/* * Copyright (C) 2019 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "apex_shim.h" #include #include #include #include #include #include #include #include #include #include "apex_constants.h" #include "apex_file.h" #include "apex_sha.h" #include "string_log.h" using android::base::ErrnoError; using android::base::Error; using android::base::Result; using ::apex::proto::ApexManifest; namespace android { namespace apex { namespace shim { namespace fs = std::filesystem; namespace { static constexpr const char* kApexCtsShimPackage = "com.android.apex.cts.shim"; static constexpr const char* kHashFilePath = "etc/hash.txt"; static constexpr const fs::perms kForbiddenFilePermissions = fs::perms::owner_exec | fs::perms::group_exec | fs::perms::others_exec; static constexpr const char* kExpectedCtsShimFiles[] = { "apex_manifest.json", "apex_manifest.pb", "etc/hash.txt", "etc/permissions/signature-permission-allowlist.xml", "app/CtsShim/CtsShim.apk", "app/CtsShim@1/CtsShim.apk", "app/CtsShim@2/CtsShim.apk", "app/CtsShim@3/CtsShim.apk", "app/CtsShim@AOSP.MASTER/CtsShim.apk", "app/CtsShim@MASTER/CtsShim.apk", "app/CtsShim@MAIN/CtsShim.apk", "app/CtsShimAddApkToApex/CtsShimAddApkToApex.apk", "app/CtsShimAddApkToApex@1/CtsShimAddApkToApex.apk", "app/CtsShimAddApkToApex@2/CtsShimAddApkToApex.apk", "app/CtsShimAddApkToApex@3/CtsShimAddApkToApex.apk", "app/CtsShimAddApkToApex@AOSP.MASTER/CtsShimAddApkToApex.apk", "app/CtsShimAddApkToApex@MASTER/CtsShimAddApkToApex.apk", "app/CtsShimAddApkToApex@MAIN/CtsShimAddApkToApex.apk", "app/CtsShimTargetPSdk/CtsShimTargetPSdk.apk", "app/CtsShimTargetPSdk@1/CtsShimTargetPSdk.apk", "app/CtsShimTargetPSdk@2/CtsShimTargetPSdk.apk", "app/CtsShimTargetPSdk@3/CtsShimTargetPSdk.apk", "app/CtsShimTargetPSdk@AOSP.MASTER/CtsShimTargetPSdk.apk", "app/CtsShimTargetPSdk@MASTER/CtsShimTargetPSdk.apk", "app/CtsShimTargetPSdk@MAIN/CtsShimTargetPSdk.apk", "priv-app/CtsShimPriv/CtsShimPriv.apk", "priv-app/CtsShimPriv@1/CtsShimPriv.apk", "priv-app/CtsShimPriv@2/CtsShimPriv.apk", "priv-app/CtsShimPriv@3/CtsShimPriv.apk", "priv-app/CtsShimPriv@AOSP.MASTER/CtsShimPriv.apk", "priv-app/CtsShimPriv@MASTER/CtsShimPriv.apk", "priv-app/CtsShimPriv@MAIN/CtsShimPriv.apk", }; Result> GetAllowedHashes(const std::string& path) { using android::base::ReadFileToString; using android::base::StringPrintf; const std::string& file_path = StringPrintf("%s/%s", path.c_str(), kHashFilePath); LOG(DEBUG) << "Reading SHA512 from " << file_path; std::string hash; if (!ReadFileToString(file_path, &hash, false /* follows symlinks */)) { return ErrnoError() << "Failed to read " << file_path; } std::vector allowed_hashes = android::base::Split(hash, "\n"); auto system_shim_hash = CalculateSha512( StringPrintf("%s/%s", kApexPackageSystemDir, shim::kSystemShimApexName)); if (!system_shim_hash.ok()) { return system_shim_hash.error(); } allowed_hashes.push_back(std::move(*system_shim_hash)); return allowed_hashes; } } // namespace bool IsShimApex(const ApexFile& apex_file) { return apex_file.GetManifest().name() == kApexCtsShimPackage; } Result ValidateShimApex(const std::string& mount_point, const ApexFile& apex_file) { LOG(DEBUG) << "Validating shim apex " << mount_point; const ApexManifest& manifest = apex_file.GetManifest(); if (!manifest.preinstallhook().empty() || !manifest.postinstallhook().empty()) { return Errorf("Shim apex is not allowed to have pre or post install hooks"); } std::error_code ec; std::unordered_set expected_files; for (auto file : kExpectedCtsShimFiles) { expected_files.insert(file); } auto iter = fs::recursive_directory_iterator(mount_point, ec); // Unfortunately fs::recursive_directory_iterator::operator++ can throw an // exception, which means that it's impossible to use range-based for loop // here. while (iter != fs::end(iter)) { auto path = iter->path(); // Resolve the mount point to ensure any trailing slash is removed. auto resolved_mount_point = fs::path(mount_point).string(); auto local_path = path.string().substr(resolved_mount_point.length() + 1); fs::file_status status = iter->status(ec); if (fs::is_symlink(status)) { return Error() << "Shim apex is not allowed to contain symbolic links, found " << path; } else if (fs::is_regular_file(status)) { if ((status.permissions() & kForbiddenFilePermissions) != fs::perms::none) { return Error() << path << " has illegal permissions"; } auto ex = expected_files.find(local_path); if (ex != expected_files.end()) { expected_files.erase(local_path); } else { return Error() << path << " is an unexpected file inside the shim apex"; } } else if (!fs::is_directory(status)) { // If this is not a symlink, a file or a directory, fail. return Error() << "Unexpected file entry in shim apex: " << iter->path(); } iter = iter.increment(ec); if (ec) { return Error() << "Failed to scan " << mount_point << " : " << ec.message(); } } return {}; } Result ValidateUpdate(const std::string& system_apex_path, const std::string& new_apex_path) { LOG(DEBUG) << "Validating update of shim apex to " << new_apex_path << " using system shim apex " << system_apex_path; auto allowed = GetAllowedHashes(system_apex_path); if (!allowed.ok()) { return allowed.error(); } auto actual = CalculateSha512(new_apex_path); if (!actual.ok()) { return actual.error(); } auto it = std::find(allowed->begin(), allowed->end(), *actual); if (it == allowed->end()) { return Error() << new_apex_path << " has unexpected SHA512 hash " << *actual; } return {}; } } // namespace shim } // namespace apex } // namespace android