2012-10-15 22:44:39 +02:00
|
|
|
#!/bin/bash
|
2016-09-11 21:36:22 +02:00
|
|
|
# Copyright (c) 2016 The Bitcoin Core developers
|
|
|
|
# Distributed under the MIT software license, see the accompanying
|
|
|
|
# file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
2012-10-15 22:44:39 +02:00
|
|
|
|
2017-06-22 19:44:31 +02:00
|
|
|
### This script attempts to download the signature file SHA256SUMS.asc from
|
|
|
|
### bitcoincore.org and bitcoin.org and compares them.
|
2012-10-15 22:44:39 +02:00
|
|
|
### It first checks if the signature passes, and then downloads the files specified in
|
|
|
|
### the file, and checks if the hashes of these files match those that are specified
|
|
|
|
### in the signature file.
|
|
|
|
### The script returns 0 if everything passes the checks. It returns 1 if either the
|
|
|
|
### signature check or the hash check doesn't pass. If an error occurs the return value is 2
|
|
|
|
|
|
|
|
function clean_up {
|
|
|
|
for file in $*
|
|
|
|
do
|
|
|
|
rm "$file" 2> /dev/null
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2016-08-21 21:29:18 +02:00
|
|
|
WORKINGDIR="/tmp/bitcoin_verify_binaries"
|
2012-10-15 22:44:39 +02:00
|
|
|
TMPFILE="hashes.tmp"
|
|
|
|
|
|
|
|
SIGNATUREFILENAME="SHA256SUMS.asc"
|
2016-08-21 21:29:18 +02:00
|
|
|
RCSUBDIR="test"
|
2017-06-22 19:44:31 +02:00
|
|
|
HOST1="https://bitcoincore.org"
|
|
|
|
HOST2="https://bitcoin.org"
|
|
|
|
BASEDIR="/bin/"
|
2015-11-16 12:30:16 +01:00
|
|
|
VERSIONPREFIX="bitcoin-core-"
|
2012-10-15 22:44:39 +02:00
|
|
|
RCVERSIONSTRING="rc"
|
|
|
|
|
|
|
|
if [ ! -d "$WORKINGDIR" ]; then
|
|
|
|
mkdir "$WORKINGDIR"
|
|
|
|
fi
|
|
|
|
|
2017-10-04 21:19:45 +02:00
|
|
|
cd "$WORKINGDIR" || exit 1
|
2012-10-15 22:44:39 +02:00
|
|
|
|
|
|
|
#test if a version number has been passed as an argument
|
|
|
|
if [ -n "$1" ]; then
|
|
|
|
#let's also check if the version number includes the prefix 'bitcoin-',
|
|
|
|
# and add this prefix if it doesn't
|
|
|
|
if [[ $1 == "$VERSIONPREFIX"* ]]; then
|
|
|
|
VERSION="$1"
|
|
|
|
else
|
|
|
|
VERSION="$VERSIONPREFIX$1"
|
|
|
|
fi
|
|
|
|
|
2017-04-25 11:40:09 +02:00
|
|
|
STRIPPEDLAST="${VERSION%-*}"
|
|
|
|
|
|
|
|
#now let's see if the version string contains "rc" or a platform name (e.g. "osx")
|
|
|
|
if [[ "$STRIPPEDLAST-" == "$VERSIONPREFIX" ]]; then
|
|
|
|
BASEDIR="$BASEDIR$VERSION/"
|
2012-10-15 22:44:39 +02:00
|
|
|
else
|
2017-04-25 11:40:09 +02:00
|
|
|
# let's examine the last part to see if it's rc and/or platform name
|
|
|
|
