| version 1.14, 2021/10/17 23:25:14 | version 1.93, 2021/12/21 02:09:03 | 
|  |  | 
| #!/bin/ksh | #!/bin/ksh | 
| set -e | #       $OpenBSD$ | 
|  | # | 
|  | # Copyright (c) 2021 Andrew Hewus Fresh <afresh1@openbsd.org> | 
|  | # | 
|  | # Permission to use, copy, modify, and distribute this software for any | 
|  | # purpose with or without fee is hereby granted, provided that the above | 
|  | # copyright notice and this permission notice appear in all copies. | 
|  | # | 
|  | # THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | 
|  | # WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | 
|  | # MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | 
|  | # ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | 
|  | # WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | 
|  | # ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | 
|  | # OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | 
|  |  | 
| scan_dmesg() { | set -o errexit -o pipefail -o nounset | 
| # no bsort for now | set +o monitor | 
| sed -n "$1" /var/run/dmesg.boot | export PATH=/usr/bin:/bin:/usr/sbin:/sbin | 
| } |  | 
|  |  | 
| installed_firmware() { | CFILE=SHA256.sig | 
| for fw in ${PKGDIR}/$1-firmware*; do | DESTDIR=${DESTDIR:-} | 
| [ -e "$fw" ] || continue | FWPATTERNS="${DESTDIR}/usr/share/misc/firmware_patterns" | 
| echo ${fw##*/} |  | 
| done |  | 
| } |  | 
|  |  | 
| # tmpdir, do_as, unpriv, and unpriv2 are from install.sub | VNAME=${VNAME:-$(sysctl -n kern.osrelease)} | 
|  | VERSION=${VERSION:-"${VNAME%.*}${VNAME#*.}"} | 
|  |  | 
| # Create a temporary directory based on the supplied directory name prefix. | HTTP_FWDIR="$VNAME" | 
|  | VTYPE=$( sed -n "/^OpenBSD $VNAME\([^ ]*\).*$/s//\1/p" \ | 
|  | /var/run/dmesg.boot | sed '$!d' ) | 
|  | [[ $VTYPE == -!(stable) ]] && HTTP_FWDIR=snapshots | 
|  |  | 
|  | FWURL=http://firmware.openbsd.org/firmware/${HTTP_FWDIR} | 
|  | FWPUB_KEY=${DESTDIR}/etc/signify/openbsd-${VERSION}-fw.pub | 
|  |  | 
|  | DOWNLOAD=true | 
|  | INSTALL=true | 
|  | LOCALSRC= | 
|  |  | 
| tmpdir() { | tmpdir() { | 
| local _i=1 _dir | local _i=1 _dir | 
|  |  | 
| until _dir="${1?}.$_i.$RANDOM" && mkdir -- "$_dir" 2>/dev/null; do | # If we're not in the installer, | 
| ((++_i < 10000)) || return 1 | # we have mktemp and a more hostile environment. | 
| done | if [ -x /usr/bin/mktemp ]; then | 
|  | _dir=$( mktemp -d "${1}-XXXXXXXXX" ) | 
|  | else | 
|  | until _dir="${1}.$_i.$RANDOM" && mkdir -- "$_dir" 2>/dev/null; do | 
|  | ((++_i < 10000)) || return 1 | 
|  | done | 
|  | fi | 
|  |  | 
| echo "$_dir" | echo "$_dir" | 
| } | } | 
|  |  | 
| # Run a command ($2+) as unprivileged user ($1). | fetch() { | 
| # Take extra care that after "cmd" no "user" processes exist. | local _src="${FWURL}/${1##*/}" _dst=$1 _user=_file _pid _exit _error='' | 
| # |  | 
| # Optionally: |  | 
| #       - create "file" and chown it to "user" |  | 
| #       - after "cmd", chown "file" back to root |  | 
| # |  | 
