Home | History | Annotate | Download | only in updates
      1 /*
      2  * Copyright (C) 2012 The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *      http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 
     17 package com.android.server.updates;
     18 
     19 import android.content.BroadcastReceiver;
     20 import android.content.ContentResolver;
     21 import android.content.Context;
     22 import android.content.Intent;
     23 import android.net.Uri;
     24 import android.provider.Settings;
     25 import android.util.Base64;
     26 import android.util.EventLog;
     27 import android.util.Slog;
     28 
     29 import com.android.server.EventLogTags;
     30 
     31 import java.io.ByteArrayInputStream;
     32 import java.io.File;
     33 import java.io.FileOutputStream;
     34 import java.io.InputStream;
     35 import java.io.IOException;
     36 import java.security.cert.CertificateException;
     37 import java.security.cert.CertificateFactory;
     38 import java.security.cert.X509Certificate;
     39 import java.security.MessageDigest;
     40 import java.security.NoSuchAlgorithmException;
     41 import java.security.Signature;
     42 
     43 import libcore.io.IoUtils;
     44 import libcore.io.Streams;
     45 
     46 public class ConfigUpdateInstallReceiver extends BroadcastReceiver {
     47 
     48     private static final String TAG = "ConfigUpdateInstallReceiver";
     49 
     50     private static final String EXTRA_CONTENT_PATH = "CONTENT_PATH";
     51     private static final String EXTRA_REQUIRED_HASH = "REQUIRED_HASH";
     52     private static final String EXTRA_SIGNATURE = "SIGNATURE";
     53     private static final String EXTRA_VERSION_NUMBER = "VERSION";
     54 
     55     private static final String UPDATE_CERTIFICATE_KEY = "config_update_certificate";
     56 
     57     protected final File updateDir;
     58     protected final File updateContent;
     59     protected final File updateVersion;
     60 
     61     public ConfigUpdateInstallReceiver(String updateDir, String updateContentPath,
     62                                        String updateMetadataPath, String updateVersionPath) {
     63         this.updateDir = new File(updateDir);
     64         this.updateContent = new File(updateDir, updateContentPath);
     65         File updateMetadataDir = new File(updateDir, updateMetadataPath);
     66         this.updateVersion = new File(updateMetadataDir, updateVersionPath);
     67     }
     68 
     69     @Override
     70     public void onReceive(final Context context, final Intent intent) {
     71         new Thread() {
     72             @Override
     73             public void run() {
     74                 try {
     75                     // get the certificate from Settings.Secure
     76                     X509Certificate cert = getCert(context.getContentResolver());
     77                     // get the content path from the extras
     78                     byte[] altContent = getAltContent(context, intent);
     79                     // get the version from the extras
     80                     int altVersion = getVersionFromIntent(intent);
     81                     // get the previous value from the extras
     82                     String altRequiredHash = getRequiredHashFromIntent(intent);
     83                     // get the signature from the extras
     84                     String altSig = getSignatureFromIntent(intent);
     85                     // get the version currently being used
     86                     int currentVersion = getCurrentVersion();
     87                     // get the hash of the currently used value
     88                     String currentHash = getCurrentHash(getCurrentContent());
     89                     if (!verifyVersion(currentVersion, altVersion)) {
     90                         Slog.i(TAG, "Not installing, new version is <= current version");
     91                     } else if (!verifyPreviousHash(currentHash, altRequiredHash)) {
     92                         EventLog.writeEvent(EventLogTags.CONFIG_INSTALL_FAILED,
     93                                             "Current hash did not match required value");
     94                     } else if (!verifySignature(altContent, altVersion, altRequiredHash, altSig,
     95                                cert)) {
     96                         EventLog.writeEvent(EventLogTags.CONFIG_INSTALL_FAILED,
     97                                             "Signature did not verify");
     98                     } else {
     99                         // install the new content
    100                         Slog.i(TAG, "Found new update, installing...");
    101                         install(altContent, altVersion);
    102                         Slog.i(TAG, "Installation successful");
    103                         postInstall(context, intent);
    104                     }
    105                 } catch (Exception e) {
    106                     Slog.e(TAG, "Could not update content!", e);
    107                     // keep the error message <= 100 chars
    108                     String errMsg = e.toString();
    109                     if (errMsg.length() > 100) {
    110                         errMsg = errMsg.substring(0, 99);
    111                     }
    112                     EventLog.writeEvent(EventLogTags.CONFIG_INSTALL_FAILED, errMsg);
    113                 }
    114             }
    115         }.start();
    116     }
    117 
    118     private X509Certificate getCert(ContentResolver cr) {
    119         // get the cert from settings
    120         String cert = Settings.Secure.getString(cr, UPDATE_CERTIFICATE_KEY);
    121         // convert it into a real certificate
    122         try {
    123             byte[] derCert = Base64.decode(cert.getBytes(), Base64.DEFAULT);
    124             InputStream istream = new ByteArrayInputStream(derCert);
    125             CertificateFactory cf = CertificateFactory.getInstance("X.509");
    126             return (X509Certificate) cf.generateCertificate(istream);
    127         } catch (CertificateException e) {
