Source code

Revision control

Copy as Markdown

Other Tools

# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this file,
# You can obtain one at http://mozilla.org/MPL/2.0/.
r"""Repackage ZIP archives (or directories) into MSIX App Packages.
# Known issues
- The icons in the Start Menu have a solid colour tile behind them. I think
this is an issue with plating.
"""
import functools
import itertools
import logging
import os
import re
import shutil
import subprocess
import sys
import time
import urllib
from collections import defaultdict
from pathlib import Path
import mozpack.path as mozpath
from mach.util import get_state_dir
from mozfile import which
from mozpack.copier import FileCopier
from mozpack.files import FileFinder, JarFinder
from mozpack.manifests import InstallManifest
from mozpack.mozjar import JarReader
from mozpack.packager.unpack import UnpackFinder
from six.moves import shlex_quote
from mozbuild.dirutils import ensureParentDir
from mozbuild.repackaging.application_ini import get_application_ini_values
def log_copy_result(log, elapsed, destdir, result):
COMPLETE = (
"Elapsed: {elapsed:.2f}s; From {dest}: Kept {existing} existing; "
"Added/updated {updated}; "
"Removed {rm_files} files and {rm_dirs} directories."
)
copy_result = COMPLETE.format(
elapsed=elapsed,
dest=destdir,
existing=result.existing_files_count,
updated=result.updated_files_count,
rm_files=result.removed_files_count,
rm_dirs=result.removed_directories_count,
)
log(logging.INFO, "msix", {"copy_result": copy_result}, "{copy_result}")
_MSIX_ARCH = {"x86": "x86", "x86_64": "x64", "aarch64": "arm64"}
@functools.lru_cache(maxsize=None)
def sdk_tool_search_path():
from mozbuild.configure import ConfigureSandbox
sandbox = ConfigureSandbox({}, argv=["configure"])
sandbox.include_file(
str(Path(__file__).parent.parent.parent.parent.parent / "moz.configure")
)
return sandbox._value_for(sandbox["sdk_bin_path"]) + [
"c:/Windows/System32/WindowsPowershell/v1.0"
]
def find_sdk_tool(binary, log=None):
if binary.lower().endswith(".exe"):
binary = binary[:-4]
maybe = os.environ.get(binary.upper())
if maybe:
log(
logging.DEBUG,
"msix",
{"binary": binary, "path": maybe},
"Found {binary} in environment: {path}",
)
return mozpath.normsep(maybe)
maybe = which(binary, extra_search_dirs=sdk_tool_search_path())
if maybe:
log(
logging.DEBUG,
"msix",
{"binary": binary, "path": maybe},
"Found {binary} on path: {path}",
)
return mozpath.normsep(maybe)
return None
def get_embedded_version(version, buildid):
r"""Turn a display version into "dotted quad" notation.
N.b.: some parts of the MSIX packaging ecosystem require the final part of
the dotted quad to be identically 0, so we enforce that here.
"""
# It's irritating to roll our own version parsing, but the tree doesn't seem
# to contain exactly what we need at this time.
version = version.rsplit("esr", 1)[0]
alpha = "a" in version
tail = None
if "a" in version:
head, tail = version.rsplit("a", 1)
if tail != "1":
# Disallow anything beyond `X.Ya1`.
raise ValueError(
f"Alpha version not of the form X.0a1 is not supported: {version}"
)
tail = buildid
elif "b" in version:
head, tail = version.rsplit("b", 1)
if len(head.split(".")) > 2:
raise ValueError(
f"Beta version not of the form X.YbZ is not supported: {version}"
)
elif "rc" in version:
head, tail = version.rsplit("rc", 1)
if len(head.split(".")) > 2:
raise ValueError(
f"Release candidate version not of the form X.YrcZ is not supported: {version}"
)
else:
head = version
components = (head.split(".") + ["0", "0", "0"])[:3]
if tail:
components[2] = tail
if alpha:
# Nightly builds are all `X.0a1`, which isn't helpful. Include build ID
# to disambiguate. But each part of the dotted quad is 16 bits, so we
# have to squash.
if components[1] != "0":
# Disallow anything beyond `X.0a1`.
raise ValueError(
f"Alpha version not of the form X.0a1 is not supported: {version}"
)
# Last two digits only to save space. Nightly builds in 2066 and 2099
# will be impacted, but future us can deal with that.
year = buildid[2:4]
if year[0] == "0":
# Avoid leading zero, like `.0YMm`.
year = year[1:]
month = buildid[4:6]
day = buildid[6:8]
if day[0] == "0":
# Avoid leading zero, like `.0DHh`.
day = day[1:]
hour = buildid[8:10]
components[1] = "".join((year, month))
components[2] = "".join((day, hour))
version = "{}.{}.{}.0".format(*components)
return version
def get_appconstants_sys_mjs_values(finder, *args):
r"""Extract values, such as the display version like `MOZ_APP_VERSION_DISPLAY:
"...";`, from the omnijar. This allows to determine the beta number, like
`X.YbW`, where the regular beta version is only `X.Y`. Takes a list of
names and returns an iterator of the unique such value found for each name.
