-
Notifications
You must be signed in to change notification settings - Fork 197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Google apps breaking, play services signature may have changed #712
Comments
|
I'll try and work out what - if anything we can or should do
From all of that, my understanding is that we don't need to do anything. Our builds should continue to work, and apps which want to spoof signatures will still be allowed to do so, though those apps may need to change in response to Google's changes. @mar-v-in I am definitely not an expert in these area. Please let me know If you think that I have got this wrong, and that we do need to make some changes. Thanks |
@petefoth You don't need to do anything at this point as the patch is in upstream LineageOS. And they already started the process, see https://review.lineageos.org/c/LineageOS/android_frameworks_base/+/411374. So once they have merged this in a few days, apps that require the updated patch will work again. The problem is how the signature spoofing in LineageOS worked: To minimize potential security impact it would only spoof the signature for a single specific API that is used by the Google Play Services client library to discover if Play Services is signed using Google's key - which is what microG needs to work. But there is more than one API to request the signature (or precisely the signing certificate) of an app, and the new version of the Play Services client library uses a newer API that was not handled by the signature spoofing feature in LineageOS (and others). Luckily we catched this pretty early. Google's apps have early access to new versions of Google's Play Services client library, so that's why for now only a few Google apps are affected. But soon we'll see other, non-Google apps adopt those client libraries with the new signature check that would then stop working as well. |
Thanks @mar-v-in The patch in this comment in the microG issue tracker looks a lot like the patches we used to apply before Lineage started supporting spoofing. We would need to change our patches to match (i.e. Instead, I will update our documentation to say
(Documentation and Website changes are on the To Do list, but have taken a back seat. Time to move them up the list 😄 ) Thanks again. |
Though we should be aware that, given LineageOS's history of describing signature spoofing as 'lying about security', they may choose not to accept the change. In which case, we will be back to patching |
The fix was merged in LineageOS 19.1/20/21/22: https://review.lineageos.org/c/LineageOS/android_frameworks_base/+/411386 |
Thanks. Any builds started after the change was submitted, should pick up the change: the code was merged in the 21.0 branch at 20:52 yesterday. Looking at the Matrix room, I think that |
microg/GmsCore#2680
If your google apps are working disable auto-updates for them before they break
The text was updated successfully, but these errors were encountered: