blob: 7dc648f3227745c412e0ea79f0401ce794abb380 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Tao Bao30df8b42018-04-23 15:32:53 -070088Non-A/B OTA specific options
89
90 -b (--binary) <file>
91 Use the given binary as the update-binary in the output package, instead
92 of the binary in the build's target_files. Use for development only.
93
94 --block
95 Generate a block-based OTA for non-A/B device. We have deprecated the
96 support for file-based OTA since O. Block-based OTA will be used by
97 default for all non-A/B devices. Keeping this flag here to not break
98 existing callers.
99
100 -e (--extra_script) <file>
101 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700102
leozwangaa6c1a12015-08-14 10:57:58 -0700103 --full_bootloader
104 Similar to --full_radio. When generating an incremental OTA, always
105 include a full copy of bootloader image.
106
Tao Bao30df8b42018-04-23 15:32:53 -0700107 --full_radio
108 When generating an incremental OTA, always include a full copy of radio
109 image. This option is only meaningful when -i is specified, because a full
110 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700111
Tao Bao30df8b42018-04-23 15:32:53 -0700112 --log_diff <file>
113 Generate a log file that shows the differences in the source and target
114 builds for an incremental package. This option is only meaningful when -i
115 is specified.
116
117 -o (--oem_settings) <main_file[,additional_files...]>
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800118 Comma seperated list of files used to specify the expected OEM-specific
Tao Bao481bab82017-12-21 11:23:09 -0800119 properties on the OEM partition of the intended device. Multiple expected
120 values can be used by providing multiple files. Only the first dict will
121 be used to compute fingerprint, while the rest will be used to assert
122 OEM-specific properties.
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Doug Zongkereef39442009-04-02 12:14:19 -0700209"""
210
Tao Bao89fbb0f2017-01-10 10:47:58 -0800211from __future__ import print_function
212
Tao Bao32fcdab2018-10-12 10:30:39 -0700213import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700214import multiprocessing
Tao Bao2dd1c482017-02-03 16:49:39 -0800215import os.path
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700216import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800217import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800218import struct
Tao Bao481bab82017-12-21 11:23:09 -0800219import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700220import zipfile
221
222import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400223import ota_utils
Kelvin Zhang0876c412020-06-23 15:06:58 -0400224import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400225from check_target_files_vintf import CheckVintfIfTrebleEnabled
226from non_ab_ota import GenerateNonAbOtaPackage
227from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
228 PropertyFiles)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400229
Tao Bao481bab82017-12-21 11:23:09 -0800230if sys.hexversion < 0x02070000:
231 print("Python 2.7 or newer is required.", file=sys.stderr)
232 sys.exit(1)
233
Tao Bao32fcdab2018-10-12 10:30:39 -0700234logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800235
Kelvin Zhang2e417382020-08-20 11:33:11 -0400236OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700237OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700238OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700239OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700240OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700241OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
242if OPTIONS.worker_threads == 0:
243 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800244OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800245OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800246OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800247OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000248OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700249OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800250OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700251OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700252OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700253# Stash size cannot exceed cache_size * threshold.
254OPTIONS.cache_size = None
255OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800256OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700257OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700258OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700259OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700260OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800261OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800262OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700263OPTIONS.disable_fec_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700264OPTIONS.partial = None
Tao Bao15a146a2018-02-21 16:06:59 -0800265
Tao Bao8dcf7382015-05-21 14:09:49 -0700266
Tao Bao15a146a2018-02-21 16:06:59 -0800267POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800268DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800269AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400270
Tao Baof0c4aa22018-04-30 20:29:30 -0700271# Files to be unzipped for target diffing purpose.
272TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700273 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700274 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800275RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700276
277# Images to be excluded from secondary payload. We essentially only keep
278# 'system_other' and bootloader partitions.
279SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000280 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700281 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700282 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800283
Tao Bao2dd1c482017-02-03 16:49:39 -0800284
Tao Baofabe0832018-01-17 15:52:28 -0800285class PayloadSigner(object):
286 """A class that wraps the payload signing works.
287
288 When generating a Payload, hashes of the payload and metadata files will be
289 signed with the device key, either by calling an external payload signer or
290 by calling openssl with the package key. This class provides a unified
291 interface, so that callers can just call PayloadSigner.Sign().
292
293 If an external payload signer has been specified (OPTIONS.payload_signer), it
294 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
295 that the signing key should be provided as part of the payload_signer_args.
296 Otherwise without an external signer, it uses the package key
297 (OPTIONS.package_key) and calls openssl for the signing works.
298 """
299
300 def __init__(self):
301 if OPTIONS.payload_signer is None:
302 # Prepare the payload signing key.
303 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
304 pw = OPTIONS.key_passwords[OPTIONS.package_key]
305
306 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
307 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
308 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
309 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700310 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800311
312 self.signer = "openssl"
313 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
314 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700315 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
316 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800317 else:
318 self.signer = OPTIONS.payload_signer
319 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700320 if OPTIONS.payload_signer_maximum_signature_size:
321 self.maximum_signature_size = int(
322 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700323 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700324 # The legacy config uses RSA2048 keys.
