blob: d1e76b93075b0e179d5c77c91394d0df8bf1e47d [file] [log] [blame]
Tao Bao481bab82017-12-21 11:23:09 -08001#
2# Copyright (C) 2018 The Android Open Source Project
3#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16
17import copy
Tao Baoc7b403a2018-01-30 18:19:04 -080018import os
Tao Baofabe0832018-01-17 15:52:28 -080019import os.path
Kelvin Zhangfa928692022-08-16 17:01:53 +000020import tempfile
Tao Baoc7b403a2018-01-30 18:19:04 -080021import zipfile
Tao Bao481bab82017-12-21 11:23:09 -080022
23import common
Tianjiea2076132020-08-19 17:25:32 -070024import ota_metadata_pb2
Tao Bao04e1f012018-02-04 12:13:35 -080025import test_utils
Tianjiea2076132020-08-19 17:25:32 -070026from ota_utils import (
27 BuildLegacyOtaMetadata, CalculateRuntimeDevicesAndFingerprints,
Kelvin Zhangfa928692022-08-16 17:01:53 +000028 ConstructOtaApexInfo, FinalizeMetadata, GetPackageMetadata, PropertyFiles, AbOtaPropertyFiles, PayloadGenerator, StreamingPropertyFiles)
Tao Bao481bab82017-12-21 11:23:09 -080029from ota_from_target_files import (
Kelvin Zhangfa928692022-08-16 17:01:53 +000030 _LoadOemDicts,
Hongguang Chen49ab1b902020-10-19 14:15:43 -070031 GetTargetFilesZipForCustomImagesUpdates,
Yifan Hong38ab4d82020-06-18 15:19:56 -070032 GetTargetFilesZipForPartialUpdates,
Tianjiea2076132020-08-19 17:25:32 -070033 GetTargetFilesZipForSecondaryImages,
Kelvin Zhangcff4d762020-07-29 16:37:51 -040034 GetTargetFilesZipWithoutPostinstallConfig,
Kelvin Zhangfa928692022-08-16 17:01:53 +000035 POSTINSTALL_CONFIG, AB_PARTITIONS)
Daniel Normane9af70a2021-04-15 16:39:22 -070036from apex_utils import GetApexInfoFromTargetFiles
Kelvin Zhangcff4d762020-07-29 16:37:51 -040037from test_utils import PropertyFilesTestCase
Kelvin Zhang059bf6e2022-08-12 14:03:41 -070038from common import OPTIONS
39from payload_signer import PayloadSigner
Tao Baofabe0832018-01-17 15:52:28 -080040
Tianjiea2076132020-08-19 17:25:32 -070041
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +000042def construct_target_files(secondary=False, compressedApex=False):
Tao Baof7140c02018-01-30 17:09:24 -080043 """Returns a target-files.zip file for generating OTA packages."""
44 target_files = common.MakeTempFile(prefix='target_files-', suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -040045 with zipfile.ZipFile(target_files, 'w', allowZip64=True) as target_files_zip:
Tao Baof7140c02018-01-30 17:09:24 -080046 # META/update_engine_config.txt
47 target_files_zip.writestr(
48 'META/update_engine_config.txt',
49 "PAYLOAD_MAJOR_VERSION=2\nPAYLOAD_MINOR_VERSION=4\n")
50
Tao Bao15a146a2018-02-21 16:06:59 -080051 # META/postinstall_config.txt
52 target_files_zip.writestr(
53 POSTINSTALL_CONFIG,
54 '\n'.join([
55 "RUN_POSTINSTALL_system=true",
56 "POSTINSTALL_PATH_system=system/bin/otapreopt_script",
57 "FILESYSTEM_TYPE_system=ext4",
58 "POSTINSTALL_OPTIONAL_system=true",
59 ]))
60
Tao Bao5277d102018-04-17 23:47:21 -070061 ab_partitions = [
62 ('IMAGES', 'boot'),
63 ('IMAGES', 'system'),
64 ('IMAGES', 'vendor'),
65 ('RADIO', 'bootloader'),
66 ('RADIO', 'modem'),
67 ]
Tao Baof7140c02018-01-30 17:09:24 -080068 # META/ab_partitions.txt
Tao Baof7140c02018-01-30 17:09:24 -080069 target_files_zip.writestr(
70 'META/ab_partitions.txt',
Tao Bao5277d102018-04-17 23:47:21 -070071 '\n'.join([partition[1] for partition in ab_partitions]))
Tao Baof7140c02018-01-30 17:09:24 -080072
Kelvin Zhangc693d952020-07-22 19:21:22 -040073 # Create fake images for each of them.
Tao Bao5277d102018-04-17 23:47:21 -070074 for path, partition in ab_partitions:
75 target_files_zip.writestr(
76 '{}/{}.img'.format(path, partition),
77 os.urandom(len(partition)))
Tao Baof7140c02018-01-30 17:09:24 -080078
Tao Bao5277d102018-04-17 23:47:21 -070079 # system_other shouldn't appear in META/ab_partitions.txt.
Tao Baof7140c02018-01-30 17:09:24 -080080 if secondary:
81 target_files_zip.writestr('IMAGES/system_other.img',
82 os.urandom(len("system_other")))
83
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +000084 if compressedApex:
85 apex_file_name = 'com.android.apex.compressed.v1.capex'
86 apex_file = os.path.join(test_utils.get_current_dir(), apex_file_name)
87 target_files_zip.write(apex_file, 'SYSTEM/apex/' + apex_file_name)
88
Tao Baof7140c02018-01-30 17:09:24 -080089 return target_files
90
91
Tao Bao65b94e92018-10-11 21:57:26 -070092class LoadOemDictsTest(test_utils.ReleaseToolsTestCase):
Tao Bao481bab82017-12-21 11:23:09 -080093
94 def test_NoneDict(self):
95 self.assertIsNone(_LoadOemDicts(None))
96
97 def test_SingleDict(self):
98 dict_file = common.MakeTempFile()
99 with open(dict_file, 'w') as dict_fp:
100 dict_fp.write('abc=1\ndef=2\nxyz=foo\na.b.c=bar\n')
101
102 oem_dicts = _LoadOemDicts([dict_file])
103 self.assertEqual(1, len(oem_dicts))
104 self.assertEqual('foo', oem_dicts[0]['xyz'])
105 self.assertEqual('bar', oem_dicts[0]['a.b.c'])
106
107 def test_MultipleDicts(self):
108 oem_source = []
109 for i in range(3):
110 dict_file = common.MakeTempFile()
111 with open(dict_file, 'w') as dict_fp:
112 dict_fp.write(
113 'ro.build.index={}\ndef=2\nxyz=foo\na.b.c=bar\n'.format(i))
114 oem_source.append(dict_file)
115
116 oem_dicts = _LoadOemDicts(oem_source)
117 self.assertEqual(3, len(oem_dicts))
118 for i, oem_dict in enumerate(oem_dicts):
119 self.assertEqual('2', oem_dict['def'])
120 self.assertEqual('foo', oem_dict['xyz'])
121 self.assertEqual('bar', oem_dict['a.b.c'])
122 self.assertEqual('{}'.format(i), oem_dict['ro.build.index'])
Tao Baodf3a48b2018-01-10 16:30:43 -0800123
124
Tao Bao65b94e92018-10-11 21:57:26 -0700125class OtaFromTargetFilesTest(test_utils.ReleaseToolsTestCase):
Tao Baodf3a48b2018-01-10 16:30:43 -0800126 TEST_TARGET_INFO_DICT = {
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000127 'build.prop': common.PartitionBuildProps.FromDictionary(
128 'system', {
129 'ro.product.device': 'product-device',
130 'ro.build.fingerprint': 'build-fingerprint-target',
131 'ro.build.version.incremental': 'build-version-incremental-target',
132 'ro.build.version.sdk': '27',
133 'ro.build.version.security_patch': '2017-12-01',
134 'ro.build.date.utc': '1500000000'}
135 )
Tao Baodf3a48b2018-01-10 16:30:43 -0800136 }
137
138 TEST_SOURCE_INFO_DICT = {
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000139 'build.prop': common.PartitionBuildProps.FromDictionary(
140 'system', {
141 'ro.product.device': 'product-device',
142 'ro.build.fingerprint': 'build-fingerprint-source',
143 'ro.build.version.incremental': 'build-version-incremental-source',
144 'ro.build.version.sdk': '25',
145 'ro.build.version.security_patch': '2016-12-01',
146 'ro.build.date.utc': '1400000000'}
147 )
Tao Baodf3a48b2018-01-10 16:30:43 -0800148 }
149
Tao Bao1c320f82019-10-04 23:25:12 -0700150 TEST_INFO_DICT_USES_OEM_PROPS = {
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000151 'build.prop': common.PartitionBuildProps.FromDictionary(
152 'system', {
153 'ro.product.name': 'product-name',
154 'ro.build.thumbprint': 'build-thumbprint',
155 'ro.build.bar': 'build-bar'}
156 ),
157 'vendor.build.prop': common.PartitionBuildProps.FromDictionary(
158 'vendor', {
Tianjie2bb14862020-08-28 16:24:34 -0700159 'ro.vendor.build.fingerprint': 'vendor-build-fingerprint'}
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000160 ),
161 'property1': 'value1',
162 'property2': 4096,
163 'oem_fingerprint_properties': 'ro.product.device ro.product.brand',
Tao Bao1c320f82019-10-04 23:25:12 -0700164 }
165
HÃ¥kan Kvistb7797242023-12-13 15:02:28 +0100166 TEST_TARGET_VENDOR_INFO_DICT = common.PartitionBuildProps.FromDictionary(
167 'vendor', {
168 'ro.vendor.build.date.utc' : '87654321',
169 'ro.product.vendor.device':'vendor-device',
170 'ro.vendor.build.fingerprint': 'build-fingerprint-vendor'}
171 )
172
173 TEST_SOURCE_VENDOR_INFO_DICT = common.PartitionBuildProps.FromDictionary(
174 'vendor', {
175 'ro.vendor.build.date.utc' : '12345678',
176 'ro.product.vendor.device':'vendor-device',
177 'ro.vendor.build.fingerprint': 'build-fingerprint-vendor'}
178 )
179
Tao Baodf3a48b2018-01-10 16:30:43 -0800180 def setUp(self):
Tao Bao3bf8c652018-03-16 12:59:42 -0700181 self.testdata_dir = test_utils.get_testdata_dir()
182 self.assertTrue(os.path.exists(self.testdata_dir))
183
Tao Baodf3a48b2018-01-10 16:30:43 -0800184 # Reset the global options as in ota_from_target_files.py.
