summaryrefslogtreecommitdiffstats
path: root/recipes-sota/aktualizr/aktualizr-device-prov-creds.bb
blob: 6e02a501395fc06674c5b7a1d8e44b8fb6e0250e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
SUMMARY = "Credentials for device provisioning with fleet CA certificate"
HOMEPAGE = "https://github.com/advancedtelematic/aktualizr"
SECTION = "base"
LICENSE = "MPL-2.0"
LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MPL-2.0;md5=815ca599c9df247a0c7f619bab123dad"

inherit allarch

# WARNING: it is NOT a production solution. The secure way to provision devices
# is to create certificate request directly on the device (either with HSM/TPM
# or with software) and then sign it with a CA stored on a disconnected machine.

DEPENDS = "aktualizr aktualizr-native"
ALLOW_EMPTY_${PN} = "1"

SRC_URI = " \
            file://ca.cnf \
            "

require credentials.inc

export SOTA_CACERT_PATH
export SOTA_CAKEY_PATH

do_install() {
    if [ -n "${SOTA_PACKED_CREDENTIALS}" ]; then
        if [ -z ${SOTA_CACERT_PATH} ]; then
            SOTA_CACERT_PATH=${DEPLOY_DIR_IMAGE}/CA/cacert.pem
            SOTA_CAKEY_PATH=${DEPLOY_DIR_IMAGE}/CA/ca.private.pem
            mkdir -p ${DEPLOY_DIR_IMAGE}/CA
            bbwarn "SOTA_CACERT_PATH is not specified, use default one at ${SOTA_CACERT_PATH}"

            if [ ! -f ${SOTA_CACERT_PATH} ]; then
                bbwarn "${SOTA_CACERT_PATH} does not exist, generate a new CA"
                SOTA_CACERT_DIR_PATH="$(dirname "${SOTA_CACERT_PATH}")"
                openssl genrsa -out ${SOTA_CACERT_DIR_PATH}/ca.private.pem 4096
                openssl req -key ${SOTA_CACERT_DIR_PATH}/ca.private.pem -new -x509 -days 7300 -out ${SOTA_CACERT_PATH} -subj "/C=DE/ST=Berlin/O=Reis und Kichererbsen e.V/commonName=meta-updater" -batch -config ${WORKDIR}/ca.cnf -extensions cacert
                bbwarn "${SOTA_CACERT_PATH} has been created, you'll need to upload it to the server"
            fi
        fi

        if [ -z ${SOTA_CAKEY_PATH} ]; then
            bbfatal "SOTA_CAKEY_PATH should be set when using device credential provisioning"
        fi

        install -m 0700 -d ${D}${localstatedir}/sota
        aktualizr-cert-provider --credentials ${SOTA_PACKED_CREDENTIALS} \
                                --fleet-ca ${SOTA_CACERT_PATH} \
                                --fleet-ca-key ${SOTA_CAKEY_PATH} \
                                --root-ca \
                                --server-url \
                                --local ${D} \
                                --config ${STAGING_DIR_HOST}${libdir}/sota/sota-device-cred.toml
    fi
}

FILES_${PN} = " \
                ${localstatedir}/sota/*"

# vim:set ts=4 sw=4 sts=4 expandtab: