blob: 88c90f8c4a251c1f9d05af7aec4aa738eac339c3 [file] [log] [blame]
/*
* Copyright (C) 2007 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <stdlib.h>
#include <string>
#include <vector>
#ifdef AB_OTA_UPDATER
#include <inttypes.h>
#include <map>
#include <android-base/parseint.h>
#include <android-base/stringprintf.h>
#include <android-base/strings.h>
#endif
#include <cutils/properties.h>
#include "common.h"
#include "installcommand.h"
#include <ziparchive/zip_archive.h>
#include "twinstall/install.h"
#ifdef AB_OTA_UPDATER
static constexpr const char* AB_OTA_PAYLOAD_PROPERTIES = "payload_properties.txt";
static constexpr const char* AB_OTA_PAYLOAD = "payload.bin";
static constexpr const char* METADATA_PATH = "META-INF/com/android/metadata";
// This function parses and returns the build.version.incremental
static int parse_build_number(std::string str) {
size_t pos = str.find("=");
if (pos != std::string::npos) {
std::string num_string = android::base::Trim(str.substr(pos+1));
int build_number;
if (android::base::ParseInt(num_string.c_str(), &build_number, 0)) {
return build_number;
}
}
printf("Failed to parse build number in %s.\n", str.c_str());
return -1;
}
bool read_metadata_from_package(ZipArchiveHandle zip, std::string* meta_data) {
std::string binary_name(METADATA_PATH);
ZipEntry64 binary_entry;
if (FindEntry(zip, binary_name, &binary_entry) == 0) {
long size = binary_entry.uncompressed_length;
if (size <= 0)
return false;
meta_data->resize(size, '\0');
int32_t ret = ExtractToMemory(zip, &binary_entry, reinterpret_cast<uint8_t*>(&(*meta_data)[0]),
size);
if (ret != 0) {
printf("Failed to read metadata in update package.\n");
return false;
}
return true;
}
return false;
}
// Read the build.version.incremental of src/tgt from the metadata and log it to last_install.
void read_source_target_build(ZipArchiveHandle zip/*, std::vector<std::string>& log_buffer*/) {
std::string meta_data;
if (!read_metadata_from_package(zip, &meta_data)) {
return;
}
// Examples of the pre-build and post-build strings in metadata:
// pre-build-incremental=2943039
// post-build-incremental=2951741
std::vector<std::string> lines = android::base::Split(meta_data, "\n");
for (const std::string& line : lines) {
std::string str = android::base::Trim(line);
if (android::base::StartsWith(str, "pre-build-incremental")){
int source_build = parse_build_number(str);
if (source_build != -1) {
printf("source_build: %d\n", source_build);
/*log_buffer.push_back(android::base::StringPrintf("source_build: %d",
source_build));*/
}
} else if (android::base::StartsWith(str, "post-build-incremental")) {
int target_build = parse_build_number(str);
if (target_build != -1) {
printf("target_build: %d\n", target_build);
/*log_buffer.push_back(android::base::StringPrintf("target_build: %d",
target_build));*/
}
}
}
}
// Parses the metadata of the OTA package in |zip| and checks whether we are
// allowed to accept this A/B package. Downgrading is not allowed unless
// explicitly enabled in the package and only for incremental packages.
