2009-04-02 19:14:19 +00:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
|
|
|
# Copyright (C) 2008 The Android Open Source Project
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
|
|
|
|
|
|
|
"""
|
|
|
|
Signs all the APK files in a target-files zipfile, producing a new
|
|
|
|
target-files zip.
|
|
|
|
|
|
|
|
Usage: sign_target_files_apks [flags] input_target_files output_target_files
|
|
|
|
|
|
|
|
-s (--signapk_jar) <path>
|
|
|
|
Path of the signapks.jar file used to sign an individual APK
|
|
|
|
file.
|
|
|
|
|
|
|
|
-e (--extra_apks) <name,name,...=key>
|
|
|
|
Add extra APK name/key pairs as though they appeared in
|
2009-04-14 19:34:27 +00:00
|
|
|
apkcerts.txt (so mappings specified by -k and -d are applied).
|
|
|
|
Keys specified in -e override any value for that app contained
|
|
|
|
in the apkcerts.txt file. Option may be repeated to give
|
|
|
|
multiple extra packages.
|
2009-04-02 19:14:19 +00:00
|
|
|
|
|
|
|
-k (--key_mapping) <src_key=dest_key>
|
|
|
|
Add a mapping from the key name as specified in apkcerts.txt (the
|
|
|
|
src_key) to the real key you wish to sign the package with
|
|
|
|
(dest_key). Option may be repeated to give multiple key
|
|
|
|
mappings.
|
|
|
|
|
|
|
|
-d (--default_key_mappings) <dir>
|
|
|
|
Set up the following key mappings:
|
|
|
|
|
|
|
|
build/target/product/security/testkey ==> $dir/releasekey
|
|
|
|
build/target/product/security/media ==> $dir/media
|
|
|
|
build/target/product/security/shared ==> $dir/shared
|
|
|
|
build/target/product/security/platform ==> $dir/platform
|
|
|
|
|
|
|
|
-d and -k options are added to the set of mappings in the order
|
|
|
|
in which they appear on the command line.
|
2009-04-06 22:21:45 +00:00
|
|
|
|
|
|
|
-o (--replace_ota_keys)
|
|
|
|
Replace the certificate (public key) used by OTA package
|
|
|
|
verification with the one specified in the input target_files
|
|
|
|
zip (in the META/otakeys.txt file). Key remapping (-k and -d)
|
|
|
|
is performed on this key.
|
2009-04-17 17:15:58 +00:00
|
|
|
|
|
|
|
-t (--extra_tag) <tag>
|
|
|
|
A string which is added to the set of tags in the last component
|
|
|
|
of the build fingerprint. Option may be repeated to give
|
|
|
|
multiple extra tags.
|
2009-04-02 19:14:19 +00:00
|
|
|
"""
|
|
|
|
|
|
|
|
import sys
|
|
|
|
|
|
|
|
if sys.hexversion < 0x02040000:
|
|
|
|
print >> sys.stderr, "Python 2.4 or newer is required."
