blob: 0acd48a56b84734d79407c0c8d560696b4dc3396 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
David Anderson45b42302021-03-11 12:58:32 -0800214
215 --disable_vabc
216 Disable Virtual A/B Compression, for builds that have compression enabled
217 by default.
Doug Zongkereef39442009-04-02 12:14:19 -0700218"""
219
Tao Bao89fbb0f2017-01-10 10:47:58 -0800220from __future__ import print_function
221
Tao Bao32fcdab2018-10-12 10:30:39 -0700222import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700223import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500224import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800225import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500226import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700227import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800228import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800229import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500230import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800231import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700232import zipfile
233
234import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400235import ota_utils
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500236from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500237 PropertyFiles, SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400238import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400239from check_target_files_vintf import CheckVintfIfTrebleEnabled
240from non_ab_ota import GenerateNonAbOtaPackage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400241
Tao Bao481bab82017-12-21 11:23:09 -0800242if sys.hexversion < 0x02070000:
243 print("Python 2.7 or newer is required.", file=sys.stderr)
244 sys.exit(1)
245
Tao Bao32fcdab2018-10-12 10:30:39 -0700246logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800247
Kelvin Zhang2e417382020-08-20 11:33:11 -0400248OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700249OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700250OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700251OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700252OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700253OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
254if OPTIONS.worker_threads == 0:
255 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800256OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800257OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800258OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800259OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000260OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700261OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800262OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700263OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700264OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700265# Stash size cannot exceed cache_size * threshold.
266OPTIONS.cache_size = None
267OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800268OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700269OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700270OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700271OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700272OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800273OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800274OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700275OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500276OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700277OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700278OPTIONS.custom_images = {}
Kelvin Zhangbbfa1822021-02-03 17:19:44 -0500279OPTIONS.disable_vabc = False
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500280OPTIONS.spl_downgrade = False
Tao Bao8dcf7382015-05-21 14:09:49 -0700281
Tao Bao15a146a2018-02-21 16:06:59 -0800282POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800283DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800284AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400285
Tao Baof0c4aa22018-04-30 20:29:30 -0700286# Files to be unzipped for target diffing purpose.
287TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700288 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700289 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800290RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700291
292# Images to be excluded from secondary payload. We essentially only keep
293# 'system_other' and bootloader partitions.
294SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000295 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700296 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700297 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800298
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500299
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500300
Tao Bao2dd1c482017-02-03 16:49:39 -0800301
Tao Baofabe0832018-01-17 15:52:28 -0800302class PayloadSigner(object):
303 """A class that wraps the payload signing works.
304
305 When generating a Payload, hashes of the payload and metadata files will be
306 signed with the device key, either by calling an external payload signer or
307 by calling openssl with the package key. This class provides a unified
308 interface, so that callers can just call PayloadSigner.Sign().
309
310 If an external payload signer has been specified (OPTIONS.payload_signer), it
311 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
312 that the signing key should be provided as part of the payload_signer_args.
313 Otherwise without an external signer, it uses the package key
314 (OPTIONS.package_key) and calls openssl for the signing works.
315 """
316
317 def __init__(self):
318 if OPTIONS.payload_signer is None:
319 # Prepare the payload signing key.
320 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
321 pw = OPTIONS.key_passwords[OPTIONS.package_key]
322
323 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
324 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
325 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
326 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700327 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800328
329 self.signer = "openssl"
330 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
331 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700332 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
333 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800334 else:
335 self.signer = OPTIONS.payload_signer
336 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700337 if OPTIONS.payload_signer_maximum_signature_size:
338 self.maximum_signature_size = int(
339 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700340 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700341 # The legacy config uses RSA2048 keys.
342 logger.warning("The maximum signature size for payload signer is not"
343 " set, default to 256 bytes.")
344 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700345
346 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700347 def _GetMaximumSignatureSizeInBytes(signing_key):
348 out_signature_size_file = common.MakeTempFile("signature_size")
349 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
350 out_signature_size_file), "--private_key={}".format(signing_key)]
351 common.RunAndCheckOutput(cmd)
352 with open(out_signature_size_file) as f:
353 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100354 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700355 signature_size)
356 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800357
358 def Sign(self, in_file):
359 """Signs the given input file. Returns the output filename."""
360 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
361 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700362 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800363 return out_file
364
365
Tao Bao40b18822018-01-30 18:19:04 -0800366class Payload(object):
367 """Manages the creation and the signing of an A/B OTA Payload."""
368
369 PAYLOAD_BIN = 'payload.bin'
370 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800371 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
372 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800373
Tao Bao667ff572018-02-10 00:02:40 -0800374 def __init__(self, secondary=False):
375 """Initializes a Payload instance.
376
377 Args:
378 secondary: Whether it's generating a secondary payload (default: False).
379 """
Tao Bao40b18822018-01-30 18:19:04 -0800380 self.payload_file = None
381 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800382 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800383
Tao Baof0c4aa22018-04-30 20:29:30 -0700384 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700385 # Don't pipe (buffer) the output if verbose is set. Let
386 # brillo_update_payload write to stdout/stderr directly, so its progress can
387 # be monitored.
388 if OPTIONS.verbose:
389 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
390 else:
391 common.RunAndCheckOutput(cmd)
392
Tao Bao40b18822018-01-30 18:19:04 -0800393 def Generate(self, target_file, source_file=None, additional_args=None):
394 """Generates a payload from the given target-files zip(s).
395
396 Args:
397 target_file: The filename of the target build target-files zip.
