blob: 74bccba254903a2da7a36783637e46b22ff18042 [file] [log] [blame]
Jooyung Han504105f2021-10-26 15:54:50 +09001#!/usr/bin/env python
2#
3# Copyright (C) 2021 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16"""sign_virt_apex is a command line tool for sign the Virt APEX file.
17
Jooyung Han98498f42022-02-07 15:23:08 +090018Typical usage:
Jooyung Han486609f2022-04-20 11:38:00 +090019 sign_virt_apex payload_key payload_dir
20 -v, --verbose
21 --verify
22 --avbtool path_to_avbtool
23 --signing_args args
Jooyung Han504105f2021-10-26 15:54:50 +090024
25sign_virt_apex uses external tools which are assumed to be available via PATH.
26- avbtool (--avbtool can override the tool)
Shikha Panwara7605cf2023-01-12 09:29:39 +000027- lpmake, lpunpack, simg2img, img2simg, initrd_bootconfig
Jooyung Han504105f2021-10-26 15:54:50 +090028"""
29import argparse
Nikita Ioffee1112032023-11-13 15:09:39 +000030import builtins
Jooyung Han02dceed2021-11-08 17:50:22 +090031import hashlib
Jooyung Han504105f2021-10-26 15:54:50 +090032import os
33import re
Jooyung Han98498f42022-02-07 15:23:08 +090034import shlex
Jooyung Han504105f2021-10-26 15:54:50 +090035import subprocess
36import sys
37import tempfile
Jooyung Han486609f2022-04-20 11:38:00 +090038import traceback
39from concurrent import futures
40
41# pylint: disable=line-too-long,consider-using-with
42
43# Use executor to parallelize the invocation of external tools
44# If a task depends on another, pass the future object of the previous task as wait list.
45# Every future object created by a task should be consumed with AwaitAll()
46# so that exceptions are propagated .
47executor = futures.ThreadPoolExecutor()
48
49# Temporary directory for unpacked super.img.
50# We could put its creation/deletion into the task graph as well, but
51# having it as a global setup is much simpler.
52unpack_dir = tempfile.TemporaryDirectory()
53
54# tasks created with Async() are kept in a list so that they are awaited
55# before exit.
56tasks = []
57
58# create an async task and return a future value of it.
59def Async(fn, *args, wait=None, **kwargs):
60
61 # wrap a function with AwaitAll()
62 def wrapped():
63 AwaitAll(wait)
64 fn(*args, **kwargs)
65
66 task = executor.submit(wrapped)
67 tasks.append(task)
68 return task
69
70
71# waits for task (captured in fs as future values) with future.result()
72# so that any exception raised during task can be raised upward.
73def AwaitAll(fs):
74 if fs:
75 for f in fs:
76 f.result()
Jooyung Han504105f2021-10-26 15:54:50 +090077
78
79def ParseArgs(argv):
80 parser = argparse.ArgumentParser(description='Sign the Virt APEX')
Jooyung Han02dceed2021-11-08 17:50:22 +090081 parser.add_argument('--verify', action='store_true',
82 help='Verify the Virt APEX')
Jooyung Han504105f2021-10-26 15:54:50 +090083 parser.add_argument(
84 '-v', '--verbose',
85 action='store_true',
86 help='verbose execution')
87 parser.add_argument(
88 '--avbtool',
89 default='avbtool',
90 help='Optional flag that specifies the AVB tool to use. Defaults to `avbtool`.')
91 parser.add_argument(
Jooyung Han98498f42022-02-07 15:23:08 +090092 '--signing_args',
93 help='the extra signing arguments passed to avbtool.'
94 )
95 parser.add_argument(
Jooyung Han1c3d2fa2022-02-24 02:35:59 +090096 '--key_override',
97 metavar="filename=key",
98 action='append',
99 help='Overrides a signing key for a file e.g. microdroid_bootloader=mykey (for testing)')
100 parser.add_argument(
Jooyung Han504105f2021-10-26 15:54:50 +0900101 'key',
102 help='path to the private key file.')
103 parser.add_argument(
104 'input_dir',
105 help='the directory having files to be packaged')
Shikha Panwara7605cf2023-01-12 09:29:39 +0000106 parser.add_argument(
107 '--do_not_update_bootconfigs',
108 action='store_true',
109 help='This will NOT update the vbmeta related bootconfigs while signing the apex.\
110 Used for testing only!!')
Nikita Ioffe314d7e32023-12-18 17:38:18 +0000111 parser.add_argument('--do_not_validate_avb_version', action='store_true', help='Do not validate the avb_version when updating vbmeta bootconfig. Only use in tests!')