325 logger.warning("The maximum signature size for payload signer is not"
326 " set, default to 256 bytes.")
327 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700328
329 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700330 def _GetMaximumSignatureSizeInBytes(signing_key):
331 out_signature_size_file = common.MakeTempFile("signature_size")
332 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
333 out_signature_size_file), "--private_key={}".format(signing_key)]
334 common.RunAndCheckOutput(cmd)
335 with open(out_signature_size_file) as f:
336 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100337 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700338 signature_size)
339 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800340
341 def Sign(self, in_file):
342 """Signs the given input file. Returns the output filename."""
343 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
344 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700345 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800346 return out_file
347
348
Tao Bao40b18822018-01-30 18:19:04 -0800349class Payload(object):
350 """Manages the creation and the signing of an A/B OTA Payload."""
351
352 PAYLOAD_BIN = 'payload.bin'
353 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800354 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
355 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800356
Tao Bao667ff572018-02-10 00:02:40 -0800357 def __init__(self, secondary=False):
358 """Initializes a Payload instance.
359
360 Args:
361 secondary: Whether it's generating a secondary payload (default: False).
362 """
Tao Bao40b18822018-01-30 18:19:04 -0800363 self.payload_file = None
364 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800365 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800366
Tao Baof0c4aa22018-04-30 20:29:30 -0700367 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700368 # Don't pipe (buffer) the output if verbose is set. Let
369 # brillo_update_payload write to stdout/stderr directly, so its progress can
370 # be monitored.
371 if OPTIONS.verbose:
372 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
373 else:
374 common.RunAndCheckOutput(cmd)
375
Tao Bao40b18822018-01-30 18:19:04 -0800376 def Generate(self, target_file, source_file=None, additional_args=None):
377 """Generates a payload from the given target-files zip(s).
378
379 Args:
380 target_file: The filename of the target build target-files zip.
381 source_file: The filename of the source build target-files zip; or None if
382 generating a full OTA.
383 additional_args: A list of additional args that should be passed to
384 brillo_update_payload script; or None.
385 """
386 if additional_args is None:
387 additional_args = []
388
389 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
390 cmd = ["brillo_update_payload", "generate",
391 "--payload", payload_file,
392 "--target_image", target_file]
393 if source_file is not None:
394 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700395 if OPTIONS.disable_fec_computation:
396 cmd.extend(["--disable_fec_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800397 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700398 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800399
400 self.payload_file = payload_file
401 self.payload_properties = None
402
403 def Sign(self, payload_signer):
404 """Generates and signs the hashes of the payload and metadata.
405
406 Args:
407 payload_signer: A PayloadSigner() instance that serves the signing work.
408
409 Raises:
410 AssertionError: On any failure when calling brillo_update_payload script.
411 """
412 assert isinstance(payload_signer, PayloadSigner)
413
414 # 1. Generate hashes of the payload and metadata files.
415 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
416 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
417 cmd = ["brillo_update_payload", "hash",
418 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700419 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800420 "--metadata_hash_file", metadata_sig_file,
421 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700422 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800423
424 # 2. Sign the hashes.
425 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
426 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
427
428 # 3. Insert the signatures back into the payload file.
429 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
430 suffix=".bin")
431 cmd = ["brillo_update_payload", "sign",
432 "--unsigned_payload", self.payload_file,
433 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700434 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800435 "--metadata_signature_file", signed_metadata_sig_file,
436 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700437 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800438
439 # 4. Dump the signed payload properties.
440 properties_file = common.MakeTempFile(prefix="payload-properties-",
441 suffix=".txt")
442 cmd = ["brillo_update_payload", "properties",
443 "--payload", signed_payload_file,
444 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700445 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800446
Tao Bao667ff572018-02-10 00:02:40 -0800447 if self.secondary:
448 with open(properties_file, "a") as f:
449 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
450
Tao Bao40b18822018-01-30 18:19:04 -0800451 if OPTIONS.wipe_user_data:
452 with open(properties_file, "a") as f:
453 f.write("POWERWASH=1\n")
454
455 self.payload_file = signed_payload_file
456 self.payload_properties = properties_file
457
Tao Bao667ff572018-02-10 00:02:40 -0800458 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800459 """Writes the payload to the given zip.
460
461 Args:
462 output_zip: The output ZipFile instance.
