blob: 01ee80b25b66313056d69365932c6304feb353f0 [file] [log] [blame]
Tao Baoe7354ba2019-05-09 16:54:15 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2019 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
18Signs a standalone APEX file.
19
20Usage: sign_apex [flags] input_apex_file output_apex_file
21
Tao Bao1ac886e2019-06-26 11:58:22 -070022 --avbtool <avbtool>
23 Optional flag that specifies the AVB tool to use. Defaults to `avbtool`.
24
Tao Baoe7354ba2019-05-09 16:54:15 -070025 --container_key <key>
26 Mandatory flag that specifies the container signing key.
27
28 --payload_key <key>
29 Mandatory flag that specifies the payload signing key.
30
31 --payload_extra_args <args>
32 Optional flag that specifies any extra args to be passed to payload signer
33 (e.g. --payload_extra_args="--signing_helper_with_files /path/to/helper").
Tianjie Xu88a759d2020-01-23 10:47:54 -080034
35 -e (--extra_apks) <name,name,...=key>
36 Add extra APK name/key pairs. This is useful to sign the apk files in the
37 apex payload image.
Baligh Uddind9fcafd2020-04-25 09:03:57 -070038
39 --codename_to_api_level_map Q:29,R:30,...
40 A Mapping of codename to api level. This is useful to provide sdk targeting
41 information to APK Signer.
Jooyung Han0f5a41d2021-10-27 03:53:21 +090042
43 --sign_tool <sign_tool>
44 Optional flag that specifies a custom signing tool for the contents of the apex.
Melisa Carranza Zuniga46930d72022-02-11 13:43:18 +010045
46 --sepolicy_key <key>
47 Optional flag that specifies the sepolicy signing key, defaults to payload_key.
48
49 --sepolicy_cert <cert>
50 Optional flag that specifies the sepolicy signing cert.
51
52 --fsverity_tool <path>
53 Optional flag that specifies the path to fsverity tool to sign SEPolicy, defaults to fsverity.
Tao Baoe7354ba2019-05-09 16:54:15 -070054"""
55
56import logging
57import shutil
58import sys
59
60import apex_utils
61import common
62
63logger = logging.getLogger(__name__)
64
65
Tianjie Xu88a759d2020-01-23 10:47:54 -080066def SignApexFile(avbtool, apex_file, payload_key, container_key, no_hashtree,
Melisa Carranza Zuniga46930d72022-02-11 13:43:18 +010067 apk_keys=None, signing_args=None, codename_to_api_level_map=None, sign_tool=None,
68 sepolicy_key=None, sepolicy_cert=None, fsverity_tool=None):
Tao Baoc9c1b862019-06-26 14:54:14 -070069 """Signs the given apex file."""
70 with open(apex_file, 'rb') as input_fp:
71 apex_data = input_fp.read()
72
73 return apex_utils.SignApex(
Tao Bao1ac886e2019-06-26 11:58:22 -070074 avbtool,
Tao Baoc9c1b862019-06-26 14:54:14 -070075 apex_data,
76 payload_key=payload_key,
77 container_key=container_key,
78 container_pw=None,
Baligh Uddind9fcafd2020-04-25 09:03:57 -070079 codename_to_api_level_map=codename_to_api_level_map,
Baligh Uddinac936fd2019-12-04 08:30:32 -080080 no_hashtree=no_hashtree,
Tianjie Xu88a759d2020-01-23 10:47:54 -080081 apk_keys=apk_keys,
Jooyung Han0f5a41d2021-10-27 03:53:21 +090082 signing_args=signing_args,
Melisa Carranza Zuniga46930d72022-02-11 13:43:18 +010083 sign_tool=sign_tool,
84 is_sepolicy=apex_file.endswith("sepolicy.apex"),
85 sepolicy_key=sepolicy_key,
86 sepolicy_cert=sepolicy_cert,
87 fsverity_tool=fsverity_tool)
Tao Baoc9c1b862019-06-26 14:54:14 -070088
89
Tao Baoe7354ba2019-05-09 16:54:15 -070090def main(argv):
91
92 options = {}
93
94 def option_handler(o, a):
Tao Bao1ac886e2019-06-26 11:58:22 -070095 if o == '--avbtool':
96 options['avbtool'] = a
97 elif o == '--container_key':
Tao Baoe7354ba2019-05-09 16:54:15 -070098 # Strip the suffix if any, as common.SignFile expects no suffix.
