| Left: | ||
| Right: |
| OLD | NEW |
|---|---|
| 1 # This Source Code Form is subject to the terms of the Mozilla Public | 1 # This Source Code Form is subject to the terms of the Mozilla Public |
| 2 # License, v. 2.0. If a copy of the MPL was not distributed with this | 2 # License, v. 2.0. If a copy of the MPL was not distributed with this |
| 3 # file, You can obtain one at http://mozilla.org/MPL/2.0/. | 3 # file, You can obtain one at http://mozilla.org/MPL/2.0/. |
| 4 | 4 |
| 5 import base64 | |
| 6 import ConfigParser | |
| 7 import json | |
| 8 import math | |
| 5 import os | 9 import os |
| 6 import re | 10 import re |
| 7 import json | |
| 8 import ConfigParser | |
| 9 from urlparse import urlparse | 11 from urlparse import urlparse |
| 10 | 12 |
| 11 from packager import readMetadata, getDefaultFileName, getBuildVersion, getTempl ate, Files | 13 from packager import readMetadata, getDefaultFileName, getBuildVersion, getTempl ate, Files |
| 12 from packagerChrome import convertJS, importGeckoLocales, getIgnoredFiles, getPa ckageFiles, defaultLocale, createScriptPage | 14 from packagerChrome import convertJS, importGeckoLocales, getIgnoredFiles, getPa ckageFiles, defaultLocale, createScriptPage |
| 13 | 15 |
| 14 | 16 |
| 15 def processFile(path, data, params): | 17 def processFile(path, data, params): |
| 16 return data | 18 return data |
| 17 | 19 |
| 18 | 20 |
| (...skipping 84 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 103 for filename, content in files.iteritems(): | 105 for filename, content in files.iteritems(): |
| 104 if os.path.splitext(filename)[1].lower() == '.html': | 106 if os.path.splitext(filename)[1].lower() == '.html': |
| 105 files[filename] = re.sub( | 107 files[filename] = re.sub( |
| 106 r'(<[^<>]*?\b(?:href|src)\s*=\s*["\']?)\/+', | 108 r'(<[^<>]*?\b(?:href|src)\s*=\s*["\']?)\/+', |
| 107 r'\1' + '/'.join(['..'] * filename.count('/') + ['']), | 109 r'\1' + '/'.join(['..'] * filename.count('/') + ['']), |
| 108 content, re.S | re.I | 110 content, re.S | re.I |
| 109 ) | 111 ) |
| 110 | 112 |
| 111 | 113 |
| 112 def get_certificates_and_key(keyfile): | 114 def get_certificates_and_key(keyfile): |
| 113 import M2Crypto | 115 from Crypto.PublicKey import RSA |
| 114 | 116 |
| 115 certs = [] | 117 certs = [] |
| 116 bio = M2Crypto.BIO.openfile(keyfile) | 118 with open(keyfile, 'r') as file: |
| 119 data = file.read() | |
| 120 keydata = re.sub(r'(-+END PRIVATE KEY-+).*', r'\1', data, flags=re.S) | |
|
Sebastian Noack
2016/08/16 16:32:05
Is this even necessary? I would expect RSA.importK
Wladimir Palant
2016/08/16 17:06:04
Yes, I would expect that as well. However, I get "
Sebastian Noack
2016/08/17 08:43:07
I just noticed that this code assumes the key to b
Wladimir Palant
2016/08/17 10:03:15
True, PyCrypto seems to be angry about certificate
| |
| 121 key = RSA.importKey(keydata) | |
| 117 | 122 |
| 118 try: | 123 for match in re.finditer(r'-+BEGIN CERTIFICATE-+(.*?)-+END CERTIFICATE-+', d ata, re.S): |
| 119 key = M2Crypto.RSA.load_key_bio(bio) | 124 certs.append(base64.b64decode(match.group(1))) |
| 120 bio.reset() | |
| 121 while True: | |
| 122 try: | |
| 123 certs.append(M2Crypto.X509.load_cert_bio(bio)) | |
| 124 except M2Crypto.X509.X509Error: | |
| 125 break | |
| 126 finally: | |
| 127 bio.close() | |
| 128 | 125 |
| 129 return certs, key | 126 return certs, key |
| 130 | 127 |
| 131 | 128 |
| 132 def get_developer_identifier(certs): | 129 def get_developer_identifier(certs): |
| 130 from Crypto.Util import asn1 | |
| 131 def get_sequence(data): | |
|
Sebastian Noack
2016/08/16 16:32:05
Any reason this is a nested function, and not just
Wladimir Palant
2016/08/16 17:06:04
It isn't exactly a general-purpose function - mere
Sebastian Noack
2016/08/17 08:43:07
It doesn't need to be general-purpose to go on the
Wladimir Palant
2016/08/17 10:03:15
Done.