| # Usage: do_as user [-f file] cmd |  | 
| do_as() { |  | 
| (( $# >= 2 )) || return |  | 
|  |  | 
| local _file _rc _user=$1 | # If we're not in the installer, | 
| shift | # we have su(1) and doas(1) is unlikely to be configured. | 
|  | set -o monitor # make sure ftp gets its own process group | 
|  | ( | 
|  | if [ -x /usr/bin/su ]; then | 
|  | exec /usr/bin/su -s /bin/ksh "$_user" -c \ | 
|  | "/usr/bin/ftp -D 'Get/Verify' -Vm -o- '$_src'" > "$_dst" | 
|  | else | 
|  | exec /usr/bin/doas -u "$_user" \ | 
|  | /usr/bin/ftp -D 'Get/Verify' -Vm -o- "$_src" > "$_dst" | 
|  | fi | 
|  | ) & _pid=$! | 
|  | set +o monitor | 
|  |  | 
| if [[ $1 == -f ]]; then | trap "kill -TERM '-$_pid'; exit 1" EXIT INT QUIT ABRT TERM | 
| _file=$2 |  | 
| shift 2 | SECONDS=0 | 
|  | _last=0 | 
|  | while kill -0 -"$_pid" 2>/dev/null; do | 
|  | if [[ $SECONDS -gt 12 ]]; then | 
|  | set -- $( ls -ln "$_dst" 2>/dev/null ) | 
|  | if [[ $_last -ne $5 ]]; then | 
|  | _last=$5 | 
|  | SECONDS=0 | 
|  | sleep 1 | 
|  | else | 
|  | kill -INT -"$_pid" | 
|  | _error=" (timed out)" | 
|  | fi | 
|  | else | 
|  | sleep 1 | 
|  | fi | 
|  | done | 
|  |  | 
|  | set +o errexit | 
|  | wait "$_pid" | 
|  | _exit=$? | 
|  | set -o errexit | 
|  |  | 
|  | trap "" EXIT INT QUIT ABRT TERM | 
|  |  | 
|  | if [ "$_exit" -ne 0 ]; then | 
|  | rm -f "$_dst" | 
|  | echo "Cannot fetch $_src$_error" >&2 | 
|  | return 1 | 
| fi | fi | 
|  | } | 
|  |  | 
| if [[ -n $_file ]]; then | verify() { | 
| >$_file | # On the installer we don't get sha256 -C, so fake it. | 
| chown "$_user" "$_file" | if ! fgrep -qx "SHA256 (${1##*/}) = $( /bin/sha256 -qb "$1" )" "$CFILE"; then | 
|  | echo "Checksum test for ${1##*/} failed." >&2 | 
|  | return 1 | 
| fi | fi | 
|  | } | 
|  |  | 
| doas -u "$_user" "$@" | devices_needing_firmware() { | 
| _rc=$? | local _d _m _line _dmesgtail _last='' _nl=$( echo ) | 
|  |  | 
| while doas -u "$_user" kill -9 -1 2>/dev/null; do | # When we're not in the installer, the dmesg.boot can | 
| echo "Processes still running for user $_user after: $@" | # contain multiple boots, so only look in the last one | 
| sleep 1 | _dmesgtail="$( echo ; sed -n 'H;/^OpenBSD/h;${g;p;}' /var/run/dmesg.boot | | 
| done | grep -e "^[a-z][a-z]*[0-9]" -e " not configured " )" | 
|  |  | 
| [[ -n $_file ]] && chown root "$_file" | grep -v '^[[:space:]]*#' "$FWPATTERNS" | | 
|  | while read -r _d _m; do | 
|  | [ "$_d" = "$_last" ] && continue | 
|  | [ "$_m" ]             || _m="${_nl}${_d}[0-9] at " | 
|  | [ "$_m" = "${_m#^}" ] || _m="${_nl}${_m#^}" | 
|  |  | 
| return $_rc | if [[ $_dmesgtail = *$_m* ]]; then | 
|  | echo "$_d" | 
|  | _last="$_d" | 
|  | fi | 
|  | done | 
| } | } | 
|  |  | 
| unpriv() { | firmware_filename() { | 
| do_as _sndio "$@" | local _f | 
|  | _f="$( sed -n "s/.*(\($1-firmware-.*\.tgz\)).*/\1/p" "$CFILE" | sed '$!d' )" | 
|  | ! [ "$_f" ] && echo "Unable to find firmware for $1" >&2 && return 1 | 
|  | echo "$_f" | 
| } | } | 
|  |  | 