398 source_file: The filename of the source build target-files zip; or None if
399 generating a full OTA.
400 additional_args: A list of additional args that should be passed to
401 brillo_update_payload script; or None.
402 """
403 if additional_args is None:
404 additional_args = []
405
406 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
407 cmd = ["brillo_update_payload", "generate",
408 "--payload", payload_file,
409 "--target_image", target_file]
410 if source_file is not None:
411 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700412 if OPTIONS.disable_fec_computation:
413 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500414 if OPTIONS.disable_verity_computation:
415 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800416 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700417 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800418
419 self.payload_file = payload_file
420 self.payload_properties = None
421
422 def Sign(self, payload_signer):
423 """Generates and signs the hashes of the payload and metadata.
424
425 Args:
426 payload_signer: A PayloadSigner() instance that serves the signing work.
427
428 Raises:
429 AssertionError: On any failure when calling brillo_update_payload script.
430 """
431 assert isinstance(payload_signer, PayloadSigner)
432
433 # 1. Generate hashes of the payload and metadata files.
434 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
435 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
436 cmd = ["brillo_update_payload", "hash",
437 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700438 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800439 "--metadata_hash_file", metadata_sig_file,
440 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700441 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800442
443 # 2. Sign the hashes.
444 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
445 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
446
447 # 3. Insert the signatures back into the payload file.
448 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
449 suffix=".bin")
450 cmd = ["brillo_update_payload", "sign",
451 "--unsigned_payload", self.payload_file,
452 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700453 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800454 "--metadata_signature_file", signed_metadata_sig_file,
455 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700456 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800457
458 # 4. Dump the signed payload properties.
459 properties_file = common.MakeTempFile(prefix="payload-properties-",
460 suffix=".txt")
461 cmd = ["brillo_update_payload", "properties",
462 "--payload", signed_payload_file,
463 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700464 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800465
Tao Bao667ff572018-02-10 00:02:40 -0800466 if self.secondary:
467 with open(properties_file, "a") as f:
468 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
469
Tao Bao40b18822018-01-30 18:19:04 -0800470 if OPTIONS.wipe_user_data:
471 with open(properties_file, "a") as f:
472 f.write("POWERWASH=1\n")
473
474 self.payload_file = signed_payload_file
475 self.payload_properties = properties_file
476
Tao Bao667ff572018-02-10 00:02:40 -0800477 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800478 """Writes the payload to the given zip.
479
480 Args:
481 output_zip: The output ZipFile instance.
482 """
483 assert self.payload_file is not None
484 assert self.payload_properties is not None
485
Tao Bao667ff572018-02-10 00:02:40 -0800486 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800487 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
488 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
489 else:
490 payload_arcname = Payload.PAYLOAD_BIN
491 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
492
Tao Bao40b18822018-01-30 18:19:04 -0800493 # Add the signed payload file and properties into the zip. In order to
494 # support streaming, we pack them as ZIP_STORED. So these entries can be
495 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800496 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800497 compress_type=zipfile.ZIP_STORED)
498 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800499 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800500 compress_type=zipfile.ZIP_STORED)
501
502
Tao Bao481bab82017-12-21 11:23:09 -0800503def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800504 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800505 if not oem_source:
506 return None
507
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800508 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800509 for oem_file in oem_source:
510 with open(oem_file) as fp:
511 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800512 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700513
Doug Zongkereef39442009-04-02 12:14:19 -0700514
Tao Baod3fc38a2018-03-08 16:09:01 -0800515class StreamingPropertyFiles(PropertyFiles):
516 """A subclass for computing the property-files for streaming A/B OTAs."""
517
518 def __init__(self):
519 super(StreamingPropertyFiles, self).__init__()
520 self.name = 'ota-streaming-property-files'
521 self.required = (
522 # payload.bin and payload_properties.txt must exist.
523 'payload.bin',
524 'payload_properties.txt',
525 )
526 self.optional = (
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700527 # care_map is available only if dm-verity is enabled.
528 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800529 'care_map.txt',
530 # compatibility.zip is available only if target supports Treble.
531 'compatibility.zip',
532 )
533
534
Tao Bao85f16982018-03-08 16:28:33 -0800535class AbOtaPropertyFiles(StreamingPropertyFiles):
536 """The property-files for A/B OTA that includes payload_metadata.bin info.
537
538 Since P, we expose one more token (aka property-file), in addition to the ones
539 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
540 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
541 doesn't exist as a separate ZIP entry, but can be used to verify if the
542 payload can be applied on the given device.
543
544 For backward compatibility, we keep both of the 'ota-streaming-property-files'
545 and the newly added 'ota-property-files' in P. The new token will only be
546 available in 'ota-property-files'.
547 """
548
549 def __init__(self):
550 super(AbOtaPropertyFiles, self).__init__()
551 self.name = 'ota-property-files'
552
553 def _GetPrecomputed(self, input_zip):
554 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
555 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
556
557 @staticmethod
558 def _GetPayloadMetadataOffsetAndSize(input_zip):
559 """Computes the offset and size of the payload metadata for a given package.
560
561 (From system/update_engine/update_metadata.proto)
562 A delta update file contains all the deltas needed to update a system from
563 one specific version to another specific version. The update format is
564 represented by this struct pseudocode:
565
566 struct delta_update_file {
567 char magic[4] = "CrAU";
568 uint64 file_format_version;
569 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
570
571 // Only present if format_version > 1:
572 uint32 metadata_signature_size;
573
574 // The Bzip2 compressed DeltaArchiveManifest
575 char manifest[metadata_signature_size];
576
577 // The signature of the metadata (from the beginning of the payload up to
578 // this location, not including the signature itself). This is a
579 // serialized Signatures message.