Jooyung Han1c3d2fa2022-02-24 02:35:59 +0900112 args = parser.parse_args(argv)
113 # preprocess --key_override into a map
Jiyong Park40bf2dc2022-05-23 23:41:25 +0900114 args.key_overrides = {}
Jooyung Han1c3d2fa2022-02-24 02:35:59 +0900115 if args.key_override:
116 for pair in args.key_override:
117 name, key = pair.split('=')
118 args.key_overrides[name] = key
119 return args
Jooyung Han504105f2021-10-26 15:54:50 +0900120
121
Jooyung Han486609f2022-04-20 11:38:00 +0900122def RunCommand(args, cmd, env=None, expected_return_values=None):
123 expected_return_values = expected_return_values or {0}
Jooyung Han504105f2021-10-26 15:54:50 +0900124 env = env or {}
125 env.update(os.environ.copy())
126
127 # TODO(b/193504286): we need a way to find other tool (cmd[0]) in various contexts
128 # e.g. sign_apex.py, sign_target_files_apk.py
129 if cmd[0] == 'avbtool':
130 cmd[0] = args.avbtool
131
132 if args.verbose:
133 print('Running: ' + ' '.join(cmd))
134 p = subprocess.Popen(
135 cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, env=env, universal_newlines=True)
136 output, _ = p.communicate()
137
138 if args.verbose or p.returncode not in expected_return_values:
139 print(output.rstrip())
140
141 assert p.returncode in expected_return_values, (
142 '%d Failed to execute: ' + ' '.join(cmd)) % p.returncode
143 return (output, p.returncode)
144
145
146def ReadBytesSize(value):
147 return int(value.removesuffix(' bytes'))
148
149
Jooyung Han832d11d2021-11-08 12:51:47 +0900150def ExtractAvbPubkey(args, key, output):
151 RunCommand(args, ['avbtool', 'extract_public_key',
152 '--key', key, '--output', output])
153
154
155def AvbInfo(args, image_path):
Jooyung Han504105f2021-10-26 15:54:50 +0900156 """Parses avbtool --info image output
157
158 Args:
159 args: program arguments.
160 image_path: The path to the image.
161 descriptor_name: Descriptor name of interest.
162
163 Returns:
164 A pair of
165 - a dict that contains VBMeta info. None if there's no VBMeta info.
Jooyung Han832d11d2021-11-08 12:51:47 +0900166 - a list of descriptors.
Jooyung Han504105f2021-10-26 15:54:50 +0900167 """
168 if not os.path.exists(image_path):
Jiyong Park40bf2dc2022-05-23 23:41:25 +0900169 raise ValueError(f'Failed to find image: {image_path}')
Jooyung Han504105f2021-10-26 15:54:50 +0900170
171 output, ret_code = RunCommand(
172 args, ['avbtool', 'info_image', '--image', image_path], expected_return_values={0, 1})
173 if ret_code == 1:
174 return None, None
175
Jooyung Han832d11d2021-11-08 12:51:47 +0900176 info, descriptors = {}, []
Jooyung Han504105f2021-10-26 15:54:50 +0900177
178 # Read `avbtool info_image` output as "key:value" lines
179 matcher = re.compile(r'^(\s*)([^:]+):\s*(.*)$')
180
181 def IterateLine(output):
182 for line in output.split('\n'):
183 line_info = matcher.match(line)
184 if not line_info:
185 continue
186 yield line_info.group(1), line_info.group(2), line_info.group(3)
187
188 gen = IterateLine(output)
Jooyung Han832d11d2021-11-08 12:51:47 +0900189
190 def ReadDescriptors(cur_indent, cur_name, cur_value):
191 descriptor = cur_value if cur_name == 'Prop' else {}
192 descriptors.append((cur_name, descriptor))
193 for indent, key, value in gen:
194 if indent <= cur_indent:
195 # read descriptors recursively to pass the read key as descriptor name
196 ReadDescriptors(indent, key, value)
197 break
198 descriptor[key] = value
199
Jooyung Han504105f2021-10-26 15:54:50 +0900200 # Read VBMeta info
201 for _, key, value in gen:
202 if key == 'Descriptors':
Jooyung Han832d11d2021-11-08 12:51:47 +0900203 ReadDescriptors(*next(gen))
Jooyung Han504105f2021-10-26 15:54:50 +0900204 break
205 info[key] = value
206
Jooyung Han832d11d2021-11-08 12:51:47 +0900207 return info, descriptors
Jooyung Han504105f2021-10-26 15:54:50 +0900208
Jooyung Han832d11d2021-11-08 12:51:47 +0900209
Shikha Panwarc149d242023-01-20 16:23:04 +0000210# Look up a list of (key, value) with a key. Returns the list of value(s) with the matching key.