static int check_newer_ab_build(ZipArchiveHandle zip)
{
std::string metadata_str;
if (!read_metadata_from_package(zip, &metadata_str)) {
return INSTALL_CORRUPT;
}
std::map<std::string, std::string> metadata;
for (const std::string& line : android::base::Split(metadata_str, "\n")) {
size_t eq = line.find('=');
if (eq != std::string::npos) {
metadata[line.substr(0, eq)] = line.substr(eq + 1);
}
}
char value[PROPERTY_VALUE_MAX];
char propmodel[PROPERTY_VALUE_MAX];
char propname[PROPERTY_VALUE_MAX];
property_get("ro.product.device", value, "");
property_get("ro.product.model", propmodel, "");
property_get("ro.product.name", propname, "");
const std::string& pkg_device = metadata["pre-device"];
std::vector<std::string> assertResults = android::base::Split(pkg_device, ",");
bool deviceExists = false;
// twrp.target.devices
bool has_target_devices = false;
char tw_devices[PROPERTY_VALUE_MAX * 2];
property_get("ro.twrp.target.devices", tw_devices, "");
std::vector<std::string> TWRP_devices = android::base::Split(tw_devices, ",");
if (strlen(tw_devices) > 1) {
has_target_devices = true;
}
for(const std::string& deviceAssert : assertResults)
{
std::string assertName = android::base::Trim(deviceAssert);
if ((assertName == value || assertName == propmodel || assertName == propname ) && !assertName.empty()) {
deviceExists = true;
break;
}
// twrp.target.devices
else if (has_target_devices) {
for(const std::string& twrpDevice_x : TWRP_devices) {
std::string twrpName = android::base::Trim(twrpDevice_x);
if (!twrpName.empty() && !assertName.empty() && assertName == twrpName) {
deviceExists = true;
printf("Package is for product %s. The selected TWRP target device is %s\n", pkg_device.c_str(), twrpName.c_str());
break;
}
}
}
}
if (!deviceExists) {
printf("Package is for product %s but expected %s\n",
pkg_device.c_str(), value);
return INSTALL_ERROR;
}
// We allow the package to not have any serialno, but if it has a non-empty
// value it should match.
property_get("ro.serialno", value, "");
const std::string& pkg_serial_no = metadata["serialno"];
if (!pkg_serial_no.empty() && pkg_serial_no != value) {
printf("Package is for serial %s\n", pkg_serial_no.c_str());
return INSTALL_ERROR;
}
if (metadata["ota-type"] != "AB") {
printf("Package is not A/B\n");
return INSTALL_ERROR;
}
// Incremental updates should match the current build.
property_get("ro.build.version.incremental", value, "");
const std::string& pkg_pre_build = metadata["pre-build-incremental"];
if (!pkg_pre_build.empty() && pkg_pre_build != value) {
printf("Package is for source build %s but expected %s\n",
pkg_pre_build.c_str(), value);
return INSTALL_ERROR;
}
property_get("ro.build.fingerprint", value, "");
const std::string& pkg_pre_build_fingerprint = metadata["pre-build"];
if (!pkg_pre_build_fingerprint.empty() &&
pkg_pre_build_fingerprint != value) {
printf("Package is for source build %s but expected %s\n",
pkg_pre_build_fingerprint.c_str(), value);
return INSTALL_ERROR;
}
return 0;
}
int
abupdate_binary_command(const char* path, int retry_count __unused,
int status_fd, std::vector<std::string>* cmd)
{
auto package = Package::CreateMemoryPackage(path);
if (!package) {
return INSTALL_CORRUPT;
}
ZipArchiveHandle Zip = package->GetZipArchiveHandle();
read_source_target_build(Zip);
int ret = check_newer_ab_build(Zip);
if (ret) {
return ret;
}
// For A/B updates we extract the payload properties to a buffer and obtain
// the RAW payload offset in the zip file.
