paycheck.py revision d013028f4c07bec6db9563a04b14d465c3c06b05
1#!/usr/bin/python
2#
3# Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
4# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
7"""Command-line tool for checking and applying Chrome OS update payloads."""
8
9import optparse
10import os
11import sys
12
13# pylint: disable=F0401
14lib_dir = os.path.join(os.path.dirname(__file__), 'lib')
15if os.path.exists(lib_dir) and os.path.isdir(lib_dir):
16  sys.path.insert(1, lib_dir)
17import update_payload
18
19
20# The default sizes of partitions, based on current partitioning practice.
21_DEFAULT_ROOTFS_PART_SIZE = 2 * 1024 * 1024 * 1024
22_DEFAULT_KERNEL_PART_SIZE = 16 * 1024 * 1024
23
24_TYPE_FULL = 'full'
25_TYPE_DELTA = 'delta'
26
27
28def ParseArguments(argv):
29  """Parse and validate command-line arguments.
30
31  Args:
32    argv: command-line arguments to parse (excluding the program name)
33  Returns:
34    A tuple (opts, payload, extra_args), where `opts' are the options
35    returned by the parser, `payload' is the name of the payload file
36    (mandatory argument) and `extra_args' are any additional command-line
37    arguments.
38
39  """
40  parser = optparse.OptionParser(
41      usage=('Usage: %prog [OPTION...] PAYLOAD [DST_KERN DST_ROOT '
42             '[SRC_KERN SRC_ROOT]]'),
43      description=('Applies a Chrome OS update PAYLOAD to SRC_KERN and '
44                   'SRC_ROOT emitting DST_KERN and DST_ROOT, respectively. '
45                   'SRC_KERN and SRC_ROOT are only needed for delta payloads. '
46                   'When no partitions are provided, verifies the payload '
47                   'integrity.'),
48      epilog=('Note: a payload may verify correctly but fail to apply, and '
49              'vice versa; this is by design and can be thought of as static '
50              'vs dynamic correctness. A payload that both verifies and '
51              'applies correctly should be safe for use by the Chrome OS '
52              'Update Engine. Use --check to verify a payload prior to '
53              'applying it.'))
54
55  default_key = os.path.join(lib_dir,
56                             'update_payload/update-payload-key.pub.pem')
57
58  check_opts = optparse.OptionGroup(parser, 'Payload integrity checking')
59  check_opts.add_option('-c', '--check', action='store_true', default=False,
60                        help=('force payload integrity check (e.g. before '
61                              'applying)'))
62  check_opts.add_option('-r', '--report', metavar='FILE',
63                        help="dump payload report (`-' for stdout)")
64  check_opts.add_option('-t', '--type', metavar='TYPE', dest='assert_type',
65                        help=("assert that payload is either `%s' or `%s'" %
66                              (_TYPE_FULL, _TYPE_DELTA)))
67  check_opts.add_option('-z', '--block-size', metavar='NUM', default=0,
68                        type='int',
69                        help='assert a non-default (4096) payload block size')
70  check_opts.add_option('-u', '--allow-unhashed', action='store_true',
71                        default=False, help='allow unhashed operations')
72  check_opts.add_option('-d', '--disabled_tests', metavar='TESTLIST',
73                        default=(),
74                        help=('comma-separated list of tests to disable; '
75                              'available values: ' +
76                              ', '.join(update_payload.CHECKS_TO_DISABLE)))
77  check_opts.add_option('-k', '--key', metavar='FILE', default=default_key,
78                        help=('Override standard key used for signature '
79                              'validation'))
80  check_opts.add_option('-m', '--meta-sig', metavar='FILE',
81                        help='verify metadata against its signature')
82  check_opts.add_option('-p', '--root-part-size', metavar='NUM',
83                        default=_DEFAULT_ROOTFS_PART_SIZE, type='int',
84                        help=('override default (%default) rootfs partition '
85                              'size'))
86  check_opts.add_option('-P', '--kern-part-size', metavar='NUM',
87                        default=_DEFAULT_KERNEL_PART_SIZE, type='int',
88                        help=('override default (%default) kernel partition '
89                              'size'))
90
91  parser.add_option_group(check_opts)
92
93  trace_opts = optparse.OptionGroup(parser, 'Block tracing')
94  trace_opts.add_option('-b', '--root-block', metavar='BLOCK', type='int',
95                        help='trace the origin for a rootfs block')
96  trace_opts.add_option('-B', '--kern-block', metavar='BLOCK', type='int',
97                        help='trace the origin for a kernel block')
98  trace_opts.add_option('-s', '--skip', metavar='NUM', default='0', type='int',
99                        help='skip first NUM occurrences of traced block')
100  parser.add_option_group(trace_opts)
101
102  # Parse command-line arguments.
