blob: 40da34d1224306f8d4f4aceabed8df86def0553f [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
David Anderson45b42302021-03-11 12:58:32 -0800214
215 --disable_vabc
216 Disable Virtual A/B Compression, for builds that have compression enabled
217 by default.
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400218
219 --vabc_downgrade
220 Don't disable Virtual A/B Compression for downgrading OTAs.
221 For VABC downgrades, we must finish merging before doing data wipe, and
222 since data wipe is required for downgrading OTA, this might cause long
223 wait time in recovery.
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700224
225 --enable_vabc_xor
226 Enable the VABC xor feature. Will reduce space requirements for OTA
227
Doug Zongkereef39442009-04-02 12:14:19 -0700228"""
229
Tao Bao89fbb0f2017-01-10 10:47:58 -0800230from __future__ import print_function
231
Tao Bao32fcdab2018-10-12 10:30:39 -0700232import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700233import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500234import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800235import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500236import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700237import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800238import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800239import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500240import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800241import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700242import zipfile
243
Kelvin Zhang766eea72021-06-03 09:36:08 -0400244import care_map_pb2
Doug Zongkereef39442009-04-02 12:14:19 -0700245import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400246import ota_utils
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500247from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400248 PropertyFiles, SECURITY_PATCH_LEVEL_PROP_NAME, GetZipEntryOffset)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400249import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400250from check_target_files_vintf import CheckVintfIfTrebleEnabled
251from non_ab_ota import GenerateNonAbOtaPackage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400252
Tao Bao481bab82017-12-21 11:23:09 -0800253if sys.hexversion < 0x02070000:
254 print("Python 2.7 or newer is required.", file=sys.stderr)
255 sys.exit(1)
256
Tao Bao32fcdab2018-10-12 10:30:39 -0700257logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800258
Kelvin Zhang2e417382020-08-20 11:33:11 -0400259OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700260OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700261OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700262OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700263OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700264OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
265if OPTIONS.worker_threads == 0:
266 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800267OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800268OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800269OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800270OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000271OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700272OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800273OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700274OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700275OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700276# Stash size cannot exceed cache_size * threshold.
277OPTIONS.cache_size = None
278OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800279OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700280OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700281OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700282OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700283OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800284OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800285OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700286OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500287OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700288OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700289OPTIONS.custom_images = {}
Kelvin Zhangbbfa1822021-02-03 17:19:44 -0500290OPTIONS.disable_vabc = False
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500291OPTIONS.spl_downgrade = False
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400292OPTIONS.vabc_downgrade = False
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700293OPTIONS.enable_vabc_xor = True
Tao Bao8dcf7382015-05-21 14:09:49 -0700294
Tao Bao15a146a2018-02-21 16:06:59 -0800295POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800296DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800297AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400298
Tao Baof0c4aa22018-04-30 20:29:30 -0700299# Files to be unzipped for target diffing purpose.
300TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700301 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700302 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800303RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700304
305# Images to be excluded from secondary payload. We essentially only keep
306# 'system_other' and bootloader partitions.
307SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000308 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700309 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700310 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800311
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500312
Tao Baofabe0832018-01-17 15:52:28 -0800313class PayloadSigner(object):
314 """A class that wraps the payload signing works.
315
316 When generating a Payload, hashes of the payload and metadata files will be
317 signed with the device key, either by calling an external payload signer or
318 by calling openssl with the package key. This class provides a unified
319 interface, so that callers can just call PayloadSigner.Sign().
320
321 If an external payload signer has been specified (OPTIONS.payload_signer), it
322 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
323 that the signing key should be provided as part of the payload_signer_args.
324 Otherwise without an external signer, it uses the package key
325 (OPTIONS.package_key) and calls openssl for the signing works.
326 """
327
328 def __init__(self):
329 if OPTIONS.payload_signer is None:
330 # Prepare the payload signing key.
331 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
332 pw = OPTIONS.key_passwords[OPTIONS.package_key]
333
334 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
335 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
336 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
337 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700338 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800339
340 self.signer = "openssl"
341 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
342 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700343 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
344 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800345 else:
346 self.signer = OPTIONS.payload_signer
347 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700348 if OPTIONS.payload_signer_maximum_signature_size:
349 self.maximum_signature_size = int(
350 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700351 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700352 # The legacy config uses RSA2048 keys.
353 logger.warning("The maximum signature size for payload signer is not"
354 " set, default to 256 bytes.")
355 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700356
357 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700358 def _GetMaximumSignatureSizeInBytes(signing_key):
359 out_signature_size_file = common.MakeTempFile("signature_size")
360 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
361 out_signature_size_file), "--private_key={}".format(signing_key)]
362 common.RunAndCheckOutput(cmd)
363 with open(out_signature_size_file) as f:
364 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100365 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700366 signature_size)
367 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800368
369 def Sign(self, in_file):
370 """Signs the given input file. Returns the output filename."""
371 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
372 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700373 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800374 return out_file
375
376
Tao Bao40b18822018-01-30 18:19:04 -0800377class Payload(object):
378 """Manages the creation and the signing of an A/B OTA Payload."""
379
380 PAYLOAD_BIN = 'payload.bin'
381 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800382 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
383 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800384
Tao Bao667ff572018-02-10 00:02:40 -0800385 def __init__(self, secondary=False):
386 """Initializes a Payload instance.
387
388 Args:
389 secondary: Whether it's generating a secondary payload (default: False).
390 """
Tao Bao40b18822018-01-30 18:19:04 -0800391 self.payload_file = None
392 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800393 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800394
Tao Baof0c4aa22018-04-30 20:29:30 -0700395 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700396 # Don't pipe (buffer) the output if verbose is set. Let
397 # brillo_update_payload write to stdout/stderr directly, so its progress can
398 # be monitored.
399 if OPTIONS.verbose:
400 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
401 else:
402 common.RunAndCheckOutput(cmd)
403
Tao Bao40b18822018-01-30 18:19:04 -0800404 def Generate(self, target_file, source_file=None, additional_args=None):
405 """Generates a payload from the given target-files zip(s).