580 char medatada_signature_message[metadata_signature_size];
581
582 // Data blobs for files, no specific format. The specific offset
583 // and length of each data blob is recorded in the DeltaArchiveManifest.
584 struct {
585 char data[];
586 } blobs[];
587
588 // These two are not signed:
589 uint64 payload_signatures_message_size;
590 char payload_signatures_message[];
591 };
592
593 'payload-metadata.bin' contains all the bytes from the beginning of the
594 payload, till the end of 'medatada_signature_message'.
595 """
596 payload_info = input_zip.getinfo('payload.bin')
Shashikant Baviskar338856f2018-04-12 12:11:22 +0900597 payload_offset = payload_info.header_offset
598 payload_offset += zipfile.sizeFileHeader
599 payload_offset += len(payload_info.extra) + len(payload_info.filename)
Tao Bao85f16982018-03-08 16:28:33 -0800600 payload_size = payload_info.file_size
601
Tao Bao59cf0c52019-06-25 10:04:24 -0700602 with input_zip.open('payload.bin') as payload_fp:
Tao Bao85f16982018-03-08 16:28:33 -0800603 header_bin = payload_fp.read(24)
604
605 # network byte order (big-endian)
606 header = struct.unpack("!IQQL", header_bin)
607
608 # 'CrAU'
609 magic = header[0]
610 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic)
611
612 manifest_size = header[2]
613 metadata_signature_size = header[3]
614 metadata_total = 24 + manifest_size + metadata_signature_size
615 assert metadata_total < payload_size
616
617 return (payload_offset, metadata_total)
618
619
Yifan Hong38ab4d82020-06-18 15:19:56 -0700620def UpdatesInfoForSpecialUpdates(content, partitions_filter,
621 delete_keys=None):
622 """ Updates info file for secondary payload generation, partial update, etc.
623
624 Scan each line in the info file, and remove the unwanted partitions from
625 the dynamic partition list in the related properties. e.g.
626 "super_google_dynamic_partitions_partition_list=system vendor product"
627 will become "super_google_dynamic_partitions_partition_list=system".
628
629 Args:
630 content: The content of the input info file. e.g. misc_info.txt.
631 partitions_filter: A function to filter the desired partitions from a given
632 list
633 delete_keys: A list of keys to delete in the info file
634
635 Returns:
636 A string of the updated info content.
637 """
638
639 output_list = []
640 # The suffix in partition_list variables that follows the name of the
641 # partition group.
642 list_suffix = 'partition_list'
643 for line in content.splitlines():
644 if line.startswith('#') or '=' not in line:
645 output_list.append(line)
646 continue
647 key, value = line.strip().split('=', 1)
648
649 if delete_keys and key in delete_keys:
650 pass
651 elif key.endswith(list_suffix):
652 partitions = value.split()
653 # TODO for partial update, partitions in the same group must be all
654 # updated or all omitted
655 partitions = filter(partitions_filter, partitions)
656 output_list.append('{}={}'.format(key, ' '.join(partitions)))
657 else:
658 output_list.append(line)
659 return '\n'.join(output_list)
660
661
Tao Bao15a146a2018-02-21 16:06:59 -0800662def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800663 """Returns a target-files.zip file for generating secondary payload.
664
665 Although the original target-files.zip already contains secondary slot
666 images (i.e. IMAGES/system_other.img), we need to rename the files to the
667 ones without _other suffix. Note that we cannot instead modify the names in
668 META/ab_partitions.txt, because there are no matching partitions on device.
669
670 For the partitions that don't have secondary images, the ones for primary
671 slot will be used. This is to ensure that we always have valid boot, vbmeta,
672 bootloader images in the inactive slot.
673
674 Args:
675 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800676 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800677
678 Returns:
679 The filename of the target-files.zip for generating secondary payload.
680 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700681
682 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700683 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700684 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700685 content = f.read()
686 # Remove virtual_ab flag from secondary payload so that OTA client
687 # don't use snapshots for secondary update
688 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
689 return UpdatesInfoForSpecialUpdates(
690 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
691 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700692
Tao Baof7140c02018-01-30 17:09:24 -0800693 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
694 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
695
Kelvin Zhang928c2342020-09-22 16:15:57 -0400696 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800697 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700698
Tao Bao0ff15de2019-03-20 11:26:06 -0700699 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800700 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800701 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
702 if info.filename == 'IMAGES/system_other.img':
703 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
704
705 # Primary images and friends need to be skipped explicitly.
706 elif info.filename in ('IMAGES/system.img',
707 'IMAGES/system.map'):
708 pass
Tao Bao3e759462019-09-17 22:43:11 -0700709
710 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
711 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
712 image_name = os.path.basename(info.filename)
713 if image_name not in ['{}.img'.format(partition) for partition in
714 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
715 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800716
Tao Bao15a146a2018-02-21 16:06:59 -0800717 # Skip copying the postinstall config if requested.
718 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
719 pass
720
Tianjie Xu1c808002019-09-11 00:29:26 -0700721 elif info.filename.startswith('META/'):
722 # Remove the unnecessary partitions for secondary images from the
723 # ab_partitions file.
724 if info.filename == AB_PARTITIONS:
725 with open(unzipped_file) as f:
726 partition_list = f.read().splitlines()
727 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700728 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400729 common.ZipWriteStr(target_zip, info.filename,
730 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700731 # Remove the unnecessary partitions from the dynamic partitions list.
