blob: 61c8212f7df595bf177c8464dda7179617569f9c [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
David Anderson45b42302021-03-11 12:58:32 -0800214
215 --disable_vabc
216 Disable Virtual A/B Compression, for builds that have compression enabled
217 by default.
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400218
219 --vabc_downgrade
220 Don't disable Virtual A/B Compression for downgrading OTAs.
221 For VABC downgrades, we must finish merging before doing data wipe, and
222 since data wipe is required for downgrading OTA, this might cause long
223 wait time in recovery.
Doug Zongkereef39442009-04-02 12:14:19 -0700224"""
225
Tao Bao89fbb0f2017-01-10 10:47:58 -0800226from __future__ import print_function
227
Tao Bao32fcdab2018-10-12 10:30:39 -0700228import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700229import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500230import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800231import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500232import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700233import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800234import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800235import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500236import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800237import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700238import zipfile
239
240import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400241import ota_utils
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500242from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500243 PropertyFiles, SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400244import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400245from check_target_files_vintf import CheckVintfIfTrebleEnabled
246from non_ab_ota import GenerateNonAbOtaPackage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400247
Tao Bao481bab82017-12-21 11:23:09 -0800248if sys.hexversion < 0x02070000:
249 print("Python 2.7 or newer is required.", file=sys.stderr)
250 sys.exit(1)
251
Tao Bao32fcdab2018-10-12 10:30:39 -0700252logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800253
Kelvin Zhang2e417382020-08-20 11:33:11 -0400254OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700255OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700256OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700257OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700258OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700259OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
260if OPTIONS.worker_threads == 0:
261 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800262OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800263OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800264OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800265OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000266OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700267OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800268OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700269OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700270OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700271# Stash size cannot exceed cache_size * threshold.
272OPTIONS.cache_size = None
273OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800274OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700275OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700276OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700277OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700278OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800279OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800280OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700281OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500282OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700283OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700284OPTIONS.custom_images = {}
Kelvin Zhangbbfa1822021-02-03 17:19:44 -0500285OPTIONS.disable_vabc = False
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500286OPTIONS.spl_downgrade = False
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400287OPTIONS.vabc_downgrade = False
Tao Bao8dcf7382015-05-21 14:09:49 -0700288
Tao Bao15a146a2018-02-21 16:06:59 -0800289POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800290DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800291AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400292
Tao Baof0c4aa22018-04-30 20:29:30 -0700293# Files to be unzipped for target diffing purpose.
294TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700295 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700296 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800297RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700298
299# Images to be excluded from secondary payload. We essentially only keep
300# 'system_other' and bootloader partitions.
301SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000302 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700303 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700304 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800305
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500306
Tao Baofabe0832018-01-17 15:52:28 -0800307class PayloadSigner(object):
308 """A class that wraps the payload signing works.
309
310 When generating a Payload, hashes of the payload and metadata files will be
311 signed with the device key, either by calling an external payload signer or
312 by calling openssl with the package key. This class provides a unified
313 interface, so that callers can just call PayloadSigner.Sign().
314
315 If an external payload signer has been specified (OPTIONS.payload_signer), it
316 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
317 that the signing key should be provided as part of the payload_signer_args.
318 Otherwise without an external signer, it uses the package key
319 (OPTIONS.package_key) and calls openssl for the signing works.
320 """
321
322 def __init__(self):
323 if OPTIONS.payload_signer is None:
324 # Prepare the payload signing key.
325 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
326 pw = OPTIONS.key_passwords[OPTIONS.package_key]
327
328 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
329 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
330 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
331 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700332 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800333
334 self.signer = "openssl"
335 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
336 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700337 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
338 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800339 else:
340 self.signer = OPTIONS.payload_signer
341 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700342 if OPTIONS.payload_signer_maximum_signature_size:
343 self.maximum_signature_size = int(
344 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700345 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700346 # The legacy config uses RSA2048 keys.
347 logger.warning("The maximum signature size for payload signer is not"
348 " set, default to 256 bytes.")
349 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700350
351 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700352 def _GetMaximumSignatureSizeInBytes(signing_key):
353 out_signature_size_file = common.MakeTempFile("signature_size")
354 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
355 out_signature_size_file), "--private_key={}".format(signing_key)]
356 common.RunAndCheckOutput(cmd)
357 with open(out_signature_size_file) as f:
358 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100359 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700360 signature_size)
361 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800362
363 def Sign(self, in_file):
364 """Signs the given input file. Returns the output filename."""
365 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
366 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700367 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800368 return out_file
369
370
Tao Bao40b18822018-01-30 18:19:04 -0800371class Payload(object):
372 """Manages the creation and the signing of an A/B OTA Payload."""
373
374 PAYLOAD_BIN = 'payload.bin'
375 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800376 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
377 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800378
Tao Bao667ff572018-02-10 00:02:40 -0800379 def __init__(self, secondary=False):
380 """Initializes a Payload instance.
381
382 Args:
383 secondary: Whether it's generating a secondary payload (default: False).
384 """
Tao Bao40b18822018-01-30 18:19:04 -0800385 self.payload_file = None
386 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800387 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800388
Tao Baof0c4aa22018-04-30 20:29:30 -0700389 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700390 # Don't pipe (buffer) the output if verbose is set. Let
391 # brillo_update_payload write to stdout/stderr directly, so its progress can
392 # be monitored.
393 if OPTIONS.verbose:
394 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
395 else:
396 common.RunAndCheckOutput(cmd)
397
Tao Bao40b18822018-01-30 18:19:04 -0800398 def Generate(self, target_file, source_file=None, additional_args=None):
399 """Generates a payload from the given target-files zip(s).
400
401 Args:
402 target_file: The filename of the target build target-files zip.
403 source_file: The filename of the source build target-files zip; or None if
404 generating a full OTA.