211# The order of those values is maintained.
Jooyung Han832d11d2021-11-08 12:51:47 +0900212def LookUp(pairs, key):
Shikha Panwarc149d242023-01-20 16:23:04 +0000213 return [v for (k, v) in pairs if k == key]
Jooyung Han504105f2021-10-26 15:54:50 +0900214
Seungjae Yoob18d1632024-01-10 11:08:19 +0900215# Extract properties from the descriptors of original vbmeta image,
216# append to command as parameter.
217def AppendPropArgument(cmd, descriptors):
218 for prop in LookUp(descriptors, 'Prop'):
219 cmd.append('--prop')
220 result = re.match(r"(.+) -> '(.+)'", prop)
221 cmd.append(result.group(1) + ":" + result.group(2))
Jooyung Han504105f2021-10-26 15:54:50 +0900222
Seungjae Yoo3f46c7f2024-01-10 14:32:54 +0900223
224def check_no_size_change_on_resigned_image(image_path, original_image_info, resigned_image_info):
225 assert original_image_info is not None, f'no avbinfo on original image: {image_path}'
226 assert resigned_image_info is not None, f'no avbinfo on resigned image: {image_path}'
227 assert original_image_info['Header Block'] == resigned_image_info['Header Block'], f'header block size mismatch: {image_path}'
228 assert original_image_info['Authentication Block'] == resigned_image_info['Authentication Block'], f'authentication block size mismatch: {image_path}'
229 assert original_image_info['Auxiliary Block'] == resigned_image_info['Auxiliary Block'], f'auxiliary block size mismatch: {image_path}'
230
Shikha Panwarc149d242023-01-20 16:23:04 +0000231def AddHashFooter(args, key, image_path, partition_name, additional_descriptors=None):
Jooyung Han1c3d2fa2022-02-24 02:35:59 +0900232 if os.path.basename(image_path) in args.key_overrides:
233 key = args.key_overrides[os.path.basename(image_path)]
Seungjae Yoob18d1632024-01-10 11:08:19 +0900234 info, descriptors = AvbInfo(args, image_path)
Jooyung Han504105f2021-10-26 15:54:50 +0900235 if info:
236 image_size = ReadBytesSize(info['Image size'])
237 algorithm = info['Algorithm']
Jooyung Han504105f2021-10-26 15:54:50 +0900238 partition_size = str(image_size)
239
240 cmd = ['avbtool', 'add_hash_footer',
241 '--key', key,
242 '--algorithm', algorithm,
243 '--partition_name', partition_name,
244 '--partition_size', partition_size,
245 '--image', image_path]
Seungjae Yoob18d1632024-01-10 11:08:19 +0900246 AppendPropArgument(cmd, descriptors)
Jooyung Han98498f42022-02-07 15:23:08 +0900247 if args.signing_args:
248 cmd.extend(shlex.split(args.signing_args))
Shikha Panwarc149d242023-01-20 16:23:04 +0000249 if additional_descriptors:
250 for image in additional_descriptors:
251 cmd.extend(['--include_descriptors_from_image', image])
Shikha Panwar2a788662023-09-11 14:04:24 +0000252
253 if 'Rollback Index' in info:
254 cmd.extend(['--rollback_index', info['Rollback Index']])
Jooyung Han504105f2021-10-26 15:54:50 +0900255 RunCommand(args, cmd)
Seungjae Yoo3f46c7f2024-01-10 14:32:54 +0900256 resigned_info, _ = AvbInfo(args, image_path)
257 check_no_size_change_on_resigned_image(image_path, info, resigned_info)
Jooyung Han504105f2021-10-26 15:54:50 +0900258
259def AddHashTreeFooter(args, key, image_path):
Jooyung Han1c3d2fa2022-02-24 02:35:59 +0900260 if os.path.basename(image_path) in args.key_overrides:
261 key = args.key_overrides[os.path.basename(image_path)]
Jooyung Han832d11d2021-11-08 12:51:47 +0900262 info, descriptors = AvbInfo(args, image_path)
