sbsigntool: rewrite post-install kernel hook

* run the hook on target filesystem
* Use ls | awk to check ownership and permission, instead of relying on
  GNU-stat.
* libify signing code, in order to support uefi bundle in the future
* Stop append signature to the efi signed by current key/cert.

While we're at it,
* add post-remove script to remove unsigned file if exist

Closes #23688.
Closes #24079.
This commit is contained in:
Đoàn Trần Công Danh 2020-07-21 00:03:15 +07:00 committed by Andrew J. Hesford
parent 38da25370b
commit dd7218664c
3 changed files with 53 additions and 30 deletions

View file

@ -9,7 +9,35 @@ PKGNAME="$1"
VERSION="$2"
msg() {
echo "EFI sbsign hook: $1"
echo "sbsigntool: $1"
}
do_sign() {
_kernel="$1"
if [ ! -f "$_kernel" ]; then
msg "$_kernel not found"
return 1
fi
# Ignore efi file signed with this key
if usr/bin/sbverify -c "$ROOTDIR/$EFI_CERT_FILE" "$_kernel" >/dev/null 2>&1; then
return 0
fi
if ! usr/bin/sbsign ${EFI_SIGN_ENGINE:+"--engine=$EFI_SIGN_ENGINE"} \
-k "$ROOTDIR/$EFI_KEY_FILE" -c "$ROOTDIR/$EFI_CERT_FILE" \
"$_kernel"
then
msg "failed to sign $_kernel"
return 1
fi
if ! usr/bin/sbverify -c "$ROOTDIR/$EFI_CERT_FILE" "$_kernel.signed"; then
msg "failed to verify the signature"
return 1
fi
if [ "x${EFI_KEEP_UNSIGNED}" = "x1" ]; then
mv -f "$_kernel" "$_kernel.unsigned"
fi
mv -f "$_kernel.signed" "$_kernel"
}
. "${ROOTDIR}/etc/default/sbsigntool-kernel-hook"
@ -17,38 +45,18 @@ if [ "x${SBSIGN_EFI_KERNEL}" != x1 ]; then
exit 0
fi
if [ ! -f "${EFI_KEY_FILE}" ] || [ ! -f "${EFI_CERT_FILE}" ]; then
if [ ! -f "$ROOTDIR/$EFI_KEY_FILE" ] || [ ! -f "$ROOTDIR/$EFI_CERT_FILE" ]; then
msg "key and/or certificate is not available"
exit 1
fi
key_stat=$(stat --dereference --format="%a %u" "${EFI_KEY_FILE}")
# check if go=00 owner=0
if [ "${key_stat}" = "${key_stat%00 0}" ]; then
msg "Please chown root:root '${EFI_KEY_FILE}'"
msg "and chmod go-rwx '${EFI_KEY_FILE}'"
# All POSIX comformance ls should work
if ! ls -Ll "$ROOTDIR/$EFI_KEY_FILE" "$ROOTDIR/$EFI_CERT_FILE" |
awk '$1 !~ /^-...------$/ || $3 != "root" { exit 1 }'
then
msg "$EFI_KEY_FILE and $EFI_CERT_FILE must be owned by root."
msg "and not readable by other users."
exit 1
fi
# this part is completely untested
options=""
if [ "x${EFI_SIGN_ENGINE}" != x ]; then
options="--engine=${EFI_SIGN_ENGINE}"
fi
if ! sbsign $options -k "${EFI_KEY_FILE}" -c "${EFI_CERT_FILE}" \
"/boot/vmlinuz-${VERSION}"; then
msg "failed to sign kernel"
exit 1
fi
if ! sbverify -c "${EFI_CERT_FILE}" "/boot/vmlinuz-${VERSION}.signed"; then
msg "failed to verify the signature"
exit 1
fi
if [ "x${EFI_KEEP_UNSIGNED}" = "x1" ]; then
mv -f "/boot/vmlinuz-${VERSION}" "/boot/vmlinuz-${VERSION}.unsigned"
fi
mv -f "/boot/vmlinuz-${VERSION}.signed" "/boot/vmlinuz-${VERSION}"
do_sign "boot/vmlinuz-$VERSION"

View file

@ -0,0 +1,13 @@
#!/bin/sh
#
# Kernel hook for sbsigntool.
#
# Arguments passed to this script: $1 pkgname, $2 version.
#
PKGNAME="$1"
VERSION="$2"
if [ -f "boot/vmlinuz-$VERSION.unsigned" ]; then
rm -f "boot/vmlinuz-${VERSION}.unsigned"
fi

View file

@ -1,7 +1,7 @@
# Template file for 'sbsigntool'
pkgname=sbsigntool
version=0.9.4
revision=2
revision=3
archs="x86_64* i686* aarch64* arm*"
wrksrc=sbsigntools-$version
build_style=gnu-configure
@ -59,4 +59,6 @@ post_install() {
# and I'm not sure about their interaction
vinstall ${FILESDIR}/kernel.d/sbsigntool.post-install 744 \
etc/kernel.d/post-install 40-sbsigntool
vinstall ${FILESDIR}/kernel.d/sbsigntool.post-remove 744 \
etc/kernel.d/post-remove 40-sbsigntool
}