Raises an exception if a name is not found or if multiple values are found.
"""
lines = defaultdict(list)
for _, f in finder.find("**/modules/AppConstants.sys.mjs"):
# MOZ_OFFICIAL_BRANDING is split across two lines, so remove line breaks
# immediately following ":"s so those values can be read.
data = f.open().read().decode("utf-8").replace(":\n", ":")
for line in data.splitlines():
for arg in args:
if arg in line:
lines[arg].append(line)
for arg in args:
(value,) = lines[arg] # We expect exactly one definition.
_, _, value = value.partition(":")
value = value.strip().strip('",;')
yield value
def get_branding(use_official, topsrcdir, build_app, finder, log=None):
"""Figure out which branding directory to use."""
conf_vars = mozpath.join(topsrcdir, build_app, "confvars.sh")
def conf_vars_value(key):
lines = [line.strip() for line in open(conf_vars).readlines()]
for line in lines:
if line and line[0] == "#":
continue
if key not in line:
continue
_, _, value = line.partition("=")
if not value:
continue
log(
logging.INFO,
"msix",
{"key": key, "conf_vars": conf_vars, "value": value},
"Read '{key}' from {conf_vars}: {value}",
)
return value
log(
logging.ERROR,
"msix",
{"key": key, "conf_vars": conf_vars},
"Unable to find '{key}' in {conf_vars}!",
)
# Branding defaults
branding_reason = "No branding set"
branding = conf_vars_value("MOZ_BRANDING_DIRECTORY")
if use_official:
# Read MOZ_OFFICIAL_BRANDING_DIRECTORY from confvars.sh
branding_reason = "'MOZ_OFFICIAL_BRANDING' set"
branding = conf_vars_value("MOZ_OFFICIAL_BRANDING_DIRECTORY")
else:
# Check if --with-branding was used when building
log(
logging.INFO,
"msix",
{},
"Checking buildconfig.html for --with-branding build flag.",
)
for _, f in finder.find("**/chrome/toolkit/content/global/buildconfig.html"):
data = f.open().read().decode("utf-8")
match = re.search(r"--with-branding=([a-z/]+)", data)
if match:
branding_reason = "'--with-branding' set"
branding = match.group(1)
log(
logging.INFO,
"msix",
{
"branding_reason": branding_reason,
"branding": branding,
},
"{branding_reason}; Using branding from '{branding}'.",
)
return mozpath.join(topsrcdir, branding)
def unpack_msix(input_msix, output, log=None, verbose=False):
r"""Unpack the given MSIX to the given output directory.
MSIX packages are ZIP files, but they are Zip64/version 4.5 ZIP files, so
`mozjar.py` doesn't yet handle. Unpack using `unzip{.exe}` for simplicity.
In addition, file names inside the MSIX package are URL quoted. URL unquote
here.
"""
log(
logging.INFO,
"msix",
{
"input_msix": input_msix,
"output": output,
},
"Unpacking input MSIX '{input_msix}' to directory '{output}'",
)
unzip = find_sdk_tool("unzip.exe", log=log)
if not unzip:
raise ValueError("unzip is required; set UNZIP or PATH")
subprocess.check_call(
[unzip, input_msix, "-d", output] + (["-q"] if not verbose else []),
universal_newlines=True,
)
# Sanity check: is this an MSIX?
temp_finder = FileFinder(output)
if not temp_finder.contains("AppxManifest.xml"):
raise ValueError("MSIX file does not contain 'AppxManifest.xml'?")