732 elif (info.filename == 'META/misc_info.txt' or
733 info.filename == DYNAMIC_PARTITION_INFO):
734 modified_info = GetInfoForSecondaryImages(unzipped_file)
735 common.ZipWriteStr(target_zip, info.filename, modified_info)
736 else:
737 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800738
Tao Baof7140c02018-01-30 17:09:24 -0800739 common.ZipClose(target_zip)
740
741 return target_file
742
743
Tao Bao15a146a2018-02-21 16:06:59 -0800744def GetTargetFilesZipWithoutPostinstallConfig(input_file):
745 """Returns a target-files.zip that's not containing postinstall_config.txt.
746
747 This allows brillo_update_payload script to skip writing all the postinstall
748 hooks in the generated payload. The input target-files.zip file will be
749 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
750 contain the postinstall_config.txt entry, the input file will be returned.
751
752 Args:
753 input_file: The input target-files.zip filename.
754
755 Returns:
756 The filename of target-files.zip that doesn't contain postinstall config.
757 """
758 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400759 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800760 if POSTINSTALL_CONFIG not in input_zip.namelist():
761 return input_file
762
763 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
764 shutil.copyfile(input_file, target_file)
765 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
766 return target_file
767
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400768def ParseInfoDict(target_file_path):
769 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
770 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800771
Yifan Hong38ab4d82020-06-18 15:19:56 -0700772def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
773 """Returns a target-files.zip for partial ota update package generation.
774
775 This function modifies ab_partitions list with the desired partitions before
776 calling the brillo_update_payload script. It also cleans up the reference to
777 the excluded partitions in the info file, e.g misc_info.txt.
778
779 Args:
780 input_file: The input target-files.zip filename.
781 ab_partitions: A list of partitions to include in the partial update
782
783 Returns:
784 The filename of target-files.zip used for partial ota update.
785 """
786
787 def AddImageForPartition(partition_name):
788 """Add the archive name for a given partition to the copy list."""
789 for prefix in ['IMAGES', 'RADIO']:
790 image_path = '{}/{}.img'.format(prefix, partition_name)
791 if image_path in namelist:
792 copy_entries.append(image_path)
793 map_path = '{}/{}.map'.format(prefix, partition_name)
794 if map_path in namelist:
795 copy_entries.append(map_path)
796 return
797
798 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
799
800 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400801 original_ab_partitions = input_zip.read(
802 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700803 namelist = input_zip.namelist()
804
805 unrecognized_partitions = [partition for partition in ab_partitions if
806 partition not in original_ab_partitions]
807 if unrecognized_partitions:
808 raise ValueError("Unrecognized partitions when generating partial updates",
809 unrecognized_partitions)
810
811 logger.info("Generating partial updates for %s", ab_partitions)
812
813 copy_entries = ['META/update_engine_config.txt']
814 for partition_name in ab_partitions:
815 AddImageForPartition(partition_name)
816
817 # Use zip2zip to avoid extracting the zipfile.
818 partial_target_file = common.MakeTempFile(suffix='.zip')
819 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
820 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
821 common.RunAndCheckOutput(cmd)
822
823 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
824 allowZip64=True)
825 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
826 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
827 '\n'.join(ab_partitions))
828 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
829 if info_file not in input_zip.namelist():
830 logger.warning('Cannot find %s in input zipfile', info_file)
831 continue
832 content = input_zip.read(info_file).decode()
833 modified_info = UpdatesInfoForSpecialUpdates(
834 content, lambda p: p in ab_partitions)
835 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
836
837 # TODO(xunchang) handle 'META/care_map.pb', 'META/postinstall_config.txt'
838 common.ZipClose(partial_target_zip)
839
840 return partial_target_file
841
842
Yifan Hong50e79542018-11-08 17:44:12 -0800843def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800844 super_block_devices,
845 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800846 """Returns a target-files.zip for retrofitting dynamic partitions.
847
848 This allows brillo_update_payload to generate an OTA based on the exact
849 bits on the block devices. Postinstall is disabled.
850
851 Args:
852 input_file: The input target-files.zip filename.
853 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800854 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800855
856 Returns:
857 The filename of target-files.zip with *.img replaced with super_*.img for
858 each block device in super_block_devices.
859 """
860 assert super_block_devices, "No super_block_devices are specified."
861
862 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800863 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800864
865 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
866 shutil.copyfile(input_file, target_file)
867
Kelvin Zhang928c2342020-09-22 16:15:57 -0400868 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800869 namelist = input_zip.namelist()
870
Yifan Hongb433eba2019-03-06 12:42:53 -0800871 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
872
873 # Remove partitions from META/ab_partitions.txt that is in
874 # dynamic_partition_list but not in super_block_devices so that
875 # brillo_update_payload won't generate update for those logical partitions.
876 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
877 with open(ab_partitions_file) as f:
878 ab_partitions_lines = f.readlines()
879 ab_partitions = [line.strip() for line in ab_partitions_lines]
880 # Assert that all super_block_devices are in ab_partitions
881 super_device_not_updated = [partition for partition in super_block_devices
882 if partition not in ab_partitions]
883 assert not super_device_not_updated, \
884 "{} is in super_block_devices but not in {}".format(
885 super_device_not_updated, AB_PARTITIONS)
886 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400887 new_ab_partitions = common.MakeTempFile(
888 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800889 with open(new_ab_partitions, 'w') as f:
890 for partition in ab_partitions:
891 if (partition in dynamic_partition_list and
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400892 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700893 logger.info("Dropping %s from ab_partitions.txt", partition)
894 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800895 f.write(partition + "\n")
896 to_delete = [AB_PARTITIONS]
897
Yifan Hong50e79542018-11-08 17:44:12 -0800898 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800899 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800900
901 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
902 # is a regular update on devices without dynamic partitions support.