463 """
464 assert self.payload_file is not None
465 assert self.payload_properties is not None
466
Tao Bao667ff572018-02-10 00:02:40 -0800467 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800468 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
469 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
470 else:
471 payload_arcname = Payload.PAYLOAD_BIN
472 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
473
Tao Bao40b18822018-01-30 18:19:04 -0800474 # Add the signed payload file and properties into the zip. In order to
475 # support streaming, we pack them as ZIP_STORED. So these entries can be
476 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800477 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800478 compress_type=zipfile.ZIP_STORED)
479 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800480 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800481 compress_type=zipfile.ZIP_STORED)
482
483
Tao Bao481bab82017-12-21 11:23:09 -0800484def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800485 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800486 if not oem_source:
487 return None
488
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800489 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800490 for oem_file in oem_source:
491 with open(oem_file) as fp:
492 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800493 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700494
Doug Zongkereef39442009-04-02 12:14:19 -0700495
Tao Baod3fc38a2018-03-08 16:09:01 -0800496class StreamingPropertyFiles(PropertyFiles):
497 """A subclass for computing the property-files for streaming A/B OTAs."""
498
499 def __init__(self):
500 super(StreamingPropertyFiles, self).__init__()
501 self.name = 'ota-streaming-property-files'
502 self.required = (
503 # payload.bin and payload_properties.txt must exist.
504 'payload.bin',
505 'payload_properties.txt',
506 )
507 self.optional = (
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700508 # care_map is available only if dm-verity is enabled.
509 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800510 'care_map.txt',
511 # compatibility.zip is available only if target supports Treble.
512 'compatibility.zip',
513 )
514
515
Tao Bao85f16982018-03-08 16:28:33 -0800516class AbOtaPropertyFiles(StreamingPropertyFiles):
517 """The property-files for A/B OTA that includes payload_metadata.bin info.
518
519 Since P, we expose one more token (aka property-file), in addition to the ones
520 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
521 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
522 doesn't exist as a separate ZIP entry, but can be used to verify if the
523 payload can be applied on the given device.
524
525 For backward compatibility, we keep both of the 'ota-streaming-property-files'
526 and the newly added 'ota-property-files' in P. The new token will only be
527 available in 'ota-property-files'.
528 """
529
530 def __init__(self):
531 super(AbOtaPropertyFiles, self).__init__()
532 self.name = 'ota-property-files'
533
534 def _GetPrecomputed(self, input_zip):
535 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
536 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
537
538 @staticmethod
539 def _GetPayloadMetadataOffsetAndSize(input_zip):
540 """Computes the offset and size of the payload metadata for a given package.
541
542 (From system/update_engine/update_metadata.proto)
543 A delta update file contains all the deltas needed to update a system from
544 one specific version to another specific version. The update format is
545 represented by this struct pseudocode:
546
547 struct delta_update_file {
548 char magic[4] = "CrAU";
549 uint64 file_format_version;
550 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
551
552 // Only present if format_version > 1:
553 uint32 metadata_signature_size;
554
555 // The Bzip2 compressed DeltaArchiveManifest
556 char manifest[metadata_signature_size];
557
558 // The signature of the metadata (from the beginning of the payload up to
559 // this location, not including the signature itself). This is a
560 // serialized Signatures message.
561 char medatada_signature_message[metadata_signature_size];
562
563 // Data blobs for files, no specific format. The specific offset
564 // and length of each data blob is recorded in the DeltaArchiveManifest.
565 struct {
566 char data[];
567 } blobs[];
568
569 // These two are not signed:
570 uint64 payload_signatures_message_size;
571 char payload_signatures_message[];
572 };
573
574 'payload-metadata.bin' contains all the bytes from the beginning of the
575 payload, till the end of 'medatada_signature_message'.
576 """
577 payload_info = input_zip.getinfo('payload.bin')
Shashikant Baviskar338856f2018-04-12 12:11:22 +0900578 payload_offset = payload_info.header_offset
579 payload_offset += zipfile.sizeFileHeader
580 payload_offset += len(payload_info.extra) + len(payload_info.filename)
Tao Bao85f16982018-03-08 16:28:33 -0800581 payload_size = payload_info.file_size
582
Tao Bao59cf0c52019-06-25 10:04:24 -0700583 with input_zip.open('payload.bin') as payload_fp:
Tao Bao85f16982018-03-08 16:28:33 -0800584 header_bin = payload_fp.read(24)
585
586 # network byte order (big-endian)
587 header = struct.unpack("!IQQL", header_bin)
588
589 # 'CrAU'
590 magic = header[0]
591 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic)
592
593 manifest_size = header[2]
594 metadata_signature_size = header[3]
595 metadata_total = 24 + manifest_size + metadata_signature_size
596 assert metadata_total < payload_size
597
598 return (payload_offset, metadata_total)
599
600
Yifan Hong38ab4d82020-06-18 15:19:56 -0700601def UpdatesInfoForSpecialUpdates(content, partitions_filter,
602 delete_keys=None):
603 """ Updates info file for secondary payload generation, partial update, etc.
604
605 Scan each line in the info file, and remove the unwanted partitions from
606 the dynamic partition list in the related properties. e.g.
607 "super_google_dynamic_partitions_partition_list=system vendor product"
608 will become "super_google_dynamic_partitions_partition_list=system".
609
610 Args:
611 content: The content of the input info file. e.g. misc_info.txt.
