blob: ec703ab7d65deb8d8a1aa7124b55af40ffec8947 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
David Anderson45b42302021-03-11 12:58:32 -0800214
215 --disable_vabc
216 Disable Virtual A/B Compression, for builds that have compression enabled
217 by default.
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400218
219 --vabc_downgrade
220 Don't disable Virtual A/B Compression for downgrading OTAs.
221 For VABC downgrades, we must finish merging before doing data wipe, and
222 since data wipe is required for downgrading OTA, this might cause long
223 wait time in recovery.
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700224
225 --enable_vabc_xor
226 Enable the VABC xor feature. Will reduce space requirements for OTA
227
Tianjiee7ab38d2021-09-08 19:09:38 -0700228 --force_minor_version
229 Override the update_engine minor version for delta generation.
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -0700230
231 --compressor_types
232 A colon ':' separated list of compressors. Allowed values are bz2 and brotli.
Doug Zongkereef39442009-04-02 12:14:19 -0700233"""
234
Tao Bao89fbb0f2017-01-10 10:47:58 -0800235from __future__ import print_function
236
Tao Bao32fcdab2018-10-12 10:30:39 -0700237import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700238import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500239import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800240import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500241import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700242import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800243import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800244import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500245import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800246import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700247import zipfile
248
Kelvin Zhang766eea72021-06-03 09:36:08 -0400249import care_map_pb2
Doug Zongkereef39442009-04-02 12:14:19 -0700250import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400251import ota_utils
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500252from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400253 PropertyFiles, SECURITY_PATCH_LEVEL_PROP_NAME, GetZipEntryOffset)
Kelvin Zhang26390482021-11-02 14:31:10 -0700254from common import IsSparseImage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400255import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400256from check_target_files_vintf import CheckVintfIfTrebleEnabled
257from non_ab_ota import GenerateNonAbOtaPackage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400258
Tao Bao481bab82017-12-21 11:23:09 -0800259if sys.hexversion < 0x02070000:
260 print("Python 2.7 or newer is required.", file=sys.stderr)
261 sys.exit(1)
262
Tao Bao32fcdab2018-10-12 10:30:39 -0700263logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800264
Kelvin Zhang2e417382020-08-20 11:33:11 -0400265OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700266OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700267OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700268OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700269OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700270OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
271if OPTIONS.worker_threads == 0:
272 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800273OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800274OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800275OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800276OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000277OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700278OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800279OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700280OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700281OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700282# Stash size cannot exceed cache_size * threshold.
283OPTIONS.cache_size = None
284OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800285OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700286OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700287OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700288OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700289OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800290OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800291OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700292OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500293OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700294OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700295OPTIONS.custom_images = {}
Kelvin Zhangbbfa1822021-02-03 17:19:44 -0500296OPTIONS.disable_vabc = False
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500297OPTIONS.spl_downgrade = False
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400298OPTIONS.vabc_downgrade = False
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700299OPTIONS.enable_vabc_xor = True
Tianjiee7ab38d2021-09-08 19:09:38 -0700300OPTIONS.force_minor_version = None
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -0700301OPTIONS.compressor_types = None
Tao Bao8dcf7382015-05-21 14:09:49 -0700302
Tao Bao15a146a2018-02-21 16:06:59 -0800303POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800304DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800305AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400306
Tao Baof0c4aa22018-04-30 20:29:30 -0700307# Files to be unzipped for target diffing purpose.
308TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700309 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700310 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800311RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700312
313# Images to be excluded from secondary payload. We essentially only keep
314# 'system_other' and bootloader partitions.
315SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000316 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700317 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700318 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800319
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500320
Tao Baofabe0832018-01-17 15:52:28 -0800321class PayloadSigner(object):
322 """A class that wraps the payload signing works.
323
324 When generating a Payload, hashes of the payload and metadata files will be
325 signed with the device key, either by calling an external payload signer or
326 by calling openssl with the package key. This class provides a unified
327 interface, so that callers can just call PayloadSigner.Sign().
328
329 If an external payload signer has been specified (OPTIONS.payload_signer), it
330 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
331 that the signing key should be provided as part of the payload_signer_args.
332 Otherwise without an external signer, it uses the package key
333 (OPTIONS.package_key) and calls openssl for the signing works.
334 """
335
336 def __init__(self):
337 if OPTIONS.payload_signer is None:
338 # Prepare the payload signing key.
339 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
340 pw = OPTIONS.key_passwords[OPTIONS.package_key]
341
342 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
343 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
344 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
345 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700346 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800347
348 self.signer = "openssl"
349 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
350 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700351 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
352 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800353 else:
354 self.signer = OPTIONS.payload_signer
355 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700356 if OPTIONS.payload_signer_maximum_signature_size:
357 self.maximum_signature_size = int(
358 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700359 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700360 # The legacy config uses RSA2048 keys.
361 logger.warning("The maximum signature size for payload signer is not"
362 " set, default to 256 bytes.")
363 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700364
365 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700366 def _GetMaximumSignatureSizeInBytes(signing_key):
367 out_signature_size_file = common.MakeTempFile("signature_size")
368 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
369 out_signature_size_file), "--private_key={}".format(signing_key)]
370 common.RunAndCheckOutput(cmd)
371 with open(out_signature_size_file) as f:
372 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100373 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700374 signature_size)
375 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800376
377 def Sign(self, in_file):
378 """Signs the given input file. Returns the output filename."""
379 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
380 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700381 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800382 return out_file
383
384
Tao Bao40b18822018-01-30 18:19:04 -0800385class Payload(object):
386 """Manages the creation and the signing of an A/B OTA Payload."""
387
388 PAYLOAD_BIN = 'payload.bin'
389 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800390 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
391 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800392
Tao Bao667ff572018-02-10 00:02:40 -0800393 def __init__(self, secondary=False):
394 """Initializes a Payload instance.
395
396 Args:
397 secondary: Whether it's generating a secondary payload (default: False).