Jooyung Han504105f2021-10-26 15:54:50 +0900263 if info:
Shikha Panwarc149d242023-01-20 16:23:04 +0000264 descriptor = LookUp(descriptors, 'Hashtree descriptor')[0]
Jooyung Han504105f2021-10-26 15:54:50 +0900265 image_size = ReadBytesSize(info['Image size'])
266 algorithm = info['Algorithm']
267 partition_name = descriptor['Partition Name']
Shikha Panwar638119b2023-01-03 06:00:26 +0000268 hash_algorithm = descriptor['Hash Algorithm']
Jooyung Han504105f2021-10-26 15:54:50 +0900269 partition_size = str(image_size)
Jooyung Han504105f2021-10-26 15:54:50 +0900270 cmd = ['avbtool', 'add_hashtree_footer',
271 '--key', key,
272 '--algorithm', algorithm,
273 '--partition_name', partition_name,
274 '--partition_size', partition_size,
275 '--do_not_generate_fec',
Shikha Panwar638119b2023-01-03 06:00:26 +0000276 '--hash_algorithm', hash_algorithm,
Jooyung Han504105f2021-10-26 15:54:50 +0900277 '--image', image_path]
Seungjae Yoob18d1632024-01-10 11:08:19 +0900278 AppendPropArgument(cmd, descriptors)
Jooyung Han98498f42022-02-07 15:23:08 +0900279 if args.signing_args:
280 cmd.extend(shlex.split(args.signing_args))
Jooyung Han504105f2021-10-26 15:54:50 +0900281 RunCommand(args, cmd)
Seungjae Yoo3f46c7f2024-01-10 14:32:54 +0900282 resigned_info, _ = AvbInfo(args, image_path)
283 check_no_size_change_on_resigned_image(image_path, info, resigned_info)
Jooyung Han504105f2021-10-26 15:54:50 +0900284
285
Shikha Panwara7605cf2023-01-12 09:29:39 +0000286def UpdateVbmetaBootconfig(args, initrds, vbmeta_img):
287 # Update the bootconfigs in ramdisk
288 def detach_bootconfigs(initrd_bc, initrd, bc):
289 cmd = ['initrd_bootconfig', 'detach', initrd_bc, initrd, bc]
290 RunCommand(args, cmd)
291
292 def attach_bootconfigs(initrd_bc, initrd, bc):
293 cmd = ['initrd_bootconfig', 'attach',
294 initrd, bc, '--output', initrd_bc]
295 RunCommand(args, cmd)
296
297 # Validate that avb version used while signing the apex is the same as used by build server
298 def validate_avb_version(bootconfigs):
299 cmd = ['avbtool', 'version']
300 stdout, _ = RunCommand(args, cmd)
301 avb_version_curr = stdout.split(" ")[1].strip()
302 avb_version_curr = avb_version_curr[0:avb_version_curr.rfind('.')]
303
304 avb_version_bc = re.search(
305 r"androidboot.vbmeta.avb_version = \"([^\"]*)\"", bootconfigs).group(1)
306 if avb_version_curr != avb_version_bc:
Nikita Ioffee1112032023-11-13 15:09:39 +0000307 raise builtins.Exception(f'AVB version mismatch between current & one & \
Shikha Panwara7605cf2023-01-12 09:29:39 +0000308 used to build bootconfigs:{avb_version_curr}&{avb_version_bc}')
309
310 def calc_vbmeta_digest():
311 cmd = ['avbtool', 'calculate_vbmeta_digest', '--image',
312 vbmeta_img, '--hash_algorithm', 'sha256']
313 stdout, _ = RunCommand(args, cmd)
314 return stdout.strip()
315
316 def calc_vbmeta_size():
317 cmd = ['avbtool', 'info_image', '--image', vbmeta_img]
318 stdout, _ = RunCommand(args, cmd)
319 size = 0
320 for line in stdout.split("\n"):
321 line = line.split(":")
322 if line[0] in ['Header Block', 'Authentication Block', 'Auxiliary Block']:
323 size += int(line[1].strip()[0:-6])
324 return size
325
326 def update_vbmeta_digest(bootconfigs):
327 # Update androidboot.vbmeta.digest in bootconfigs
328 result = re.search(
329 r"androidboot.vbmeta.digest = \"[^\"]*\"", bootconfigs)
330 if not result:
331 raise ValueError("Failed to find androidboot.vbmeta.digest")