# Files in the MSIX are URL encoded/quoted; unquote here.
for dirpath, dirs, files in os.walk(output):
# This is a one way to update (in place, for os.walk) the variable `dirs` while iterating
# over it and `files`.
for i, (p, var) in itertools.chain(
enumerate((f, files) for f in files), enumerate((g, dirs) for g in dirs)
):
q = urllib.parse.unquote(p)
if p != q:
log(
logging.DEBUG,
"msix",
{
"dirpath": dirpath,
"p": p,
"q": q,
},
"URL unquoting '{p}' -> '{q}' in {dirpath}",
)
var[i] = q
os.rename(os.path.join(dirpath, p), os.path.join(dirpath, q))
# The "package root" of our MSIX packages is like "Mozilla Firefox Beta Package Root", i.e., it
# varies by channel. This is an easy way to determine it.
for p, _ in temp_finder.find("**/application.ini"):
relpath = os.path.split(p)[0]
# The application executable, like `firefox.exe`, is in this directory.
return mozpath.normpath(mozpath.join(output, relpath))
def repackage_msix(
dir_or_package,
topsrcdir,
channel=None,
distribution_dirs=[],
version=None,
vendor=None,
displayname=None,
app_name=None,
identity=None,
publisher=None,
publisher_display_name="Mozilla Corporation",
arch=None,
output=None,
force=False,
log=None,
verbose=False,
makeappx=None,
):
if not channel:
raise Exception("channel is required")
if channel not in (
"official",
"beta",
"aurora",
"nightly",
"unofficial",
):
raise Exception("channel is unrecognized: {}".format(channel))
# TODO: maybe we can fish this from the package directly? Maybe from a DLL,
# maybe from application.ini?
if arch is None or arch not in _MSIX_ARCH.keys():
raise Exception(
"arch name must be provided and one of {}.".format(_MSIX_ARCH.keys())
)
if not os.path.exists(dir_or_package):
raise Exception("{} does not exist".format(dir_or_package))
if (
os.path.isfile(dir_or_package)
and os.path.splitext(dir_or_package)[1] == ".msix"
):
# The convention is $MOZBUILD_STATE_PATH/cache/$FEATURE.
msix_dir = mozpath.normsep(
mozpath.join(
get_state_dir(),
"cache",
"mach-msix",
"msix-unpack",
)
)
if os.path.exists(msix_dir):
shutil.rmtree(msix_dir)
ensureParentDir(msix_dir)
dir_or_package = unpack_msix(dir_or_package, msix_dir, log=log, verbose=verbose)
log(
logging.INFO,
"msix",
{
"input": dir_or_package,
},
"Adding files from '{input}'",
)
if os.path.isdir(dir_or_package):
finder = FileFinder(dir_or_package)
else:
finder = JarFinder(dir_or_package, JarReader(dir_or_package))
values = get_application_ini_values(
finder,
dict(section="App", value="CodeName", fallback="Name"),
dict(section="App", value="Vendor"),
)
first = next(values)
if not displayname:
displayname = "Mozilla {}".format(first)
if channel == "beta":
# Release (official) and Beta share branding. Differentiate Beta a little bit.
displayname += " Beta"
second = next(values)
vendor = vendor or second
# For `AppConstants.sys.mjs` and `brand.properties`, which are in the omnijar in packaged
# builds. The nested langpack XPI files can't be read by `mozjar.py`.
unpack_finder = UnpackFinder(finder, unpack_xpi=False)
values = get_appconstants_sys_mjs_values(
unpack_finder,
"MOZ_OFFICIAL_BRANDING",
"MOZ_BUILD_APP",
"MOZ_APP_NAME",
"MOZ_APP_VERSION_DISPLAY",
"MOZ_BUILDID",
)
try:
use_official_branding = {"true": True, "false": False}[next(values)]
except KeyError as err:
raise Exception(
f"Unexpected value '{err.args[0]}' found for 'MOZ_OFFICIAL_BRANDING'."
) from None
build_app = next(values)
_temp = next(values)
if not app_name:
app_name = _temp
if not version:
display_version = next(values)
buildid = next(values)
version = get_embedded_version(display_version, buildid)
log(
logging.INFO,
"msix",
{
"version": version,
"display_version": display_version,
"buildid": buildid,
},
"AppConstants.sys.mjs display version is '{display_version}' and build ID is"
+ " '{buildid}': embedded version will be '{version}'",
)
# TODO: Bug 1721922: localize this description via Fluent.
lines = []
for _, f in unpack_finder.find("**/chrome/en-US/locale/branding/brand.properties"):
lines.extend(
line
for line in f.open().read().decode("utf-8").splitlines()
if "brandFullName" in line
)
(brandFullName,) = lines # We expect exactly one definition.
