blob: c6e544b028503fbe112ca74429b18f898fda4729 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
Doug Zongkereef39442009-04-02 12:14:19 -0700214"""
215
Tao Bao89fbb0f2017-01-10 10:47:58 -0800216from __future__ import print_function
217
Tao Bao32fcdab2018-10-12 10:30:39 -0700218import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700219import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500220import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800221import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500222import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700223import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800224import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800225import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500226import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800227import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700228import zipfile
229
230import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400231import ota_utils
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500232from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500233 PropertyFiles, SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400234import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400235from check_target_files_vintf import CheckVintfIfTrebleEnabled
236from non_ab_ota import GenerateNonAbOtaPackage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400237
Tao Bao481bab82017-12-21 11:23:09 -0800238if sys.hexversion < 0x02070000:
239 print("Python 2.7 or newer is required.", file=sys.stderr)
240 sys.exit(1)
241
Tao Bao32fcdab2018-10-12 10:30:39 -0700242logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800243
Kelvin Zhang2e417382020-08-20 11:33:11 -0400244OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700245OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700246OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700247OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700248OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700249OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
250if OPTIONS.worker_threads == 0:
251 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800252OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800253OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800254OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800255OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000256OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700257OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800258OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700259OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700260OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700261# Stash size cannot exceed cache_size * threshold.
262OPTIONS.cache_size = None
263OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800264OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700265OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700266OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700267OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700268OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800269OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800270OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700271OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500272OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700273OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700274OPTIONS.custom_images = {}
Kelvin Zhangbbfa1822021-02-03 17:19:44 -0500275OPTIONS.disable_vabc = False
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500276OPTIONS.spl_downgrade = False
Tao Bao8dcf7382015-05-21 14:09:49 -0700277
Tao Bao15a146a2018-02-21 16:06:59 -0800278POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800279DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800280AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400281
Tao Baof0c4aa22018-04-30 20:29:30 -0700282# Files to be unzipped for target diffing purpose.
283TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700284 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700285 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800286RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700287
288# Images to be excluded from secondary payload. We essentially only keep
289# 'system_other' and bootloader partitions.
290SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000291 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700292 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700293 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800294
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500295
Tao Baofabe0832018-01-17 15:52:28 -0800296class PayloadSigner(object):
297 """A class that wraps the payload signing works.
298
299 When generating a Payload, hashes of the payload and metadata files will be
300 signed with the device key, either by calling an external payload signer or
301 by calling openssl with the package key. This class provides a unified
302 interface, so that callers can just call PayloadSigner.Sign().
303
304 If an external payload signer has been specified (OPTIONS.payload_signer), it
305 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
306 that the signing key should be provided as part of the payload_signer_args.
307 Otherwise without an external signer, it uses the package key
308 (OPTIONS.package_key) and calls openssl for the signing works.
309 """
310
311 def __init__(self):
312 if OPTIONS.payload_signer is None:
313 # Prepare the payload signing key.
314 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
315 pw = OPTIONS.key_passwords[OPTIONS.package_key]
316
317 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
318 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
319 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
320 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700321 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800322
323 self.signer = "openssl"
324 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
325 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700326 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
327 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800328 else:
329 self.signer = OPTIONS.payload_signer
330 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700331 if OPTIONS.payload_signer_maximum_signature_size:
332 self.maximum_signature_size = int(
333 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700334 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700335 # The legacy config uses RSA2048 keys.
336 logger.warning("The maximum signature size for payload signer is not"
337 " set, default to 256 bytes.")
338 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700339
340 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700341 def _GetMaximumSignatureSizeInBytes(signing_key):
342 out_signature_size_file = common.MakeTempFile("signature_size")
343 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
344 out_signature_size_file), "--private_key={}".format(signing_key)]
345 common.RunAndCheckOutput(cmd)
346 with open(out_signature_size_file) as f:
347 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100348 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700349 signature_size)
350 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800351
352 def Sign(self, in_file):
353 """Signs the given input file. Returns the output filename."""
354 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
355 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700356 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800357 return out_file
358
359
Tao Bao40b18822018-01-30 18:19:04 -0800360class Payload(object):
361 """Manages the creation and the signing of an A/B OTA Payload."""
362
363 PAYLOAD_BIN = 'payload.bin'
364 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800365 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
366 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800367
Tao Bao667ff572018-02-10 00:02:40 -0800368 def __init__(self, secondary=False):
369 """Initializes a Payload instance.
370
371 Args:
372 secondary: Whether it's generating a secondary payload (default: False).
373 """
Tao Bao40b18822018-01-30 18:19:04 -0800374 self.payload_file = None
375 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800376 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800377
Tao Baof0c4aa22018-04-30 20:29:30 -0700378 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700379 # Don't pipe (buffer) the output if verbose is set. Let
380 # brillo_update_payload write to stdout/stderr directly, so its progress can
381 # be monitored.
382 if OPTIONS.verbose:
383 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
384 else:
385 common.RunAndCheckOutput(cmd)
386
Tao Bao40b18822018-01-30 18:19:04 -0800387 def Generate(self, target_file, source_file=None, additional_args=None):
388 """Generates a payload from the given target-files zip(s).
389
390 Args:
391 target_file: The filename of the target build target-files zip.
392 source_file: The filename of the source build target-files zip; or None if
393 generating a full OTA.
394 additional_args: A list of additional args that should be passed to
395 brillo_update_payload script; or None.
396 """
397 if additional_args is None:
398 additional_args = []
399
400 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
401 cmd = ["brillo_update_payload", "generate",
402 "--payload", payload_file,
403 "--target_image", target_file]
404 if source_file is not None:
405 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700406 if OPTIONS.disable_fec_computation:
407 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500408 if OPTIONS.disable_verity_computation:
409 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800410 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700411 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800412
413 self.payload_file = payload_file
414 self.payload_properties = None
415
416 def Sign(self, payload_signer):
417 """Generates and signs the hashes of the payload and metadata.
418
419 Args:
420 payload_signer: A PayloadSigner() instance that serves the signing work.
421
422 Raises:
423 AssertionError: On any failure when calling brillo_update_payload script.
424 """
425 assert isinstance(payload_signer, PayloadSigner)
426
427 # 1. Generate hashes of the payload and metadata files.
428 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
429 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
430 cmd = ["brillo_update_payload", "hash",
431 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700432 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800433 "--metadata_hash_file", metadata_sig_file,
434 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700435 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800436
437 # 2. Sign the hashes.
438 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
439 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
440
441 # 3. Insert the signatures back into the payload file.
442 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
443 suffix=".bin")
444 cmd = ["brillo_update_payload", "sign",
445 "--unsigned_payload", self.payload_file,
446 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700447 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800448 "--metadata_signature_file", signed_metadata_sig_file,
449 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700450 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800451
452 # 4. Dump the signed payload properties.
453 properties_file = common.MakeTempFile(prefix="payload-properties-",
454 suffix=".txt")
455 cmd = ["brillo_update_payload", "properties",
456 "--payload", signed_payload_file,
457 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700458 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800459
Tao Bao667ff572018-02-10 00:02:40 -0800460 if self.secondary:
461 with open(properties_file, "a") as f:
462 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
463
Tao Bao40b18822018-01-30 18:19:04 -0800464 if OPTIONS.wipe_user_data:
465 with open(properties_file, "a") as f:
466 f.write("POWERWASH=1\n")
467
468 self.payload_file = signed_payload_file
469 self.payload_properties = properties_file
470
Tao Bao667ff572018-02-10 00:02:40 -0800471 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800472 """Writes the payload to the given zip.
473
474 Args:
475 output_zip: The output ZipFile instance.
476 """
477 assert self.payload_file is not None
478 assert self.payload_properties is not None
479
Tao Bao667ff572018-02-10 00:02:40 -0800480 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800481 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
482 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
483 else:
484 payload_arcname = Payload.PAYLOAD_BIN
485 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
486
Tao Bao40b18822018-01-30 18:19:04 -0800487 # Add the signed payload file and properties into the zip. In order to
488 # support streaming, we pack them as ZIP_STORED. So these entries can be
489 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800490 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800491 compress_type=zipfile.ZIP_STORED)
492 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800493 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800494 compress_type=zipfile.ZIP_STORED)
495
496
Tao Bao481bab82017-12-21 11:23:09 -0800497def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800498 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800499 if not oem_source:
500 return None
501
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800502 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800503 for oem_file in oem_source:
504 with open(oem_file) as fp:
505 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800506 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700507
Doug Zongkereef39442009-04-02 12:14:19 -0700508
Tao Baod3fc38a2018-03-08 16:09:01 -0800509class StreamingPropertyFiles(PropertyFiles):
510 """A subclass for computing the property-files for streaming A/B OTAs."""
511
512 def __init__(self):
513 super(StreamingPropertyFiles, self).__init__()
514 self.name = 'ota-streaming-property-files'
515 self.required = (
516 # payload.bin and payload_properties.txt must exist.
517 'payload.bin',
518 'payload_properties.txt',
519 )
520 self.optional = (
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700521 # care_map is available only if dm-verity is enabled.
522 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800523 'care_map.txt',
524 # compatibility.zip is available only if target supports Treble.
525 'compatibility.zip',
526 )
527
528
Tao Bao85f16982018-03-08 16:28:33 -0800529class AbOtaPropertyFiles(StreamingPropertyFiles):
530 """The property-files for A/B OTA that includes payload_metadata.bin info.
531
532 Since P, we expose one more token (aka property-file), in addition to the ones
533 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
534 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
535 doesn't exist as a separate ZIP entry, but can be used to verify if the
536 payload can be applied on the given device.
537
538 For backward compatibility, we keep both of the 'ota-streaming-property-files'
539 and the newly added 'ota-property-files' in P. The new token will only be
540 available in 'ota-property-files'.
541 """
542
543 def __init__(self):
544 super(AbOtaPropertyFiles, self).__init__()
545 self.name = 'ota-property-files'
546
547 def _GetPrecomputed(self, input_zip):
548 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
549 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
550
551 @staticmethod
552 def _GetPayloadMetadataOffsetAndSize(input_zip):
553 """Computes the offset and size of the payload metadata for a given package.
554
555 (From system/update_engine/update_metadata.proto)
556 A delta update file contains all the deltas needed to update a system from
557 one specific version to another specific version. The update format is
558 represented by this struct pseudocode:
559
560 struct delta_update_file {
561 char magic[4] = "CrAU";
562 uint64 file_format_version;
563 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
564
565 // Only present if format_version > 1:
566 uint32 metadata_signature_size;
567
568 // The Bzip2 compressed DeltaArchiveManifest
569 char manifest[metadata_signature_size];
570
571 // The signature of the metadata (from the beginning of the payload up to
572 // this location, not including the signature itself). This is a
573 // serialized Signatures message.
574 char medatada_signature_message[metadata_signature_size];
575
576 // Data blobs for files, no specific format. The specific offset
577 // and length of each data blob is recorded in the DeltaArchiveManifest.