612 partitions_filter: A function to filter the desired partitions from a given
613 list
614 delete_keys: A list of keys to delete in the info file
615
616 Returns:
617 A string of the updated info content.
618 """
619
620 output_list = []
621 # The suffix in partition_list variables that follows the name of the
622 # partition group.
623 list_suffix = 'partition_list'
624 for line in content.splitlines():
625 if line.startswith('#') or '=' not in line:
626 output_list.append(line)
627 continue
628 key, value = line.strip().split('=', 1)
629
630 if delete_keys and key in delete_keys:
631 pass
632 elif key.endswith(list_suffix):
633 partitions = value.split()
634 # TODO for partial update, partitions in the same group must be all
635 # updated or all omitted
636 partitions = filter(partitions_filter, partitions)
637 output_list.append('{}={}'.format(key, ' '.join(partitions)))
638 else:
639 output_list.append(line)
640 return '\n'.join(output_list)
641
642
Tao Bao15a146a2018-02-21 16:06:59 -0800643def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800644 """Returns a target-files.zip file for generating secondary payload.
645
646 Although the original target-files.zip already contains secondary slot
647 images (i.e. IMAGES/system_other.img), we need to rename the files to the
648 ones without _other suffix. Note that we cannot instead modify the names in
649 META/ab_partitions.txt, because there are no matching partitions on device.
650
651 For the partitions that don't have secondary images, the ones for primary
652 slot will be used. This is to ensure that we always have valid boot, vbmeta,
653 bootloader images in the inactive slot.
654
655 Args:
656 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800657 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800658
659 Returns:
660 The filename of the target-files.zip for generating secondary payload.
661 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700662
663 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700664 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700665 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700666 content = f.read()
667 # Remove virtual_ab flag from secondary payload so that OTA client
668 # don't use snapshots for secondary update
669 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
670 return UpdatesInfoForSpecialUpdates(
671 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
672 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700673
Tao Baof7140c02018-01-30 17:09:24 -0800674 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
675 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
676
Kelvin Zhang928c2342020-09-22 16:15:57 -0400677 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800678 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700679
Tao Bao0ff15de2019-03-20 11:26:06 -0700680 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800681 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800682 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
683 if info.filename == 'IMAGES/system_other.img':
684 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
685
686 # Primary images and friends need to be skipped explicitly.
687 elif info.filename in ('IMAGES/system.img',
688 'IMAGES/system.map'):
689 pass
Tao Bao3e759462019-09-17 22:43:11 -0700690
691 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
692 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
693 image_name = os.path.basename(info.filename)
694 if image_name not in ['{}.img'.format(partition) for partition in
695 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
696 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800697
Tao Bao15a146a2018-02-21 16:06:59 -0800698 # Skip copying the postinstall config if requested.
699 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
700 pass
701
Tianjie Xu1c808002019-09-11 00:29:26 -0700702 elif info.filename.startswith('META/'):
703 # Remove the unnecessary partitions for secondary images from the
704 # ab_partitions file.
705 if info.filename == AB_PARTITIONS:
706 with open(unzipped_file) as f:
707 partition_list = f.read().splitlines()
708 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700709 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400710 common.ZipWriteStr(target_zip, info.filename,
711 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700712 # Remove the unnecessary partitions from the dynamic partitions list.
713 elif (info.filename == 'META/misc_info.txt' or
714 info.filename == DYNAMIC_PARTITION_INFO):
715 modified_info = GetInfoForSecondaryImages(unzipped_file)
716 common.ZipWriteStr(target_zip, info.filename, modified_info)
717 else:
718 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800719
Tao Baof7140c02018-01-30 17:09:24 -0800720 common.ZipClose(target_zip)
721
722 return target_file
723
724
Tao Bao15a146a2018-02-21 16:06:59 -0800725def GetTargetFilesZipWithoutPostinstallConfig(input_file):
726 """Returns a target-files.zip that's not containing postinstall_config.txt.
727
728 This allows brillo_update_payload script to skip writing all the postinstall
729 hooks in the generated payload. The input target-files.zip file will be
730 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
731 contain the postinstall_config.txt entry, the input file will be returned.
732
733 Args:
734 input_file: The input target-files.zip filename.
735
736 Returns:
737 The filename of target-files.zip that doesn't contain postinstall config.
738 """
739 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400740 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800741 if POSTINSTALL_CONFIG not in input_zip.namelist():
742 return input_file
743
744 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
745 shutil.copyfile(input_file, target_file)
746 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
747 return target_file
748
749
Yifan Hong38ab4d82020-06-18 15:19:56 -0700750def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
751 """Returns a target-files.zip for partial ota update package generation.
752
753 This function modifies ab_partitions list with the desired partitions before
754 calling the brillo_update_payload script. It also cleans up the reference to
755 the excluded partitions in the info file, e.g misc_info.txt.
756
757 Args:
758 input_file: The input target-files.zip filename.
759 ab_partitions: A list of partitions to include in the partial update
760
761 Returns:
762 The filename of target-files.zip used for partial ota update.
763 """
764
765 def AddImageForPartition(partition_name):
766 """Add the archive name for a given partition to the copy list."""