185 common.OPTIONS.incremental_source = None
186 common.OPTIONS.downgrade = False
Tao Bao393eeb42019-03-06 16:00:38 -0800187 common.OPTIONS.retrofit_dynamic_partitions = False
Tao Baodf3a48b2018-01-10 16:30:43 -0800188 common.OPTIONS.timestamp = False
189 common.OPTIONS.wipe_user_data = False
Tao Bao3bf8c652018-03-16 12:59:42 -0700190 common.OPTIONS.no_signing = False
191 common.OPTIONS.package_key = os.path.join(self.testdata_dir, 'testkey')
192 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400193 common.OPTIONS.package_key: None,
Tao Bao3bf8c652018-03-16 12:59:42 -0700194 }
195
196 common.OPTIONS.search_path = test_utils.get_search_path()
Tao Baodf3a48b2018-01-10 16:30:43 -0800197
Tianjiea2076132020-08-19 17:25:32 -0700198 @staticmethod
199 def GetLegacyOtaMetadata(target_info, source_info=None):
200 metadata_proto = GetPackageMetadata(target_info, source_info)
201 return BuildLegacyOtaMetadata(metadata_proto)
202
Tao Baodf3a48b2018-01-10 16:30:43 -0800203 def test_GetPackageMetadata_abOta_full(self):
204 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
205 target_info_dict['ab_update'] = 'true'
Kelvin Zhang39aea442020-08-17 11:04:25 -0400206 target_info_dict['ab_partitions'] = []
Tao Bao1c320f82019-10-04 23:25:12 -0700207 target_info = common.BuildInfo(target_info_dict, None)
Tianjiea2076132020-08-19 17:25:32 -0700208 metadata = self.GetLegacyOtaMetadata(target_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800209 self.assertDictEqual(
210 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400211 'ota-type': 'AB',
212 'ota-required-cache': '0',
213 'post-build': 'build-fingerprint-target',
214 'post-build-incremental': 'build-version-incremental-target',
215 'post-sdk-level': '27',
216 'post-security-patch-level': '2017-12-01',
217 'post-timestamp': '1500000000',
218 'pre-device': 'product-device',
Tao Baodf3a48b2018-01-10 16:30:43 -0800219 },
220 metadata)
221
222 def test_GetPackageMetadata_abOta_incremental(self):
223 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
224 target_info_dict['ab_update'] = 'true'
Kelvin Zhang39aea442020-08-17 11:04:25 -0400225 target_info_dict['ab_partitions'] = []
Tao Bao1c320f82019-10-04 23:25:12 -0700226 target_info = common.BuildInfo(target_info_dict, None)
227 source_info = common.BuildInfo(self.TEST_SOURCE_INFO_DICT, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800228 common.OPTIONS.incremental_source = ''
Tianjiea2076132020-08-19 17:25:32 -0700229 metadata = self.GetLegacyOtaMetadata(target_info, source_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800230 self.assertDictEqual(
231 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400232 'ota-type': 'AB',
233 'ota-required-cache': '0',
234 'post-build': 'build-fingerprint-target',
235 'post-build-incremental': 'build-version-incremental-target',
236 'post-sdk-level': '27',
237 'post-security-patch-level': '2017-12-01',
238 'post-timestamp': '1500000000',
239 'pre-device': 'product-device',
240 'pre-build': 'build-fingerprint-source',
241 'pre-build-incremental': 'build-version-incremental-source',
Tao Baodf3a48b2018-01-10 16:30:43 -0800242 },
243 metadata)
244
245 def test_GetPackageMetadata_nonAbOta_full(self):
Tao Bao1c320f82019-10-04 23:25:12 -0700246 target_info = common.BuildInfo(self.TEST_TARGET_INFO_DICT, None)
Tianjiea2076132020-08-19 17:25:32 -0700247 metadata = self.GetLegacyOtaMetadata(target_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800248 self.assertDictEqual(
249 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400250 'ota-type': 'BLOCK',
251 'ota-required-cache': '0',
252 'post-build': 'build-fingerprint-target',
253 'post-build-incremental': 'build-version-incremental-target',
254 'post-sdk-level': '27',
255 'post-security-patch-level': '2017-12-01',
256 'post-timestamp': '1500000000',
257 'pre-device': 'product-device',
Tao Baodf3a48b2018-01-10 16:30:43 -0800258 },
259 metadata)
260
261 def test_GetPackageMetadata_nonAbOta_incremental(self):
Tao Bao1c320f82019-10-04 23:25:12 -0700262 target_info = common.BuildInfo(self.TEST_TARGET_INFO_DICT, None)
263 source_info = common.BuildInfo(self.TEST_SOURCE_INFO_DICT, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800264 common.OPTIONS.incremental_source = ''
Tianjiea2076132020-08-19 17:25:32 -0700265 metadata = self.GetLegacyOtaMetadata(target_info, source_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800266 self.assertDictEqual(
267 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400268 'ota-type': 'BLOCK',
269 'ota-required-cache': '0',
270 'post-build': 'build-fingerprint-target',
271 'post-build-incremental': 'build-version-incremental-target',
272 'post-sdk-level': '27',
273 'post-security-patch-level': '2017-12-01',
274 'post-timestamp': '1500000000',
275 'pre-device': 'product-device',
276 'pre-build': 'build-fingerprint-source',
277 'pre-build-incremental': 'build-version-incremental-source',
Tao Baodf3a48b2018-01-10 16:30:43 -0800278 },
279 metadata)
280
281 def test_GetPackageMetadata_wipe(self):
Tao Bao1c320f82019-10-04 23:25:12 -0700282 target_info = common.BuildInfo(self.TEST_TARGET_INFO_DICT, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800283 common.OPTIONS.wipe_user_data = True
Tianjiea2076132020-08-19 17:25:32 -0700284 metadata = self.GetLegacyOtaMetadata(target_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800285 self.assertDictEqual(
286 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400287 'ota-type': 'BLOCK',
288 'ota-required-cache': '0',
289 'ota-wipe': 'yes',
290 'post-build': 'build-fingerprint-target',
291 'post-build-incremental': 'build-version-incremental-target',
292 'post-sdk-level': '27',
293 'post-security-patch-level': '2017-12-01',
294 'post-timestamp': '1500000000',
295 'pre-device': 'product-device',
Tao Baodf3a48b2018-01-10 16:30:43 -0800296 },
297 metadata)
298
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +0000299 @test_utils.SkipIfExternalToolsUnavailable()
Daniel Normane9af70a2021-04-15 16:39:22 -0700300 def test_GetApexInfoFromTargetFiles(self):
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +0000301 target_files = construct_target_files(compressedApex=True)
Daniel Normane9af70a2021-04-15 16:39:22 -0700302 apex_infos = GetApexInfoFromTargetFiles(target_files, 'system')
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +0000303 self.assertEqual(len(apex_infos), 1)
304 self.assertEqual(apex_infos[0].package_name, "com.android.apex.compressed")
305 self.assertEqual(apex_infos[0].version, 1)
306 self.assertEqual(apex_infos[0].is_compressed, True)
307 # Compare the decompressed APEX size with the original uncompressed APEX
308 original_apex_name = 'com.android.apex.compressed.v1_original.apex'
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500309 original_apex_filepath = os.path.join(
310 test_utils.get_current_dir(), original_apex_name)
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +0000311 uncompressed_apex_size = os.path.getsize(original_apex_filepath)
312 self.assertEqual(apex_infos[0].decompressed_size, uncompressed_apex_size)
313
Tianjiea5fca032021-06-01 22:06:28 -0700314 @staticmethod
315 def construct_tf_with_apex_info(infos):
316 apex_metadata_proto = ota_metadata_pb2.ApexMetadata()
317 apex_metadata_proto.apex_info.extend(infos)
318
319 output = common.MakeTempFile(suffix='.zip')
320 with zipfile.ZipFile(output, 'w') as zfp:
321 common.ZipWriteStr(zfp, "META/apex_info.pb",
322 apex_metadata_proto.SerializeToString())
323 return output
324
325 def test_ConstructOtaApexInfo_incremental_package(self):
326 infos = [ota_metadata_pb2.ApexInfo(package_name='com.android.apex.1',
327 version=1000, is_compressed=False),
328 ota_metadata_pb2.ApexInfo(package_name='com.android.apex.2',
329 version=2000, is_compressed=True)]
330 target_file = self.construct_tf_with_apex_info(infos)
331
332 with zipfile.ZipFile(target_file) as target_zip:
333 info_bytes = ConstructOtaApexInfo(target_zip, source_file=target_file)
334 apex_metadata_proto = ota_metadata_pb2.ApexMetadata()
335 apex_metadata_proto.ParseFromString(info_bytes)
336
337 info_list = apex_metadata_proto.apex_info
338 self.assertEqual(2, len(info_list))
339 self.assertEqual('com.android.apex.1', info_list[0].package_name)
340 self.assertEqual(1000, info_list[0].version)
341 self.assertEqual(1000, info_list[0].source_version)
342
Tao Bao393eeb42019-03-06 16:00:38 -0800343 def test_GetPackageMetadata_retrofitDynamicPartitions(self):
Tao Bao1c320f82019-10-04 23:25:12 -0700344 target_info = common.BuildInfo(self.TEST_TARGET_INFO_DICT, None)
Tao Bao393eeb42019-03-06 16:00:38 -0800345 common.OPTIONS.retrofit_dynamic_partitions = True
Tianjiea2076132020-08-19 17:25:32 -0700346 metadata = self.GetLegacyOtaMetadata(target_info)
Tao Bao393eeb42019-03-06 16:00:38 -0800347 self.assertDictEqual(
348 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400349 'ota-retrofit-dynamic-partitions': 'yes',
350 'ota-type': 'BLOCK',
351 'ota-required-cache': '0',
352 'post-build': 'build-fingerprint-target',
353 'post-build-incremental': 'build-version-incremental-target',
354 'post-sdk-level': '27',
355 'post-security-patch-level': '2017-12-01',
356 'post-timestamp': '1500000000',
357 'pre-device': 'product-device',
Tao Bao393eeb42019-03-06 16:00:38 -0800358 },
359 metadata)
360
Tao Baodf3a48b2018-01-10 16:30:43 -0800361 @staticmethod
362 def _test_GetPackageMetadata_swapBuildTimestamps(target_info, source_info):
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000363 (target_info['build.prop'].build_props['ro.build.date.utc'],
364 source_info['build.prop'].build_props['ro.build.date.utc']) = (
365 source_info['build.prop'].build_props['ro.build.date.utc'],
366 target_info['build.prop'].build_props['ro.build.date.utc'])
Tao Baodf3a48b2018-01-10 16:30:43 -0800367
HÃ¥kan Kvistb7797242023-12-13 15:02:28 +0100368 @staticmethod
369 def _test_GetPackageMetadata_swapVendorBuildTimestamps(target_info, source_info):
370 (target_info['vendor.build.prop'].build_props['ro.vendor.build.date.utc'],
371 source_info['vendor.build.prop'].build_props['ro.vendor.build.date.utc']) = (
372 source_info['vendor.build.prop'].build_props['ro.vendor.build.date.utc'],
373 target_info['vendor.build.prop'].build_props['ro.vendor.build.date.utc'])
374
Tao Baodf3a48b2018-01-10 16:30:43 -0800375 def test_GetPackageMetadata_unintentionalDowngradeDetected(self):
376 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
377 source_info_dict = copy.deepcopy(self.TEST_SOURCE_INFO_DICT)
378 self._test_GetPackageMetadata_swapBuildTimestamps(
379 target_info_dict, source_info_dict)
380
Tao Bao1c320f82019-10-04 23:25:12 -0700381 target_info = common.BuildInfo(target_info_dict, None)
382 source_info = common.BuildInfo(source_info_dict, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800383 common.OPTIONS.incremental_source = ''
Tianjiea2076132020-08-19 17:25:32 -0700384 self.assertRaises(RuntimeError, self.GetLegacyOtaMetadata, target_info,
Tao Baodf3a48b2018-01-10 16:30:43 -0800385 source_info)
386
HÃ¥kan Kvistb7797242023-12-13 15:02:28 +0100387 def test_GetPackageMetadata_unintentionalVendorDowngradeDetected(self):
388 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
389 target_info_dict['ab_update'] = 'true'
390 target_info_dict['ab_partitions'] = ['vendor']
391 target_info_dict["vendor.build.prop"] = copy.deepcopy(self.TEST_TARGET_VENDOR_INFO_DICT)
392 source_info_dict = copy.deepcopy(self.TEST_SOURCE_INFO_DICT)
393 source_info_dict['ab_update'] = 'true'
394 source_info_dict['ab_partitions'] = ['vendor']
395 source_info_dict["vendor.build.prop"] = copy.deepcopy(self.TEST_SOURCE_VENDOR_INFO_DICT)
396 self._test_GetPackageMetadata_swapVendorBuildTimestamps(
397 target_info_dict, source_info_dict)
398
399 target_info = common.BuildInfo(target_info_dict, None)
400 source_info = common.BuildInfo(source_info_dict, None)
401 common.OPTIONS.incremental_source = ''
402 self.assertRaises(RuntimeError, self.GetLegacyOtaMetadata, target_info,
403 source_info)
404
Tao Baodf3a48b2018-01-10 16:30:43 -0800405 def test_GetPackageMetadata_downgrade(self):
406 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
407 source_info_dict = copy.deepcopy(self.TEST_SOURCE_INFO_DICT)
408 self._test_GetPackageMetadata_swapBuildTimestamps(
409 target_info_dict, source_info_dict)
410
Tao Bao1c320f82019-10-04 23:25:12 -0700411 target_info = common.BuildInfo(target_info_dict, None)
412 source_info = common.BuildInfo(source_info_dict, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800413 common.OPTIONS.incremental_source = ''
414 common.OPTIONS.downgrade = True
415 common.OPTIONS.wipe_user_data = True
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500416 common.OPTIONS.spl_downgrade = True
Tianjiea2076132020-08-19 17:25:32 -0700417 metadata = self.GetLegacyOtaMetadata(target_info, source_info)
