_header);
203}
204
205std::unique_ptr<const IdmapData::TypeEntry> IdmapData::TypeEntry::FromBinaryStream(
206 std::istream& stream) {
207 std::unique_ptr<IdmapData::TypeEntry> data(new IdmapData::TypeEntry());
Mårten Kongstadb8779022018-11-29 09:53:17 +0100208 uint16_t target_type16;
209 uint16_t overlay_type16;
210 uint16_t entry_count;
Mårten Kongstad02751232018-04-27 13:16:32 +0200211 if (!Read16(stream, &target_type16) || !Read16(stream, &overlay_type16) ||
212 !Read16(stream, &entry_count) || !Read16(stream, &data->entry_offset_)) {
213 return nullptr;
214 }
215 data->target_type_id_ = target_type16;
216 data->overlay_type_id_ = overlay_type16;
217 for (uint16_t i = 0; i < entry_count; i++) {
218 ResourceId resid;
219 if (!Read32(stream, &resid)) {
220 return nullptr;
221 }
222 data->entries_.push_back(resid);
223 }
224
225 return std::move(data);
226}
227
228std::unique_ptr<const IdmapData> IdmapData::FromBinaryStream(std::istream& stream) {
229 std::unique_ptr<IdmapData> data(new IdmapData());
230 data->header_ = IdmapData::Header::FromBinaryStream(stream);
231 if (!data->header_) {
232 return nullptr;
233 }
234 for (size_t type_count = 0; type_count < data->header_->GetTypeCount(); type_count++) {
235 std::unique_ptr<const TypeEntry> type = IdmapData::TypeEntry::FromBinaryStream(stream);
236 if (!type) {
237 return nullptr;
238 }
239 data->type_entries_.push_back(std::move(type));
240 }
241 return std::move(data);
242}
243
244std::string Idmap::CanonicalIdmapPathFor(const std::string& absolute_dir,
245 const std::string& absolute_apk_path) {
246 assert(absolute_dir.size() > 0 && absolute_dir[0] == "/");
247 assert(absolute_apk_path.size() > 0 && absolute_apk_path[0] == "/");
248 std::string copy(++absolute_apk_path.cbegin(), absolute_apk_path.cend());
249 replace(copy.begin(), copy.end(), '/', '@');
250 return absolute_dir + "/" + copy + "@idmap";
251}
252
253std::unique_ptr<const Idmap> Idmap::FromBinaryStream(std::istream& stream,
254 std::ostream& out_error) {
255 std::unique_ptr<Idmap> idmap(new Idmap());
256
257 idmap->header_ = IdmapHeader::FromBinaryStream(stream);
258 if (!idmap->header_) {
259 out_error << "error: failed to parse idmap header" << std::endl;
260 return nullptr;
261 }
262
263 // idmap version 0x01 does not specify the number of data blocks that follow
264 // the idmap header; assume exactly one data block
265 for (int i = 0; i < 1; i++) {
266 std::unique_ptr<const IdmapData> data = IdmapData::FromBinaryStream(stream);
267 if (!data) {
268 out_error << "error: failed to parse data block " << i << std::endl;
269 return nullptr;
270 }
271 idmap->data_.push_back(std::move(data));
272 }
273
274 return std::move(idmap);
275}
276
Ryan Mitchella3628462019-01-14 12:19:40 -0800277bool CheckOverlayable(const LoadedPackage& target_package,
278 const utils::OverlayManifestInfo& overlay_info,
279 const PolicyBitmask& fulfilled_polices, const ResourceId& resid) {
280 const OverlayableInfo* overlayable_info = target_package.GetOverlayableInfo(resid);
281 if (overlayable_info == nullptr) {
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800282 // If the resource does not have an overlayable definition, allow the resource to be overlaid.
283 // Once overlayable enforcement is turned on, this check will return false.
284 return true;
285 }
286
Ryan Mitchella3628462019-01-14 12:19:40 -0800287 if (!overlay_info.target_name.empty() && overlay_info.target_name != overlayable_info->name) {
288 // If the overlay supplies a target overlayable name, the resource must belong to the
289 // overlayable defined with the specified name to be overlaid.
290 return false;
291 }
292
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800293 // Enforce policy restrictions if the resource is declared as overlayable.