|
|
|
|
sys.exit(1)
|
|
|
|
|
2009-04-06 22:21:45 +00:00
|
|
|
import cStringIO
|
|
|
|
import copy
|
2009-04-02 19:14:19 +00:00
|
|
|
import os
|
|
|
|
import re
|
|
|
|
import subprocess
|
|
|
|
import tempfile
|
|
|
|
import zipfile
|
|
|
|
|
|
|
|
import common
|
|
|
|
|
|
|
|
OPTIONS = common.OPTIONS
|
|
|
|
|
|
|
|
OPTIONS.extra_apks = {}
|
|
|
|
OPTIONS.key_map = {}
|
2009-04-06 22:21:45 +00:00
|
|
|
OPTIONS.replace_ota_keys = False
|
2009-04-17 17:15:58 +00:00
|
|
|
OPTIONS.extra_tags = []
|
2009-04-02 19:14:19 +00:00
|
|
|
|
|
|
|
def GetApkCerts(tf_zip):
|
2009-04-14 19:34:27 +00:00
|
|
|
certmap = {}
|
2009-04-02 19:14:19 +00:00
|
|
|
for line in tf_zip.read("META/apkcerts.txt").split("\n"):
|
|
|
|
line = line.strip()
|
|
|
|
if not line: continue
|
|
|
|
m = re.match(r'^name="(.*)"\s+certificate="(.*)\.x509\.pem"\s+'
|
|
|
|
r'private_key="\2\.pk8"$', line)
|
|
|
|
if not m:
|
|
|
|
raise SigningError("failed to parse line from apkcerts.txt:\n" + line)
|
|
|
|
certmap[m.group(1)] = OPTIONS.key_map.get(m.group(2), m.group(2))
|
2009-04-14 19:34:27 +00:00
|
|
|
for apk, cert in OPTIONS.extra_apks.iteritems():
|
|
|
|
certmap[apk] = OPTIONS.key_map.get(cert, cert)
|
2009-04-02 19:14:19 +00:00
|
|
|
return certmap
|
|
|
|
|
|
|
|
|
|
|
|
def SignApk(data, keyname, pw):
|
|
|
|
unsigned = tempfile.NamedTemporaryFile()
|
|
|
|
unsigned.write(data)
|
|
|
|
unsigned.flush()
|
|
|
|
|
|
|
|
signed = tempfile.NamedTemporaryFile()
|
|
|
|
|
|
|
|
common.SignFile(unsigned.name, signed.name, keyname, pw, align=4)
|
|
|
|
|
|
|
|
data = signed.read()
|
|
|
|
unsigned.close()
|
|
|
|
signed.close()
|
|
|
|
|
|
|
|
return data
|
|
|
|
|
|
|
|
|
|
|
|
def SignApks(input_tf_zip, output_tf_zip):
|
|
|
|
apk_key_map = GetApkCerts(input_tf_zip)
|
|
|
|
|
|
|
|
maxsize = max([len(os.path.basename(i.filename))
|
|
|
|
for i in input_tf_zip.infolist()
|
|
|
|
if i.filename.endswith('.apk')])
|
|
|
|
|
2009-04-14 21:05:15 +00:00
|
|
|
# Check that all the APKs we want to sign have keys specified, and
|
|
|
|
# error out if they don't. Do this before prompting for key
|
|
|
|
# passwords in case we're going to fail anyway.
|
|
|
|
unknown_apks = []
|
|
|
|
for info in input_tf_zip.infolist():
|
|
|
|
if info.filename.endswith(".apk"):
|
|
|
|
name = os.path.basename(info.filename)
|
|
|
|
if name not in apk_key_map:
|
|
|
|
unknown_apks.append(name)
|
|
|
|
if unknown_apks:
|
|
|
|
print "ERROR: no key specified for:\n\n ",
|
|
|
|
print "\n ".join(unknown_apks)
|
|
|
|
print "\nUse '-e <apkname>=' to specify a key (which may be an"
|
|
|
|
print "empty string to not sign this apk)."
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
key_passwords = common.GetKeyPasswords(set(apk_key_map.values()))
|
|
|
|
|
2009-04-02 19:14:19 +00:00
|
|
|
for info in input_tf_zip.infolist():
|
|
|
|
data = input_tf_zip.read(info.filename)
|
2009-04-06 22:21:45 +00:00
|
|
|
out_info = copy.copy(info)
|
2009-04-02 19:14:19 +00:00
|
|
|
if info.filename.endswith(".apk"):
|
|
|
|
name = os.path.basename(info.filename)
|
2009-04-14 21:05:15 +00:00
|
|
|
key = apk_key_map[name]
|
|
|
|
if key:
|
|
|
|
print " signing: %-*s (%s)" % (maxsize, name, key)
|
2009-04-02 19:14:19 +00:00
|
|
|
signed_data = SignApk(data, key, key_passwords[key])
|
2009-04-06 22:21:45 +00:00
|
|
|
output_tf_zip.writestr(out_info, signed_data)
|
2009-04-02 19:14:19 +00:00
|
|
|
else:
