blob: 18b2b76227574d57fa50de8abc008775c6916cd0 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Tao Bao30df8b42018-04-23 15:32:53 -070088Non-A/B OTA specific options
89
90 -b (--binary) <file>
91 Use the given binary as the update-binary in the output package, instead
92 of the binary in the build's target_files. Use for development only.
93
94 --block
95 Generate a block-based OTA for non-A/B device. We have deprecated the
96 support for file-based OTA since O. Block-based OTA will be used by
97 default for all non-A/B devices. Keeping this flag here to not break
98 existing callers.
99
100 -e (--extra_script) <file>
101 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700102
leozwangaa6c1a12015-08-14 10:57:58 -0700103 --full_bootloader
104 Similar to --full_radio. When generating an incremental OTA, always
105 include a full copy of bootloader image.
106
Tao Bao30df8b42018-04-23 15:32:53 -0700107 --full_radio
108 When generating an incremental OTA, always include a full copy of radio
109 image. This option is only meaningful when -i is specified, because a full
110 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700111
Tao Bao30df8b42018-04-23 15:32:53 -0700112 --log_diff <file>
113 Generate a log file that shows the differences in the source and target
114 builds for an incremental package. This option is only meaningful when -i
115 is specified.
116
117 -o (--oem_settings) <main_file[,additional_files...]>
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800118 Comma seperated list of files used to specify the expected OEM-specific
Tao Bao481bab82017-12-21 11:23:09 -0800119 properties on the OEM partition of the intended device. Multiple expected
120 values can be used by providing multiple files. Only the first dict will
121 be used to compute fingerprint, while the rest will be used to assert
122 OEM-specific properties.
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Doug Zongkereef39442009-04-02 12:14:19 -0700205"""
206
Tao Bao89fbb0f2017-01-10 10:47:58 -0800207from __future__ import print_function
208
Tao Bao32fcdab2018-10-12 10:30:39 -0700209import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700210import multiprocessing
Tao Bao2dd1c482017-02-03 16:49:39 -0800211import os.path
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700212import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800213import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800214import struct
Tao Bao481bab82017-12-21 11:23:09 -0800215import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700216import zipfile
217
218import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400219import ota_utils
Kelvin Zhang0876c412020-06-23 15:06:58 -0400220import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400221from check_target_files_vintf import CheckVintfIfTrebleEnabled
222from non_ab_ota import GenerateNonAbOtaPackage
223from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
224 PropertyFiles)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400225
Tao Bao481bab82017-12-21 11:23:09 -0800226if sys.hexversion < 0x02070000:
227 print("Python 2.7 or newer is required.", file=sys.stderr)
228 sys.exit(1)
229
Tao Bao32fcdab2018-10-12 10:30:39 -0700230logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800231
Kelvin Zhang2e417382020-08-20 11:33:11 -0400232OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700233OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700234OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700235OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700236OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700237OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
238if OPTIONS.worker_threads == 0:
239 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800240OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800241OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800242OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800243OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000244OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700245OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800246OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700247OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700248OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700249# Stash size cannot exceed cache_size * threshold.
250OPTIONS.cache_size = None
251OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800252OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700253OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700254OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700255OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700256OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800257OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800258OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700259OPTIONS.disable_fec_computation = False
Tao Bao15a146a2018-02-21 16:06:59 -0800260
Tao Bao8dcf7382015-05-21 14:09:49 -0700261
Tao Bao15a146a2018-02-21 16:06:59 -0800262POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800263DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800264AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400265
Tao Baof0c4aa22018-04-30 20:29:30 -0700266# Files to be unzipped for target diffing purpose.
267TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700268 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700269 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800270RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700271
272# Images to be excluded from secondary payload. We essentially only keep
273# 'system_other' and bootloader partitions.
274SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000275 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700276 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700277 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800278
Tao Bao2dd1c482017-02-03 16:49:39 -0800279
Tao Baofabe0832018-01-17 15:52:28 -0800280class PayloadSigner(object):
281 """A class that wraps the payload signing works.