_, _, brandFullName = brandFullName.partition("=")
brandFullName = brandFullName.strip()
if channel == "beta":
# Release (official) and Beta share branding. Differentiate Beta a little bit.
brandFullName += " Beta"
branding = get_branding(
use_official_branding, topsrcdir, build_app, unpack_finder, log
)
if not os.path.isdir(branding):
raise Exception("branding dir {} does not exist".format(branding))
template = os.path.join(topsrcdir, build_app, "installer", "windows", "msix")
# Discard everything after a '#' comment character.
locale_allowlist = set(
locale.partition("#")[0].strip().lower()
for locale in open(os.path.join(template, "msix-all-locales")).readlines()
if locale.partition("#")[0].strip()
)
# The convention is $MOZBUILD_STATE_PATH/cache/$FEATURE.
output_dir = mozpath.normsep(
mozpath.join(
get_state_dir(), "cache", "mach-msix", "msix-temp-{}".format(channel)
)
)
# Like 'Firefox Package Root', 'Firefox Nightly Package Root', 'Firefox Beta
# Package Root'. This is `BrandFullName` in the installer, and we want to
# be close but to not match. By not matching, we hope to prevent confusion
# and/or errors between regularly installed builds and App Package builds.
instdir = "{} Package Root".format(displayname)
# The standard package name is like "CompanyNoSpaces.ProductNoSpaces".
identity = identity or "{}.{}".format(vendor, displayname).replace(" ", "")
# We might want to include the publisher ID hash here. I.e.,
# "__{publisherID}". My locally produced MSIX was named like
# `Mozilla.MozillaFirefoxNightly_89.0.0.0_x64__4gf61r4q480j0`, suggesting also a
# missing field, but it's not necessary, since this is just an output file name.
package_output_name = "{identity}_{version}_{arch}".format(
identity=identity, version=version, arch=_MSIX_ARCH[arch]
)
# The convention is $MOZBUILD_STATE_PATH/cache/$FEATURE.
default_output = mozpath.normsep(
mozpath.join(
get_state_dir(), "cache", "mach-msix", "{}.msix".format(package_output_name)
)
)
output = output or default_output
log(logging.INFO, "msix", {"output": output}, "Repackaging to: {output}")
m = InstallManifest()
m.add_copy(mozpath.join(template, "Resources.pri"), "Resources.pri")
m.add_pattern_copy(mozpath.join(branding, "msix", "Assets"), "**", "Assets")
m.add_pattern_copy(mozpath.join(template, "VFS"), "**", "VFS")
copier = FileCopier()
# TODO: Bug 1710147: filter out MSVCRT files and use a dependency instead.
for p, f in finder:
if not os.path.isdir(dir_or_package):
# In archived builds, `p` is like "firefox/firefox.exe"; we want just "firefox.exe".
pp = os.path.relpath(p, app_name)
else:
# In local builds and unpacked MSIX directories, `p` is like "firefox.exe" already.
pp = p
if pp.startswith("distribution"):
# Treat any existing distribution as a distribution directory,
# potentially with language packs. This makes it easy to repack
# unpacked MSIXes.
distribution_dir = mozpath.join(dir_or_package, "distribution")
if distribution_dir not in distribution_dirs:
distribution_dirs.append(distribution_dir)
continue
copier.add(mozpath.normsep(mozpath.join("VFS", "ProgramFiles", instdir, pp)), f)
# Locales to declare as supported in `AppxManifest.xml`.
locales = set(["en-US"])
for distribution_dir in [
mozpath.join(template, "distribution")
] + distribution_dirs:
log(
logging.INFO,
"msix",
{"dir": distribution_dir},
"Adding distribution files from {dir}",
)
# In automation, we have no easy way to remap the names of artifacts fetched from dependent
# tasks. In particular, langpacks will be named like `target.langpack.xpi`. The fetch
# tasks do allow us to put them in a per-locale directory, so that the entire set can be
# fetched. Here we remap the names.
finder = FileFinder(distribution_dir)
for p, f in finder:
locale = None
if os.path.basename(p) == "target.langpack.xpi":
# Turn "/path/to/LOCALE/target.langpack.xpi" into "LOCALE". This is how langpacks
# are presented in CI.
base, locale = os.path.split(os.path.dirname(p))
# Like "locale-LOCALE/langpack-LOCALE@firefox.mozilla.org.xpi". This is what AMO
# serves and how flatpak builds name langpacks, but not how snap builds name
# langpacks. I can't explain the discrepancy.
dest = mozpath.normsep(
mozpath.join(
base,
f"locale-{locale}",
f"langpack-{locale}@{app_name}.mozilla.org.xpi",
)
)
log(
logging.DEBUG,
"msix",
{"path": p, "dest": dest},
"Renaming langpack {path} to {dest}",
)
elif os.path.basename(p).startswith("langpack-"):
