File: ProcessXCFrameworkTaskAction.swift

package info (click to toggle)
swiftlang 6.2.3-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 2,856,264 kB
  • sloc: cpp: 9,995,718; ansic: 2,234,019; asm: 1,092,167; python: 313,940; objc: 82,726; f90: 80,126; lisp: 38,373; pascal: 25,580; sh: 20,378; ml: 5,058; perl: 4,751; makefile: 4,725; awk: 3,535; javascript: 3,018; xml: 918; fortran: 664; cs: 573; ruby: 396
file content (238 lines) | stat: -rw-r--r-- 11,920 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
//===----------------------------------------------------------------------===//
//
// This source file is part of the Swift open source project
//
// Copyright (c) 2025 Apple Inc. and the Swift project authors
// Licensed under Apache License v2.0 with Runtime Library Exception
//
// See http://swift.org/LICENSE.txt for license information
// See http://swift.org/CONTRIBUTORS.txt for the list of Swift project authors
//
//===----------------------------------------------------------------------===//

public import SWBCore
import SWBLibc
import SWBUtil
import Foundation

/// Performs the processing of a given XCFramework, doing the work to process an individual slice and outputting into a location that can be used during the build.
public final class ProcessXCFrameworkTaskAction: TaskAction {
    public override class var toolIdentifier: String {
        return "process-xcframework"
    }

    public override func performTaskAction(_ task: any ExecutableTask, dynamicExecutionDelegate: any DynamicTaskExecutionDelegate, executionDelegate: any TaskExecutionDelegate, clientDelegate: any TaskExecutionClientDelegate, outputDelegate: any TaskOutputDelegate) async -> CommandResult {

        let generator = task.commandLineAsStrings.makeIterator()
        _ = generator.next() // consume program name

        var xcframeworkPath: Path?
        var platform: String?
        var environment: String?
        var targetPath: Path?
        var expectedSignatures: [String] = []
        var skipSignatureValidation: Bool = false

        while let arg = generator.next() {
            switch arg {
            case "--xcframework":
                guard let value = generator.next() else {
                    outputDelegate.emitError("`--xcframework` requires a parameter")
                    return .failed
                }
                xcframeworkPath = Path(value)

            case "--platform":
                guard let value = generator.next() else {
                    outputDelegate.emitError("`--platform` requires a parameter")
                    return .failed
                }
                platform = value

            case "--environment":
                guard let value = generator.next() else {
                    outputDelegate.emitError("`--environment` requires a parameter")
                    return .failed
                }
                environment = value

            case "--target-path":
                guard let value = generator.next() else {
                    outputDelegate.emitError("`--target-path` requires a parameter")
                    return .failed
                }
                targetPath = Path(value)

            case "--expected-signature":
                guard let value = generator.next() else {
                    outputDelegate.emitError("`--expected-signature` requires a parameter")
                    return .failed
                }
                expectedSignatures.append(value)

            case "--skip-signature-validation":
                skipSignatureValidation = true

            default:
                outputDelegate.emitError("unexpected arguments '\(arg)'")
                return .failed
            }
        }

        guard let path = xcframeworkPath else {
            outputDelegate.emitError("--xcframework is a required argument")
            return .failed
        }

        guard let plat = platform else {
            outputDelegate.emitError("--platform is a required argument")
            return .failed
        }

        guard let target = targetPath else {
            outputDelegate.emitError("--target-path is a required argument")
            return .failed
        }

        do {
            let fs = executionDelegate.fs
            let xcframeworkName = path.basename
            let xcframework = try XCFramework(path: path, fs: fs)

            let platformDisplayName = BuildVersion.Platform(platform: plat, environment: environment)?.displayName(infoLookup: executionDelegate.infoLookup) ?? ("\(plat)" + (environment.flatMap { "-\($0)" } ?? ""))

            // Find a library in the XCFramework which is compatible with the current platform.
            // Note that we don't validate supported architectures here because this task copies the xcframework's contents for potential use by multiple targets which may have different architecture settings.
            guard let library = xcframework.findLibrary(platform: plat, platformVariant: environment ?? "") else {
                outputDelegate.emitError("While building for \(platformDisplayName), no library for this platform was found in '\(xcframeworkName)'.")
                return .failed
            }

            // Provide a friendly message up-front if the given library is not found within the XCFramework. This can occur when the Info.plist for an XCFramework points to a supported platform, but the corresponding library entry is incorrect or points to a location that does not exist on disk.
            let rootPathToLibrary = path.join(library.libraryIdentifier)
            let copyLibraryFromPath = rootPathToLibrary.join(library.libraryPath)
            if !fs.exists(copyLibraryFromPath) {
                outputDelegate.emitError("When building for \(platformDisplayName), the expected library \(copyLibraryFromPath.str) was not found in \(path.str)")
                return .failed
            }

            if skipSignatureValidation {
                // NOTE: Always emit the warning when enabled as this can cause issues in other environments, such as CI.
                outputDelegate.emitWarning("XCFramework signature validation is being skipped. Remove `DISABLE_XCFRAMEWORK_SIGNATURE_VALIDATION` to disable this warning.")
            }
            else if await !validateExpectedSignature(path, expectedSignatures: expectedSignatures, outputDelegate: outputDelegate) {
                return .failed
            }

            try xcframework.copy(library: library, from: path, to: target, fs: fs)
            return .succeeded
        }
        catch {
            outputDelegate.emitError(error.localizedDescription)
            return .failed
        }
    }

    func validateExpectedSignature(_ path: Path, expectedSignatures: [String], outputDelegate: any TaskOutputDelegate) async -> Bool {
        let location = Diagnostic.Location.path(path)

        do {
            // Codesign verification is always run, regardless of the expected signatures. If this fails, then builds should not be able to continue.
            try await CodeSignatureInfo.invokeCodesignVerification(for: path.str, treatUnsignedAsError: false)