406
407 Args:
408 target_file: The filename of the target build target-files zip.
409 source_file: The filename of the source build target-files zip; or None if
410 generating a full OTA.
411 additional_args: A list of additional args that should be passed to
412 brillo_update_payload script; or None.
413 """
414 if additional_args is None:
415 additional_args = []
416
417 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
418 cmd = ["brillo_update_payload", "generate",
419 "--payload", payload_file,
420 "--target_image", target_file]
421 if source_file is not None:
422 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700423 if OPTIONS.disable_fec_computation:
424 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500425 if OPTIONS.disable_verity_computation:
426 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800427 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700428 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800429
430 self.payload_file = payload_file
431 self.payload_properties = None
432
433 def Sign(self, payload_signer):
434 """Generates and signs the hashes of the payload and metadata.
435
436 Args:
437 payload_signer: A PayloadSigner() instance that serves the signing work.
438
439 Raises:
440 AssertionError: On any failure when calling brillo_update_payload script.
441 """
442 assert isinstance(payload_signer, PayloadSigner)
443
444 # 1. Generate hashes of the payload and metadata files.
445 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
446 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
447 cmd = ["brillo_update_payload", "hash",
448 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700449 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800450 "--metadata_hash_file", metadata_sig_file,
451 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700452 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800453
454 # 2. Sign the hashes.
455 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
456 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
457
458 # 3. Insert the signatures back into the payload file.
459 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
460 suffix=".bin")
461 cmd = ["brillo_update_payload", "sign",
462 "--unsigned_payload", self.payload_file,
463 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700464 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800465 "--metadata_signature_file", signed_metadata_sig_file,
466 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700467 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800468
469 # 4. Dump the signed payload properties.
470 properties_file = common.MakeTempFile(prefix="payload-properties-",
471 suffix=".txt")
472 cmd = ["brillo_update_payload", "properties",
473 "--payload", signed_payload_file,
474 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700475 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800476
Tao Bao667ff572018-02-10 00:02:40 -0800477 if self.secondary:
478 with open(properties_file, "a") as f:
479 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
480
Tao Bao40b18822018-01-30 18:19:04 -0800481 if OPTIONS.wipe_user_data:
482 with open(properties_file, "a") as f:
483 f.write("POWERWASH=1\n")
484
485 self.payload_file = signed_payload_file
486 self.payload_properties = properties_file
487
Tao Bao667ff572018-02-10 00:02:40 -0800488 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800489 """Writes the payload to the given zip.
490
491 Args:
492 output_zip: The output ZipFile instance.
493 """
494 assert self.payload_file is not None
495 assert self.payload_properties is not None
496
Tao Bao667ff572018-02-10 00:02:40 -0800497 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800498 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
499 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
500 else:
501 payload_arcname = Payload.PAYLOAD_BIN
502 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
503
Tao Bao40b18822018-01-30 18:19:04 -0800504 # Add the signed payload file and properties into the zip. In order to
505 # support streaming, we pack them as ZIP_STORED. So these entries can be
506 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800507 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800508 compress_type=zipfile.ZIP_STORED)
509 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800510 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800511 compress_type=zipfile.ZIP_STORED)
512
513
Tao Bao481bab82017-12-21 11:23:09 -0800514def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800515 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800516 if not oem_source:
517 return None
518
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800519 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800520 for oem_file in oem_source:
521 with open(oem_file) as fp:
522 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800523 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700524
Doug Zongkereef39442009-04-02 12:14:19 -0700525
Tao Baod3fc38a2018-03-08 16:09:01 -0800526class StreamingPropertyFiles(PropertyFiles):
527 """A subclass for computing the property-files for streaming A/B OTAs."""
528
529 def __init__(self):
530 super(StreamingPropertyFiles, self).__init__()
531 self.name = 'ota-streaming-property-files'
532 self.required = (
533 # payload.bin and payload_properties.txt must exist.
534 'payload.bin',
535 'payload_properties.txt',
536 )
537 self.optional = (
Tianjied868c122021-06-07 16:11:47 -0700538 # apex_info.pb isn't directly used in the update flow
539 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700540 # care_map is available only if dm-verity is enabled.
541 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800542 'care_map.txt',
543 # compatibility.zip is available only if target supports Treble.
544 'compatibility.zip',
545 )
546
547
Tao Bao85f16982018-03-08 16:28:33 -0800548class AbOtaPropertyFiles(StreamingPropertyFiles):
549 """The property-files for A/B OTA that includes payload_metadata.bin info.
550
551 Since P, we expose one more token (aka property-file), in addition to the ones
552 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
553 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
554 doesn't exist as a separate ZIP entry, but can be used to verify if the
555 payload can be applied on the given device.
556
557 For backward compatibility, we keep both of the 'ota-streaming-property-files'
558 and the newly added 'ota-property-files' in P. The new token will only be
559 available in 'ota-property-files'.
560 """
561
562 def __init__(self):
563 super(AbOtaPropertyFiles, self).__init__()
564 self.name = 'ota-property-files'
565
566 def _GetPrecomputed(self, input_zip):
567 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
568 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
569
570 @staticmethod
571 def _GetPayloadMetadataOffsetAndSize(input_zip):
572 """Computes the offset and size of the payload metadata for a given package.
573
574 (From system/update_engine/update_metadata.proto)
575 A delta update file contains all the deltas needed to update a system from
576 one specific version to another specific version. The update format is
577 represented by this struct pseudocode:
578
579 struct delta_update_file {
580 char magic[4] = "CrAU";
581 uint64 file_format_version;
582 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
583
584 // Only present if format_version > 1:
585 uint32 metadata_signature_size;
586
587 // The Bzip2 compressed DeltaArchiveManifest
588 char manifest[metadata_signature_size];
589
590 // The signature of the metadata (from the beginning of the payload up to
591 // this location, not including the signature itself). This is a
592 // serialized Signatures message.
593 char medatada_signature_message[metadata_signature_size];
594
595 // Data blobs for files, no specific format. The specific offset
596 // and length of each data blob is recorded in the DeltaArchiveManifest.