# Turn "/path/to/langpack-LOCALE@firefox.mozilla.org.xpi" into "LOCALE". This is
# how langpacks are presented from an unpacked MSIX.
_, _, locale = os.path.basename(p).partition("langpack-")
locale, _, _ = locale.partition("@")
dest = p
else:
dest = p
if locale:
locale = locale.strip().lower()
locales.add(locale)
log(
logging.DEBUG,
"msix",
{"locale": locale, "dest": dest},
"Distributing locale '{locale}' from {dest}",
)
dest = mozpath.normsep(
mozpath.join("VFS", "ProgramFiles", instdir, "distribution", dest)
)
if copier.contains(dest):
log(
logging.INFO,
"msix",
{"dest": dest, "path": mozpath.join(finder.base, p)},
"Skipping duplicate: {dest} from {path}",
)
continue
log(
logging.DEBUG,
"msix",
{"dest": dest, "path": mozpath.join(finder.base, p)},
"Adding distribution path: {dest} from {path}",
)
copier.add(
dest,
f,
)
locales.remove("en-US")
# Windows MSIX packages support a finite set of locales: see
# We distribute all of the langpacks supported by the release channel in our MSIX, which is
# only advertise support in the App manifest for the intersection of that set and the set of
# supported locales.
#
# We distribute all langpacks to avoid the following issue. Suppose a user manually installs a
# langpack that is not supported by Windows, and then updates the installed MSIX package. MSIX
# package upgrades are essentially paveover installs, so there is no opportunity for Firefox to
# update the langpack before the update. But, since all langpacks are bundled with the MSIX,
# that langpack will be up-to-date, preventing one class of YSOD.
unadvertised = set()
if locale_allowlist:
unadvertised = locales - locale_allowlist
locales = locales & locale_allowlist
for locale in sorted(unadvertised):
log(
logging.INFO,
"msix",
{"locale": locale},
"Not advertising distributed locale '{locale}' that is not recognized by Windows",
)
locales = ["en-US"] + list(sorted(locales))
resource_language_list = "\n".join(
f' <Resource Language="{locale}" />' for locale in locales
)
defines = {
"APPX_ARCH": _MSIX_ARCH[arch],
"APPX_DISPLAYNAME": brandFullName,
"APPX_DESCRIPTION": brandFullName,
# Like 'Mozilla.MozillaFirefox', 'Mozilla.MozillaFirefoxBeta', or
# 'Mozilla.MozillaFirefoxNightly'.
"APPX_IDENTITY": identity,
# Like 'Firefox Package Root', 'Firefox Nightly Package Root', 'Firefox
# Beta Package Root'. See above.
"APPX_INSTDIR": instdir,
# Like 'Firefox%20Package%20Root'.
"APPX_INSTDIR_QUOTED": urllib.parse.quote(instdir),
"APPX_PUBLISHER": publisher,
"APPX_PUBLISHER_DISPLAY_NAME": publisher_display_name,
"APPX_RESOURCE_LANGUAGE_LIST": resource_language_list,
"APPX_VERSION": version,
"MOZ_APP_DISPLAYNAME": displayname,
"MOZ_APP_NAME": app_name,
# Keep synchronized with `toolkit\mozapps\notificationserver\NotificationComServer.cpp`.
"MOZ_INOTIFICATIONACTIVATION_CLSID": "916f9b5d-b5b2-4d36-b047-03c7a52f81c8",
}
m.add_preprocess(
mozpath.join(template, "AppxManifest.xml.in"),
"AppxManifest.xml",
[],
defines=defines,
marker="<!-- #", # So that we can have well-formed XML.
)
m.populate_registry(copier)
output_dir = mozpath.abspath(output_dir)
ensureParentDir(output_dir)
start = time.monotonic()
result = copier.copy(
output_dir, remove_empty_directories=True, skip_if_older=not force
)
if log:
log_copy_result(log, time.monotonic() - start, output_dir, result)
if verbose:
# Dump AppxManifest.xml contents for ease of debugging.
log(logging.DEBUG, "msix", {}, "AppxManifest.xml")
log(logging.DEBUG, "msix", {}, ">>>")
for line in open(mozpath.join(output_dir, "AppxManifest.xml")).readlines():
log(logging.DEBUG, "msix", {}, line[:-1]) # Drop trailing line terminator.