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500418 # Reset spl_downgrade so other tests are unaffected
419 common.OPTIONS.spl_downgrade = False
Tianjiea2076132020-08-19 17:25:32 -0700420
Tao Baodf3a48b2018-01-10 16:30:43 -0800421 self.assertDictEqual(
422 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400423 'ota-downgrade': 'yes',
424 'ota-type': 'BLOCK',
425 'ota-required-cache': '0',
426 'ota-wipe': 'yes',
427 'post-build': 'build-fingerprint-target',
428 'post-build-incremental': 'build-version-incremental-target',
429 'post-sdk-level': '27',
430 'post-security-patch-level': '2017-12-01',
431 'post-timestamp': '1400000000',
432 'pre-device': 'product-device',
433 'pre-build': 'build-fingerprint-source',
434 'pre-build-incremental': 'build-version-incremental-source',
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500435 'spl-downgrade': 'yes',
Tao Baodf3a48b2018-01-10 16:30:43 -0800436 },
437 metadata)
Tao Baofabe0832018-01-17 15:52:28 -0800438
HÃ¥kan Kvistb7797242023-12-13 15:02:28 +0100439 def test_GetPackageMetadata_vendorDowngrade(self):
440 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
441 target_info_dict['ab_update'] = 'true'
442 target_info_dict['ab_partitions'] = ['vendor']
443 target_info_dict["vendor.build.prop"] = copy.deepcopy(self.TEST_TARGET_VENDOR_INFO_DICT)
444 source_info_dict = copy.deepcopy(self.TEST_SOURCE_INFO_DICT)
445 source_info_dict['ab_update'] = 'true'
446 source_info_dict['ab_partitions'] = ['vendor']
447 source_info_dict["vendor.build.prop"] = copy.deepcopy(self.TEST_SOURCE_VENDOR_INFO_DICT)
448 self._test_GetPackageMetadata_swapVendorBuildTimestamps(
449 target_info_dict, source_info_dict)
450
451 target_info = common.BuildInfo(target_info_dict, None)
452 source_info = common.BuildInfo(source_info_dict, None)
453 common.OPTIONS.incremental_source = ''
454 common.OPTIONS.downgrade = True
455 common.OPTIONS.wipe_user_data = True
456 common.OPTIONS.spl_downgrade = True
457 metadata = self.GetLegacyOtaMetadata(target_info, source_info)
458 # Reset spl_downgrade so other tests are unaffected
459 common.OPTIONS.spl_downgrade = False
460
461 self.assertDictEqual(
462 {
463 'ota-downgrade': 'yes',
464 'ota-type': 'AB',
465 'ota-required-cache': '0',
466 'ota-wipe': 'yes',
467 'post-build': 'build-fingerprint-target',
468 'post-build-incremental': 'build-version-incremental-target',
469 'post-sdk-level': '27',
470 'post-security-patch-level': '2017-12-01',
471 'post-timestamp': '1500000000',
472 'pre-device': 'product-device',
473 'pre-build': 'build-fingerprint-source',
474 'pre-build-incremental': 'build-version-incremental-source',
475 'spl-downgrade': 'yes',
476 },
477 metadata)
478
479 post_build = GetPackageMetadata(target_info, source_info).postcondition
480 self.assertEqual('vendor', post_build.partition_state[0].partition_name)
481 self.assertEqual('12345678', post_build.partition_state[0].version)
482
483 pre_build = GetPackageMetadata(target_info, source_info).precondition
484 self.assertEqual('vendor', pre_build.partition_state[0].partition_name)
485 self.assertEqual('87654321', pre_build.partition_state[0].version)
486
487
Tao Bao82490d32019-04-09 00:12:30 -0700488 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baof7140c02018-01-30 17:09:24 -0800489 def test_GetTargetFilesZipForSecondaryImages(self):
490 input_file = construct_target_files(secondary=True)
491 target_file = GetTargetFilesZipForSecondaryImages(input_file)
492
493 with zipfile.ZipFile(target_file) as verify_zip:
494 namelist = verify_zip.namelist()
Tao Bao615b65d2019-10-06 22:59:45 -0700495 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
Tao Baof7140c02018-01-30 17:09:24 -0800496
497 self.assertIn('META/ab_partitions.txt', namelist)
Tao Baof7140c02018-01-30 17:09:24 -0800498 self.assertIn('IMAGES/system.img', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700499 self.assertIn('RADIO/bootloader.img', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800500 self.assertIn(POSTINSTALL_CONFIG, namelist)
Tao Baof7140c02018-01-30 17:09:24 -0800501
Tao Bao3e759462019-09-17 22:43:11 -0700502 self.assertNotIn('IMAGES/boot.img', namelist)
Tao Baof7140c02018-01-30 17:09:24 -0800503 self.assertNotIn('IMAGES/system_other.img', namelist)
504 self.assertNotIn('IMAGES/system.map', namelist)
Tao Bao3e759462019-09-17 22:43:11 -0700505 self.assertNotIn('RADIO/modem.img', namelist)
Tao Baof7140c02018-01-30 17:09:24 -0800506
Tao Bao3e759462019-09-17 22:43:11 -0700507 expected_ab_partitions = ['system', 'bootloader']
Tianjie Xu1c808002019-09-11 00:29:26 -0700508 self.assertEqual('\n'.join(expected_ab_partitions), ab_partitions)
509
Tao Bao82490d32019-04-09 00:12:30 -0700510 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao15a146a2018-02-21 16:06:59 -0800511 def test_GetTargetFilesZipForSecondaryImages_skipPostinstall(self):
512 input_file = construct_target_files(secondary=True)
513 target_file = GetTargetFilesZipForSecondaryImages(
514 input_file, skip_postinstall=True)
515
516 with zipfile.ZipFile(target_file) as verify_zip:
517 namelist = verify_zip.namelist()
518
519 self.assertIn('META/ab_partitions.txt', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800520 self.assertIn('IMAGES/system.img', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700521 self.assertIn('RADIO/bootloader.img', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800522
Tao Bao3e759462019-09-17 22:43:11 -0700523 self.assertNotIn('IMAGES/boot.img', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800524 self.assertNotIn('IMAGES/system_other.img', namelist)
525 self.assertNotIn('IMAGES/system.map', namelist)
Tao Bao3e759462019-09-17 22:43:11 -0700526 self.assertNotIn('RADIO/modem.img', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800527 self.assertNotIn(POSTINSTALL_CONFIG, namelist)
528
Tao Bao82490d32019-04-09 00:12:30 -0700529 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao12489802018-07-12 14:47:38 -0700530 def test_GetTargetFilesZipForSecondaryImages_withoutRadioImages(self):
531 input_file = construct_target_files(secondary=True)
532 common.ZipDelete(input_file, 'RADIO/bootloader.img')
533 common.ZipDelete(input_file, 'RADIO/modem.img')
534 target_file = GetTargetFilesZipForSecondaryImages(input_file)
535
536 with zipfile.ZipFile(target_file) as verify_zip:
537 namelist = verify_zip.namelist()
538
539 self.assertIn('META/ab_partitions.txt', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700540 self.assertIn('IMAGES/system.img', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700541 self.assertIn(POSTINSTALL_CONFIG, namelist)
542
Tao Bao3e759462019-09-17 22:43:11 -0700543 self.assertNotIn('IMAGES/boot.img', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700544 self.assertNotIn('IMAGES/system_other.img', namelist)
545 self.assertNotIn('IMAGES/system.map', namelist)
546 self.assertNotIn('RADIO/bootloader.img', namelist)
547 self.assertNotIn('RADIO/modem.img', namelist)
548
Tao Bao82490d32019-04-09 00:12:30 -0700549 @test_utils.SkipIfExternalToolsUnavailable()
Tianjie Xu1c808002019-09-11 00:29:26 -0700550 def test_GetTargetFilesZipForSecondaryImages_dynamicPartitions(self):
551 input_file = construct_target_files(secondary=True)
552 misc_info = '\n'.join([
553 'use_dynamic_partition_size=true',
554 'use_dynamic_partitions=true',
555 'dynamic_partition_list=system vendor product',
556 'super_partition_groups=google_dynamic_partitions',
557 'super_google_dynamic_partitions_group_size=4873781248',
558 'super_google_dynamic_partitions_partition_list=system vendor product',
559 ])
560 dynamic_partitions_info = '\n'.join([
561 'super_partition_groups=google_dynamic_partitions',
562 'super_google_dynamic_partitions_group_size=4873781248',
563 'super_google_dynamic_partitions_partition_list=system vendor product',
564 ])
565
Kelvin Zhang928c2342020-09-22 16:15:57 -0400566 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
Tianjie Xu1c808002019-09-11 00:29:26 -0700567 common.ZipWriteStr(append_zip, 'META/misc_info.txt', misc_info)
568 common.ZipWriteStr(append_zip, 'META/dynamic_partitions_info.txt',
569 dynamic_partitions_info)
570
571 target_file = GetTargetFilesZipForSecondaryImages(input_file)
572
573 with zipfile.ZipFile(target_file) as verify_zip:
574 namelist = verify_zip.namelist()
Tao Bao615b65d2019-10-06 22:59:45 -0700575 updated_misc_info = verify_zip.read('META/misc_info.txt').decode()
Tianjie Xu1c808002019-09-11 00:29:26 -0700576 updated_dynamic_partitions_info = verify_zip.read(
Tao Bao615b65d2019-10-06 22:59:45 -0700577 'META/dynamic_partitions_info.txt').decode()
Tianjie Xu1c808002019-09-11 00:29:26 -0700578
579 self.assertIn('META/ab_partitions.txt', namelist)
Tianjie Xu1c808002019-09-11 00:29:26 -0700580 self.assertIn('IMAGES/system.img', namelist)
581 self.assertIn(POSTINSTALL_CONFIG, namelist)
582 self.assertIn('META/misc_info.txt', namelist)
583 self.assertIn('META/dynamic_partitions_info.txt', namelist)
584
Tao Bao3e759462019-09-17 22:43:11 -0700585 self.assertNotIn('IMAGES/boot.img', namelist)
Tianjie Xu1c808002019-09-11 00:29:26 -0700586 self.assertNotIn('IMAGES/system_other.img', namelist)
587 self.assertNotIn('IMAGES/system.map', namelist)
588
589 # Check the vendor & product are removed from the partitions list.
590 expected_misc_info = misc_info.replace('system vendor product',
591 'system')
592 expected_dynamic_partitions_info = dynamic_partitions_info.replace(
593 'system vendor product', 'system')
594 self.assertEqual(expected_misc_info, updated_misc_info)
595 self.assertEqual(expected_dynamic_partitions_info,
596 updated_dynamic_partitions_info)
597
598 @test_utils.SkipIfExternalToolsUnavailable()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700599 def test_GetTargetFilesZipForPartialUpdates_singlePartition(self):
600 input_file = construct_target_files()
601 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
602 common.ZipWriteStr(append_zip, 'IMAGES/system.map', 'fake map')
603
604 target_file = GetTargetFilesZipForPartialUpdates(input_file, ['system'])
605 with zipfile.ZipFile(target_file) as verify_zip:
606 namelist = verify_zip.namelist()
607 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
608
609 self.assertIn('META/ab_partitions.txt', namelist)
610 self.assertIn('META/update_engine_config.txt', namelist)
611 self.assertIn('IMAGES/system.img', namelist)
612 self.assertIn('IMAGES/system.map', namelist)
613
614 self.assertNotIn('IMAGES/boot.img', namelist)
615 self.assertNotIn('IMAGES/system_other.img', namelist)
616 self.assertNotIn('RADIO/bootloader.img', namelist)
617 self.assertNotIn('RADIO/modem.img', namelist)
618
619 self.assertEqual('system', ab_partitions)
620
621 @test_utils.SkipIfExternalToolsUnavailable()
622 def test_GetTargetFilesZipForPartialUpdates_unrecognizedPartition(self):
623 input_file = construct_target_files()
624 self.assertRaises(ValueError, GetTargetFilesZipForPartialUpdates,
625 input_file, ['product'])
626
627 @test_utils.SkipIfExternalToolsUnavailable()
628 def test_GetTargetFilesZipForPartialUpdates_dynamicPartitions(self):
629 input_file = construct_target_files(secondary=True)
630 misc_info = '\n'.join([
631 'use_dynamic_partition_size=true',
632 'use_dynamic_partitions=true',
633 'dynamic_partition_list=system vendor product',
634 'super_partition_groups=google_dynamic_partitions',
635 'super_google_dynamic_partitions_group_size=4873781248',
636 'super_google_dynamic_partitions_partition_list=system vendor product',
637 ])
638 dynamic_partitions_info = '\n'.join([
639 'super_partition_groups=google_dynamic_partitions',
640 'super_google_dynamic_partitions_group_size=4873781248',
641 'super_google_dynamic_partitions_partition_list=system vendor product',
642 ])
643
644 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
645 common.ZipWriteStr(append_zip, 'META/misc_info.txt', misc_info)
646 common.ZipWriteStr(append_zip, 'META/dynamic_partitions_info.txt',
647 dynamic_partitions_info)
648
649 target_file = GetTargetFilesZipForPartialUpdates(input_file,
650 ['boot', 'system'])
651 with zipfile.ZipFile(target_file) as verify_zip:
652 namelist = verify_zip.namelist()
653 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
654 updated_misc_info = verify_zip.read('META/misc_info.txt').decode()
655 updated_dynamic_partitions_info = verify_zip.read(
656 'META/dynamic_partitions_info.txt').decode()
657
658 self.assertIn('META/ab_partitions.txt', namelist)
659 self.assertIn('IMAGES/boot.img', namelist)
660 self.assertIn('IMAGES/system.img', namelist)
661 self.assertIn('META/misc_info.txt', namelist)
662 self.assertIn('META/dynamic_partitions_info.txt', namelist)
663
664 self.assertNotIn('IMAGES/system_other.img', namelist)
665 self.assertNotIn('RADIO/bootloader.img', namelist)
666 self.assertNotIn('RADIO/modem.img', namelist)
667
668 # Check the vendor & product are removed from the partitions list.