| unpriv2() { | firmware_devicename() { | 
| do_as _file "$@" | local _d="${1##*/}" | 
|  | _d="${_d%-firmware-*}" | 
|  | echo "$_d" | 
| } | } | 
|  |  | 
| _issue= | installed_firmware() { | 
| fail() { | for fw in "${DESTDIR}/var/db/pkg/$1-firmware"*; do | 
| echo $_issue >&2 | [ -e "$fw" ] || continue | 
| exit 1 | echo "${fw##*/}" | 
|  | done | 
| } | } | 
|  |  | 
| VNAME=$(sysctl -n kern.osrelease) | add_firmware () { | 
| VERSION="${VNAME%.*}${VNAME#*.}" | local _f="${1##*/}" | 
| FWDIR="$VNAME" | local _pkgdir="${DESTDIR}/var/db/pkg/${_f%.tgz}" | 
|  | ftp -D "Install" -Vmo- "file:${1}" | | 
|  | tar -s ",^\+,${_pkgdir}/+," \ | 
|  | -s ",^firmware,${DESTDIR}/etc/firmware," \ | 
|  | -C / -zxphf - "+*" "firmware/*" | 
|  |  | 
| # TODO: We need the firmware for the system we just installed | # TODO: Should we mark these so real fw_update can -Drepair? | 
| #       not the one we booted from.  For example: | ed -s "${_pkgdir}/+CONTENTS" <<EOL | 
| #       * booting from a snapshot bsd.rd that thinks it is the 7.0 release | /^@comment pkgpath/ -1a | 
| #         will install the firmware from the 7.0 directory instead of | @option manual-installation | 
| #         from the snapshots dir. | @option firmware | 
| #       If they're using sysupgrade, then the installer kernel will be correct. | @comment install-script | 
| #       If we're doing this in the installer we can check what they picked | . | 
| #       for downloading sets and use that value. | w | 
| #       Otherwise, the fw_update after first boot will fix it up for us. | EOL | 
|  | } | 
|  |  | 
| HTTP_FWDIR=$FWDIR | delete_firmware() { | 
| set -- $(scan_dmesg "/^OpenBSD $VNAME\([^ ]*\).*$/s//\1/p") | local _cwd _pkg="$1" _pkgdir="${DESTDIR}/var/db/pkg" | 
| [[ $1 == -!(stable) ]] && HTTP_FWDIR=snapshots |  | 
|  |  | 
| FWURL=http://firmware.openbsd.org/firmware/${HTTP_FWDIR} | # TODO: Check hash for files before deleting | 
| FWPUB_KEY=${DESTDIR}/etc/signify/openbsd-${VERSION}-fw.pub | echo "Uninstalling $_pkg" | 
| PKGDIR=${DESTDIR}/var/db/pkg | _cwd="${_pkgdir}/$_pkg" | 
| PATTERNS="file:${0%/*}/firmware_patterns" |  | 
|  |  | 
| fw_update() { | set -A _remove -- "${_cwd}/+CONTENTS" "${_cwd}" | 
| local _tmpsrc _f _remove _r |  | 
| local _src=$FWURL _t=Get _cfile="/tmp/SHA256" _srclocal=false |  | 
| local _drivers=$( |  | 
| last='' |  | 
| ftp -D "Detecting" -Vmo- $PATTERNS | |  | 
| while read d m; do |  | 
| grep=grep |  | 
| [ "$last" = "$d" ] && continue |  | 
| [ "$m" ] || m="^$d[0-9][0-9]* at " |  | 
| [ "$m" = "${m#^}" ] && grep=fgrep |  | 
| $grep -q "$m" /var/run/dmesg.boot || continue |  | 
| echo $d |  | 
| last=$d |  | 
| done |  | 
| ) |  | 
|  |  | 
| if [ -z "$_drivers" ]; then | while read -r c g; do | 
| echo "No devices found which need firmware files to be downloaded." >&2 | case $c in | 
| return | @cwd) _cwd="${DESTDIR}$g" | 
| fi | ;; | 
|  | @*) continue | 
|  | ;; | 
|  | *) set -A _remove -- "$_cwd/$c" "${_remove[@]}" | 