903 to_delete += [DYNAMIC_PARTITION_INFO]
904
Tao Bao03fecb62018-11-28 10:59:23 -0800905 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700906 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800907 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800908
909 common.ZipDelete(target_file, to_delete)
910
Yifan Hong50e79542018-11-08 17:44:12 -0800911 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
912
913 # Write super_{foo}.img as {foo}.img.
914 for src, dst in replace.items():
915 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700916 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800917 unzipped_file = os.path.join(input_tmp, *src.split('/'))
918 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
919
Yifan Hongb433eba2019-03-06 12:42:53 -0800920 # Write new ab_partitions.txt file
921 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
922
Yifan Hong50e79542018-11-08 17:44:12 -0800923 common.ZipClose(target_zip)
924
925 return target_file
926
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400927
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700928def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
929 """Returns a target-files.zip for custom partitions update.
930
931 This function modifies ab_partitions list with the desired custom partitions
932 and puts the custom images into the target target-files.zip.
933
934 Args:
935 input_file: The input target-files.zip filename.
936 custom_images: A map of custom partitions and custom images.
937
938 Returns:
939 The filename of a target-files.zip which has renamed the custom images in
940 the IMAGS/ to their partition names.
941 """
942 # Use zip2zip to avoid extracting the zipfile.
943 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
944 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
945
946 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
947 namelist = input_zip.namelist()
948
949 # Write {custom_image}.img as {custom_partition}.img.
950 for custom_partition, custom_image in custom_images.items():
951 default_custom_image = '{}.img'.format(custom_partition)
952 if default_custom_image != custom_image:
953 logger.info("Update custom partition '%s' with '%s'",
954 custom_partition, custom_image)
955 # Default custom image need to be deleted first.
956 namelist.remove('IMAGES/{}'.format(default_custom_image))
957 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
958 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
959 default_custom_image)])
960
961 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
962 common.RunAndCheckOutput(cmd)
963
964 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -0800965
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400966def GeneratePartitionTimestampFlags(partition_state):
967 partition_timestamps = [
968 part.partition_name + ":" + part.version
969 for part in partition_state]
970 return ["--partition_timestamps", ",".join(partition_timestamps)]
971
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500972def GeneratePartitionTimestampFlagsDowngrade(
973 pre_partition_state, post_partition_state):
Kelvin Zhang80195722020-11-04 14:38:34 -0500974 assert pre_partition_state is not None
975 partition_timestamps = {}
976 for part in pre_partition_state:
977 partition_timestamps[part.partition_name] = part.version
978 for part in post_partition_state:
979 partition_timestamps[part.partition_name] = \
980 max(part.version, partition_timestamps[part.partition_name])
981 return [
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500982 "--partition_timestamps",
983 ",".join([key + ":" + val for (key, val) in partition_timestamps.items()])
984 ]
Kelvin Zhang80195722020-11-04 14:38:34 -0500985
Kelvin Zhang65029a22020-11-03 10:07:51 -0500986def IsSparseImage(filepath):
987 with open(filepath, 'rb') as fp:
988 # Magic for android sparse image format
989 # https://source.android.com/devices/bootloader/images
990 return fp.read(4) == b'\x3A\xFF\x26\xED'
991
992def SupportsMainlineGkiUpdates(target_file):
993 """Return True if the build supports MainlineGKIUpdates.
994
995 This function scans the product.img file in IMAGES/ directory for
996 pattern |*/apex/com.android.gki.*.apex|. If there are files
997 matching this pattern, conclude that build supports mainline
998 GKI and return True
999
1000 Args:
1001 target_file: Path to a target_file.zip, or an extracted directory
1002 Return:
1003 True if thisb uild supports Mainline GKI Updates.
1004 """
1005 if target_file is None:
1006 return False
1007 if os.path.isfile(target_file):
1008 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1009 if not os.path.isdir(target_file):
1010 assert os.path.isdir(target_file), \
1011 "{} must be a path to zip archive or dir containing extracted"\
1012 " target_files".format(target_file)
1013 image_file = os.path.join(target_file, "IMAGES", "product.img")
1014
1015 if not os.path.isfile(image_file):
1016 return False
1017
1018 if IsSparseImage(image_file):
1019 # Unsparse the image
1020 tmp_img = common.MakeTempFile(suffix=".img")
1021 subprocess.check_output(["simg2img", image_file, tmp_img])
1022 image_file = tmp_img
1023
1024 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1025 output = subprocess.check_output(cmd).decode()
1026
1027 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1028 return pattern.search(output) is not None
1029
Tao Baof0c4aa22018-04-30 20:29:30 -07001030def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001031 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001032 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001033 if not OPTIONS.no_signing:
1034 staging_file = common.MakeTempFile(suffix='.zip')
1035 else:
1036 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001037 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001038 compression=zipfile.ZIP_DEFLATED,
1039 allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001040
Tao Bao481bab82017-12-21 11:23:09 -08001041 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001042 assert "ab_partitions" in OPTIONS.source_info_dict, \
1043 "META/ab_partitions.txt is required for ab_update."