669 expected_misc_info = misc_info.replace('system vendor product',
670 'system')
671 expected_dynamic_partitions_info = dynamic_partitions_info.replace(
672 'system vendor product', 'system')
673 self.assertEqual(expected_misc_info, updated_misc_info)
674 self.assertEqual(expected_dynamic_partitions_info,
675 updated_dynamic_partitions_info)
676 self.assertEqual('boot\nsystem', ab_partitions)
677
678 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao15a146a2018-02-21 16:06:59 -0800679 def test_GetTargetFilesZipWithoutPostinstallConfig(self):
680 input_file = construct_target_files()
681 target_file = GetTargetFilesZipWithoutPostinstallConfig(input_file)
682 with zipfile.ZipFile(target_file) as verify_zip:
683 self.assertNotIn(POSTINSTALL_CONFIG, verify_zip.namelist())
684
Tao Bao82490d32019-04-09 00:12:30 -0700685 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao15a146a2018-02-21 16:06:59 -0800686 def test_GetTargetFilesZipWithoutPostinstallConfig_missingEntry(self):
687 input_file = construct_target_files()
688 common.ZipDelete(input_file, POSTINSTALL_CONFIG)
689 target_file = GetTargetFilesZipWithoutPostinstallConfig(input_file)
690 with zipfile.ZipFile(target_file) as verify_zip:
691 self.assertNotIn(POSTINSTALL_CONFIG, verify_zip.namelist())
692
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700693 @test_utils.SkipIfExternalToolsUnavailable()
694 def test_GetTargetFilesZipForCustomImagesUpdates_oemDefaultImage(self):
695 input_file = construct_target_files()
696 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
697 common.ZipWriteStr(append_zip, 'IMAGES/oem.img', 'oem')
698 common.ZipWriteStr(append_zip, 'IMAGES/oem_test.img', 'oem_test')
699
700 target_file = GetTargetFilesZipForCustomImagesUpdates(
701 input_file, {'oem': 'oem.img'})
702
703 with zipfile.ZipFile(target_file) as verify_zip:
704 namelist = verify_zip.namelist()
705 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
706 oem_image = verify_zip.read('IMAGES/oem.img').decode()
707
708 self.assertIn('META/ab_partitions.txt', namelist)
709 self.assertEqual('boot\nsystem\nvendor\nbootloader\nmodem', ab_partitions)
710 self.assertIn('IMAGES/oem.img', namelist)
711 self.assertEqual('oem', oem_image)
712
713 @test_utils.SkipIfExternalToolsUnavailable()
714 def test_GetTargetFilesZipForCustomImagesUpdates_oemTestImage(self):
715 input_file = construct_target_files()
716 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
717 common.ZipWriteStr(append_zip, 'IMAGES/oem.img', 'oem')
718 common.ZipWriteStr(append_zip, 'IMAGES/oem_test.img', 'oem_test')
719
720 target_file = GetTargetFilesZipForCustomImagesUpdates(
721 input_file, {'oem': 'oem_test.img'})
722
723 with zipfile.ZipFile(target_file) as verify_zip:
724 namelist = verify_zip.namelist()
725 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
726 oem_image = verify_zip.read('IMAGES/oem.img').decode()
727
728 self.assertIn('META/ab_partitions.txt', namelist)
729 self.assertEqual('boot\nsystem\nvendor\nbootloader\nmodem', ab_partitions)
730 self.assertIn('IMAGES/oem.img', namelist)
731 self.assertEqual('oem_test', oem_image)
732
Tao Bao3bf8c652018-03-16 12:59:42 -0700733 def _test_FinalizeMetadata(self, large_entry=False):
734 entries = [
735 'required-entry1',
736 'required-entry2',
737 ]
738 zip_file = PropertyFilesTest.construct_zip_package(entries)
739 # Add a large entry of 1 GiB if requested.
740 if large_entry:
Kelvin Zhang928c2342020-09-22 16:15:57 -0400741 with zipfile.ZipFile(zip_file, 'a', allowZip64=True) as zip_fp:
Tao Bao3bf8c652018-03-16 12:59:42 -0700742 zip_fp.writestr(
743 # Using 'zoo' so that the entry stays behind others after signing.
744 'zoo',
745 'A' * 1024 * 1024 * 1024,
746 zipfile.ZIP_STORED)
747
Tianjiea2076132020-08-19 17:25:32 -0700748 metadata = ota_metadata_pb2.OtaMetadata()
Tao Bao3bf8c652018-03-16 12:59:42 -0700749 output_file = common.MakeTempFile(suffix='.zip')
750 needed_property_files = (
751 TestPropertyFiles(),
752 )
753 FinalizeMetadata(metadata, zip_file, output_file, needed_property_files)
Tianjiea2076132020-08-19 17:25:32 -0700754 self.assertIn('ota-test-property-files', metadata.property_files)
Tao Bao3bf8c652018-03-16 12:59:42 -0700755
Tao Bao82490d32019-04-09 00:12:30 -0700756 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700757 def test_FinalizeMetadata(self):
758 self._test_FinalizeMetadata()
759
Tao Bao82490d32019-04-09 00:12:30 -0700760 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700761 def test_FinalizeMetadata_withNoSigning(self):
762 common.OPTIONS.no_signing = True
763 self._test_FinalizeMetadata()
764
Tao Bao82490d32019-04-09 00:12:30 -0700765 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700766 def test_FinalizeMetadata_largeEntry(self):
767 self._test_FinalizeMetadata(large_entry=True)
768
Tao Bao82490d32019-04-09 00:12:30 -0700769 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700770 def test_FinalizeMetadata_largeEntry_withNoSigning(self):
771 common.OPTIONS.no_signing = True
772 self._test_FinalizeMetadata(large_entry=True)
773
Tao Bao82490d32019-04-09 00:12:30 -0700774 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700775 def test_FinalizeMetadata_insufficientSpace(self):
776 entries = [
777 'required-entry1',
778 'required-entry2',
779 'optional-entry1',
780 'optional-entry2',
781 ]
782 zip_file = PropertyFilesTest.construct_zip_package(entries)
Kelvin Zhang928c2342020-09-22 16:15:57 -0400783 with zipfile.ZipFile(zip_file, 'a', allowZip64=True) as zip_fp:
Tao Bao3bf8c652018-03-16 12:59:42 -0700784 zip_fp.writestr(
785 # 'foo-entry1' will appear ahead of all other entries (in alphabetical
786 # order) after the signing, which will in turn trigger the
787 # InsufficientSpaceException and an automatic retry.
788 'foo-entry1',
789 'A' * 1024 * 1024,
790 zipfile.ZIP_STORED)
791
Tianjiea2076132020-08-19 17:25:32 -0700792 metadata = ota_metadata_pb2.OtaMetadata()
Tao Bao3bf8c652018-03-16 12:59:42 -0700793 needed_property_files = (
794 TestPropertyFiles(),
795 )
796 output_file = common.MakeTempFile(suffix='.zip')
797 FinalizeMetadata(metadata, zip_file, output_file, needed_property_files)
Tianjiea2076132020-08-19 17:25:32 -0700798 self.assertIn('ota-test-property-files', metadata.property_files)
Tao Bao3bf8c652018-03-16 12:59:42 -0700799
Tao Baoae5e4c32018-03-01 19:30:00 -0800800
Tao Bao69203522018-03-08 16:09:01 -0800801class TestPropertyFiles(PropertyFiles):
802 """A class that extends PropertyFiles for testing purpose."""
803
804 def __init__(self):
805 super(TestPropertyFiles, self).__init__()
806 self.name = 'ota-test-property-files'
807 self.required = (
808 'required-entry1',
809 'required-entry2',
810 )
811 self.optional = (
812 'optional-entry1',
813 'optional-entry2',
814 )
815
816
Tianjiea2076132020-08-19 17:25:32 -0700817class PropertyFilesTest(PropertyFilesTestCase):
Tao Baof5110492018-03-02 09:47:43 -0800818
Tao Bao82490d32019-04-09 00:12:30 -0700819 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoae5e4c32018-03-01 19:30:00 -0800820 def test_Compute(self):
Tao Baof5110492018-03-02 09:47:43 -0800821 entries = (
Tao Bao69203522018-03-08 16:09:01 -0800822 'required-entry1',
823 'required-entry2',
Tao Baof5110492018-03-02 09:47:43 -0800824 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700825 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800826 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400827 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800828 property_files_string = property_files.Compute(zip_fp)
Tao Baof5110492018-03-02 09:47:43 -0800829
Tao Bao69203522018-03-08 16:09:01 -0800830 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -0700831 self.assertEqual(4, len(tokens))
Tao Baof5110492018-03-02 09:47:43 -0800832 self._verify_entries(zip_file, tokens, entries)
833
Tao Bao69203522018-03-08 16:09:01 -0800834 def test_Compute_withOptionalEntries(self):
Tao Baof5110492018-03-02 09:47:43 -0800835 entries = (
Tao Bao69203522018-03-08 16:09:01 -0800836 'required-entry1',
837 'required-entry2',
838 'optional-entry1',
839 'optional-entry2',
Tao Baof5110492018-03-02 09:47:43 -0800840 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700841 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800842 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400843 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800844 property_files_string = property_files.Compute(zip_fp)
Tao Baof5110492018-03-02 09:47:43 -0800845
Tao Bao69203522018-03-08 16:09:01 -0800846 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -0700847 self.assertEqual(6, len(tokens))
Tao Baof5110492018-03-02 09:47:43 -0800848 self._verify_entries(zip_file, tokens, entries)
849
Tao Bao69203522018-03-08 16:09:01 -0800850 def test_Compute_missingRequiredEntry(self):
851 entries = (
852 'required-entry2',
853 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700854 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800855 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400856 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800857 self.assertRaises(KeyError, property_files.Compute, zip_fp)
858
Tao Bao82490d32019-04-09 00:12:30 -0700859 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoae5e4c32018-03-01 19:30:00 -0800860 def test_Finalize(self):
Tao Baof5110492018-03-02 09:47:43 -0800861 entries = [
Tao Bao69203522018-03-08 16:09:01 -0800862 'required-entry1',
863 'required-entry2',
Tao Baof5110492018-03-02 09:47:43 -0800864 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700865 'META-INF/com/android/metadata.pb',
Tao Baof5110492018-03-02 09:47:43 -0800866 ]
Tao Bao3bf8c652018-03-16 12:59:42 -0700867 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800868 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400869 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700870 raw_metadata = property_files.GetPropertyFilesString(
Tao Baoae5e4c32018-03-01 19:30:00 -0800871 zip_fp, reserve_space=False)
872 streaming_metadata = property_files.Finalize(zip_fp, len(raw_metadata))
Tao Bao69203522018-03-08 16:09:01 -0800873 tokens = self._parse_property_files_string(streaming_metadata)
Tao Baof5110492018-03-02 09:47:43 -0800874
Tianjiea2076132020-08-19 17:25:32 -0700875 self.assertEqual(4, len(tokens))
Tao Baof5110492018-03-02 09:47:43 -0800876 # 'META-INF/com/android/metadata' will be key'd as 'metadata' in the
877 # streaming metadata.
878 entries[2] = 'metadata'
Tianjiea2076132020-08-19 17:25:32 -0700879 entries[3] = 'metadata.pb'
Tao Baof5110492018-03-02 09:47:43 -0800880 self._verify_entries(zip_file, tokens, entries)
881
Tao Bao82490d32019-04-09 00:12:30 -0700882 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoae5e4c32018-03-01 19:30:00 -0800883 def test_Finalize_assertReservedLength(self):
Tao Baof5110492018-03-02 09:47:43 -0800884 entries = (
Tao Bao69203522018-03-08 16:09:01 -0800885 'required-entry1',
886 'required-entry2',
887 'optional-entry1',
888 'optional-entry2',
Tao Baof5110492018-03-02 09:47:43 -0800889 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700890 'META-INF/com/android/metadata.pb',
Tao Baof5110492018-03-02 09:47:43 -0800891 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700892 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800893 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400894 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Baof5110492018-03-02 09:47:43 -0800895 # First get the raw metadata string (i.e. without padding space).
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700896 raw_metadata = property_files.GetPropertyFilesString(
Tao Baoae5e4c32018-03-01 19:30:00 -0800897 zip_fp, reserve_space=False)
Tao Baof5110492018-03-02 09:47:43 -0800898 raw_length = len(raw_metadata)
899
900 # Now pass in the exact expected length.