398 """
Tao Bao40b18822018-01-30 18:19:04 -0800399 self.payload_file = None
400 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800401 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800402
Tao Baof0c4aa22018-04-30 20:29:30 -0700403 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700404 # Don't pipe (buffer) the output if verbose is set. Let
405 # brillo_update_payload write to stdout/stderr directly, so its progress can
406 # be monitored.
407 if OPTIONS.verbose:
408 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
409 else:
410 common.RunAndCheckOutput(cmd)
411
Tao Bao40b18822018-01-30 18:19:04 -0800412 def Generate(self, target_file, source_file=None, additional_args=None):
413 """Generates a payload from the given target-files zip(s).
414
415 Args:
416 target_file: The filename of the target build target-files zip.
417 source_file: The filename of the source build target-files zip; or None if
418 generating a full OTA.
419 additional_args: A list of additional args that should be passed to
420 brillo_update_payload script; or None.
421 """
422 if additional_args is None:
423 additional_args = []
424
425 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
426 cmd = ["brillo_update_payload", "generate",
427 "--payload", payload_file,
428 "--target_image", target_file]
429 if source_file is not None:
430 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700431 if OPTIONS.disable_fec_computation:
432 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500433 if OPTIONS.disable_verity_computation:
434 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800435 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700436 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800437
438 self.payload_file = payload_file
439 self.payload_properties = None
440
441 def Sign(self, payload_signer):
442 """Generates and signs the hashes of the payload and metadata.
443
444 Args:
445 payload_signer: A PayloadSigner() instance that serves the signing work.
446
447 Raises:
448 AssertionError: On any failure when calling brillo_update_payload script.
449 """
450 assert isinstance(payload_signer, PayloadSigner)
451
452 # 1. Generate hashes of the payload and metadata files.
453 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
454 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
455 cmd = ["brillo_update_payload", "hash",
456 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700457 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800458 "--metadata_hash_file", metadata_sig_file,
459 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700460 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800461
462 # 2. Sign the hashes.
463 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
464 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
465
466 # 3. Insert the signatures back into the payload file.
467 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
468 suffix=".bin")
469 cmd = ["brillo_update_payload", "sign",
470 "--unsigned_payload", self.payload_file,
471 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700472 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800473 "--metadata_signature_file", signed_metadata_sig_file,
474 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700475 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800476
477 # 4. Dump the signed payload properties.
478 properties_file = common.MakeTempFile(prefix="payload-properties-",
479 suffix=".txt")
480 cmd = ["brillo_update_payload", "properties",
481 "--payload", signed_payload_file,
482 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700483 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800484
Tao Bao667ff572018-02-10 00:02:40 -0800485 if self.secondary:
486 with open(properties_file, "a") as f:
487 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
488
Tao Bao40b18822018-01-30 18:19:04 -0800489 if OPTIONS.wipe_user_data:
490 with open(properties_file, "a") as f:
491 f.write("POWERWASH=1\n")
492
493 self.payload_file = signed_payload_file
494 self.payload_properties = properties_file
495
Tao Bao667ff572018-02-10 00:02:40 -0800496 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800497 """Writes the payload to the given zip.
498
499 Args:
500 output_zip: The output ZipFile instance.
501 """
502 assert self.payload_file is not None
503 assert self.payload_properties is not None
504
Tao Bao667ff572018-02-10 00:02:40 -0800505 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800506 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
507 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
508 else:
509 payload_arcname = Payload.PAYLOAD_BIN
510 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
511
Tao Bao40b18822018-01-30 18:19:04 -0800512 # Add the signed payload file and properties into the zip. In order to
513 # support streaming, we pack them as ZIP_STORED. So these entries can be
514 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800515 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800516 compress_type=zipfile.ZIP_STORED)
517 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800518 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800519 compress_type=zipfile.ZIP_STORED)
520
521
Tao Bao481bab82017-12-21 11:23:09 -0800522def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800523 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800524 if not oem_source:
525 return None
526
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800527 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800528 for oem_file in oem_source:
529 with open(oem_file) as fp:
530 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800531 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700532
Doug Zongkereef39442009-04-02 12:14:19 -0700533
Tao Baod3fc38a2018-03-08 16:09:01 -0800534class StreamingPropertyFiles(PropertyFiles):
535 """A subclass for computing the property-files for streaming A/B OTAs."""
536
537 def __init__(self):
538 super(StreamingPropertyFiles, self).__init__()
539 self.name = 'ota-streaming-property-files'
540 self.required = (
541 # payload.bin and payload_properties.txt must exist.
542 'payload.bin',
543 'payload_properties.txt',
544 )
545 self.optional = (
Tianjied868c122021-06-07 16:11:47 -0700546 # apex_info.pb isn't directly used in the update flow
547 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700548 # care_map is available only if dm-verity is enabled.
549 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800550 'care_map.txt',
551 # compatibility.zip is available only if target supports Treble.
552 'compatibility.zip',
553 )
554
555
Tao Bao85f16982018-03-08 16:28:33 -0800556class AbOtaPropertyFiles(StreamingPropertyFiles):
557 """The property-files for A/B OTA that includes payload_metadata.bin info.
558
559 Since P, we expose one more token (aka property-file), in addition to the ones
560 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
561 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
562 doesn't exist as a separate ZIP entry, but can be used to verify if the
563 payload can be applied on the given device.
564
565 For backward compatibility, we keep both of the 'ota-streaming-property-files'
566 and the newly added 'ota-property-files' in P. The new token will only be
567 available in 'ota-property-files'.
568 """
569
570 def __init__(self):
571 super(AbOtaPropertyFiles, self).__init__()
572 self.name = 'ota-property-files'
573
574 def _GetPrecomputed(self, input_zip):
575 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
576 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
577
578 @staticmethod
579 def _GetPayloadMetadataOffsetAndSize(input_zip):
580 """Computes the offset and size of the payload metadata for a given package.