597 struct {
598 char data[];
599 } blobs[];
600
601 // These two are not signed:
602 uint64 payload_signatures_message_size;
603 char payload_signatures_message[];
604 };
605
606 'payload-metadata.bin' contains all the bytes from the beginning of the
607 payload, till the end of 'medatada_signature_message'.
608 """
609 payload_info = input_zip.getinfo('payload.bin')
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400610 (payload_offset, payload_size) = GetZipEntryOffset(input_zip, payload_info)
Tao Bao85f16982018-03-08 16:28:33 -0800611
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400612 # Read the underlying raw zipfile at specified offset
613 payload_fp = input_zip.fp
614 payload_fp.seek(payload_offset)
615 header_bin = payload_fp.read(24)
Tao Bao85f16982018-03-08 16:28:33 -0800616
617 # network byte order (big-endian)
618 header = struct.unpack("!IQQL", header_bin)
619
620 # 'CrAU'
621 magic = header[0]
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400622 assert magic == 0x43724155, "Invalid magic: {:x}, computed offset {}" \
623 .format(magic, payload_offset)
Tao Bao85f16982018-03-08 16:28:33 -0800624
625 manifest_size = header[2]
626 metadata_signature_size = header[3]
627 metadata_total = 24 + manifest_size + metadata_signature_size
628 assert metadata_total < payload_size
629
630 return (payload_offset, metadata_total)
631
632
Yifan Hong38ab4d82020-06-18 15:19:56 -0700633def UpdatesInfoForSpecialUpdates(content, partitions_filter,
634 delete_keys=None):
635 """ Updates info file for secondary payload generation, partial update, etc.
636
637 Scan each line in the info file, and remove the unwanted partitions from
638 the dynamic partition list in the related properties. e.g.
639 "super_google_dynamic_partitions_partition_list=system vendor product"
640 will become "super_google_dynamic_partitions_partition_list=system".
641
642 Args:
643 content: The content of the input info file. e.g. misc_info.txt.
644 partitions_filter: A function to filter the desired partitions from a given
645 list
646 delete_keys: A list of keys to delete in the info file
647
648 Returns:
649 A string of the updated info content.
650 """
651
652 output_list = []
653 # The suffix in partition_list variables that follows the name of the
654 # partition group.
655 list_suffix = 'partition_list'
656 for line in content.splitlines():
657 if line.startswith('#') or '=' not in line:
658 output_list.append(line)
659 continue
660 key, value = line.strip().split('=', 1)
661
662 if delete_keys and key in delete_keys:
663 pass
664 elif key.endswith(list_suffix):
665 partitions = value.split()
666 # TODO for partial update, partitions in the same group must be all
667 # updated or all omitted
668 partitions = filter(partitions_filter, partitions)
669 output_list.append('{}={}'.format(key, ' '.join(partitions)))
670 else:
671 output_list.append(line)
672 return '\n'.join(output_list)
673
674
Tao Bao15a146a2018-02-21 16:06:59 -0800675def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800676 """Returns a target-files.zip file for generating secondary payload.
677
678 Although the original target-files.zip already contains secondary slot
679 images (i.e. IMAGES/system_other.img), we need to rename the files to the
680 ones without _other suffix. Note that we cannot instead modify the names in
681 META/ab_partitions.txt, because there are no matching partitions on device.
682
683 For the partitions that don't have secondary images, the ones for primary
684 slot will be used. This is to ensure that we always have valid boot, vbmeta,
685 bootloader images in the inactive slot.
686
687 Args:
688 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800689 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800690
691 Returns:
692 The filename of the target-files.zip for generating secondary payload.
693 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700694
695 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700696 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700697 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700698 content = f.read()
699 # Remove virtual_ab flag from secondary payload so that OTA client
700 # don't use snapshots for secondary update
701 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
702 return UpdatesInfoForSpecialUpdates(
703 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
704 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700705
Tao Baof7140c02018-01-30 17:09:24 -0800706 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
707 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
708
Kelvin Zhang928c2342020-09-22 16:15:57 -0400709 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800710 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700711
Tao Bao0ff15de2019-03-20 11:26:06 -0700712 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800713 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800714 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
715 if info.filename == 'IMAGES/system_other.img':
716 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
717
718 # Primary images and friends need to be skipped explicitly.
719 elif info.filename in ('IMAGES/system.img',
720 'IMAGES/system.map'):
721 pass
Tao Bao3e759462019-09-17 22:43:11 -0700722
723 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
724 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
725 image_name = os.path.basename(info.filename)
726 if image_name not in ['{}.img'.format(partition) for partition in
727 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
728 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800729
Tao Bao15a146a2018-02-21 16:06:59 -0800730 # Skip copying the postinstall config if requested.
731 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
732 pass
733
Tianjie Xu1c808002019-09-11 00:29:26 -0700734 elif info.filename.startswith('META/'):
735 # Remove the unnecessary partitions for secondary images from the
736 # ab_partitions file.
737 if info.filename == AB_PARTITIONS:
738 with open(unzipped_file) as f:
739 partition_list = f.read().splitlines()
740 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700741 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400742 common.ZipWriteStr(target_zip, info.filename,
743 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700744 # Remove the unnecessary partitions from the dynamic partitions list.
745 elif (info.filename == 'META/misc_info.txt' or
746 info.filename == DYNAMIC_PARTITION_INFO):
747 modified_info = GetInfoForSecondaryImages(unzipped_file)
748 common.ZipWriteStr(target_zip, info.filename, modified_info)
749 else:
750 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800751
Tao Baof7140c02018-01-30 17:09:24 -0800752 common.ZipClose(target_zip)
753
754 return target_file
755
756
Tao Bao15a146a2018-02-21 16:06:59 -0800757def GetTargetFilesZipWithoutPostinstallConfig(input_file):
758 """Returns a target-files.zip that's not containing postinstall_config.txt.