    128             throw new IllegalStateException("Got malformed certificate from settings, ignoring");
    129         }
    130     }
    131 
    132     private Uri getContentFromIntent(Intent i) {
    133         Uri data = i.getData();
    134         if (data == null) {
    135             throw new IllegalStateException("Missing required content path, ignoring.");
    136         }
    137         return data;
    138     }
    139 
    140     private int getVersionFromIntent(Intent i) throws NumberFormatException {
    141         String extraValue = i.getStringExtra(EXTRA_VERSION_NUMBER);
    142         if (extraValue == null) {
    143             throw new IllegalStateException("Missing required version number, ignoring.");
    144         }
    145         return Integer.parseInt(extraValue.trim());
    146     }
    147 
    148     private String getRequiredHashFromIntent(Intent i) {
    149         String extraValue = i.getStringExtra(EXTRA_REQUIRED_HASH);
    150         if (extraValue == null) {
    151             throw new IllegalStateException("Missing required previous hash, ignoring.");
    152         }
    153         return extraValue.trim();
    154     }
    155 
    156     private String getSignatureFromIntent(Intent i) {
    157         String extraValue = i.getStringExtra(EXTRA_SIGNATURE);
    158         if (extraValue == null) {
    159             throw new IllegalStateException("Missing required signature, ignoring.");
    160         }
    161         return extraValue.trim();
    162     }
    163 
    164     private int getCurrentVersion() throws NumberFormatException {
    165         try {
    166             String strVersion = IoUtils.readFileAsString(updateVersion.getCanonicalPath()).trim();
    167             return Integer.parseInt(strVersion);
    168         } catch (IOException e) {
    169             Slog.i(TAG, "Couldn't find current metadata, assuming first update");
    170             return 0;
    171         }
    172     }
    173 
    174     private byte[] getAltContent(Context c, Intent i) throws IOException {
    175         Uri content = getContentFromIntent(i);
    176         InputStream is = c.getContentResolver().openInputStream(content);
    177         try {
    178             return Streams.readFullyNoClose(is);
    179         } finally {
    180             is.close();
    181         }
    182     }
    183 
    184     private byte[] getCurrentContent() {
    185         try {
    186             return IoUtils.readFileAsByteArray(updateContent.getCanonicalPath());
    187         } catch (IOException e) {
    188             Slog.i(TAG, "Failed to read current content, assuming first update!");
    189             return null;
    190         }
    191     }
    192 
    193     private static String getCurrentHash(byte[] content) {
    194         if (content == null) {
    195             return "0";
    196         }
    197         try {
    198             MessageDigest dgst = MessageDigest.getInstance("SHA512");
    199             byte[] fingerprint = dgst.digest(content);
    200             return IntegralToString.bytesToHexString(fingerprint, false);
    201         } catch (NoSuchAlgorithmException e) {
    202             throw new AssertionError(e);
    203         }
    204     }
    205 
    206     private boolean verifyVersion(int current, int alternative) {
    207         return (current < alternative);
    208     }
    209 
    210     private boolean verifyPreviousHash(String current, String required) {
    211         // this is an optional value- if the required field is NONE then we ignore it
    212         if (required.equals("NONE")) {
    213             return true;
    214         }
    215         // otherwise, verify that we match correctly
    216         return current.equals(required);
    217     }
    218 
    219     private boolean verifySignature(byte[] content, int version, String requiredPrevious,
    220                                    String signature, X509Certificate cert) throws Exception {
    221         Signature signer = Signature.getInstance("SHA512withRSA");
    222         signer.initVerify(cert);
    223         signer.update(content);
    224         signer.update(Long.toString(version).getBytes());
    225         signer.update(requiredPrevious.getBytes());
    226         return signer.verify(Base64.decode(signature.getBytes(), Base64.DEFAULT));
    227     }
    228 
    229     protected void writeUpdate(File dir, File file, byte[] content) throws IOException {
    230         FileOutputStream out = null;
    231         File tmp = null;
    232         try {
    233             // create the parents for the destination file
    234             File parent = file.getParentFile();
    235             parent.mkdirs();
    236             // check that they were created correctly
    237             if (!parent.exists()) {
    238                 throw new IOException("Failed to create directory " + parent.getCanonicalPath());
    239             }
    240             // create the temporary file
    241             tmp = File.createTempFile("journal", "", dir);
    242             // mark tmp -rw-r--r--
    243             tmp.setReadable(true, false);
    244             // write to it
    245             out = new FileOutputStream(tmp);
    246             out.write(content);
    247             // sync to disk
    248             out.getFD().sync();
    249             // atomic rename
    250             if (!tmp.renameTo(file)) {
    251                 throw new IOException("Failed to atomically rename " + file.getCanonicalPath());
    252             }
    253         } finally {
    254             if (tmp != null) {
    255                 tmp.delete();
    256             }
    257             IoUtils.closeQuietly(out);
    258         }
    259     }
    260 
    261     protected void install(byte[] content, int version) throws IOException {
    262         writeUpdate(updateDir, updateContent, content);
    263         writeUpdate(updateDir, updateVersion, Long.toString(version).getBytes());
    264     }
    265 
    266     protected void postInstall(Context context, Intent intent) {
    267     }
    268 }
    269