1044 assert "ab_partitions" in OPTIONS.target_info_dict, \
1045 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001046 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1047 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang31233e52020-11-03 13:42:46 -05001048 vendor_prop = source_info.info_dict.get("vendor.build.prop")
1049 if vendor_prop and \
1050 vendor_prop.GetProp("ro.virtual_ab.compression.enabled") == "true":
1051 # TODO(zhangkelvin) Remove this once FEC on VABC is supported
1052 logger.info("Virtual AB Compression enabled, disabling FEC")
1053 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001054 OPTIONS.disable_verity_computation = True
Tao Bao481bab82017-12-21 11:23:09 -08001055 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001056 assert "ab_partitions" in OPTIONS.info_dict, \
1057 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001058 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001059 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001060
Yifan Hong38ab4d82020-06-18 15:19:56 -07001061 additional_args = []
1062
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001063 # Prepare custom images.
1064 if OPTIONS.custom_images:
1065 target_file = GetTargetFilesZipForCustomImagesUpdates(
1066 target_file, OPTIONS.custom_images)
1067
Yifan Hong50e79542018-11-08 17:44:12 -08001068 if OPTIONS.retrofit_dynamic_partitions:
1069 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001070 target_file, target_info.get("super_block_devices").strip().split(),
1071 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001072 elif OPTIONS.partial:
1073 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1074 OPTIONS.partial)
1075 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -08001076 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001077 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001078 # Target_file may have been modified, reparse ab_partitions
1079 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1080 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001081 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001082
Kelvin Zhang39aea442020-08-17 11:04:25 -04001083 # Metadata to comply with Android OTA package format.
1084 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001085 # Generate payload.
1086 payload = Payload()
1087
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001088 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001089 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001090 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001091 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001092 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001093 metadata.precondition.partition_state,
1094 metadata.postcondition.partition_state
1095 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001096 else:
Tianjiea2076132020-08-19 17:25:32 -07001097 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001098 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1099 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001100
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001101 if OPTIONS.disable_vabc:
1102 additional_args += ["--disable_vabc", "true"]
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001103 additional_args += ["--max_timestamp", max_timestamp]
1104
Kelvin Zhang65029a22020-11-03 10:07:51 -05001105 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001106 logger.warning("Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001107 additional_args.extend(["--full_boot", "true"])
1108
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001109 payload.Generate(
1110 target_file,
1111 source_file,
1112 additional_args + partition_timestamps_flags
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001113 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001114
Tao Bao40b18822018-01-30 18:19:04 -08001115 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -08001116 payload_signer = PayloadSigner()
1117 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001118
Tao Bao40b18822018-01-30 18:19:04 -08001119 # Write the payload into output zip.
1120 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001121
Tao Baof7140c02018-01-30 17:09:24 -08001122 # Generate and include the secondary payload that installs secondary images
1123 # (e.g. system_other.img).
1124 if OPTIONS.include_secondary:
1125 # We always include a full payload for the secondary slot, even when
1126 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001127 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1128 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001129 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001130 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001131 additional_args=["--max_timestamp",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001132 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001133 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001134 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001135
Tianjie Xucfa86222016-03-07 16:31:19 -08001136 # If dm-verity is supported for the device, copy contents of care_map
1137 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001138 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001139 if (target_info.get("verity") == "true" or
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001140 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001141 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1142 "META/" + x in target_zip.namelist()]
1143
1144 # Adds care_map if either the protobuf format or the plain text one exists.
1145 if care_map_list:
1146 care_map_name = care_map_list[0]
1147 care_map_data = target_zip.read("META/" + care_map_name)
1148 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001149 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001150 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001151 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001152 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001153 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001154
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001155 # Copy apex_info.pb over to generated OTA package.
1156 try:
1157 apex_info_entry = target_zip.getinfo("META/apex_info.pb")
1158 with target_zip.open(apex_info_entry, "r") as zfp:
1159 common.ZipWriteStr(output_zip, "apex_info.pb", zfp.read(),
1160 compress_type=zipfile.ZIP_STORED)
1161 except KeyError:
1162 logger.warning("target_file doesn't contain apex_info.pb %s", target_file)
1163
Tao Bao21803d32017-04-19 10:16:09 -07001164 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001165
Yifan Hong9276cf02019-08-21 16:37:04 -07001166 CheckVintfIfTrebleEnabled(target_file, target_info)
1167
Tao Baofe5b69a2018-03-02 09:47:43 -08001168 # We haven't written the metadata entry yet, which will be handled in
1169 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001170 common.ZipClose(output_zip)
1171
Tao Bao85f16982018-03-08 16:28:33 -08001172 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1173 # all the info of the latter. However, system updaters and OTA servers need to
1174 # take time to switch to the new flag. We keep both of the flags for
1175 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001176 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001177 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001178 StreamingPropertyFiles(),
1179 )
1180 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001181
Tao Baoc098e9e2016-01-07 13:03:56 -08001182
Doug Zongkereef39442009-04-02 12:14:19 -07001183def main(argv):
1184
1185 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001186 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001187 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001188 elif o in ("-i", "--incremental_from"):
1189 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001190 elif o == "--full_radio":
1191 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001192 elif o == "--full_bootloader":
1193 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001194 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001195 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001196 elif o == "--downgrade":
1197 OPTIONS.downgrade = True
1198 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001199 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001200 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001201 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001202 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001203 elif o == "--oem_no_mount":
1204 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001205 elif o in ("-e", "--extra_script"):
1206 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001207 elif o in ("-t", "--worker_threads"):
1208 if a.isdigit():
1209 OPTIONS.worker_threads = int(a)
1210 else:
1211 raise ValueError("Cannot parse value %r for option %r - only "
1212 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001213 elif o in ("-2", "--two_step"):
1214 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001215 elif o == "--include_secondary":
1216 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001217 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001218 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001219 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001220 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001221 elif o == "--block":
1222 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001223 elif o in ("-b", "--binary"):
1224 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001225 elif o == "--stash_threshold":
1226 try:
1227 OPTIONS.stash_threshold = float(a)
1228 except ValueError:
1229 raise ValueError("Cannot parse value %r for option %r - expecting "
1230 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001231 elif o == "--log_diff":
1232 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001233 elif o == "--payload_signer":
1234 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001235 elif o == "--payload_signer_args":
1236 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001237 elif o == "--payload_signer_maximum_signature_size":
1238 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001239 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001240 # TODO(Xunchang) remove this option after cleaning up the callers.