581
582 (From system/update_engine/update_metadata.proto)
583 A delta update file contains all the deltas needed to update a system from
584 one specific version to another specific version. The update format is
585 represented by this struct pseudocode:
586
587 struct delta_update_file {
588 char magic[4] = "CrAU";
589 uint64 file_format_version;
590 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
591
592 // Only present if format_version > 1:
593 uint32 metadata_signature_size;
594
595 // The Bzip2 compressed DeltaArchiveManifest
596 char manifest[metadata_signature_size];
597
598 // The signature of the metadata (from the beginning of the payload up to
599 // this location, not including the signature itself). This is a
600 // serialized Signatures message.
601 char medatada_signature_message[metadata_signature_size];
602
603 // Data blobs for files, no specific format. The specific offset
604 // and length of each data blob is recorded in the DeltaArchiveManifest.
605 struct {
606 char data[];
607 } blobs[];
608
609 // These two are not signed:
610 uint64 payload_signatures_message_size;
611 char payload_signatures_message[];
612 };
613
614 'payload-metadata.bin' contains all the bytes from the beginning of the
615 payload, till the end of 'medatada_signature_message'.
616 """
617 payload_info = input_zip.getinfo('payload.bin')
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400618 (payload_offset, payload_size) = GetZipEntryOffset(input_zip, payload_info)
Tao Bao85f16982018-03-08 16:28:33 -0800619
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400620 # Read the underlying raw zipfile at specified offset
621 payload_fp = input_zip.fp
622 payload_fp.seek(payload_offset)
623 header_bin = payload_fp.read(24)
Tao Bao85f16982018-03-08 16:28:33 -0800624
625 # network byte order (big-endian)
626 header = struct.unpack("!IQQL", header_bin)
627
628 # 'CrAU'
629 magic = header[0]
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400630 assert magic == 0x43724155, "Invalid magic: {:x}, computed offset {}" \
631 .format(magic, payload_offset)
Tao Bao85f16982018-03-08 16:28:33 -0800632
633 manifest_size = header[2]
634 metadata_signature_size = header[3]
635 metadata_total = 24 + manifest_size + metadata_signature_size
636 assert metadata_total < payload_size
637
638 return (payload_offset, metadata_total)
639
640
Yifan Hong38ab4d82020-06-18 15:19:56 -0700641def UpdatesInfoForSpecialUpdates(content, partitions_filter,
642 delete_keys=None):
643 """ Updates info file for secondary payload generation, partial update, etc.
644
645 Scan each line in the info file, and remove the unwanted partitions from
646 the dynamic partition list in the related properties. e.g.
647 "super_google_dynamic_partitions_partition_list=system vendor product"
648 will become "super_google_dynamic_partitions_partition_list=system".
649
650 Args:
651 content: The content of the input info file. e.g. misc_info.txt.
652 partitions_filter: A function to filter the desired partitions from a given
653 list
654 delete_keys: A list of keys to delete in the info file
655
656 Returns:
657 A string of the updated info content.
658 """
659
660 output_list = []
661 # The suffix in partition_list variables that follows the name of the
662 # partition group.
663 list_suffix = 'partition_list'
664 for line in content.splitlines():
665 if line.startswith('#') or '=' not in line:
666 output_list.append(line)
667 continue
668 key, value = line.strip().split('=', 1)
669
670 if delete_keys and key in delete_keys:
671 pass
672 elif key.endswith(list_suffix):
673 partitions = value.split()
674 # TODO for partial update, partitions in the same group must be all
675 # updated or all omitted
676 partitions = filter(partitions_filter, partitions)
677 output_list.append('{}={}'.format(key, ' '.join(partitions)))
678 else:
679 output_list.append(line)
680 return '\n'.join(output_list)
681
682
Tao Bao15a146a2018-02-21 16:06:59 -0800683def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800684 """Returns a target-files.zip file for generating secondary payload.
685
686 Although the original target-files.zip already contains secondary slot
687 images (i.e. IMAGES/system_other.img), we need to rename the files to the
688 ones without _other suffix. Note that we cannot instead modify the names in
689 META/ab_partitions.txt, because there are no matching partitions on device.
690
691 For the partitions that don't have secondary images, the ones for primary
692 slot will be used. This is to ensure that we always have valid boot, vbmeta,
693 bootloader images in the inactive slot.
694
695 Args:
696 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800697 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800698
699 Returns:
700 The filename of the target-files.zip for generating secondary payload.
701 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700702
703 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700704 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700705 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700706 content = f.read()
707 # Remove virtual_ab flag from secondary payload so that OTA client
708 # don't use snapshots for secondary update
709 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
710 return UpdatesInfoForSpecialUpdates(
711 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
712 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700713
Tao Baof7140c02018-01-30 17:09:24 -0800714 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
715 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
716
Kelvin Zhang928c2342020-09-22 16:15:57 -0400717 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800718 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700719
Tao Bao0ff15de2019-03-20 11:26:06 -0700720 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800721 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800722 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
723 if info.filename == 'IMAGES/system_other.img':
724 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
725
726 # Primary images and friends need to be skipped explicitly.
727 elif info.filename in ('IMAGES/system.img',
728 'IMAGES/system.map'):
729 pass
Tao Bao3e759462019-09-17 22:43:11 -0700730
731 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
732 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
733 image_name = os.path.basename(info.filename)
734 if image_name not in ['{}.img'.format(partition) for partition in
735 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
736 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800737
Tao Bao15a146a2018-02-21 16:06:59 -0800738 # Skip copying the postinstall config if requested.
739 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
740 pass
741
Tianjie Xu1c808002019-09-11 00:29:26 -0700742 elif info.filename.startswith('META/'):
743 # Remove the unnecessary partitions for secondary images from the
744 # ab_partitions file.
745 if info.filename == AB_PARTITIONS:
746 with open(unzipped_file) as f:
747 partition_list = f.read().splitlines()
748 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700749 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400750 common.ZipWriteStr(target_zip, info.filename,
751 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700752 # Remove the unnecessary partitions from the dynamic partitions list.
