blob: ec498ffb393cd0338d1ad494ad2179d295d4b0a1 [file] [log] [blame]
Mårten Kongstad02751232018-04-27 13:16:32 +02001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <algorithm>
18#include <iostream>
19#include <iterator>
20#include <limits>
21#include <map>
22#include <memory>
23#include <set>
24#include <string>
25#include <utility>
26#include <vector>
27
28#include "android-base/macros.h"
29#include "android-base/stringprintf.h"
30#include "androidfw/AssetManager2.h"
31#include "utils/String16.h"
32#include "utils/String8.h"
33
34#include "idmap2/Idmap.h"
35#include "idmap2/ResourceUtils.h"
Mårten Kongstad0f763112018-11-19 14:14:37 +010036#include "idmap2/Result.h"
Mårten Kongstad4cbb0072018-11-30 16:22:05 +010037#include "idmap2/SysTrace.h"
Mårten Kongstad02751232018-04-27 13:16:32 +020038#include "idmap2/ZipFile.h"
39
Mårten Kongstad0eba72a2018-11-29 08:23:14 +010040namespace android::idmap2 {
Mårten Kongstad02751232018-04-27 13:16:32 +020041
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010042namespace {
43
Mårten Kongstad02751232018-04-27 13:16:32 +020044#define EXTRACT_TYPE(resid) ((0x00ff0000 & (resid)) >> 16)
45
46#define EXTRACT_ENTRY(resid) (0x0000ffff & (resid))
47
Mårten Kongstadcf281362018-11-28 19:32:25 +010048class MatchingResources {
49 public:
Mårten Kongstad02751232018-04-27 13:16:32 +020050 void Add(ResourceId target_resid, ResourceId overlay_resid) {
51 TypeId target_typeid = EXTRACT_TYPE(target_resid);
Mårten Kongstadcf281362018-11-28 19:32:25 +010052 if (map_.find(target_typeid) == map_.end()) {
53 map_.emplace(target_typeid, std::set<std::pair<ResourceId, ResourceId>>());
Mårten Kongstad02751232018-04-27 13:16:32 +020054 }
Mårten Kongstadcf281362018-11-28 19:32:25 +010055 map_[target_typeid].insert(std::make_pair(target_resid, overlay_resid));
Mårten Kongstad02751232018-04-27 13:16:32 +020056 }
57
Mårten Kongstadcf281362018-11-28 19:32:25 +010058 inline const std::map<TypeId, std::set<std::pair<ResourceId, ResourceId>>>& Map() const {
59 return map_;
60 }
61
62 private:
Mårten Kongstad02751232018-04-27 13:16:32 +020063 // target type id -> set { pair { overlay entry id, overlay entry id } }
Mårten Kongstadcf281362018-11-28 19:32:25 +010064 std::map<TypeId, std::set<std::pair<ResourceId, ResourceId>>> map_;
Mårten Kongstad02751232018-04-27 13:16:32 +020065};
66
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010067bool WARN_UNUSED Read16(std::istream& stream, uint16_t* out) {
Mårten Kongstad02751232018-04-27 13:16:32 +020068 uint16_t value;
69 if (stream.read(reinterpret_cast<char*>(&value), sizeof(uint16_t))) {
70 *out = dtohl(value);
71 return true;
72 }
73 return false;
74}
75
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010076bool WARN_UNUSED Read32(std::istream& stream, uint32_t* out) {
Mårten Kongstad02751232018-04-27 13:16:32 +020077 uint32_t value;
78 if (stream.read(reinterpret_cast<char*>(&value), sizeof(uint32_t))) {
79 *out = dtohl(value);
80 return true;
81 }
82 return false;
83}
84
85// a string is encoded as a kIdmapStringLength char array; the array is always null-terminated
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010086bool WARN_UNUSED ReadString(std::istream& stream, char out[kIdmapStringLength]) {
Mårten Kongstad02751232018-04-27 13:16:32 +020087 char buf[kIdmapStringLength];
88 memset(buf, 0, sizeof(buf));
89 if (!stream.read(buf, sizeof(buf))) {
90 return false;
91 }
92 if (buf[sizeof(buf) - 1] != '\0') {
93 return false;
94 }
95 memcpy(out, buf, sizeof(buf));
96 return true;
97}
98
Mårten Kongstad744ccfe2018-12-20 14:56:14 +010099ResourceId NameToResid(const AssetManager2& am, const std::string& name) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200100 return am.GetResourceId(name);
101}
102
103// TODO(martenkongstad): scan for package name instead of assuming package at index 0
104//
105// idmap version 0x01 naively assumes that the package to use is always the first ResTable_package
106// in the resources.arsc blob. In most cases, there is only a single ResTable_package anyway, so
107// this assumption tends to work out. That said, the correct thing to do is to scan
108// resources.arsc for a package with a given name as read from the package manifest instead of
109// relying on a hard-coded index. This however requires storing the package name in the idmap
110// header, which in turn requires incrementing the idmap version. Because the initial version of
111// idmap2 is compatible with idmap, this will have to wait for now.
