blob: 392e9d013b82061eec1b34e63c6df4711ba164da [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
David Anderson45b42302021-03-11 12:58:32 -0800214
215 --disable_vabc
216 Disable Virtual A/B Compression, for builds that have compression enabled
217 by default.
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400218
219 --vabc_downgrade
220 Don't disable Virtual A/B Compression for downgrading OTAs.
221 For VABC downgrades, we must finish merging before doing data wipe, and
222 since data wipe is required for downgrading OTA, this might cause long
223 wait time in recovery.
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700224
225 --enable_vabc_xor
226 Enable the VABC xor feature. Will reduce space requirements for OTA
227
Tianjiee7ab38d2021-09-08 19:09:38 -0700228 --force_minor_version
229 Override the update_engine minor version for delta generation.
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -0700230
231 --compressor_types
232 A colon ':' separated list of compressors. Allowed values are bz2 and brotli.
Kelvin Zhang410bb382022-01-06 09:15:54 -0800233
234 --enable_zucchini
235 Whether to enable to zucchini feature. Will generate smaller OTA but uses more memory.
Kelvin Zhangf2728d62022-01-10 11:42:36 -0800236
237 --enable_lz4diff
238 Whether to enable lz4diff feature. Will generate smaller OTA for EROFS but
239 uses more memory.
Kelvin Zhange174c322022-03-01 15:51:09 -0800240
241 --spl_downgrade
242 Force generate an SPL downgrade OTA. Only needed if target build has an
243 older SPL.
Kelvin Zhang84b3a282022-03-04 12:26:20 -0800244
245 --vabc_compression_param
246 Compression algorithm to be used for VABC. Available options: gz, brotli, none
Kelvin Zhang0b7207c2022-08-26 17:49:08 +0000247
248 --security_patch_level
249 Override the security patch level in target files
Doug Zongkereef39442009-04-02 12:14:19 -0700250"""
251
Tao Bao89fbb0f2017-01-10 10:47:58 -0800252from __future__ import print_function
253
Tao Bao32fcdab2018-10-12 10:30:39 -0700254import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700255import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500256import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800257import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500258import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700259import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800260import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800261import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500262import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800263import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700264import zipfile
265
Kelvin Zhang766eea72021-06-03 09:36:08 -0400266import care_map_pb2
Doug Zongkereef39442009-04-02 12:14:19 -0700267import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400268import ota_utils
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500269from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400270 PropertyFiles, SECURITY_PATCH_LEVEL_PROP_NAME, GetZipEntryOffset)
Kelvin Zhang26390482021-11-02 14:31:10 -0700271from common import IsSparseImage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400272import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400273from check_target_files_vintf import CheckVintfIfTrebleEnabled
274from non_ab_ota import GenerateNonAbOtaPackage
Kelvin Zhang059bf6e2022-08-12 14:03:41 -0700275from payload_signer import PayloadSigner
Kelvin Zhang0876c412020-06-23 15:06:58 -0400276
Tao Bao481bab82017-12-21 11:23:09 -0800277if sys.hexversion < 0x02070000:
278 print("Python 2.7 or newer is required.", file=sys.stderr)
279 sys.exit(1)
280
Tao Bao32fcdab2018-10-12 10:30:39 -0700281logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800282
Kelvin Zhang2e417382020-08-20 11:33:11 -0400283OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700284OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700285OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700286OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700287OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700288OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
289if OPTIONS.worker_threads == 0:
290 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800291OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800292OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800293OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800294OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000295OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700296OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800297OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700298OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700299OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700300# Stash size cannot exceed cache_size * threshold.
301OPTIONS.cache_size = None
302OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800303OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700304OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700305OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700306OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700307OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800308OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800309OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700310OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500311OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700312OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700313OPTIONS.custom_images = {}
Kelvin Zhangbbfa1822021-02-03 17:19:44 -0500314OPTIONS.disable_vabc = False
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500315OPTIONS.spl_downgrade = False
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400316OPTIONS.vabc_downgrade = False
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700317OPTIONS.enable_vabc_xor = True
Tianjiee7ab38d2021-09-08 19:09:38 -0700318OPTIONS.force_minor_version = None
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -0700319OPTIONS.compressor_types = None
Kelvin Zhangf2728d62022-01-10 11:42:36 -0800320OPTIONS.enable_zucchini = True
321OPTIONS.enable_lz4diff = False
Kelvin Zhang84b3a282022-03-04 12:26:20 -0800322OPTIONS.vabc_compression_param = None
Kelvin Zhang0b7207c2022-08-26 17:49:08 +0000323OPTIONS.security_patch_level = None
Tao Bao8dcf7382015-05-21 14:09:49 -0700324
Tao Bao15a146a2018-02-21 16:06:59 -0800325POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800326DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800327AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400328
Tao Baof0c4aa22018-04-30 20:29:30 -0700329# Files to be unzipped for target diffing purpose.
330TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700331 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Ramji Jiyani13a41372022-01-27 07:05:08 +0000332 'VENDOR_DLKM/*', 'ODM_DLKM/*', 'SYSTEM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800333RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700334
335# Images to be excluded from secondary payload. We essentially only keep
336# 'system_other' and bootloader partitions.
337SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000338 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Ramji Jiyani13a41372022-01-27 07:05:08 +0000339 'system_dlkm', 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor',
340 'vendor', 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800341
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500342
Tao Bao40b18822018-01-30 18:19:04 -0800343class Payload(object):
344 """Manages the creation and the signing of an A/B OTA Payload."""
345
346 PAYLOAD_BIN = 'payload.bin'
347 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800348 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
349 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800350
Tao Bao667ff572018-02-10 00:02:40 -0800351 def __init__(self, secondary=False):
352 """Initializes a Payload instance.
353
354 Args:
355 secondary: Whether it's generating a secondary payload (default: False).
356 """
Tao Bao40b18822018-01-30 18:19:04 -0800357 self.payload_file = None
358 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800359 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800360
Tao Baof0c4aa22018-04-30 20:29:30 -0700361 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700362 # Don't pipe (buffer) the output if verbose is set. Let
363 # brillo_update_payload write to stdout/stderr directly, so its progress can
364 # be monitored.
365 if OPTIONS.verbose:
366 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
367 else:
368 common.RunAndCheckOutput(cmd)
369
Tao Bao40b18822018-01-30 18:19:04 -0800370 def Generate(self, target_file, source_file=None, additional_args=None):
371 """Generates a payload from the given target-files zip(s).
372
373 Args:
374 target_file: The filename of the target build target-files zip.
375 source_file: The filename of the source build target-files zip; or None if
376 generating a full OTA.
377 additional_args: A list of additional args that should be passed to
378 brillo_update_payload script; or None.
379 """
380 if additional_args is None:
381 additional_args = []
382
383 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
384 cmd = ["brillo_update_payload", "generate",
385 "--payload", payload_file,
386 "--target_image", target_file]
387 if source_file is not None:
388 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700389 if OPTIONS.disable_fec_computation:
390 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500391 if OPTIONS.disable_verity_computation:
392 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800393 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700394 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800395
396 self.payload_file = payload_file
397 self.payload_properties = None
398
399 def Sign(self, payload_signer):
400 """Generates and signs the hashes of the payload and metadata.