759
760 This allows brillo_update_payload script to skip writing all the postinstall
761 hooks in the generated payload. The input target-files.zip file will be
762 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
763 contain the postinstall_config.txt entry, the input file will be returned.
764
765 Args:
766 input_file: The input target-files.zip filename.
767
768 Returns:
769 The filename of target-files.zip that doesn't contain postinstall config.
770 """
771 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400772 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800773 if POSTINSTALL_CONFIG not in input_zip.namelist():
774 return input_file
775
776 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
777 shutil.copyfile(input_file, target_file)
778 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
779 return target_file
780
Kelvin Zhang06400172021-03-05 15:42:03 -0500781
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400782def ParseInfoDict(target_file_path):
783 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
784 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800785
Kelvin Zhang06400172021-03-05 15:42:03 -0500786
Yifan Hong38ab4d82020-06-18 15:19:56 -0700787def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
788 """Returns a target-files.zip for partial ota update package generation.
789
790 This function modifies ab_partitions list with the desired partitions before
791 calling the brillo_update_payload script. It also cleans up the reference to
792 the excluded partitions in the info file, e.g misc_info.txt.
793
794 Args:
795 input_file: The input target-files.zip filename.
796 ab_partitions: A list of partitions to include in the partial update
797
798 Returns:
799 The filename of target-files.zip used for partial ota update.
800 """
801
802 def AddImageForPartition(partition_name):
803 """Add the archive name for a given partition to the copy list."""
804 for prefix in ['IMAGES', 'RADIO']:
805 image_path = '{}/{}.img'.format(prefix, partition_name)
806 if image_path in namelist:
807 copy_entries.append(image_path)
808 map_path = '{}/{}.map'.format(prefix, partition_name)
809 if map_path in namelist:
810 copy_entries.append(map_path)
811 return
812
813 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
814
815 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400816 original_ab_partitions = input_zip.read(
817 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700818 namelist = input_zip.namelist()
819
820 unrecognized_partitions = [partition for partition in ab_partitions if
821 partition not in original_ab_partitions]
822 if unrecognized_partitions:
823 raise ValueError("Unrecognized partitions when generating partial updates",
824 unrecognized_partitions)
825
826 logger.info("Generating partial updates for %s", ab_partitions)
827
828 copy_entries = ['META/update_engine_config.txt']
829 for partition_name in ab_partitions:
830 AddImageForPartition(partition_name)
831
832 # Use zip2zip to avoid extracting the zipfile.
833 partial_target_file = common.MakeTempFile(suffix='.zip')
834 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
835 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
836 common.RunAndCheckOutput(cmd)
837
838 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
839 allowZip64=True)
840 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
841 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
842 '\n'.join(ab_partitions))
Kelvin Zhang766eea72021-06-03 09:36:08 -0400843 CARE_MAP_ENTRY = "META/care_map.pb"
844 if CARE_MAP_ENTRY in input_zip.namelist():
845 caremap = care_map_pb2.CareMap()
846 caremap.ParseFromString(input_zip.read(CARE_MAP_ENTRY))
847 filtered = [
848 part for part in caremap.partitions if part.name in ab_partitions]
849 del caremap.partitions[:]
850 caremap.partitions.extend(filtered)
851 common.ZipWriteStr(partial_target_zip, CARE_MAP_ENTRY,
852 caremap.SerializeToString())
853
Yifan Hong38ab4d82020-06-18 15:19:56 -0700854 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
855 if info_file not in input_zip.namelist():
856 logger.warning('Cannot find %s in input zipfile', info_file)
857 continue
858 content = input_zip.read(info_file).decode()
859 modified_info = UpdatesInfoForSpecialUpdates(
860 content, lambda p: p in ab_partitions)
861 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
862
Kelvin Zhang766eea72021-06-03 09:36:08 -0400863 # TODO(xunchang) handle META/postinstall_config.txt'
864
Yifan Hong38ab4d82020-06-18 15:19:56 -0700865 common.ZipClose(partial_target_zip)
866
867 return partial_target_file
868
869
Yifan Hong50e79542018-11-08 17:44:12 -0800870def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800871 super_block_devices,
872 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800873 """Returns a target-files.zip for retrofitting dynamic partitions.
874
875 This allows brillo_update_payload to generate an OTA based on the exact
876 bits on the block devices. Postinstall is disabled.
877
878 Args:
879 input_file: The input target-files.zip filename.
880 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800881 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800882
883 Returns:
884 The filename of target-files.zip with *.img replaced with super_*.img for
885 each block device in super_block_devices.
886 """
887 assert super_block_devices, "No super_block_devices are specified."
888
889 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800890 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800891
892 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
893 shutil.copyfile(input_file, target_file)
894
Kelvin Zhang928c2342020-09-22 16:15:57 -0400895 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800896 namelist = input_zip.namelist()
897
Yifan Hongb433eba2019-03-06 12:42:53 -0800898 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
899
900 # Remove partitions from META/ab_partitions.txt that is in
901 # dynamic_partition_list but not in super_block_devices so that
902 # brillo_update_payload won't generate update for those logical partitions.
903 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
904 with open(ab_partitions_file) as f:
905 ab_partitions_lines = f.readlines()
906 ab_partitions = [line.strip() for line in ab_partitions_lines]
907 # Assert that all super_block_devices are in ab_partitions
908 super_device_not_updated = [partition for partition in super_block_devices
909 if partition not in ab_partitions]
910 assert not super_device_not_updated, \
911 "{} is in super_block_devices but not in {}".format(
912 super_device_not_updated, AB_PARTITIONS)
913 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400914 new_ab_partitions = common.MakeTempFile(
915 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800916 with open(new_ab_partitions, 'w') as f:
917 for partition in ab_partitions:
918 if (partition in dynamic_partition_list and
Kelvin Zhang06400172021-03-05 15:42:03 -0500919 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700920 logger.info("Dropping %s from ab_partitions.txt", partition)
921 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800922 f.write(partition + "\n")
923 to_delete = [AB_PARTITIONS]
924
Yifan Hong50e79542018-11-08 17:44:12 -0800925 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800926 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800927
928 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
929 # is a regular update on devices without dynamic partitions support.