| |
| 132 sequence = asn1.DerSequence() | |
| 133 sequence.decode(data) | |
| 134 return sequence | |
| 135 | |
| 133 for cert in certs: | 136 for cert in certs: |
| 134 subject = cert.get_subject() | 137 # See https://tools.ietf.org/html/rfc5280#section-4 |
| 135 for entry in subject.get_entries_by_nid(subject.nid['CN']): | 138 tbsCertificate = get_sequence(cert)[0] |
|
Sebastian Noack
2016/08/16 16:32:05
Nit: camel case
Wladimir Palant
2016/08/16 17:06:04
I know. But that's how this field is named in the
Sebastian Noack
2016/08/17 08:43:07
That doesn't seem a reason to me, to violate PEP-8
Wladimir Palant
2016/08/17 10:03:15
Done.
| |
| 136 m = re.match(r'Safari Developer: \((.*?)\)', entry.get_data().as_tex t()) | 139 subject = get_sequence(tbsCertificate)[5] |
| 137 if m: | 140 |
| 138 return m.group(1) | 141 # We could decode the subject but since we have to apply a regular |
| 142 # expression on CN entry anyway we can just skip that. | |
| 143 m = re.search(r'Safari Developer: \((\S*?)\)', subject) | |
| 144 if m: | |
| 145 return m.group(1) | |
| 139 | 146 |
| 140 raise Exception('No Safari developer certificate found in chain') | 147 raise Exception('No Safari developer certificate found in chain') |
| 141 | 148 |
| 142 | 149 |
| 150 def sign_digest(key, digest): | |
| 151 from Crypto.Hash import SHA | |
| 152 from Crypto.Signature import PKCS1_v1_5 | |
| 153 | |
| 154 # xar already calculated the SHA1 digest so we have to fake hashing here. | |
| 155 class FakeHash(SHA.SHA1Hash): | |
| 156 def digest(self): | |
| 157 return digest | |
| 158 | |
| 159 return PKCS1_v1_5.new(key).sign(FakeHash()) | |
| 160 | |
| 161 | |
| 143 def createSignedXarArchive(outFile, files, certs, key): | 162 def createSignedXarArchive(outFile, files, certs, key): |
| 144 import subprocess | 163 import subprocess |
| 145 import tempfile | 164 import tempfile |
| 146 import shutil | 165 import shutil |
| 147 import M2Crypto | |
| 148 | 166 |
| 149 # write files to temporary directory and create a xar archive | 167 # write files to temporary directory and create a xar archive |
| 150 dirname = tempfile.mkdtemp() | 168 dirname = tempfile.mkdtemp() |
| 151 try: | 169 try: |
| 152 for filename, contents in files.iteritems(): | 170 for filename, contents in files.iteritems(): |
| 153 path = os.path.join(dirname, filename) | 171 path = os.path.join(dirname, filename) |
| 154 | 172 |
| 155 try: | 173 try: |
| 156 os.makedirs(os.path.dirname(path)) | 174 os.makedirs(os.path.dirname(path)) |
| 157 except OSError: | 175 except OSError: |
| (...skipping 10 matching lines...) Expand all Loading... | |
| 168 shutil.rmtree(dirname) | 186 shutil.rmtree(dirname) |
| 169 | 187 |
| 170 certificate_filenames = [] | 188 certificate_filenames = [] |
| 171 try: | 189 try: |
| 172 # write each certificate in DER format to a separate | 190 # write each certificate in DER format to a separate |
| 173 # temporary file, that they can be passed to xar | 191 # temporary file, that they can be passed to xar |
| 174 for cert in certs: | 192 for cert in certs: |
| 175 fd, filename = tempfile.mkstemp() | 193 fd, filename = tempfile.mkstemp() |
| 176 try: | 194 try: |
| 177 certificate_filenames.append(filename) | 195 certificate_filenames.append(filename) |
| 178 os.write(fd, cert.as_der()) | 196 os.write(fd, cert) |
| 179 finally: | 197 finally: |
| 180 os.close(fd) | 198 os.close(fd) |
| 181 | 199 |
| 182 # add certificates and placeholder signature | 200 # add certificates and placeholder signature |