753 elif (info.filename == 'META/misc_info.txt' or
754 info.filename == DYNAMIC_PARTITION_INFO):
755 modified_info = GetInfoForSecondaryImages(unzipped_file)
756 common.ZipWriteStr(target_zip, info.filename, modified_info)
757 else:
758 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800759
Tao Baof7140c02018-01-30 17:09:24 -0800760 common.ZipClose(target_zip)
761
762 return target_file
763
764
Tao Bao15a146a2018-02-21 16:06:59 -0800765def GetTargetFilesZipWithoutPostinstallConfig(input_file):
766 """Returns a target-files.zip that's not containing postinstall_config.txt.
767
768 This allows brillo_update_payload script to skip writing all the postinstall
769 hooks in the generated payload. The input target-files.zip file will be
770 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
771 contain the postinstall_config.txt entry, the input file will be returned.
772
773 Args:
774 input_file: The input target-files.zip filename.
775
776 Returns:
777 The filename of target-files.zip that doesn't contain postinstall config.
778 """
779 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400780 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800781 if POSTINSTALL_CONFIG not in input_zip.namelist():
782 return input_file
783
784 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
785 shutil.copyfile(input_file, target_file)
786 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
787 return target_file
788
Kelvin Zhang06400172021-03-05 15:42:03 -0500789
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400790def ParseInfoDict(target_file_path):
791 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
792 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800793
Kelvin Zhang06400172021-03-05 15:42:03 -0500794
Yifan Hong38ab4d82020-06-18 15:19:56 -0700795def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
796 """Returns a target-files.zip for partial ota update package generation.
797
798 This function modifies ab_partitions list with the desired partitions before
799 calling the brillo_update_payload script. It also cleans up the reference to
800 the excluded partitions in the info file, e.g misc_info.txt.
801
802 Args:
803 input_file: The input target-files.zip filename.
804 ab_partitions: A list of partitions to include in the partial update
805
806 Returns:
807 The filename of target-files.zip used for partial ota update.
808 """
809
810 def AddImageForPartition(partition_name):
811 """Add the archive name for a given partition to the copy list."""
812 for prefix in ['IMAGES', 'RADIO']:
813 image_path = '{}/{}.img'.format(prefix, partition_name)
814 if image_path in namelist:
815 copy_entries.append(image_path)
816 map_path = '{}/{}.map'.format(prefix, partition_name)
817 if map_path in namelist:
818 copy_entries.append(map_path)
819 return
820
821 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
822
823 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400824 original_ab_partitions = input_zip.read(
825 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700826 namelist = input_zip.namelist()
827
828 unrecognized_partitions = [partition for partition in ab_partitions if
829 partition not in original_ab_partitions]
830 if unrecognized_partitions:
831 raise ValueError("Unrecognized partitions when generating partial updates",
832 unrecognized_partitions)
833
834 logger.info("Generating partial updates for %s", ab_partitions)
835
836 copy_entries = ['META/update_engine_config.txt']
837 for partition_name in ab_partitions:
838 AddImageForPartition(partition_name)
839
840 # Use zip2zip to avoid extracting the zipfile.
841 partial_target_file = common.MakeTempFile(suffix='.zip')
842 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
843 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
844 common.RunAndCheckOutput(cmd)
845
846 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
847 allowZip64=True)
848 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
849 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
850 '\n'.join(ab_partitions))
Kelvin Zhang766eea72021-06-03 09:36:08 -0400851 CARE_MAP_ENTRY = "META/care_map.pb"
852 if CARE_MAP_ENTRY in input_zip.namelist():
853 caremap = care_map_pb2.CareMap()
854 caremap.ParseFromString(input_zip.read(CARE_MAP_ENTRY))
855 filtered = [
856 part for part in caremap.partitions if part.name in ab_partitions]
857 del caremap.partitions[:]
858 caremap.partitions.extend(filtered)
859 common.ZipWriteStr(partial_target_zip, CARE_MAP_ENTRY,
860 caremap.SerializeToString())
861
Yifan Hong38ab4d82020-06-18 15:19:56 -0700862 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
863 if info_file not in input_zip.namelist():
864 logger.warning('Cannot find %s in input zipfile', info_file)
865 continue
866 content = input_zip.read(info_file).decode()
867 modified_info = UpdatesInfoForSpecialUpdates(
868 content, lambda p: p in ab_partitions)
869 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
870
Kelvin Zhang766eea72021-06-03 09:36:08 -0400871 # TODO(xunchang) handle META/postinstall_config.txt'
872
Yifan Hong38ab4d82020-06-18 15:19:56 -0700873 common.ZipClose(partial_target_zip)
874
875 return partial_target_file
876
877
Yifan Hong50e79542018-11-08 17:44:12 -0800878def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800879 super_block_devices,
880 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800881 """Returns a target-files.zip for retrofitting dynamic partitions.
882
883 This allows brillo_update_payload to generate an OTA based on the exact
884 bits on the block devices. Postinstall is disabled.
885
886 Args:
887 input_file: The input target-files.zip filename.
888 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800889 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800890
891 Returns:
892 The filename of target-files.zip with *.img replaced with super_*.img for
893 each block device in super_block_devices.
894 """
895 assert super_block_devices, "No super_block_devices are specified."
896
897 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800898 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800899
900 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
901 shutil.copyfile(input_file, target_file)
902
Kelvin Zhang928c2342020-09-22 16:15:57 -0400903 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800904 namelist = input_zip.namelist()
905
Yifan Hongb433eba2019-03-06 12:42:53 -0800906 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
907
908 # Remove partitions from META/ab_partitions.txt that is in
909 # dynamic_partition_list but not in super_block_devices so that
910 # brillo_update_payload won't generate update for those logical partitions.