578 struct {
579 char data[];
580 } blobs[];
581
582 // These two are not signed:
583 uint64 payload_signatures_message_size;
584 char payload_signatures_message[];
585 };
586
587 'payload-metadata.bin' contains all the bytes from the beginning of the
588 payload, till the end of 'medatada_signature_message'.
589 """
590 payload_info = input_zip.getinfo('payload.bin')
Shashikant Baviskar338856f2018-04-12 12:11:22 +0900591 payload_offset = payload_info.header_offset
592 payload_offset += zipfile.sizeFileHeader
593 payload_offset += len(payload_info.extra) + len(payload_info.filename)
Tao Bao85f16982018-03-08 16:28:33 -0800594 payload_size = payload_info.file_size
595
Tao Bao59cf0c52019-06-25 10:04:24 -0700596 with input_zip.open('payload.bin') as payload_fp:
Tao Bao85f16982018-03-08 16:28:33 -0800597 header_bin = payload_fp.read(24)
598
599 # network byte order (big-endian)
600 header = struct.unpack("!IQQL", header_bin)
601
602 # 'CrAU'
603 magic = header[0]
604 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic)
605
606 manifest_size = header[2]
607 metadata_signature_size = header[3]
608 metadata_total = 24 + manifest_size + metadata_signature_size
609 assert metadata_total < payload_size
610
611 return (payload_offset, metadata_total)
612
613
Yifan Hong38ab4d82020-06-18 15:19:56 -0700614def UpdatesInfoForSpecialUpdates(content, partitions_filter,
615 delete_keys=None):
616 """ Updates info file for secondary payload generation, partial update, etc.
617
618 Scan each line in the info file, and remove the unwanted partitions from
619 the dynamic partition list in the related properties. e.g.
620 "super_google_dynamic_partitions_partition_list=system vendor product"
621 will become "super_google_dynamic_partitions_partition_list=system".
622
623 Args:
624 content: The content of the input info file. e.g. misc_info.txt.
625 partitions_filter: A function to filter the desired partitions from a given
626 list
627 delete_keys: A list of keys to delete in the info file
628
629 Returns:
630 A string of the updated info content.
631 """
632
633 output_list = []
634 # The suffix in partition_list variables that follows the name of the
635 # partition group.
636 list_suffix = 'partition_list'
637 for line in content.splitlines():
638 if line.startswith('#') or '=' not in line:
639 output_list.append(line)
640 continue
641 key, value = line.strip().split('=', 1)
642
643 if delete_keys and key in delete_keys:
644 pass
645 elif key.endswith(list_suffix):
646 partitions = value.split()
647 # TODO for partial update, partitions in the same group must be all
648 # updated or all omitted
649 partitions = filter(partitions_filter, partitions)
650 output_list.append('{}={}'.format(key, ' '.join(partitions)))
651 else:
652 output_list.append(line)
653 return '\n'.join(output_list)
654
655
Tao Bao15a146a2018-02-21 16:06:59 -0800656def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800657 """Returns a target-files.zip file for generating secondary payload.
658
659 Although the original target-files.zip already contains secondary slot
660 images (i.e. IMAGES/system_other.img), we need to rename the files to the
661 ones without _other suffix. Note that we cannot instead modify the names in
662 META/ab_partitions.txt, because there are no matching partitions on device.
663
664 For the partitions that don't have secondary images, the ones for primary
665 slot will be used. This is to ensure that we always have valid boot, vbmeta,
666 bootloader images in the inactive slot.
667
668 Args:
669 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800670 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800671
672 Returns:
673 The filename of the target-files.zip for generating secondary payload.
674 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700675
676 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700677 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700678 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700679 content = f.read()
680 # Remove virtual_ab flag from secondary payload so that OTA client
681 # don't use snapshots for secondary update
682 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
683 return UpdatesInfoForSpecialUpdates(
684 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
685 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700686
Tao Baof7140c02018-01-30 17:09:24 -0800687 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
688 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
689
Kelvin Zhang928c2342020-09-22 16:15:57 -0400690 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800691 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700692
Tao Bao0ff15de2019-03-20 11:26:06 -0700693 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800694 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800695 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
696 if info.filename == 'IMAGES/system_other.img':
697 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
698
699 # Primary images and friends need to be skipped explicitly.
700 elif info.filename in ('IMAGES/system.img',
701 'IMAGES/system.map'):
702 pass
Tao Bao3e759462019-09-17 22:43:11 -0700703
704 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
705 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
706 image_name = os.path.basename(info.filename)
707 if image_name not in ['{}.img'.format(partition) for partition in
708 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
709 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800710
Tao Bao15a146a2018-02-21 16:06:59 -0800711 # Skip copying the postinstall config if requested.
712 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
713 pass
714
Tianjie Xu1c808002019-09-11 00:29:26 -0700715 elif info.filename.startswith('META/'):
716 # Remove the unnecessary partitions for secondary images from the
717 # ab_partitions file.
718 if info.filename == AB_PARTITIONS:
719 with open(unzipped_file) as f:
720 partition_list = f.read().splitlines()
721 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700722 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400723 common.ZipWriteStr(target_zip, info.filename,
724 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700725 # Remove the unnecessary partitions from the dynamic partitions list.
726 elif (info.filename == 'META/misc_info.txt' or
727 info.filename == DYNAMIC_PARTITION_INFO):
728 modified_info = GetInfoForSecondaryImages(unzipped_file)
729 common.ZipWriteStr(target_zip, info.filename, modified_info)
730 else:
731 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800732
Tao Baof7140c02018-01-30 17:09:24 -0800733 common.ZipClose(target_zip)
734
735 return target_file
736
737
Tao Bao15a146a2018-02-21 16:06:59 -0800738def GetTargetFilesZipWithoutPostinstallConfig(input_file):
739 """Returns a target-files.zip that's not containing postinstall_config.txt.