1241 logger.warning("The option '--payload_signer_key_size' is deprecated."
1242 " Use '--payload_signer_maximum_signature_size' instead.")
1243 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001244 elif o == "--extracted_input_target_files":
1245 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001246 elif o == "--skip_postinstall":
1247 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001248 elif o == "--retrofit_dynamic_partitions":
1249 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001250 elif o == "--skip_compatibility_check":
1251 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001252 elif o == "--output_metadata_path":
1253 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001254 elif o == "--disable_fec_computation":
1255 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001256 elif o == "--disable_verity_computation":
1257 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001258 elif o == "--force_non_ab":
1259 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001260 elif o == "--boot_variable_file":
1261 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001262 elif o == "--partial":
1263 partitions = a.split()
1264 if not partitions:
1265 raise ValueError("Cannot parse partitions in {}".format(a))
1266 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001267 elif o == "--custom_image":
1268 custom_partition, custom_image = a.split("=")
1269 OPTIONS.custom_images[custom_partition] = custom_image
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001270 elif o == "--disable_vabc":
1271 OPTIONS.disable_vabc = True
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001272 elif o == "--spl_downgrade":
1273 OPTIONS.spl_downgrade = True
Doug Zongkereef39442009-04-02 12:14:19 -07001274 else:
1275 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001276 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001277
1278 args = common.ParseOptions(argv, __doc__,
Tao Bao337633f2017-12-06 15:20:19 -08001279 extra_opts="b:k:i:d:e:t:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001280 extra_long_opts=[
Dan Albert8b72aef2015-03-23 19:13:21 -07001281 "package_key=",
1282 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001283 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001284 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001285 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001286 "downgrade",
Tao Bao3e6161a2017-02-28 11:48:48 -08001287 "override_timestamp",
Dan Albert8b72aef2015-03-23 19:13:21 -07001288 "extra_script=",
1289 "worker_threads=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001290 "two_step",
Tao Baof7140c02018-01-30 17:09:24 -08001291 "include_secondary",
Dan Albert8b72aef2015-03-23 19:13:21 -07001292 "no_signing",
1293 "block",
1294 "binary=",
1295 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001296 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001297 "verify",
Tao Bao8dcf7382015-05-21 14:09:49 -07001298 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001299 "log_diff=",
Tao Baodea0f8b2016-06-20 17:55:06 -07001300 "payload_signer=",
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001301 "payload_signer_args=",
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001302 "payload_signer_maximum_signature_size=",
xunchang376cc7c2019-04-08 23:04:58 -07001303 "payload_signer_key_size=",
Dan Willemsencea5cd22017-03-21 14:44:27 -07001304 "extracted_input_target_files=",
Tao Bao15a146a2018-02-21 16:06:59 -08001305 "skip_postinstall",
Yifan Hong50e79542018-11-08 17:44:12 -08001306 "retrofit_dynamic_partitions",
xunchangabfa2652019-02-19 16:27:10 -08001307 "skip_compatibility_check",
xunchang1cfe2512019-02-19 14:14:48 -08001308 "output_metadata_path=",
Tianjie Xu1b079832019-08-28 12:19:23 -07001309 "disable_fec_computation",
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001310 "disable_verity_computation",
Yifan Hong65afc072020-04-17 10:08:10 -07001311 "force_non_ab",
Tianjied6867162020-05-10 14:30:13 -07001312 "boot_variable_file=",
Yifan Hong38ab4d82020-06-18 15:19:56 -07001313 "partial=",
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001314 "custom_image=",
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001315 "disable_vabc",
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001316 "spl_downgrade"
Dan Albert8b72aef2015-03-23 19:13:21 -07001317 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001318
1319 if len(args) != 2:
1320 common.Usage(__doc__)
1321 sys.exit(1)
1322
Tao Bao32fcdab2018-10-12 10:30:39 -07001323 common.InitLogging()
1324
Tao Bao2db13852018-01-08 22:28:57 -08001325 # Load the build info dicts from the zip directly or the extracted input
1326 # directory. We don't need to unzip the entire target-files zips, because they
1327 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1328 # When loading the info dicts, we don't need to provide the second parameter
1329 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1330 # some properties with their actual paths, such as 'selinux_fc',
1331 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001332 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001333 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001334 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001335 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001336
1337 if OPTIONS.downgrade:
1338 # We should only allow downgrading incrementals (as opposed to full).
1339 # Otherwise the device may go back from arbitrary build with this full
1340 # OTA package.
1341 if OPTIONS.incremental_source is None:
1342 raise ValueError("Cannot generate downgradable full OTAs")
1343
Tao Baoc098e9e2016-01-07 13:03:56 -08001344
Yifan Hong38ab4d82020-06-18 15:19:56 -07001345 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1346 # target-file and reload the info_dict. So the info will be consistent with
1347 # the modified target-file.