401
402 Args:
403 payload_signer: A PayloadSigner() instance that serves the signing work.
404
405 Raises:
406 AssertionError: On any failure when calling brillo_update_payload script.
407 """
408 assert isinstance(payload_signer, PayloadSigner)
409
410 # 1. Generate hashes of the payload and metadata files.
411 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
412 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
413 cmd = ["brillo_update_payload", "hash",
414 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700415 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800416 "--metadata_hash_file", metadata_sig_file,
417 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700418 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800419
420 # 2. Sign the hashes.
421 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
422 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
423
424 # 3. Insert the signatures back into the payload file.
425 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
426 suffix=".bin")
427 cmd = ["brillo_update_payload", "sign",
428 "--unsigned_payload", self.payload_file,
429 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700430 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800431 "--metadata_signature_file", signed_metadata_sig_file,
432 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700433 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800434
435 # 4. Dump the signed payload properties.
436 properties_file = common.MakeTempFile(prefix="payload-properties-",
437 suffix=".txt")
438 cmd = ["brillo_update_payload", "properties",
439 "--payload", signed_payload_file,
440 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700441 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800442
Tao Bao667ff572018-02-10 00:02:40 -0800443 if self.secondary:
444 with open(properties_file, "a") as f:
445 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
446
Tao Bao40b18822018-01-30 18:19:04 -0800447 if OPTIONS.wipe_user_data:
448 with open(properties_file, "a") as f:
449 f.write("POWERWASH=1\n")
450
451 self.payload_file = signed_payload_file
452 self.payload_properties = properties_file
453
Tao Bao667ff572018-02-10 00:02:40 -0800454 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800455 """Writes the payload to the given zip.
456
457 Args:
458 output_zip: The output ZipFile instance.
459 """
460 assert self.payload_file is not None
461 assert self.payload_properties is not None
462
Tao Bao667ff572018-02-10 00:02:40 -0800463 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800464 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
465 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
466 else:
467 payload_arcname = Payload.PAYLOAD_BIN
468 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
469
Tao Bao40b18822018-01-30 18:19:04 -0800470 # Add the signed payload file and properties into the zip. In order to
471 # support streaming, we pack them as ZIP_STORED. So these entries can be
472 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800473 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800474 compress_type=zipfile.ZIP_STORED)
475 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800476 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800477 compress_type=zipfile.ZIP_STORED)
478
479
Tao Bao481bab82017-12-21 11:23:09 -0800480def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800481 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800482 if not oem_source:
483 return None
484
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800485 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800486 for oem_file in oem_source:
jiajia tangc7c86972022-03-08 18:27:24 +0800487 oem_dicts.append(common.LoadDictionaryFromFile(oem_file))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800488 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700489
Doug Zongkereef39442009-04-02 12:14:19 -0700490
Tao Baod3fc38a2018-03-08 16:09:01 -0800491class StreamingPropertyFiles(PropertyFiles):
492 """A subclass for computing the property-files for streaming A/B OTAs."""
493
494 def __init__(self):
495 super(StreamingPropertyFiles, self).__init__()
496 self.name = 'ota-streaming-property-files'
497 self.required = (
498 # payload.bin and payload_properties.txt must exist.
499 'payload.bin',
500 'payload_properties.txt',
501 )
502 self.optional = (
Tianjied868c122021-06-07 16:11:47 -0700503 # apex_info.pb isn't directly used in the update flow
504 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700505 # care_map is available only if dm-verity is enabled.
506 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800507 'care_map.txt',
508 # compatibility.zip is available only if target supports Treble.
509 'compatibility.zip',
510 )
511
512
Tao Bao85f16982018-03-08 16:28:33 -0800513class AbOtaPropertyFiles(StreamingPropertyFiles):
514 """The property-files for A/B OTA that includes payload_metadata.bin info.
515
516 Since P, we expose one more token (aka property-file), in addition to the ones
517 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
518 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
519 doesn't exist as a separate ZIP entry, but can be used to verify if the
520 payload can be applied on the given device.
521
522 For backward compatibility, we keep both of the 'ota-streaming-property-files'
523 and the newly added 'ota-property-files' in P. The new token will only be
524 available in 'ota-property-files'.
525 """
526
527 def __init__(self):
528 super(AbOtaPropertyFiles, self).__init__()
529 self.name = 'ota-property-files'
530
531 def _GetPrecomputed(self, input_zip):
532 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
533 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
534
535 @staticmethod
536 def _GetPayloadMetadataOffsetAndSize(input_zip):
537 """Computes the offset and size of the payload metadata for a given package.
538
539 (From system/update_engine/update_metadata.proto)
540 A delta update file contains all the deltas needed to update a system from
541 one specific version to another specific version. The update format is
542 represented by this struct pseudocode:
543
544 struct delta_update_file {
545 char magic[4] = "CrAU";
546 uint64 file_format_version;
547 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
548
549 // Only present if format_version > 1:
550 uint32 metadata_signature_size;
551
552 // The Bzip2 compressed DeltaArchiveManifest
553 char manifest[metadata_signature_size];
554
555 // The signature of the metadata (from the beginning of the payload up to
556 // this location, not including the signature itself). This is a
557 // serialized Signatures message.
558 char medatada_signature_message[metadata_signature_size];
559
560 // Data blobs for files, no specific format. The specific offset
561 // and length of each data blob is recorded in the DeltaArchiveManifest.
562 struct {
563 char data[];
564 } blobs[];
565
566 // These two are not signed:
567 uint64 payload_signatures_message_size;
568 char payload_signatures_message[];
569 };
570
571 'payload-metadata.bin' contains all the bytes from the beginning of the
572 payload, till the end of 'medatada_signature_message'.