Mårten Kongstad744ccfe2018-12-20 14:56:14 +0100112const LoadedPackage* GetPackageAtIndex0(const LoadedArsc& loaded_arsc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200113 const std::vector<std::unique_ptr<const LoadedPackage>>& packages = loaded_arsc.GetPackages();
114 if (packages.empty()) {
115 return nullptr;
116 }
117 int id = packages[0]->GetPackageId();
118 return loaded_arsc.GetPackageById(id);
119}
120
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100121Result<uint32_t> GetCrc(const ZipFile& zip) {
122 const Result<uint32_t> a = zip.Crc("resources.arsc");
123 const Result<uint32_t> b = zip.Crc("AndroidManifest.xml");
124 return a && b ? Result<uint32_t>(*a ^ *b) : kResultError;
125}
126
Mårten Kongstad744ccfe2018-12-20 14:56:14 +0100127} // namespace
128
Mårten Kongstad02751232018-04-27 13:16:32 +0200129std::unique_ptr<const IdmapHeader> IdmapHeader::FromBinaryStream(std::istream& stream) {
130 std::unique_ptr<IdmapHeader> idmap_header(new IdmapHeader());
131
132 if (!Read32(stream, &idmap_header->magic_) || !Read32(stream, &idmap_header->version_) ||
133 !Read32(stream, &idmap_header->target_crc_) || !Read32(stream, &idmap_header->overlay_crc_) ||
134 !ReadString(stream, idmap_header->target_path_) ||
135 !ReadString(stream, idmap_header->overlay_path_)) {
136 return nullptr;
137 }
138
139 return std::move(idmap_header);
140}
141
142bool IdmapHeader::IsUpToDate(std::ostream& out_error) const {
143 if (magic_ != kIdmapMagic) {
144 out_error << base::StringPrintf("error: bad magic: actual 0x%08x, expected 0x%08x", magic_,
145 kIdmapMagic)
146 << std::endl;
147 return false;
148 }
149
150 if (version_ != kIdmapCurrentVersion) {
151 out_error << base::StringPrintf("error: bad version: actual 0x%08x, expected 0x%08x", version_,
152 kIdmapCurrentVersion)
153 << std::endl;
154 return false;
155 }
156
157 const std::unique_ptr<const ZipFile> target_zip = ZipFile::Open(target_path_);
158 if (!target_zip) {
159 out_error << "error: failed to open target " << target_path_ << std::endl;
160 return false;
161 }
162
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100163 Result<uint32_t> target_crc = GetCrc(*target_zip);
Mårten Kongstad0f763112018-11-19 14:14:37 +0100164 if (!target_crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200165 out_error << "error: failed to get target crc" << std::endl;
166 return false;
167 }
168
Mårten Kongstad0f763112018-11-19 14:14:37 +0100169 if (target_crc_ != *target_crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200170 out_error << base::StringPrintf(
171 "error: bad target crc: idmap version 0x%08x, file system version 0x%08x",
Mårten Kongstad0f763112018-11-19 14:14:37 +0100172 target_crc_, *target_crc)
Mårten Kongstad02751232018-04-27 13:16:32 +0200173 << std::endl;
174 return false;
175 }
176
177 const std::unique_ptr<const ZipFile> overlay_zip = ZipFile::Open(overlay_path_);
178 if (!overlay_zip) {
179 out_error << "error: failed to open overlay " << overlay_path_ << std::endl;
180 return false;
181 }
182
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100183 Result<uint32_t> overlay_crc = GetCrc(*overlay_zip);
Mårten Kongstad0f763112018-11-19 14:14:37 +0100184 if (!overlay_crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200185 out_error << "error: failed to get overlay crc" << std::endl;
186 return false;
187 }
188
Mårten Kongstad0f763112018-11-19 14:14:37 +0100189 if (overlay_crc_ != *overlay_crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200190 out_error << base::StringPrintf(
191 "error: bad overlay crc: idmap version 0x%08x, file system version 0x%08x",
Mårten Kongstad0f763112018-11-19 14:14:37 +0100192 overlay_crc_, *overlay_crc)
Mårten Kongstad02751232018-04-27 13:16:32 +0200193 << std::endl;
194 return false;
195 }
196
197 return true;
198}
199
200std::unique_ptr<const IdmapData::Header> IdmapData::Header::FromBinaryStream(std::istream& stream) {
201 std::unique_ptr<IdmapData::Header> idmap_data_header(new IdmapData::Header());
202
203 uint16_t target_package_id16;
204 if (!Read16(stream, &target_package_id16) || !Read16(stream, &idmap_data_header->type_count_)) {
205 return nullptr;
206 }
207 idmap_data_header->target_package_id_ = target_package_id16;
208
209 return std::move(idmap_data_header);
210}
211
212std::unique_ptr<const IdmapData::TypeEntry> IdmapData::TypeEntry::FromBinaryStream(
213 std::istream& stream) {
214 std::unique_ptr<IdmapData::TypeEntry> data(new IdmapData::TypeEntry());
Mårten Kongstadb8779022018-11-29 09:53:17 +0100215 uint16_t target_type16;
216 uint16_t overlay_type16;
217 uint16_t entry_count;
Mårten Kongstad02751232018-04-27 13:16:32 +0200218 if (!Read16(stream, &target_type16) || !Read16(stream, &overlay_type16) ||
219 !Read16(stream, &entry_count) || !Read16(stream, &data->entry_offset_)) {
220 return nullptr;
221 }
222 data->target_type_id_ = target_type16;
223 data->overlay_type_id_ = overlay_type16;
224 for (uint16_t i = 0; i < entry_count; i++) {
225 ResourceId resid;
226 if (!Read32(stream, &resid)) {
227 return nullptr;
228 }
229 data->entries_.push_back(resid);
230 }
231
232 return std::move(data);
233}
234
235std::unique_ptr<const IdmapData> IdmapData::FromBinaryStream(std::istream& stream) {
236 std::unique_ptr<IdmapData> data(new IdmapData());
237 data->header_ = IdmapData::Header::FromBinaryStream(stream);
238 if (!data->header_) {
239 return nullptr;
240 }
241 for (size_t type_count = 0; type_count < data->header_->GetTypeCount(); type_count++) {
242 std::unique_ptr<const TypeEntry> type = IdmapData::TypeEntry::FromBinaryStream(stream);
243 if (!type) {
244 return nullptr;
245 }
246 data->type_entries_.push_back(std::move(type));
247 }
248 return std::move(data);
249}
250
251std::string Idmap::CanonicalIdmapPathFor(const std::string& absolute_dir,
252 const std::string& absolute_apk_path) {
253 assert(absolute_dir.size() > 0 && absolute_dir[0] == "/");
254 assert(absolute_apk_path.size() > 0 && absolute_apk_path[0] == "/");
255 std::string copy(++absolute_apk_path.cbegin(), absolute_apk_path.cend());
256 replace(copy.begin(), copy.end(), '/', '@');
257 return absolute_dir + "/" + copy + "@idmap";
258}
259
260std::unique_ptr<const Idmap> Idmap::FromBinaryStream(std::istream& stream,
261 std::ostream& out_error) {
Mårten Kongstad4cbb0072018-11-30 16:22:05 +0100262 SYSTRACE << "Idmap::FromBinaryStream";
Mårten Kongstad02751232018-04-27 13:16:32 +0200263 std::unique_ptr<Idmap> idmap(new Idmap());
264
265 idmap->header_ = IdmapHeader::FromBinaryStream(stream);
266 if (!idmap->header_) {
267 out_error << "error: failed to parse idmap header" << std::endl;
268 return nullptr;
269 }
270
271 // idmap version 0x01 does not specify the number of data blocks that follow
272 // the idmap header; assume exactly one data block
273 for (int i = 0; i < 1; i++) {
