releasetools: Support validating Verified Boot images.
For a given (signed) target-files.zip, this CLs allows verifying the Verified Boot related images. It works with both of VB 1.0 and VB 2.0 images. As part of the CL, it also moves validate_target_files.py to argparse, which is more flexible than the traditional getopt module. Also add unittests for the VB 1.0 path. VB 2.0 tests will be added in follow-up CL. Example usage: - Run the script on aosp_bullhead target-files.zip. $ ./build/make/tools/releasetools/validate_target_files.py \ --verity_key build/target/product/security/verity.x509.pem \ --verity_key_mincrypt build/target/product/security/verity_key \ aosp_bullhead-target_files-4522605.zip - Run the script on aosp_walleye target-files.zip. $ ./build/make/tools/releasetools/validate_target_files.py \ --verity_key external/avb/test/data/testkey_rsa4096.pem \ aosp_walleye-target_files-4627254.zip Bug: 63706333 Bug: 65486807 Test: Run validate_target_files.py on target_files.zip files. Test: PYTHONPATH=build/make/tools/releasetools python -m unittest \ test_validate_target_files Change-Id: I170f14d5828d15f3687d8af0a89a816968069057
This commit is contained in:
@@ -17,16 +17,25 @@
|
||||
"""
|
||||
Validate a given (signed) target_files.zip.
|
||||
|
||||
It performs checks to ensure the integrity of the input zip.
|
||||
It performs the following checks to assert the integrity of the input zip.
|
||||
|
||||
- It verifies the file consistency between the ones in IMAGES/system.img (read
|
||||
via IMAGES/system.map) and the ones under unpacked folder of SYSTEM/. The
|
||||
same check also applies to the vendor image if present.
|
||||
|
||||
- It verifies the install-recovery script consistency, by comparing the
|
||||
checksums in the script against the ones of IMAGES/{boot,recovery}.img.
|
||||
|
||||
- It verifies the signed Verified Boot related images, for both of Verified
|
||||
Boot 1.0 and 2.0 (aka AVB).
|
||||
"""
|
||||
|
||||
import argparse
|
||||
import filecmp
|
||||
import logging
|
||||
import os.path
|
||||
import re
|
||||
import sys
|
||||
import subprocess
|
||||
import zipfile
|
||||
|
||||
import common
|
||||
@@ -177,33 +186,152 @@ def ValidateInstallRecoveryScript(input_tmp, info_dict):
|
||||
logging.info('Done checking %s', script_path)
|
||||
|
||||
|
||||
def main(argv):
|
||||
def option_handler():
|
||||
return True
|
||||
def ValidateVerifiedBootImages(input_tmp, info_dict, options):
|
||||
"""Validates the Verified Boot related images.
|
||||
|
||||
args = common.ParseOptions(
|
||||
argv, __doc__, extra_opts="",
|
||||
extra_long_opts=[],
|
||||
extra_option_handler=option_handler)
|
||||
For Verified Boot 1.0, it verifies the signatures of the bootable images
|
||||
(boot/recovery etc), as well as the dm-verity metadata in system images
|
||||
(system/vendor/product). For Verified Boot 2.0, it calls avbtool to verify
|
||||
vbmeta.img, which in turn verifies all the descriptors listed in vbmeta.
|
||||
|
||||
if len(args) != 1:
|
||||
common.Usage(__doc__)
|
||||
sys.exit(1)
|
||||
Args:
|
||||
input_tmp: The top-level directory of unpacked target-files.zip.
|
||||
info_dict: The loaded info dict.
|
||||
options: A dict that contains the user-supplied public keys to be used for
|
||||
image verification. In particular, 'verity_key' is used to verify the
|
||||
bootable images in VB 1.0, and the vbmeta image in VB 2.0, where
|
||||
applicable. 'verity_key_mincrypt' will be used to verify the system
|
||||
images in VB 1.0.
|
||||
|
||||
Raises:
|
||||
AssertionError: On any verification failure.
|
||||
"""
|
||||
# Verified boot 1.0 (images signed with boot_signer and verity_signer).
|
||||
if info_dict.get('boot_signer') == 'true':
|
||||
logging.info('Verifying Verified Boot images...')
|
||||
|
||||
# Verify the boot/recovery images (signed with boot_signer), against the
|
||||
# given X.509 encoded pubkey (or falling back to the one in the info_dict if
|
||||
# none given).
|
||||
verity_key = options['verity_key']
|
||||
if verity_key is None:
|
||||
verity_key = info_dict['verity_key'] + '.x509.pem'
|
||||
for image in ('boot.img', 'recovery.img', 'recovery-two-step.img'):
|
||||
image_path = os.path.join(input_tmp, 'IMAGES', image)
|
||||
if not os.path.exists(image_path):
|
||||
continue
|
||||
|
||||
cmd = ['boot_signer', '-verify', image_path, '-certificate', verity_key]
|
||||
proc = common.Run(cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
||||
stdoutdata, _ = proc.communicate()
|
||||
assert proc.returncode == 0, \
|
||||
'Failed to verify {} with boot_signer:\n{}'.format(image, stdoutdata)
|
||||
logging.info(
|
||||
'Verified %s with boot_signer (key: %s):\n%s', image, verity_key,
|
||||
stdoutdata.rstrip())
|
||||
|
||||
# Verify verity signed system images in Verified Boot 1.0. Note that not using
|
||||
# 'elif' here, since 'boot_signer' and 'verity' are not bundled in VB 1.0.
|
||||
if info_dict.get('verity') == 'true':
|
||||
# First verify that the verity key that's built into the root image (as
|
||||
# /verity_key) matches the one given via command line, if any.
|
||||
if info_dict.get("system_root_image") == "true":
|
||||
verity_key_mincrypt = os.path.join(input_tmp, 'ROOT', 'verity_key')
|
||||
else:
|
||||
verity_key_mincrypt = os.path.join(
|
||||
input_tmp, 'BOOT', 'RAMDISK', 'verity_key')
|
||||
assert os.path.exists(verity_key_mincrypt), 'Missing verity_key'
|
||||
|
||||
if options['verity_key_mincrypt'] is None:
|
||||
logging.warn(
|
||||
'Skipped checking the content of /verity_key, as the key file not '
|
||||
'provided. Use --verity_key_mincrypt to specify.')
