blob: a1e81d2f417a22f6305450f56e3e9fd18498ded5 [file] [log] [blame]
#!/usr/bin/env python
#
# Copyright (C) 2021 The Android Open Source Project
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""sign_virt_apex is a command line tool for sign the Virt APEX file.
Typical usage:
sign_virt_apex payload_key payload_dir
-v, --verbose
--verify
--avbtool path_to_avbtool
--signing_args args
sign_virt_apex uses external tools which are assumed to be available via PATH.
- avbtool (--avbtool can override the tool)
- lpmake, lpunpack, simg2img, img2simg
"""
import argparse
import hashlib
import os
import re
import shlex
import subprocess
import sys
import tempfile
import traceback
from concurrent import futures
# pylint: disable=line-too-long,consider-using-with
# Use executor to parallelize the invocation of external tools
# If a task depends on another, pass the future object of the previous task as wait list.
# Every future object created by a task should be consumed with AwaitAll()
# so that exceptions are propagated .
executor = futures.ThreadPoolExecutor()
# Temporary directory for unpacked super.img.
# We could put its creation/deletion into the task graph as well, but
# having it as a global setup is much simpler.
unpack_dir = tempfile.TemporaryDirectory()
# tasks created with Async() are kept in a list so that they are awaited
# before exit.
tasks = []
# create an async task and return a future value of it.
def Async(fn, *args, wait=None, **kwargs):
# wrap a function with AwaitAll()
def wrapped():
AwaitAll(wait)
fn(*args, **kwargs)
task = executor.submit(wrapped)
tasks.append(task)
return task
# waits for task (captured in fs as future values) with future.result()
# so that any exception raised during task can be raised upward.
def AwaitAll(fs):
if fs:
for f in fs:
f.result()
def ParseArgs(argv):
parser = argparse.ArgumentParser(description='Sign the Virt APEX')
parser.add_argument('--verify', action='store_true',
help='Verify the Virt APEX')
parser.add_argument(
'-v', '--verbose',
action='store_true',
help='verbose execution')
parser.add_argument(
'--avbtool',
default='avbtool',
help='Optional flag that specifies the AVB tool to use. Defaults to `avbtool`.')
parser.add_argument(
'--signing_args',
help='the extra signing arguments passed to avbtool.'
)
parser.add_argument(
'--key_override',
metavar="filename=key",
action='append',
help='Overrides a signing key for a file e.g. microdroid_bootloader=mykey (for testing)')
parser.add_argument(
'key',
help='path to the private key file.')
parser.add_argument(
'input_dir',
help='the directory having files to be packaged')
args = parser.parse_args(argv)
# preprocess --key_override into a map
args.key_overrides = dict()
if args.key_override:
for pair in args.key_override:
name, key = pair.split('=')
args.key_overrides[name] = key
return args
def RunCommand(args, cmd, env=None, expected_return_values=None):
expected_return_values = expected_return_values or {0}
env = env or {}
env.update(os.environ.copy())
# TODO(b/193504286): we need a way to find other tool (cmd[0]) in various contexts
# e.g. sign_apex.py, sign_target_files_apk.py
if cmd[0] == 'avbtool':
cmd[0] = args.avbtool
if args.verbose:
print('Running: ' + ' '.join(cmd))
p = subprocess.Popen(
cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, env=env, universal_newlines=True)
output, _ = p.communicate()
if args.verbose or p.returncode not in expected_return_values:
print(output.rstrip())
assert p.returncode in expected_return_values, (
'%d Failed to execute: ' + ' '.join(cmd)) % p.returncode
return (output, p.returncode)
def ReadBytesSize(value):
return int(value.removesuffix(' bytes'))
def ExtractAvbPubkey(args, key, output):
RunCommand(args, ['avbtool', 'extract_public_key',
'--key', key, '--output', output])
def AvbInfo(args, image_path):
"""Parses avbtool --info image output
Args:
args: program arguments.
image_path: The path to the image.
descriptor_name: Descriptor name of interest.
Returns:
A pair of
- a dict that contains VBMeta info. None if there's no VBMeta info.
- a list of descriptors.