274 std::unique_ptr<const IdmapData> data = IdmapData::FromBinaryStream(stream);
275 if (!data) {
276 out_error << "error: failed to parse data block " << i << std::endl;
277 return nullptr;
278 }
279 idmap->data_.push_back(std::move(data));
280 }
281
282 return std::move(idmap);
283}
284
Ryan Mitchella3628462019-01-14 12:19:40 -0800285bool CheckOverlayable(const LoadedPackage& target_package,
286 const utils::OverlayManifestInfo& overlay_info,
Winsonb4100202019-02-06 12:05:32 -0800287 const PolicyBitmask& fulfilled_policies, const ResourceId& resid) {
Ryan Mitchella3628462019-01-14 12:19:40 -0800288 const OverlayableInfo* overlayable_info = target_package.GetOverlayableInfo(resid);
289 if (overlayable_info == nullptr) {
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800290 // If the resource does not have an overlayable definition, allow the resource to be overlaid.
291 // Once overlayable enforcement is turned on, this check will return false.
Ryan Mitchell19823452019-01-29 12:01:24 -0800292 return !target_package.DefinesOverlayable();
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800293 }
294
Ryan Mitchell19823452019-01-29 12:01:24 -0800295 if (overlay_info.target_name != overlayable_info->name) {
Ryan Mitchella3628462019-01-14 12:19:40 -0800296 // If the overlay supplies a target overlayable name, the resource must belong to the
297 // overlayable defined with the specified name to be overlaid.
298 return false;
299 }
300
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800301 // Enforce policy restrictions if the resource is declared as overlayable.
Winsonb4100202019-02-06 12:05:32 -0800302 return (overlayable_info->policy_flags & fulfilled_policies) != 0;
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800303}
304
305std::unique_ptr<const Idmap> Idmap::FromApkAssets(
306 const std::string& target_apk_path, const ApkAssets& target_apk_assets,
307 const std::string& overlay_apk_path, const ApkAssets& overlay_apk_assets,
308 const PolicyBitmask& fulfilled_policies, bool enforce_overlayable, std::ostream& out_error) {
Mårten Kongstad4cbb0072018-11-30 16:22:05 +0100309 SYSTRACE << "Idmap::FromApkAssets";
Mårten Kongstad02751232018-04-27 13:16:32 +0200310 AssetManager2 target_asset_manager;
311 if (!target_asset_manager.SetApkAssets({&target_apk_assets}, true, false)) {
312 out_error << "error: failed to create target asset manager" << std::endl;
313 return nullptr;
314 }
315
316 AssetManager2 overlay_asset_manager;
317 if (!overlay_asset_manager.SetApkAssets({&overlay_apk_assets}, true, false)) {
318 out_error << "error: failed to create overlay asset manager" << std::endl;
319 return nullptr;
320 }
321
322 const LoadedArsc* target_arsc = target_apk_assets.GetLoadedArsc();
Mårten Kongstadb8779022018-11-29 09:53:17 +0100323 if (target_arsc == nullptr) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200324 out_error << "error: failed to load target resources.arsc" << std::endl;
325 return nullptr;
326 }
327
328 const LoadedArsc* overlay_arsc = overlay_apk_assets.GetLoadedArsc();
Mårten Kongstadb8779022018-11-29 09:53:17 +0100329 if (overlay_arsc == nullptr) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200330 out_error << "error: failed to load overlay resources.arsc" << std::endl;
331 return nullptr;
332 }
333
334 const LoadedPackage* target_pkg = GetPackageAtIndex0(*target_arsc);