1348
Tao Bao32fcdab2018-10-12 10:30:39 -07001349 logger.info("--- target info ---")
1350 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001351
Kelvin Zhang80195722020-11-04 14:38:34 -05001352
Tao Bao2db13852018-01-08 22:28:57 -08001353 # Load the source build dict if applicable.
1354 if OPTIONS.incremental_source is not None:
1355 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001356 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001357
Tao Bao32fcdab2018-10-12 10:30:39 -07001358 logger.info("--- source info ---")
1359 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001360
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001361 if OPTIONS.partial:
1362 OPTIONS.info_dict['ab_partitions'] = \
1363 list(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001364 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1365 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001366 if OPTIONS.source_info_dict:
1367 OPTIONS.source_info_dict['ab_partitions'] = \
1368 list(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001369 set(OPTIONS.source_info_dict['ab_partitions']) &
1370 set(OPTIONS.partial)
1371 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001372
Tao Bao2db13852018-01-08 22:28:57 -08001373 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001374 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1375
Yifan Hong50e79542018-11-08 17:44:12 -08001376 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001377 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001378 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001379 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001380 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001381 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1382 raise common.ExternalError(
1383 "Expect to generate incremental OTA for retrofitting dynamic "
1384 "partitions, but dynamic_partition_retrofit is not set in target "
1385 "build.")
1386 logger.info("Implicitly generating retrofit incremental OTA.")
1387 OPTIONS.retrofit_dynamic_partitions = True
1388
1389 # Skip postinstall for retrofitting dynamic partitions.
1390 if OPTIONS.retrofit_dynamic_partitions:
1391 OPTIONS.skip_postinstall = True
1392
Tao Baoc098e9e2016-01-07 13:03:56 -08001393 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001394 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1395 if OPTIONS.force_non_ab:
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001396 assert allow_non_ab,\
1397 "--force_non_ab only allowed on devices that supports non-A/B"
Yifan Hong65afc072020-04-17 10:08:10 -07001398 assert ab_update, "--force_non_ab only allowed on A/B devices"
1399
1400 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001401
Christian Oderf63e2cd2017-05-01 22:30:15 +02001402 # Use the default key to sign the package if not specified with package_key.
1403 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001404 # A/B update is getting created.
1405 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001406 if OPTIONS.package_key is None:
1407 OPTIONS.package_key = OPTIONS.info_dict.get(
1408 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001409 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001410 # Get signing keys
1411 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
Kelvin Zhangeb586ef2021-02-08 20:11:49 -05001412 private_key_path = OPTIONS.package_key + OPTIONS.private_key_suffix
1413 if not os.path.exists(private_key_path):
1414 raise common.ExternalError(
1415 "Private key {} doesn't exist. Make sure you passed the"
1416 " correct key path through -k option".format(
1417 private_key_path)
1418 )
Christian Oderf63e2cd2017-05-01 22:30:15 +02001419
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001420 if OPTIONS.source_info_dict:
1421 source_build_prop = OPTIONS.source_info_dict["build.prop"]
1422 target_build_prop = OPTIONS.target_info_dict["build.prop"]
1423 source_spl = source_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
1424 target_spl = target_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001425 is_spl_downgrade = target_spl < source_spl
1426 if is_spl_downgrade and not OPTIONS.spl_downgrade:
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001427 raise common.ExternalError(
1428 "Target security patch level {} is older than source SPL {} applying "
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001429 "such OTA will likely cause device fail to boot. Pass --spl_downgrade "
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001430 "to override this check. This script expects security patch level to "
1431 "be in format yyyy-mm-dd (e.x. 2021-02-05). It's possible to use "
1432 "separators other than -, so as long as it's used consistenly across "
1433 "all SPL dates".format(target_spl, source_spl))
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001434 elif not is_spl_downgrade and OPTIONS.spl_downgrade:
1435 raise ValueError("--spl_downgrade specified but no actual SPL downgrade"
1436 " detected. Please only pass in this flag if you want a"
1437 " SPL downgrade. Target SPL: {} Source SPL: {}"
1438 .format(target_spl, source_spl))
Yifan Hong65afc072020-04-17 10:08:10 -07001439 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001440 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001441 target_file=args[0],
1442 output_file=args[1],
1443 source_file=OPTIONS.incremental_source)
1444
Dan Willemsencea5cd22017-03-21 14:44:27 -07001445 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001446 GenerateNonAbOtaPackage(
1447 target_file=args[0],
1448 output_file=args[1],
1449 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001450
Tao Baof0c4aa22018-04-30 20:29:30 -07001451 # Post OTA generation works.
1452 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1453 logger.info("Generating diff logs...")
1454 logger.info("Unzipping target-files for diffing...")
1455 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1456 source_dir = common.UnzipTemp(
1457 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001458
Tao Baof0c4aa22018-04-30 20:29:30 -07001459 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001460 target_files_diff.recursiveDiff(
1461 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001462
Tao Bao32fcdab2018-10-12 10:30:39 -07001463 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001464
1465
1466if __name__ == '__main__':
1467 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001468 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001469 main(sys.argv[1:])
Tao Bao32fcdab2018-10-12 10:30:39 -07001470 except common.ExternalError:
1471 logger.exception("\n ERROR:\n")
Doug Zongkereef39442009-04-02 12:14:19 -07001472 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07001473 finally:
1474 common.Cleanup()