Ryan Mitchella3628462019-01-14 12:19:40 -0800294 return (overlayable_info->policy_flags & fulfilled_polices) != 0;
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800295}
296
297std::unique_ptr<const Idmap> Idmap::FromApkAssets(
298 const std::string& target_apk_path, const ApkAssets& target_apk_assets,
299 const std::string& overlay_apk_path, const ApkAssets& overlay_apk_assets,
300 const PolicyBitmask& fulfilled_policies, bool enforce_overlayable, std::ostream& out_error) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200301 AssetManager2 target_asset_manager;
302 if (!target_asset_manager.SetApkAssets({&target_apk_assets}, true, false)) {
303 out_error << "error: failed to create target asset manager" << std::endl;
304 return nullptr;
305 }
306
307 AssetManager2 overlay_asset_manager;
308 if (!overlay_asset_manager.SetApkAssets({&overlay_apk_assets}, true, false)) {
309 out_error << "error: failed to create overlay asset manager" << std::endl;
310 return nullptr;
311 }
312
313 const LoadedArsc* target_arsc = target_apk_assets.GetLoadedArsc();
Mårten Kongstadb8779022018-11-29 09:53:17 +0100314 if (target_arsc == nullptr) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200315 out_error << "error: failed to load target resources.arsc" << std::endl;
316 return nullptr;
317 }
318
319 const LoadedArsc* overlay_arsc = overlay_apk_assets.GetLoadedArsc();
Mårten Kongstadb8779022018-11-29 09:53:17 +0100320 if (overlay_arsc == nullptr) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200321 out_error << "error: failed to load overlay resources.arsc" << std::endl;
322 return nullptr;
323 }
324
325 const LoadedPackage* target_pkg = GetPackageAtIndex0(*target_arsc);
Mårten Kongstadb8779022018-11-29 09:53:17 +0100326 if (target_pkg == nullptr) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200327 out_error << "error: failed to load target package from resources.arsc" << std::endl;
328 return nullptr;
329 }
330
331 const LoadedPackage* overlay_pkg = GetPackageAtIndex0(*overlay_arsc);
Mårten Kongstadb8779022018-11-29 09:53:17 +0100332 if (overlay_pkg == nullptr) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200333 out_error << "error: failed to load overlay package from resources.arsc" << std::endl;
334 return nullptr;
335 }
336
337 const std::unique_ptr<const ZipFile> target_zip = ZipFile::Open(target_apk_path);
338 if (!target_zip) {
339 out_error << "error: failed to open target as zip" << std::endl;
340 return nullptr;
341 }
342
343 const std::unique_ptr<const ZipFile> overlay_zip = ZipFile::Open(overlay_apk_path);
344 if (!overlay_zip) {
345 out_error << "error: failed to open overlay as zip" << std::endl;
346 return nullptr;
347 }
348
Ryan Mitchella3628462019-01-14 12:19:40 -0800349 Result<utils::OverlayManifestInfo> overlay_info =
350 utils::ExtractOverlayManifestInfo(overlay_apk_path, out_error);
351 if (!overlay_info) {
352 return nullptr;
353 }
354
Mårten Kongstad02751232018-04-27 13:16:32 +0200355 std::unique_ptr<IdmapHeader> header(new IdmapHeader());
356 header->magic_ = kIdmapMagic;
357 header->version_ = kIdmapCurrentVersion;
Mårten Kongstad0f763112018-11-19 14:14:37 +0100358
359 Result<uint32_t> crc = target_zip->Crc("resources.arsc");
360 if (!crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200361 out_error << "error: failed to get zip crc for target" << std::endl;
362 return nullptr;
363 }
Mårten Kongstad0f763112018-11-19 14:14:37 +0100364 header->target_crc_ = *crc;
365
366 crc = overlay_zip->Crc("resources.arsc");
367 if (!crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200368 out_error << "error: failed to get zip crc for overlay" << std::endl;
369 return nullptr;
370 }
Mårten Kongstad0f763112018-11-19 14:14:37 +0100371 header->overlay_crc_ = *crc;
Mårten Kongstad02751232018-04-27 13:16:32 +0200372
373 if (target_apk_path.size() > sizeof(header->target_path_)) {
374 out_error << "error: target apk path \"" << target_apk_path << "\" longer that maximum size "
375 << sizeof(header->target_path_) << std::endl;
376 return nullptr;
377 }
378 memset(header->target_path_, 0, sizeof(header->target_path_));
379 memcpy(header->target_path_, target_apk_path.data(), target_apk_path.size());
380