405 additional_args: A list of additional args that should be passed to
406 brillo_update_payload script; or None.
407 """
408 if additional_args is None:
409 additional_args = []
410
411 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
412 cmd = ["brillo_update_payload", "generate",
413 "--payload", payload_file,
414 "--target_image", target_file]
415 if source_file is not None:
416 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700417 if OPTIONS.disable_fec_computation:
418 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500419 if OPTIONS.disable_verity_computation:
420 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800421 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700422 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800423
424 self.payload_file = payload_file
425 self.payload_properties = None
426
427 def Sign(self, payload_signer):
428 """Generates and signs the hashes of the payload and metadata.
429
430 Args:
431 payload_signer: A PayloadSigner() instance that serves the signing work.
432
433 Raises:
434 AssertionError: On any failure when calling brillo_update_payload script.
435 """
436 assert isinstance(payload_signer, PayloadSigner)
437
438 # 1. Generate hashes of the payload and metadata files.
439 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
440 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
441 cmd = ["brillo_update_payload", "hash",
442 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700443 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800444 "--metadata_hash_file", metadata_sig_file,
445 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700446 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800447
448 # 2. Sign the hashes.
449 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
450 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
451
452 # 3. Insert the signatures back into the payload file.
453 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
454 suffix=".bin")
455 cmd = ["brillo_update_payload", "sign",
456 "--unsigned_payload", self.payload_file,
457 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700458 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800459 "--metadata_signature_file", signed_metadata_sig_file,
460 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700461 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800462
463 # 4. Dump the signed payload properties.
464 properties_file = common.MakeTempFile(prefix="payload-properties-",
465 suffix=".txt")
466 cmd = ["brillo_update_payload", "properties",
467 "--payload", signed_payload_file,
468 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700469 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800470
Tao Bao667ff572018-02-10 00:02:40 -0800471 if self.secondary:
472 with open(properties_file, "a") as f:
473 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
474
Tao Bao40b18822018-01-30 18:19:04 -0800475 if OPTIONS.wipe_user_data:
476 with open(properties_file, "a") as f:
477 f.write("POWERWASH=1\n")
478
479 self.payload_file = signed_payload_file
480 self.payload_properties = properties_file
481
Tao Bao667ff572018-02-10 00:02:40 -0800482 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800483 """Writes the payload to the given zip.
484
485 Args:
486 output_zip: The output ZipFile instance.
487 """
488 assert self.payload_file is not None
489 assert self.payload_properties is not None
490
Tao Bao667ff572018-02-10 00:02:40 -0800491 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800492 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
493 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
494 else:
495 payload_arcname = Payload.PAYLOAD_BIN
496 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
497
Tao Bao40b18822018-01-30 18:19:04 -0800498 # Add the signed payload file and properties into the zip. In order to
499 # support streaming, we pack them as ZIP_STORED. So these entries can be
500 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800501 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800502 compress_type=zipfile.ZIP_STORED)
503 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800504 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800505 compress_type=zipfile.ZIP_STORED)
506
507
Tao Bao481bab82017-12-21 11:23:09 -0800508def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800509 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800510 if not oem_source:
511 return None
512
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800513 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800514 for oem_file in oem_source:
515 with open(oem_file) as fp:
516 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800517 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700518
Doug Zongkereef39442009-04-02 12:14:19 -0700519
Tao Baod3fc38a2018-03-08 16:09:01 -0800520class StreamingPropertyFiles(PropertyFiles):
521 """A subclass for computing the property-files for streaming A/B OTAs."""
522
523 def __init__(self):
524 super(StreamingPropertyFiles, self).__init__()
525 self.name = 'ota-streaming-property-files'
526 self.required = (
527 # payload.bin and payload_properties.txt must exist.
528 'payload.bin',
529 'payload_properties.txt',
530 )
531 self.optional = (
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700532 # care_map is available only if dm-verity is enabled.
533 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800534 'care_map.txt',
535 # compatibility.zip is available only if target supports Treble.
536 'compatibility.zip',
537 )
538
539
Tao Bao85f16982018-03-08 16:28:33 -0800540class AbOtaPropertyFiles(StreamingPropertyFiles):
541 """The property-files for A/B OTA that includes payload_metadata.bin info.
542
543 Since P, we expose one more token (aka property-file), in addition to the ones
544 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
545 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
546 doesn't exist as a separate ZIP entry, but can be used to verify if the
547 payload can be applied on the given device.
548
549 For backward compatibility, we keep both of the 'ota-streaming-property-files'
550 and the newly added 'ota-property-files' in P. The new token will only be
551 available in 'ota-property-files'.
552 """
553
554 def __init__(self):
555 super(AbOtaPropertyFiles, self).__init__()
556 self.name = 'ota-property-files'
557
558 def _GetPrecomputed(self, input_zip):
559 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
560 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
561
562 @staticmethod
563 def _GetPayloadMetadataOffsetAndSize(input_zip):
564 """Computes the offset and size of the payload metadata for a given package.
565
566 (From system/update_engine/update_metadata.proto)
567 A delta update file contains all the deltas needed to update a system from
568 one specific version to another specific version. The update format is
569 represented by this struct pseudocode:
570
571 struct delta_update_file {
572 char magic[4] = "CrAU";
573 uint64 file_format_version;
574 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
575
576 // Only present if format_version > 1:
577 uint32 metadata_signature_size;
578
579 // The Bzip2 compressed DeltaArchiveManifest
580 char manifest[metadata_signature_size];
581
582 // The signature of the metadata (from the beginning of the payload up to
583 // this location, not including the signature itself). This is a
584 // serialized Signatures message.
585 char medatada_signature_message[metadata_signature_size];
586
587 // Data blobs for files, no specific format. The specific offset
588 // and length of each data blob is recorded in the DeltaArchiveManifest.