930 to_delete += [DYNAMIC_PARTITION_INFO]
931
Tao Bao03fecb62018-11-28 10:59:23 -0800932 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700933 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800934 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800935
936 common.ZipDelete(target_file, to_delete)
937
Yifan Hong50e79542018-11-08 17:44:12 -0800938 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
939
940 # Write super_{foo}.img as {foo}.img.
941 for src, dst in replace.items():
942 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700943 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800944 unzipped_file = os.path.join(input_tmp, *src.split('/'))
945 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
946
Yifan Hongb433eba2019-03-06 12:42:53 -0800947 # Write new ab_partitions.txt file
948 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
949
Yifan Hong50e79542018-11-08 17:44:12 -0800950 common.ZipClose(target_zip)
951
952 return target_file
953
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400954
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700955def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
956 """Returns a target-files.zip for custom partitions update.
957
958 This function modifies ab_partitions list with the desired custom partitions
959 and puts the custom images into the target target-files.zip.
960
961 Args:
962 input_file: The input target-files.zip filename.
963 custom_images: A map of custom partitions and custom images.
964
965 Returns:
966 The filename of a target-files.zip which has renamed the custom images in
967 the IMAGS/ to their partition names.
968 """
969 # Use zip2zip to avoid extracting the zipfile.
970 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
971 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
972
973 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
974 namelist = input_zip.namelist()
975
976 # Write {custom_image}.img as {custom_partition}.img.
977 for custom_partition, custom_image in custom_images.items():
978 default_custom_image = '{}.img'.format(custom_partition)
979 if default_custom_image != custom_image:
980 logger.info("Update custom partition '%s' with '%s'",
981 custom_partition, custom_image)
982 # Default custom image need to be deleted first.
983 namelist.remove('IMAGES/{}'.format(default_custom_image))
984 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
985 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
986 default_custom_image)])
987
988 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
989 common.RunAndCheckOutput(cmd)
990
991 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -0800992
Kelvin Zhang06400172021-03-05 15:42:03 -0500993
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400994def GeneratePartitionTimestampFlags(partition_state):
995 partition_timestamps = [
996 part.partition_name + ":" + part.version
997 for part in partition_state]
998 return ["--partition_timestamps", ",".join(partition_timestamps)]
999
Kelvin Zhang06400172021-03-05 15:42:03 -05001000
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001001def GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang06400172021-03-05 15:42:03 -05001002 pre_partition_state, post_partition_state):
Kelvin Zhang80195722020-11-04 14:38:34 -05001003 assert pre_partition_state is not None
1004 partition_timestamps = {}
1005 for part in pre_partition_state:
1006 partition_timestamps[part.partition_name] = part.version
1007 for part in post_partition_state:
1008 partition_timestamps[part.partition_name] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001009 max(part.version, partition_timestamps[part.partition_name])
Kelvin Zhang80195722020-11-04 14:38:34 -05001010 return [
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001011 "--partition_timestamps",
Kelvin Zhang06400172021-03-05 15:42:03 -05001012 ",".join([key + ":" + val for (key, val)
1013 in partition_timestamps.items()])
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001014 ]
Kelvin Zhang80195722020-11-04 14:38:34 -05001015
Kelvin Zhang06400172021-03-05 15:42:03 -05001016
Kelvin Zhang65029a22020-11-03 10:07:51 -05001017def IsSparseImage(filepath):
1018 with open(filepath, 'rb') as fp:
1019 # Magic for android sparse image format
1020 # https://source.android.com/devices/bootloader/images
1021 return fp.read(4) == b'\x3A\xFF\x26\xED'
1022
Kelvin Zhang06400172021-03-05 15:42:03 -05001023
Kelvin Zhang65029a22020-11-03 10:07:51 -05001024def SupportsMainlineGkiUpdates(target_file):
1025 """Return True if the build supports MainlineGKIUpdates.
1026
1027 This function scans the product.img file in IMAGES/ directory for
1028 pattern |*/apex/com.android.gki.*.apex|. If there are files
1029 matching this pattern, conclude that build supports mainline
1030 GKI and return True
1031
1032 Args:
1033 target_file: Path to a target_file.zip, or an extracted directory
1034 Return:
1035 True if thisb uild supports Mainline GKI Updates.
1036 """
1037 if target_file is None:
1038 return False
1039 if os.path.isfile(target_file):
1040 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1041 if not os.path.isdir(target_file):
1042 assert os.path.isdir(target_file), \
1043 "{} must be a path to zip archive or dir containing extracted"\
1044 " target_files".format(target_file)
1045 image_file = os.path.join(target_file, "IMAGES", "product.img")
1046
1047 if not os.path.isfile(image_file):
1048 return False
1049
1050 if IsSparseImage(image_file):
1051 # Unsparse the image
1052 tmp_img = common.MakeTempFile(suffix=".img")
1053 subprocess.check_output(["simg2img", image_file, tmp_img])
1054 image_file = tmp_img
1055
1056 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1057 output = subprocess.check_output(cmd).decode()
1058
1059 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1060 return pattern.search(output) is not None
1061
Kelvin Zhang06400172021-03-05 15:42:03 -05001062
Tao Baof0c4aa22018-04-30 20:29:30 -07001063def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001064 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001065 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001066 if not OPTIONS.no_signing:
1067 staging_file = common.MakeTempFile(suffix='.zip')
1068 else:
1069 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001070 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001071 compression=zipfile.ZIP_DEFLATED,
1072 allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001073
Tao Bao481bab82017-12-21 11:23:09 -08001074 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001075 assert "ab_partitions" in OPTIONS.source_info_dict, \
1076 "META/ab_partitions.txt is required for ab_update."
1077 assert "ab_partitions" in OPTIONS.target_info_dict, \
1078 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001079 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1080 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang563750f2021-04-28 12:46:17 -04001081 # If source supports VABC, delta_generator/update_engine will attempt to
1082 # use VABC. This dangerous, as the target build won't have snapuserd to
1083 # serve I/O request when device boots. Therefore, disable VABC if source
1084 # build doesn't supports it.