282
283 When generating a Payload, hashes of the payload and metadata files will be
284 signed with the device key, either by calling an external payload signer or
285 by calling openssl with the package key. This class provides a unified
286 interface, so that callers can just call PayloadSigner.Sign().
287
288 If an external payload signer has been specified (OPTIONS.payload_signer), it
289 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
290 that the signing key should be provided as part of the payload_signer_args.
291 Otherwise without an external signer, it uses the package key
292 (OPTIONS.package_key) and calls openssl for the signing works.
293 """
294
295 def __init__(self):
296 if OPTIONS.payload_signer is None:
297 # Prepare the payload signing key.
298 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
299 pw = OPTIONS.key_passwords[OPTIONS.package_key]
300
301 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
302 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
303 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
304 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700305 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800306
307 self.signer = "openssl"
308 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
309 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700310 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
311 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800312 else:
313 self.signer = OPTIONS.payload_signer
314 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700315 if OPTIONS.payload_signer_maximum_signature_size:
316 self.maximum_signature_size = int(
317 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700318 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700319 # The legacy config uses RSA2048 keys.
320 logger.warning("The maximum signature size for payload signer is not"
321 " set, default to 256 bytes.")
322 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700323
324 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700325 def _GetMaximumSignatureSizeInBytes(signing_key):
326 out_signature_size_file = common.MakeTempFile("signature_size")
327 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
328 out_signature_size_file), "--private_key={}".format(signing_key)]
329 common.RunAndCheckOutput(cmd)
330 with open(out_signature_size_file) as f:
331 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100332 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700333 signature_size)
334 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800335
336 def Sign(self, in_file):
337 """Signs the given input file. Returns the output filename."""
338 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
339 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700340 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800341 return out_file
342
343
Tao Bao40b18822018-01-30 18:19:04 -0800344class Payload(object):
345 """Manages the creation and the signing of an A/B OTA Payload."""
346
347 PAYLOAD_BIN = 'payload.bin'
348 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800349 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
350 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800351
Tao Bao667ff572018-02-10 00:02:40 -0800352 def __init__(self, secondary=False):
353 """Initializes a Payload instance.
354
355 Args:
356 secondary: Whether it's generating a secondary payload (default: False).
357 """
Tao Bao40b18822018-01-30 18:19:04 -0800358 self.payload_file = None
359 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800360 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800361
Tao Baof0c4aa22018-04-30 20:29:30 -0700362 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700363 # Don't pipe (buffer) the output if verbose is set. Let
364 # brillo_update_payload write to stdout/stderr directly, so its progress can
365 # be monitored.
366 if OPTIONS.verbose:
367 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
368 else:
369 common.RunAndCheckOutput(cmd)
370
Tao Bao40b18822018-01-30 18:19:04 -0800371 def Generate(self, target_file, source_file=None, additional_args=None):
372 """Generates a payload from the given target-files zip(s).
373
374 Args:
375 target_file: The filename of the target build target-files zip.
376 source_file: The filename of the source build target-files zip; or None if
377 generating a full OTA.
378 additional_args: A list of additional args that should be passed to
379 brillo_update_payload script; or None.
380 """
381 if additional_args is None:
382 additional_args = []
383
384 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
385 cmd = ["brillo_update_payload", "generate",
386 "--payload", payload_file,
387 "--target_image", target_file]
388 if source_file is not None:
389 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700390 if OPTIONS.disable_fec_computation:
391 cmd.extend(["--disable_fec_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800392 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700393 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800394
395 self.payload_file = payload_file
396 self.payload_properties = None
397
398 def Sign(self, payload_signer):
399 """Generates and signs the hashes of the payload and metadata.
400
401 Args:
402 payload_signer: A PayloadSigner() instance that serves the signing work.
403
404 Raises:
405 AssertionError: On any failure when calling brillo_update_payload script.
406 """
407 assert isinstance(payload_signer, PayloadSigner)
408
409 # 1. Generate hashes of the payload and metadata files.
410 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
411 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
412 cmd = ["brillo_update_payload", "hash",
413 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700414 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800415 "--metadata_hash_file", metadata_sig_file,
416 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700417 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800418
419 # 2. Sign the hashes.