911 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
912 with open(ab_partitions_file) as f:
913 ab_partitions_lines = f.readlines()
914 ab_partitions = [line.strip() for line in ab_partitions_lines]
915 # Assert that all super_block_devices are in ab_partitions
916 super_device_not_updated = [partition for partition in super_block_devices
917 if partition not in ab_partitions]
918 assert not super_device_not_updated, \
919 "{} is in super_block_devices but not in {}".format(
920 super_device_not_updated, AB_PARTITIONS)
921 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400922 new_ab_partitions = common.MakeTempFile(
923 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800924 with open(new_ab_partitions, 'w') as f:
925 for partition in ab_partitions:
926 if (partition in dynamic_partition_list and
Kelvin Zhang06400172021-03-05 15:42:03 -0500927 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700928 logger.info("Dropping %s from ab_partitions.txt", partition)
929 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800930 f.write(partition + "\n")
931 to_delete = [AB_PARTITIONS]
932
Yifan Hong50e79542018-11-08 17:44:12 -0800933 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800934 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800935
936 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
937 # is a regular update on devices without dynamic partitions support.
938 to_delete += [DYNAMIC_PARTITION_INFO]
939
Tao Bao03fecb62018-11-28 10:59:23 -0800940 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700941 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800942 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800943
944 common.ZipDelete(target_file, to_delete)
945
Yifan Hong50e79542018-11-08 17:44:12 -0800946 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
947
948 # Write super_{foo}.img as {foo}.img.
949 for src, dst in replace.items():
950 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700951 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800952 unzipped_file = os.path.join(input_tmp, *src.split('/'))
953 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
954
Yifan Hongb433eba2019-03-06 12:42:53 -0800955 # Write new ab_partitions.txt file
956 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
957
Yifan Hong50e79542018-11-08 17:44:12 -0800958 common.ZipClose(target_zip)
959
960 return target_file
961
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400962
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700963def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
964 """Returns a target-files.zip for custom partitions update.
965
966 This function modifies ab_partitions list with the desired custom partitions
967 and puts the custom images into the target target-files.zip.
968
969 Args:
970 input_file: The input target-files.zip filename.
971 custom_images: A map of custom partitions and custom images.
972
973 Returns:
974 The filename of a target-files.zip which has renamed the custom images in
975 the IMAGS/ to their partition names.
976 """
977 # Use zip2zip to avoid extracting the zipfile.
978 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
979 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
980
981 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
982 namelist = input_zip.namelist()
983
984 # Write {custom_image}.img as {custom_partition}.img.
985 for custom_partition, custom_image in custom_images.items():
986 default_custom_image = '{}.img'.format(custom_partition)
987 if default_custom_image != custom_image:
988 logger.info("Update custom partition '%s' with '%s'",
989 custom_partition, custom_image)
990 # Default custom image need to be deleted first.
991 namelist.remove('IMAGES/{}'.format(default_custom_image))
992 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
993 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
994 default_custom_image)])
995
996 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
997 common.RunAndCheckOutput(cmd)
998
999 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -08001000
Kelvin Zhang06400172021-03-05 15:42:03 -05001001
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001002def GeneratePartitionTimestampFlags(partition_state):
1003 partition_timestamps = [
1004 part.partition_name + ":" + part.version
1005 for part in partition_state]
1006 return ["--partition_timestamps", ",".join(partition_timestamps)]
1007
Kelvin Zhang06400172021-03-05 15:42:03 -05001008
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001009def GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang06400172021-03-05 15:42:03 -05001010 pre_partition_state, post_partition_state):
Kelvin Zhang80195722020-11-04 14:38:34 -05001011 assert pre_partition_state is not None
1012 partition_timestamps = {}
1013 for part in pre_partition_state:
1014 partition_timestamps[part.partition_name] = part.version
1015 for part in post_partition_state:
1016 partition_timestamps[part.partition_name] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001017 max(part.version, partition_timestamps[part.partition_name])
Kelvin Zhang80195722020-11-04 14:38:34 -05001018 return [
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001019 "--partition_timestamps",
Kelvin Zhang06400172021-03-05 15:42:03 -05001020 ",".join([key + ":" + val for (key, val)
1021 in partition_timestamps.items()])
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001022 ]
Kelvin Zhang80195722020-11-04 14:38:34 -05001023
Kelvin Zhang06400172021-03-05 15:42:03 -05001024
Kelvin Zhang65029a22020-11-03 10:07:51 -05001025def SupportsMainlineGkiUpdates(target_file):
1026 """Return True if the build supports MainlineGKIUpdates.
1027
1028 This function scans the product.img file in IMAGES/ directory for
1029 pattern |*/apex/com.android.gki.*.apex|. If there are files
1030 matching this pattern, conclude that build supports mainline
1031 GKI and return True
1032
1033 Args:
1034 target_file: Path to a target_file.zip, or an extracted directory
1035 Return:
1036 True if thisb uild supports Mainline GKI Updates.
1037 """
1038 if target_file is None:
1039 return False
1040 if os.path.isfile(target_file):
1041 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1042 if not os.path.isdir(target_file):
1043 assert os.path.isdir(target_file), \
1044 "{} must be a path to zip archive or dir containing extracted"\
1045 " target_files".format(target_file)
1046 image_file = os.path.join(target_file, "IMAGES", "product.img")
1047
1048 if not os.path.isfile(image_file):
1049 return False
1050
1051 if IsSparseImage(image_file):
1052 # Unsparse the image
1053 tmp_img = common.MakeTempFile(suffix=".img")
1054 subprocess.check_output(["simg2img", image_file, tmp_img])
1055 image_file = tmp_img
1056
1057 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1058 output = subprocess.check_output(cmd).decode()
1059
1060 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1061 return pattern.search(output) is not None
1062
Kelvin Zhang06400172021-03-05 15:42:03 -05001063
Tao Baof0c4aa22018-04-30 20:29:30 -07001064def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001065 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001066 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001067 if not OPTIONS.no_signing:
1068 staging_file = common.MakeTempFile(suffix='.zip')
1069 else:
1070 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001071 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001072 compression=zipfile.ZIP_DEFLATED,
1073 allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001074
Tao Bao481bab82017-12-21 11:23:09 -08001075 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001076 assert "ab_partitions" in OPTIONS.source_info_dict, \
1077 "META/ab_partitions.txt is required for ab_update."
