diff options
Diffstat (limited to 'import-layers/yocto-poky/meta/lib/oe/gpg_sign.py')
-rw-r--r-- | import-layers/yocto-poky/meta/lib/oe/gpg_sign.py | 128 |
1 files changed, 0 insertions, 128 deletions
diff --git a/import-layers/yocto-poky/meta/lib/oe/gpg_sign.py b/import-layers/yocto-poky/meta/lib/oe/gpg_sign.py deleted file mode 100644 index b17272928..000000000 --- a/import-layers/yocto-poky/meta/lib/oe/gpg_sign.py +++ /dev/null @@ -1,128 +0,0 @@ -"""Helper module for GPG signing""" -import os - -import bb -import oe.utils - -class LocalSigner(object): - """Class for handling local (on the build host) signing""" - def __init__(self, d): - self.gpg_bin = d.getVar('GPG_BIN') or \ - bb.utils.which(os.getenv('PATH'), 'gpg') - self.gpg_path = d.getVar('GPG_PATH') - self.gpg_version = self.get_gpg_version() - self.rpm_bin = bb.utils.which(os.getenv('PATH'), "rpmsign") - self.gpg_agent_bin = bb.utils.which(os.getenv('PATH'), "gpg-agent") - - def export_pubkey(self, output_file, keyid, armor=True): - """Export GPG public key to a file""" - cmd = '%s --no-permission-warning --batch --yes --export -o %s ' % \ - (self.gpg_bin, output_file) - if self.gpg_path: - cmd += "--homedir %s " % self.gpg_path - if armor: - cmd += "--armor " - cmd += keyid - status, output = oe.utils.getstatusoutput(cmd) - if status: - raise bb.build.FuncFailed('Failed to export gpg public key (%s): %s' % - (keyid, output)) - - def sign_rpms(self, files, keyid, passphrase, digest, sign_chunk, fsk=None, fsk_password=None): - """Sign RPM files""" - - cmd = self.rpm_bin + " --addsign --define '_gpg_name %s' " % keyid - gpg_args = '--no-permission-warning --batch --passphrase=%s --agent-program=%s|--auto-expand-secmem' % (passphrase, self.gpg_agent_bin) - if self.gpg_version > (2,1,): - gpg_args += ' --pinentry-mode=loopback' - cmd += "--define '_gpg_sign_cmd_extra_args %s' " % gpg_args - cmd += "--define '_binary_filedigest_algorithm %s' " % digest - if self.gpg_bin: - cmd += "--define '__gpg %s' " % self.gpg_bin - if self.gpg_path: - cmd += "--define '_gpg_path %s' " % self.gpg_path - if fsk: - cmd += "--signfiles --fskpath %s " % fsk - if fsk_password: - cmd += "--define '_file_signing_key_password %s' " % fsk_password - - # Sign in chunks - for i in range(0, len(files), sign_chunk): - status, output = oe.utils.getstatusoutput(cmd + ' '.join(files[i:i+sign_chunk])) - if status: - raise bb.build.FuncFailed("Failed to sign RPM packages: %s" % output) - - def detach_sign(self, input_file, keyid, passphrase_file, passphrase=None, armor=True): - """Create a detached signature of a file""" - import subprocess - - if passphrase_file and passphrase: - raise Exception("You should use either passphrase_file of passphrase, not both") - - cmd = [self.gpg_bin, '--detach-sign', '--no-permission-warning', '--batch', - '--no-tty', '--yes', '--passphrase-fd', '0', '-u', keyid] - - if self.gpg_path: - cmd += ['--homedir', self.gpg_path] - if armor: - cmd += ['--armor'] - - #gpg > 2.1 supports password pipes only through the loopback interface - #gpg < 2.1 errors out if given unknown parameters - if self.gpg_version > (2,1,): - cmd += ['--pinentry-mode', 'loopback'] - - if self.gpg_agent_bin: - cmd += ["--agent-program=%s|--auto-expand-secmem" % (self.gpg_agent_bin)] - - cmd += [input_file] - - try: - if passphrase_file: - with open(passphrase_file) as fobj: - passphrase = fobj.readline(); - - job = subprocess.Popen(cmd, stdin=subprocess.PIPE, stderr=subprocess.PIPE) - (_, stderr) = job.communicate(passphrase.encode("utf-8")) - - if job.returncode: - raise bb.build.FuncFailed("GPG exited with code %d: %s" % - (job.returncode, stderr.decode("utf-8"))) - - except IOError as e: - bb.error("IO error (%s): %s" % (e.errno, e.strerror)) - raise Exception("Failed to sign '%s'" % input_file) - - except OSError as e: - bb.error("OS error (%s): %s" % (e.errno, e.strerror)) - raise Exception("Failed to sign '%s" % input_file) - - - def get_gpg_version(self): - """Return the gpg version as a tuple of ints""" - import subprocess - try: - ver_str = subprocess.check_output((self.gpg_bin, "--version", "--no-permission-warning")).split()[2].decode("utf-8") - return tuple([int(i) for i in ver_str.split("-")[0].split('.')]) - except subprocess.CalledProcessError as e: - raise bb.build.FuncFailed("Could not get gpg version: %s" % e) - - - def verify(self, sig_file): - """Verify signature""" - cmd = self.gpg_bin + " --verify --no-permission-warning " - if self.gpg_path: - cmd += "--homedir %s " % self.gpg_path - cmd += sig_file - status, _ = oe.utils.getstatusoutput(cmd) - ret = False if status else True - return ret - - -def get_signer(d, backend): - """Get signer object for the specified backend""" - # Use local signing by default - if backend == 'local': - return LocalSigner(d) - else: - bb.fatal("Unsupported signing backend '%s'" % backend) |