589 struct {
590 char data[];
591 } blobs[];
592
593 // These two are not signed:
594 uint64 payload_signatures_message_size;
595 char payload_signatures_message[];
596 };
597
598 'payload-metadata.bin' contains all the bytes from the beginning of the
599 payload, till the end of 'medatada_signature_message'.
600 """
601 payload_info = input_zip.getinfo('payload.bin')
Shashikant Baviskar338856f2018-04-12 12:11:22 +0900602 payload_offset = payload_info.header_offset
603 payload_offset += zipfile.sizeFileHeader
604 payload_offset += len(payload_info.extra) + len(payload_info.filename)
Tao Bao85f16982018-03-08 16:28:33 -0800605 payload_size = payload_info.file_size
606
Tao Bao59cf0c52019-06-25 10:04:24 -0700607 with input_zip.open('payload.bin') as payload_fp:
Tao Bao85f16982018-03-08 16:28:33 -0800608 header_bin = payload_fp.read(24)
609
610 # network byte order (big-endian)
611 header = struct.unpack("!IQQL", header_bin)
612
613 # 'CrAU'
614 magic = header[0]
615 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic)
616
617 manifest_size = header[2]
618 metadata_signature_size = header[3]
619 metadata_total = 24 + manifest_size + metadata_signature_size
620 assert metadata_total < payload_size
621
622 return (payload_offset, metadata_total)
623
624
Yifan Hong38ab4d82020-06-18 15:19:56 -0700625def UpdatesInfoForSpecialUpdates(content, partitions_filter,
626 delete_keys=None):
627 """ Updates info file for secondary payload generation, partial update, etc.
628
629 Scan each line in the info file, and remove the unwanted partitions from
630 the dynamic partition list in the related properties. e.g.
631 "super_google_dynamic_partitions_partition_list=system vendor product"
632 will become "super_google_dynamic_partitions_partition_list=system".
633
634 Args:
635 content: The content of the input info file. e.g. misc_info.txt.
636 partitions_filter: A function to filter the desired partitions from a given
637 list
638 delete_keys: A list of keys to delete in the info file
639
640 Returns:
641 A string of the updated info content.
642 """
643
644 output_list = []
645 # The suffix in partition_list variables that follows the name of the
646 # partition group.
647 list_suffix = 'partition_list'
648 for line in content.splitlines():
649 if line.startswith('#') or '=' not in line:
650 output_list.append(line)
651 continue
652 key, value = line.strip().split('=', 1)
653
654 if delete_keys and key in delete_keys:
655 pass
656 elif key.endswith(list_suffix):
657 partitions = value.split()
658 # TODO for partial update, partitions in the same group must be all
659 # updated or all omitted
660 partitions = filter(partitions_filter, partitions)
661 output_list.append('{}={}'.format(key, ' '.join(partitions)))
662 else:
663 output_list.append(line)
664 return '\n'.join(output_list)
665
666
Tao Bao15a146a2018-02-21 16:06:59 -0800667def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800668 """Returns a target-files.zip file for generating secondary payload.
669
670 Although the original target-files.zip already contains secondary slot
671 images (i.e. IMAGES/system_other.img), we need to rename the files to the
672 ones without _other suffix. Note that we cannot instead modify the names in
673 META/ab_partitions.txt, because there are no matching partitions on device.
674
675 For the partitions that don't have secondary images, the ones for primary
676 slot will be used. This is to ensure that we always have valid boot, vbmeta,
677 bootloader images in the inactive slot.
678
679 Args:
680 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800681 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800682
683 Returns:
684 The filename of the target-files.zip for generating secondary payload.
685 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700686
687 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700688 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700689 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700690 content = f.read()
691 # Remove virtual_ab flag from secondary payload so that OTA client
692 # don't use snapshots for secondary update
693 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
694 return UpdatesInfoForSpecialUpdates(
695 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
696 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700697
Tao Baof7140c02018-01-30 17:09:24 -0800698 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
699 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
700
Kelvin Zhang928c2342020-09-22 16:15:57 -0400701 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800702 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700703
Tao Bao0ff15de2019-03-20 11:26:06 -0700704 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800705 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800706 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
707 if info.filename == 'IMAGES/system_other.img':
708 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
709
710 # Primary images and friends need to be skipped explicitly.
711 elif info.filename in ('IMAGES/system.img',
712 'IMAGES/system.map'):
713 pass
Tao Bao3e759462019-09-17 22:43:11 -0700714
715 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
716 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
717 image_name = os.path.basename(info.filename)
718 if image_name not in ['{}.img'.format(partition) for partition in
719 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
720 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800721
Tao Bao15a146a2018-02-21 16:06:59 -0800722 # Skip copying the postinstall config if requested.
723 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
724 pass
725
Tianjie Xu1c808002019-09-11 00:29:26 -0700726 elif info.filename.startswith('META/'):
727 # Remove the unnecessary partitions for secondary images from the
728 # ab_partitions file.
729 if info.filename == AB_PARTITIONS:
730 with open(unzipped_file) as f:
731 partition_list = f.read().splitlines()
732 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700733 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400734 common.ZipWriteStr(target_zip, info.filename,
735 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700736 # Remove the unnecessary partitions from the dynamic partitions list.
737 elif (info.filename == 'META/misc_info.txt' or
738 info.filename == DYNAMIC_PARTITION_INFO):
739 modified_info = GetInfoForSecondaryImages(unzipped_file)
740 common.ZipWriteStr(target_zip, info.filename, modified_info)
741 else:
742 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800743
Tao Baof7140c02018-01-30 17:09:24 -0800744 common.ZipClose(target_zip)
745
746 return target_file
747
748
Tao Bao15a146a2018-02-21 16:06:59 -0800749def GetTargetFilesZipWithoutPostinstallConfig(input_file):
750 """Returns a target-files.zip that's not containing postinstall_config.txt.