// if (!Zip->EntryExists(AB_OTA_PAYLOAD_PROPERTIES)) {
std::string binary_name(AB_OTA_PAYLOAD_PROPERTIES);
ZipEntry64 binary_entry;
if (FindEntry(Zip, binary_name, &binary_entry) != 0) {
printf("Can't find %s\n", AB_OTA_PAYLOAD_PROPERTIES);
return INSTALL_CORRUPT;
}
std::vector<unsigned char> payload_properties(
binary_entry.uncompressed_length);
int32_t extract_ret = ExtractToMemory(Zip, &binary_entry, reinterpret_cast<uint8_t*>(payload_properties.data()),
binary_entry.uncompressed_length);
if (extract_ret != 0) {
printf("Can't extract %s\n", AB_OTA_PAYLOAD_PROPERTIES);
return false;
}
std::string ab_ota_payload(AB_OTA_PAYLOAD);
ZipEntry64 ab_ota_payload_entry;
if (FindEntry(Zip, ab_ota_payload, &ab_ota_payload_entry) != 0) {
printf("Can't find %s\n", AB_OTA_PAYLOAD);
return INSTALL_CORRUPT;
}
// long payload_offset = Zip->GetEntryOffset(AB_OTA_PAYLOAD);
long payload_offset = ab_ota_payload_entry.offset;
*cmd = {
"/system/bin/update_engine_sideload",
android::base::StringPrintf("--payload=file://%s", path),
android::base::StringPrintf("--offset=%ld", payload_offset),
"--headers=" + std::string(payload_properties.begin(),
payload_properties.end()),
android::base::StringPrintf("--status_fd=%d", status_fd),
};
return INSTALL_SUCCESS;
}
#else
void read_source_target_build(ZipArchiveHandle zip __unused /*, std::vector<std::string>& log_buffer*/) {return;}
int
abupdate_binary_command(__unused const char* path, __unused int retry_count,
__unused int status_fd, __unused std::vector<std::string>* cmd)
{
printf("No support for AB OTA zips included\n");
return INSTALL_CORRUPT;
}
#endif
int
update_binary_command(const char* path, int retry_count,
int status_fd, std::vector<std::string>* cmd)
{
char charfd[16];
sprintf(charfd, "%i", status_fd);
cmd->push_back(TMP_UPDATER_BINARY_PATH);
cmd->push_back(EXPAND(RECOVERY_API_VERSION));
cmd->push_back(charfd);
cmd->push_back(path);
/**cmd = {
TMP_UPDATER_BINARY_PATH,
EXPAND(RECOVERY_API_VERSION), // defined in Android.mk
charfd,
path,
};*/
if (retry_count > 0)
cmd->push_back("retry");
return 0;
}
// Verifes the compatibility info in a Treble-compatible package. Returns true directly if the
// entry doesn't exist. Note that the compatibility info is packed in a zip file inside the OTA
// package.
bool verify_package_compatibility(ZipArchiveHandle zw) {
printf("Verifying package compatibility...\n");
static constexpr const char* COMPATIBILITY_ZIP_ENTRY = "compatibility.zip";
std::string compatibility_entry_name(COMPATIBILITY_ZIP_ENTRY);
ZipEntry64 compatibility_entry;
if (FindEntry(zw, compatibility_entry_name, &compatibility_entry) != 0) {
printf("Package doesn't contain %s entry\n", COMPATIBILITY_ZIP_ENTRY);
return true;
}
std::string zip_content(compatibility_entry.uncompressed_length, '\0');
int32_t ret;
if ((ret = ExtractToMemory(zw, &compatibility_entry,
reinterpret_cast<uint8_t*>(&zip_content[0]),
compatibility_entry.uncompressed_length)) != 0) {
printf("Failed to read %s: %s\n", COMPATIBILITY_ZIP_ENTRY, ErrorCodeString(ret));
return false;
}
ZipArchiveHandle zip_handle;
ret = OpenArchiveFromMemory(static_cast<void*>(const_cast<char*>(zip_content.data())),
zip_content.size(), COMPATIBILITY_ZIP_ENTRY, &zip_handle);
if (ret != 0) {
printf("Failed to OpenArchiveFromMemory: %s\n", ErrorCodeString(ret));
return false;
}
// Iterate all the entries inside COMPATIBILITY_ZIP_ENTRY and read the contents.
void* cookie;
ret = StartIteration(zip_handle, &cookie);
if (ret != 0) {
printf("Failed to start iterating zip entries: %s\n", ErrorCodeString(ret));
CloseArchive(zip_handle);
return false;
}
std::unique_ptr<void, decltype(&EndIteration)> guard(cookie, EndIteration);
std::vector<std::string> compatibility_info;
ZipEntry64 info_entry;
std::string info_name;
while (Next(cookie, &info_entry, &info_name) == 0) {
std::string content(info_entry.uncompressed_length, '\0');
int32_t ret = ExtractToMemory(zip_handle, &info_entry, reinterpret_cast<uint8_t*>(&content[0]),
info_entry.uncompressed_length);
if (ret != 0) {
printf("Failed to read %s: %s\n", info_name.c_str(), ErrorCodeString(ret));
CloseArchive(zip_handle);
return false;
}
compatibility_info.emplace_back(std::move(content));
}
CloseArchive(zip_handle);
return true;
}