740
741 This allows brillo_update_payload script to skip writing all the postinstall
742 hooks in the generated payload. The input target-files.zip file will be
743 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
744 contain the postinstall_config.txt entry, the input file will be returned.
745
746 Args:
747 input_file: The input target-files.zip filename.
748
749 Returns:
750 The filename of target-files.zip that doesn't contain postinstall config.
751 """
752 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400753 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800754 if POSTINSTALL_CONFIG not in input_zip.namelist():
755 return input_file
756
757 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
758 shutil.copyfile(input_file, target_file)
759 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
760 return target_file
761
Kelvin Zhang06400172021-03-05 15:42:03 -0500762
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400763def ParseInfoDict(target_file_path):
764 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
765 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800766
Kelvin Zhang06400172021-03-05 15:42:03 -0500767
Yifan Hong38ab4d82020-06-18 15:19:56 -0700768def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
769 """Returns a target-files.zip for partial ota update package generation.
770
771 This function modifies ab_partitions list with the desired partitions before
772 calling the brillo_update_payload script. It also cleans up the reference to
773 the excluded partitions in the info file, e.g misc_info.txt.
774
775 Args:
776 input_file: The input target-files.zip filename.
777 ab_partitions: A list of partitions to include in the partial update
778
779 Returns:
780 The filename of target-files.zip used for partial ota update.
781 """
782
783 def AddImageForPartition(partition_name):
784 """Add the archive name for a given partition to the copy list."""
785 for prefix in ['IMAGES', 'RADIO']:
786 image_path = '{}/{}.img'.format(prefix, partition_name)
787 if image_path in namelist:
788 copy_entries.append(image_path)
789 map_path = '{}/{}.map'.format(prefix, partition_name)
790 if map_path in namelist:
791 copy_entries.append(map_path)
792 return
793
794 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
795
796 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400797 original_ab_partitions = input_zip.read(
798 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700799 namelist = input_zip.namelist()
800
801 unrecognized_partitions = [partition for partition in ab_partitions if
802 partition not in original_ab_partitions]
803 if unrecognized_partitions:
804 raise ValueError("Unrecognized partitions when generating partial updates",
805 unrecognized_partitions)
806
807 logger.info("Generating partial updates for %s", ab_partitions)
808
809 copy_entries = ['META/update_engine_config.txt']
810 for partition_name in ab_partitions:
811 AddImageForPartition(partition_name)
812
813 # Use zip2zip to avoid extracting the zipfile.
814 partial_target_file = common.MakeTempFile(suffix='.zip')
815 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
816 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
817 common.RunAndCheckOutput(cmd)
818
819 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
820 allowZip64=True)
821 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
822 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
823 '\n'.join(ab_partitions))
824 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
825 if info_file not in input_zip.namelist():
826 logger.warning('Cannot find %s in input zipfile', info_file)
827 continue
828 content = input_zip.read(info_file).decode()
829 modified_info = UpdatesInfoForSpecialUpdates(
830 content, lambda p: p in ab_partitions)
831 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
832
833 # TODO(xunchang) handle 'META/care_map.pb', 'META/postinstall_config.txt'
834 common.ZipClose(partial_target_zip)
835
836 return partial_target_file
837
838
Yifan Hong50e79542018-11-08 17:44:12 -0800839def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800840 super_block_devices,
841 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800842 """Returns a target-files.zip for retrofitting dynamic partitions.
843
844 This allows brillo_update_payload to generate an OTA based on the exact
845 bits on the block devices. Postinstall is disabled.
846
847 Args:
848 input_file: The input target-files.zip filename.
849 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800850 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800851
852 Returns:
853 The filename of target-files.zip with *.img replaced with super_*.img for
854 each block device in super_block_devices.
855 """
856 assert super_block_devices, "No super_block_devices are specified."
857
858 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800859 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800860
861 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
862 shutil.copyfile(input_file, target_file)
863
Kelvin Zhang928c2342020-09-22 16:15:57 -0400864 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800865 namelist = input_zip.namelist()
866
Yifan Hongb433eba2019-03-06 12:42:53 -0800867 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
868
869 # Remove partitions from META/ab_partitions.txt that is in
870 # dynamic_partition_list but not in super_block_devices so that
871 # brillo_update_payload won't generate update for those logical partitions.
872 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
873 with open(ab_partitions_file) as f:
874 ab_partitions_lines = f.readlines()
875 ab_partitions = [line.strip() for line in ab_partitions_lines]
876 # Assert that all super_block_devices are in ab_partitions
877 super_device_not_updated = [partition for partition in super_block_devices
878 if partition not in ab_partitions]
879 assert not super_device_not_updated, \
880 "{} is in super_block_devices but not in {}".format(
881 super_device_not_updated, AB_PARTITIONS)
882 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400883 new_ab_partitions = common.MakeTempFile(
884 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800885 with open(new_ab_partitions, 'w') as f:
886 for partition in ab_partitions:
887 if (partition in dynamic_partition_list and
Kelvin Zhang06400172021-03-05 15:42:03 -0500888 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700889 logger.info("Dropping %s from ab_partitions.txt", partition)
890 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800891 f.write(partition + "\n")
892 to_delete = [AB_PARTITIONS]
893
Yifan Hong50e79542018-11-08 17:44:12 -0800894 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800895 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800896
897 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
898 # is a regular update on devices without dynamic partitions support.