751
752 This allows brillo_update_payload script to skip writing all the postinstall
753 hooks in the generated payload. The input target-files.zip file will be
754 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
755 contain the postinstall_config.txt entry, the input file will be returned.
756
757 Args:
758 input_file: The input target-files.zip filename.
759
760 Returns:
761 The filename of target-files.zip that doesn't contain postinstall config.
762 """
763 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400764 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800765 if POSTINSTALL_CONFIG not in input_zip.namelist():
766 return input_file
767
768 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
769 shutil.copyfile(input_file, target_file)
770 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
771 return target_file
772
Kelvin Zhang06400172021-03-05 15:42:03 -0500773
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400774def ParseInfoDict(target_file_path):
775 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
776 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800777
Kelvin Zhang06400172021-03-05 15:42:03 -0500778
Yifan Hong38ab4d82020-06-18 15:19:56 -0700779def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
780 """Returns a target-files.zip for partial ota update package generation.
781
782 This function modifies ab_partitions list with the desired partitions before
783 calling the brillo_update_payload script. It also cleans up the reference to
784 the excluded partitions in the info file, e.g misc_info.txt.
785
786 Args:
787 input_file: The input target-files.zip filename.
788 ab_partitions: A list of partitions to include in the partial update
789
790 Returns:
791 The filename of target-files.zip used for partial ota update.
792 """
793
794 def AddImageForPartition(partition_name):
795 """Add the archive name for a given partition to the copy list."""
796 for prefix in ['IMAGES', 'RADIO']:
797 image_path = '{}/{}.img'.format(prefix, partition_name)
798 if image_path in namelist:
799 copy_entries.append(image_path)
800 map_path = '{}/{}.map'.format(prefix, partition_name)
801 if map_path in namelist:
802 copy_entries.append(map_path)
803 return
804
805 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
806
807 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400808 original_ab_partitions = input_zip.read(
809 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700810 namelist = input_zip.namelist()
811
812 unrecognized_partitions = [partition for partition in ab_partitions if
813 partition not in original_ab_partitions]
814 if unrecognized_partitions:
815 raise ValueError("Unrecognized partitions when generating partial updates",
816 unrecognized_partitions)
817
818 logger.info("Generating partial updates for %s", ab_partitions)
819
820 copy_entries = ['META/update_engine_config.txt']
821 for partition_name in ab_partitions:
822 AddImageForPartition(partition_name)
823
824 # Use zip2zip to avoid extracting the zipfile.
825 partial_target_file = common.MakeTempFile(suffix='.zip')
826 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
827 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
828 common.RunAndCheckOutput(cmd)
829
830 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
831 allowZip64=True)
832 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
833 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
834 '\n'.join(ab_partitions))
835 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
836 if info_file not in input_zip.namelist():
837 logger.warning('Cannot find %s in input zipfile', info_file)
838 continue
839 content = input_zip.read(info_file).decode()
840 modified_info = UpdatesInfoForSpecialUpdates(
841 content, lambda p: p in ab_partitions)
842 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
843
844 # TODO(xunchang) handle 'META/care_map.pb', 'META/postinstall_config.txt'
845 common.ZipClose(partial_target_zip)
846
847 return partial_target_file
848
849
Yifan Hong50e79542018-11-08 17:44:12 -0800850def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800851 super_block_devices,
852 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800853 """Returns a target-files.zip for retrofitting dynamic partitions.
854
855 This allows brillo_update_payload to generate an OTA based on the exact
856 bits on the block devices. Postinstall is disabled.
857
858 Args:
859 input_file: The input target-files.zip filename.
860 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800861 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800862
863 Returns:
864 The filename of target-files.zip with *.img replaced with super_*.img for
865 each block device in super_block_devices.
866 """
867 assert super_block_devices, "No super_block_devices are specified."
868
869 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800870 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800871
872 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
873 shutil.copyfile(input_file, target_file)
874
Kelvin Zhang928c2342020-09-22 16:15:57 -0400875 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800876 namelist = input_zip.namelist()
877
Yifan Hongb433eba2019-03-06 12:42:53 -0800878 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
879
880 # Remove partitions from META/ab_partitions.txt that is in
881 # dynamic_partition_list but not in super_block_devices so that
882 # brillo_update_payload won't generate update for those logical partitions.
883 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
884 with open(ab_partitions_file) as f:
885 ab_partitions_lines = f.readlines()
886 ab_partitions = [line.strip() for line in ab_partitions_lines]
887 # Assert that all super_block_devices are in ab_partitions
888 super_device_not_updated = [partition for partition in super_block_devices
889 if partition not in ab_partitions]
890 assert not super_device_not_updated, \
891 "{} is in super_block_devices but not in {}".format(
892 super_device_not_updated, AB_PARTITIONS)
893 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400894 new_ab_partitions = common.MakeTempFile(
895 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800896 with open(new_ab_partitions, 'w') as f:
897 for partition in ab_partitions:
898 if (partition in dynamic_partition_list and
Kelvin Zhang06400172021-03-05 15:42:03 -0500899 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700900 logger.info("Dropping %s from ab_partitions.txt", partition)
901 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800902 f.write(partition + "\n")
903 to_delete = [AB_PARTITIONS]
904
Yifan Hong50e79542018-11-08 17:44:12 -0800905 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800906 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800907
908 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
909 # is a regular update on devices without dynamic partitions support.
910 to_delete += [DYNAMIC_PARTITION_INFO]
911
Tao Bao03fecb62018-11-28 10:59:23 -0800912 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700913 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800914 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800915
916 common.ZipDelete(target_file, to_delete)
917
Yifan Hong50e79542018-11-08 17:44:12 -0800918 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
919
920 # Write super_{foo}.img as {foo}.img.