Mårten Kongstadb8779022018-11-29 09:53:17 +0100335 if (target_pkg == nullptr) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200336 out_error << "error: failed to load target package from resources.arsc" << std::endl;
337 return nullptr;
338 }
339
340 const LoadedPackage* overlay_pkg = GetPackageAtIndex0(*overlay_arsc);
Mårten Kongstadb8779022018-11-29 09:53:17 +0100341 if (overlay_pkg == nullptr) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200342 out_error << "error: failed to load overlay package from resources.arsc" << std::endl;
343 return nullptr;
344 }
345
346 const std::unique_ptr<const ZipFile> target_zip = ZipFile::Open(target_apk_path);
347 if (!target_zip) {
348 out_error << "error: failed to open target as zip" << std::endl;
349 return nullptr;
350 }
351
352 const std::unique_ptr<const ZipFile> overlay_zip = ZipFile::Open(overlay_apk_path);
353 if (!overlay_zip) {
354 out_error << "error: failed to open overlay as zip" << std::endl;
355 return nullptr;
356 }
357
Ryan Mitchella3628462019-01-14 12:19:40 -0800358 Result<utils::OverlayManifestInfo> overlay_info =
359 utils::ExtractOverlayManifestInfo(overlay_apk_path, out_error);
360 if (!overlay_info) {
361 return nullptr;
362 }
363
Mårten Kongstad02751232018-04-27 13:16:32 +0200364 std::unique_ptr<IdmapHeader> header(new IdmapHeader());
365 header->magic_ = kIdmapMagic;
366 header->version_ = kIdmapCurrentVersion;
Mårten Kongstad0f763112018-11-19 14:14:37 +0100367
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100368 Result<uint32_t> crc = GetCrc(*target_zip);
Mårten Kongstad0f763112018-11-19 14:14:37 +0100369 if (!crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200370 out_error << "error: failed to get zip crc for target" << std::endl;
371 return nullptr;
372 }
Mårten Kongstad0f763112018-11-19 14:14:37 +0100373 header->target_crc_ = *crc;
374
Mårten Kongstad9371dc12019-01-22 14:35:12 +0100375 crc = GetCrc(*overlay_zip);
Mårten Kongstad0f763112018-11-19 14:14:37 +0100376 if (!crc) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200377 out_error << "error: failed to get zip crc for overlay" << std::endl;
378 return nullptr;
379 }
Mårten Kongstad0f763112018-11-19 14:14:37 +0100380 header->overlay_crc_ = *crc;
Mårten Kongstad02751232018-04-27 13:16:32 +0200381
382 if (target_apk_path.size() > sizeof(header->target_path_)) {
383 out_error << "error: target apk path \"" << target_apk_path << "\" longer that maximum size "
384 << sizeof(header->target_path_) << std::endl;
385 return nullptr;
386 }
387 memset(header->target_path_, 0, sizeof(header->target_path_));
388 memcpy(header->target_path_, target_apk_path.data(), target_apk_path.size());
389
390 if (overlay_apk_path.size() > sizeof(header->overlay_path_)) {
391 out_error << "error: overlay apk path \"" << overlay_apk_path << "\" longer that maximum size "
392 << sizeof(header->overlay_path_) << std::endl;
393 return nullptr;
394 }
395 memset(header->overlay_path_, 0, sizeof(header->overlay_path_));
396 memcpy(header->overlay_path_, overlay_apk_path.data(), overlay_apk_path.size());
397
398 std::unique_ptr<Idmap> idmap(new Idmap());
399 idmap->header_ = std::move(header);
400
401 // find the resources that exist in both packages
402 MatchingResources matching_resources;
403 const auto end = overlay_pkg->end();
404 for (auto iter = overlay_pkg->begin(); iter != end; ++iter) {
405 const ResourceId overlay_resid = *iter;