767 for prefix in ['IMAGES', 'RADIO']:
768 image_path = '{}/{}.img'.format(prefix, partition_name)
769 if image_path in namelist:
770 copy_entries.append(image_path)
771 map_path = '{}/{}.map'.format(prefix, partition_name)
772 if map_path in namelist:
773 copy_entries.append(map_path)
774 return
775
776 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
777
778 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
779 original_ab_partitions = input_zip.read(AB_PARTITIONS).decode().splitlines()
780 namelist = input_zip.namelist()
781
782 unrecognized_partitions = [partition for partition in ab_partitions if
783 partition not in original_ab_partitions]
784 if unrecognized_partitions:
785 raise ValueError("Unrecognized partitions when generating partial updates",
786 unrecognized_partitions)
787
788 logger.info("Generating partial updates for %s", ab_partitions)
789
790 copy_entries = ['META/update_engine_config.txt']
791 for partition_name in ab_partitions:
792 AddImageForPartition(partition_name)
793
794 # Use zip2zip to avoid extracting the zipfile.
795 partial_target_file = common.MakeTempFile(suffix='.zip')
796 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
797 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
798 common.RunAndCheckOutput(cmd)
799
800 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
801 allowZip64=True)
802 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
803 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
804 '\n'.join(ab_partitions))
805 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
806 if info_file not in input_zip.namelist():
807 logger.warning('Cannot find %s in input zipfile', info_file)
808 continue
809 content = input_zip.read(info_file).decode()
810 modified_info = UpdatesInfoForSpecialUpdates(
811 content, lambda p: p in ab_partitions)
812 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
813
814 # TODO(xunchang) handle 'META/care_map.pb', 'META/postinstall_config.txt'
815 common.ZipClose(partial_target_zip)
816
817 return partial_target_file
818
819
Yifan Hong50e79542018-11-08 17:44:12 -0800820def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800821 super_block_devices,
822 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800823 """Returns a target-files.zip for retrofitting dynamic partitions.
824
825 This allows brillo_update_payload to generate an OTA based on the exact
826 bits on the block devices. Postinstall is disabled.
827
828 Args:
829 input_file: The input target-files.zip filename.
830 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800831 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800832
833 Returns:
834 The filename of target-files.zip with *.img replaced with super_*.img for
835 each block device in super_block_devices.
836 """
837 assert super_block_devices, "No super_block_devices are specified."
838
839 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800840 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800841
842 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
843 shutil.copyfile(input_file, target_file)
844
Kelvin Zhang928c2342020-09-22 16:15:57 -0400845 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800846 namelist = input_zip.namelist()
847
Yifan Hongb433eba2019-03-06 12:42:53 -0800848 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
849
850 # Remove partitions from META/ab_partitions.txt that is in
851 # dynamic_partition_list but not in super_block_devices so that
852 # brillo_update_payload won't generate update for those logical partitions.
853 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
854 with open(ab_partitions_file) as f:
855 ab_partitions_lines = f.readlines()
856 ab_partitions = [line.strip() for line in ab_partitions_lines]
857 # Assert that all super_block_devices are in ab_partitions
858 super_device_not_updated = [partition for partition in super_block_devices
859 if partition not in ab_partitions]
860 assert not super_device_not_updated, \
861 "{} is in super_block_devices but not in {}".format(
862 super_device_not_updated, AB_PARTITIONS)
863 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400864 new_ab_partitions = common.MakeTempFile(
865 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800866 with open(new_ab_partitions, 'w') as f:
867 for partition in ab_partitions:
868 if (partition in dynamic_partition_list and
Kelvin Zhang39aea442020-08-17 11:04:25 -0400869 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700870 logger.info("Dropping %s from ab_partitions.txt", partition)
871 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800872 f.write(partition + "\n")
873 to_delete = [AB_PARTITIONS]
874
Yifan Hong50e79542018-11-08 17:44:12 -0800875 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800876 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800877
878 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
879 # is a regular update on devices without dynamic partitions support.
880 to_delete += [DYNAMIC_PARTITION_INFO]
881
Tao Bao03fecb62018-11-28 10:59:23 -0800882 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700883 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800884 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800885
886 common.ZipDelete(target_file, to_delete)
887
Yifan Hong50e79542018-11-08 17:44:12 -0800888 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
889
890 # Write super_{foo}.img as {foo}.img.
891 for src, dst in replace.items():
892 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700893 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800894 unzipped_file = os.path.join(input_tmp, *src.split('/'))
895 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
896
Yifan Hongb433eba2019-03-06 12:42:53 -0800897 # Write new ab_partitions.txt file
898 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
899
Yifan Hong50e79542018-11-08 17:44:12 -0800900 common.ZipClose(target_zip)
901
902 return target_file
903
904
Tao Baof0c4aa22018-04-30 20:29:30 -0700905def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -0800906 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -0700907 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -0800908 if not OPTIONS.no_signing:
909 staging_file = common.MakeTempFile(suffix='.zip')
910 else:
911 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -0800912 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang928c2342020-09-22 16:15:57 -0400913 compression=zipfile.ZIP_DEFLATED, allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -0800914
Tao Bao481bab82017-12-21 11:23:09 -0800915 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -0400916 assert "ab_partitions" in OPTIONS.source_info_dict, \
917 "META/ab_partitions.txt is required for ab_update."