921 for src, dst in replace.items():
922 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700923 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800924 unzipped_file = os.path.join(input_tmp, *src.split('/'))
925 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
926
Yifan Hongb433eba2019-03-06 12:42:53 -0800927 # Write new ab_partitions.txt file
928 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
929
Yifan Hong50e79542018-11-08 17:44:12 -0800930 common.ZipClose(target_zip)
931
932 return target_file
933
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400934
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700935def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
936 """Returns a target-files.zip for custom partitions update.
937
938 This function modifies ab_partitions list with the desired custom partitions
939 and puts the custom images into the target target-files.zip.
940
941 Args:
942 input_file: The input target-files.zip filename.
943 custom_images: A map of custom partitions and custom images.
944
945 Returns:
946 The filename of a target-files.zip which has renamed the custom images in
947 the IMAGS/ to their partition names.
948 """
949 # Use zip2zip to avoid extracting the zipfile.
950 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
951 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
952
953 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
954 namelist = input_zip.namelist()
955
956 # Write {custom_image}.img as {custom_partition}.img.
957 for custom_partition, custom_image in custom_images.items():
958 default_custom_image = '{}.img'.format(custom_partition)
959 if default_custom_image != custom_image:
960 logger.info("Update custom partition '%s' with '%s'",
961 custom_partition, custom_image)
962 # Default custom image need to be deleted first.
963 namelist.remove('IMAGES/{}'.format(default_custom_image))
964 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
965 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
966 default_custom_image)])
967
968 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
969 common.RunAndCheckOutput(cmd)
970
971 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -0800972
Kelvin Zhang06400172021-03-05 15:42:03 -0500973
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400974def GeneratePartitionTimestampFlags(partition_state):
975 partition_timestamps = [
976 part.partition_name + ":" + part.version
977 for part in partition_state]
978 return ["--partition_timestamps", ",".join(partition_timestamps)]
979
Kelvin Zhang06400172021-03-05 15:42:03 -0500980
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500981def GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang06400172021-03-05 15:42:03 -0500982 pre_partition_state, post_partition_state):
Kelvin Zhang80195722020-11-04 14:38:34 -0500983 assert pre_partition_state is not None
984 partition_timestamps = {}
985 for part in pre_partition_state:
986 partition_timestamps[part.partition_name] = part.version
987 for part in post_partition_state:
988 partition_timestamps[part.partition_name] = \
Kelvin Zhang06400172021-03-05 15:42:03 -0500989 max(part.version, partition_timestamps[part.partition_name])
Kelvin Zhang80195722020-11-04 14:38:34 -0500990 return [
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500991 "--partition_timestamps",
Kelvin Zhang06400172021-03-05 15:42:03 -0500992 ",".join([key + ":" + val for (key, val)
993 in partition_timestamps.items()])
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500994 ]
Kelvin Zhang80195722020-11-04 14:38:34 -0500995
Kelvin Zhang06400172021-03-05 15:42:03 -0500996
Kelvin Zhang65029a22020-11-03 10:07:51 -0500997def IsSparseImage(filepath):
998 with open(filepath, 'rb') as fp:
999 # Magic for android sparse image format
1000 # https://source.android.com/devices/bootloader/images
1001 return fp.read(4) == b'\x3A\xFF\x26\xED'
1002
Kelvin Zhang06400172021-03-05 15:42:03 -05001003
Kelvin Zhang65029a22020-11-03 10:07:51 -05001004def SupportsMainlineGkiUpdates(target_file):
1005 """Return True if the build supports MainlineGKIUpdates.
1006
1007 This function scans the product.img file in IMAGES/ directory for
1008 pattern |*/apex/com.android.gki.*.apex|. If there are files
1009 matching this pattern, conclude that build supports mainline
1010 GKI and return True
1011
1012 Args:
1013 target_file: Path to a target_file.zip, or an extracted directory
1014 Return:
1015 True if thisb uild supports Mainline GKI Updates.
1016 """
1017 if target_file is None:
1018 return False
1019 if os.path.isfile(target_file):
1020 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1021 if not os.path.isdir(target_file):
1022 assert os.path.isdir(target_file), \
1023 "{} must be a path to zip archive or dir containing extracted"\
1024 " target_files".format(target_file)
1025 image_file = os.path.join(target_file, "IMAGES", "product.img")
1026
1027 if not os.path.isfile(image_file):
1028 return False
1029
1030 if IsSparseImage(image_file):
1031 # Unsparse the image
1032 tmp_img = common.MakeTempFile(suffix=".img")
1033 subprocess.check_output(["simg2img", image_file, tmp_img])
1034 image_file = tmp_img
1035
1036 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1037 output = subprocess.check_output(cmd).decode()
1038
1039 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1040 return pattern.search(output) is not None
1041
Kelvin Zhang06400172021-03-05 15:42:03 -05001042
Tao Baof0c4aa22018-04-30 20:29:30 -07001043def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001044 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001045 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001046 if not OPTIONS.no_signing:
1047 staging_file = common.MakeTempFile(suffix='.zip')
1048 else:
1049 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001050 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001051 compression=zipfile.ZIP_DEFLATED,
1052 allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001053
Tao Bao481bab82017-12-21 11:23:09 -08001054 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001055 assert "ab_partitions" in OPTIONS.source_info_dict, \
1056 "META/ab_partitions.txt is required for ab_update."
1057 assert "ab_partitions" in OPTIONS.target_info_dict, \
1058 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001059 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1060 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang563750f2021-04-28 12:46:17 -04001061 # If source supports VABC, delta_generator/update_engine will attempt to
1062 # use VABC. This dangerous, as the target build won't have snapuserd to
1063 # serve I/O request when device boots. Therefore, disable VABC if source
1064 # build doesn't supports it.
