blob: 94674bc1d01cd89ab0db6deef2bec53932059657 [file] [log] [blame]
/*
* Copyright (C) 2020 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "odr_common.h"
#include <sys/system_properties.h>
#include <functional>
#include <initializer_list>
#include <regex>
#include <sstream>
#include <string>
#include <string_view>
#include "android-base/logging.h"
#include "android-base/parseint.h"
#include "android-base/result.h"
namespace art {
namespace odrefresh {
namespace {
using ::android::base::Result;
}
std::string Concatenate(std::initializer_list<std::string_view> args) {
std::stringstream ss;
for (auto arg : args) {
ss << arg;
}
return ss.str();
}
std::string QuotePath(std::string_view path) {
return Concatenate({"'", path, "'"});
}
Result<int> ParseSecurityPatchStr(const std::string& security_patch_str) {
std::regex security_patch_regex(R"re((\d{4})-(\d{2})-(\d{2}))re");
std::smatch m;
if (!std::regex_match(security_patch_str, m, security_patch_regex)) {
return Errorf("Invalid security patch string \"{}\"", security_patch_str);
}
int year = 0, month = 0, day = 0;
if (!android::base::ParseInt(m[1], &year) ||
!android::base::ParseInt(m[2], &month) ||
!android::base::ParseInt(m[3], &day)) {
// This should never happen because the string already matches the regex.
return Errorf("Unknown error when parsing security patch string \"{}\"", security_patch_str);
}
return year * 10000 + month * 100 + day;
}
bool ShouldDisablePartialCompilation(const std::string& security_patch_str) {
Result<int> security_patch_value = ParseSecurityPatchStr(security_patch_str);
if (!security_patch_value.ok()) {
LOG(ERROR) << security_patch_value.error();
return false;
}
return security_patch_value.value() < ParseSecurityPatchStr("2022-03-05").value();
}
bool ShouldDisableRefresh(const std::string& sdk_version_str) {
int sdk_version = 0;
if (!android::base::ParseInt(sdk_version_str, &sdk_version)) {
return false;
}
return sdk_version >= 32;
}
void SystemPropertyForeach(std::function<void(const char* name, const char* value)> action) {
__system_property_foreach(
[](const prop_info* pi, void* cookie) {
__system_property_read_callback(
pi,
[](void* cookie, const char* name, const char* value, unsigned) {
auto action =
reinterpret_cast<std::function<void(const char* name, const char* value)>*>(
cookie);
(*action)(name, value);
},
cookie);
},
&action);
}
} // namespace odrefresh
} // namespace art