log(logging.DEBUG, "msix", {}, "<<<")
if not makeappx:
makeappx = find_sdk_tool("makeappx.exe", log=log)
if not makeappx:
raise ValueError(
"makeappx is required; " "set MAKEAPPX or WINDOWSSDKDIR or PATH"
)
# `makeappx.exe` supports both slash and hyphen style arguments; `makemsix`
# supports only hyphen style. `makeappx.exe` allows to overwrite and to
# provide more feedback, so we prefer invoking with these flags. This will
# also accommodate `wine makeappx.exe`.
stdout = subprocess.run(
[makeappx], check=False, capture_output=True, universal_newlines=True
).stdout
is_makeappx = "MakeAppx Tool" in stdout
if is_makeappx:
args = [makeappx, "pack", "/d", output_dir, "/p", output, "/overwrite"]
else:
args = [makeappx, "pack", "-d", output_dir, "-p", output]
if verbose and is_makeappx:
args.append("/verbose")
joined = " ".join(shlex_quote(arg) for arg in args)
log(logging.INFO, "msix", {"args": args, "joined": joined}, "Invoking: {joined}")
sys.stdout.flush() # Otherwise the subprocess output can be interleaved.
if verbose:
subprocess.check_call(args, universal_newlines=True)
else:
# Suppress output unless we fail.
try:
subprocess.check_output(args, universal_newlines=True)
except subprocess.CalledProcessError as e:
sys.stderr.write(e.output)
raise
return output
def _sign_msix_win(output, force, log, verbose):
powershell_exe = find_sdk_tool("powershell.exe", log=log)
if not powershell_exe:
raise ValueError("powershell is required; " "set POWERSHELL or PATH")
def powershell(argstring, check=True):
"Invoke `powershell.exe`. Arguments are given as a string to allow consumer to quote."
args = [powershell_exe, "-c", argstring]
joined = " ".join(shlex_quote(arg) for arg in args)
log(
logging.INFO, "msix", {"args": args, "joined": joined}, "Invoking: {joined}"
)
return subprocess.run(
args, check=check, universal_newlines=True, capture_output=True
).stdout
signtool = find_sdk_tool("signtool.exe", log=log)
if not signtool:
raise ValueError(
"signtool is required; " "set SIGNTOOL or WINDOWSSDKDIR or PATH"
)
# Our first order of business is to find, or generate, a (self-signed)
# certificate.
# These are baked into enough places under `browser/` that we need not
# extract constants.
vendor = "Mozilla"
publisher = "CN=Mozilla Corporation, OU=MSIX Packaging"
friendly_name = "Mozilla Corporation MSIX Packaging Test Certificate"
# The convention is $MOZBUILD_STATE_PATH/cache/$FEATURE.
crt_path = mozpath.join(
get_state_dir(),
"cache",
"mach-msix",
"{}.crt".format(friendly_name).replace(" ", "_").lower(),
)
crt_path = mozpath.abspath(crt_path)
ensureParentDir(crt_path)
pfx_path = crt_path.replace(".crt", ".pfx")
# TODO: maybe use an actual password. For now, just something that won't be
# brute-forced.
password = "193dbfc6-8ff7-4a95-8f32-6b4468626bd0"
if force or not os.path.isfile(crt_path):
log(
logging.INFO,
"msix",
{"crt_path": crt_path},
"Creating new self signed certificate at: {}".format(crt_path),
)
thumbprints = [
thumbprint.strip()
for thumbprint in powershell(
(
r"Get-ChildItem -Path Cert:\CurrentUser\My"
'| Where-Object {{$_.Subject -Match "{}"}}'
'| Where-Object {{$_.FriendlyName -Match "{}"}}'
"| Select-Object -ExpandProperty Thumbprint"
).format(vendor, friendly_name)
).splitlines()
]
if len(thumbprints) > 1:
raise Exception(
"Multiple certificates with friendly name found: {}".format(
friendly_name
)
)
if len(thumbprints) == 1:
thumbprint = thumbprints[0]
else:
thumbprint = None
if force or not thumbprint:
thumbprint = (
powershell(
(
'New-SelfSignedCertificate -Type Custom -Subject "{}" '
'-KeyUsage DigitalSignature -FriendlyName "{}"'
r" -CertStoreLocation Cert:\CurrentUser\My"
' -TextExtension @("2.5.29.37={{text}}1.3.6.1.5.5.7.3.3", '
'"2.5.29.19={{text}}")'
"| Select-Object -ExpandProperty Thumbprint"
).format(publisher, friendly_name)
)
.strip()
.upper()
)
if not thumbprint:
raise Exception(
"Failed to find or create certificate with friendly name: {}".format(
friendly_name
)
)
powershell(
r'Export-Certificate -Cert Cert:\CurrentUser\My\{} -FilePath "{}"'.format(
thumbprint, crt_path
)
)
log(
logging.INFO,
"msix",
{"crt_path": crt_path},
"Exported public certificate: {crt_path}",
)
powershell(
(
r'Export-PfxCertificate -Cert Cert:\CurrentUser\My\{} -FilePath "{}"'
' -Password (ConvertTo-SecureString -String "{}" -Force -AsPlainText)'
).format(thumbprint, pfx_path, password)
)
log(
logging.INFO,
"msix",
{"pfx_path": pfx_path},
"Exported private certificate: {pfx_path}",
)