103  opts, args = parser.parse_args(argv)
104
105  # Validate a value given to --type, if any.
106  if opts.assert_type not in (None, _TYPE_FULL, _TYPE_DELTA):
107    parser.error('invalid argument to --type: %s' % opts.assert_type)
108
109  # Convert and validate --disabled_tests value list, if provided.
110  if opts.disabled_tests:
111    opts.disabled_tests = opts.disabled_tests.split(',')
112    for test in opts.disabled_tests:
113      if test not in update_payload.CHECKS_TO_DISABLE:
114        parser.error('invalid argument to --disabled_tests: %s' % test)
115
116  # Ensure consistent use of block tracing options.
117  do_block_trace = opts.root_block or opts.kern_block
118  if opts.skip and not do_block_trace:
119    parser.error('--skip must be used with either --root-block or --kern-block')
120
121  # There are several options that imply --check.
122  opts.check = (opts.check or opts.report or opts.assert_type or
123                opts.block_size or opts.allow_unhashed or
124                opts.disabled_tests or opts.meta_sig or
125                opts.key != default_key or
126                opts.root_part_size != _DEFAULT_ROOTFS_PART_SIZE or
127                opts.kern_part_size != _DEFAULT_KERNEL_PART_SIZE)
128
129  # Check number of arguments, enforce payload type accordingly.
130  if len(args) == 3:
131    if opts.assert_type == _TYPE_DELTA:
132      parser.error('%s payload requires source partition arguments' %
133                   _TYPE_DELTA)
134    opts.assert_type = _TYPE_FULL
135  elif len(args) == 5:
136    if opts.assert_type == _TYPE_FULL:
137      parser.error('%s payload does not accept source partition arguments' %
138                   _TYPE_FULL)
139    opts.assert_type = _TYPE_DELTA
140  elif len(args) == 1:
141    # Not applying payload; if block tracing not requested either, do an
142    # integrity check.
143    if not do_block_trace:
144      opts.check = True
145  else:
146    parser.error('unexpected number of arguments')
147
148  # By default, look for a metadata-signature file with a name based on the name
149  # of the payload we are checking. We only do it when check is triggered and a
150  # public key provided, so as not to force a metadata signature to fail.
151  if opts.check and opts.key and not opts.meta_sig:
152    default_meta_sig = args[0] + '.metadata-signature'
153    if os.path.isfile(default_meta_sig):
154      opts.meta_sig = default_meta_sig
155      print >> sys.stderr, 'Using default metadata signature', opts.meta_sig
156
157  return opts, args[0], args[1:]
158
159
160def main(argv):
161  # Parse and validate arguments.
162  options, payload_file_name, extra_args = ParseArguments(argv[1:])
163
164  with open(payload_file_name) as payload_file:
165    payload = update_payload.Payload(payload_file)
166    try:
167      # Initialize payload.
168      payload.Init()
169
170      # Perform payload integrity checks.
171      if options.check:
172        report_file = None
173        do_close_report_file = False
174        try:
175          if options.report:
176            if options.report == '-':
177              report_file = sys.stdout
178            else:
179              report_file = open(options.report, 'w')
180              do_close_report_file = True
181
182          metadata_sig_file = (
183              open(options.meta_sig) if options.meta_sig else None)
184          payload.Check(
185              pubkey_file_name=options.key,
186              metadata_sig_file=metadata_sig_file,
187              report_out_file=report_file,
188              assert_type=options.assert_type,
189              block_size=int(options.block_size),
190              rootfs_part_size=options.root_part_size,
191              kernel_part_size=options.kern_part_size,
192              allow_unhashed=options.allow_unhashed,
193              disabled_tests=options.disabled_tests)
194        finally:
195          if do_close_report_file:
196            report_file.close()
197
198      # Trace blocks.
199      if options.root_block is not None:
200        payload.TraceBlock(options.root_block, options.skip, sys.stdout, False)
201      if options.kern_block is not None:
202        payload.TraceBlock(options.kern_block, options.skip, sys.stdout, True)
203
204      # Apply payload.
205      if extra_args:
206        if options.assert_type == _TYPE_FULL:
207          payload.Apply(extra_args[0], extra_args[1])
208        elif options.assert_type == _TYPE_DELTA:
209          payload.Apply(extra_args[0], extra_args[1],
210                        src_kernel_part=extra_args[2],
211                        src_rootfs_part=extra_args[3])
212        else:
213          assert False, 'cannot get here'
214
215    except update_payload.PayloadError, e:
216      sys.stderr.write('Error: %s\n' % e)
217      return 1
218
219  return 0
220
221
222if __name__ == '__main__':
223  sys.exit(main(sys.argv))
224