1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229
|
# -*- coding: utf-8 -*-
#
# Copyright 2019 SoloKeys Developers
#
# Licensed under the Apache License, Version 2.0, <LICENSE-APACHE or
# http://apache.org/licenses/LICENSE-2.0> or the MIT license <LICENSE-MIT or
# http://opensource.org/licenses/MIT>, at your option. This file may not be
# copied, modified, or distributed except according to those terms.
import base64
import hashlib
import json
import sys
import tempfile
import time
import click
import requests
from fido2.ctap import CtapError
from fido2.ctap1 import ApduError
import solo
from solo import helpers
@click.command()
@click.option("-s", "--serial", help="Serial number of Solo key to target")
@click.option(
"-y", "--yes", is_flag=True, help="Don't ask for confirmation before flashing"
)
@click.option(
"-lfs",
"--local-firmware-server",
is_flag=True,
default=False,
hidden=True,
help="Development option: pull firmware from http://localhost:8000",
)
@click.option(
"--alpha",
is_flag=True,
default=False,
hidden=True,
help="Development option: use release refered to by ALPHA_VERSION",
)
def update(serial, yes, local_firmware_server, alpha):
"""Update Solo key to latest firmware version."""
# Determine target key
try:
solo_client = solo.client.find(serial)
except solo.exceptions.NoSoloFoundError:
print()
print("No Solo key found!")
print()
print("If you are on Linux, are your udev rules up to date?")
print("Try adding a rule line such as the following:")
print('ATTRS{idVendor}=="0483", ATTRS{idProduct}=="a2ca", TAG+="uaccess"')
print("For more, see https://docs.solokeys.io/solo/udev/")
print()
sys.exit(1)
except solo.exceptions.NonUniqueDeviceError:
print()
print("Multiple Solo keys are plugged in! Please:")
# print(" * unplug all but one key, or")
# print(" * specify target key via `--serial SERIAL_NUMBER`")
print(" * unplug all but one key")
print()
sys.exit(1)
except Exception:
print()
print("Unhandled error connecting to key.")
print("Please report via https://github.com/solokeys/solo1-cli/issues/")
print()
sys.exit(1)
# Ensure we are in bootloader mode
try:
solo_client.is_solo_bootloader()
except (RuntimeError, ApduError):
print("Please switch key to bootloader mode:")
print("Unplug, hold button, plug in, wait for flashing yellow light.")
sys.exit(1)
# Get firmware version to use
try:
if alpha:
version_file = "ALPHA_VERSION"
else:
version_file = "STABLE_VERSION"
fetch_url = (
f"https://raw.githubusercontent.com/solokeys/solo/master/{version_file}"
)
r = requests.get(fetch_url)
if r.status_code != 200:
print(
f"Could not fetch version name from {version_file} in solokeys/solo repository!"
)
sys.exit(1)
version = r.text.split()[0].strip()
# Windows BOM haha
# if version.encode() == b'\xef\xbf\xbd\xef\xbf\xbd1\x00.\x001\x00.\x000\x00':
# version = '1.1.0'
try:
assert version.count(".") == 2
major, minor, patch_and_more = version.split(".")
if "-" in patch_and_more:
patch, pre = patch_and_more.split("-") # noqa: F841
else:
patch, pre = patch_and_more, None # noqa: F841
major, minor, patch = map(int, (major, minor, patch))
except Exception:
print(f"Abnormal version format '{version}'")
sys.exit(1)
except Exception:
print("Error fetching version name from solokeys/solo repository!")
sys.exit(1)
# Get firmware to use
if local_firmware_server:
base_url = "http://localhost:8000"
else:
base_url = f"https://github.com/solokeys/solo/releases/download/{version}"
firmware_file_github = f"firmware-{version}.json"
firmware_url = f"{base_url}/{firmware_file_github}"
extension = firmware_url.rsplit(".")[-1]
try:
r = requests.get(firmware_url)
if r.status_code != 200:
print(
"Could not fetch official firmware build from solokeys/solo repository releases!"
)
print(f"URL attempted: {firmware_url}")
sys.exit(1)
content = r.content
try:
# might as well use r.json() here too
json_content = json.loads(content.decode())
except Exception:
print(f"Invalid JSON content fetched from {firmware_url}!")
sys.exit(1)
with tempfile.NamedTemporaryFile(suffix="." + extension, delete=False) as fh:
fh.write(r.content)
firmware_file = fh.name
print(f"Wrote temporary copy of {firmware_file_github} to {firmware_file}")
except Exception:
print("Problem fetching {firmware_url}!")
sys.exit(1)
# Check sha256sum
m = hashlib.sha256()
firmware_content = base64.b64decode(
helpers.from_websafe(json_content["firmware"]).encode()
)
crlf_firmware_content = b"\r\n".join(firmware_content.split(b"\n"))
m.update(crlf_firmware_content)
our_digest = m.hexdigest()
digest_url = firmware_url.rsplit(".", 1)[0] + ".sha2"
official_digest = requests.get(digest_url).text.split()[0]
if our_digest != official_digest:
print(
"sha256sum of downloaded firmware file does not coincide with published sha256sum!"
)
print(f"sha256sum(downloaded): {our_digest}")
print(f"sha256sum(published): {official_digest}")
sys.exit(1)
print(f"sha256sums coincide: {official_digest}")
# Actually flash it...
solo_client.use_hid()
try:
# We check the key accepted signature ourselves,
# for more pertinent error messaging.
if not solo_client.is_solo_bootloader():
print("Switching into bootloader mode...")
solo_client.enter_bootloader_or_die()
time.sleep(1.5)
solo_client = solo.client.find(serial)
solo_client.set_reboot(False)
sig = solo_client.program_file(firmware_file)
except Exception as e:
if isinstance(e, CtapError):
if e.code == CtapError.ERR.INVALID_COMMAND:
print("Could not switch into bootloader mode.")
print("Please put key into bootloader mode:")
print("1. Unplug key")
print("2. While holding button, plug in key for 2s")
sys.exit(1)
print("error:")
print("problem flashing firmware!")
print(e)
sys.exit(1)
try:
print("bootloader is verifying signature...")
solo_client.verify_flash(sig)
print("...pass!")
except Exception:
print("...error!")
print()
print("Your key did not accept the firmware's signature! Possible reasons:")
print(
' * Tried to flash "hacker" firmware on custom hacker key with verifying bootloader'
)
print()
print(
"Currently, your key does not work. Please run update again with correct parameters"
)
sys.exit(1)
# NB: There is a remaining error case: Flashing secure firmware on hacker key
# will give rise to an incorrect attestation certificate.
print()
print(
f"Congratulations, your key was updated to the latest firmware version: {version}"
)
|