Tao Baoae5e4c32018-03-01 19:30:00 -0800901 streaming_metadata = property_files.Finalize(zip_fp, raw_length)
Tao Baof5110492018-03-02 09:47:43 -0800902 self.assertEqual(raw_length, len(streaming_metadata))
903
904 # Or pass in insufficient length.
905 self.assertRaises(
Tao Bao3bf8c652018-03-16 12:59:42 -0700906 PropertyFiles.InsufficientSpaceException,
Tao Baoae5e4c32018-03-01 19:30:00 -0800907 property_files.Finalize,
Tao Baof5110492018-03-02 09:47:43 -0800908 zip_fp,
Tao Baoae5e4c32018-03-01 19:30:00 -0800909 raw_length - 1)
Tao Baof5110492018-03-02 09:47:43 -0800910
911 # Or pass in a much larger size.
Tao Baoae5e4c32018-03-01 19:30:00 -0800912 streaming_metadata = property_files.Finalize(
Tao Baof5110492018-03-02 09:47:43 -0800913 zip_fp,
Tao Baoae5e4c32018-03-01 19:30:00 -0800914 raw_length + 20)
Tao Baof5110492018-03-02 09:47:43 -0800915 self.assertEqual(raw_length + 20, len(streaming_metadata))
916 self.assertEqual(' ' * 20, streaming_metadata[raw_length:])
917
Tao Baoae5e4c32018-03-01 19:30:00 -0800918 def test_Verify(self):
919 entries = (
Tao Bao69203522018-03-08 16:09:01 -0800920 'required-entry1',
921 'required-entry2',
922 'optional-entry1',
923 'optional-entry2',
924 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700925 'META-INF/com/android/metadata.pb',
Tao Bao69203522018-03-08 16:09:01 -0800926 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700927 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800928 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400929 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800930 # First get the raw metadata string (i.e. without padding space).
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700931 raw_metadata = property_files.GetPropertyFilesString(
Tao Bao69203522018-03-08 16:09:01 -0800932 zip_fp, reserve_space=False)
933
934 # Should pass the test if verification passes.
935 property_files.Verify(zip_fp, raw_metadata)
936
937 # Or raise on verification failure.
938 self.assertRaises(
939 AssertionError, property_files.Verify, zip_fp, raw_metadata + 'x')
940
941
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400942class StreamingPropertyFilesTest(PropertyFilesTestCase):
Kelvin Zhangc693d952020-07-22 19:21:22 -0400943 """Additional validity checks specialized for StreamingPropertyFiles."""
Tao Bao69203522018-03-08 16:09:01 -0800944
945 def test_init(self):
946 property_files = StreamingPropertyFiles()
947 self.assertEqual('ota-streaming-property-files', property_files.name)
948 self.assertEqual(
949 (
950 'payload.bin',
951 'payload_properties.txt',
952 ),
953 property_files.required)
954 self.assertEqual(
955 (
Tianjied868c122021-06-07 16:11:47 -0700956 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700957 'care_map.pb',
Tao Bao69203522018-03-08 16:09:01 -0800958 'care_map.txt',
959 'compatibility.zip',
960 ),
961 property_files.optional)
962
963 def test_Compute(self):
964 entries = (
Tao Baoae5e4c32018-03-01 19:30:00 -0800965 'payload.bin',
966 'payload_properties.txt',
967 'care_map.txt',
Tao Bao69203522018-03-08 16:09:01 -0800968 'compatibility.zip',
969 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700970 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800971 property_files = StreamingPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400972 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800973 property_files_string = property_files.Compute(zip_fp)
974
975 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -0700976 self.assertEqual(6, len(tokens))
Tao Bao69203522018-03-08 16:09:01 -0800977 self._verify_entries(zip_file, tokens, entries)
978
979 def test_Finalize(self):
980 entries = [
981 'payload.bin',
982 'payload_properties.txt',
983 'care_map.txt',
984 'compatibility.zip',
985 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700986 'META-INF/com/android/metadata.pb',
Tao Bao69203522018-03-08 16:09:01 -0800987 ]
Tao Bao3bf8c652018-03-16 12:59:42 -0700988 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800989 property_files = StreamingPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400990 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700991 raw_metadata = property_files.GetPropertyFilesString(
Tao Bao69203522018-03-08 16:09:01 -0800992 zip_fp, reserve_space=False)
993 streaming_metadata = property_files.Finalize(zip_fp, len(raw_metadata))
994 tokens = self._parse_property_files_string(streaming_metadata)
995
Tianjiea2076132020-08-19 17:25:32 -0700996 self.assertEqual(6, len(tokens))
Tao Bao69203522018-03-08 16:09:01 -0800997 # 'META-INF/com/android/metadata' will be key'd as 'metadata' in the
998 # streaming metadata.
999 entries[4] = 'metadata'
Tianjiea2076132020-08-19 17:25:32 -07001000 entries[5] = 'metadata.pb'
Tao Bao69203522018-03-08 16:09:01 -08001001 self._verify_entries(zip_file, tokens, entries)
1002
1003 def test_Verify(self):
1004 entries = (
1005 'payload.bin',
1006 'payload_properties.txt',
1007 'care_map.txt',
1008 'compatibility.zip',
Tao Baoae5e4c32018-03-01 19:30:00 -08001009 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -07001010 'META-INF/com/android/metadata.pb',
Tao Baoae5e4c32018-03-01 19:30:00 -08001011 )
Tao Bao3bf8c652018-03-16 12:59:42 -07001012 zip_file = self.construct_zip_package(entries)
Tao Baoae5e4c32018-03-01 19:30:00 -08001013 property_files = StreamingPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -04001014 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Baoae5e4c32018-03-01 19:30:00 -08001015 # First get the raw metadata string (i.e. without padding space).
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -07001016 raw_metadata = property_files.GetPropertyFilesString(
Tao Baoae5e4c32018-03-01 19:30:00 -08001017 zip_fp, reserve_space=False)
1018
1019 # Should pass the test if verification passes.
1020 property_files.Verify(zip_fp, raw_metadata)
1021
1022 # Or raise on verification failure.
1023 self.assertRaises(
1024 AssertionError, property_files.Verify, zip_fp, raw_metadata + 'x')
1025
Tao Baofabe0832018-01-17 15:52:28 -08001026
Kelvin Zhangcff4d762020-07-29 16:37:51 -04001027class AbOtaPropertyFilesTest(PropertyFilesTestCase):
Kelvin Zhangc693d952020-07-22 19:21:22 -04001028 """Additional validity checks specialized for AbOtaPropertyFiles."""
Tao Baob6304672018-03-08 16:28:33 -08001029
1030 # The size for payload and metadata signature size.
1031 SIGNATURE_SIZE = 256
1032
1033 def setUp(self):
1034 self.testdata_dir = test_utils.get_testdata_dir()
1035 self.assertTrue(os.path.exists(self.testdata_dir))
1036
1037 common.OPTIONS.wipe_user_data = False
1038 common.OPTIONS.payload_signer = None
1039 common.OPTIONS.payload_signer_args = None
1040 common.OPTIONS.package_key = os.path.join(self.testdata_dir, 'testkey')
1041 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -04001042 common.OPTIONS.package_key: None,
Tao Baob6304672018-03-08 16:28:33 -08001043 }
1044
1045 def test_init(self):
1046 property_files = AbOtaPropertyFiles()
1047 self.assertEqual('ota-property-files', property_files.name)
1048 self.assertEqual(
1049 (
1050 'payload.bin',
1051 'payload_properties.txt',
1052 ),
1053 property_files.required)
1054 self.assertEqual(
1055 (
Tianjied868c122021-06-07 16:11:47 -07001056 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001057 'care_map.pb',
Tao Baob6304672018-03-08 16:28:33 -08001058 'care_map.txt',
1059 'compatibility.zip',
1060 ),
1061 property_files.optional)
1062
Tao Bao82490d32019-04-09 00:12:30 -07001063 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baob6304672018-03-08 16:28:33 -08001064 def test_GetPayloadMetadataOffsetAndSize(self):
1065 target_file = construct_target_files()
Kelvin Zhangfa928692022-08-16 17:01:53 +00001066 payload = PayloadGenerator()
Tao Baob6304672018-03-08 16:28:33 -08001067 payload.Generate(target_file)
1068
1069 payload_signer = PayloadSigner()
1070 payload.Sign(payload_signer)
1071
1072 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001073 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baob6304672018-03-08 16:28:33 -08001074 payload.WriteToZip(output_zip)
1075
1076 # Find out the payload metadata offset and size.
1077 property_files = AbOtaPropertyFiles()
1078 with zipfile.ZipFile(output_file) as input_zip:
1079 # pylint: disable=protected-access
1080 payload_offset, metadata_total = (
1081 property_files._GetPayloadMetadataOffsetAndSize(input_zip))
1082
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001083 # The signature proto has the following format (details in
1084 # /platform/system/update_engine/update_metadata.proto):
1085 # message Signature {
1086 # optional uint32 version = 1;
1087 # optional bytes data = 2;
1088 # optional fixed32 unpadded_signature_size = 3;
1089 # }
1090 #
1091 # According to the protobuf encoding, the tail of the signature message will
1092 # be [signature string(256 bytes) + encoding of the fixed32 number 256]. And
1093 # 256 is encoded as 'x1d\x00\x01\x00\x00':
1094 # [3 (field number) << 3 | 5 (type) + byte reverse of 0x100 (256)].
1095 # Details in (https://developers.google.com/protocol-buffers/docs/encoding)
1096 signature_tail_length = self.SIGNATURE_SIZE + 5
1097 self.assertGreater(metadata_total, signature_tail_length)
Tao Baob6304672018-03-08 16:28:33 -08001098 with open(output_file, 'rb') as verify_fp:
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001099 verify_fp.seek(payload_offset + metadata_total - signature_tail_length)
1100 metadata_signature_proto_tail = verify_fp.read(signature_tail_length)
1101
1102 self.assertEqual(b'\x1d\x00\x01\x00\x00',
1103 metadata_signature_proto_tail[-5:])
1104 metadata_signature = metadata_signature_proto_tail[:-5]
Tao Baob6304672018-03-08 16:28:33 -08001105
1106 # Now we extract the metadata hash via brillo_update_payload script, which
1107 # will serve as the oracle result.
1108 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
1109 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
1110 cmd = ['brillo_update_payload', 'hash',
1111 '--unsigned_payload', payload.payload_file,
1112 '--signature_size', str(self.SIGNATURE_SIZE),
1113 '--metadata_hash_file', metadata_sig_file,
1114 '--payload_hash_file', payload_sig_file]
Tao Bao73dd4f42018-10-04 16:25:33 -07001115 proc = common.Run(cmd)
Tao Baob6304672018-03-08 16:28:33 -08001116 stdoutdata, _ = proc.communicate()
1117 self.assertEqual(
1118 0, proc.returncode,
Tao Bao73dd4f42018-10-04 16:25:33 -07001119 'Failed to run brillo_update_payload:\n{}'.format(stdoutdata))
Tao Baob6304672018-03-08 16:28:33 -08001120
Kelvin Zhangbf01f8b2022-08-30 18:25:43 +00001121 signed_metadata_sig_file = payload_signer.SignHashFile(metadata_sig_file)
Tao Baob6304672018-03-08 16:28:33 -08001122
1123 # Finally we can compare the two signatures.
1124 with open(signed_metadata_sig_file, 'rb') as verify_fp:
1125 self.assertEqual(verify_fp.read(), metadata_signature)
1126
1127 @staticmethod
Tao Bao3bf8c652018-03-16 12:59:42 -07001128 def construct_zip_package_withValidPayload(with_metadata=False):
1129 # Cannot use construct_zip_package() since we need a "valid" payload.bin.
Tao Baob6304672018-03-08 16:28:33 -08001130 target_file = construct_target_files()
Kelvin Zhangfa928692022-08-16 17:01:53 +00001131 payload = PayloadGenerator()
Tao Baob6304672018-03-08 16:28:33 -08001132 payload.Generate(target_file)
1133
1134 payload_signer = PayloadSigner()
1135 payload.Sign(payload_signer)
1136
1137 zip_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001138 with zipfile.ZipFile(zip_file, 'w', allowZip64=True) as zip_fp:
Tao Baob6304672018-03-08 16:28:33 -08001139 # 'payload.bin',
1140 payload.WriteToZip(zip_fp)
1141
1142 # Other entries.
1143 entries = ['care_map.txt', 'compatibility.zip']
1144
1145 # Put META-INF/com/android/metadata if needed.
