blob: f424bd8f7fdfae8f955f11878b746af45c5ab60d [file] [log] [blame]
/*
* Copyright 2023 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "apkmanifest.hpp"
#include <android-base/logging.h>
#include <android-base/result.h>
#include <androidfw/AssetsProvider.h>
#include <androidfw/ResourceTypes.h>
#include <androidfw/StringPiece.h>
#include <androidfw/Util.h>
#include <stddef.h>
#include <stdint.h>
#include <utils/Errors.h>
#include <cstdlib>
#include <limits>
#include <optional>
#include <string>
#include <string_view>
using android::Asset;
using android::AssetsProvider;
using android::OK;
using android::Res_value;
using android::ResXMLParser;
using android::ResXMLTree;
using android::statusToString;
using android::StringPiece16;
using android::base::Error;
using android::base::Result;
using android::util::Utf16ToUtf8;
using std::u16string_view;
using std::unique_ptr;
struct ApkManifestInfo {
std::string package;
uint32_t version_code;
uint32_t version_code_major;
std::optional<uint32_t> rollback_index;
bool has_relaxed_rollback_protection_permission;
};
namespace {
// See https://developer.android.com/guide/topics/manifest/manifest-element
constexpr u16string_view MANIFEST_TAG_NAME{u"manifest"};
constexpr u16string_view ANDROID_NAMESPACE_URL{u"http://schemas.android.com/apk/res/android"};
constexpr u16string_view PACKAGE_ATTRIBUTE_NAME{u"package"};
constexpr u16string_view VERSION_CODE_ATTRIBUTE_NAME{u"versionCode"};
constexpr u16string_view VERSION_CODE_MAJOR_ATTRIBUTE_NAME{u"versionCodeMajor"};
constexpr u16string_view USES_PERMISSION_TAG_NAME{u"uses-permission"};
// This name is awkward, but i don't have a better idea ¯\_(ツ)_/¯.
constexpr u16string_view NAME_ATTRIBUTE_NAME{u"name"};
constexpr u16string_view VALUE_ATTRIBUTE_NAME{u"value"};
constexpr u16string_view PROPERTY_TAG_NAME{u"property"};
constexpr u16string_view ROLLBACK_INDEX_PROPERTY_NAME{
u"android.system.virtualmachine.ROLLBACK_INDEX"};
constexpr u16string_view USE_RELAXED_ROLLBACK_PROTECTION_PERMISSION_NAME{
u"android.permission.USE_RELAXED_MICRODROID_ROLLBACK_PROTECTION"};
// Read through the XML parse tree up to the <manifest> element.
Result<void> findManifestElement(ResXMLTree& tree) {
for (;;) {
ResXMLParser::event_code_t event = tree.next();
switch (event) {
case ResXMLParser::END_DOCUMENT:
case ResXMLParser::END_TAG:
case ResXMLParser::TEXT:
default:
return Error() << "Unexpected XML parsing event: " << event;
case ResXMLParser::BAD_DOCUMENT:
return Error() << "Failed to parse XML: " << statusToString(tree.getError());
case ResXMLParser::START_NAMESPACE:
case ResXMLParser::END_NAMESPACE:
// Not of interest, keep going.
break;
case ResXMLParser::START_TAG:
// The first tag in an AndroidManifest.xml should be <manifest> (no namespace).
// And that's actually the only tag we care about.
if (tree.getElementNamespaceID() >= 0) {
return Error() << "Root element has unexpected namespace.";
}
size_t nameLength = 0;
const char16_t* nameChars = tree.getElementName(&nameLength);
if (!nameChars) {
return Error() << "Missing tag name";
}
if (u16string_view(nameChars, nameLength) != MANIFEST_TAG_NAME) {
return Error() << "Expected <manifest> as root element";
}
return {};
}
}
}
// Return an attribute encoded as a string, converted to UTF-8. Note that all
// attributes are strings in the original XML, but the binary format encodes
// some as binary numbers etc. This function does not handle converting those
// encodings back to strings, so should only be used when it is known that a
// numeric value is not allowed.
Result<std::string> getStringOnlyAttribute(const ResXMLTree& tree, size_t index) {
size_t len;
const char16_t* value = tree.getAttributeStringValue(index, &len);
if (!value) {
return Error() << "Expected attribute to have string value";
}
return Utf16ToUtf8(StringPiece16(value, len));
}
// Return the u32 value of an attribute.