1065 if not source_info.is_vabc or not target_info.is_vabc:
1066 OPTIONS.disable_vabc = True
1067 if not OPTIONS.disable_vabc:
Kelvin Zhangc7775702021-04-23 22:44:01 +00001068 # TODO(zhangkelvin) Remove this once FEC on VABC is supported
1069 logger.info("Virtual AB Compression enabled, disabling FEC")
1070 OPTIONS.disable_fec_computation = True
1071 OPTIONS.disable_verity_computation = True
Kelvin Zhang563750f2021-04-28 12:46:17 -04001072
Tao Bao481bab82017-12-21 11:23:09 -08001073 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001074 assert "ab_partitions" in OPTIONS.info_dict, \
1075 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001076 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001077 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001078
Yifan Hong38ab4d82020-06-18 15:19:56 -07001079 additional_args = []
1080
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001081 # Prepare custom images.
1082 if OPTIONS.custom_images:
1083 target_file = GetTargetFilesZipForCustomImagesUpdates(
1084 target_file, OPTIONS.custom_images)
1085
Yifan Hong50e79542018-11-08 17:44:12 -08001086 if OPTIONS.retrofit_dynamic_partitions:
1087 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001088 target_file, target_info.get("super_block_devices").strip().split(),
1089 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001090 elif OPTIONS.partial:
1091 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1092 OPTIONS.partial)
1093 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -08001094 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001095 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001096 # Target_file may have been modified, reparse ab_partitions
1097 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1098 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001099 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001100
Kelvin Zhang39aea442020-08-17 11:04:25 -04001101 # Metadata to comply with Android OTA package format.
1102 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001103 # Generate payload.
1104 payload = Payload()
1105
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001106 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001107 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001108 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001109 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001110 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001111 metadata.precondition.partition_state,
1112 metadata.postcondition.partition_state
1113 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001114 else:
Tianjiea2076132020-08-19 17:25:32 -07001115 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001116 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1117 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001118
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001119 if OPTIONS.disable_vabc:
1120 additional_args += ["--disable_vabc", "true"]
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001121 additional_args += ["--max_timestamp", max_timestamp]
1122
Kelvin Zhang65029a22020-11-03 10:07:51 -05001123 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhang06400172021-03-05 15:42:03 -05001124 logger.warning(
1125 "Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001126 additional_args.extend(["--full_boot", "true"])
1127
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001128 payload.Generate(
1129 target_file,
1130 source_file,
1131 additional_args + partition_timestamps_flags
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001132 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001133
Tao Bao40b18822018-01-30 18:19:04 -08001134 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -08001135 payload_signer = PayloadSigner()
1136 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001137
Tao Bao40b18822018-01-30 18:19:04 -08001138 # Write the payload into output zip.
1139 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001140
Tao Baof7140c02018-01-30 17:09:24 -08001141 # Generate and include the secondary payload that installs secondary images
1142 # (e.g. system_other.img).
1143 if OPTIONS.include_secondary:
1144 # We always include a full payload for the secondary slot, even when
1145 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001146 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1147 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001148 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001149 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001150 additional_args=["--max_timestamp",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001151 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001152 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001153 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001154
Tianjie Xucfa86222016-03-07 16:31:19 -08001155 # If dm-verity is supported for the device, copy contents of care_map
1156 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001157 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001158 if (target_info.get("verity") == "true" or
Kelvin Zhang06400172021-03-05 15:42:03 -05001159 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001160 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1161 "META/" + x in target_zip.namelist()]
1162
1163 # Adds care_map if either the protobuf format or the plain text one exists.
1164 if care_map_list:
1165 care_map_name = care_map_list[0]
1166 care_map_data = target_zip.read("META/" + care_map_name)
1167 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001168 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001169 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001170 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001171 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001172 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001173
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001174 # Copy apex_info.pb over to generated OTA package.
1175 try:
1176 apex_info_entry = target_zip.getinfo("META/apex_info.pb")
1177 with target_zip.open(apex_info_entry, "r") as zfp:
1178 common.ZipWriteStr(output_zip, "apex_info.pb", zfp.read(),
Kelvin Zhang06400172021-03-05 15:42:03 -05001179 compress_type=zipfile.ZIP_STORED)
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001180 except KeyError:
1181 logger.warning("target_file doesn't contain apex_info.pb %s", target_file)
1182
Tao Bao21803d32017-04-19 10:16:09 -07001183 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001184
Yifan Hong9276cf02019-08-21 16:37:04 -07001185 CheckVintfIfTrebleEnabled(target_file, target_info)
1186
Tao Baofe5b69a2018-03-02 09:47:43 -08001187 # We haven't written the metadata entry yet, which will be handled in
1188 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001189 common.ZipClose(output_zip)
1190
Tao Bao85f16982018-03-08 16:28:33 -08001191 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1192 # all the info of the latter. However, system updaters and OTA servers need to
1193 # take time to switch to the new flag. We keep both of the flags for
1194 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001195 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001196 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001197 StreamingPropertyFiles(),
1198 )
1199 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001200
Tao Baoc098e9e2016-01-07 13:03:56 -08001201
Doug Zongkereef39442009-04-02 12:14:19 -07001202def main(argv):
1203
1204 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001205 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001206 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001207 elif o in ("-i", "--incremental_from"):
1208 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001209 elif o == "--full_radio":
1210 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001211 elif o == "--full_bootloader":
1212 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001213 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001214 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001215 elif o == "--downgrade":
1216 OPTIONS.downgrade = True
1217 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001218 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001219 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001220 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001221 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001222 elif o == "--oem_no_mount":
1223 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001224 elif o in ("-e", "--extra_script"):
1225 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001226 elif o in ("-t", "--worker_threads"):
1227 if a.isdigit():
1228 OPTIONS.worker_threads = int(a)
1229 else:
1230 raise ValueError("Cannot parse value %r for option %r - only "
1231 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001232 elif o in ("-2", "--two_step"):
1233 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001234 elif o == "--include_secondary":
1235 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001236 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001237 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001238 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001239 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001240 elif o == "--block":
1241 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001242 elif o in ("-b", "--binary"):
1243 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001244 elif o == "--stash_threshold":
1245 try:
1246 OPTIONS.stash_threshold = float(a)
1247 except ValueError:
1248 raise ValueError("Cannot parse value %r for option %r - expecting "
1249 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001250 elif o == "--log_diff":
1251 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001252 elif o == "--payload_signer":
1253 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001254 elif o == "--payload_signer_args":
1255 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001256 elif o == "--payload_signer_maximum_signature_size":
1257 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001258 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001259 # TODO(Xunchang) remove this option after cleaning up the callers.