1146 if with_metadata:
1147 entries.append('META-INF/com/android/metadata')
Tianjiea2076132020-08-19 17:25:32 -07001148 entries.append('META-INF/com/android/metadata.pb')
Tao Baob6304672018-03-08 16:28:33 -08001149
1150 for entry in entries:
1151 zip_fp.writestr(
1152 entry, entry.replace('.', '-').upper(), zipfile.ZIP_STORED)
1153
1154 return zip_file
1155
Tao Bao82490d32019-04-09 00:12:30 -07001156 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baob6304672018-03-08 16:28:33 -08001157 def test_Compute(self):
Tao Bao3bf8c652018-03-16 12:59:42 -07001158 zip_file = self.construct_zip_package_withValidPayload()
Tao Baob6304672018-03-08 16:28:33 -08001159 property_files = AbOtaPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -04001160 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Baob6304672018-03-08 16:28:33 -08001161 property_files_string = property_files.Compute(zip_fp)
1162
1163 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -07001164 # "7" indcludes the four entries above, two metadata entries, and one entry
Tao Baob6304672018-03-08 16:28:33 -08001165 # for payload-metadata.bin.
Tianjiea2076132020-08-19 17:25:32 -07001166 self.assertEqual(7, len(tokens))
Tao Baob6304672018-03-08 16:28:33 -08001167 self._verify_entries(
1168 zip_file, tokens, ('care_map.txt', 'compatibility.zip'))
1169
Tao Bao82490d32019-04-09 00:12:30 -07001170 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baob6304672018-03-08 16:28:33 -08001171 def test_Finalize(self):
Tao Bao3bf8c652018-03-16 12:59:42 -07001172 zip_file = self.construct_zip_package_withValidPayload(with_metadata=True)
Tao Baob6304672018-03-08 16:28:33 -08001173 property_files = AbOtaPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -04001174 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -07001175 raw_metadata = property_files.GetPropertyFilesString(
Tao Baob6304672018-03-08 16:28:33 -08001176 zip_fp, reserve_space=False)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001177 property_files_string = property_files.Finalize(
1178 zip_fp, len(raw_metadata))
Tao Baob6304672018-03-08 16:28:33 -08001179
1180 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -07001181 # "7" includes the four entries above, two metadata entries, and one entry
Tao Baob6304672018-03-08 16:28:33 -08001182 # for payload-metadata.bin.
Tianjiea2076132020-08-19 17:25:32 -07001183 self.assertEqual(7, len(tokens))
Tao Baob6304672018-03-08 16:28:33 -08001184 self._verify_entries(
1185 zip_file, tokens, ('care_map.txt', 'compatibility.zip'))
1186
Tao Bao82490d32019-04-09 00:12:30 -07001187 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baob6304672018-03-08 16:28:33 -08001188 def test_Verify(self):
Tao Bao3bf8c652018-03-16 12:59:42 -07001189 zip_file = self.construct_zip_package_withValidPayload(with_metadata=True)
Tao Baob6304672018-03-08 16:28:33 -08001190 property_files = AbOtaPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -04001191 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -07001192 raw_metadata = property_files.GetPropertyFilesString(
Tao Baob6304672018-03-08 16:28:33 -08001193 zip_fp, reserve_space=False)
1194
1195 property_files.Verify(zip_fp, raw_metadata)
1196
1197
Tao Bao65b94e92018-10-11 21:57:26 -07001198class PayloadSignerTest(test_utils.ReleaseToolsTestCase):
Tao Baofabe0832018-01-17 15:52:28 -08001199
1200 SIGFILE = 'sigfile.bin'
1201 SIGNED_SIGFILE = 'signed-sigfile.bin'
1202
1203 def setUp(self):
Tao Bao04e1f012018-02-04 12:13:35 -08001204 self.testdata_dir = test_utils.get_testdata_dir()
Tao Baofabe0832018-01-17 15:52:28 -08001205 self.assertTrue(os.path.exists(self.testdata_dir))
1206
1207 common.OPTIONS.payload_signer = None
1208 common.OPTIONS.payload_signer_args = []
1209 common.OPTIONS.package_key = os.path.join(self.testdata_dir, 'testkey')
1210 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -04001211 common.OPTIONS.package_key: None,
Tao Baofabe0832018-01-17 15:52:28 -08001212 }
1213
Tao Baofabe0832018-01-17 15:52:28 -08001214 def _assertFilesEqual(self, file1, file2):
1215 with open(file1, 'rb') as fp1, open(file2, 'rb') as fp2:
1216 self.assertEqual(fp1.read(), fp2.read())
1217
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001218 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baofabe0832018-01-17 15:52:28 -08001219 def test_init(self):
1220 payload_signer = PayloadSigner()
1221 self.assertEqual('openssl', payload_signer.signer)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001222 self.assertEqual(256, payload_signer.maximum_signature_size)
Tao Baofabe0832018-01-17 15:52:28 -08001223
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001224 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baofabe0832018-01-17 15:52:28 -08001225 def test_init_withPassword(self):
1226 common.OPTIONS.package_key = os.path.join(
1227 self.testdata_dir, 'testkey_with_passwd')
1228 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -04001229 common.OPTIONS.package_key: 'foo',
Tao Baofabe0832018-01-17 15:52:28 -08001230 }
1231 payload_signer = PayloadSigner()
1232 self.assertEqual('openssl', payload_signer.signer)
1233
1234 def test_init_withExternalSigner(self):
Tao Baofabe0832018-01-17 15:52:28 -08001235 common.OPTIONS.payload_signer_args = ['arg1', 'arg2']
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001236 common.OPTIONS.payload_signer_maximum_signature_size = '512'
Kelvin Zhang059bf6e2022-08-12 14:03:41 -07001237 payload_signer = PayloadSigner(
1238 OPTIONS.package_key, OPTIONS.private_key_suffix, payload_signer='abc')
Tao Baofabe0832018-01-17 15:52:28 -08001239 self.assertEqual('abc', payload_signer.signer)
1240 self.assertEqual(['arg1', 'arg2'], payload_signer.signer_args)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001241 self.assertEqual(512, payload_signer.maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -07001242
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001243 @test_utils.SkipIfExternalToolsUnavailable()
1244 def test_GetMaximumSignatureSizeInBytes_512Bytes(self):
xunchang376cc7c2019-04-08 23:04:58 -07001245 signing_key = os.path.join(self.testdata_dir, 'testkey_RSA4096.key')
Tao Bao82490d32019-04-09 00:12:30 -07001246 # pylint: disable=protected-access
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001247 signature_size = PayloadSigner._GetMaximumSignatureSizeInBytes(signing_key)
1248 self.assertEqual(512, signature_size)
Tao Baofabe0832018-01-17 15:52:28 -08001249
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001250 @test_utils.SkipIfExternalToolsUnavailable()
1251 def test_GetMaximumSignatureSizeInBytes_ECKey(self):
1252 signing_key = os.path.join(self.testdata_dir, 'testkey_EC.key')
1253 # pylint: disable=protected-access
1254 signature_size = PayloadSigner._GetMaximumSignatureSizeInBytes(signing_key)
1255 self.assertEqual(72, signature_size)
1256
1257 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baofabe0832018-01-17 15:52:28 -08001258 def test_Sign(self):
1259 payload_signer = PayloadSigner()
1260 input_file = os.path.join(self.testdata_dir, self.SIGFILE)
Kelvin Zhangbf01f8b2022-08-30 18:25:43 +00001261 signed_file = payload_signer.SignHashFile(input_file)
Tao Baofabe0832018-01-17 15:52:28 -08001262
1263 verify_file = os.path.join(self.testdata_dir, self.SIGNED_SIGFILE)
1264 self._assertFilesEqual(verify_file, signed_file)
1265
1266 def test_Sign_withExternalSigner_openssl(self):
1267 """Uses openssl as the external payload signer."""
Tao Baofabe0832018-01-17 15:52:28 -08001268 common.OPTIONS.payload_signer_args = [
1269 'pkeyutl', '-sign', '-keyform', 'DER', '-inkey',
1270 os.path.join(self.testdata_dir, 'testkey.pk8'),
1271 '-pkeyopt', 'digest:sha256']
Kelvin Zhang059bf6e2022-08-12 14:03:41 -07001272 payload_signer = PayloadSigner(
1273 OPTIONS.package_key, OPTIONS.private_key_suffix, payload_signer="openssl")
Tao Baofabe0832018-01-17 15:52:28 -08001274 input_file = os.path.join(self.testdata_dir, self.SIGFILE)
Kelvin Zhangbf01f8b2022-08-30 18:25:43 +00001275 signed_file = payload_signer.SignHashFile(input_file)
Tao Baofabe0832018-01-17 15:52:28 -08001276
1277 verify_file = os.path.join(self.testdata_dir, self.SIGNED_SIGFILE)
1278 self._assertFilesEqual(verify_file, signed_file)
1279
1280 def test_Sign_withExternalSigner_script(self):
1281 """Uses testdata/payload_signer.sh as the external payload signer."""
Kelvin Zhang059bf6e2022-08-12 14:03:41 -07001282 external_signer = os.path.join(
Tao Baofabe0832018-01-17 15:52:28 -08001283 self.testdata_dir, 'payload_signer.sh')
Kelvin Zhang059bf6e2022-08-12 14:03:41 -07001284 os.chmod(external_signer, 0o700)
Tao Baofabe0832018-01-17 15:52:28 -08001285 common.OPTIONS.payload_signer_args = [
1286 os.path.join(self.testdata_dir, 'testkey.pk8')]
Kelvin Zhang059bf6e2022-08-12 14:03:41 -07001287 payload_signer = PayloadSigner(
1288 OPTIONS.package_key, OPTIONS.private_key_suffix, payload_signer=external_signer)
Tao Baofabe0832018-01-17 15:52:28 -08001289 input_file = os.path.join(self.testdata_dir, self.SIGFILE)
Kelvin Zhangbf01f8b2022-08-30 18:25:43 +00001290 signed_file = payload_signer.SignHashFile(input_file)
Tao Baofabe0832018-01-17 15:52:28 -08001291
1292 verify_file = os.path.join(self.testdata_dir, self.SIGNED_SIGFILE)
1293 self._assertFilesEqual(verify_file, signed_file)
Tao Baoc7b403a2018-01-30 18:19:04 -08001294
1295
Tao Bao65b94e92018-10-11 21:57:26 -07001296class PayloadTest(test_utils.ReleaseToolsTestCase):
Tao Baoc7b403a2018-01-30 18:19:04 -08001297
1298 def setUp(self):
Tao Bao04e1f012018-02-04 12:13:35 -08001299 self.testdata_dir = test_utils.get_testdata_dir()
Tao Baoc7b403a2018-01-30 18:19:04 -08001300 self.assertTrue(os.path.exists(self.testdata_dir))
1301
1302 common.OPTIONS.wipe_user_data = False
1303 common.OPTIONS.payload_signer = None
1304 common.OPTIONS.payload_signer_args = None
1305 common.OPTIONS.package_key = os.path.join(self.testdata_dir, 'testkey')
1306 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -04001307 common.OPTIONS.package_key: None,
Tao Baoc7b403a2018-01-30 18:19:04 -08001308 }
1309
Tao Baoc7b403a2018-01-30 18:19:04 -08001310 @staticmethod
Tao Baof7140c02018-01-30 17:09:24 -08001311 def _create_payload_full(secondary=False):
1312 target_file = construct_target_files(secondary)
Kelvin Zhangbf01f8b2022-08-30 18:25:43 +00001313 payload = PayloadGenerator(secondary, OPTIONS.wipe_user_data)
Tao Baoc7b403a2018-01-30 18:19:04 -08001314 payload.Generate(target_file)
1315 return payload
1316
Tao Baof7140c02018-01-30 17:09:24 -08001317 @staticmethod
1318 def _create_payload_incremental():
1319 target_file = construct_target_files()
1320 source_file = construct_target_files()
Kelvin Zhangfa928692022-08-16 17:01:53 +00001321 payload = PayloadGenerator()
Tao Baoc7b403a2018-01-30 18:19:04 -08001322 payload.Generate(target_file, source_file)
1323 return payload
1324
Tao Bao82490d32019-04-09 00:12:30 -07001325 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001326 def test_Generate_full(self):
1327 payload = self._create_payload_full()
1328 self.assertTrue(os.path.exists(payload.payload_file))
1329
Tao Bao82490d32019-04-09 00:12:30 -07001330 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001331 def test_Generate_incremental(self):
1332 payload = self._create_payload_incremental()
1333 self.assertTrue(os.path.exists(payload.payload_file))
1334
Tao Bao82490d32019-04-09 00:12:30 -07001335 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001336 def test_Generate_additionalArgs(self):
Tao Baof7140c02018-01-30 17:09:24 -08001337 target_file = construct_target_files()
1338 source_file = construct_target_files()
Kelvin Zhangfa928692022-08-16 17:01:53 +00001339 payload = PayloadGenerator()
Tao Baoc7b403a2018-01-30 18:19:04 -08001340 # This should work the same as calling payload.Generate(target_file,
1341 # source_file).