1078 assert "ab_partitions" in OPTIONS.target_info_dict, \
1079 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001080 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1081 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang563750f2021-04-28 12:46:17 -04001082 # If source supports VABC, delta_generator/update_engine will attempt to
1083 # use VABC. This dangerous, as the target build won't have snapuserd to
1084 # serve I/O request when device boots. Therefore, disable VABC if source
1085 # build doesn't supports it.
1086 if not source_info.is_vabc or not target_info.is_vabc:
Kelvin Zhang10eac082021-06-10 14:32:19 -04001087 logger.info("Either source or target does not support VABC, disabling.")
Kelvin Zhang563750f2021-04-28 12:46:17 -04001088 OPTIONS.disable_vabc = True
Kelvin Zhang563750f2021-04-28 12:46:17 -04001089
Tao Bao481bab82017-12-21 11:23:09 -08001090 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001091 assert "ab_partitions" in OPTIONS.info_dict, \
1092 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001093 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001094 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001095
Kelvin Zhang10eac082021-06-10 14:32:19 -04001096 if target_info.vendor_suppressed_vabc:
1097 logger.info("Vendor suppressed VABC. Disabling")
1098 OPTIONS.disable_vabc = True
Kelvin Zhangad427382021-08-12 16:19:09 -07001099 if not target_info.is_vabc_xor or OPTIONS.disable_vabc:
1100 logger.info("VABC XOR Not supported, disabling")
1101 OPTIONS.enable_vabc_xor = False
Yifan Hong38ab4d82020-06-18 15:19:56 -07001102 additional_args = []
1103
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001104 # Prepare custom images.
1105 if OPTIONS.custom_images:
1106 target_file = GetTargetFilesZipForCustomImagesUpdates(
1107 target_file, OPTIONS.custom_images)
1108
Yifan Hong50e79542018-11-08 17:44:12 -08001109 if OPTIONS.retrofit_dynamic_partitions:
1110 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001111 target_file, target_info.get("super_block_devices").strip().split(),
1112 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001113 elif OPTIONS.partial:
1114 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1115 OPTIONS.partial)
1116 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -08001117 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001118 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001119 # Target_file may have been modified, reparse ab_partitions
1120 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1121 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001122 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001123
Kelvin Zhang414ca422021-08-27 15:12:08 -07001124 CheckVintfIfTrebleEnabled(target_file, target_info)
1125
Kelvin Zhang39aea442020-08-17 11:04:25 -04001126 # Metadata to comply with Android OTA package format.
1127 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001128 # Generate payload.
1129 payload = Payload()
1130
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001131 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001132 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001133 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001134 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001135 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001136 metadata.precondition.partition_state,
1137 metadata.postcondition.partition_state
1138 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001139 else:
Tianjiea2076132020-08-19 17:25:32 -07001140 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001141 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1142 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001143
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001144 if OPTIONS.disable_vabc:
1145 additional_args += ["--disable_vabc", "true"]
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001146 if OPTIONS.enable_vabc_xor:
1147 additional_args += ["--enable_vabc_xor", "true"]
Tianjiee7ab38d2021-09-08 19:09:38 -07001148 if OPTIONS.force_minor_version:
1149 additional_args += ["--force_minor_version", OPTIONS.force_minor_version]
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001150 if OPTIONS.compressor_types:
1151 additional_args += ["--compressor_types", OPTIONS.compressor_types]
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001152 additional_args += ["--max_timestamp", max_timestamp]
1153
Kelvin Zhang65029a22020-11-03 10:07:51 -05001154 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhang06400172021-03-05 15:42:03 -05001155 logger.warning(
1156 "Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001157 additional_args.extend(["--full_boot", "true"])
1158
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001159 payload.Generate(
1160 target_file,
1161 source_file,
1162 additional_args + partition_timestamps_flags
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001163 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001164
Tao Bao40b18822018-01-30 18:19:04 -08001165 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -08001166 payload_signer = PayloadSigner()
1167 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001168
Tao Bao40b18822018-01-30 18:19:04 -08001169 # Write the payload into output zip.
1170 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001171
Tao Baof7140c02018-01-30 17:09:24 -08001172 # Generate and include the secondary payload that installs secondary images
1173 # (e.g. system_other.img).
1174 if OPTIONS.include_secondary:
1175 # We always include a full payload for the secondary slot, even when
1176 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001177 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1178 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001179 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001180 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001181 additional_args=["--max_timestamp",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001182 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001183 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001184 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001185
Tianjie Xucfa86222016-03-07 16:31:19 -08001186 # If dm-verity is supported for the device, copy contents of care_map
1187 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001188 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001189 if (target_info.get("verity") == "true" or
Kelvin Zhang06400172021-03-05 15:42:03 -05001190 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001191 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1192 "META/" + x in target_zip.namelist()]
1193
1194 # Adds care_map if either the protobuf format or the plain text one exists.
1195 if care_map_list:
1196 care_map_name = care_map_list[0]
1197 care_map_data = target_zip.read("META/" + care_map_name)
1198 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001199 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001200 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001201 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001202 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001203 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001204
Tianjiea5fca032021-06-01 22:06:28 -07001205 # Add the source apex version for incremental ota updates, and write the
1206 # result apex info to the ota package.