420 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
421 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
422
423 # 3. Insert the signatures back into the payload file.
424 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
425 suffix=".bin")
426 cmd = ["brillo_update_payload", "sign",
427 "--unsigned_payload", self.payload_file,
428 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700429 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800430 "--metadata_signature_file", signed_metadata_sig_file,
431 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700432 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800433
434 # 4. Dump the signed payload properties.
435 properties_file = common.MakeTempFile(prefix="payload-properties-",
436 suffix=".txt")
437 cmd = ["brillo_update_payload", "properties",
438 "--payload", signed_payload_file,
439 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700440 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800441
Tao Bao667ff572018-02-10 00:02:40 -0800442 if self.secondary:
443 with open(properties_file, "a") as f:
444 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
445
Tao Bao40b18822018-01-30 18:19:04 -0800446 if OPTIONS.wipe_user_data:
447 with open(properties_file, "a") as f:
448 f.write("POWERWASH=1\n")
449
450 self.payload_file = signed_payload_file
451 self.payload_properties = properties_file
452
Tao Bao667ff572018-02-10 00:02:40 -0800453 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800454 """Writes the payload to the given zip.
455
456 Args:
457 output_zip: The output ZipFile instance.
458 """
459 assert self.payload_file is not None
460 assert self.payload_properties is not None
461
Tao Bao667ff572018-02-10 00:02:40 -0800462 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800463 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
464 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
465 else:
466 payload_arcname = Payload.PAYLOAD_BIN
467 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
468
Tao Bao40b18822018-01-30 18:19:04 -0800469 # Add the signed payload file and properties into the zip. In order to
470 # support streaming, we pack them as ZIP_STORED. So these entries can be
471 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800472 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800473 compress_type=zipfile.ZIP_STORED)
474 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800475 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800476 compress_type=zipfile.ZIP_STORED)
477
478
Tao Bao481bab82017-12-21 11:23:09 -0800479def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800480 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800481 if not oem_source:
482 return None
483
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800484 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800485 for oem_file in oem_source:
486 with open(oem_file) as fp:
487 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800488 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700489
Doug Zongkereef39442009-04-02 12:14:19 -0700490
Tao Baod3fc38a2018-03-08 16:09:01 -0800491class StreamingPropertyFiles(PropertyFiles):
492 """A subclass for computing the property-files for streaming A/B OTAs."""
493
494 def __init__(self):
495 super(StreamingPropertyFiles, self).__init__()
496 self.name = 'ota-streaming-property-files'
497 self.required = (
498 # payload.bin and payload_properties.txt must exist.
499 'payload.bin',
500 'payload_properties.txt',
501 )
502 self.optional = (
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700503 # care_map is available only if dm-verity is enabled.
504 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800505 'care_map.txt',
506 # compatibility.zip is available only if target supports Treble.
507 'compatibility.zip',
508 )
509
510
Tao Bao85f16982018-03-08 16:28:33 -0800511class AbOtaPropertyFiles(StreamingPropertyFiles):
512 """The property-files for A/B OTA that includes payload_metadata.bin info.
513
514 Since P, we expose one more token (aka property-file), in addition to the ones
515 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
516 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
517 doesn't exist as a separate ZIP entry, but can be used to verify if the
518 payload can be applied on the given device.
519
520 For backward compatibility, we keep both of the 'ota-streaming-property-files'
521 and the newly added 'ota-property-files' in P. The new token will only be
522 available in 'ota-property-files'.
523 """
524
525 def __init__(self):
526 super(AbOtaPropertyFiles, self).__init__()
527 self.name = 'ota-property-files'
528
529 def _GetPrecomputed(self, input_zip):
530 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
531 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
532
533 @staticmethod
534 def _GetPayloadMetadataOffsetAndSize(input_zip):
535 """Computes the offset and size of the payload metadata for a given package.