573 """
574 payload_info = input_zip.getinfo('payload.bin')
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400575 (payload_offset, payload_size) = GetZipEntryOffset(input_zip, payload_info)
Tao Bao85f16982018-03-08 16:28:33 -0800576
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400577 # Read the underlying raw zipfile at specified offset
578 payload_fp = input_zip.fp
579 payload_fp.seek(payload_offset)
580 header_bin = payload_fp.read(24)
Tao Bao85f16982018-03-08 16:28:33 -0800581
582 # network byte order (big-endian)
583 header = struct.unpack("!IQQL", header_bin)
584
585 # 'CrAU'
586 magic = header[0]
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400587 assert magic == 0x43724155, "Invalid magic: {:x}, computed offset {}" \
588 .format(magic, payload_offset)
Tao Bao85f16982018-03-08 16:28:33 -0800589
590 manifest_size = header[2]
591 metadata_signature_size = header[3]
592 metadata_total = 24 + manifest_size + metadata_signature_size
593 assert metadata_total < payload_size
594
595 return (payload_offset, metadata_total)
596
597
Kelvin Zhang84b3a282022-03-04 12:26:20 -0800598def ModifyVABCCompressionParam(content, algo):
599 """ Update update VABC Compression Param in dynamic_partitions_info.txt
600 Args:
601 content: The string content of dynamic_partitions_info.txt
602 algo: The compression algorithm should be used for VABC. See
603 https://cs.android.com/android/platform/superproject/+/master:system/core/fs_mgr/libsnapshot/cow_writer.cpp;l=127;bpv=1;bpt=1?q=CowWriter::ParseOptions&sq=
604 Returns:
605 Updated content of dynamic_partitions_info.txt , with custom compression algo
606 """
607 output_list = []
608 for line in content.splitlines():
609 if line.startswith("virtual_ab_compression_method="):
610 continue
611 output_list.append(line)
612 output_list.append("virtual_ab_compression_method="+algo)
613 return "\n".join(output_list)
614
615
Yifan Hong38ab4d82020-06-18 15:19:56 -0700616def UpdatesInfoForSpecialUpdates(content, partitions_filter,
617 delete_keys=None):
618 """ Updates info file for secondary payload generation, partial update, etc.
619
620 Scan each line in the info file, and remove the unwanted partitions from
621 the dynamic partition list in the related properties. e.g.
622 "super_google_dynamic_partitions_partition_list=system vendor product"
623 will become "super_google_dynamic_partitions_partition_list=system".
624
625 Args:
626 content: The content of the input info file. e.g. misc_info.txt.
627 partitions_filter: A function to filter the desired partitions from a given
628 list
629 delete_keys: A list of keys to delete in the info file
630
631 Returns:
632 A string of the updated info content.
633 """
634
635 output_list = []
636 # The suffix in partition_list variables that follows the name of the
637 # partition group.
638 list_suffix = 'partition_list'
639 for line in content.splitlines():
640 if line.startswith('#') or '=' not in line:
641 output_list.append(line)
642 continue
643 key, value = line.strip().split('=', 1)
644
645 if delete_keys and key in delete_keys:
646 pass
647 elif key.endswith(list_suffix):
648 partitions = value.split()
649 # TODO for partial update, partitions in the same group must be all
650 # updated or all omitted
651 partitions = filter(partitions_filter, partitions)
652 output_list.append('{}={}'.format(key, ' '.join(partitions)))
653 else:
654 output_list.append(line)
655 return '\n'.join(output_list)
656
657
Tao Bao15a146a2018-02-21 16:06:59 -0800658def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800659 """Returns a target-files.zip file for generating secondary payload.
660
661 Although the original target-files.zip already contains secondary slot
662 images (i.e. IMAGES/system_other.img), we need to rename the files to the
663 ones without _other suffix. Note that we cannot instead modify the names in
664 META/ab_partitions.txt, because there are no matching partitions on device.
665
666 For the partitions that don't have secondary images, the ones for primary
667 slot will be used. This is to ensure that we always have valid boot, vbmeta,
668 bootloader images in the inactive slot.
669
670 Args:
671 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800672 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800673
674 Returns:
675 The filename of the target-files.zip for generating secondary payload.
676 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700677
678 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700679 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700680 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700681 content = f.read()
682 # Remove virtual_ab flag from secondary payload so that OTA client
683 # don't use snapshots for secondary update
684 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
685 return UpdatesInfoForSpecialUpdates(
686 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
687 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700688
Tao Baof7140c02018-01-30 17:09:24 -0800689 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
690 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
691
Kelvin Zhang928c2342020-09-22 16:15:57 -0400692 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800693 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700694
Tao Bao0ff15de2019-03-20 11:26:06 -0700695 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800696 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800697 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
698 if info.filename == 'IMAGES/system_other.img':
699 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
700
701 # Primary images and friends need to be skipped explicitly.
702 elif info.filename in ('IMAGES/system.img',
703 'IMAGES/system.map'):
704 pass
Tao Bao3e759462019-09-17 22:43:11 -0700705
706 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
707 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
708 image_name = os.path.basename(info.filename)
709 if image_name not in ['{}.img'.format(partition) for partition in
710 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
711 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800712
Tao Bao15a146a2018-02-21 16:06:59 -0800713 # Skip copying the postinstall config if requested.
714 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
715 pass
716
Tianjie Xu1c808002019-09-11 00:29:26 -0700717 elif info.filename.startswith('META/'):
718 # Remove the unnecessary partitions for secondary images from the
719 # ab_partitions file.
720 if info.filename == AB_PARTITIONS:
721 with open(unzipped_file) as f:
722 partition_list = f.read().splitlines()
723 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700724 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400725 common.ZipWriteStr(target_zip, info.filename,
726 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700727 # Remove the unnecessary partitions from the dynamic partitions list.
728 elif (info.filename == 'META/misc_info.txt' or
729 info.filename == DYNAMIC_PARTITION_INFO):
730 modified_info = GetInfoForSecondaryImages(unzipped_file)
731 common.ZipWriteStr(target_zip, info.filename, modified_info)
732 else:
733 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800734
Tao Baof7140c02018-01-30 17:09:24 -0800735 common.ZipClose(target_zip)
736
737 return target_file
738
739
Tao Bao15a146a2018-02-21 16:06:59 -0800740def GetTargetFilesZipWithoutPostinstallConfig(input_file):
741 """Returns a target-files.zip that's not containing postinstall_config.txt.
742
743 This allows brillo_update_payload script to skip writing all the postinstall
744 hooks in the generated payload. The input target-files.zip file will be
745 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
746 contain the postinstall_config.txt entry, the input file will be returned.
747
748 Args:
749 input_file: The input target-files.zip filename.
750
751 Returns:
752 The filename of target-files.zip that doesn't contain postinstall config.
753 """
754 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400755 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800756 if POSTINSTALL_CONFIG not in input_zip.namelist():
757 return input_file
758
759 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
760 shutil.copyfile(input_file, target_file)
761 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
762 return target_file
763
Kelvin Zhang06400172021-03-05 15:42:03 -0500764
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400765def ParseInfoDict(target_file_path):
766 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
767 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800768
Kelvin Zhang06400172021-03-05 15:42:03 -0500769
Kelvin Zhang84b3a282022-03-04 12:26:20 -0800770def GetTargetFilesZipForCustomVABCCompression(input_file, vabc_compression_param):
771 """Returns a target-files.zip with a custom VABC compression param.
772 Args:
773 input_file: The input target-files.zip path
774 vabc_compression_param: Custom Virtual AB Compression algorithm
775
776 Returns:
777 The path to modified target-files.zip
778 """
779 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
780 shutil.copyfile(input_file, target_file)
781 common.ZipDelete(target_file, DYNAMIC_PARTITION_INFO)
782 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as zfp:
783 dynamic_partition_info = zfp.read(DYNAMIC_PARTITION_INFO).decode()
784 dynamic_partition_info = ModifyVABCCompressionParam(
785 dynamic_partition_info, vabc_compression_param)
786 with zipfile.ZipFile(target_file, "a", allowZip64=True) as output_zip:
787 output_zip.writestr(DYNAMIC_PARTITION_INFO, dynamic_partition_info)
788 return target_file
789
790
Yifan Hong38ab4d82020-06-18 15:19:56 -0700791def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
792 """Returns a target-files.zip for partial ota update package generation.