332
333 return bootconfigs.replace(result.group(),
334 f'androidboot.vbmeta.digest = "{calc_vbmeta_digest()}"')
335
336 def update_vbmeta_size(bootconfigs):
337 # Update androidboot.vbmeta.size in bootconfigs
338 result = re.search(r"androidboot.vbmeta.size = [0-9]+", bootconfigs)
339 if not result:
340 raise ValueError("Failed to find androidboot.vbmeta.size")
341 return bootconfigs.replace(result.group(),
342 f'androidboot.vbmeta.size = {calc_vbmeta_size()}')
343
344 with tempfile.TemporaryDirectory() as work_dir:
345 tmp_initrd = os.path.join(work_dir, 'initrd')
346 tmp_bc = os.path.join(work_dir, 'bc')
347
348 for initrd in initrds:
349 detach_bootconfigs(initrd, tmp_initrd, tmp_bc)
350 bc_file = open(tmp_bc, "rt", encoding="utf-8")
351 bc_data = bc_file.read()
Nikita Ioffe314d7e32023-12-18 17:38:18 +0000352 if not args.do_not_validate_avb_version:
353 validate_avb_version(bc_data)
Shikha Panwara7605cf2023-01-12 09:29:39 +0000354 bc_data = update_vbmeta_digest(bc_data)
355 bc_data = update_vbmeta_size(bc_data)
356 bc_file.close()
357 bc_file = open(tmp_bc, "wt", encoding="utf-8")
358 bc_file.write(bc_data)
359 bc_file.flush()
360 attach_bootconfigs(initrd, tmp_initrd, tmp_bc)
361
362
Jooyung Han832d11d2021-11-08 12:51:47 +0900363def MakeVbmetaImage(args, key, vbmeta_img, images=None, chained_partitions=None):
Jooyung Han1c3d2fa2022-02-24 02:35:59 +0900364 if os.path.basename(vbmeta_img) in args.key_overrides:
365 key = args.key_overrides[os.path.basename(vbmeta_img)]
Jooyung Han832d11d2021-11-08 12:51:47 +0900366 info, descriptors = AvbInfo(args, vbmeta_img)
367 if info is None:
368 return
369
Jooyung Han486609f2022-04-20 11:38:00 +0900370 with tempfile.TemporaryDirectory() as work_dir:
Jooyung Han504105f2021-10-26 15:54:50 +0900371 algorithm = info['Algorithm']
372 rollback_index = info['Rollback Index']
373 rollback_index_location = info['Rollback Index Location']
374
375 cmd = ['avbtool', 'make_vbmeta_image',
376 '--key', key,
377 '--algorithm', algorithm,
378 '--rollback_index', rollback_index,
379 '--rollback_index_location', rollback_index_location,
380 '--output', vbmeta_img]
Jooyung Han832d11d2021-11-08 12:51:47 +0900381 if images:
382 for img in images:
383 cmd.extend(['--include_descriptors_from_image', img])
384
385 # replace pubkeys of chained_partitions as well
386 for name, descriptor in descriptors:
387 if name == 'Chain Partition descriptor':
388 part_name = descriptor['Partition Name']
389 ril = descriptor['Rollback Index Location']
390 part_key = chained_partitions[part_name]
391 avbpubkey = os.path.join(work_dir, part_name + '.avbpubkey')
392 ExtractAvbPubkey(args, part_key, avbpubkey)
Jiyong Park40bf2dc2022-05-23 23:41:25 +0900393 cmd.extend(['--chain_partition', f'{part_name}:{ril}:{avbpubkey}'])
Jooyung Han832d11d2021-11-08 12:51:47 +0900394
Jooyung Han98498f42022-02-07 15:23:08 +0900395 if args.signing_args:
396 cmd.extend(shlex.split(args.signing_args))
397
Jooyung Han504105f2021-10-26 15:54:50 +0900398 RunCommand(args, cmd)
Seungjae Yoo3f46c7f2024-01-10 14:32:54 +0900399 resigned_info, _ = AvbInfo(args, vbmeta_img)
400 check_no_size_change_on_resigned_image(vbmeta_img, info, resigned_info)
Jooyung Han504105f2021-10-26 15:54:50 +0900401 # libavb expects to be able to read the maximum vbmeta size, so we must provide a partition
402 # which matches this or the read will fail.
Jiyong Park40bf2dc2022-05-23 23:41:25 +0900403 with open(vbmeta_img, 'a', encoding='utf8') as f:
Jooyung Handcb0b492022-02-26 09:04:17 +0900404 f.truncate(65536)
Jooyung Han504105f2021-10-26 15:54:50 +0900405
406
Jooyung Han486609f2022-04-20 11:38:00 +0900407def UnpackSuperImg(args, super_img, work_dir):
408 tmp_super_img = os.path.join(work_dir, 'super.img')
409 RunCommand(args, ['simg2img', super_img, tmp_super_img])
410 RunCommand(args, ['lpunpack', tmp_super_img, work_dir])
Jooyung Han504105f2021-10-26 15:54:50 +0900411
412
413def MakeSuperImage(args, partitions, output):
Jooyung Han486609f2022-04-20 11:38:00 +0900414 with tempfile.TemporaryDirectory() as work_dir:
Jooyung Han504105f2021-10-26 15:54:50 +0900415 cmd = ['lpmake', '--device-size=auto', '--metadata-slots=2', # A/B
416 '--metadata-size=65536', '--sparse', '--output=' + output]
417
418 for part, img in partitions.items():
419 tmp_img = os.path.join(work_dir, part)
420 RunCommand(args, ['img2simg', img, tmp_img])
421
Jiyong Park40bf2dc2022-05-23 23:41:25 +0900422 image_arg = f'--image={part}={img}'
423 partition_arg = f'--partition={part}:readonly:{os.path.getsize(img)}:default'
Jooyung Han504105f2021-10-26 15:54:50 +0900424 cmd.extend([image_arg, partition_arg])
425
426 RunCommand(args, cmd)
427
428
Shikha Panwarc149d242023-01-20 16:23:04 +0000429def GenVbmetaImage(args, image, output, partition_name):
430 cmd = ['avbtool', 'add_hash_footer', '--dynamic_partition_size',
431 '--do_not_append_vbmeta_image',
432 '--partition_name', partition_name,
433 '--image', image,
434 '--output_vbmeta_image', output]
435 RunCommand(args, cmd)
436
Inseob Kim7a1fc8f2023-11-22 18:45:28 +0900437
Inseob Kim0276f612023-12-07 17:25:18 +0900438gki_versions = ['android14-6.1']
Inseob Kim7a1fc8f2023-11-22 18:45:28 +0900439
Jooyung Han486609f2022-04-20 11:38:00 +0900440# dict of (key, file) for re-sign/verification. keys are un-versioned for readability.
Inseob Kim7a1fc8f2023-11-22 18:45:28 +0900441virt_apex_non_gki_files = {
Shikha Panwara7605cf2023-01-12 09:29:39 +0000442 'kernel': 'etc/fs/microdroid_kernel',
Jooyung Han486609f2022-04-20 11:38:00 +0900443 'vbmeta.img': 'etc/fs/microdroid_vbmeta.img',
Shikha Panwara7605cf2023-01-12 09:29:39 +0000444 'super.img': 'etc/fs/microdroid_super.img',
445 'initrd_normal.img': 'etc/microdroid_initrd_normal.img',
446 'initrd_debuggable.img': 'etc/microdroid_initrd_debuggable.img',
Alice Wangbe8330c2023-10-19 08:55:07 +0000447 'rialto': 'etc/rialto.bin',
Jooyung Han486609f2022-04-20 11:38:00 +0900448}
449
Jooyung Han486609f2022-04-20 11:38:00 +0900450def TargetFiles(input_dir):
Inseob Kim7a1fc8f2023-11-22 18:45:28 +0900451 ret = {k: os.path.join(input_dir, v) for k, v in virt_apex_non_gki_files.items()}
452
453 for ver in gki_versions:
454 kernel = os.path.join(input_dir, f'etc/fs/microdroid_gki-{ver}_kernel')
455 initrd_normal = os.path.join(input_dir, f'etc/microdroid_gki-{ver}_initrd_normal.img')
456 initrd_debug = os.path.join(input_dir, f'etc/microdroid_gki-{ver}_initrd_debuggable.img')
457
458 if os.path.isfile(kernel):
459 ret[f'gki-{ver}_kernel'] = kernel
460 ret[f'gki-{ver}_initrd_normal.img'] = initrd_normal
461 ret[f'gki-{ver}_initrd_debuggable.img'] = initrd_debug
462
463 return ret
464
465def IsInitrdImage(path):
466 return path.endswith('initrd_normal.img') or path.endswith('initrd_debuggable.img')
Jooyung Han486609f2022-04-20 11:38:00 +0900467
468
Jooyung Han504105f2021-10-26 15:54:50 +0900469def SignVirtApex(args):
470 key = args.key
471 input_dir = args.input_dir
Jooyung Han486609f2022-04-20 11:38:00 +0900472 files = TargetFiles(input_dir)
Jooyung Han504105f2021-10-26 15:54:50 +0900473
Jooyung Han486609f2022-04-20 11:38:00 +0900474 # unpacked files (will be unpacked from super.img below)