1085 if not source_info.is_vabc or not target_info.is_vabc:
Kelvin Zhang10eac082021-06-10 14:32:19 -04001086 logger.info("Either source or target does not support VABC, disabling.")
Kelvin Zhang563750f2021-04-28 12:46:17 -04001087 OPTIONS.disable_vabc = True
Kelvin Zhang563750f2021-04-28 12:46:17 -04001088
Tao Bao481bab82017-12-21 11:23:09 -08001089 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001090 assert "ab_partitions" in OPTIONS.info_dict, \
1091 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001092 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001093 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001094
Kelvin Zhang10eac082021-06-10 14:32:19 -04001095 if target_info.vendor_suppressed_vabc:
1096 logger.info("Vendor suppressed VABC. Disabling")
1097 OPTIONS.disable_vabc = True
Kelvin Zhangad427382021-08-12 16:19:09 -07001098 if not target_info.is_vabc_xor or OPTIONS.disable_vabc:
1099 logger.info("VABC XOR Not supported, disabling")
1100 OPTIONS.enable_vabc_xor = False
Yifan Hong38ab4d82020-06-18 15:19:56 -07001101 additional_args = []
1102
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001103 # Prepare custom images.
1104 if OPTIONS.custom_images:
1105 target_file = GetTargetFilesZipForCustomImagesUpdates(
1106 target_file, OPTIONS.custom_images)
1107
Yifan Hong50e79542018-11-08 17:44:12 -08001108 if OPTIONS.retrofit_dynamic_partitions:
1109 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001110 target_file, target_info.get("super_block_devices").strip().split(),
1111 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001112 elif OPTIONS.partial:
1113 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1114 OPTIONS.partial)
1115 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -08001116 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001117 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001118 # Target_file may have been modified, reparse ab_partitions
1119 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1120 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001121 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001122
Kelvin Zhang414ca422021-08-27 15:12:08 -07001123 CheckVintfIfTrebleEnabled(target_file, target_info)
1124
Kelvin Zhang39aea442020-08-17 11:04:25 -04001125 # Metadata to comply with Android OTA package format.
1126 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001127 # Generate payload.
1128 payload = Payload()
1129
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001130 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001131 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001132 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001133 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001134 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001135 metadata.precondition.partition_state,
1136 metadata.postcondition.partition_state
1137 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001138 else:
Tianjiea2076132020-08-19 17:25:32 -07001139 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001140 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1141 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001142
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001143 if OPTIONS.disable_vabc:
1144 additional_args += ["--disable_vabc", "true"]
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001145 if OPTIONS.enable_vabc_xor:
1146 additional_args += ["--enable_vabc_xor", "true"]
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001147 additional_args += ["--max_timestamp", max_timestamp]
1148
Kelvin Zhang65029a22020-11-03 10:07:51 -05001149 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhang06400172021-03-05 15:42:03 -05001150 logger.warning(
1151 "Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001152 additional_args.extend(["--full_boot", "true"])
1153
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001154 payload.Generate(
1155 target_file,
1156 source_file,
1157 additional_args + partition_timestamps_flags
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001158 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001159
Tao Bao40b18822018-01-30 18:19:04 -08001160 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -08001161 payload_signer = PayloadSigner()
1162 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001163
Tao Bao40b18822018-01-30 18:19:04 -08001164 # Write the payload into output zip.
1165 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001166
Tao Baof7140c02018-01-30 17:09:24 -08001167 # Generate and include the secondary payload that installs secondary images
1168 # (e.g. system_other.img).
1169 if OPTIONS.include_secondary:
1170 # We always include a full payload for the secondary slot, even when
1171 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001172 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1173 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001174 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001175 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001176 additional_args=["--max_timestamp",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001177 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001178 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001179 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001180
Tianjie Xucfa86222016-03-07 16:31:19 -08001181 # If dm-verity is supported for the device, copy contents of care_map
1182 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001183 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001184 if (target_info.get("verity") == "true" or
Kelvin Zhang06400172021-03-05 15:42:03 -05001185 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001186 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1187 "META/" + x in target_zip.namelist()]
1188
1189 # Adds care_map if either the protobuf format or the plain text one exists.
1190 if care_map_list:
1191 care_map_name = care_map_list[0]
1192 care_map_data = target_zip.read("META/" + care_map_name)
1193 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001194 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001195 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001196 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001197 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001198 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001199
Tianjiea5fca032021-06-01 22:06:28 -07001200 # Add the source apex version for incremental ota updates, and write the
1201 # result apex info to the ota package.
1202 ota_apex_info = ota_utils.ConstructOtaApexInfo(target_zip, source_file)
1203 if ota_apex_info is not None:
1204 common.ZipWriteStr(output_zip, "apex_info.pb", ota_apex_info,
1205 compress_type=zipfile.ZIP_STORED)
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001206
Tao Bao21803d32017-04-19 10:16:09 -07001207 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001208
Tao Baofe5b69a2018-03-02 09:47:43 -08001209 # We haven't written the metadata entry yet, which will be handled in
1210 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001211 common.ZipClose(output_zip)
1212
Tao Bao85f16982018-03-08 16:28:33 -08001213 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1214 # all the info of the latter. However, system updaters and OTA servers need to
1215 # take time to switch to the new flag. We keep both of the flags for
1216 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001217 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001218 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001219 StreamingPropertyFiles(),
1220 )
1221 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001222
Tao Baoc098e9e2016-01-07 13:03:56 -08001223
Doug Zongkereef39442009-04-02 12:14:19 -07001224def main(argv):
1225
1226 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001227 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001228 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001229 elif o in ("-i", "--incremental_from"):
1230 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001231 elif o == "--full_radio":
1232 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001233 elif o == "--full_bootloader":
1234 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001235 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001236 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001237 elif o == "--downgrade":
1238 OPTIONS.downgrade = True
1239 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001240 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001241 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001242 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001243 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001244 elif o == "--oem_no_mount":
1245 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001246 elif o in ("-e", "--extra_script"):
1247 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001248 elif o in ("-t", "--worker_threads"):
1249 if a.isdigit():
1250 OPTIONS.worker_threads = int(a)
1251 else:
1252 raise ValueError("Cannot parse value %r for option %r - only "
1253 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001254 elif o in ("-2", "--two_step"):
1255 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001256 elif o == "--include_secondary":
1257 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001258 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001259 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001260 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001261 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001262 elif o == "--block":
1263 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001264 elif o in ("-b", "--binary"):
1265 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001266 elif o == "--stash_threshold":
1267 try:
1268 OPTIONS.stash_threshold = float(a)
1269 except ValueError:
1270 raise ValueError("Cannot parse value %r for option %r - expecting "
1271 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001272 elif o == "--log_diff":
1273 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001274 elif o == "--payload_signer":
1275 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001276 elif o == "--payload_signer_args":
1277 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001278 elif o == "--payload_signer_maximum_signature_size":
1279 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001280 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001281 # TODO(Xunchang) remove this option after cleaning up the callers.