# Second, to find the right thumbprint to use. We do this here in case
# we're coming back to an existing certificate.
log(
logging.INFO,
"msix",
{"crt_path": crt_path},
"Signing with existing self signed certificate: {crt_path}",
)
thumbprints = [
thumbprint.strip()
for thumbprint in powershell(
'Get-PfxCertificate -FilePath "{}" | Select-Object -ExpandProperty Thumbprint'.format(
crt_path
)
).splitlines()
]
if len(thumbprints) > 1:
raise Exception("Multiple thumbprints found for PFX: {}".format(pfx_path))
if len(thumbprints) == 0:
raise Exception("No thumbprints found for PFX: {}".format(pfx_path))
thumbprint = thumbprints[0]
log(
logging.INFO,
"msix",
{"thumbprint": thumbprint},
"Signing with certificate with thumbprint: {thumbprint}",
)
# Third, do the actual signing.
args = [
signtool,
"sign",
"/a",
"/fd",
"SHA256",
"/f",
pfx_path,
"/p",
password,
output,
]
if not verbose:
subprocess.check_call(args, universal_newlines=True)
else:
# Suppress output unless we fail.
try:
subprocess.check_output(args, universal_newlines=True)
except subprocess.CalledProcessError as e:
sys.stderr.write(e.output)
raise
# As a convenience to the user, tell how to use this certificate if it's not
# already trusted, and how to work with MSIX files more generally.
if verbose:
root_thumbprints = [
root_thumbprint.strip()
for root_thumbprint in powershell(
r"Get-ChildItem -Path Cert:\LocalMachine\Root\{} "
"| Select-Object -ExpandProperty Thumbprint".format(thumbprint),
check=False,
).splitlines()
]
if thumbprint not in root_thumbprints:
log(
logging.INFO,
"msix",
{"thumbprint": thumbprint},
"Certificate with thumbprint not found in trusted roots: {thumbprint}",
)
log(
logging.INFO,
"msix",
{"crt_path": crt_path, "output": output},
r"""\
# Usage
To trust this certificate (requires an elevated shell):
powershell -c 'Import-Certificate -FilePath "{crt_path}" -Cert Cert:\LocalMachine\Root\'
To verify this MSIX signature exists and is trusted:
powershell -c 'Get-AuthenticodeSignature -FilePath "{output}" | Format-List *'
To install this MSIX:
powershell -c 'Add-AppPackage -path "{output}"'
To see details after installing:
powershell -c 'Get-AppPackage -name Mozilla.MozillaFirefox(Beta,...)'
""".strip(),
)
return 0
def _sign_msix_posix(output, force, log, verbose):
makeappx = find_sdk_tool("makeappx", log=log)
if not makeappx:
raise ValueError("makeappx is required; " "set MAKEAPPX or PATH")
openssl = find_sdk_tool("openssl", log=log)
if not openssl:
raise ValueError("openssl is required; " "set OPENSSL or PATH")
if "sign" not in subprocess.run(makeappx, capture_output=True).stdout.decode(
"utf-8"
):
raise ValueError(
"makeappx must support 'sign' operation. ",
"You probably need to build Mozilla's version of it: ",
)
def run_openssl(args, check=True, capture_output=True):
full_args = [openssl, *args]
joined = " ".join(shlex_quote(arg) for arg in full_args)
log(
logging.INFO,
"msix",
{"args": args},
f"Invoking: {joined}",
)
return subprocess.run(
full_args,
check=check,
capture_output=capture_output,
universal_newlines=True,
)