918 assert "ab_partitions" in OPTIONS.target_info_dict, \
919 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -0700920 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
921 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -0800922 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -0400923 assert "ab_partitions" in OPTIONS.info_dict, \
924 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -0700925 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -0800926 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -0800927
Yifan Hong38ab4d82020-06-18 15:19:56 -0700928 additional_args = []
929
Yifan Hong50e79542018-11-08 17:44:12 -0800930 if OPTIONS.retrofit_dynamic_partitions:
931 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -0800932 target_file, target_info.get("super_block_devices").strip().split(),
933 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -0700934 elif OPTIONS.partial:
935 target_file = GetTargetFilesZipForPartialUpdates(target_file,
936 OPTIONS.partial)
937 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -0800938 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -0800939 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -0400940 # Target_file may have been modified, reparse ab_partitions
941 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
942 target_info.info_dict['ab_partitions'] = zfp.read(
943 AB_PARTITIONS).strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -0800944
Kelvin Zhang39aea442020-08-17 11:04:25 -0400945 # Metadata to comply with Android OTA package format.
946 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -0800947 # Generate payload.
948 payload = Payload()
949
Kelvin Zhang39aea442020-08-17 11:04:25 -0400950 partition_timestamps = []
Tao Bao40b18822018-01-30 18:19:04 -0800951 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -0700952 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -0800953 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Tao Baoff1b86e2017-10-03 14:17:57 -0700954 else:
Tianjiea2076132020-08-19 17:25:32 -0700955 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhang39aea442020-08-17 11:04:25 -0400956 partition_timestamps = [
957 part.partition_name + ":" + part.version
958 for part in metadata.postcondition.partition_state]
Yifan Hong38ab4d82020-06-18 15:19:56 -0700959 additional_args += ["--max_timestamp", max_timestamp]
Kelvin Zhang39aea442020-08-17 11:04:25 -0400960 if partition_timestamps:
961 additional_args.extend(
962 ["--partition_timestamps", ",".join(
963 partition_timestamps)]
964 )
Tao Baoc098e9e2016-01-07 13:03:56 -0800965
Tao Bao40b18822018-01-30 18:19:04 -0800966 payload.Generate(target_file, source_file, additional_args)
Tao Baoc098e9e2016-01-07 13:03:56 -0800967
Tao Bao40b18822018-01-30 18:19:04 -0800968 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -0800969 payload_signer = PayloadSigner()
970 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -0800971
Tao Bao40b18822018-01-30 18:19:04 -0800972 # Write the payload into output zip.
973 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -0800974
Tao Baof7140c02018-01-30 17:09:24 -0800975 # Generate and include the secondary payload that installs secondary images
976 # (e.g. system_other.img).
977 if OPTIONS.include_secondary:
978 # We always include a full payload for the secondary slot, even when
979 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -0800980 secondary_target_file = GetTargetFilesZipForSecondaryImages(
981 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -0800982 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -0800983 secondary_payload.Generate(secondary_target_file,
984 additional_args=additional_args)
Tao Baof7140c02018-01-30 17:09:24 -0800985 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -0800986 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -0800987
Tianjie Xucfa86222016-03-07 16:31:19 -0800988 # If dm-verity is supported for the device, copy contents of care_map
989 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400990 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -0800991 if (target_info.get("verity") == "true" or
Kelvin Zhang39aea442020-08-17 11:04:25 -0400992 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700993 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
994 "META/" + x in target_zip.namelist()]
995
996 # Adds care_map if either the protobuf format or the plain text one exists.