1282 logger.warning("The option '--payload_signer_key_size' is deprecated."
1283 " Use '--payload_signer_maximum_signature_size' instead.")
1284 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001285 elif o == "--extracted_input_target_files":
1286 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001287 elif o == "--skip_postinstall":
1288 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001289 elif o == "--retrofit_dynamic_partitions":
1290 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001291 elif o == "--skip_compatibility_check":
1292 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001293 elif o == "--output_metadata_path":
1294 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001295 elif o == "--disable_fec_computation":
1296 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001297 elif o == "--disable_verity_computation":
1298 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001299 elif o == "--force_non_ab":
1300 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001301 elif o == "--boot_variable_file":
1302 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001303 elif o == "--partial":
1304 partitions = a.split()
1305 if not partitions:
1306 raise ValueError("Cannot parse partitions in {}".format(a))
1307 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001308 elif o == "--custom_image":
1309 custom_partition, custom_image = a.split("=")
1310 OPTIONS.custom_images[custom_partition] = custom_image
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001311 elif o == "--disable_vabc":
1312 OPTIONS.disable_vabc = True
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001313 elif o == "--spl_downgrade":
1314 OPTIONS.spl_downgrade = True
Kelvin Zhang06400172021-03-05 15:42:03 -05001315 OPTIONS.wipe_user_data = True
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001316 elif o == "--vabc_downgrade":
1317 OPTIONS.vabc_downgrade = True
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001318 elif o == "--enable_vabc_xor":
Kelvin Zhang1250bca2021-08-27 15:10:27 -07001319 OPTIONS.enable_vabc_xor = a.lower() != "false"
Doug Zongkereef39442009-04-02 12:14:19 -07001320 else:
1321 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001322 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001323
1324 args = common.ParseOptions(argv, __doc__,
Tao Bao337633f2017-12-06 15:20:19 -08001325 extra_opts="b:k:i:d:e:t:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001326 extra_long_opts=[
Dan Albert8b72aef2015-03-23 19:13:21 -07001327 "package_key=",
1328 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001329 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001330 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001331 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001332 "downgrade",
Tao Bao3e6161a2017-02-28 11:48:48 -08001333 "override_timestamp",
Dan Albert8b72aef2015-03-23 19:13:21 -07001334 "extra_script=",
1335 "worker_threads=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001336 "two_step",
Tao Baof7140c02018-01-30 17:09:24 -08001337 "include_secondary",
Dan Albert8b72aef2015-03-23 19:13:21 -07001338 "no_signing",
1339 "block",
1340 "binary=",
1341 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001342 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001343 "verify",
Tao Bao8dcf7382015-05-21 14:09:49 -07001344 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001345 "log_diff=",
Tao Baodea0f8b2016-06-20 17:55:06 -07001346 "payload_signer=",
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001347 "payload_signer_args=",
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001348 "payload_signer_maximum_signature_size=",
xunchang376cc7c2019-04-08 23:04:58 -07001349 "payload_signer_key_size=",
Dan Willemsencea5cd22017-03-21 14:44:27 -07001350 "extracted_input_target_files=",
Tao Bao15a146a2018-02-21 16:06:59 -08001351 "skip_postinstall",
Yifan Hong50e79542018-11-08 17:44:12 -08001352 "retrofit_dynamic_partitions",
xunchangabfa2652019-02-19 16:27:10 -08001353 "skip_compatibility_check",
xunchang1cfe2512019-02-19 14:14:48 -08001354 "output_metadata_path=",
Tianjie Xu1b079832019-08-28 12:19:23 -07001355 "disable_fec_computation",
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001356 "disable_verity_computation",
Yifan Hong65afc072020-04-17 10:08:10 -07001357 "force_non_ab",
Tianjied6867162020-05-10 14:30:13 -07001358 "boot_variable_file=",
Yifan Hong38ab4d82020-06-18 15:19:56 -07001359 "partial=",
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001360 "custom_image=",
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001361 "disable_vabc",
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001362 "spl_downgrade",
1363 "vabc_downgrade",
Kelvin Zhang1250bca2021-08-27 15:10:27 -07001364 "enable_vabc_xor=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001365 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001366
1367 if len(args) != 2:
1368 common.Usage(__doc__)
1369 sys.exit(1)
1370
Tao Bao32fcdab2018-10-12 10:30:39 -07001371 common.InitLogging()
1372
Tao Bao2db13852018-01-08 22:28:57 -08001373 # Load the build info dicts from the zip directly or the extracted input
1374 # directory. We don't need to unzip the entire target-files zips, because they
1375 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1376 # When loading the info dicts, we don't need to provide the second parameter
1377 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1378 # some properties with their actual paths, such as 'selinux_fc',
1379 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001380 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001381 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001382 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001383 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001384
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001385 if OPTIONS.wipe_user_data:
1386 if not OPTIONS.vabc_downgrade:
1387 logger.info("Detected downgrade/datawipe OTA."