1207 ota_apex_info = ota_utils.ConstructOtaApexInfo(target_zip, source_file)
1208 if ota_apex_info is not None:
1209 common.ZipWriteStr(output_zip, "apex_info.pb", ota_apex_info,
1210 compress_type=zipfile.ZIP_STORED)
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001211
Tao Bao21803d32017-04-19 10:16:09 -07001212 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001213
Tao Baofe5b69a2018-03-02 09:47:43 -08001214 # We haven't written the metadata entry yet, which will be handled in
1215 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001216 common.ZipClose(output_zip)
1217
Tao Bao85f16982018-03-08 16:28:33 -08001218 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1219 # all the info of the latter. However, system updaters and OTA servers need to
1220 # take time to switch to the new flag. We keep both of the flags for
1221 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001222 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001223 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001224 StreamingPropertyFiles(),
1225 )
1226 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001227
Tao Baoc098e9e2016-01-07 13:03:56 -08001228
Doug Zongkereef39442009-04-02 12:14:19 -07001229def main(argv):
1230
1231 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001232 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001233 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001234 elif o in ("-i", "--incremental_from"):
1235 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001236 elif o == "--full_radio":
1237 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001238 elif o == "--full_bootloader":
1239 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001240 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001241 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001242 elif o == "--downgrade":
1243 OPTIONS.downgrade = True
1244 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001245 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001246 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001247 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001248 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001249 elif o == "--oem_no_mount":
1250 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001251 elif o in ("-e", "--extra_script"):
1252 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001253 elif o in ("-t", "--worker_threads"):
1254 if a.isdigit():
1255 OPTIONS.worker_threads = int(a)
1256 else:
1257 raise ValueError("Cannot parse value %r for option %r - only "
1258 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001259 elif o in ("-2", "--two_step"):
1260 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001261 elif o == "--include_secondary":
1262 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001263 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001264 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001265 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001266 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001267 elif o == "--block":
1268 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001269 elif o in ("-b", "--binary"):
1270 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001271 elif o == "--stash_threshold":
1272 try:
1273 OPTIONS.stash_threshold = float(a)
1274 except ValueError:
1275 raise ValueError("Cannot parse value %r for option %r - expecting "
1276 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001277 elif o == "--log_diff":
1278 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001279 elif o == "--payload_signer":
1280 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001281 elif o == "--payload_signer_args":
1282 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001283 elif o == "--payload_signer_maximum_signature_size":
1284 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001285 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001286 # TODO(Xunchang) remove this option after cleaning up the callers.
1287 logger.warning("The option '--payload_signer_key_size' is deprecated."
1288 " Use '--payload_signer_maximum_signature_size' instead.")
1289 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001290 elif o == "--extracted_input_target_files":
1291 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001292 elif o == "--skip_postinstall":
1293 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001294 elif o == "--retrofit_dynamic_partitions":
1295 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001296 elif o == "--skip_compatibility_check":
1297 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001298 elif o == "--output_metadata_path":
1299 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001300 elif o == "--disable_fec_computation":
1301 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001302 elif o == "--disable_verity_computation":
1303 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001304 elif o == "--force_non_ab":
1305 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001306 elif o == "--boot_variable_file":
1307 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001308 elif o == "--partial":
1309 partitions = a.split()
1310 if not partitions:
1311 raise ValueError("Cannot parse partitions in {}".format(a))
1312 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001313 elif o == "--custom_image":
1314 custom_partition, custom_image = a.split("=")
1315 OPTIONS.custom_images[custom_partition] = custom_image
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001316 elif o == "--disable_vabc":
1317 OPTIONS.disable_vabc = True
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001318 elif o == "--spl_downgrade":
1319 OPTIONS.spl_downgrade = True
Kelvin Zhang06400172021-03-05 15:42:03 -05001320 OPTIONS.wipe_user_data = True
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001321 elif o == "--vabc_downgrade":
1322 OPTIONS.vabc_downgrade = True
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001323 elif o == "--enable_vabc_xor":
Kelvin Zhang1250bca2021-08-27 15:10:27 -07001324 OPTIONS.enable_vabc_xor = a.lower() != "false"
Tianjiee7ab38d2021-09-08 19:09:38 -07001325 elif o == "--force_minor_version":
1326 OPTIONS.force_minor_version = a
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001327 elif o == "--compressor_types":
1328 OPTIONS.compressor_types = a
Doug Zongkereef39442009-04-02 12:14:19 -07001329 else:
1330 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001331 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001332
1333 args = common.ParseOptions(argv, __doc__,
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001334 extra_opts="b:k:i:d:e:t:2o:",
1335 extra_long_opts=[
1336 "package_key=",
1337 "incremental_from=",
1338 "full_radio",
1339 "full_bootloader",
1340 "wipe_user_data",
1341 "downgrade",
1342 "override_timestamp",
1343 "extra_script=",
1344 "worker_threads=",
1345 "two_step",
1346 "include_secondary",
1347 "no_signing",
1348 "block",
1349 "binary=",
1350 "oem_settings=",
1351 "oem_no_mount",
1352 "verify",
1353 "stash_threshold=",
1354 "log_diff=",
1355 "payload_signer=",
1356 "payload_signer_args=",
1357 "payload_signer_maximum_signature_size=",
1358 "payload_signer_key_size=",
1359 "extracted_input_target_files=",
1360 "skip_postinstall",
1361 "retrofit_dynamic_partitions",
1362 "skip_compatibility_check",
1363 "output_metadata_path=",
1364 "disable_fec_computation",
1365 "disable_verity_computation",
1366 "force_non_ab",
1367 "boot_variable_file=",
1368 "partial=",
1369 "custom_image=",
1370 "disable_vabc",
1371 "spl_downgrade",
1372 "vabc_downgrade",
1373 "enable_vabc_xor=",
1374 "force_minor_version=",
1375 "compressor_types=",
1376 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001377
1378 if len(args) != 2:
1379 common.Usage(__doc__)
1380 sys.exit(1)
1381
Tao Bao32fcdab2018-10-12 10:30:39 -07001382 common.InitLogging()
1383
Tao Bao2db13852018-01-08 22:28:57 -08001384 # Load the build info dicts from the zip directly or the extracted input
1385 # directory. We don't need to unzip the entire target-files zips, because they
1386 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1387 # When loading the info dicts, we don't need to provide the second parameter
1388 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1389 # some properties with their actual paths, such as 'selinux_fc',
1390 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001391 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001392 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001393 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001394 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001395
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001396 if OPTIONS.wipe_user_data:
1397 if not OPTIONS.vabc_downgrade:
1398 logger.info("Detected downgrade/datawipe OTA."
1399 "When wiping userdata, VABC OTA makes the user "
1400 "wait in recovery mode for merge to finish. Disable VABC by "
1401 "default. If you really want to do VABC downgrade, pass "
1402 "--vabc_downgrade")
1403 OPTIONS.disable_vabc = True
Kelvin Zhang80195722020-11-04 14:38:34 -05001404 # We should only allow downgrading incrementals (as opposed to full).