997 if care_map_list:
998 care_map_name = care_map_list[0]
999 care_map_data = target_zip.read("META/" + care_map_name)
1000 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001001 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001002 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001003 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001004 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001005 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001006
Tao Bao21803d32017-04-19 10:16:09 -07001007 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001008
Yifan Hong9276cf02019-08-21 16:37:04 -07001009 CheckVintfIfTrebleEnabled(target_file, target_info)
1010
Tao Baofe5b69a2018-03-02 09:47:43 -08001011 # We haven't written the metadata entry yet, which will be handled in
1012 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001013 common.ZipClose(output_zip)
1014
Tao Bao85f16982018-03-08 16:28:33 -08001015 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1016 # all the info of the latter. However, system updaters and OTA servers need to
1017 # take time to switch to the new flag. We keep both of the flags for
1018 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001019 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001020 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001021 StreamingPropertyFiles(),
1022 )
1023 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001024
Tao Baoc098e9e2016-01-07 13:03:56 -08001025
Doug Zongkereef39442009-04-02 12:14:19 -07001026def main(argv):
1027
1028 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001029 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001030 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001031 elif o in ("-i", "--incremental_from"):
1032 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001033 elif o == "--full_radio":
1034 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001035 elif o == "--full_bootloader":
1036 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001037 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001038 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001039 elif o == "--downgrade":
1040 OPTIONS.downgrade = True
1041 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001042 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001043 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001044 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001045 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001046 elif o == "--oem_no_mount":
1047 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001048 elif o in ("-e", "--extra_script"):
1049 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001050 elif o in ("-t", "--worker_threads"):
1051 if a.isdigit():
1052 OPTIONS.worker_threads = int(a)
1053 else:
1054 raise ValueError("Cannot parse value %r for option %r - only "
1055 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001056 elif o in ("-2", "--two_step"):
1057 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001058 elif o == "--include_secondary":
1059 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001060 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001061 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001062 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001063 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001064 elif o == "--block":
1065 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001066 elif o in ("-b", "--binary"):
1067 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001068 elif o == "--stash_threshold":
1069 try:
1070 OPTIONS.stash_threshold = float(a)
1071 except ValueError:
1072 raise ValueError("Cannot parse value %r for option %r - expecting "
1073 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001074 elif o == "--log_diff":
1075 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001076 elif o == "--payload_signer":
1077 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001078 elif o == "--payload_signer_args":
1079 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001080 elif o == "--payload_signer_maximum_signature_size":
1081 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001082 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001083 # TODO(Xunchang) remove this option after cleaning up the callers.
1084 logger.warning("The option '--payload_signer_key_size' is deprecated."
1085 " Use '--payload_signer_maximum_signature_size' instead.")
1086 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001087 elif o == "--extracted_input_target_files":
1088 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001089 elif o == "--skip_postinstall":
1090 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001091 elif o == "--retrofit_dynamic_partitions":
1092 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001093 elif o == "--skip_compatibility_check":
1094 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001095 elif o == "--output_metadata_path":
1096 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001097 elif o == "--disable_fec_computation":
1098 OPTIONS.disable_fec_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001099 elif o == "--force_non_ab":
1100 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001101 elif o == "--boot_variable_file":
1102 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001103 elif o == "--partial":
1104 partitions = a.split()
1105 if not partitions:
1106 raise ValueError("Cannot parse partitions in {}".format(a))
1107 OPTIONS.partial = partitions
Doug Zongkereef39442009-04-02 12:14:19 -07001108 else:
1109 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001110 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001111
1112 args = common.ParseOptions(argv, __doc__,
Tao Bao337633f2017-12-06 15:20:19 -08001113 extra_opts="b:k:i:d:e:t:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001114 extra_long_opts=[
Dan Albert8b72aef2015-03-23 19:13:21 -07001115 "package_key=",
1116 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001117 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001118 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001119 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001120 "downgrade",
Tao Bao3e6161a2017-02-28 11:48:48 -08001121 "override_timestamp",
Dan Albert8b72aef2015-03-23 19:13:21 -07001122 "extra_script=",
1123 "worker_threads=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001124 "two_step",
Tao Baof7140c02018-01-30 17:09:24 -08001125 "include_secondary",
Dan Albert8b72aef2015-03-23 19:13:21 -07001126 "no_signing",
1127 "block",
1128 "binary=",
1129 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001130 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001131 "verify",
Tao Bao8dcf7382015-05-21 14:09:49 -07001132 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001133 "log_diff=",
Tao Baodea0f8b2016-06-20 17:55:06 -07001134 "payload_signer=",
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001135 "payload_signer_args=",
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001136 "payload_signer_maximum_signature_size=",
xunchang376cc7c2019-04-08 23:04:58 -07001137 "payload_signer_key_size=",
Dan Willemsencea5cd22017-03-21 14:44:27 -07001138 "extracted_input_target_files=",
Tao Bao15a146a2018-02-21 16:06:59 -08001139 "skip_postinstall",
Yifan Hong50e79542018-11-08 17:44:12 -08001140 "retrofit_dynamic_partitions",
xunchangabfa2652019-02-19 16:27:10 -08001141 "skip_compatibility_check",
xunchang1cfe2512019-02-19 14:14:48 -08001142 "output_metadata_path=",
Tianjie Xu1b079832019-08-28 12:19:23 -07001143 "disable_fec_computation",
Yifan Hong65afc072020-04-17 10:08:10 -07001144 "force_non_ab",
Tianjied6867162020-05-10 14:30:13 -07001145 "boot_variable_file=",
Yifan Hong38ab4d82020-06-18 15:19:56 -07001146 "partial=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001147 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001148
1149 if len(args) != 2:
1150 common.Usage(__doc__)
1151 sys.exit(1)
1152
Tao Bao32fcdab2018-10-12 10:30:39 -07001153 common.InitLogging()
1154
Tao Bao5d182562016-02-23 11:38:39 -08001155 if OPTIONS.downgrade:
Tao Bao5d182562016-02-23 11:38:39 -08001156 # We should only allow downgrading incrementals (as opposed to full).