793
794 This function modifies ab_partitions list with the desired partitions before
795 calling the brillo_update_payload script. It also cleans up the reference to
796 the excluded partitions in the info file, e.g misc_info.txt.
797
798 Args:
799 input_file: The input target-files.zip filename.
800 ab_partitions: A list of partitions to include in the partial update
801
802 Returns:
803 The filename of target-files.zip used for partial ota update.
804 """
805
806 def AddImageForPartition(partition_name):
807 """Add the archive name for a given partition to the copy list."""
808 for prefix in ['IMAGES', 'RADIO']:
809 image_path = '{}/{}.img'.format(prefix, partition_name)
810 if image_path in namelist:
811 copy_entries.append(image_path)
812 map_path = '{}/{}.map'.format(prefix, partition_name)
813 if map_path in namelist:
814 copy_entries.append(map_path)
815 return
816
817 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
818
819 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400820 original_ab_partitions = input_zip.read(
821 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700822 namelist = input_zip.namelist()
823
824 unrecognized_partitions = [partition for partition in ab_partitions if
825 partition not in original_ab_partitions]
826 if unrecognized_partitions:
827 raise ValueError("Unrecognized partitions when generating partial updates",
828 unrecognized_partitions)
829
830 logger.info("Generating partial updates for %s", ab_partitions)
831
832 copy_entries = ['META/update_engine_config.txt']
833 for partition_name in ab_partitions:
834 AddImageForPartition(partition_name)
835
836 # Use zip2zip to avoid extracting the zipfile.
837 partial_target_file = common.MakeTempFile(suffix='.zip')
838 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
839 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
840 common.RunAndCheckOutput(cmd)
841
842 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
843 allowZip64=True)
844 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
845 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
846 '\n'.join(ab_partitions))
Kelvin Zhang766eea72021-06-03 09:36:08 -0400847 CARE_MAP_ENTRY = "META/care_map.pb"
848 if CARE_MAP_ENTRY in input_zip.namelist():
849 caremap = care_map_pb2.CareMap()
850 caremap.ParseFromString(input_zip.read(CARE_MAP_ENTRY))
851 filtered = [
852 part for part in caremap.partitions if part.name in ab_partitions]
853 del caremap.partitions[:]
854 caremap.partitions.extend(filtered)
855 common.ZipWriteStr(partial_target_zip, CARE_MAP_ENTRY,
856 caremap.SerializeToString())
857
Yifan Hong38ab4d82020-06-18 15:19:56 -0700858 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
859 if info_file not in input_zip.namelist():
860 logger.warning('Cannot find %s in input zipfile', info_file)
861 continue
862 content = input_zip.read(info_file).decode()
863 modified_info = UpdatesInfoForSpecialUpdates(
864 content, lambda p: p in ab_partitions)
Kelvin Zhang84b3a282022-03-04 12:26:20 -0800865 if OPTIONS.vabc_compression_param and info_file == DYNAMIC_PARTITION_INFO:
866 modified_info = ModifyVABCCompressionParam(
867 modified_info, OPTIONS.vabc_compression_param)
Yifan Hong38ab4d82020-06-18 15:19:56 -0700868 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
869
Kelvin Zhang766eea72021-06-03 09:36:08 -0400870 # TODO(xunchang) handle META/postinstall_config.txt'
871
Yifan Hong38ab4d82020-06-18 15:19:56 -0700872 common.ZipClose(partial_target_zip)
873
874 return partial_target_file
875
876
Yifan Hong50e79542018-11-08 17:44:12 -0800877def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800878 super_block_devices,
879 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800880 """Returns a target-files.zip for retrofitting dynamic partitions.
881
882 This allows brillo_update_payload to generate an OTA based on the exact
883 bits on the block devices. Postinstall is disabled.
884
885 Args:
886 input_file: The input target-files.zip filename.
887 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800888 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800889
890 Returns:
891 The filename of target-files.zip with *.img replaced with super_*.img for
892 each block device in super_block_devices.
893 """
894 assert super_block_devices, "No super_block_devices are specified."
895
896 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800897 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800898
899 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
900 shutil.copyfile(input_file, target_file)
901
Kelvin Zhang928c2342020-09-22 16:15:57 -0400902 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800903 namelist = input_zip.namelist()
904
Yifan Hongb433eba2019-03-06 12:42:53 -0800905 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
906
907 # Remove partitions from META/ab_partitions.txt that is in
908 # dynamic_partition_list but not in super_block_devices so that
909 # brillo_update_payload won't generate update for those logical partitions.
910 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
911 with open(ab_partitions_file) as f:
912 ab_partitions_lines = f.readlines()
913 ab_partitions = [line.strip() for line in ab_partitions_lines]
914 # Assert that all super_block_devices are in ab_partitions
915 super_device_not_updated = [partition for partition in super_block_devices
916 if partition not in ab_partitions]
917 assert not super_device_not_updated, \
918 "{} is in super_block_devices but not in {}".format(
919 super_device_not_updated, AB_PARTITIONS)
920 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400921 new_ab_partitions = common.MakeTempFile(
922 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800923 with open(new_ab_partitions, 'w') as f:
924 for partition in ab_partitions:
925 if (partition in dynamic_partition_list and
Kelvin Zhang06400172021-03-05 15:42:03 -0500926 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700927 logger.info("Dropping %s from ab_partitions.txt", partition)
928 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800929 f.write(partition + "\n")
930 to_delete = [AB_PARTITIONS]
931
Yifan Hong50e79542018-11-08 17:44:12 -0800932 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800933 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800934
935 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
936 # is a regular update on devices without dynamic partitions support.
937 to_delete += [DYNAMIC_PARTITION_INFO]
938
Tao Bao03fecb62018-11-28 10:59:23 -0800939 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700940 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800941 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800942
943 common.ZipDelete(target_file, to_delete)
944
Yifan Hong50e79542018-11-08 17:44:12 -0800945 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
946
947 # Write super_{foo}.img as {foo}.img.
948 for src, dst in replace.items():
949 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700950 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800951 unzipped_file = os.path.join(input_tmp, *src.split('/'))
952 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
953
Yifan Hongb433eba2019-03-06 12:42:53 -0800954 # Write new ab_partitions.txt file
955 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
956
Yifan Hong50e79542018-11-08 17:44:12 -0800957 common.ZipClose(target_zip)
958
959 return target_file
960
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400961
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700962def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
963 """Returns a target-files.zip for custom partitions update.
964
965 This function modifies ab_partitions list with the desired custom partitions
966 and puts the custom images into the target target-files.zip.
967
968 Args:
969 input_file: The input target-files.zip filename.
970 custom_images: A map of custom partitions and custom images.