| 183 # to the xar archive, and get data to sign | 201 # to the xar archive, and get data to sign |
| 184 fd, digestinfo_filename = tempfile.mkstemp() | 202 fd, digest_filename = tempfile.mkstemp() |
| 185 os.close(fd) | 203 os.close(fd) |
| 186 try: | 204 try: |
| 187 subprocess.check_call( | 205 subprocess.check_call( |
| 188 [ | 206 [ |
| 189 'xar', '--sign', '-f', outFile, | 207 'xar', '--sign', '-f', outFile, |
| 190 '--digestinfo-to-sign', digestinfo_filename, | 208 '--data-to-sign', digest_filename, |
|
Wladimir Palant
2016/08/16 15:12:08
For reference: despite the misleading name, --data
Wladimir Palant
2016/08/16 15:37:38
Actually, I finally realized what's going on there
| |
| 191 '--sig-size', str(len(key.private_encrypt('', M2Crypto.RSA.p kcs1_padding))) | 209 '--sig-size', str(len(sign_digest(key, ''))) |
| 192 ] + [ | 210 ] + [ |
| 193 arg for cert in certificate_filenames for arg in ('--cert-lo c', cert) | 211 arg for cert in certificate_filenames for arg in ('--cert-lo c', cert) |
| 194 ] | 212 ] |
| 195 ) | 213 ) |
| 196 | 214 |
| 197 with open(digestinfo_filename, 'rb') as file: | 215 with open(digest_filename, 'rb') as file: |
| 198 digestinfo = file.read() | 216 digest = file.read() |
| 199 finally: | 217 finally: |
| 200 os.unlink(digestinfo_filename) | 218 os.unlink(digest_filename) |
| 201 finally: | 219 finally: |
| 202 for filename in certificate_filenames: | 220 for filename in certificate_filenames: |
| 203 os.unlink(filename) | 221 os.unlink(filename) |
| 204 | 222 |
| 205 # sign data and inject signature into xar archive | 223 # sign data and inject signature into xar archive |
| 206 fd, signature_filename = tempfile.mkstemp() | 224 fd, signature_filename = tempfile.mkstemp() |
| 207 try: | 225 try: |
| 208 try: | 226 try: |
| 209 os.write(fd, key.private_encrypt( | 227 os.write(fd, sign_digest(key, digest)) |
| 210 digestinfo, | |
| 211 M2Crypto.RSA.pkcs1_padding | |
| 212 )) | |
| 213 finally: | 228 finally: |
| 214 os.close(fd) | 229 os.close(fd) |
| 215 | 230 |
| 216 subprocess.check_call(['xar', '--inject-sig', signature_filename, '-f', outFile]) | 231 subprocess.check_call(['xar', '--inject-sig', signature_filename, '-f', outFile]) |
| 217 finally: | 232 finally: |
| 218 os.unlink(signature_filename) | 233 os.unlink(signature_filename) |
| 219 | 234 |
| 220 | 235 |
| 221 def createBuild(baseDir, type, outFile=None, buildNum=None, releaseBuild=False, keyFile=None, devenv=False): | 236 def createBuild(baseDir, type, outFile=None, buildNum=None, releaseBuild=False, keyFile=None, devenv=False): |
| 222 metadata = readMetadata(baseDir, type) | 237 metadata = readMetadata(baseDir, type) |
| (...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 268 fixAbsoluteUrls(files) | 283 fixAbsoluteUrls(files) |
| 269 | 284 |
| 270 dirname = metadata.get('general', 'basename') + '.safariextension' | 285 dirname = metadata.get('general', 'basename') + '.safariextension' |
| 271 for filename in files.keys(): | 286 for filename in files.keys(): |
| 272 files[os.path.join(dirname, filename)] = files.pop(filename) | 287 files[os.path.join(dirname, filename)] = files.pop(filename) |
| 273 | 288 |
| 274 if not devenv and keyFile: | 289 if not devenv and keyFile: |
| 275 createSignedXarArchive(outFile, files, certs, key) | 290 createSignedXarArchive(outFile, files, certs, key) |
| 276 else: | 291 else: |
| 277 files.zip(outFile) | 292 files.zip(outFile) |
| OLD | NEW |