STRIPPEDNEXTTOLAST="${STRIPPEDLAST%-*}"
|
|
|
|
if [[ "$STRIPPEDNEXTTOLAST-" == "$VERSIONPREFIX" ]]; then
|
|
|
|
|
|
|
|
LASTSUFFIX="${VERSION##*-}"
|
|
|
|
VERSION="$STRIPPEDLAST"
|
|
|
|
|
|
|
|
if [[ $LASTSUFFIX == *"$RCVERSIONSTRING"* ]]; then
|
|
|
|
RCVERSION="$LASTSUFFIX"
|
|
|
|
else
|
|
|
|
PLATFORM="$LASTSUFFIX"
|
|
|
|
fi
|
|
|
|
|
|
|
|
else
|
|
|
|
RCVERSION="${STRIPPEDLAST##*-}"
|
|
|
|
PLATFORM="${VERSION##*-}"
|
|
|
|
|
|
|
|
VERSION="$STRIPPEDNEXTTOLAST"
|
|
|
|
fi
|
|
|
|
|
2012-10-15 22:44:39 +02:00
|
|
|
BASEDIR="$BASEDIR$VERSION/"
|
2017-04-25 11:40:09 +02:00
|
|
|
if [[ $RCVERSION == *"$RCVERSIONSTRING"* ]]; then
|
|
|
|
BASEDIR="$BASEDIR$RCSUBDIR.$RCVERSION/"
|
|
|
|
fi
|
2012-10-15 22:44:39 +02:00
|
|
|
fi
|
|
|
|
else
|
2016-04-15 13:21:51 +02:00
|
|
|
echo "Error: need to specify a version on the command line"
|
|
|
|
exit 2
|
2012-10-15 22:44:39 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
#first we fetch the file containing the signature
|
2017-06-22 19:44:31 +02:00
|
|
|
WGETOUT=$(wget -N "$HOST1$BASEDIR$SIGNATUREFILENAME" 2>&1)
|
2012-10-15 22:44:39 +02:00
|
|
|
|
|
|
|
#and then see if wget completed successfully
|
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
echo "Error: couldn't fetch signature file. Have you specified the version number in the following format?"
|
2017-10-04 21:25:25 +02:00
|
|
|
echo "[$VERSIONPREFIX]<version>-[$RCVERSIONSTRING[0-9]] (example: ${VERSIONPREFIX}0.10.4-${RCVERSIONSTRING}1)"
|
2012-10-15 22:44:39 +02:00
|
|
|
echo "wget output:"
|
|
|
|
echo "$WGETOUT"|sed 's/^/\t/g'
|
|
|
|
exit 2
|
|
|
|
fi
|
|
|
|
|
2017-06-22 19:44:31 +02:00
|
|
|
WGETOUT=$(wget -N -O "$SIGNATUREFILENAME.2" "$HOST2$BASEDIR$SIGNATUREFILENAME" 2>&1)
|
|
|
|
if [ $? -ne 0 ]; then
|
|
|
|
echo "bitcoin.org failed to provide signature file, but bitcoincore.org did?"
|
|
|
|
echo "wget output:"
|
|
|
|
echo "$WGETOUT"|sed 's/^/\t/g'
|
|
|
|
clean_up $SIGNATUREFILENAME
|
|
|
|
exit 3
|
|
|
|
fi
|
|
|
|
|
|
|
|
SIGFILEDIFFS="$(diff $SIGNATUREFILENAME $SIGNATUREFILENAME.2)"
|
|
|
|
if [ "$SIGFILEDIFFS" != "" ]; then
|
|
|
|
echo "bitcoin.org and bitcoincore.org signature files were not equal?"
|
|
|
|
clean_up $SIGNATUREFILENAME $SIGNATUREFILENAME.2
|
|
|
|
exit 4
|
|
|
|
fi
|
|
|
|
|
2012-10-15 22:44:39 +02:00
|
|
|
#then we check it
|
|
|
|
GPGOUT=$(gpg --yes --decrypt --output "$TMPFILE" "$SIGNATUREFILENAME" 2>&1)
|
|
|
|
|
|
|
|
#return value 0: good signature
|
|
|
|
#return value 1: bad signature
|
|
|
|
#return value 2: gpg error
|
|
|
|
|
|
|
|
RET="$?"
