blob: b17272928fc18639988657355e94a9dff7b99844 [file] [log] [blame]
Patrick Williamsd8c66bc2016-06-20 12:57:21 -05001"""Helper module for GPG signing"""
2import os
3
4import bb
5import oe.utils
6
7class LocalSigner(object):
8 """Class for handling local (on the build host) signing"""
9 def __init__(self, d):
Brad Bishop6e60e8b2018-02-01 10:27:11 -050010 self.gpg_bin = d.getVar('GPG_BIN') or \
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050011 bb.utils.which(os.getenv('PATH'), 'gpg')
Brad Bishop6e60e8b2018-02-01 10:27:11 -050012 self.gpg_path = d.getVar('GPG_PATH')
Brad Bishop37a0e4d2017-12-04 01:01:44 -050013 self.gpg_version = self.get_gpg_version()
Brad Bishop6e60e8b2018-02-01 10:27:11 -050014 self.rpm_bin = bb.utils.which(os.getenv('PATH'), "rpmsign")
Brad Bishop316dfdd2018-06-25 12:45:53 -040015 self.gpg_agent_bin = bb.utils.which(os.getenv('PATH'), "gpg-agent")
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050016
17 def export_pubkey(self, output_file, keyid, armor=True):
18 """Export GPG public key to a file"""
Brad Bishopd7bf8c12018-02-25 22:55:05 -050019 cmd = '%s --no-permission-warning --batch --yes --export -o %s ' % \
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050020 (self.gpg_bin, output_file)
21 if self.gpg_path:
22 cmd += "--homedir %s " % self.gpg_path
23 if armor:
24 cmd += "--armor "
25 cmd += keyid
26 status, output = oe.utils.getstatusoutput(cmd)
27 if status:
28 raise bb.build.FuncFailed('Failed to export gpg public key (%s): %s' %
29 (keyid, output))
30
Brad Bishopd7bf8c12018-02-25 22:55:05 -050031 def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None):
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050032 """Sign RPM files"""
33
34 cmd = self.rpm_bin + " --addsign --define '_gpg_name %s' " % keyid
Brad Bishop316dfdd2018-06-25 12:45:53 -040035 gpg_args = '--no-permission-warning --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' % (passphrase, self.gpg_agent_bin)
Brad Bishop37a0e4d2017-12-04 01:01:44 -050036 if self.gpg_version > (2,1,):
Brad Bishop6e60e8b2018-02-01 10:27:11 -050037 gpg_args += ' --pinentry-mode=loopback'
38 cmd += "--define '_gpg_sign_cmd_extra_args %s' " % gpg_args
Brad Bishopd7bf8c12018-02-25 22:55:05 -050039 cmd += "--define '_binary_filedigest_algorithm %s' " % digest
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050040 if self.gpg_bin:
Brad Bishopd7bf8c12018-02-25 22:55:05 -050041 cmd += "--define '__gpg %s' " % self.gpg_bin
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050042 if self.gpg_path:
43 cmd += "--define '_gpg_path %s' " % self.gpg_path
Brad Bishopd7bf8c12018-02-25 22:55:05 -050044 if fsk:
45 cmd += "--signfiles --fskpath %s " % fsk
46 if fsk_password:
47 cmd += "--define '_file_signing_key_password %s' " % fsk_password
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050048
Brad Bishopd7bf8c12018-02-25 22:55:05 -050049 # Sign in chunks
50 for i in range(0, len(files), sign_chunk):
51 status, output = oe.utils.getstatusoutput(cmd + ' '.join(files[i:i+sign_chunk]))
Brad Bishop37a0e4d2017-12-04 01:01:44 -050052 if status:
53 raise bb.build.FuncFailed("Failed to sign RPM packages: %s" % output)
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050054
55 def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True):
56 """Create a detached signature of a file"""
57 import subprocess
58
59 if passphrase_file and passphrase:
60 raise Exception("You should use either passphrase_file of passphrase, not both")
61
Brad Bishopd7bf8c12018-02-25 22:55:05 -050062 cmd = [self.gpg_bin, '--detach-sign', '--no-permission-warning', '--batch',
63 '--no-tty', '--yes', '--passphrase-fd', '0', '-u', keyid]
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050064
65 if self.gpg_path:
66 cmd += ['--homedir', self.gpg_path]
67 if armor:
68 cmd += ['--armor']
69
70 #gpg > 2.1 supports password pipes only through the loopback interface
71 #gpg < 2.1 errors out if given unknown parameters
Brad Bishop37a0e4d2017-12-04 01:01:44 -050072 if self.gpg_version > (2,1,):
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050073 cmd += ['--pinentry-mode', 'loopback']
74
Brad Bishop316dfdd2018-06-25 12:45:53 -040075 if self.gpg_agent_bin:
76 cmd += ["--agent-program=%s|--auto-expand-secmem" % (self.gpg_agent_bin)]
77
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050078 cmd += [input_file]
79
80 try:
81 if passphrase_file:
82 with open(passphrase_file) as fobj:
83 passphrase = fobj.readline();
84
85 job = subprocess.Popen(cmd, stdin=subprocess.PIPE, stderr=subprocess.PIPE)
Patrick Williamsc0f7c042017-02-23 20:41:17 -060086 (_, stderr) = job.communicate(passphrase.encode("utf-8"))
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050087
88 if job.returncode:
89 raise bb.build.FuncFailed("GPG exited with code %d: %s" %
Patrick Williamsc0f7c042017-02-23 20:41:17 -060090 (job.returncode, stderr.decode("utf-8")))
Patrick Williamsd8c66bc2016-06-20 12:57:21 -050091
92 except IOError as e:
93 bb.error("IO error (%s): %s" % (e.errno, e.strerror))
94 raise Exception("Failed to sign '%s'" % input_file)
95
96 except OSError as e:
97 bb.error("OS error (%s): %s" % (e.errno, e.strerror))
98 raise Exception("Failed to sign '%s" % input_file)
99
100
101 def get_gpg_version(self):
Brad Bishop37a0e4d2017-12-04 01:01:44 -0500102 """Return the gpg version as a tuple of ints"""
Patrick Williamsd8c66bc2016-06-20 12:57:21 -0500103 import subprocess
104 try:
Brad Bishopd7bf8c12018-02-25 22:55:05 -0500105 ver_str = subprocess.check_output((self.gpg_bin, "--version", "--no-permission-warning")).split()[2].decode("utf-8")
Brad Bishop316dfdd2018-06-25 12:45:53 -0400106 return tuple([int(i) for i in ver_str.split("-")[0].split('.')])
Patrick Williamsd8c66bc2016-06-20 12:57:21 -0500107 except subprocess.CalledProcessError as e:
108 raise bb.build.FuncFailed("Could not get gpg version: %s" % e)
109
110
111 def verify(self, sig_file):
112 """Verify signature"""
Brad Bishopd7bf8c12018-02-25 22:55:05 -0500113 cmd = self.gpg_bin + " --verify --no-permission-warning "
Patrick Williamsd8c66bc2016-06-20 12:57:21 -0500114 if self.gpg_path:
115 cmd += "--homedir %s " % self.gpg_path
116 cmd += sig_file
117 status, _ = oe.utils.getstatusoutput(cmd)
118 ret = False if status else True
119 return ret
120
121
122def get_signer(d, backend):
123 """Get signer object for the specified backend"""
124 # Use local signing by default
125 if backend == 'local':
126 return LocalSigner(d)
127 else:
128 bb.fatal("Unsupported signing backend '%s'" % backend)