blob: 7fd4b173e148f03481334103409684a0d0ac5f70 [file] [log] [blame]
Gilad Arnold553b0ec2013-01-26 01:00:39 -08001#!/usr/bin/python
2#
3# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
4# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
7"""Command-line tool for checking and applying Chrome OS update payloads."""
8
9import optparse
10import os
11import sys
12
13# pylint: disable=F0401
14lib_dir = os.path.join(os.path.dirname(__file__), 'lib')
15if os.path.exists(lib_dir) and os.path.isdir(lib_dir):
16 sys.path.insert(1, lib_dir)
17import update_payload
18
19
20_TYPE_FULL = 'full'
21_TYPE_DELTA = 'delta'
22
23
Gilad Arnold4fbe4092013-04-17 10:00:55 -070024def ParseArguments(argv):
Gilad Arnold553b0ec2013-01-26 01:00:39 -080025 """Parse and validate command-line arguments.
26
27 Args:
Gilad Arnold4fbe4092013-04-17 10:00:55 -070028 argv: command-line arguments to parse (excluding the program name)
Gilad Arnold553b0ec2013-01-26 01:00:39 -080029 Returns:
Gilad Arnold4fbe4092013-04-17 10:00:55 -070030 A tuple (opts, payload, extra_args), where `opts' are the options
Gilad Arnold553b0ec2013-01-26 01:00:39 -080031 returned by the parser, `payload' is the name of the payload file
32 (mandatory argument) and `extra_args' are any additional command-line
33 arguments.
34
35 """
Gilad Arnold553b0ec2013-01-26 01:00:39 -080036 parser = optparse.OptionParser(
Gilad Arnold4fbe4092013-04-17 10:00:55 -070037 usage=('Usage: %prog [OPTION...] PAYLOAD [DST_KERN DST_ROOT '
38 '[SRC_KERN SRC_ROOT]]'),
39 description=('Applies a Chrome OS update PAYLOAD to SRC_KERN and '
40 'SRC_ROOT emitting DST_KERN and DST_ROOT, respectively. '
41 'SRC_KERN and SRC_ROOT are only needed for delta payloads. '
42 'When no partitions are provided, verifies the payload '
43 'integrity.'),
44 epilog=('Note: a payload may verify correctly but fail to apply, and '
45 'vice versa; this is by design and can be thought of as static '
46 'vs dynamic correctness. A payload that both verifies and '
47 'applies correctly should be safe for use by the Chrome OS '
48 'Update Engine. Use --check to verify a payload prior to '
49 'applying it.'))
Gilad Arnold553b0ec2013-01-26 01:00:39 -080050
Gilad Arnold4fbe4092013-04-17 10:00:55 -070051 check_opts = optparse.OptionGroup(parser, 'Payload integrity checking')
Gilad Arnold553b0ec2013-01-26 01:00:39 -080052 check_opts.add_option('-c', '--check', action='store_true', default=False,
Gilad Arnold4fbe4092013-04-17 10:00:55 -070053 help=('force payload integrity check (e.g. before '
54 'applying)'))
Gilad Arnold553b0ec2013-01-26 01:00:39 -080055 check_opts.add_option('-r', '--report', metavar='FILE',
56 help="dump payload report (`-' for stdout)")
57 check_opts.add_option('-t', '--type', metavar='TYPE', dest='assert_type',
Gilad Arnold4fbe4092013-04-17 10:00:55 -070058 help=("assert that payload is either `%s' or `%s'" %
59 (_TYPE_FULL, _TYPE_DELTA)))
Gilad Arnold553b0ec2013-01-26 01:00:39 -080060 check_opts.add_option('-z', '--block-size', metavar='NUM', default=0,
61 type='int',
62 help='assert a non-default (4096) payload block size')
63 check_opts.add_option('-u', '--allow-unhashed', action='store_true',
64 default=False, help='allow unhashed operations')
65 check_opts.add_option('-k', '--key', metavar='FILE',
66 help='public key to be used for signature verification')
67 check_opts.add_option('-m', '--meta-sig', metavar='FILE',
68 help='verify metadata against its signature')
69 parser.add_option_group(check_opts)
70
71 trace_opts = optparse.OptionGroup(parser, 'Block tracing')
72 trace_opts.add_option('-b', '--root-block', metavar='BLOCK', type='int',
73 help='trace the origin for a rootfs block')
74 trace_opts.add_option('-B', '--kern-block', metavar='BLOCK', type='int',
75 help='trace the origin for a kernel block')
76 trace_opts.add_option('-s', '--skip', metavar='NUM', default='0', type='int',
77 help='skip first NUM occurrences of traced block')
78 parser.add_option_group(trace_opts)
79
Gilad Arnold4fbe4092013-04-17 10:00:55 -070080 # Parse command-line arguments.