971
972 Returns:
973 The filename of a target-files.zip which has renamed the custom images in
974 the IMAGS/ to their partition names.
975 """
976 # Use zip2zip to avoid extracting the zipfile.
977 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
978 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
979
980 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
981 namelist = input_zip.namelist()
982
983 # Write {custom_image}.img as {custom_partition}.img.
984 for custom_partition, custom_image in custom_images.items():
985 default_custom_image = '{}.img'.format(custom_partition)
986 if default_custom_image != custom_image:
987 logger.info("Update custom partition '%s' with '%s'",
988 custom_partition, custom_image)
989 # Default custom image need to be deleted first.
990 namelist.remove('IMAGES/{}'.format(default_custom_image))
991 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
992 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
993 default_custom_image)])
994
995 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
996 common.RunAndCheckOutput(cmd)
997
998 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -0800999
Kelvin Zhang06400172021-03-05 15:42:03 -05001000
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001001def GeneratePartitionTimestampFlags(partition_state):
1002 partition_timestamps = [
1003 part.partition_name + ":" + part.version
1004 for part in partition_state]
1005 return ["--partition_timestamps", ",".join(partition_timestamps)]
1006
Kelvin Zhang06400172021-03-05 15:42:03 -05001007
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001008def GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang06400172021-03-05 15:42:03 -05001009 pre_partition_state, post_partition_state):
Kelvin Zhang80195722020-11-04 14:38:34 -05001010 assert pre_partition_state is not None
1011 partition_timestamps = {}
Kelvin Zhang80195722020-11-04 14:38:34 -05001012 for part in post_partition_state:
Kelvin Zhang9a698e62022-05-09 10:20:52 -07001013 partition_timestamps[part.partition_name] = part.version
1014 for part in pre_partition_state:
1015 if part.partition_name in partition_timestamps:
1016 partition_timestamps[part.partition_name] = \
Kelvin Zhang059bf6e2022-08-12 14:03:41 -07001017 max(part.version, partition_timestamps[part.partition_name])
Kelvin Zhang80195722020-11-04 14:38:34 -05001018 return [
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001019 "--partition_timestamps",
Kelvin Zhang06400172021-03-05 15:42:03 -05001020 ",".join([key + ":" + val for (key, val)
1021 in partition_timestamps.items()])
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001022 ]
Kelvin Zhang80195722020-11-04 14:38:34 -05001023
Kelvin Zhang06400172021-03-05 15:42:03 -05001024
Kelvin Zhang65029a22020-11-03 10:07:51 -05001025def SupportsMainlineGkiUpdates(target_file):
1026 """Return True if the build supports MainlineGKIUpdates.
1027
1028 This function scans the product.img file in IMAGES/ directory for
1029 pattern |*/apex/com.android.gki.*.apex|. If there are files
1030 matching this pattern, conclude that build supports mainline
1031 GKI and return True
1032
1033 Args:
1034 target_file: Path to a target_file.zip, or an extracted directory
1035 Return:
1036 True if thisb uild supports Mainline GKI Updates.
1037 """
1038 if target_file is None:
1039 return False
1040 if os.path.isfile(target_file):
1041 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1042 if not os.path.isdir(target_file):
1043 assert os.path.isdir(target_file), \
1044 "{} must be a path to zip archive or dir containing extracted"\
1045 " target_files".format(target_file)
1046 image_file = os.path.join(target_file, "IMAGES", "product.img")
1047
1048 if not os.path.isfile(image_file):
1049 return False
1050
1051 if IsSparseImage(image_file):
1052 # Unsparse the image
1053 tmp_img = common.MakeTempFile(suffix=".img")
1054 subprocess.check_output(["simg2img", image_file, tmp_img])
1055 image_file = tmp_img
1056
1057 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1058 output = subprocess.check_output(cmd).decode()
1059
1060 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1061 return pattern.search(output) is not None
1062
Kelvin Zhang06400172021-03-05 15:42:03 -05001063
Tao Baof0c4aa22018-04-30 20:29:30 -07001064def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001065 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001066 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001067 if not OPTIONS.no_signing:
1068 staging_file = common.MakeTempFile(suffix='.zip')
1069 else:
1070 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001071 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001072 compression=zipfile.ZIP_DEFLATED,
1073 allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001074
Tao Bao481bab82017-12-21 11:23:09 -08001075 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001076 assert "ab_partitions" in OPTIONS.source_info_dict, \
1077 "META/ab_partitions.txt is required for ab_update."
1078 assert "ab_partitions" in OPTIONS.target_info_dict, \
1079 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001080 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1081 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang563750f2021-04-28 12:46:17 -04001082 # If source supports VABC, delta_generator/update_engine will attempt to
1083 # use VABC. This dangerous, as the target build won't have snapuserd to
1084 # serve I/O request when device boots. Therefore, disable VABC if source
1085 # build doesn't supports it.
1086 if not source_info.is_vabc or not target_info.is_vabc:
Kelvin Zhang10eac082021-06-10 14:32:19 -04001087 logger.info("Either source or target does not support VABC, disabling.")
Kelvin Zhang563750f2021-04-28 12:46:17 -04001088 OPTIONS.disable_vabc = True
Kelvin Zhang563750f2021-04-28 12:46:17 -04001089
Kelvin Zhanga9a87ec2022-05-04 16:44:52 -07001090 # Virtual AB Compression was introduced in Androd S.
1091 # Later, we backported VABC to Android R. But verity support was not
1092 # backported, so if VABC is used and we are on Android R, disable
1093 # verity computation.
1094 if not OPTIONS.disable_vabc and source_info.is_android_r:
1095 OPTIONS.disable_verity_computation = True
1096 OPTIONS.disable_fec_computation = True
1097
Tao Bao481bab82017-12-21 11:23:09 -08001098 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001099 assert "ab_partitions" in OPTIONS.info_dict, \
1100 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001101 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001102 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001103
Kelvin Zhang10eac082021-06-10 14:32:19 -04001104 if target_info.vendor_suppressed_vabc:
1105 logger.info("Vendor suppressed VABC. Disabling")
1106 OPTIONS.disable_vabc = True
Kelvin Zhangf1758012022-01-26 10:18:18 -08001107
1108 # Both source and target build need to support VABC XOR for us to use it.
1109 # Source build's update_engine must be able to write XOR ops, and target
1110 # build's snapuserd must be able to interpret XOR ops.
1111 if not target_info.is_vabc_xor or OPTIONS.disable_vabc or \
Kelvin Zhang84b3a282022-03-04 12:26:20 -08001112 (source_info is not None and not source_info.is_vabc_xor):
Kelvin Zhangad427382021-08-12 16:19:09 -07001113 logger.info("VABC XOR Not supported, disabling")
1114 OPTIONS.enable_vabc_xor = False
Yifan Hong38ab4d82020-06-18 15:19:56 -07001115 additional_args = []
1116
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001117 # Prepare custom images.