99 DEFAULT_CONTAINER_KEY_SUFFIX = '.x509.pem'
100 if a.endswith(DEFAULT_CONTAINER_KEY_SUFFIX):
101 a = a[:-len(DEFAULT_CONTAINER_KEY_SUFFIX)]
102 options['container_key'] = a
103 elif o == '--payload_key':
104 options['payload_key'] = a
105 elif o == '--payload_extra_args':
106 options['payload_extra_args'] = a
Baligh Uddind9fcafd2020-04-25 09:03:57 -0700107 elif o == '--codename_to_api_level_map':
108 versions = a.split(",")
109 for v in versions:
110 key, value = v.split(":")
111 if 'codename_to_api_level_map' not in options:
112 options['codename_to_api_level_map'] = {}
113 options['codename_to_api_level_map'].update({key: value})
Tianjie Xu88a759d2020-01-23 10:47:54 -0800114 elif o in ("-e", "--extra_apks"):
115 names, key = a.split("=")
116 names = names.split(",")
117 for n in names:
118 if 'extra_apks' not in options:
119 options['extra_apks'] = {}
120 options['extra_apks'].update({n: key})
Jooyung Han0f5a41d2021-10-27 03:53:21 +0900121 elif o == '--sign_tool':
122 options['sign_tool'] = a
Melisa Carranza Zuniga46930d72022-02-11 13:43:18 +0100123 elif o == '--sepolicy_key':
124 options['sepolicy_key'] = a
125 elif o == '--sepolicy_cert':
126 options['sepolicy_cert'] = a
127 elif o == '--fsverity_tool':
128 options['fsverity_tool'] = a
Tao Baoe7354ba2019-05-09 16:54:15 -0700129 else:
130 return False
131 return True
132
133 args = common.ParseOptions(
134 argv, __doc__,
Tianjie Xu88a759d2020-01-23 10:47:54 -0800135 extra_opts='e:',
Tao Baoe7354ba2019-05-09 16:54:15 -0700136 extra_long_opts=[
Tao Bao1ac886e2019-06-26 11:58:22 -0700137 'avbtool=',
Baligh Uddind9fcafd2020-04-25 09:03:57 -0700138 'codename_to_api_level_map=',
Tao Baoe7354ba2019-05-09 16:54:15 -0700139 'container_key=',
140 'payload_extra_args=',
141 'payload_key=',
Tianjie Xu88a759d2020-01-23 10:47:54 -0800142 'extra_apks=',
Jooyung Han0f5a41d2021-10-27 03:53:21 +0900143 'sign_tool=',
Melisa Carranza Zuniga46930d72022-02-11 13:43:18 +0100144 'sepolicy_key=',
145 'sepolicy_cert=',
146 'fsverity_tool='
Tao Baoe7354ba2019-05-09 16:54:15 -0700147 ],
148 extra_option_handler=option_handler)
149
150 if (len(args) != 2 or 'container_key' not in options or
151 'payload_key' not in options):
152 common.Usage(__doc__)
153 sys.exit(1)
154
155 common.InitLogging()
156
Tao Baoc9c1b862019-06-26 14:54:14 -0700157 signed_apex = SignApexFile(
Tao Bao1ac886e2019-06-26 11:58:22 -0700158 options.get('avbtool', 'avbtool'),
Tao Baoc9c1b862019-06-26 14:54:14 -0700159 args[0],
160 options['payload_key'],
161 options['container_key'],
Tao Bao448004a2019-09-19 07:55:02 -0700162 no_hashtree=False,
Tianjie Xu88a759d2020-01-23 10:47:54 -0800163 apk_keys=options.get('extra_apks', {}),
Baligh Uddind9fcafd2020-04-25 09:03:57 -0700164 signing_args=options.get('payload_extra_args'),
165 codename_to_api_level_map=options.get(
Jooyung Han0f5a41d2021-10-27 03:53:21 +0900166 'codename_to_api_level_map', {}),
Melisa Carranza Zuniga46930d72022-02-11 13:43:18 +0100167 sign_tool=options.get('sign_tool', None),
168 sepolicy_key=options.get('sepolicy_key', None),
169 sepolicy_cert=options.get('sepolicy_cert', None),
170 fsverity_tool=options.get('fsverity_tool', None))
Tao Baoc9c1b862019-06-26 14:54:14 -0700171 shutil.copyfile(signed_apex, args[1])
Tao Baoe7354ba2019-05-09 16:54:15 -0700172 logger.info("done.")
173
174
175if __name__ == '__main__':
176 try:
177 main(sys.argv[1:])
178 except common.ExternalError:
179 logger.exception("\n ERROR:\n")
180 sys.exit(1)
181 finally:
182 common.Cleanup()