475 system_a_img = os.path.join(unpack_dir.name, 'system_a.img')
Nikita Ioffee1112032023-11-13 15:09:39 +0000476 vendor_a_img = os.path.join(unpack_dir.name, 'vendor_a.img')
Jooyung Han504105f2021-10-26 15:54:50 +0900477
Jooyung Han504105f2021-10-26 15:54:50 +0900478 # re-sign super.img
Jooyung Hanbae6ce42022-09-13 15:15:18 +0900479 # 1. unpack super.img
Nikita Ioffee1112032023-11-13 15:09:39 +0000480 # 2. resign system and vendor (if exists)
481 # 3. repack super.img out of resigned system and vendor (if exists)
Jooyung Hanbae6ce42022-09-13 15:15:18 +0900482 UnpackSuperImg(args, files['super.img'], unpack_dir.name)
483 system_a_f = Async(AddHashTreeFooter, args, key, system_a_img)
Nikita Ioffebaf578d2023-06-14 20:29:37 +0000484 partitions = {"system_a": system_a_img}
Nikita Ioffee1112032023-11-13 15:09:39 +0000485 images = [system_a_img]
486 images_f = [system_a_f]
487
488 # if vendor_a.img exists, resign it
489 if os.path.exists(vendor_a_img):
490 partitions.update({'vendor_a': vendor_a_img})
491 images.append(vendor_a_img)
492 vendor_a_f = Async(AddHashTreeFooter, args, key, vendor_a_img)
493 images_f.append(vendor_a_f)
494
Shikha Panwara7605cf2023-01-12 09:29:39 +0000495 Async(MakeSuperImage, args, partitions,
Nikita Ioffee1112032023-11-13 15:09:39 +0000496 files['super.img'], wait=images_f)
Jooyung Han504105f2021-10-26 15:54:50 +0900497
Nikita Ioffebaf578d2023-06-14 20:29:37 +0000498 # re-generate vbmeta from re-signed system_a.img
Shikha Panwara7605cf2023-01-12 09:29:39 +0000499 vbmeta_f = Async(MakeVbmetaImage, args, key, files['vbmeta.img'],
Nikita Ioffee1112032023-11-13 15:09:39 +0000500 images=images,
501 wait=images_f)
Jooyung Han504105f2021-10-26 15:54:50 +0900502
Shikha Panwarc149d242023-01-20 16:23:04 +0000503 vbmeta_bc_f = None
Shikha Panwara7605cf2023-01-12 09:29:39 +0000504 if not args.do_not_update_bootconfigs:
Inseob Kim7a1fc8f2023-11-22 18:45:28 +0900505 initrd_files = [v for k, v in files.items() if IsInitrdImage(k)]
Inseob Kim77c7f712023-11-06 17:01:02 +0900506 vbmeta_bc_f = Async(UpdateVbmetaBootconfig, args, initrd_files,
507 files['vbmeta.img'],
Shikha Panwarc149d242023-01-20 16:23:04 +0000508 wait=[vbmeta_f])
Jooyung Han832d11d2021-11-08 12:51:47 +0900509
Shikha Panwarc149d242023-01-20 16:23:04 +0000510 # Re-sign kernel. Note kernel's vbmeta contain addition descriptor from ramdisk(s)
Inseob Kim77c7f712023-11-06 17:01:02 +0900511 def resign_kernel(kernel, initrd_normal, initrd_debug):
512 kernel_file = files[kernel]
513 initrd_normal_file = files[initrd_normal]
514 initrd_debug_file = files[initrd_debug]
515
516 initrd_normal_hashdesc = tempfile.NamedTemporaryFile(delete=False).name
517 initrd_debug_hashdesc = tempfile.NamedTemporaryFile(delete=False).name
518 initrd_n_f = Async(GenVbmetaImage, args, initrd_normal_file,
519 initrd_normal_hashdesc, "initrd_normal",
520 wait=[vbmeta_bc_f] if vbmeta_bc_f is not None else [])
521 initrd_d_f = Async(GenVbmetaImage, args, initrd_debug_file,
522 initrd_debug_hashdesc, "initrd_debug",
523 wait=[vbmeta_bc_f] if vbmeta_bc_f is not None else [])
524 Async(AddHashFooter, args, key, kernel_file, partition_name="boot",
525 additional_descriptors=[
526 initrd_normal_hashdesc, initrd_debug_hashdesc],
527 wait=[initrd_n_f, initrd_d_f])
528
529 resign_kernel('kernel', 'initrd_normal.img', 'initrd_debuggable.img')
530
Inseob Kim7a1fc8f2023-11-22 18:45:28 +0900531 for ver in gki_versions:
532 if f'gki-{ver}_kernel' in files:
533 resign_kernel(
534 f'gki-{ver}_kernel',
535 f'gki-{ver}_initrd_normal.img',
536 f'gki-{ver}_initrd_debuggable.img')
Jooyung Han832d11d2021-11-08 12:51:47 +0900537
Alice Wangbe8330c2023-10-19 08:55:07 +0000538 # Re-sign rialto if it exists. Rialto only exists in arm64 environment.