# These are baked into enough places under `browser/` that we need not
# extract constants.
cn = "Mozilla Corporation"
ou = "MSIX Packaging"
friendly_name = "Mozilla Corporation MSIX Packaging Test Certificate"
# Password is needed when generating the cert, but
# "makeappx" explicitly does _not_ support passing it
# so it ends up getting removed when we create the pfx
password = "temp"
cache_dir = mozpath.join(get_state_dir(), "cache", "mach-msix")
ca_crt_path = mozpath.join(cache_dir, "MozillaMSIXCA.cer")
ca_key_path = mozpath.join(cache_dir, "MozillaMSIXCA.key")
csr_path = mozpath.join(cache_dir, "MozillaMSIX.csr")
crt_path = mozpath.join(cache_dir, "MozillaMSIX.cer")
key_path = mozpath.join(cache_dir, "MozillaMSIX.key")
pfx_path = mozpath.join(
cache_dir,
"{}.pfx".format(friendly_name).replace(" ", "_").lower(),
)
pfx_path = mozpath.abspath(pfx_path)
ensureParentDir(pfx_path)
if force or not os.path.isfile(pfx_path):
log(
logging.INFO,
"msix",
{"pfx_path": pfx_path},
"Creating new self signed certificate at: {}".format(pfx_path),
)
# Ultimately, we only end up using the CA certificate
# and the pfx (aka pkcs12) bundle containing the signing key
# and certificate. The other things we create along the way
# are not used for subsequent signing for testing.
# To get those, we have to do a few things:
# 1) Create a new CA key and certificate
# 2) Create a new signing key
# 3) Create a CSR with that signing key
# 4) Create the certificate with the CA key+cert from the CSR
# 5) Convert the signing key and certificate to a pfx bundle
args = [
"req",
"-x509",
"-days",
"7200",
"-sha256",
"-newkey",
"rsa:4096",
"-keyout",
ca_key_path,
"-out",
ca_crt_path,
"-outform",
"PEM",
"-subj",
f"/OU={ou} CA/CN={cn} CA",
"-passout",
f"pass:{password}",
]
run_openssl(args)
args = [
"genrsa",
"-des3",
"-out",
key_path,
"-passout",
f"pass:{password}",
]
run_openssl(args)
args = [
"req",
"-new",
"-key",
key_path,
"-out",
csr_path,
"-subj",
# We actually want these in the opposite order, to match what's
# included in the AppxManifest. Openssl ends up reversing these
# for some reason, so we put them in backwards here.
f"/OU={ou}/CN={cn}",
"-passin",
f"pass:{password}",
]
run_openssl(args)
args = [
"x509",
"-req",
"-sha256",
"-days",
"7200",
"-in",
csr_path,
"-CA",
ca_crt_path,
"-CAcreateserial",
"-CAkey",
ca_key_path,
"-out",
crt_path,
"-outform",
"PEM",
"-passin",
f"pass:{password}",
]
run_openssl(args)
args = [
"pkcs12",
"-export",
"-inkey",
key_path,
"-in",
crt_path,
"-name",
friendly_name,
"-passin",
f"pass:{password}",
# All three of these options (-keypbe, -certpbe, and -passout)
# are necessary to create a pfx bundle that won't even prompt
# for a password. If we miss one, we will still get a password
# prompt for the blank password.
"-keypbe",
"NONE",
"-certpbe",
"NONE",
"-passout",
"pass:",
"-out",
pfx_path,
]
run_openssl(args)
args = [makeappx, "sign", "-p", output, "-c", pfx_path]
if not verbose:
subprocess.check_call(
args,
universal_newlines=True,
stdout=subprocess.DEVNULL,
stderr=subprocess.DEVNULL,
)
else:
# Suppress output unless we fail.
try:
subprocess.check_output(args, universal_newlines=True)
except subprocess.CalledProcessError as e:
sys.stderr.write(e.output)
raise
if verbose:
log(
logging.INFO,
"msix",
{
"ca_crt_path": ca_crt_path,
"ca_crt": mozpath.basename(ca_crt_path),
"output_path": output,
"output": mozpath.basename(output),
},
r"""\
# Usage
First, transfer the root certificate ({ca_crt_path}) and signed MSIX
({output_path}) to a Windows machine.
To trust this certificate ({ca_crt_path}), run the following in an elevated shell:
powershell -c 'Import-Certificate -FilePath "{ca_crt}" -Cert Cert:\LocalMachine\Root\'
To verify this MSIX signature exists and is trusted:
powershell -c 'Get-AuthenticodeSignature -FilePath "{output}" | Format-List *'
To install this MSIX:
powershell -c 'Add-AppPackage -path "{output}"'
To see details after installing:
powershell -c 'Get-AppPackage -name Mozilla.MozillaFirefox(Beta,...)'
""".strip(),
)
def sign_msix(output, force=False, log=None, verbose=False):
"""Sign an MSIX with a locally generated self-signed certificate."""
if sys.platform.startswith("win"):
return _sign_msix_win(output, force, log, verbose)
else:
return _sign_msix_posix(output, force, log, verbose)