swupdate-lib.bbclass 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119
  1. # Copyright (C) 2015-2022 Stefano Babic
  2. #
  3. # SPDX-License-Identifier: GPLv3
  4. DEPENDS += "python3-magic-native zstd-native"
  5. def swupdate_encrypt_file(f, out, key, ivt):
  6. import subprocess
  7. encargs = ["openssl", "enc", "-aes-256-cbc", "-in", f, "-out", out]
  8. encargs += ["-K", key, "-iv", ivt, "-nosalt"]
  9. subprocess.run(encargs, check=True)
  10. def swupdate_extract_keys(keyfile_path):
  11. try:
  12. with open(keyfile_path, 'r') as f:
  13. lines = f.readlines()
  14. except IOError:
  15. bb.fatal("Failed to open file with keys %s" % (keyfile_path))
  16. data = {}
  17. for _ in lines:
  18. k,v = _.split('=',maxsplit=1)
  19. data[k.rstrip()] = v
  20. key = data['key'].rstrip('\n')
  21. iv = data['iv'].rstrip('\n')
  22. return key,iv
  23. def swupdate_get_sha256(d, s, filename):
  24. import hashlib
  25. m = hashlib.sha256()
  26. with open(os.path.join(s, filename), 'rb') as f:
  27. while True:
  28. data = f.read(1024)
  29. if not data:
  30. break
  31. m.update(data)
  32. return m.hexdigest()
  33. def swupdate_get_size(d, s, filename):
  34. import os
  35. fname = os.path.join(s, filename)
  36. fsize = os.path.getsize(fname)
  37. return str(fsize)
  38. def swupdate_sign_file(d, s, filename):
  39. import subprocess
  40. import magic
  41. import base64
  42. fname = os.path.join(s, filename)
  43. mime = magic.Magic(mime=True)
  44. ftype = mime.from_file(fname)
  45. if ftype == 'application/zstd':
  46. zcmd = 'zstdcat'
  47. elif ftype == 'application/gzip':
  48. zcmd = 'zcat'
  49. else:
  50. zcmd = 'cat'
  51. privkey = d.getVar('SWUPDATE_SIGN_PRIVATE_KEY')
  52. dump = subprocess.run([ zcmd, fname ], check=True, capture_output=True)
  53. signature = subprocess.run([ "openssl", "dgst", "-keyform", "PEM", "-sha256", "-sign", privkey ] + \
  54. get_pwd_file_args(d, 'SWUPDATE_SIGN_PASSWORD_FILE'), check=True, capture_output=True, input=dump.stdout)
  55. hash = base64.b64encode(signature.stdout).decode()
  56. # SWUpdate accepts attribute with a maximum size of 255. If the hash
  57. # exceeds this value, returns sha256 of the generated hash
  58. #
  59. if len(hash) > 255:
  60. m = hashlib.sha256()
  61. m.update(hash)
  62. hash = m.hexdigest()
  63. return hash
  64. def swupdate_get_pkgvar(d, s, parms):
  65. import re
  66. import oe.packagedata
  67. def get_package_name(group):
  68. package = None
  69. pkgvar = group.split('@')
  70. package = pkgvar[0]
  71. if len(pkgvar) > 1:
  72. varname = pkgvar[1]
  73. else:
  74. varname = 'PV'
  75. return (package, varname)
  76. if parms is None:
  77. return "undefined"
  78. group = parms
  79. (package, key) = get_package_name(group)
  80. bb.debug(2, "Package %s defined %s" %(package, key))
  81. pkg_info = os.path.join(d.getVar('PKGDATA_DIR'), 'runtime-reverse', package)
  82. pkgdata = oe.packagedata.read_pkgdatafile(pkg_info)
  83. if not key in pkgdata.keys():
  84. bb.warn("\"%s\" not set for package %s - using \"1.0\"" % (key, package))
  85. version = "1.0"
  86. else:
  87. version = pkgdata[key].split('+')[0]
  88. return version