1118 if OPTIONS.custom_images:
1119 target_file = GetTargetFilesZipForCustomImagesUpdates(
1120 target_file, OPTIONS.custom_images)
1121
Yifan Hong50e79542018-11-08 17:44:12 -08001122 if OPTIONS.retrofit_dynamic_partitions:
1123 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001124 target_file, target_info.get("super_block_devices").strip().split(),
1125 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001126 elif OPTIONS.partial:
1127 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1128 OPTIONS.partial)
1129 additional_args += ["--is_partial_update", "true"]
Kelvin Zhang84b3a282022-03-04 12:26:20 -08001130 elif OPTIONS.vabc_compression_param:
1131 target_file = GetTargetFilesZipForCustomVABCCompression(
1132 target_file, OPTIONS.vabc_compression_param)
Yifan Hong50e79542018-11-08 17:44:12 -08001133 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001134 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001135 # Target_file may have been modified, reparse ab_partitions
1136 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1137 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001138 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001139
Kelvin Zhang414ca422021-08-27 15:12:08 -07001140 CheckVintfIfTrebleEnabled(target_file, target_info)
1141
Kelvin Zhang39aea442020-08-17 11:04:25 -04001142 # Metadata to comply with Android OTA package format.
1143 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001144 # Generate payload.
1145 payload = Payload()
1146
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001147 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001148 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001149 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001150 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001151 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001152 metadata.precondition.partition_state,
1153 metadata.postcondition.partition_state
1154 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001155 else:
Tianjiea2076132020-08-19 17:25:32 -07001156 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001157 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1158 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001159
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001160 if not ota_utils.IsZucchiniCompatible(source_file, target_file):
HÃ¥kan Kvist3db1ef62022-05-03 10:19:41 +02001161 logger.warning(
1162 "Builds doesn't support zucchini, or source/target don't have compatible zucchini versions. Disabling zucchini.")
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001163 OPTIONS.enable_zucchini = False
1164
Kelvin Zhang0b7207c2022-08-26 17:49:08 +00001165 security_patch_level = target_info.GetBuildProp(
1166 "ro.build.version.security_patch")
1167 if OPTIONS.security_patch_level is not None:
1168 security_patch_level = OPTIONS.security_patch_level
1169
1170 additional_args += ["--security_patch_level", security_patch_level]
1171
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001172 additional_args += ["--enable_zucchini",
1173 str(OPTIONS.enable_zucchini).lower()]
1174
1175 if not ota_utils.IsLz4diffCompatible(source_file, target_file):
Kelvin Zhang84b3a282022-03-04 12:26:20 -08001176 logger.warning(
Kelvin Zhang6fe2fc02022-01-13 12:38:49 -08001177 "Source build doesn't support lz4diff, or source/target don't have compatible lz4diff versions. Disabling lz4diff.")
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001178 OPTIONS.enable_lz4diff = False
1179
1180 additional_args += ["--enable_lz4diff",
1181 str(OPTIONS.enable_lz4diff).lower()]
1182
1183 if source_file and OPTIONS.enable_lz4diff:
1184 input_tmp = common.UnzipTemp(source_file, ["META/liblz4.so"])
1185 liblz4_path = os.path.join(input_tmp, "META", "liblz4.so")
1186 assert os.path.exists(
1187 liblz4_path), "liblz4.so not found in META/ dir of target file {}".format(liblz4_path)
1188 logger.info("Enabling lz4diff %s", liblz4_path)
1189 additional_args += ["--liblz4_path", liblz4_path]
Kelvin Zhang6fe2fc02022-01-13 12:38:49 -08001190 erofs_compression_param = OPTIONS.target_info_dict.get(
1191 "erofs_default_compressor")
1192 assert erofs_compression_param is not None, "'erofs_default_compressor' not found in META/misc_info.txt of target build. This is required to enable lz4diff."
1193 additional_args += ["--erofs_compression_param", erofs_compression_param]
Kelvin Zhang410bb382022-01-06 09:15:54 -08001194
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001195 if OPTIONS.disable_vabc:
1196 additional_args += ["--disable_vabc", "true"]
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001197 if OPTIONS.enable_vabc_xor:
1198 additional_args += ["--enable_vabc_xor", "true"]
Tianjiee7ab38d2021-09-08 19:09:38 -07001199 if OPTIONS.force_minor_version:
1200 additional_args += ["--force_minor_version", OPTIONS.force_minor_version]
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001201 if OPTIONS.compressor_types:
1202 additional_args += ["--compressor_types", OPTIONS.compressor_types]
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001203 additional_args += ["--max_timestamp", max_timestamp]
1204
Kelvin Zhang65029a22020-11-03 10:07:51 -05001205 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhang06400172021-03-05 15:42:03 -05001206 logger.warning(
1207 "Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001208 additional_args.extend(["--full_boot", "true"])
1209
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001210 payload.Generate(
1211 target_file,
1212 source_file,
1213 additional_args + partition_timestamps_flags
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001214 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001215
Tao Bao40b18822018-01-30 18:19:04 -08001216 # Sign the payload.
Kelvin Zhang059bf6e2022-08-12 14:03:41 -07001217 payload_signer = PayloadSigner(
1218 OPTIONS.package_key, OPTIONS.private_key_suffix)
Tao Baof7140c02018-01-30 17:09:24 -08001219 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001220
Tao Bao40b18822018-01-30 18:19:04 -08001221 # Write the payload into output zip.
1222 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001223
Tao Baof7140c02018-01-30 17:09:24 -08001224 # Generate and include the secondary payload that installs secondary images
1225 # (e.g. system_other.img).
1226 if OPTIONS.include_secondary:
1227 # We always include a full payload for the secondary slot, even when
1228 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001229 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1230 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001231 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001232 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001233 additional_args=["--max_timestamp",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001234 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001235 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001236 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001237
Tianjie Xucfa86222016-03-07 16:31:19 -08001238 # If dm-verity is supported for the device, copy contents of care_map
1239 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001240 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001241 if (target_info.get("verity") == "true" or
Kelvin Zhang06400172021-03-05 15:42:03 -05001242 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001243 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1244 "META/" + x in target_zip.namelist()]
1245
1246 # Adds care_map if either the protobuf format or the plain text one exists.
1247 if care_map_list:
1248 care_map_name = care_map_list[0]
1249 care_map_data = target_zip.read("META/" + care_map_name)
1250 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001251 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001252 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001253 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001254 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001255 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001256
Tianjiea5fca032021-06-01 22:06:28 -07001257 # Add the source apex version for incremental ota updates, and write the
1258 # result apex info to the ota package.