"""
if not os.path.exists(image_path):
raise ValueError('Failed to find image: {}'.format(image_path))
output, ret_code = RunCommand(
args, ['avbtool', 'info_image', '--image', image_path], expected_return_values={0, 1})
if ret_code == 1:
return None, None
info, descriptors = {}, []
# Read `avbtool info_image` output as "key:value" lines
matcher = re.compile(r'^(\s*)([^:]+):\s*(.*)$')
def IterateLine(output):
for line in output.split('\n'):
line_info = matcher.match(line)
if not line_info:
continue
yield line_info.group(1), line_info.group(2), line_info.group(3)
gen = IterateLine(output)
def ReadDescriptors(cur_indent, cur_name, cur_value):
descriptor = cur_value if cur_name == 'Prop' else {}
descriptors.append((cur_name, descriptor))
for indent, key, value in gen:
if indent <= cur_indent:
# read descriptors recursively to pass the read key as descriptor name
ReadDescriptors(indent, key, value)
break
descriptor[key] = value
# Read VBMeta info
for _, key, value in gen:
if key == 'Descriptors':
ReadDescriptors(*next(gen))
break
info[key] = value
return info, descriptors
# Look up a list of (key, value) with a key. Returns the value of the first matching pair.
def LookUp(pairs, key):
for k, v in pairs:
if key == k:
return v
return None
def AddHashFooter(args, key, image_path):
if os.path.basename(image_path) in args.key_overrides:
key = args.key_overrides[os.path.basename(image_path)]
info, descriptors = AvbInfo(args, image_path)
if info:
descriptor = LookUp(descriptors, 'Hash descriptor')
image_size = ReadBytesSize(info['Image size'])
algorithm = info['Algorithm']
partition_name = descriptor['Partition Name']
partition_size = str(image_size)
cmd = ['avbtool', 'add_hash_footer',
'--key', key,
'--algorithm', algorithm,
'--partition_name', partition_name,
'--partition_size', partition_size,
'--image', image_path]
if args.signing_args:
cmd.extend(shlex.split(args.signing_args))
RunCommand(args, cmd)
def AddHashTreeFooter(args, key, image_path):
if os.path.basename(image_path) in args.key_overrides:
key = args.key_overrides[os.path.basename(image_path)]
info, descriptors = AvbInfo(args, image_path)
if info:
descriptor = LookUp(descriptors, 'Hashtree descriptor')
image_size = ReadBytesSize(info['Image size'])
algorithm = info['Algorithm']
partition_name = descriptor['Partition Name']
partition_size = str(image_size)
cmd = ['avbtool', 'add_hashtree_footer',
'--key', key,
'--algorithm', algorithm,
'--partition_name', partition_name,
'--partition_size', partition_size,
'--do_not_generate_fec',
'--image', image_path]
if args.signing_args:
cmd.extend(shlex.split(args.signing_args))
RunCommand(args, cmd)
def MakeVbmetaImage(args, key, vbmeta_img, images=None, chained_partitions=None):
if os.path.basename(vbmeta_img) in args.key_overrides:
key = args.key_overrides[os.path.basename(vbmeta_img)]
info, descriptors = AvbInfo(args, vbmeta_img)
if info is None:
return
with tempfile.TemporaryDirectory() as work_dir:
algorithm = info['Algorithm']
rollback_index = info['Rollback Index']
rollback_index_location = info['Rollback Index Location']
cmd = ['avbtool', 'make_vbmeta_image',
'--key', key,
'--algorithm', algorithm,
'--rollback_index', rollback_index,
'--rollback_index_location', rollback_index_location,
'--output', vbmeta_img]
if images:
for img in images:
cmd.extend(['--include_descriptors_from_image', img])
# replace pubkeys of chained_partitions as well
for name, descriptor in descriptors:
if name == 'Chain Partition descriptor':
part_name = descriptor['Partition Name']
ril = descriptor['Rollback Index Location']
part_key = chained_partitions[part_name]
avbpubkey = os.path.join(work_dir, part_name + '.avbpubkey')
ExtractAvbPubkey(args, part_key, avbpubkey)
cmd.extend(['--chain_partition', '%s:%s:%s' %
(part_name, ril, avbpubkey)])
if args.signing_args:
cmd.extend(shlex.split(args.signing_args))
RunCommand(args, cmd)
# libavb expects to be able to read the maximum vbmeta size, so we must provide a partition
# which matches this or the read will fail.
with open(vbmeta_img, 'a') as f:
f.truncate(65536)
def UnpackSuperImg(args, super_img, work_dir):
tmp_super_img = os.path.join(work_dir, 'super.img')
RunCommand(args, ['simg2img', super_img, tmp_super_img])
RunCommand(args, ['lpunpack', tmp_super_img, work_dir])
def MakeSuperImage(args, partitions, output):
with tempfile.TemporaryDirectory() as work_dir:
cmd = ['lpmake', '--device-size=auto', '--metadata-slots=2', # A/B
'--metadata-size=65536', '--sparse', '--output=' + output]
for part, img in partitions.items():
tmp_img = os.path.join(work_dir, part)
RunCommand(args, ['img2simg', img, tmp_img])
image_arg = '--image=%s=%s' % (part, img)
partition_arg = '--partition=%s:readonly:%d:default' % (
part, os.path.getsize(img))
cmd.extend([image_arg, partition_arg])
RunCommand(args, cmd)
def SignSuperImg(args, key, super_img, work_dir):
# unpack super.img
UnpackSuperImg(args, super_img, work_dir)
system_a_img = os.path.join(work_dir, 'system_a.img')
vendor_a_img = os.path.join(work_dir, 'vendor_a.img')
# re-sign each partition
system_a_f = Async(AddHashTreeFooter, args, key, system_a_img)
vendor_a_f = Async(AddHashTreeFooter, args, key, vendor_a_img)
# 3. re-pack super.img
partitions = {"system_a": system_a_img, "vendor_a": vendor_a_img}
Async(MakeSuperImage, args, partitions, super_img, wait=[system_a_f, vendor_a_f])
def ReplaceBootloaderPubkey(args, key, bootloader, bootloader_pubkey):
if os.path.basename(bootloader) in args.key_overrides:
key = args.key_overrides[os.path.basename(bootloader)]
# read old pubkey before replacement
with open(bootloader_pubkey, 'rb') as f:
old_pubkey = f.read()
# replace bootloader pubkey (overwrite the old one with the new one)
ExtractAvbPubkey(args, key, bootloader_pubkey)
# read new pubkey
with open(bootloader_pubkey, 'rb') as f:
new_pubkey = f.read()
assert len(old_pubkey) == len(new_pubkey)
# replace pubkey embedded in bootloader
with open(bootloader, 'r+b') as bl_f:
pos = bl_f.read().find(old_pubkey)
assert pos != -1
bl_f.seek(pos)
bl_f.write(new_pubkey)
# dict of (key, file) for re-sign/verification. keys are un-versioned for readability.
virt_apex_files = {
'bootloader.pubkey': 'etc/microdroid_bootloader.avbpubkey',
'bootloader': 'etc/microdroid_bootloader',
'boot.img': 'etc/fs/microdroid_boot-5.10.img',
'vendor_boot.img': 'etc/fs/microdroid_vendor_boot-5.10.img',
'init_boot.img': 'etc/fs/microdroid_init_boot.img',
'super.img': 'etc/fs/microdroid_super.img',
'vbmeta.img': 'etc/fs/microdroid_vbmeta.img',
'vbmeta_bootconfig.img': 'etc/fs/microdroid_vbmeta_bootconfig.img',
'bootconfig.normal': 'etc/microdroid_bootconfig.normal',
'bootconfig.app_debuggable': 'etc/microdroid_bootconfig.app_debuggable',
'bootconfig.full_debuggable': 'etc/microdroid_bootconfig.full_debuggable',
'uboot_env.img': 'etc/uboot_env.img'
}
def TargetFiles(input_dir):
return {k: os.path.join(input_dir, v) for k, v in virt_apex_files.items()}
def SignVirtApex(args):
key = args.key
input_dir = args.input_dir
files = TargetFiles(input_dir)
# unpacked files (will be unpacked from super.img below)
system_a_img = os.path.join(unpack_dir.name, 'system_a.img')
vendor_a_img = os.path.join(unpack_dir.name, 'vendor_a.img')