Result<uint32_t> getU32Attribute(const ResXMLTree& tree, size_t index) {
auto type = tree.getAttributeDataType(index);
switch (type) {
case Res_value::TYPE_INT_DEC:
case Res_value::TYPE_INT_HEX:
// This is how we'd expect the version to be encoded - and we don't
// care what base it was originally in.
return tree.getAttributeData(index);
case Res_value::TYPE_STRING: {
// If the original string is encoded, then we need to convert it.
auto str = OR_RETURN(getStringOnlyAttribute(tree, index));
char* str_end = nullptr;
// Note that by specifying base 0 we allow for octal, hex, or
// decimal representations here.
unsigned long value = std::strtoul(str.c_str(), &str_end, 0);
if (str_end != str.c_str() + str.size() ||
value > std::numeric_limits<uint32_t>::max()) {
return Error() << "Invalid numeric value";
}
return static_cast<uint32_t>(value);
}
default:
return Error() << "Expected numeric value, got type " << type;
}
}
// Returns true if the given perm_tag contains the
// `USE_RELAXED_MICRODROID_ROLLBACK_PROTECTION` permission.
bool isRelaxedRollbackProtectionPermission(const ResXMLTree& perm_tag) {
size_t count = perm_tag.getAttributeCount();
for (size_t i = 0; i < count; i++) {
size_t len = 0;
const char16_t* chars = perm_tag.getAttributeNamespace(i, &len);
auto namespaceUrl = chars ? u16string_view(chars, len) : u16string_view();
chars = perm_tag.getAttributeName(i, &len);
auto attributeName = chars ? u16string_view(chars, len) : u16string_view();
if (namespaceUrl != ANDROID_NAMESPACE_URL) {
continue;
}
if (attributeName != NAME_ATTRIBUTE_NAME) {
continue;
}
chars = perm_tag.getAttributeStringValue(i, &len);
if (!chars) {
LOG(WARNING) << "expected name attribute to be non-empty";
continue;
}
// What a name!
auto nameName = u16string_view(chars, len);
if (nameName == USE_RELAXED_ROLLBACK_PROTECTION_PERMISSION_NAME) {
return true;
}
}
return false;
}
// Returns value of the `android.system.virtualmachine.ROLLBACK_INDEX` property or std::nullopt if
// given prop_tag doesn't represent the rollback_index property.
std::optional<uint32_t> getRollbackIndexValue(const ResXMLTree& prop_tag) {
size_t count = prop_tag.getAttributeCount();
bool is_rollback_index_prop = false;
// Note: in theory the `android:value` attribute can come before `android:name` one, so we need
// to iterate over all attributes twice.
for (size_t it = 0; it < 2 * count; it++) {
size_t i = it >= count ? it - count : it;
size_t len = 0;
const char16_t* chars = prop_tag.getAttributeNamespace(i, &len);
auto namespaceUrl = chars ? u16string_view(chars, len) : u16string_view();
chars = prop_tag.getAttributeName(i, &len);
auto attributeName = chars ? u16string_view(chars, len) : u16string_view();
if (namespaceUrl != ANDROID_NAMESPACE_URL) {
continue;
}
if (attributeName == NAME_ATTRIBUTE_NAME) {
chars = prop_tag.getAttributeStringValue(i, &len);
if (!chars) {
LOG(WARNING) << "expected name attribute to be non-empty";
continue;
}
// What a name!
auto nameName = u16string_view(chars, len);
if (nameName != ROLLBACK_INDEX_PROPERTY_NAME) {
return std::nullopt;
}
is_rollback_index_prop = true;
} else if (attributeName == VALUE_ATTRIBUTE_NAME) {
if (!is_rollback_index_prop) {
// We don't know yet if this is the right property. Skip for now.
continue;
}
auto value = getU32Attribute(prop_tag, i);
if (!value.ok()) {
LOG(ERROR) << "Failed to parse value of the rollback index : " << value.error();
return std::nullopt;
}
return std::make_optional(std::move(*value));
}
}
return std::nullopt;
}
// Parse the binary manifest and extract the information we care about. Everything we're interested
// in should be an attribute on the <manifest> tag. We don't care what order they come in, absent
// attributes will be treated as the default value, and any unknown attributes (including ones not
// in the expected namespace) will be ignored.
Result<unique_ptr<ApkManifestInfo>> parseManifest(const void* manifest, size_t size) {
ResXMLTree tree;
auto status = tree.setTo(manifest, size);
if (status != OK) {
return Error() << "Failed to create XML Tree: " << statusToString(status);
}
OR_RETURN(findManifestElement(tree));
unique_ptr<ApkManifestInfo> info{new ApkManifestInfo{}};
size_t count = tree.getAttributeCount();
for (size_t i = 0; i < count; ++i) {
size_t len;
const char16_t* chars;
chars = tree.getAttributeNamespace(i, &len);
auto namespaceUrl = chars ? u16string_view(chars, len) : u16string_view();
chars = tree.getAttributeName(i, &len);
auto attributeName = chars ? u16string_view(chars, len) : u16string_view();
if (namespaceUrl.empty()) {
if (attributeName == PACKAGE_ATTRIBUTE_NAME) {
auto result = getStringOnlyAttribute(tree, i);
if (!result.ok()) return Error() << "Package name: " << result.error();
info->package = *result;
}
} else if (namespaceUrl == ANDROID_NAMESPACE_URL) {
if (attributeName == VERSION_CODE_ATTRIBUTE_NAME) {
auto result = getU32Attribute(tree, i);
if (!result.ok()) return Error() << "Version code: " << result.error();
info->version_code = *result;
} else if (attributeName == VERSION_CODE_MAJOR_ATTRIBUTE_NAME) {
auto result = getU32Attribute(tree, i);
if (!result.ok()) return Error() << "Version code major: " << result.error();
info->version_code_major = *result;
}
}
}
info->has_relaxed_rollback_protection_permission = false;
// Now we need to parse the rest of the manifest to check if it contains the
// `USE_RELAXED_MICRODROID_ROLLBACK_PROTECTION` permission and the
// `android.system.virtualmachine.ROLLBACK_INDEX` property.
for (;;) {
ResXMLParser::event_code_t event = tree.next();
switch (event) {
case ResXMLParser::END_DOCUMENT:
return info;
case ResXMLParser::BAD_DOCUMENT:
return Error() << "Failed to parse XML: " << statusToString(tree.getError());
case ResXMLParser::START_TAG: {
size_t len = 0;
const char16_t* chars = tree.getElementName(&len);
if (!chars) {
return Error() << "Missing tag name";
}
auto tag_name = u16string_view(chars, len);
if (tag_name != USES_PERMISSION_TAG_NAME && tag_name != PROPERTY_TAG_NAME) {
// We are only interested in <uses-permission> and <property> tags.
break;
}
if (tag_name == USES_PERMISSION_TAG_NAME) {
if (isRelaxedRollbackProtectionPermission(tree)) {
info->has_relaxed_rollback_protection_permission = true;
}
} else if (tag_name == PROPERTY_TAG_NAME) {
auto rollback_index = getRollbackIndexValue(tree);
if (rollback_index.has_value()) {
LOG(INFO) << "found rollback_index : " << *rollback_index;
if (info->rollback_index.has_value()) {
LOG(WARNING)
<< "found duplicate rollback index, overriding previous value";
}
info->rollback_index.emplace(*rollback_index);
}
} else {
break;
}
break;
}
case ResXMLParser::START_NAMESPACE:
break;
case ResXMLParser::END_NAMESPACE:
break;
case ResXMLParser::END_TAG:
break;
default: {
LOG(ERROR) << "found unexpected event : " << event;
continue;
}
}
}
return info;
}
} // namespace
const ApkManifestInfo* extractManifestInfo(const void* manifest, size_t size) {
auto result = parseManifest(manifest, size);
if (!result.ok()) {
LOG(ERROR) << "Failed to parse APK manifest:" << result.error().message();
return nullptr;
}
return result->release();
}
void freeManifestInfo(const ApkManifestInfo* info) {
delete info;
}
const char* getPackageName(const ApkManifestInfo* info) {
return info->package.c_str();
}
uint64_t getVersionCode(const ApkManifestInfo* info) {
return info->version_code | (static_cast<uint64_t>(info->version_code_major) << 32);
}
const uint32_t* getRollbackIndex(const ApkManifestInfo* info) {
return info->rollback_index.has_value() ? &info->rollback_index.value() : nullptr;
}
bool hasRelaxedRollbackProtectionPermission(const ApkManifestInfo* info) {
return info->has_relaxed_rollback_protection_permission;
}