|
|
|
|
# an APK we're not supposed to sign.
|
2009-04-14 21:05:15 +00:00
|
|
|
print "NOT signing: %s" % (name,)
|
2009-04-06 22:21:45 +00:00
|
|
|
output_tf_zip.writestr(out_info, data)
|
|
|
|
elif info.filename in ("SYSTEM/build.prop",
|
|
|
|
"RECOVERY/RAMDISK/default.prop"):
|
2009-04-17 17:15:58 +00:00
|
|
|
print "rewriting %s:" % (info.filename,)
|
|
|
|
new_data = RewriteProps(data)
|
|
|
|
output_tf_zip.writestr(out_info, new_data)
|
2009-04-02 19:14:19 +00:00
|
|
|
else:
|
|
|
|
# a non-APK file; copy it verbatim
|
2009-04-06 22:21:45 +00:00
|
|
|
output_tf_zip.writestr(out_info, data)
|
|
|
|
|
|
|
|
|
2009-04-17 17:15:58 +00:00
|
|
|
def RewriteProps(data):
|
|
|
|
output = []
|
|
|
|
for line in data.split("\n"):
|
|
|
|
line = line.strip()
|
|
|
|
original_line = line
|
|
|
|
if line and line[0] != '#':
|
|
|
|
key, value = line.split("=", 1)
|
|
|
|
if key == "ro.build.fingerprint":
|
|
|
|
pieces = line.split("/")
|
|
|
|
tags = set(pieces[-1].split(","))
|
|
|
|
if "test-keys" in tags:
|
|
|
|
tags.remove("test-keys")
|
|
|
|
tags.add("release-keys")
|
|
|
|
# TODO: from donut onwards, only add ota-rel-keys if -o is given.
|
|
|
|
tags.add("ota-rel-keys")
|
|
|
|
tags.update(OPTIONS.extra_tags)
|
|
|
|
line = "/".join(pieces[:-1] + [",".join(sorted(tags))])
|
|
|
|
elif key == "ro.build.description":
|
|
|
|
pieces = line.split(" ")
|
|
|
|
assert len(pieces) == 5
|
|
|
|
tags = set(pieces[-1].split(","))
|
|
|
|
if "test-keys" in tags:
|
|
|
|
tags.remove("test-keys")
|
|
|
|
tags.add("release-keys")
|
|
|
|
# TODO: from donut onwards, only add ota-rel-keys if -o is given.
|
|
|
|
tags.add("ota-rel-keys")
|
|
|
|
tags.update(OPTIONS.extra_tags)
|
|
|
|
line = " ".join(pieces[:-1] + [",".join(sorted(tags))])
|
|
|
|
if line != original_line:
|
|
|
|
print " replace: ", original_line
|
|
|
|
print " with: ", line
|
|
|
|
output.append(line)
|
|
|
|
return "\n".join(output) + "\n"
|
|
|
|
|
|
|
|
|
2009-04-06 22:21:45 +00:00
|
|
|
def ReplaceOtaKeys(input_tf_zip, output_tf_zip):
|
|
|
|
try:
|
|
|
|
keylist = input_tf_zip.read("META/otakeys.txt").split()
|
|
|
|
except KeyError:
|
|
|
|
raise ExternalError("can't read META/otakeys.txt from input")
|
|
|
|
|
|
|
|
mapped_keys = []
|
|
|
|
for k in keylist:
|
|
|
|
m = re.match(r"^(.*)\.x509\.pem$", k)
|
|
|
|
if not m:
|
|
|
|
raise ExternalError("can't parse \"%s\" from META/otakeys.txt" % (k,))
|
|
|
|
k = m.group(1)
|
|
|
|
mapped_keys.append(OPTIONS.key_map.get(k, k) + ".x509.pem")
|
|
|
|
|
|
|
|
print "using:\n ", "\n ".join(mapped_keys)
|
|
|
|
print "for OTA package verification"
|
|
|
|
|
|
|
|
# recovery uses a version of the key that has been slightly
|
|
|
|
# predigested (by DumpPublicKey.java) and put in res/keys.
|
|
|
|
|
|
|
|
p = common.Run(["java", "-jar", OPTIONS.dumpkey_jar] + mapped_keys,
|
|
|
|
stdout=subprocess.PIPE)
|
|
|
|
data, _ = p.communicate()
|
|
|
|
if p.returncode != 0:
|
|
|
|
raise ExternalError("failed to run dumpkeys")
|
|
|
|
output_tf_zip.writestr("RECOVERY/RAMDISK/res/keys", data)