# Key(pubkey) embedded in bootloader should match with the one used to make VBmeta below
# while it's okay to use different keys for other image files.
replace_f = Async(ReplaceBootloaderPubkey, args,
key, files['bootloader'], files['bootloader.pubkey'])
# re-sign bootloader, boot.img, vendor_boot.img, and init_boot.img
Async(AddHashFooter, args, key, files['bootloader'], wait=[replace_f])
boot_img_f = Async(AddHashFooter, args, key, files['boot.img'])
vendor_boot_img_f = Async(AddHashFooter, args, key, files['vendor_boot.img'])
init_boot_img_f = Async(AddHashFooter, args, key, files['init_boot.img'])
# re-sign super.img
super_img_f = Async(SignSuperImg, args, key, files['super.img'], unpack_dir.name)
# re-generate vbmeta from re-signed {boot, vendor_boot, init_boot, system_a, vendor_a}.img
Async(MakeVbmetaImage, args, key, files['vbmeta.img'],
images=[files['boot.img'], files['vendor_boot.img'],
files['init_boot.img'], system_a_img, vendor_a_img],
wait=[boot_img_f, vendor_boot_img_f, init_boot_img_f, super_img_f])
# Re-sign bootconfigs and the uboot_env with the same key
bootconfig_sign_key = key
Async(AddHashFooter, args, bootconfig_sign_key, files['bootconfig.normal'])
Async(AddHashFooter, args, bootconfig_sign_key, files['bootconfig.app_debuggable'])
Async(AddHashFooter, args, bootconfig_sign_key, files['bootconfig.full_debuggable'])
Async(AddHashFooter, args, bootconfig_sign_key, files['uboot_env.img'])
# Re-sign vbmeta_bootconfig with chained_partitions to "bootconfig" and
# "uboot_env". Note that, for now, `key` and `bootconfig_sign_key` are the
# same, but technically they can be different. Vbmeta records pubkeys which
# signed chained partitions.
Async(MakeVbmetaImage, args, key, files['vbmeta_bootconfig.img'], chained_partitions={
'bootconfig': bootconfig_sign_key,
'uboot_env': bootconfig_sign_key,
})
def VerifyVirtApex(args):
key = args.key
input_dir = args.input_dir
files = TargetFiles(input_dir)
# unpacked files
UnpackSuperImg(args, files['super.img'], unpack_dir.name)
system_a_img = os.path.join(unpack_dir.name, 'system_a.img')
vendor_a_img = os.path.join(unpack_dir.name, 'vendor_a.img')
# Read pubkey digest from the input key
with tempfile.NamedTemporaryFile() as pubkey_file:
ExtractAvbPubkey(args, key, pubkey_file.name)
with open(pubkey_file.name, 'rb') as f:
pubkey = f.read()
pubkey_digest = hashlib.sha1(pubkey).hexdigest()
def contents(file):
with open(file, 'rb') as f:
return f.read()
def check_equals_pubkey(file):
assert contents(file) == pubkey, 'pubkey mismatch: %s' % file
def check_contains_pubkey(file):
assert contents(file).find(pubkey) != -1, 'pubkey missing: %s' % file
def check_avb_pubkey(file):
info, _ = AvbInfo(args, file)
assert info is not None, 'no avbinfo: %s' % file
assert info['Public key (sha1)'] == pubkey_digest, 'pubkey mismatch: %s' % file
for f in files.values():
if f == files['bootloader.pubkey']:
Async(check_equals_pubkey, f)
elif f == files['bootloader']:
Async(check_contains_pubkey, f)
elif f == files['super.img']:
Async(check_avb_pubkey, system_a_img)
Async(check_avb_pubkey, vendor_a_img)
else:
# Check pubkey for other files using avbtool
Async(check_avb_pubkey, f)
def main(argv):
try:
args = ParseArgs(argv)
if args.verify:
VerifyVirtApex(args)
else:
SignVirtApex(args)
# ensure all tasks are completed without exceptions
AwaitAll(tasks)
except: # pylint: disable=bare-except
traceback.print_exc()
sys.exit(1)
if __name__ == '__main__':
main(sys.argv[1:])