1157 # Otherwise the device may go back from arbitrary build with this full
1158 # OTA package.
1159 if OPTIONS.incremental_source is None:
Elliott Hughesd8a52f92016-06-20 14:35:47 -07001160 raise ValueError("Cannot generate downgradable full OTAs")
Yifan Hong38ab4d82020-06-18 15:19:56 -07001161 if OPTIONS.partial:
1162 raise ValueError("Cannot generate downgradable partial OTAs")
Tao Bao5d182562016-02-23 11:38:39 -08001163
Tao Bao2db13852018-01-08 22:28:57 -08001164 # Load the build info dicts from the zip directly or the extracted input
1165 # directory. We don't need to unzip the entire target-files zips, because they
1166 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1167 # When loading the info dicts, we don't need to provide the second parameter
1168 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1169 # some properties with their actual paths, such as 'selinux_fc',
1170 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001171 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001172 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001173 else:
Kelvin Zhang928c2342020-09-22 16:15:57 -04001174 with zipfile.ZipFile(args[0], 'r', allowZip64=True) as input_zip:
Tao Bao2db13852018-01-08 22:28:57 -08001175 OPTIONS.info_dict = common.LoadInfoDict(input_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001176
Yifan Hong38ab4d82020-06-18 15:19:56 -07001177 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1178 # target-file and reload the info_dict. So the info will be consistent with
1179 # the modified target-file.
1180
Tao Bao32fcdab2018-10-12 10:30:39 -07001181 logger.info("--- target info ---")
1182 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001183
1184 # Load the source build dict if applicable.
1185 if OPTIONS.incremental_source is not None:
1186 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhang928c2342020-09-22 16:15:57 -04001187 with zipfile.ZipFile(OPTIONS.incremental_source, 'r', allowZip64=True) as source_zip:
Tao Bao2db13852018-01-08 22:28:57 -08001188 OPTIONS.source_info_dict = common.LoadInfoDict(source_zip)
1189
Tao Bao32fcdab2018-10-12 10:30:39 -07001190 logger.info("--- source info ---")
1191 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001192
1193 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001194 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1195
Yifan Hong50e79542018-11-08 17:44:12 -08001196 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001197 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001198 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001199 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang39aea442020-08-17 11:04:25 -04001200 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001201 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1202 raise common.ExternalError(
1203 "Expect to generate incremental OTA for retrofitting dynamic "
1204 "partitions, but dynamic_partition_retrofit is not set in target "
1205 "build.")
1206 logger.info("Implicitly generating retrofit incremental OTA.")
1207 OPTIONS.retrofit_dynamic_partitions = True
1208
1209 # Skip postinstall for retrofitting dynamic partitions.
1210 if OPTIONS.retrofit_dynamic_partitions:
1211 OPTIONS.skip_postinstall = True
1212
Tao Baoc098e9e2016-01-07 13:03:56 -08001213 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001214 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1215 if OPTIONS.force_non_ab:
1216 assert allow_non_ab, "--force_non_ab only allowed on devices that supports non-A/B"
1217 assert ab_update, "--force_non_ab only allowed on A/B devices"
1218
1219 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001220
Christian Oderf63e2cd2017-05-01 22:30:15 +02001221 # Use the default key to sign the package if not specified with package_key.
1222 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001223 # A/B update is getting created.
1224 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001225 if OPTIONS.package_key is None:
1226 OPTIONS.package_key = OPTIONS.info_dict.get(
1227 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001228 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001229 # Get signing keys
1230 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
1231
Yifan Hong65afc072020-04-17 10:08:10 -07001232 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001233 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001234 target_file=args[0],
1235 output_file=args[1],
1236 source_file=OPTIONS.incremental_source)
1237
Dan Willemsencea5cd22017-03-21 14:44:27 -07001238 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001239 GenerateNonAbOtaPackage(
1240 target_file=args[0],
1241 output_file=args[1],
1242 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001243
Tao Baof0c4aa22018-04-30 20:29:30 -07001244 # Post OTA generation works.
1245 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1246 logger.info("Generating diff logs...")
1247 logger.info("Unzipping target-files for diffing...")
1248 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1249 source_dir = common.UnzipTemp(
1250 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001251
Tao Baof0c4aa22018-04-30 20:29:30 -07001252 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001253 target_files_diff.recursiveDiff(
1254 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001255
Tao Bao32fcdab2018-10-12 10:30:39 -07001256 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001257
1258
1259if __name__ == '__main__':
1260 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001261 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001262 main(sys.argv[1:])
Tao Bao32fcdab2018-10-12 10:30:39 -07001263 except common.ExternalError:
1264 logger.exception("\n ERROR:\n")
Doug Zongkereef39442009-04-02 12:14:19 -07001265 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07001266 finally:
1267 common.Cleanup()