1342 payload.Generate(
1343 target_file, additional_args=["--source_image", source_file])
1344 self.assertTrue(os.path.exists(payload.payload_file))
1345
Tao Bao82490d32019-04-09 00:12:30 -07001346 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001347 def test_Generate_invalidInput(self):
Tao Baof7140c02018-01-30 17:09:24 -08001348 target_file = construct_target_files()
Tao Baoc7b403a2018-01-30 18:19:04 -08001349 common.ZipDelete(target_file, 'IMAGES/vendor.img')
Kelvin Zhangfa928692022-08-16 17:01:53 +00001350 payload = PayloadGenerator()
Tao Baobec89c12018-10-15 11:53:28 -07001351 self.assertRaises(common.ExternalError, payload.Generate, target_file)
Tao Baoc7b403a2018-01-30 18:19:04 -08001352
Tao Bao82490d32019-04-09 00:12:30 -07001353 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001354 def test_Sign_full(self):
1355 payload = self._create_payload_full()
1356 payload.Sign(PayloadSigner())
1357
1358 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001359 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baoc7b403a2018-01-30 18:19:04 -08001360 payload.WriteToZip(output_zip)
1361
1362 import check_ota_package_signature
1363 check_ota_package_signature.VerifyAbOtaPayload(
1364 os.path.join(self.testdata_dir, 'testkey.x509.pem'),
1365 output_file)
1366
Tao Bao82490d32019-04-09 00:12:30 -07001367 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001368 def test_Sign_incremental(self):
1369 payload = self._create_payload_incremental()
1370 payload.Sign(PayloadSigner())
1371
1372 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001373 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baoc7b403a2018-01-30 18:19:04 -08001374 payload.WriteToZip(output_zip)
1375
1376 import check_ota_package_signature
1377 check_ota_package_signature.VerifyAbOtaPayload(
1378 os.path.join(self.testdata_dir, 'testkey.x509.pem'),
1379 output_file)
1380
Tao Bao82490d32019-04-09 00:12:30 -07001381 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001382 def test_Sign_withDataWipe(self):
1383 common.OPTIONS.wipe_user_data = True
1384 payload = self._create_payload_full()
1385 payload.Sign(PayloadSigner())
Kelvin Zhangbf01f8b2022-08-30 18:25:43 +00001386 with tempfile.NamedTemporaryFile() as fp:
1387 with zipfile.ZipFile(fp, "w") as zfp:
1388 payload.WriteToZip(zfp)
Tao Baoc7b403a2018-01-30 18:19:04 -08001389
1390 with open(payload.payload_properties) as properties_fp:
1391 self.assertIn("POWERWASH=1", properties_fp.read())
1392
Tao Bao82490d32019-04-09 00:12:30 -07001393 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao667ff572018-02-10 00:02:40 -08001394 def test_Sign_secondary(self):
1395 payload = self._create_payload_full(secondary=True)
1396 payload.Sign(PayloadSigner())
Kelvin Zhangbf01f8b2022-08-30 18:25:43 +00001397 with tempfile.NamedTemporaryFile() as fp:
1398 with zipfile.ZipFile(fp, "w") as zfp:
1399 payload.WriteToZip(zfp)
Tao Bao667ff572018-02-10 00:02:40 -08001400
1401 with open(payload.payload_properties) as properties_fp:
1402 self.assertIn("SWITCH_SLOT_ON_REBOOT=0", properties_fp.read())
1403
Tao Bao82490d32019-04-09 00:12:30 -07001404 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001405 def test_Sign_badSigner(self):
1406 """Tests that signing failure can be captured."""
1407 payload = self._create_payload_full()
1408 payload_signer = PayloadSigner()
1409 payload_signer.signer_args.append('bad-option')
Tao Baobec89c12018-10-15 11:53:28 -07001410 self.assertRaises(common.ExternalError, payload.Sign, payload_signer)
Tao Baoc7b403a2018-01-30 18:19:04 -08001411
Tao Bao82490d32019-04-09 00:12:30 -07001412 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001413 def test_WriteToZip(self):
1414 payload = self._create_payload_full()
1415 payload.Sign(PayloadSigner())
1416
1417 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001418 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baoc7b403a2018-01-30 18:19:04 -08001419 payload.WriteToZip(output_zip)
1420
1421 with zipfile.ZipFile(output_file) as verify_zip:
1422 # First make sure we have the essential entries.
1423 namelist = verify_zip.namelist()
Kelvin Zhangfa928692022-08-16 17:01:53 +00001424 self.assertIn(PayloadGenerator.PAYLOAD_BIN, namelist)
1425 self.assertIn(PayloadGenerator.PAYLOAD_PROPERTIES_TXT, namelist)
Tao Baoc7b403a2018-01-30 18:19:04 -08001426
1427 # Then assert these entries are stored.
1428 for entry_info in verify_zip.infolist():
Kelvin Zhangfa928692022-08-16 17:01:53 +00001429 if entry_info.filename not in (PayloadGenerator.PAYLOAD_BIN,
1430 PayloadGenerator.PAYLOAD_PROPERTIES_TXT):
Tao Baoc7b403a2018-01-30 18:19:04 -08001431 continue
1432 self.assertEqual(zipfile.ZIP_STORED, entry_info.compress_type)
1433
Tao Bao82490d32019-04-09 00:12:30 -07001434 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baof7140c02018-01-30 17:09:24 -08001435 def test_WriteToZip_secondary(self):
1436 payload = self._create_payload_full(secondary=True)
1437 payload.Sign(PayloadSigner())
1438
1439 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001440 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Bao667ff572018-02-10 00:02:40 -08001441 payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001442
1443 with zipfile.ZipFile(output_file) as verify_zip:
1444 # First make sure we have the essential entries.
1445 namelist = verify_zip.namelist()
Kelvin Zhangfa928692022-08-16 17:01:53 +00001446 self.assertIn(PayloadGenerator.SECONDARY_PAYLOAD_BIN, namelist)
1447 self.assertIn(PayloadGenerator.SECONDARY_PAYLOAD_PROPERTIES_TXT, namelist)
Tao Baof7140c02018-01-30 17:09:24 -08001448
1449 # Then assert these entries are stored.
1450 for entry_info in verify_zip.infolist():
1451 if entry_info.filename not in (
Kelvin Zhangfa928692022-08-16 17:01:53 +00001452 PayloadGenerator.SECONDARY_PAYLOAD_BIN,
1453 PayloadGenerator.SECONDARY_PAYLOAD_PROPERTIES_TXT):
Tao Baof7140c02018-01-30 17:09:24 -08001454 continue
1455 self.assertEqual(zipfile.ZIP_STORED, entry_info.compress_type)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001456
1457
1458class RuntimeFingerprintTest(test_utils.ReleaseToolsTestCase):
1459 MISC_INFO = [
1460 'recovery_api_version=3',
1461 'fstab_version=2',
1462 'recovery_as_boot=true',
Kelvin Zhang39aea442020-08-17 11:04:25 -04001463 'ab_update=true',
Tianjie Xu9afb2212020-05-10 21:48:15 +00001464 ]
1465
1466 BUILD_PROP = [
Tianjie Xu9afb2212020-05-10 21:48:15 +00001467 'ro.build.id=build-id',
1468 'ro.build.version.incremental=version-incremental',
1469 'ro.build.type=build-type',
1470 'ro.build.tags=build-tags',
Tianjieb37c5be2020-10-15 21:27:10 -07001471 'ro.build.version.release=version-release',
1472 'ro.build.version.release_or_codename=version-release',
Tianjied6867162020-05-10 14:30:13 -07001473 'ro.build.version.sdk=30',
1474 'ro.build.version.security_patch=2020',
Tianjiea2076132020-08-19 17:25:32 -07001475 'ro.build.date.utc=12345678',
1476 'ro.system.build.version.release=version-release',
1477 'ro.system.build.id=build-id',
1478 'ro.system.build.version.incremental=version-incremental',
1479 'ro.system.build.type=build-type',
1480 'ro.system.build.tags=build-tags',
1481 'ro.system.build.version.sdk=30',
1482 'ro.system.build.version.security_patch=2020',
1483 'ro.system.build.date.utc=12345678',
1484 'ro.product.system.brand=generic',
1485 'ro.product.system.name=generic',
1486 'ro.product.system.device=generic',
Tianjie Xu9afb2212020-05-10 21:48:15 +00001487 ]
1488
1489 VENDOR_BUILD_PROP = [
Tianjiea2076132020-08-19 17:25:32 -07001490 'ro.vendor.build.version.release=version-release',
1491 'ro.vendor.build.id=build-id',
1492 'ro.vendor.build.version.incremental=version-incremental',
1493 'ro.vendor.build.type=build-type',
1494 'ro.vendor.build.tags=build-tags',
1495 'ro.vendor.build.version.sdk=30',
1496 'ro.vendor.build.version.security_patch=2020',
1497 'ro.vendor.build.date.utc=12345678',
Tianjie Xu9afb2212020-05-10 21:48:15 +00001498 'ro.product.vendor.brand=vendor-product-brand',
1499 'ro.product.vendor.name=vendor-product-name',
1500 'ro.product.vendor.device=vendor-product-device'
1501 ]
1502
1503 def setUp(self):
1504 common.OPTIONS.oem_dicts = None
1505 self.test_dir = common.MakeTempDir()
Tianjied6867162020-05-10 14:30:13 -07001506 self.writeFiles({'META/misc_info.txt': '\n'.join(self.MISC_INFO)},
1507 self.test_dir)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001508
Tianjied6867162020-05-10 14:30:13 -07001509 def writeFiles(self, contents_dict, out_dir):
Tianjie Xu9afb2212020-05-10 21:48:15 +00001510 for path, content in contents_dict.items():
Tianjied6867162020-05-10 14:30:13 -07001511 abs_path = os.path.join(out_dir, path)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001512 dir_name = os.path.dirname(abs_path)
1513 if not os.path.exists(dir_name):
1514 os.makedirs(dir_name)
1515 with open(abs_path, 'w') as f:
1516 f.write(content)
1517
1518 @staticmethod
1519 def constructFingerprint(prefix):
1520 return '{}:version-release/build-id/version-incremental:' \
1521 'build-type/build-tags'.format(prefix)
1522
1523 def test_CalculatePossibleFingerprints_no_dynamic_fingerprint(self):
1524 build_prop = copy.deepcopy(self.BUILD_PROP)
1525 build_prop.extend([
1526 'ro.product.brand=product-brand',
1527 'ro.product.name=product-name',
1528 'ro.product.device=product-device',
1529 ])
1530 self.writeFiles({
1531 'SYSTEM/build.prop': '\n'.join(build_prop),
1532 'VENDOR/build.prop': '\n'.join(self.VENDOR_BUILD_PROP),
Tianjied6867162020-05-10 14:30:13 -07001533 }, self.test_dir)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001534
Tianjied6867162020-05-10 14:30:13 -07001535 build_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
1536 expected = ({'product-device'},
1537 {self.constructFingerprint(
1538 'product-brand/product-name/product-device')})
1539 self.assertEqual(expected,
1540 CalculateRuntimeDevicesAndFingerprints(build_info, {}))
Tianjie Xu9afb2212020-05-10 21:48:15 +00001541
1542 def test_CalculatePossibleFingerprints_single_override(self):
1543 vendor_build_prop = copy.deepcopy(self.VENDOR_BUILD_PROP)
1544 vendor_build_prop.extend([
1545 'import /vendor/etc/build_${ro.boot.sku_name}.prop',
1546 ])
1547 self.writeFiles({
1548 'SYSTEM/build.prop': '\n'.join(self.BUILD_PROP),
1549 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1550 'VENDOR/etc/build_std.prop':
1551 'ro.product.vendor.name=vendor-product-std',
1552 'VENDOR/etc/build_pro.prop':
1553 'ro.product.vendor.name=vendor-product-pro',
Tianjied6867162020-05-10 14:30:13 -07001554 }, self.test_dir)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001555
Tianjied6867162020-05-10 14:30:13 -07001556 build_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
1557 boot_variable_values = {'ro.boot.sku_name': ['std', 'pro']}
1558
1559 expected = ({'vendor-product-device'}, {
Tianjie Xu9afb2212020-05-10 21:48:15 +00001560 self.constructFingerprint(
1561 'vendor-product-brand/vendor-product-name/vendor-product-device'),
1562 self.constructFingerprint(
1563 'vendor-product-brand/vendor-product-std/vendor-product-device'),