            // No validation is performed if there are no expected signatures.
            if expectedSignatures.isEmpty {
                // If the asset is signed, and there are no expectations in the project, we issue a note, which is used to record the signing identity.
                let info = try? await CodeSignatureInfo.load(from: path.str, additionalInfo: nil)
                if let info, info.signatureType != nil, info.signatureIdentifier != nil {
                    let diagnostic = Diagnostic(behavior: .note, location: location, data: DiagnosticData("The identity of “\(path.basename)” is not recorded in your project."))
                    outputDelegate.emit(diagnostic)
                }
                return true
            }

            let info = try await CodeSignatureInfo.load(from: path.str, additionalInfo: nil)
            let signatures = expectedSignatures.compactMap({ ExpectedSignature($0) })

            guard !signatures.isEmpty else {
                // NOTE: This is likely an internal tooling error or adoption bring-up issue, so soft-error here.
                let diagnostic = Diagnostic(behavior: .error, location: location, data: DiagnosticData("Expected signatures are malformed"), childDiagnostics: [
                    Diagnostic(behavior: .note, location: .unknown, data: DiagnosticData("Expected signatures: \(expectedSignatures.joined(separator: ","))")),
                    Diagnostic(behavior: .note, location: .unknown, data: DiagnosticData("Replace or remove the expected signature data.")),
                ])
                outputDelegate.emit(diagnostic)
                return false
            }

            let childDiagnostics: [Diagnostic] = signatures.map({ Diagnostic(behavior: .note, location: .unknown, data: DiagnosticData($0.diagnosticMessage)) })

            guard let signatureType = info.signatureType, let signatureIdentifier = info.signatureIdentifier else {
                let message = "“\(path.basename)” is not signed with the expected identity and may have been compromised."
                let diagnostic = Diagnostic(behavior: .error, location: location, data: DiagnosticData(message), childDiagnostics: childDiagnostics)
                outputDelegate.emit(diagnostic)
                return false
            }

            for signature in signatures {
                if signature.signatureType == signatureType && signature.identifier == signatureIdentifier {
                    // A match has been found, so return true and stop validating potential signatures.
                    return true
                }
            }

            let message = "“\(path.basename)” is not signed with the expected identity and may have been compromised."
            let diagnostic = Diagnostic(behavior: .error, location: location, data: DiagnosticData(message), childDiagnostics: childDiagnostics)

            outputDelegate.emit(diagnostic)
            return false
        }
        catch let CodeSignatureInfo.Error.codesignVerificationFailed(description, output) {
            let childDiagnostics = [
                Diagnostic(behavior: .note, location: .unknown, data: DiagnosticData(description)),
                Diagnostic(behavior: .note, location: .unknown, data: DiagnosticData(output)),
            ]
            let message = "The signature of “\(path.basename)” cannot be verified."
            let diagnostic = Diagnostic(behavior: .error, location: location, data: DiagnosticData(message), childDiagnostics: childDiagnostics)

            outputDelegate.emit(diagnostic)
            return false
        }
        catch {
            let childDiagnostics = [Diagnostic(behavior: .note, location: .unknown, data: DiagnosticData("Unable to load signature information for '\(path.str)'. error=\(error.localizedDescription)"))]
            let message = "The signature of “\(path.basename)” cannot be validated and may have been compromised."
            let diagnostic = Diagnostic(behavior: .error, location: location, data: DiagnosticData(message), childDiagnostics: childDiagnostics)

            outputDelegate.emit(diagnostic)
            return false
        }
    }

    fileprivate struct ExpectedSignature {
        // The Xcode serialization of this signature content takes the form: <signature type>:<identifier>:<name>
        // The name is an optional field and Swift Build ignores it for any verification purposes.

        let signatureType: CodeSignatureInfo.SignatureType
        let identifier: String

        fileprivate init?(_ s: String) {
            let parts = s.split(separator: ":", maxSplits: 3).map { String($0) }

            guard let s = parts.first else { return nil }
            guard let type =  CodeSignatureInfo.SignatureType(rawValue: s) else { return nil }
            signatureType = type

            guard parts.count >= 2 else { return nil }
            identifier = parts[1]
        }

        var diagnosticMessage: String {
            switch signatureType {
            case .appleDeveloperProgram:
                return "Expected team identifier: \(identifier)"

            case .selfSigned:
                return "Expected fingerprint: \(identifier)"
            }
        }
    }
}