1405 # Otherwise the device may go back from arbitrary build with this full
1406 # OTA package.
Kelvin Zhang81641af2021-10-26 16:03:25 -07001407 if OPTIONS.incremental_source is None and OPTIONS.downgrade:
1408 raise ValueError("Cannot generate downgradable full OTAs")
Kelvin Zhang80195722020-11-04 14:38:34 -05001409
Yifan Hong38ab4d82020-06-18 15:19:56 -07001410 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1411 # target-file and reload the info_dict. So the info will be consistent with
1412 # the modified target-file.
1413
Tao Bao32fcdab2018-10-12 10:30:39 -07001414 logger.info("--- target info ---")
1415 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001416
1417 # Load the source build dict if applicable.
1418 if OPTIONS.incremental_source is not None:
1419 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001420 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001421
Tao Bao32fcdab2018-10-12 10:30:39 -07001422 logger.info("--- source info ---")
1423 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001424
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001425 if OPTIONS.partial:
1426 OPTIONS.info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001427 list(
1428 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1429 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001430 if OPTIONS.source_info_dict:
1431 OPTIONS.source_info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001432 list(
1433 set(OPTIONS.source_info_dict['ab_partitions']) &
1434 set(OPTIONS.partial)
1435 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001436
Tao Bao2db13852018-01-08 22:28:57 -08001437 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001438 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1439
Yifan Hong50e79542018-11-08 17:44:12 -08001440 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001441 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001442 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001443 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang06400172021-03-05 15:42:03 -05001444 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001445 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1446 raise common.ExternalError(
1447 "Expect to generate incremental OTA for retrofitting dynamic "
1448 "partitions, but dynamic_partition_retrofit is not set in target "
1449 "build.")
1450 logger.info("Implicitly generating retrofit incremental OTA.")
1451 OPTIONS.retrofit_dynamic_partitions = True
1452
1453 # Skip postinstall for retrofitting dynamic partitions.
1454 if OPTIONS.retrofit_dynamic_partitions:
1455 OPTIONS.skip_postinstall = True
1456
Tao Baoc098e9e2016-01-07 13:03:56 -08001457 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001458 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1459 if OPTIONS.force_non_ab:
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001460 assert allow_non_ab,\
Kelvin Zhang06400172021-03-05 15:42:03 -05001461 "--force_non_ab only allowed on devices that supports non-A/B"
Yifan Hong65afc072020-04-17 10:08:10 -07001462 assert ab_update, "--force_non_ab only allowed on A/B devices"
1463
1464 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001465
Christian Oderf63e2cd2017-05-01 22:30:15 +02001466 # Use the default key to sign the package if not specified with package_key.
1467 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001468 # A/B update is getting created.
1469 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001470 if OPTIONS.package_key is None:
1471 OPTIONS.package_key = OPTIONS.info_dict.get(
1472 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001473 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001474 # Get signing keys
1475 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
Kelvin Zhangeb586ef2021-02-08 20:11:49 -05001476 private_key_path = OPTIONS.package_key + OPTIONS.private_key_suffix
1477 if not os.path.exists(private_key_path):
1478 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001479 "Private key {} doesn't exist. Make sure you passed the"
1480 " correct key path through -k option".format(
1481 private_key_path)
1482 )
Christian Oderf63e2cd2017-05-01 22:30:15 +02001483
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001484 if OPTIONS.source_info_dict:
1485 source_build_prop = OPTIONS.source_info_dict["build.prop"]
1486 target_build_prop = OPTIONS.target_info_dict["build.prop"]
1487 source_spl = source_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
1488 target_spl = target_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001489 is_spl_downgrade = target_spl < source_spl
Kelvin Zhang06400172021-03-05 15:42:03 -05001490 if is_spl_downgrade and not OPTIONS.spl_downgrade and not OPTIONS.downgrade:
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001491 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001492 "Target security patch level {} is older than source SPL {} applying "
1493 "such OTA will likely cause device fail to boot. Pass --spl_downgrade "
1494 "to override this check. This script expects security patch level to "
1495 "be in format yyyy-mm-dd (e.x. 2021-02-05). It's possible to use "
1496 "separators other than -, so as long as it's used consistenly across "
1497 "all SPL dates".format(target_spl, source_spl))
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001498 elif not is_spl_downgrade and OPTIONS.spl_downgrade:
1499 raise ValueError("--spl_downgrade specified but no actual SPL downgrade"
1500 " detected. Please only pass in this flag if you want a"
1501 " SPL downgrade. Target SPL: {} Source SPL: {}"
1502 .format(target_spl, source_spl))
Yifan Hong65afc072020-04-17 10:08:10 -07001503 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001504 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001505 target_file=args[0],
1506 output_file=args[1],
1507 source_file=OPTIONS.incremental_source)
1508
Dan Willemsencea5cd22017-03-21 14:44:27 -07001509 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001510 GenerateNonAbOtaPackage(
1511 target_file=args[0],
1512 output_file=args[1],
1513 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001514
Tao Baof0c4aa22018-04-30 20:29:30 -07001515 # Post OTA generation works.
1516 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1517 logger.info("Generating diff logs...")
1518 logger.info("Unzipping target-files for diffing...")
1519 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1520 source_dir = common.UnzipTemp(
1521 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001522
Tao Baof0c4aa22018-04-30 20:29:30 -07001523 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001524 target_files_diff.recursiveDiff(
1525 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001526
Tao Bao32fcdab2018-10-12 10:30:39 -07001527 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001528
1529
1530if __name__ == '__main__':
1531 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001532 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001533 main(sys.argv[1:])
Tao Bao32fcdab2018-10-12 10:30:39 -07001534 except common.ExternalError:
1535 logger.exception("\n ERROR:\n")
Doug Zongkereef39442009-04-02 12:14:19 -07001536 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07001537 finally:
1538 common.Cleanup()