381 if (overlay_apk_path.size() > sizeof(header->overlay_path_)) {
382 out_error << "error: overlay apk path \"" << overlay_apk_path << "\" longer that maximum size "
383 << sizeof(header->overlay_path_) << std::endl;
384 return nullptr;
385 }
386 memset(header->overlay_path_, 0, sizeof(header->overlay_path_));
387 memcpy(header->overlay_path_, overlay_apk_path.data(), overlay_apk_path.size());
388
389 std::unique_ptr<Idmap> idmap(new Idmap());
390 idmap->header_ = std::move(header);
391
392 // find the resources that exist in both packages
393 MatchingResources matching_resources;
394 const auto end = overlay_pkg->end();
395 for (auto iter = overlay_pkg->begin(); iter != end; ++iter) {
396 const ResourceId overlay_resid = *iter;
Mårten Kongstad0f763112018-11-19 14:14:37 +0100397 Result<std::string> name = utils::ResToTypeEntryName(overlay_asset_manager, overlay_resid);
398 if (!name) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200399 continue;
400 }
401 // prepend "<package>:" to turn name into "<package>:<type>/<name>"
Mårten Kongstad0f763112018-11-19 14:14:37 +0100402 const std::string full_name =
403 base::StringPrintf("%s:%s", target_pkg->GetPackageName().c_str(), name->c_str());
404 const ResourceId target_resid = NameToResid(target_asset_manager, full_name);
Mårten Kongstad02751232018-04-27 13:16:32 +0200405 if (target_resid == 0) {
406 continue;
407 }
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800408
Ryan Mitchella3628462019-01-14 12:19:40 -0800409 if (enforce_overlayable &&
410 !CheckOverlayable(*target_pkg, *overlay_info, fulfilled_policies, target_resid)) {
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800411 LOG(WARNING) << "overlay \"" << overlay_apk_path << "\" is not allowed to overlay resource \""
412 << full_name << "\"" << std::endl;
413 continue;
414 }
415
Mårten Kongstad02751232018-04-27 13:16:32 +0200416 matching_resources.Add(target_resid, overlay_resid);
417 }
418
419 // encode idmap data
420 std::unique_ptr<IdmapData> data(new IdmapData());
Mårten Kongstadcf281362018-11-28 19:32:25 +0100421 const auto types_end = matching_resources.Map().cend();
422 for (auto ti = matching_resources.Map().cbegin(); ti != types_end; ++ti) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200423 auto ei = ti->second.cbegin();
424 std::unique_ptr<IdmapData::TypeEntry> type(new IdmapData::TypeEntry());
425 type->target_type_id_ = EXTRACT_TYPE(ei->first);
426 type->overlay_type_id_ = EXTRACT_TYPE(ei->second);
427 type->entry_offset_ = EXTRACT_ENTRY(ei->first);
428 EntryId last_target_entry = kNoEntry;
429 for (; ei != ti->second.cend(); ++ei) {
430 if (last_target_entry != kNoEntry) {
431 int count = EXTRACT_ENTRY(ei->first) - last_target_entry - 1;
432 type->entries_.insert(type->entries_.end(), count, kNoEntry);
433 }
434 type->entries_.push_back(EXTRACT_ENTRY(ei->second));
435 last_target_entry = EXTRACT_ENTRY(ei->first);
436 }
437 data->type_entries_.push_back(std::move(type));
438 }
439
440 std::unique_ptr<IdmapData::Header> data_header(new IdmapData::Header());
441 data_header->target_package_id_ = target_pkg->GetPackageId();
442 data_header->type_count_ = data->type_entries_.size();
443 data->header_ = std::move(data_header);
444
445 idmap->data_.push_back(std::move(data));
446
447 return std::move(idmap);
448}
449
450void IdmapHeader::accept(Visitor* v) const {
451 assert(v != nullptr);
452 v->visit(*this);
453}
454
455void IdmapData::Header::accept(Visitor* v) const {
456 assert(v != nullptr);
457 v->visit(*this);
458}
459
460void IdmapData::TypeEntry::accept(Visitor* v) const {
461 assert(v != nullptr);
462 v->visit(*this);
463}
464
465void IdmapData::accept(Visitor* v) const {
466 assert(v != nullptr);
467 v->visit(*this);
468 header_->accept(v);
469 auto end = type_entries_.cend();
470 for (auto iter = type_entries_.cbegin(); iter != end; ++iter) {
471 (*iter)->accept(v);
472 }
473}
474
475void Idmap::accept(Visitor* v) const {
476 assert(v != nullptr);
477 v->visit(*this);
478 header_->accept(v);
479 auto end = data_.cend();
480 for (auto iter = data_.cbegin(); iter != end; ++iter) {
481 (*iter)->accept(v);
482 }
483}
484
Mårten Kongstad0eba72a2018-11-29 08:23:14 +0100485} // namespace android::idmap2