81 opts, args = parser.parse_args(argv)
82
83 # Validate a value given to --type, if any.
84 if opts.assert_type not in (None, _TYPE_FULL, _TYPE_DELTA):
85 parser.error('invalid argument to --type: %s' % opts.assert_type)
86
87 # Ensure consistent use of block tracing options.
88 do_block_trace = opts.root_block or opts.kern_block
89 if opts.skip and not do_block_trace:
90 parser.error('--skip must be used with either --root-block or --kern-block')
91
92 # There are several options that imply --check.
93 opts.check = (opts.check or opts.report or opts.assert_type or
94 opts.block_size or opts.allow_unhashed or opts.key or
95 opts.meta_sig)
96
97 # Check number of arguments, enforce payload type accordingly.
98 if len(args) == 3:
99 if opts.assert_type == _TYPE_DELTA:
100 parser.error('%s payload requires source partition arguments' %
101 _TYPE_DELTA)
102 opts.assert_type = _TYPE_FULL
103 elif len(args) == 5:
104 if opts.assert_type == _TYPE_FULL:
105 parser.error('%s payload does not accept source partition arguments' %
106 _TYPE_FULL)
107 opts.assert_type = _TYPE_DELTA
108 elif len(args) == 1:
109 # Not applying payload; if block tracing not requested either, do an
110 # integrity check.
111 if not do_block_trace:
112 opts.check = True
113 else:
114 parser.error('unexpected number of arguments')
115
116 return opts, args[0], args[1:]
117
118
119def main(argv):
Gilad Arnold553b0ec2013-01-26 01:00:39 -0800120 # Parse and validate arguments.
Gilad Arnold4fbe4092013-04-17 10:00:55 -0700121 options, payload_file_name, extra_args = ParseArguments(argv[1:])
Gilad Arnold553b0ec2013-01-26 01:00:39 -0800122
123 with open(payload_file_name) as payload_file:
124 payload = update_payload.Payload(payload_file)
125 try:
126 # Initialize payload.
127 payload.Init()
128
129 # Perform payload integrity checks.
130 if options.check:
131 report_file = None
132 do_close_report_file = False
133 try:
134 if options.report:
135 if options.report == '-':
136 report_file = sys.stdout
137 else:
138 report_file = open(options.report, 'w')
139 do_close_report_file = True
140
141 payload.Check(
142 pubkey_file_name=options.key,
143 metadata_sig_file=open(options.meta_sig)
144 if options.meta_sig else None,
145 report_out_file=report_file,
146 assert_type=options.assert_type,
147 block_size=int(options.block_size),
148 allow_unhashed=options.allow_unhashed)
149 finally:
150 if do_close_report_file:
151 report_file.close()
152
153 # Trace blocks.
154 if options.root_block is not None:
155 payload.TraceBlock(options.root_block, options.skip, sys.stdout, False)
156 if options.kern_block is not None:
157 payload.TraceBlock(options.kern_block, options.skip, sys.stdout, True)
158
159 # Apply payload.
160 if extra_args:
161 if options.assert_type == _TYPE_FULL:
162 payload.Apply(extra_args[0], extra_args[1])
163 elif options.assert_type == _TYPE_DELTA:
164 payload.Apply(extra_args[0], extra_args[1],
165 src_kernel_part=extra_args[2],
166 src_rootfs_part=extra_args[3])
167 else:
168 assert False, 'cannot get here'
169
170 except update_payload.PayloadError, e:
171 sys.stderr.write('Error: %s\n' % e)
172 return 1
173
174 return 0
175
176
177if __name__ == '__main__':
178 sys.exit(main(sys.argv))