1564 self.constructFingerprint(
1565 'vendor-product-brand/vendor-product-pro/vendor-product-device'),
Tianjied6867162020-05-10 14:30:13 -07001566 })
1567 self.assertEqual(
1568 expected, CalculateRuntimeDevicesAndFingerprints(
1569 build_info, boot_variable_values))
Tianjie Xu9afb2212020-05-10 21:48:15 +00001570
1571 def test_CalculatePossibleFingerprints_multiple_overrides(self):
1572 vendor_build_prop = copy.deepcopy(self.VENDOR_BUILD_PROP)
1573 vendor_build_prop.extend([
1574 'import /vendor/etc/build_${ro.boot.sku_name}.prop',
1575 'import /vendor/etc/build_${ro.boot.device_name}.prop',
1576 ])
1577 self.writeFiles({
1578 'SYSTEM/build.prop': '\n'.join(self.BUILD_PROP),
1579 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1580 'VENDOR/etc/build_std.prop':
1581 'ro.product.vendor.name=vendor-product-std',
1582 'VENDOR/etc/build_product1.prop':
1583 'ro.product.vendor.device=vendor-device-product1',
1584 'VENDOR/etc/build_pro.prop':
1585 'ro.product.vendor.name=vendor-product-pro',
1586 'VENDOR/etc/build_product2.prop':
1587 'ro.product.vendor.device=vendor-device-product2',
Tianjied6867162020-05-10 14:30:13 -07001588 }, self.test_dir)
1589
1590 build_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
1591 boot_variable_values = {
Tianjie Xu9afb2212020-05-10 21:48:15 +00001592 'ro.boot.sku_name': ['std', 'pro'],
1593 'ro.boot.device_name': ['product1', 'product2'],
1594 }
1595
Tianjied6867162020-05-10 14:30:13 -07001596 expected_devices = {'vendor-product-device', 'vendor-device-product1',
1597 'vendor-device-product2'}
1598 expected_fingerprints = {
Tianjie Xu9afb2212020-05-10 21:48:15 +00001599 self.constructFingerprint(
1600 'vendor-product-brand/vendor-product-name/vendor-product-device'),
1601 self.constructFingerprint(
1602 'vendor-product-brand/vendor-product-std/vendor-device-product1'),
1603 self.constructFingerprint(
1604 'vendor-product-brand/vendor-product-pro/vendor-device-product1'),
1605 self.constructFingerprint(
1606 'vendor-product-brand/vendor-product-std/vendor-device-product2'),
1607 self.constructFingerprint(
Tianjied6867162020-05-10 14:30:13 -07001608 'vendor-product-brand/vendor-product-pro/vendor-device-product2')
1609 }
1610 self.assertEqual((expected_devices, expected_fingerprints),
1611 CalculateRuntimeDevicesAndFingerprints(
1612 build_info, boot_variable_values))
1613
1614 def test_GetPackageMetadata_full_package(self):
1615 vendor_build_prop = copy.deepcopy(self.VENDOR_BUILD_PROP)
1616 vendor_build_prop.extend([
1617 'import /vendor/etc/build_${ro.boot.sku_name}.prop',
1618 ])
1619 self.writeFiles({
1620 'SYSTEM/build.prop': '\n'.join(self.BUILD_PROP),
1621 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1622 'VENDOR/etc/build_std.prop':
1623 'ro.product.vendor.name=vendor-product-std',
1624 'VENDOR/etc/build_pro.prop':
1625 'ro.product.vendor.name=vendor-product-pro',
Kelvin Zhang39aea442020-08-17 11:04:25 -04001626 AB_PARTITIONS: '\n'.join(['system', 'vendor']),
Tianjied6867162020-05-10 14:30:13 -07001627 }, self.test_dir)
1628
1629 common.OPTIONS.boot_variable_file = common.MakeTempFile()
1630 with open(common.OPTIONS.boot_variable_file, 'w') as f:
1631 f.write('ro.boot.sku_name=std,pro')
1632
1633 build_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
Tianjiea2076132020-08-19 17:25:32 -07001634 metadata_dict = BuildLegacyOtaMetadata(GetPackageMetadata(build_info))
1635 self.assertEqual('vendor-product-device', metadata_dict['pre-device'])
Tianjied6867162020-05-10 14:30:13 -07001636 fingerprints = [
1637 self.constructFingerprint(
1638 'vendor-product-brand/vendor-product-name/vendor-product-device'),
1639 self.constructFingerprint(
1640 'vendor-product-brand/vendor-product-pro/vendor-product-device'),
1641 self.constructFingerprint(
1642 'vendor-product-brand/vendor-product-std/vendor-product-device'),
1643 ]
Tianjiea2076132020-08-19 17:25:32 -07001644 self.assertEqual('|'.join(fingerprints), metadata_dict['post-build'])
1645
1646 def CheckMetadataEqual(self, metadata_dict, metadata_proto):
1647 post_build = metadata_proto.postcondition
1648 self.assertEqual('|'.join(post_build.build),
1649 metadata_dict['post-build'])
1650 self.assertEqual(post_build.build_incremental,
1651 metadata_dict['post-build-incremental'])
1652 self.assertEqual(post_build.sdk_level,
1653 metadata_dict['post-sdk-level'])
1654 self.assertEqual(post_build.security_patch_level,
1655 metadata_dict['post-security-patch-level'])
1656
1657 if metadata_proto.type == ota_metadata_pb2.OtaMetadata.AB:
1658 ota_type = 'AB'
1659 elif metadata_proto.type == ota_metadata_pb2.OtaMetadata.BLOCK:
1660 ota_type = 'BLOCK'
1661 else:
1662 ota_type = ''
1663 self.assertEqual(ota_type, metadata_dict['ota-type'])
1664 self.assertEqual(metadata_proto.wipe,
1665 metadata_dict.get('ota-wipe') == 'yes')
1666 self.assertEqual(metadata_proto.required_cache,
1667 int(metadata_dict.get('ota-required-cache', 0)))
1668 self.assertEqual(metadata_proto.retrofit_dynamic_partitions,
1669 metadata_dict.get(
Tianjie2bb14862020-08-28 16:24:34 -07001670 'ota-retrofit-dynamic-partitions') == 'yes')
Tianjied6867162020-05-10 14:30:13 -07001671
1672 def test_GetPackageMetadata_incremental_package(self):
1673 vendor_build_prop = copy.deepcopy(self.VENDOR_BUILD_PROP)
1674 vendor_build_prop.extend([
1675 'import /vendor/etc/build_${ro.boot.sku_name}.prop',
1676 ])
1677 self.writeFiles({
Kelvin Zhang39aea442020-08-17 11:04:25 -04001678 'META/misc_info.txt': '\n'.join(self.MISC_INFO),
1679 'META/ab_partitions.txt': '\n'.join(['system', 'vendor', 'product']),
Tianjied6867162020-05-10 14:30:13 -07001680 'SYSTEM/build.prop': '\n'.join(self.BUILD_PROP),
1681 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1682 'VENDOR/etc/build_std.prop':
1683 'ro.product.vendor.device=vendor-device-std',
1684 'VENDOR/etc/build_pro.prop':
1685 'ro.product.vendor.device=vendor-device-pro',
1686 }, self.test_dir)
1687
1688 common.OPTIONS.boot_variable_file = common.MakeTempFile()
1689 with open(common.OPTIONS.boot_variable_file, 'w') as f:
1690 f.write('ro.boot.sku_name=std,pro')
1691
1692 source_dir = common.MakeTempDir()
1693 source_build_prop = [
1694 'ro.build.version.release=source-version-release',
1695 'ro.build.id=source-build-id',
1696 'ro.build.version.incremental=source-version-incremental',
1697 'ro.build.type=build-type',
1698 'ro.build.tags=build-tags',
1699 'ro.build.version.sdk=29',
1700 'ro.build.version.security_patch=2020',
Tianjiea2076132020-08-19 17:25:32 -07001701 'ro.build.date.utc=12340000',
1702 'ro.system.build.version.release=source-version-release',
1703 'ro.system.build.id=source-build-id',
1704 'ro.system.build.version.incremental=source-version-incremental',
1705 'ro.system.build.type=build-type',
1706 'ro.system.build.tags=build-tags',
1707 'ro.system.build.version.sdk=29',
1708 'ro.system.build.version.security_patch=2020',
1709 'ro.system.build.date.utc=12340000',
1710 'ro.product.system.brand=generic',
1711 'ro.product.system.name=generic',
1712 'ro.product.system.device=generic',
Tianjied6867162020-05-10 14:30:13 -07001713 ]
1714 self.writeFiles({
1715 'META/misc_info.txt': '\n'.join(self.MISC_INFO),
Kelvin Zhang39aea442020-08-17 11:04:25 -04001716 'META/ab_partitions.txt': '\n'.join(['system', 'vendor', 'product']),
Tianjied6867162020-05-10 14:30:13 -07001717 'SYSTEM/build.prop': '\n'.join(source_build_prop),
1718 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1719 'VENDOR/etc/build_std.prop':
1720 'ro.product.vendor.device=vendor-device-std',
1721 'VENDOR/etc/build_pro.prop':
1722 'ro.product.vendor.device=vendor-device-pro',
1723 }, source_dir)
1724 common.OPTIONS.incremental_source = source_dir
1725
1726 target_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
1727 source_info = common.BuildInfo(common.LoadInfoDict(source_dir))
1728
Tianjiea2076132020-08-19 17:25:32 -07001729 metadata_proto = GetPackageMetadata(target_info, source_info)
1730 metadata_dict = BuildLegacyOtaMetadata(metadata_proto)
Tianjied6867162020-05-10 14:30:13 -07001731 self.assertEqual(
1732 'vendor-device-pro|vendor-device-std|vendor-product-device',
Tianjiea2076132020-08-19 17:25:32 -07001733 metadata_dict['pre-device'])
Tianjie2bb14862020-08-28 16:24:34 -07001734 source_suffix = ':source-version-release/source-build-id/' \
1735 'source-version-incremental:build-type/build-tags'
Tianjied6867162020-05-10 14:30:13 -07001736 pre_fingerprints = [
1737 'vendor-product-brand/vendor-product-name/vendor-device-pro'
Tianjie2bb14862020-08-28 16:24:34 -07001738 '{}'.format(source_suffix),
Tianjied6867162020-05-10 14:30:13 -07001739 'vendor-product-brand/vendor-product-name/vendor-device-std'
Tianjie2bb14862020-08-28 16:24:34 -07001740 '{}'.format(source_suffix),
Tianjied6867162020-05-10 14:30:13 -07001741 'vendor-product-brand/vendor-product-name/vendor-product-device'
Tianjie2bb14862020-08-28 16:24:34 -07001742 '{}'.format(source_suffix),
Tianjied6867162020-05-10 14:30:13 -07001743 ]
Tianjiea2076132020-08-19 17:25:32 -07001744 self.assertEqual('|'.join(pre_fingerprints), metadata_dict['pre-build'])
Tianjied6867162020-05-10 14:30:13 -07001745
1746 post_fingerprints = [
1747 self.constructFingerprint(
1748 'vendor-product-brand/vendor-product-name/vendor-device-pro'),
1749 self.constructFingerprint(
1750 'vendor-product-brand/vendor-product-name/vendor-device-std'),
1751 self.constructFingerprint(
1752 'vendor-product-brand/vendor-product-name/vendor-product-device'),
1753 ]
Tianjiea2076132020-08-19 17:25:32 -07001754 self.assertEqual('|'.join(post_fingerprints), metadata_dict['post-build'])
1755
1756 self.CheckMetadataEqual(metadata_dict, metadata_proto)
Tianjie2bb14862020-08-28 16:24:34 -07001757
1758 pre_partition_states = metadata_proto.precondition.partition_state
1759 self.assertEqual(2, len(pre_partition_states))
1760 self.assertEqual('system', pre_partition_states[0].partition_name)
1761 self.assertEqual(['generic'], pre_partition_states[0].device)
1762 self.assertEqual(['generic/generic/generic{}'.format(source_suffix)],
1763 pre_partition_states[0].build)
1764
1765 self.assertEqual('vendor', pre_partition_states[1].partition_name)
1766 self.assertEqual(['vendor-device-pro', 'vendor-device-std',
1767 'vendor-product-device'], pre_partition_states[1].device)
1768 vendor_fingerprints = post_fingerprints
1769 self.assertEqual(vendor_fingerprints, pre_partition_states[1].build)
1770
1771 post_partition_states = metadata_proto.postcondition.partition_state
1772 self.assertEqual(2, len(post_partition_states))
1773 self.assertEqual('system', post_partition_states[0].partition_name)
1774 self.assertEqual(['generic'], post_partition_states[0].device)
1775 self.assertEqual([self.constructFingerprint('generic/generic/generic')],
1776 post_partition_states[0].build)
1777
1778 self.assertEqual('vendor', post_partition_states[1].partition_name)
1779 self.assertEqual(['vendor-device-pro', 'vendor-device-std',
1780 'vendor-product-device'], post_partition_states[1].device)
1781 self.assertEqual(vendor_fingerprints, post_partition_states[1].build)