1388 "When wiping userdata, VABC OTA makes the user "
1389 "wait in recovery mode for merge to finish. Disable VABC by "
1390 "default. If you really want to do VABC downgrade, pass "
1391 "--vabc_downgrade")
1392 OPTIONS.disable_vabc = True
Kelvin Zhang80195722020-11-04 14:38:34 -05001393 # We should only allow downgrading incrementals (as opposed to full).
1394 # Otherwise the device may go back from arbitrary build with this full
1395 # OTA package.
1396 if OPTIONS.incremental_source is None:
1397 raise ValueError("Cannot generate downgradable full OTAs")
1398
Yifan Hong38ab4d82020-06-18 15:19:56 -07001399 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1400 # target-file and reload the info_dict. So the info will be consistent with
1401 # the modified target-file.
1402
Tao Bao32fcdab2018-10-12 10:30:39 -07001403 logger.info("--- target info ---")
1404 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001405
1406 # Load the source build dict if applicable.
1407 if OPTIONS.incremental_source is not None:
1408 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001409 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001410
Tao Bao32fcdab2018-10-12 10:30:39 -07001411 logger.info("--- source info ---")
1412 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001413
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001414 if OPTIONS.partial:
1415 OPTIONS.info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001416 list(
1417 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1418 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001419 if OPTIONS.source_info_dict:
1420 OPTIONS.source_info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001421 list(
1422 set(OPTIONS.source_info_dict['ab_partitions']) &
1423 set(OPTIONS.partial)
1424 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001425
Tao Bao2db13852018-01-08 22:28:57 -08001426 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001427 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1428
Yifan Hong50e79542018-11-08 17:44:12 -08001429 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001430 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001431 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001432 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang06400172021-03-05 15:42:03 -05001433 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001434 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1435 raise common.ExternalError(
1436 "Expect to generate incremental OTA for retrofitting dynamic "
1437 "partitions, but dynamic_partition_retrofit is not set in target "
1438 "build.")
1439 logger.info("Implicitly generating retrofit incremental OTA.")
1440 OPTIONS.retrofit_dynamic_partitions = True
1441
1442 # Skip postinstall for retrofitting dynamic partitions.
1443 if OPTIONS.retrofit_dynamic_partitions:
1444 OPTIONS.skip_postinstall = True
1445
Tao Baoc098e9e2016-01-07 13:03:56 -08001446 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001447 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1448 if OPTIONS.force_non_ab:
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001449 assert allow_non_ab,\
Kelvin Zhang06400172021-03-05 15:42:03 -05001450 "--force_non_ab only allowed on devices that supports non-A/B"
Yifan Hong65afc072020-04-17 10:08:10 -07001451 assert ab_update, "--force_non_ab only allowed on A/B devices"
1452
1453 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001454
Christian Oderf63e2cd2017-05-01 22:30:15 +02001455 # Use the default key to sign the package if not specified with package_key.
1456 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001457 # A/B update is getting created.
1458 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001459 if OPTIONS.package_key is None:
1460 OPTIONS.package_key = OPTIONS.info_dict.get(
1461 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001462 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001463 # Get signing keys
1464 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
Kelvin Zhangeb586ef2021-02-08 20:11:49 -05001465 private_key_path = OPTIONS.package_key + OPTIONS.private_key_suffix
1466 if not os.path.exists(private_key_path):
1467 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001468 "Private key {} doesn't exist. Make sure you passed the"
1469 " correct key path through -k option".format(
1470 private_key_path)
1471 )
Christian Oderf63e2cd2017-05-01 22:30:15 +02001472
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001473 if OPTIONS.source_info_dict:
1474 source_build_prop = OPTIONS.source_info_dict["build.prop"]
1475 target_build_prop = OPTIONS.target_info_dict["build.prop"]
1476 source_spl = source_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
1477 target_spl = target_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001478 is_spl_downgrade = target_spl < source_spl
Kelvin Zhang06400172021-03-05 15:42:03 -05001479 if is_spl_downgrade and not OPTIONS.spl_downgrade and not OPTIONS.downgrade:
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001480 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001481 "Target security patch level {} is older than source SPL {} applying "
1482 "such OTA will likely cause device fail to boot. Pass --spl_downgrade "
1483 "to override this check. This script expects security patch level to "
1484 "be in format yyyy-mm-dd (e.x. 2021-02-05). It's possible to use "
1485 "separators other than -, so as long as it's used consistenly across "
1486 "all SPL dates".format(target_spl, source_spl))
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001487 elif not is_spl_downgrade and OPTIONS.spl_downgrade:
1488 raise ValueError("--spl_downgrade specified but no actual SPL downgrade"
1489 " detected. Please only pass in this flag if you want a"
1490 " SPL downgrade. Target SPL: {} Source SPL: {}"
1491 .format(target_spl, source_spl))
Yifan Hong65afc072020-04-17 10:08:10 -07001492 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001493 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001494 target_file=args[0],
1495 output_file=args[1],
1496 source_file=OPTIONS.incremental_source)
1497
Dan Willemsencea5cd22017-03-21 14:44:27 -07001498 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001499 GenerateNonAbOtaPackage(
1500 target_file=args[0],
1501 output_file=args[1],
1502 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001503
Tao Baof0c4aa22018-04-30 20:29:30 -07001504 # Post OTA generation works.
1505 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1506 logger.info("Generating diff logs...")
1507 logger.info("Unzipping target-files for diffing...")
1508 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1509 source_dir = common.UnzipTemp(
1510 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001511
Tao Baof0c4aa22018-04-30 20:29:30 -07001512 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001513 target_files_diff.recursiveDiff(
1514 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001515
Tao Bao32fcdab2018-10-12 10:30:39 -07001516 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001517
1518
1519if __name__ == '__main__':
1520 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001521 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001522 main(sys.argv[1:])
Tao Bao32fcdab2018-10-12 10:30:39 -07001523 except common.ExternalError:
1524 logger.exception("\n ERROR:\n")
Doug Zongkereef39442009-04-02 12:14:19 -07001525 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07001526 finally:
1527 common.Cleanup()