|  | ;; | 
|  | esac | 
|  | done < "${_pkgdir}/${_pkg}/+CONTENTS" | 
|  |  | 
| if _tmpsrc=$( tmpdir "${DESTDIR}/tmp/fw_update" ); then | # We specifically rm -f here because not removing files/dirs | 
| ( | # is probably not worth failing over. | 
| >$_tmpsrc/t && | for _r in "${_remove[@]}" ; do | 
| $_unpriv cat $_tmpsrc/t | if [ -d "$_r" ]; then | 
| ) >/dev/null 2>&1 || | # Try hard not to actually remove recursively | 
| rm -r $_tmpsrc | # without rmdir on the install media. | 
| fi | [ "$_r/*" = "$( echo "$_r"/* )" ] && rm -rf "$_r" | 
|  | else | 
|  | rm -f "$_r" | 
|  | fi | 
|  | done | 
|  | } | 
|  |  | 
| [[ ! -d $_tmpsrc ]] && | usage() { | 
| _issue="Cannot create prefetch area" && fail | echo "usage:  ${0##*/} [-D | -L] [driver | file ...]" | 
|  | exit 2 | 
|  | } | 
|  |  | 
| ! $_unpriv ftp -D "$_t" -Vmo - "$_src/SHA256.sig" >"$_cfile.sig" && | OPT_D= | 
| _issue="Cannot fetch SHA256.sig" && fail | OPT_L= | 
|  | while getopts DL name | 
|  | do | 
|  | case "$name" in | 
|  | D) OPT_D=true ;; | 
|  | L) OPT_L=true ;; | 
|  | ?) usage 2 ;; | 
|  | esac | 
|  | done | 
|  | shift $((OPTIND - 1)) | 
|  |  | 
| # Verify signature file with public keys. | [ "$OPT_D" ] && [ "$OPT_L" ] && usage 1 | 
| ! unpriv -f "$_cfile" \ |  | 
| signify -Vep $FWPUB_KEY -x "$_cfile.sig" -m "$_cfile" && |  | 
| _issue="Signature check of SHA256.sig failed" && fail |  | 
|  |  | 
| for d in $_drivers; do | if [ "$OPT_D" ]; then | 
| _f=$( sed -n "s/.*(\($d-firmware-.*\.tgz\)).*/\1/p" "$_cfile" ) | # "Download only" means local dir and don't install | 
| installed=$( installed_firmware "$d" ) | INSTALL=false | 
|  | LOCALSRC=. | 
|  | elif [ "$OPT_L" ]; then | 
|  | # "Local" means don't download, install from local dir | 
|  | DOWNLOAD=false | 
|  | LOCALSRC=. | 
|  | else | 
|  | LOCALSRC="$( tmpdir "${DESTDIR}/tmp/fw_install" )" | 
|  | fi | 
|  |  | 
| for i in $installed; do | CFILE="$LOCALSRC/$CFILE" | 
| if [ "$_f" = "$i.tgz" ]; then |  | 
| echo "Firmware for $d already installed ($installed)" |  | 
| continue 2 |  | 
| fi |  | 
| done |  | 
|  |  | 
| rm -f /tmp/h /tmp/fail | set -A devices -- "$@" | 
|  |  | 
| _t=Get/Verify | if [ ! "${devices[*]:-}" ]; then | 
| # Fetch firmware file and create a checksum by piping through | echo -n "Detecting firmware ..." | 
| # sha256. Create a flag file in case ftp failed. Firmware | set -A devices -- $( devices_needing_firmware ) | 
| # from net is written to the prefetch area. | [ "${devices[*]:-}" ] && echo " found." || echo " done." | 
| ( $_unpriv ftp -D "$_t" -Vmo - "$_src/$_f" || >/tmp/fail ) | | fi | 
| ( $_srclocal && unpriv2 sha256 -b >/tmp/h || |  | 
| unpriv2 -f /tmp/h sha256 -bph /tmp/h >"$_tmpsrc/$_f" ) |  | 
|  |  | 
| # Handle failed transfer. | [ "${devices[*]:-}" ] || exit | 
| if [[ -f /tmp/fail ]]; then |  | 
| rm -f "$_tmpsrc/$_f" |  | 
| _issue="Fetching of $_f failed!" |  | 
| fail |  | 
| fi |  | 
|  |  | 
| # Verify firmware by comparing its checksum with SHA256. | if "$DOWNLOAD"; then | 