1259 ota_apex_info = ota_utils.ConstructOtaApexInfo(target_zip, source_file)
1260 if ota_apex_info is not None:
1261 common.ZipWriteStr(output_zip, "apex_info.pb", ota_apex_info,
1262 compress_type=zipfile.ZIP_STORED)
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001263
Tao Bao21803d32017-04-19 10:16:09 -07001264 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001265
Tao Baofe5b69a2018-03-02 09:47:43 -08001266 # We haven't written the metadata entry yet, which will be handled in
1267 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001268 common.ZipClose(output_zip)
1269
Tao Bao85f16982018-03-08 16:28:33 -08001270 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1271 # all the info of the latter. However, system updaters and OTA servers need to
1272 # take time to switch to the new flag. We keep both of the flags for
1273 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001274 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001275 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001276 StreamingPropertyFiles(),
1277 )
1278 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001279
Tao Baoc098e9e2016-01-07 13:03:56 -08001280
Doug Zongkereef39442009-04-02 12:14:19 -07001281def main(argv):
1282
1283 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001284 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001285 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001286 elif o in ("-i", "--incremental_from"):
1287 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001288 elif o == "--full_radio":
1289 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001290 elif o == "--full_bootloader":
1291 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001292 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001293 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001294 elif o == "--downgrade":
1295 OPTIONS.downgrade = True
1296 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001297 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001298 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001299 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001300 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001301 elif o == "--oem_no_mount":
1302 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001303 elif o in ("-e", "--extra_script"):
1304 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001305 elif o in ("-t", "--worker_threads"):
1306 if a.isdigit():
1307 OPTIONS.worker_threads = int(a)
1308 else:
1309 raise ValueError("Cannot parse value %r for option %r - only "
1310 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001311 elif o in ("-2", "--two_step"):
1312 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001313 elif o == "--include_secondary":
1314 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001315 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001316 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001317 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001318 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001319 elif o == "--block":
1320 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001321 elif o in ("-b", "--binary"):
1322 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001323 elif o == "--stash_threshold":
1324 try:
1325 OPTIONS.stash_threshold = float(a)
1326 except ValueError:
1327 raise ValueError("Cannot parse value %r for option %r - expecting "
1328 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001329 elif o == "--log_diff":
1330 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001331 elif o == "--payload_signer":
1332 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001333 elif o == "--payload_signer_args":
1334 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001335 elif o == "--payload_signer_maximum_signature_size":
1336 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001337 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001338 # TODO(Xunchang) remove this option after cleaning up the callers.
1339 logger.warning("The option '--payload_signer_key_size' is deprecated."
1340 " Use '--payload_signer_maximum_signature_size' instead.")
1341 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001342 elif o == "--extracted_input_target_files":
1343 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001344 elif o == "--skip_postinstall":
1345 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001346 elif o == "--retrofit_dynamic_partitions":
1347 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001348 elif o == "--skip_compatibility_check":
1349 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001350 elif o == "--output_metadata_path":
1351 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001352 elif o == "--disable_fec_computation":
1353 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001354 elif o == "--disable_verity_computation":
1355 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001356 elif o == "--force_non_ab":
1357 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001358 elif o == "--boot_variable_file":
1359 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001360 elif o == "--partial":
1361 partitions = a.split()
1362 if not partitions:
1363 raise ValueError("Cannot parse partitions in {}".format(a))
1364 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001365 elif o == "--custom_image":
1366 custom_partition, custom_image = a.split("=")
1367 OPTIONS.custom_images[custom_partition] = custom_image
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001368 elif o == "--disable_vabc":
1369 OPTIONS.disable_vabc = True
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001370 elif o == "--spl_downgrade":
1371 OPTIONS.spl_downgrade = True
Kelvin Zhang06400172021-03-05 15:42:03 -05001372 OPTIONS.wipe_user_data = True
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001373 elif o == "--vabc_downgrade":
1374 OPTIONS.vabc_downgrade = True
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001375 elif o == "--enable_vabc_xor":
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001376 assert a.lower() in ["true", "false"]
Kelvin Zhang1250bca2021-08-27 15:10:27 -07001377 OPTIONS.enable_vabc_xor = a.lower() != "false"
Tianjiee7ab38d2021-09-08 19:09:38 -07001378 elif o == "--force_minor_version":
1379 OPTIONS.force_minor_version = a
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001380 elif o == "--compressor_types":
1381 OPTIONS.compressor_types = a
Kelvin Zhang410bb382022-01-06 09:15:54 -08001382 elif o == "--enable_zucchini":
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001383 assert a.lower() in ["true", "false"]
Kelvin Zhang410bb382022-01-06 09:15:54 -08001384 OPTIONS.enable_zucchini = a.lower() != "false"
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001385 elif o == "--enable_lz4diff":
1386 assert a.lower() in ["true", "false"]
1387 OPTIONS.enable_lz4diff = a.lower() != "false"
Kelvin Zhang84b3a282022-03-04 12:26:20 -08001388 elif o == "--vabc_compression_param":
1389 OPTIONS.vabc_compression_param = a.lower()
Kelvin Zhang0b7207c2022-08-26 17:49:08 +00001390 elif o == "--security_patch_level":
1391 OPTIONS.security_patch_level = a
Doug Zongkereef39442009-04-02 12:14:19 -07001392 else:
1393 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001394 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001395
1396 args = common.ParseOptions(argv, __doc__,
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001397 extra_opts="b:k:i:d:e:t:2o:",
1398 extra_long_opts=[
1399 "package_key=",
1400 "incremental_from=",
1401 "full_radio",
1402 "full_bootloader",
1403 "wipe_user_data",
1404 "downgrade",
1405 "override_timestamp",
1406 "extra_script=",
1407 "worker_threads=",
1408 "two_step",
1409 "include_secondary",
1410 "no_signing",
1411 "block",
1412 "binary=",
1413 "oem_settings=",
1414 "oem_no_mount",
1415 "verify",
1416 "stash_threshold=",
1417 "log_diff=",
1418 "payload_signer=",
1419 "payload_signer_args=",
1420 "payload_signer_maximum_signature_size=",
1421 "payload_signer_key_size=",
1422 "extracted_input_target_files=",
1423 "skip_postinstall",
1424 "retrofit_dynamic_partitions",
1425 "skip_compatibility_check",
1426 "output_metadata_path=",
1427 "disable_fec_computation",
1428 "disable_verity_computation",
1429 "force_non_ab",
1430 "boot_variable_file=",
1431 "partial=",
1432 "custom_image=",
1433 "disable_vabc",
1434 "spl_downgrade",
1435 "vabc_downgrade",
1436 "enable_vabc_xor=",
1437 "force_minor_version=",
1438 "compressor_types=",
Kelvin Zhang318a4642022-03-08 15:13:01 -08001439 "enable_zucchini=",
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001440 "enable_lz4diff=",
Kelvin Zhang84b3a282022-03-04 12:26:20 -08001441 "vabc_compression_param=",
Kelvin Zhang0b7207c2022-08-26 17:49:08 +00001442 "security_patch_level=",
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001443 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001444
1445 if len(args) != 2:
1446 common.Usage(__doc__)
1447 sys.exit(1)
1448
Tao Bao32fcdab2018-10-12 10:30:39 -07001449 common.InitLogging()
1450
Tao Bao2db13852018-01-08 22:28:57 -08001451 # Load the build info dicts from the zip directly or the extracted input
1452 # directory. We don't need to unzip the entire target-files zips, because they
1453 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1454 # When loading the info dicts, we don't need to provide the second parameter
1455 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1456 # some properties with their actual paths, such as 'selinux_fc',
1457 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001458 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001459 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001460 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001461 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001462
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001463 if OPTIONS.wipe_user_data:
1464 if not OPTIONS.vabc_downgrade:
1465 logger.info("Detected downgrade/datawipe OTA."