Mårten Kongstad0f763112018-11-19 14:14:37 +0100406 Result<std::string> name = utils::ResToTypeEntryName(overlay_asset_manager, overlay_resid);
407 if (!name) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200408 continue;
409 }
410 // prepend "<package>:" to turn name into "<package>:<type>/<name>"
Mårten Kongstad0f763112018-11-19 14:14:37 +0100411 const std::string full_name =
412 base::StringPrintf("%s:%s", target_pkg->GetPackageName().c_str(), name->c_str());
413 const ResourceId target_resid = NameToResid(target_asset_manager, full_name);
Mårten Kongstad02751232018-04-27 13:16:32 +0200414 if (target_resid == 0) {
415 continue;
416 }
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800417
Ryan Mitchella3628462019-01-14 12:19:40 -0800418 if (enforce_overlayable &&
419 !CheckOverlayable(*target_pkg, *overlay_info, fulfilled_policies, target_resid)) {
Mårten Kongstadd10d06d2019-01-07 17:26:25 -0800420 LOG(WARNING) << "overlay \"" << overlay_apk_path << "\" is not allowed to overlay resource \""
421 << full_name << "\"" << std::endl;
422 continue;
423 }
424
Mårten Kongstad02751232018-04-27 13:16:32 +0200425 matching_resources.Add(target_resid, overlay_resid);
426 }
427
428 // encode idmap data
429 std::unique_ptr<IdmapData> data(new IdmapData());
Mårten Kongstadcf281362018-11-28 19:32:25 +0100430 const auto types_end = matching_resources.Map().cend();
431 for (auto ti = matching_resources.Map().cbegin(); ti != types_end; ++ti) {
Mårten Kongstad02751232018-04-27 13:16:32 +0200432 auto ei = ti->second.cbegin();
433 std::unique_ptr<IdmapData::TypeEntry> type(new IdmapData::TypeEntry());
434 type->target_type_id_ = EXTRACT_TYPE(ei->first);
435 type->overlay_type_id_ = EXTRACT_TYPE(ei->second);
436 type->entry_offset_ = EXTRACT_ENTRY(ei->first);
437 EntryId last_target_entry = kNoEntry;
438 for (; ei != ti->second.cend(); ++ei) {
439 if (last_target_entry != kNoEntry) {
440 int count = EXTRACT_ENTRY(ei->first) - last_target_entry - 1;
441 type->entries_.insert(type->entries_.end(), count, kNoEntry);
442 }
443 type->entries_.push_back(EXTRACT_ENTRY(ei->second));
444 last_target_entry = EXTRACT_ENTRY(ei->first);
445 }
446 data->type_entries_.push_back(std::move(type));
447 }
448
449 std::unique_ptr<IdmapData::Header> data_header(new IdmapData::Header());
450 data_header->target_package_id_ = target_pkg->GetPackageId();
451 data_header->type_count_ = data->type_entries_.size();
452 data->header_ = std::move(data_header);
453
454 idmap->data_.push_back(std::move(data));
455
456 return std::move(idmap);
457}
458
459void IdmapHeader::accept(Visitor* v) const {
460 assert(v != nullptr);
461 v->visit(*this);
462}
463
464void IdmapData::Header::accept(Visitor* v) const {
465 assert(v != nullptr);
466 v->visit(*this);
467}
468
469void IdmapData::TypeEntry::accept(Visitor* v) const {
470 assert(v != nullptr);
471 v->visit(*this);
472}
473
474void IdmapData::accept(Visitor* v) const {
475 assert(v != nullptr);
476 v->visit(*this);
477 header_->accept(v);
478 auto end = type_entries_.cend();
479 for (auto iter = type_entries_.cbegin(); iter != end; ++iter) {
480 (*iter)->accept(v);
481 }
482}
483
484void Idmap::accept(Visitor* v) const {
485 assert(v != nullptr);
486 v->visit(*this);
487 header_->accept(v);
488 auto end = data_.cend();
489 for (auto iter = data_.cbegin(); iter != end; ++iter) {
490 (*iter)->accept(v);
491 }
492}
493
Mårten Kongstad0eba72a2018-11-29 08:23:14 +0100494} // namespace android::idmap2