899 to_delete += [DYNAMIC_PARTITION_INFO]
900
Tao Bao03fecb62018-11-28 10:59:23 -0800901 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700902 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800903 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800904
905 common.ZipDelete(target_file, to_delete)
906
Yifan Hong50e79542018-11-08 17:44:12 -0800907 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
908
909 # Write super_{foo}.img as {foo}.img.
910 for src, dst in replace.items():
911 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700912 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800913 unzipped_file = os.path.join(input_tmp, *src.split('/'))
914 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
915
Yifan Hongb433eba2019-03-06 12:42:53 -0800916 # Write new ab_partitions.txt file
917 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
918
Yifan Hong50e79542018-11-08 17:44:12 -0800919 common.ZipClose(target_zip)
920
921 return target_file
922
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400923
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700924def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
925 """Returns a target-files.zip for custom partitions update.
926
927 This function modifies ab_partitions list with the desired custom partitions
928 and puts the custom images into the target target-files.zip.
929
930 Args:
931 input_file: The input target-files.zip filename.
932 custom_images: A map of custom partitions and custom images.
933
934 Returns:
935 The filename of a target-files.zip which has renamed the custom images in
936 the IMAGS/ to their partition names.
937 """
938 # Use zip2zip to avoid extracting the zipfile.
939 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
940 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
941
942 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
943 namelist = input_zip.namelist()
944
945 # Write {custom_image}.img as {custom_partition}.img.
946 for custom_partition, custom_image in custom_images.items():
947 default_custom_image = '{}.img'.format(custom_partition)
948 if default_custom_image != custom_image:
949 logger.info("Update custom partition '%s' with '%s'",
950 custom_partition, custom_image)
951 # Default custom image need to be deleted first.
952 namelist.remove('IMAGES/{}'.format(default_custom_image))
953 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
954 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
955 default_custom_image)])
956
957 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
958 common.RunAndCheckOutput(cmd)
959
960 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -0800961
Kelvin Zhang06400172021-03-05 15:42:03 -0500962
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400963def GeneratePartitionTimestampFlags(partition_state):
964 partition_timestamps = [
965 part.partition_name + ":" + part.version
966 for part in partition_state]
967 return ["--partition_timestamps", ",".join(partition_timestamps)]
968
Kelvin Zhang06400172021-03-05 15:42:03 -0500969
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500970def GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang06400172021-03-05 15:42:03 -0500971 pre_partition_state, post_partition_state):
Kelvin Zhang80195722020-11-04 14:38:34 -0500972 assert pre_partition_state is not None
973 partition_timestamps = {}
974 for part in pre_partition_state:
975 partition_timestamps[part.partition_name] = part.version
976 for part in post_partition_state:
977 partition_timestamps[part.partition_name] = \
Kelvin Zhang06400172021-03-05 15:42:03 -0500978 max(part.version, partition_timestamps[part.partition_name])
Kelvin Zhang80195722020-11-04 14:38:34 -0500979 return [
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500980 "--partition_timestamps",
Kelvin Zhang06400172021-03-05 15:42:03 -0500981 ",".join([key + ":" + val for (key, val)
982 in partition_timestamps.items()])
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500983 ]
Kelvin Zhang80195722020-11-04 14:38:34 -0500984
Kelvin Zhang06400172021-03-05 15:42:03 -0500985
Kelvin Zhang65029a22020-11-03 10:07:51 -0500986def IsSparseImage(filepath):
987 with open(filepath, 'rb') as fp:
988 # Magic for android sparse image format
989 # https://source.android.com/devices/bootloader/images
990 return fp.read(4) == b'\x3A\xFF\x26\xED'
991
Kelvin Zhang06400172021-03-05 15:42:03 -0500992
Kelvin Zhang65029a22020-11-03 10:07:51 -0500993def SupportsMainlineGkiUpdates(target_file):
994 """Return True if the build supports MainlineGKIUpdates.
995
996 This function scans the product.img file in IMAGES/ directory for
997 pattern |*/apex/com.android.gki.*.apex|. If there are files
998 matching this pattern, conclude that build supports mainline
999 GKI and return True
1000
1001 Args:
1002 target_file: Path to a target_file.zip, or an extracted directory
1003 Return:
1004 True if thisb uild supports Mainline GKI Updates.
1005 """
1006 if target_file is None:
1007 return False
1008 if os.path.isfile(target_file):
1009 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1010 if not os.path.isdir(target_file):
1011 assert os.path.isdir(target_file), \
1012 "{} must be a path to zip archive or dir containing extracted"\
1013 " target_files".format(target_file)
1014 image_file = os.path.join(target_file, "IMAGES", "product.img")
1015
1016 if not os.path.isfile(image_file):
1017 return False
1018
1019 if IsSparseImage(image_file):
1020 # Unsparse the image
1021 tmp_img = common.MakeTempFile(suffix=".img")
1022 subprocess.check_output(["simg2img", image_file, tmp_img])
1023 image_file = tmp_img
1024
1025 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1026 output = subprocess.check_output(cmd).decode()
1027
1028 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1029 return pattern.search(output) is not None
1030
Kelvin Zhang06400172021-03-05 15:42:03 -05001031
Tao Baof0c4aa22018-04-30 20:29:30 -07001032def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001033 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001034 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001035 if not OPTIONS.no_signing:
1036 staging_file = common.MakeTempFile(suffix='.zip')
1037 else:
1038 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001039 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001040 compression=zipfile.ZIP_DEFLATED,
1041 allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001042
Tao Bao481bab82017-12-21 11:23:09 -08001043 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001044 assert "ab_partitions" in OPTIONS.source_info_dict, \
1045 "META/ab_partitions.txt is required for ab_update."