1260 logger.warning("The option '--payload_signer_key_size' is deprecated."
1261 " Use '--payload_signer_maximum_signature_size' instead.")
1262 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001263 elif o == "--extracted_input_target_files":
1264 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001265 elif o == "--skip_postinstall":
1266 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001267 elif o == "--retrofit_dynamic_partitions":
1268 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001269 elif o == "--skip_compatibility_check":
1270 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001271 elif o == "--output_metadata_path":
1272 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001273 elif o == "--disable_fec_computation":
1274 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001275 elif o == "--disable_verity_computation":
1276 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001277 elif o == "--force_non_ab":
1278 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001279 elif o == "--boot_variable_file":
1280 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001281 elif o == "--partial":
1282 partitions = a.split()
1283 if not partitions:
1284 raise ValueError("Cannot parse partitions in {}".format(a))
1285 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001286 elif o == "--custom_image":
1287 custom_partition, custom_image = a.split("=")
1288 OPTIONS.custom_images[custom_partition] = custom_image
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001289 elif o == "--disable_vabc":
1290 OPTIONS.disable_vabc = True
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001291 elif o == "--spl_downgrade":
1292 OPTIONS.spl_downgrade = True
Kelvin Zhang06400172021-03-05 15:42:03 -05001293 OPTIONS.wipe_user_data = True
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001294 elif o == "--vabc_downgrade":
1295 OPTIONS.vabc_downgrade = True
Doug Zongkereef39442009-04-02 12:14:19 -07001296 else:
1297 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001298 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001299
1300 args = common.ParseOptions(argv, __doc__,
Tao Bao337633f2017-12-06 15:20:19 -08001301 extra_opts="b:k:i:d:e:t:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001302 extra_long_opts=[
Dan Albert8b72aef2015-03-23 19:13:21 -07001303 "package_key=",
1304 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001305 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001306 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001307 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001308 "downgrade",
Tao Bao3e6161a2017-02-28 11:48:48 -08001309 "override_timestamp",
Dan Albert8b72aef2015-03-23 19:13:21 -07001310 "extra_script=",
1311 "worker_threads=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001312 "two_step",
Tao Baof7140c02018-01-30 17:09:24 -08001313 "include_secondary",
Dan Albert8b72aef2015-03-23 19:13:21 -07001314 "no_signing",
1315 "block",
1316 "binary=",
1317 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001318 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001319 "verify",
Tao Bao8dcf7382015-05-21 14:09:49 -07001320 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001321 "log_diff=",
Tao Baodea0f8b2016-06-20 17:55:06 -07001322 "payload_signer=",
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001323 "payload_signer_args=",
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001324 "payload_signer_maximum_signature_size=",
xunchang376cc7c2019-04-08 23:04:58 -07001325 "payload_signer_key_size=",
Dan Willemsencea5cd22017-03-21 14:44:27 -07001326 "extracted_input_target_files=",
Tao Bao15a146a2018-02-21 16:06:59 -08001327 "skip_postinstall",
Yifan Hong50e79542018-11-08 17:44:12 -08001328 "retrofit_dynamic_partitions",
xunchangabfa2652019-02-19 16:27:10 -08001329 "skip_compatibility_check",
xunchang1cfe2512019-02-19 14:14:48 -08001330 "output_metadata_path=",
Tianjie Xu1b079832019-08-28 12:19:23 -07001331 "disable_fec_computation",
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001332 "disable_verity_computation",
Yifan Hong65afc072020-04-17 10:08:10 -07001333 "force_non_ab",
Tianjied6867162020-05-10 14:30:13 -07001334 "boot_variable_file=",
Yifan Hong38ab4d82020-06-18 15:19:56 -07001335 "partial=",
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001336 "custom_image=",
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001337 "disable_vabc",
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001338 "spl_downgrade",
1339 "vabc_downgrade",
Dan Albert8b72aef2015-03-23 19:13:21 -07001340 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001341
1342 if len(args) != 2:
1343 common.Usage(__doc__)
1344 sys.exit(1)
1345
Tao Bao32fcdab2018-10-12 10:30:39 -07001346 common.InitLogging()
1347
Tao Bao2db13852018-01-08 22:28:57 -08001348 # Load the build info dicts from the zip directly or the extracted input
1349 # directory. We don't need to unzip the entire target-files zips, because they
1350 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1351 # When loading the info dicts, we don't need to provide the second parameter
1352 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1353 # some properties with their actual paths, such as 'selinux_fc',
1354 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001355 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001356 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001357 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001358 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001359
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001360 if OPTIONS.wipe_user_data:
1361 if not OPTIONS.vabc_downgrade:
1362 logger.info("Detected downgrade/datawipe OTA."
1363 "When wiping userdata, VABC OTA makes the user "
1364 "wait in recovery mode for merge to finish. Disable VABC by "
1365 "default. If you really want to do VABC downgrade, pass "
1366 "--vabc_downgrade")
1367 OPTIONS.disable_vabc = True
Kelvin Zhang80195722020-11-04 14:38:34 -05001368 # We should only allow downgrading incrementals (as opposed to full).