|
|
|
|
if [ $RET -ne 0 ]; then
|
|
|
|
if [ $RET -eq 1 ]; then
|
|
|
|
#and notify the user if it's bad
|
|
|
|
echo "Bad signature."
|
|
|
|
elif [ $RET -eq 2 ]; then
|
2013-02-01 06:10:44 +01:00
|
|
|
#or if a gpg error has occurred
|
2015-11-16 12:54:35 +01:00
|
|
|
echo "gpg error. Do you have the Bitcoin Core binary release signing key installed?"
|
2012-10-15 22:44:39 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
echo "gpg output:"
|
|
|
|
echo "$GPGOUT"|sed 's/^/\t/g'
|
2017-06-22 19:44:31 +02:00
|
|
|
clean_up $SIGNATUREFILENAME $SIGNATUREFILENAME.2 $TMPFILE
|
2012-10-15 22:44:39 +02:00
|
|
|
exit "$RET"
|
|
|
|
fi
|
|
|
|
|
2017-04-25 11:40:09 +02:00
|
|
|
if [ -n "$PLATFORM" ]; then
|
|
|
|
grep $PLATFORM $TMPFILE > "$TMPFILE-plat"
|
|
|
|
TMPFILESIZE=$(stat -c%s "$TMPFILE-plat")
|
|
|
|
if [ $TMPFILESIZE -eq 0 ]; then
|
|
|
|
echo "error: no files matched the platform specified" && exit 3
|
|
|
|
fi
|
|
|
|
mv "$TMPFILE-plat" $TMPFILE
|
|
|
|
fi
|
|
|
|
|
2012-10-15 22:44:39 +02:00
|
|
|
#here we extract the filenames from the signature file
|
|
|
|
FILES=$(awk '{print $2}' "$TMPFILE")
|
|
|
|
|
|
|
|
#and download these one by one
|
2016-08-21 21:29:18 +02:00
|
|
|
for file in $FILES
|
2012-10-15 22:44:39 +02:00
|
|
|
do
|
2017-04-25 11:40:09 +02:00
|
|
|
echo "Downloading $file"
|
2017-06-22 19:44:31 +02:00
|
|
|
wget --quiet -N "$HOST1$BASEDIR$file"
|
2012-10-15 22:44:39 +02:00
|
|
|
done
|
|
|
|
|
|
|
|
#check hashes
|
|
|
|
DIFF=$(diff <(sha256sum $FILES) "$TMPFILE")
|
|
|
|
|
|
|
|
if [ $? -eq 1 ]; then
|
|
|
|
echo "Hashes don't match."
|
|
|
|
echo "Offending files:"
|
|
|
|
echo "$DIFF"|grep "^<"|awk '{print "\t"$3}'
|
|
|
|
exit 1
|
|
|
|
elif [ $? -gt 1 ]; then
|
|
|
|
echo "Error executing 'diff'"
|
2016-08-21 21:37:21 +02:00
|
|
|
exit 2
|
2012-10-15 22:44:39 +02:00
|
|
|
fi
|
|
|
|
|
2016-08-21 21:37:21 +02:00
|
|
|
if [ -n "$2" ]; then
|
|
|
|
echo "Clean up the binaries"
|
2017-06-22 19:44:31 +02:00
|
|
|
clean_up $FILES $SIGNATUREFILENAME $SIGNATUREFILENAME.2 $TMPFILE
|
2016-08-21 21:37:21 +02:00
|
|
|
else
|
|
|
|
echo "Keep the binaries in $WORKINGDIR"
|
|
|
|
clean_up $TMPFILE
|
|
|
|
fi
|
2012-10-15 22:44:39 +02:00
|
|
|
|
2015-11-16 12:54:35 +01:00
|
|
|
echo -e "Verified hashes of \n$FILES"
|
|
|
|
|
2012-10-15 22:44:39 +02:00
|
|
|
exit 0
|