1046 assert "ab_partitions" in OPTIONS.target_info_dict, \
1047 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001048 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1049 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang31233e52020-11-03 13:42:46 -05001050 vendor_prop = source_info.info_dict.get("vendor.build.prop")
1051 if vendor_prop and \
Kelvin Zhang06400172021-03-05 15:42:03 -05001052 vendor_prop.GetProp("ro.virtual_ab.compression.enabled") == "true":
Kelvin Zhang31233e52020-11-03 13:42:46 -05001053 # TODO(zhangkelvin) Remove this once FEC on VABC is supported
1054 logger.info("Virtual AB Compression enabled, disabling FEC")
1055 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001056 OPTIONS.disable_verity_computation = True
Tao Bao481bab82017-12-21 11:23:09 -08001057 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001058 assert "ab_partitions" in OPTIONS.info_dict, \
1059 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001060 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001061 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001062
Yifan Hong38ab4d82020-06-18 15:19:56 -07001063 additional_args = []
1064
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001065 # Prepare custom images.
1066 if OPTIONS.custom_images:
1067 target_file = GetTargetFilesZipForCustomImagesUpdates(
1068 target_file, OPTIONS.custom_images)
1069
Yifan Hong50e79542018-11-08 17:44:12 -08001070 if OPTIONS.retrofit_dynamic_partitions:
1071 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001072 target_file, target_info.get("super_block_devices").strip().split(),
1073 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001074 elif OPTIONS.partial:
1075 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1076 OPTIONS.partial)
1077 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -08001078 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001079 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001080 # Target_file may have been modified, reparse ab_partitions
1081 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1082 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001083 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001084
Kelvin Zhang39aea442020-08-17 11:04:25 -04001085 # Metadata to comply with Android OTA package format.
1086 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001087 # Generate payload.
1088 payload = Payload()
1089
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001090 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001091 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001092 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001093 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001094 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001095 metadata.precondition.partition_state,
1096 metadata.postcondition.partition_state
1097 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001098 else:
Tianjiea2076132020-08-19 17:25:32 -07001099 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001100 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1101 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001102
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001103 if OPTIONS.disable_vabc:
1104 additional_args += ["--disable_vabc", "true"]
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001105 additional_args += ["--max_timestamp", max_timestamp]
1106
Kelvin Zhang65029a22020-11-03 10:07:51 -05001107 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhang06400172021-03-05 15:42:03 -05001108 logger.warning(
1109 "Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001110 additional_args.extend(["--full_boot", "true"])
1111
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001112 payload.Generate(
1113 target_file,
1114 source_file,
1115 additional_args + partition_timestamps_flags
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001116 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001117
Tao Bao40b18822018-01-30 18:19:04 -08001118 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -08001119 payload_signer = PayloadSigner()
1120 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001121
Tao Bao40b18822018-01-30 18:19:04 -08001122 # Write the payload into output zip.
1123 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001124
Tao Baof7140c02018-01-30 17:09:24 -08001125 # Generate and include the secondary payload that installs secondary images
1126 # (e.g. system_other.img).
1127 if OPTIONS.include_secondary:
1128 # We always include a full payload for the secondary slot, even when
1129 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001130 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1131 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001132 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001133 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001134 additional_args=["--max_timestamp",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001135 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001136 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001137 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001138
Tianjie Xucfa86222016-03-07 16:31:19 -08001139 # If dm-verity is supported for the device, copy contents of care_map
1140 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001141 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001142 if (target_info.get("verity") == "true" or
Kelvin Zhang06400172021-03-05 15:42:03 -05001143 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001144 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1145 "META/" + x in target_zip.namelist()]
1146
1147 # Adds care_map if either the protobuf format or the plain text one exists.
1148 if care_map_list:
1149 care_map_name = care_map_list[0]
1150 care_map_data = target_zip.read("META/" + care_map_name)
1151 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001152 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001153 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001154 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001155 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001156 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001157
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001158 # Copy apex_info.pb over to generated OTA package.
1159 try:
1160 apex_info_entry = target_zip.getinfo("META/apex_info.pb")
1161 with target_zip.open(apex_info_entry, "r") as zfp:
1162 common.ZipWriteStr(output_zip, "apex_info.pb", zfp.read(),
Kelvin Zhang06400172021-03-05 15:42:03 -05001163 compress_type=zipfile.ZIP_STORED)
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001164 except KeyError:
1165 logger.warning("target_file doesn't contain apex_info.pb %s", target_file)
1166
Tao Bao21803d32017-04-19 10:16:09 -07001167 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001168
Yifan Hong9276cf02019-08-21 16:37:04 -07001169 CheckVintfIfTrebleEnabled(target_file, target_info)
1170
Tao Baofe5b69a2018-03-02 09:47:43 -08001171 # We haven't written the metadata entry yet, which will be handled in
1172 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001173 common.ZipClose(output_zip)
1174
Tao Bao85f16982018-03-08 16:28:33 -08001175 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1176 # all the info of the latter. However, system updaters and OTA servers need to
1177 # take time to switch to the new flag. We keep both of the flags for
1178 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001179 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001180 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001181 StreamingPropertyFiles(),
1182 )
1183 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001184
Tao Baoc098e9e2016-01-07 13:03:56 -08001185
Doug Zongkereef39442009-04-02 12:14:19 -07001186def main(argv):
1187
1188 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001189 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001190 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001191 elif o in ("-i", "--incremental_from"):
1192 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001193 elif o == "--full_radio":
1194 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001195 elif o == "--full_bootloader":
1196 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001197 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001198 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001199 elif o == "--downgrade":
1200 OPTIONS.downgrade = True
1201 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001202 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001203 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001204 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001205 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001206 elif o == "--oem_no_mount":
1207 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001208 elif o in ("-e", "--extra_script"):
1209 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001210 elif o in ("-t", "--worker_threads"):
1211 if a.isdigit():
1212 OPTIONS.worker_threads = int(a)
1213 else:
1214 raise ValueError("Cannot parse value %r for option %r - only "
1215 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001216 elif o in ("-2", "--two_step"):
1217 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001218 elif o == "--include_secondary":
1219 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001220 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001221 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001222 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001223 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001224 elif o == "--block":
1225 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001226 elif o in ("-b", "--binary"):
1227 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001228 elif o == "--stash_threshold":
1229 try:
1230 OPTIONS.stash_threshold = float(a)
1231 except ValueError:
1232 raise ValueError("Cannot parse value %r for option %r - expecting "
1233 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001234 elif o == "--log_diff":
1235 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001236 elif o == "--payload_signer":
1237 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001238 elif o == "--payload_signer_args":
1239 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001240 elif o == "--payload_signer_maximum_signature_size":
1241 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001242 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001243 # TODO(Xunchang) remove this option after cleaning up the callers.