|
||||
else:
|
||||
expected_key = options['verity_key_mincrypt']
|
||||
assert filecmp.cmp(expected_key, verity_key_mincrypt, shallow=False), \
|
||||
"Mismatching mincrypt verity key files"
|
||||
logging.info('Verified the content of /verity_key')
|
||||
|
||||
# Then verify the verity signed system/vendor/product images, against the
|
||||
# verity pubkey in mincrypt format.
|
||||
for image in ('system.img', 'vendor.img', 'product.img'):
|
||||
image_path = os.path.join(input_tmp, 'IMAGES', image)
|
||||
|
||||
# We are not checking if the image is actually enabled via info_dict (e.g.
|
||||
# 'system_verity_block_device=...'). Because it's most likely a bug that
|
||||
# skips signing some of the images in signed target-files.zip, while
|
||||
# having the top-level verity flag enabled.
|
||||
if not os.path.exists(image_path):
|
||||
continue
|
||||
|
||||
cmd = ['verity_verifier', image_path, '-mincrypt', verity_key_mincrypt]
|
||||
proc = common.Run(cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
||||
stdoutdata, _ = proc.communicate()
|
||||
assert proc.returncode == 0, \
|
||||
'Failed to verify {} with verity_verifier (key: {}):\n{}'.format(
|
||||
image, verity_key_mincrypt, stdoutdata)
|
||||
logging.info(
|
||||
'Verified %s with verity_verifier (key: %s):\n%s', image,
|
||||
verity_key_mincrypt, stdoutdata.rstrip())
|
||||
|
||||
# Handle the case of Verified Boot 2.0 (AVB).
|
||||
if info_dict.get("avb_enable") == "true":
|
||||
logging.info('Verifying Verified Boot 2.0 (AVB) images...')
|
||||
|
||||
key = options['verity_key']
|
||||
if key is None:
|
||||
key = info_dict['avb_vbmeta_key_path']
|
||||
# avbtool verifies all the images that have descriptors listed in vbmeta.
|
||||
image = os.path.join(input_tmp, 'IMAGES', 'vbmeta.img')
|
||||
cmd = ['avbtool', 'verify_image', '--image', image, '--key', key]
|
||||
proc = common.Run(cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
|
||||
stdoutdata, _ = proc.communicate()
|
||||
assert proc.returncode == 0, \
|
||||
'Failed to verify {} with verity_verifier (key: {}):\n{}'.format(
|
||||
image, key, stdoutdata)
|
||||
|
||||
logging.info(
|
||||
'Verified %s with avbtool (key: %s):\n%s', image, key,
|
||||
stdoutdata.rstrip())
|
||||
|
||||
|
||||
def main():
|
||||
parser = argparse.ArgumentParser(
|
||||
description=__doc__,
|
||||
formatter_class=argparse.RawDescriptionHelpFormatter)
|
||||
parser.add_argument(
|
||||
'target_files',
|
||||
help='the input target_files.zip to be validated')
|
||||
parser.add_argument(
|
||||
'--verity_key',
|
||||
help='the verity public key to verify the bootable images (Verified '
|
||||
'Boot 1.0), or the vbmeta image (Verified Boot 2.0), where '
|
||||
'applicable')
|
||||
parser.add_argument(
|
||||
'--verity_key_mincrypt',
|
||||
help='the verity public key in mincrypt format to verify the system '
|
||||
'images, if target using Verified Boot 1.0')
|
||||
args = parser.parse_args()
|
||||
|
||||
# Unprovided args will have 'None' as the value.
|
||||
options = vars(args)
|
||||
|
||||
logging_format = '%(asctime)s - %(filename)s - %(levelname)-8s: %(message)s'
|
||||
date_format = '%Y/%m/%d %H:%M:%S'
|
||||
logging.basicConfig(level=logging.INFO, format=logging_format,
|
||||
datefmt=date_format)
|
||||
|
||||
logging.info("Unzipping the input target_files.zip: %s", args[0])
|
||||
input_tmp = common.UnzipTemp(args[0])
|
||||
logging.info("Unzipping the input target_files.zip: %s", args.target_files)
|
||||
input_tmp = common.UnzipTemp(args.target_files)
|
||||
|
||||
with zipfile.ZipFile(args[0], 'r') as input_zip:
|
||||
with zipfile.ZipFile(args.target_files, 'r') as input_zip:
|
||||
ValidateFileConsistency(input_zip, input_tmp)
|
||||
|
||||
info_dict = common.LoadInfoDict(input_tmp)
|
||||
ValidateInstallRecoveryScript(input_tmp, info_dict)
|
||||
|
||||
ValidateVerifiedBootImages(input_tmp, info_dict, options)
|
||||
|
||||
# TODO: Check if the OTA keys have been properly updated (the ones on /system,
|
||||
# in recovery image).
|
||||
|
||||
@@ -212,6 +340,6 @@ def main(argv):
|
||||
|
||||
if __name__ == '__main__':
|
||||
try:
|
||||
main(sys.argv[1:])
|
||||
main()
|
||||
finally:
|
||||
common.Cleanup()
|
||||
|
Reference in New Issue
Block a user