1369 # Otherwise the device may go back from arbitrary build with this full
1370 # OTA package.
1371 if OPTIONS.incremental_source is None:
1372 raise ValueError("Cannot generate downgradable full OTAs")
1373
Yifan Hong38ab4d82020-06-18 15:19:56 -07001374 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1375 # target-file and reload the info_dict. So the info will be consistent with
1376 # the modified target-file.
1377
Tao Bao32fcdab2018-10-12 10:30:39 -07001378 logger.info("--- target info ---")
1379 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001380
1381 # Load the source build dict if applicable.
1382 if OPTIONS.incremental_source is not None:
1383 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001384 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001385
Tao Bao32fcdab2018-10-12 10:30:39 -07001386 logger.info("--- source info ---")
1387 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001388
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001389 if OPTIONS.partial:
1390 OPTIONS.info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001391 list(
1392 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1393 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001394 if OPTIONS.source_info_dict:
1395 OPTIONS.source_info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001396 list(
1397 set(OPTIONS.source_info_dict['ab_partitions']) &
1398 set(OPTIONS.partial)
1399 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001400
Tao Bao2db13852018-01-08 22:28:57 -08001401 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001402 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1403
Yifan Hong50e79542018-11-08 17:44:12 -08001404 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001405 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001406 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001407 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang06400172021-03-05 15:42:03 -05001408 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001409 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1410 raise common.ExternalError(
1411 "Expect to generate incremental OTA for retrofitting dynamic "
1412 "partitions, but dynamic_partition_retrofit is not set in target "
1413 "build.")
1414 logger.info("Implicitly generating retrofit incremental OTA.")
1415 OPTIONS.retrofit_dynamic_partitions = True
1416
1417 # Skip postinstall for retrofitting dynamic partitions.
1418 if OPTIONS.retrofit_dynamic_partitions:
1419 OPTIONS.skip_postinstall = True
1420
Tao Baoc098e9e2016-01-07 13:03:56 -08001421 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001422 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1423 if OPTIONS.force_non_ab:
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001424 assert allow_non_ab,\
Kelvin Zhang06400172021-03-05 15:42:03 -05001425 "--force_non_ab only allowed on devices that supports non-A/B"
Yifan Hong65afc072020-04-17 10:08:10 -07001426 assert ab_update, "--force_non_ab only allowed on A/B devices"
1427
1428 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001429
Christian Oderf63e2cd2017-05-01 22:30:15 +02001430 # Use the default key to sign the package if not specified with package_key.
1431 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001432 # A/B update is getting created.
1433 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001434 if OPTIONS.package_key is None:
1435 OPTIONS.package_key = OPTIONS.info_dict.get(
1436 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001437 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001438 # Get signing keys
1439 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
Kelvin Zhangeb586ef2021-02-08 20:11:49 -05001440 private_key_path = OPTIONS.package_key + OPTIONS.private_key_suffix
1441 if not os.path.exists(private_key_path):
1442 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001443 "Private key {} doesn't exist. Make sure you passed the"
1444 " correct key path through -k option".format(
1445 private_key_path)
1446 )
Christian Oderf63e2cd2017-05-01 22:30:15 +02001447
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001448 if OPTIONS.source_info_dict:
1449 source_build_prop = OPTIONS.source_info_dict["build.prop"]
1450 target_build_prop = OPTIONS.target_info_dict["build.prop"]
1451 source_spl = source_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
1452 target_spl = target_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001453 is_spl_downgrade = target_spl < source_spl
Kelvin Zhang06400172021-03-05 15:42:03 -05001454 if is_spl_downgrade and not OPTIONS.spl_downgrade and not OPTIONS.downgrade:
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001455 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001456 "Target security patch level {} is older than source SPL {} applying "
1457 "such OTA will likely cause device fail to boot. Pass --spl_downgrade "
1458 "to override this check. This script expects security patch level to "
1459 "be in format yyyy-mm-dd (e.x. 2021-02-05). It's possible to use "
1460 "separators other than -, so as long as it's used consistenly across "
1461 "all SPL dates".format(target_spl, source_spl))
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001462 elif not is_spl_downgrade and OPTIONS.spl_downgrade:
1463 raise ValueError("--spl_downgrade specified but no actual SPL downgrade"
1464 " detected. Please only pass in this flag if you want a"
1465 " SPL downgrade. Target SPL: {} Source SPL: {}"
1466 .format(target_spl, source_spl))
Yifan Hong65afc072020-04-17 10:08:10 -07001467 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001468 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001469 target_file=args[0],
1470 output_file=args[1],
1471 source_file=OPTIONS.incremental_source)
1472
Dan Willemsencea5cd22017-03-21 14:44:27 -07001473 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001474 GenerateNonAbOtaPackage(
1475 target_file=args[0],
1476 output_file=args[1],
1477 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001478
Tao Baof0c4aa22018-04-30 20:29:30 -07001479 # Post OTA generation works.
1480 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1481 logger.info("Generating diff logs...")
1482 logger.info("Unzipping target-files for diffing...")
1483 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1484 source_dir = common.UnzipTemp(
1485 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001486
Tao Baof0c4aa22018-04-30 20:29:30 -07001487 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001488 target_files_diff.recursiveDiff(
1489 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001490
Tao Bao32fcdab2018-10-12 10:30:39 -07001491 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001492
1493
1494if __name__ == '__main__':
1495 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001496 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001497 main(sys.argv[1:])
Tao Bao32fcdab2018-10-12 10:30:39 -07001498 except common.ExternalError:
1499 logger.exception("\n ERROR:\n")
Doug Zongkereef39442009-04-02 12:14:19 -07001500 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07001501 finally:
1502 common.Cleanup()