1244 logger.warning("The option '--payload_signer_key_size' is deprecated."
1245 " Use '--payload_signer_maximum_signature_size' instead.")
1246 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001247 elif o == "--extracted_input_target_files":
1248 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001249 elif o == "--skip_postinstall":
1250 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001251 elif o == "--retrofit_dynamic_partitions":
1252 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001253 elif o == "--skip_compatibility_check":
1254 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001255 elif o == "--output_metadata_path":
1256 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001257 elif o == "--disable_fec_computation":
1258 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001259 elif o == "--disable_verity_computation":
1260 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001261 elif o == "--force_non_ab":
1262 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001263 elif o == "--boot_variable_file":
1264 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001265 elif o == "--partial":
1266 partitions = a.split()
1267 if not partitions:
1268 raise ValueError("Cannot parse partitions in {}".format(a))
1269 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001270 elif o == "--custom_image":
1271 custom_partition, custom_image = a.split("=")
1272 OPTIONS.custom_images[custom_partition] = custom_image
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001273 elif o == "--disable_vabc":
1274 OPTIONS.disable_vabc = True
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001275 elif o == "--spl_downgrade":
1276 OPTIONS.spl_downgrade = True
Kelvin Zhang06400172021-03-05 15:42:03 -05001277 OPTIONS.wipe_user_data = True
Doug Zongkereef39442009-04-02 12:14:19 -07001278 else:
1279 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001280 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001281
1282 args = common.ParseOptions(argv, __doc__,
Tao Bao337633f2017-12-06 15:20:19 -08001283 extra_opts="b:k:i:d:e:t:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001284 extra_long_opts=[
Dan Albert8b72aef2015-03-23 19:13:21 -07001285 "package_key=",
1286 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001287 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001288 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001289 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001290 "downgrade",
Tao Bao3e6161a2017-02-28 11:48:48 -08001291 "override_timestamp",
Dan Albert8b72aef2015-03-23 19:13:21 -07001292 "extra_script=",
1293 "worker_threads=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001294 "two_step",
Tao Baof7140c02018-01-30 17:09:24 -08001295 "include_secondary",
Dan Albert8b72aef2015-03-23 19:13:21 -07001296 "no_signing",
1297 "block",
1298 "binary=",
1299 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001300 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001301 "verify",
Tao Bao8dcf7382015-05-21 14:09:49 -07001302 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001303 "log_diff=",
Tao Baodea0f8b2016-06-20 17:55:06 -07001304 "payload_signer=",
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001305 "payload_signer_args=",
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001306 "payload_signer_maximum_signature_size=",
xunchang376cc7c2019-04-08 23:04:58 -07001307 "payload_signer_key_size=",
Dan Willemsencea5cd22017-03-21 14:44:27 -07001308 "extracted_input_target_files=",
Tao Bao15a146a2018-02-21 16:06:59 -08001309 "skip_postinstall",
Yifan Hong50e79542018-11-08 17:44:12 -08001310 "retrofit_dynamic_partitions",
xunchangabfa2652019-02-19 16:27:10 -08001311 "skip_compatibility_check",
xunchang1cfe2512019-02-19 14:14:48 -08001312 "output_metadata_path=",
Tianjie Xu1b079832019-08-28 12:19:23 -07001313 "disable_fec_computation",
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001314 "disable_verity_computation",
Yifan Hong65afc072020-04-17 10:08:10 -07001315 "force_non_ab",
Tianjied6867162020-05-10 14:30:13 -07001316 "boot_variable_file=",
Yifan Hong38ab4d82020-06-18 15:19:56 -07001317 "partial=",
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001318 "custom_image=",
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001319 "disable_vabc",
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001320 "spl_downgrade"
Dan Albert8b72aef2015-03-23 19:13:21 -07001321 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001322
1323 if len(args) != 2:
1324 common.Usage(__doc__)
1325 sys.exit(1)
1326
Tao Bao32fcdab2018-10-12 10:30:39 -07001327 common.InitLogging()
1328
Tao Bao2db13852018-01-08 22:28:57 -08001329 # Load the build info dicts from the zip directly or the extracted input
1330 # directory. We don't need to unzip the entire target-files zips, because they
1331 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1332 # When loading the info dicts, we don't need to provide the second parameter
1333 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1334 # some properties with their actual paths, such as 'selinux_fc',
1335 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001336 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001337 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001338 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001339 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001340
1341 if OPTIONS.downgrade:
1342 # We should only allow downgrading incrementals (as opposed to full).
1343 # Otherwise the device may go back from arbitrary build with this full
1344 # OTA package.