1466 "When wiping userdata, VABC OTA makes the user "
1467 "wait in recovery mode for merge to finish. Disable VABC by "
1468 "default. If you really want to do VABC downgrade, pass "
1469 "--vabc_downgrade")
1470 OPTIONS.disable_vabc = True
Kelvin Zhang80195722020-11-04 14:38:34 -05001471 # We should only allow downgrading incrementals (as opposed to full).
1472 # Otherwise the device may go back from arbitrary build with this full
1473 # OTA package.
Kelvin Zhang81641af2021-10-26 16:03:25 -07001474 if OPTIONS.incremental_source is None and OPTIONS.downgrade:
1475 raise ValueError("Cannot generate downgradable full OTAs")
Kelvin Zhang80195722020-11-04 14:38:34 -05001476
Yifan Hong38ab4d82020-06-18 15:19:56 -07001477 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1478 # target-file and reload the info_dict. So the info will be consistent with
1479 # the modified target-file.
1480
Tao Bao32fcdab2018-10-12 10:30:39 -07001481 logger.info("--- target info ---")
1482 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001483
1484 # Load the source build dict if applicable.
1485 if OPTIONS.incremental_source is not None:
1486 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001487 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001488
Tao Bao32fcdab2018-10-12 10:30:39 -07001489 logger.info("--- source info ---")
1490 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001491
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001492 if OPTIONS.partial:
1493 OPTIONS.info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001494 list(
1495 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1496 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001497 if OPTIONS.source_info_dict:
1498 OPTIONS.source_info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001499 list(
1500 set(OPTIONS.source_info_dict['ab_partitions']) &
1501 set(OPTIONS.partial)
1502 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001503
Tao Bao2db13852018-01-08 22:28:57 -08001504 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001505 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1506
Yifan Hong50e79542018-11-08 17:44:12 -08001507 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001508 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001509 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001510 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang06400172021-03-05 15:42:03 -05001511 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001512 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1513 raise common.ExternalError(
1514 "Expect to generate incremental OTA for retrofitting dynamic "
1515 "partitions, but dynamic_partition_retrofit is not set in target "
1516 "build.")
1517 logger.info("Implicitly generating retrofit incremental OTA.")
1518 OPTIONS.retrofit_dynamic_partitions = True
1519
1520 # Skip postinstall for retrofitting dynamic partitions.
1521 if OPTIONS.retrofit_dynamic_partitions:
1522 OPTIONS.skip_postinstall = True
1523
Tao Baoc098e9e2016-01-07 13:03:56 -08001524 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001525 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1526 if OPTIONS.force_non_ab:
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001527 assert allow_non_ab,\
Kelvin Zhang06400172021-03-05 15:42:03 -05001528 "--force_non_ab only allowed on devices that supports non-A/B"
Yifan Hong65afc072020-04-17 10:08:10 -07001529 assert ab_update, "--force_non_ab only allowed on A/B devices"
1530
1531 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001532
Christian Oderf63e2cd2017-05-01 22:30:15 +02001533 # Use the default key to sign the package if not specified with package_key.
1534 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001535 # A/B update is getting created.
1536 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001537 if OPTIONS.package_key is None:
1538 OPTIONS.package_key = OPTIONS.info_dict.get(
1539 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001540 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001541 # Get signing keys
1542 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001543
1544 # Only check for existence of key file if using the default signer.
1545 # Because the custom signer might not need the key file AT all.
1546 # b/191704641
Kelvin Zhang4fc3aa02021-11-16 18:58:58 -08001547 if not OPTIONS.payload_signer:
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001548 private_key_path = OPTIONS.package_key + OPTIONS.private_key_suffix
1549 if not os.path.exists(private_key_path):
1550 raise common.ExternalError(
1551 "Private key {} doesn't exist. Make sure you passed the"
1552 " correct key path through -k option".format(
1553 private_key_path)
1554 )
Kelvin Zhang4fc3aa02021-11-16 18:58:58 -08001555 signapk_abs_path = os.path.join(
1556 OPTIONS.search_path, OPTIONS.signapk_path)
1557 if not os.path.exists(signapk_abs_path):
1558 raise common.ExternalError(
1559 "Failed to find sign apk binary {} in search path {}. Make sure the correct search path is passed via -p".format(OPTIONS.signapk_path, OPTIONS.search_path))
Christian Oderf63e2cd2017-05-01 22:30:15 +02001560
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001561 if OPTIONS.source_info_dict:
1562 source_build_prop = OPTIONS.source_info_dict["build.prop"]
1563 target_build_prop = OPTIONS.target_info_dict["build.prop"]
1564 source_spl = source_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
1565 target_spl = target_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001566 is_spl_downgrade = target_spl < source_spl
Kelvin Zhang06400172021-03-05 15:42:03 -05001567 if is_spl_downgrade and not OPTIONS.spl_downgrade and not OPTIONS.downgrade:
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001568 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001569 "Target security patch level {} is older than source SPL {} applying "
1570 "such OTA will likely cause device fail to boot. Pass --spl_downgrade "
1571 "to override this check. This script expects security patch level to "
1572 "be in format yyyy-mm-dd (e.x. 2021-02-05). It's possible to use "
1573 "separators other than -, so as long as it's used consistenly across "
1574 "all SPL dates".format(target_spl, source_spl))
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001575 elif not is_spl_downgrade and OPTIONS.spl_downgrade:
1576 raise ValueError("--spl_downgrade specified but no actual SPL downgrade"
1577 " detected. Please only pass in this flag if you want a"
1578 " SPL downgrade. Target SPL: {} Source SPL: {}"
1579 .format(target_spl, source_spl))
Yifan Hong65afc072020-04-17 10:08:10 -07001580 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001581 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001582 target_file=args[0],
1583 output_file=args[1],
1584 source_file=OPTIONS.incremental_source)
1585
Dan Willemsencea5cd22017-03-21 14:44:27 -07001586 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001587 GenerateNonAbOtaPackage(
1588 target_file=args[0],
1589 output_file=args[1],
1590 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001591
Tao Baof0c4aa22018-04-30 20:29:30 -07001592 # Post OTA generation works.
1593 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1594 logger.info("Generating diff logs...")
1595 logger.info("Unzipping target-files for diffing...")
1596 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1597 source_dir = common.UnzipTemp(
1598 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001599
Tao Baof0c4aa22018-04-30 20:29:30 -07001600 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001601 target_files_diff.recursiveDiff(
1602 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001603
Tao Bao32fcdab2018-10-12 10:30:39 -07001604 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001605
1606
1607if __name__ == '__main__':
1608 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001609 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001610 main(sys.argv[1:])
Doug Zongkerfc44a512014-08-26 13:10:25 -07001611 finally:
1612 common.Cleanup()