|
|
|
|
|
|
|
|
# SystemUpdateActivity uses the x509.pem version of the keys, but
|
|
|
|
# put into a zipfile system/etc/security/otacerts.zip.
|
|
|
|
|
|
|
|
tempfile = cStringIO.StringIO()
|
|
|
|
certs_zip = zipfile.ZipFile(tempfile, "w")
|
|
|
|
for k in mapped_keys:
|
|
|
|
certs_zip.write(k)
|
|
|
|
certs_zip.close()
|
|
|
|
output_tf_zip.writestr("SYSTEM/etc/security/otacerts.zip",
|
|
|
|
tempfile.getvalue())
|
2009-04-02 19:14:19 +00:00
|
|
|
|
|
|
|
|
|
|
|
def main(argv):
|
|
|
|
|
|
|
|
def option_handler(o, a):
|
|
|
|
if o in ("-s", "--signapk_jar"):
|
|
|
|
OPTIONS.signapk_jar = a
|
|
|
|
elif o in ("-e", "--extra_apks"):
|
|
|
|
names, key = a.split("=")
|
|
|
|
names = names.split(",")
|
|
|
|
for n in names:
|
|
|
|
OPTIONS.extra_apks[n] = key
|
|
|
|
elif o in ("-d", "--default_key_mappings"):
|
|
|
|
OPTIONS.key_map.update({
|
|
|
|
"build/target/product/security/testkey": "%s/releasekey" % (a,),
|
|
|
|
"build/target/product/security/media": "%s/media" % (a,),
|
|
|
|
"build/target/product/security/shared": "%s/shared" % (a,),
|
|
|
|
"build/target/product/security/platform": "%s/platform" % (a,),
|
|
|
|
})
|
|
|
|
elif o in ("-k", "--key_mapping"):
|
|
|
|
s, d = a.split("=")
|
|
|
|
OPTIONS.key_map[s] = d
|
2009-04-06 22:21:45 +00:00
|
|
|
elif o in ("-o", "--replace_ota_keys"):
|
|
|
|
OPTIONS.replace_ota_keys = True
|
2009-04-17 17:15:58 +00:00
|
|
|
elif o in ("-t", "--extra_tags"):
|
|
|
|
OPTIONS.extra_tags.append(a)
|
2009-04-02 19:14:19 +00:00
|
|
|
else:
|
|
|
|
return False
|
|
|
|
return True
|
|
|
|
|
|
|
|
args = common.ParseOptions(argv, __doc__,
|
2009-04-17 17:15:58 +00:00
|
|
|
extra_opts="s:e:d:k:ot:",
|
2009-04-02 19:14:19 +00:00
|
|
|
extra_long_opts=["signapk_jar=",
|
|
|
|
"extra_apks=",
|
|
|
|
"default_key_mappings=",
|
2009-04-06 22:21:45 +00:00
|
|
|
"key_mapping=",
|
2009-04-17 17:15:58 +00:00
|
|
|
"replace_ota_keys",
|
|
|
|
"extra_tag="],
|
2009-04-02 19:14:19 +00:00
|
|
|
extra_option_handler=option_handler)
|
|
|
|
|
|
|
|
if len(args) != 2:
|
|
|
|
common.Usage(__doc__)
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
input_zip = zipfile.ZipFile(args[0], "r")
|
|
|
|
output_zip = zipfile.ZipFile(args[1], "w")
|
|
|
|
|
|
|
|
SignApks(input_zip, output_zip)
|
|
|
|
|
2009-04-06 22:21:45 +00:00
|
|
|
if OPTIONS.replace_ota_keys:
|
|
|
|
ReplaceOtaKeys(input_zip, output_zip)
|
|
|
|
|
2009-04-02 19:14:19 +00:00
|
|
|
input_zip.close()
|
|
|
|
output_zip.close()
|
|
|
|
|
|
|
|
print "done."
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
try:
|
|
|
|
main(sys.argv[1:])
|
|
|
|
except common.ExternalError, e:
|
|
|
|
print
|
|
|
|
print " ERROR: %s" % (e,)
|
|
|
|
print
|
|
|
|
sys.exit(1)
|