swupdate-lib.bbclass 2.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112
  1. # Copyright (C) 2015-2022 Stefano Babic
  2. #
  3. # SPDX-License-Identifier: GPLv3
  4. DEPENDS += "python3-magic-native zstd-native"
  5. def swupdate_encrypt_file(f, out, key, ivt):
  6. import subprocess
  7. encargs = ["openssl", "enc", "-aes-256-cbc", "-in", f, "-out", out]
  8. encargs += ["-K", key, "-iv", ivt, "-nosalt"]
  9. subprocess.run(encargs, check=True)
  10. def swupdate_extract_keys(keyfile_path):
  11. try:
  12. with open(keyfile_path, 'r') as f:
  13. lines = f.readlines()
  14. except IOError:
  15. bb.fatal("Failed to open file with keys %s" % (keyfile))
  16. data = {}
  17. for _ in lines:
  18. k,v = _.split('=',maxsplit=1)
  19. data[k.rstrip()] = v
  20. key = data['key'].rstrip('\n')
  21. iv = data['iv'].rstrip('\n')
  22. return key,iv
  23. def swupdate_get_sha256(d, s, filename):
  24. import hashlib
  25. m = hashlib.sha256()
  26. with open(os.path.join(s, filename), 'rb') as f:
  27. while True:
  28. data = f.read(1024)
  29. if not data:
  30. break
  31. m.update(data)
  32. return m.hexdigest()
  33. def swupdate_sign_file(d, s, filename):
  34. import subprocess
  35. import magic
  36. import base64
  37. fname = os.path.join(s, filename)
  38. mime = magic.Magic(mime=True)
  39. ftype = mime.from_file(fname)
  40. if ftype == 'application/zstd':
  41. zcmd = 'zstdcat'
  42. elif ftype == 'application/gzip':
  43. zcmd = 'zcat'
  44. else:
  45. zcmd = 'cat'
  46. privkey = d.getVar('SWUPDATE_SIGN_PRIVATE_KEY')
  47. dump = subprocess.run([ zcmd, fname ], check=True, capture_output=True)
  48. signature = subprocess.run([ "openssl", "dgst", "-keyform", "PEM", "-sha256", "-sign", privkey ] + \
  49. get_pwd_file_args(d, 'SWUPDATE_SIGN_PASSWORD_FILE'), check=True, capture_output=True, input=dump.stdout)
  50. hash = base64.b64encode(signature.stdout).decode()
  51. # SWUpdate accepts attribute with a maximum size of 255. If the hash
  52. # exceeds this value, returns sha256 of the generated hash
  53. #
  54. if len(hash) > 255:
  55. m = hashlib.sha256()
  56. m.update(hash)
  57. hash = m.hexdigest()
  58. return hash
  59. def swupdate_auto_versions(d, s, parms):
  60. import re
  61. import oe.packagedata
  62. def get_package_name(group):
  63. package = None
  64. pkgvar = group.split('@')
  65. package = pkgvar[0]
  66. if len(pkgvar) > 1:
  67. varname = pkgvar[1]
  68. else:
  69. varname = 'PV'
  70. return (package, varname)
  71. if parms is None:
  72. return "undefined"
  73. group = parms
  74. (package, key) = get_package_name(group)
  75. bb.debug(2, "Package %s defined %s" %(package, key))
  76. pkg_info = os.path.join(d.getVar('PKGDATA_DIR'), 'runtime-reverse', package)
  77. pkgdata = oe.packagedata.read_pkgdatafile(pkg_info)
  78. if not key in pkgdata.keys():
  79. bb.warn("\"%s\" not set for package %s - using \"1.0\"" % (key, package))
  80. version = "1.0"
  81. else:
  82. version = pkgdata[key].split('+')[0]
  83. return version