539 if os.path.exists(files['rialto']):
540 Async(AddHashFooter, args, key, files['rialto'], partition_name='boot')
541
Jooyung Han504105f2021-10-26 15:54:50 +0900542
Jooyung Han02dceed2021-11-08 17:50:22 +0900543def VerifyVirtApex(args):
Jooyung Han486609f2022-04-20 11:38:00 +0900544 key = args.key
545 input_dir = args.input_dir
546 files = TargetFiles(input_dir)
Jooyung Han02dceed2021-11-08 17:50:22 +0900547
Jooyung Han486609f2022-04-20 11:38:00 +0900548 # unpacked files
549 UnpackSuperImg(args, files['super.img'], unpack_dir.name)
550 system_a_img = os.path.join(unpack_dir.name, 'system_a.img')
Jooyung Han02dceed2021-11-08 17:50:22 +0900551
Jooyung Han486609f2022-04-20 11:38:00 +0900552 # Read pubkey digest from the input key
553 with tempfile.NamedTemporaryFile() as pubkey_file:
554 ExtractAvbPubkey(args, key, pubkey_file.name)
555 with open(pubkey_file.name, 'rb') as f:
556 pubkey = f.read()
557 pubkey_digest = hashlib.sha1(pubkey).hexdigest()
Jooyung Han02dceed2021-11-08 17:50:22 +0900558
Jooyung Han486609f2022-04-20 11:38:00 +0900559 def check_avb_pubkey(file):
560 info, _ = AvbInfo(args, file)
Jiyong Park40bf2dc2022-05-23 23:41:25 +0900561 assert info is not None, f'no avbinfo: {file}'
562 assert info['Public key (sha1)'] == pubkey_digest, f'pubkey mismatch: {file}'
Jooyung Han486609f2022-04-20 11:38:00 +0900563
Inseob Kim7a1fc8f2023-11-22 18:45:28 +0900564 for k, f in files.items():
565 if IsInitrdImage(k):
Shikha Panwara7605cf2023-01-12 09:29:39 +0000566 # TODO(b/245277660): Verify that ramdisks contain the correct vbmeta digest
567 continue
Alice Wangbe8330c2023-10-19 08:55:07 +0000568 if k == 'rialto' and not os.path.exists(f):
569 # Rialto only exists in arm64 environment.
570 continue
Inseob Kim7a1fc8f2023-11-22 18:45:28 +0900571 if k == 'super.img':
Jooyung Han486609f2022-04-20 11:38:00 +0900572 Async(check_avb_pubkey, system_a_img)
Jooyung Han486609f2022-04-20 11:38:00 +0900573 else:
574 # Check pubkey for other files using avbtool
575 Async(check_avb_pubkey, f)
Jooyung Han02dceed2021-11-08 17:50:22 +0900576
577
Jooyung Han504105f2021-10-26 15:54:50 +0900578def main(argv):
579 try:
580 args = ParseArgs(argv)
Jooyung Han02dceed2021-11-08 17:50:22 +0900581 if args.verify:
582 VerifyVirtApex(args)
583 else:
584 SignVirtApex(args)
Jooyung Han486609f2022-04-20 11:38:00 +0900585 # ensure all tasks are completed without exceptions
586 AwaitAll(tasks)
Shikha Panwara7605cf2023-01-12 09:29:39 +0000587 except: # pylint: disable=bare-except
Jooyung Han486609f2022-04-20 11:38:00 +0900588 traceback.print_exc()
Jooyung Han504105f2021-10-26 15:54:50 +0900589 sys.exit(1)
590
591
592if __name__ == '__main__':
593 main(sys.argv[1:])