| if fgrep -qx "SHA256 ($_f) = $(</tmp/h)" "$_cfile"; then | fetch "$CFILE" | 
| #_unver=$(rmel $_f $_unver) | ! signify -qVep "$FWPUB_KEY" -x "$CFILE" -m "$CFILE" && | 
| true | echo "Signature check of SHA256.sig failed" >&2 && exit 1 | 
| else | fi | 
| [[ -d "$_tmpsrc" ]] && rm -rf "$_tmpsrc" |  | 
| _issue="Checksum test for $_f failed." |  | 
| fail |  | 
| fi |  | 
|  |  | 
| # TODO: Check hash for files before deleting | for f in "${devices[@]}"; do | 
| if [ "$installed" ] && [ -e "${PKGDIR}/$installed/+CONTENTS" ]; then | d="$( firmware_devicename "$f" )" | 
| echo "Uninstalling $installed" |  | 
| cwd=${PKGDIR}/$installed |  | 
|  |  | 
| set -A _remove -- "${cwd}/+CONTENTS" "${cwd}" | if [ "$f" = "$d" ]; then | 
|  | f=$( firmware_filename "$d" || true ) | 
|  | [ "$f" ] || continue | 
|  | f="$LOCALSRC/$f" | 
|  | elif ! "$INSTALL" && ! grep -Fq "($f)" "$CFILE" ; then | 
|  | echo "Cannot download local file $f" >&2 | 
|  | exit 2 | 
|  | fi | 
|  |  | 
| while read c g; do | set -A installed -- $( installed_firmware "$d" ) | 
| case $c in |  | 
| @cwd) cwd="${DESTDIR}/$g" |  | 
| ;; |  | 
| @*) continue |  | 
| ;; |  | 
| *)  set -A _remove -- "$cwd/$c" "${_remove[@]}" |  | 
| ;; |  | 
| esac |  | 
| done < "${PKGDIR}/$installed/+CONTENTS" |  | 
|  |  | 
| for _r in "${_remove[@]}" ; do | if "$INSTALL" && [ "${installed[*]:-}" ]; then | 
| if [ -d "$_r" ]; then | for i in "${installed[@]}"; do | 
| # Try hard not to actually remove recursively | if [ "${f##*/}" = "$i.tgz" ]; then | 
| # without rmdir on the install media. | echo "$i already installed" | 
| [ "$_r/*" = $( echo "$_r"/* ) ] && rm -rf "$_r" | continue 2 | 
| else | fi | 
| rm -f "$_r" | done | 
| fi | fi | 
| done |  | 
|  | if [ -e "$f" ]; then | 
|  | if "$DOWNLOAD"; then | 
|  | echo "Verify existing ${f##*/}" | 
|  | verify "$f" || continue | 
|  | # else assume it was verified when downloaded | 
| fi | fi | 
|  | elif "$DOWNLOAD"; then | 
|  | fetch  "$f" || continue | 
|  | verify "$f" || continue | 
|  | elif "$INSTALL"; then | 
|  | echo "Cannot install ${f##*/}, not found" >&2 | 
|  | continue | 
|  | fi | 
|  |  | 
| # TODO: Add some details about the install to +CONTENTS like pkg_add | "$INSTALL" || continue | 
| # TODO: Or, maybe we save the firmware someplace and make pkg_add reinstall |  | 
| echo "Installing $_f" |  | 
| tar -zxphf "$_tmpsrc/$_f" -C "${DESTDIR}/etc" "firmware/*" |  | 
| mkdir -p ${PKGDIR}/${_f%.tgz}/ |  | 
| tar -zxphf "$_tmpsrc/$_f" -C "${PKGDIR}/${_f%.tgz}" "+*" |  | 
| ed -s "${PKGDIR}/${_f%.tgz}/+CONTENTS" <<EOL |  | 
| /^@comment pkgpath/ -1a |  | 
| @option manual-installation |  | 
| @option firmware |  | 
| @comment install-script |  | 
| . |  | 
| w |  | 
| EOL |  | 
| done |  | 
| } |  | 
|  |  | 
| fw_update | if [ "${installed[*]:-}" ]; then | 
|  | for i in "${installed[@]}"; do | 
|  | delete_firmware "$i" | 
|  | done | 
|  | fi | 
|  |  | 
|  | add_firmware "$f" | 
|  | done | 
|  |  |