1345 if OPTIONS.incremental_source is None:
1346 raise ValueError("Cannot generate downgradable full OTAs")
1347
Yifan Hong38ab4d82020-06-18 15:19:56 -07001348 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1349 # target-file and reload the info_dict. So the info will be consistent with
1350 # the modified target-file.
1351
Tao Bao32fcdab2018-10-12 10:30:39 -07001352 logger.info("--- target info ---")
1353 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001354
1355 # Load the source build dict if applicable.
1356 if OPTIONS.incremental_source is not None:
1357 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001358 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001359
Tao Bao32fcdab2018-10-12 10:30:39 -07001360 logger.info("--- source info ---")
1361 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001362
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001363 if OPTIONS.partial:
1364 OPTIONS.info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001365 list(
1366 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1367 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001368 if OPTIONS.source_info_dict:
1369 OPTIONS.source_info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001370 list(
1371 set(OPTIONS.source_info_dict['ab_partitions']) &
1372 set(OPTIONS.partial)
1373 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001374
Tao Bao2db13852018-01-08 22:28:57 -08001375 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001376 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1377
Yifan Hong50e79542018-11-08 17:44:12 -08001378 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001379 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001380 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001381 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang06400172021-03-05 15:42:03 -05001382 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001383 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1384 raise common.ExternalError(
1385 "Expect to generate incremental OTA for retrofitting dynamic "
1386 "partitions, but dynamic_partition_retrofit is not set in target "
1387 "build.")
1388 logger.info("Implicitly generating retrofit incremental OTA.")
1389 OPTIONS.retrofit_dynamic_partitions = True
1390
1391 # Skip postinstall for retrofitting dynamic partitions.
1392 if OPTIONS.retrofit_dynamic_partitions:
1393 OPTIONS.skip_postinstall = True
1394
Tao Baoc098e9e2016-01-07 13:03:56 -08001395 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001396 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1397 if OPTIONS.force_non_ab:
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001398 assert allow_non_ab,\
Kelvin Zhang06400172021-03-05 15:42:03 -05001399 "--force_non_ab only allowed on devices that supports non-A/B"
Yifan Hong65afc072020-04-17 10:08:10 -07001400 assert ab_update, "--force_non_ab only allowed on A/B devices"
1401
1402 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001403
Christian Oderf63e2cd2017-05-01 22:30:15 +02001404 # Use the default key to sign the package if not specified with package_key.
1405 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001406 # A/B update is getting created.
1407 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001408 if OPTIONS.package_key is None:
1409 OPTIONS.package_key = OPTIONS.info_dict.get(
1410 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001411 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001412 # Get signing keys
1413 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
Kelvin Zhangeb586ef2021-02-08 20:11:49 -05001414 private_key_path = OPTIONS.package_key + OPTIONS.private_key_suffix
1415 if not os.path.exists(private_key_path):
1416 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001417 "Private key {} doesn't exist. Make sure you passed the"
1418 " correct key path through -k option".format(
1419 private_key_path)
1420 )
Christian Oderf63e2cd2017-05-01 22:30:15 +02001421
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001422 if OPTIONS.source_info_dict:
1423 source_build_prop = OPTIONS.source_info_dict["build.prop"]
1424 target_build_prop = OPTIONS.target_info_dict["build.prop"]
1425 source_spl = source_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
1426 target_spl = target_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001427 is_spl_downgrade = target_spl < source_spl
Kelvin Zhang06400172021-03-05 15:42:03 -05001428 if is_spl_downgrade and not OPTIONS.spl_downgrade and not OPTIONS.downgrade:
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001429 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001430 "Target security patch level {} is older than source SPL {} applying "
1431 "such OTA will likely cause device fail to boot. Pass --spl_downgrade "
1432 "to override this check. This script expects security patch level to "
1433 "be in format yyyy-mm-dd (e.x. 2021-02-05). It's possible to use "
1434 "separators other than -, so as long as it's used consistenly across "
1435 "all SPL dates".format(target_spl, source_spl))
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001436 elif not is_spl_downgrade and OPTIONS.spl_downgrade:
1437 raise ValueError("--spl_downgrade specified but no actual SPL downgrade"
1438 " detected. Please only pass in this flag if you want a"
1439 " SPL downgrade. Target SPL: {} Source SPL: {}"
1440 .format(target_spl, source_spl))
Yifan Hong65afc072020-04-17 10:08:10 -07001441 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001442 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001443 target_file=args[0],
1444 output_file=args[1],
1445 source_file=OPTIONS.incremental_source)
1446
Dan Willemsencea5cd22017-03-21 14:44:27 -07001447 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001448 GenerateNonAbOtaPackage(
1449 target_file=args[0],
1450 output_file=args[1],
1451 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001452
Tao Baof0c4aa22018-04-30 20:29:30 -07001453 # Post OTA generation works.
1454 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1455 logger.info("Generating diff logs...")
1456 logger.info("Unzipping target-files for diffing...")
1457 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1458 source_dir = common.UnzipTemp(
1459 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001460
Tao Baof0c4aa22018-04-30 20:29:30 -07001461 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001462 target_files_diff.recursiveDiff(
1463 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001464
Tao Bao32fcdab2018-10-12 10:30:39 -07001465 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001466
1467
1468if __name__ == '__main__':
1469 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001470 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001471 main(sys.argv[1:])
Tao Bao32fcdab2018-10-12 10:30:39 -07001472 except common.ExternalError:
1473 logger.exception("\n ERROR:\n")
Doug Zongkereef39442009-04-02 12:14:19 -07001474 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07001475 finally:
1476 common.Cleanup()