536
537 (From system/update_engine/update_metadata.proto)
538 A delta update file contains all the deltas needed to update a system from
539 one specific version to another specific version. The update format is
540 represented by this struct pseudocode:
541
542 struct delta_update_file {
543 char magic[4] = "CrAU";
544 uint64 file_format_version;
545 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
546
547 // Only present if format_version > 1:
548 uint32 metadata_signature_size;
549
550 // The Bzip2 compressed DeltaArchiveManifest
551 char manifest[metadata_signature_size];
552
553 // The signature of the metadata (from the beginning of the payload up to
554 // this location, not including the signature itself). This is a
555 // serialized Signatures message.
556 char medatada_signature_message[metadata_signature_size];
557
558 // Data blobs for files, no specific format. The specific offset
559 // and length of each data blob is recorded in the DeltaArchiveManifest.
560 struct {
561 char data[];
562 } blobs[];
563
564 // These two are not signed:
565 uint64 payload_signatures_message_size;
566 char payload_signatures_message[];
567 };
568
569 'payload-metadata.bin' contains all the bytes from the beginning of the
570 payload, till the end of 'medatada_signature_message'.
571 """
572 payload_info = input_zip.getinfo('payload.bin')
Shashikant Baviskar338856f2018-04-12 12:11:22 +0900573 payload_offset = payload_info.header_offset
574 payload_offset += zipfile.sizeFileHeader
575 payload_offset += len(payload_info.extra) + len(payload_info.filename)
Tao Bao85f16982018-03-08 16:28:33 -0800576 payload_size = payload_info.file_size
577
Tao Bao59cf0c52019-06-25 10:04:24 -0700578 with input_zip.open('payload.bin') as payload_fp:
Tao Bao85f16982018-03-08 16:28:33 -0800579 header_bin = payload_fp.read(24)
580
581 # network byte order (big-endian)
582 header = struct.unpack("!IQQL", header_bin)
583
584 # 'CrAU'
585 magic = header[0]
586 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic)
587
588 manifest_size = header[2]
589 metadata_signature_size = header[3]
590 metadata_total = 24 + manifest_size + metadata_signature_size
591 assert metadata_total < payload_size
592
593 return (payload_offset, metadata_total)
594
595
Tao Bao15a146a2018-02-21 16:06:59 -0800596def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800597 """Returns a target-files.zip file for generating secondary payload.
598
599 Although the original target-files.zip already contains secondary slot
600 images (i.e. IMAGES/system_other.img), we need to rename the files to the
601 ones without _other suffix. Note that we cannot instead modify the names in
602 META/ab_partitions.txt, because there are no matching partitions on device.
603
604 For the partitions that don't have secondary images, the ones for primary
605 slot will be used. This is to ensure that we always have valid boot, vbmeta,
606 bootloader images in the inactive slot.
607
608 Args:
609 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800610 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800611
612 Returns:
613 The filename of the target-files.zip for generating secondary payload.
614 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700615
616 def GetInfoForSecondaryImages(info_file):
617 """Updates info file for secondary payload generation.
618
619 Scan each line in the info file, and remove the unwanted partitions from
620 the dynamic partition list in the related properties. e.g.
621 "super_google_dynamic_partitions_partition_list=system vendor product"
622 will become "super_google_dynamic_partitions_partition_list=system".
623
624 Args:
625 info_file: The input info file. e.g. misc_info.txt.
626
627 Returns:
628 A string of the updated info content.
629 """
630
631 output_list = []
632 with open(info_file) as f:
633 lines = f.read().splitlines()
634
635 # The suffix in partition_list variables that follows the name of the
636 # partition group.
637 LIST_SUFFIX = 'partition_list'
638 for line in lines:
639 if line.startswith('#') or '=' not in line:
640 output_list.append(line)
641 continue
642 key, value = line.strip().split('=', 1)
643 if key == 'dynamic_partition_list' or key.endswith(LIST_SUFFIX):
644 partitions = value.split()
645 partitions = [partition for partition in partitions if partition
Tao Bao3e759462019-09-17 22:43:11 -0700646 not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Tianjie Xu1c808002019-09-11 00:29:26 -0700647 output_list.append('{}={}'.format(key, ' '.join(partitions)))
Kelvin Zhang0876c412020-06-23 15:06:58 -0400648 elif key in ['virtual_ab', "virtual_ab_retrofit"]:
Yifan Hongfe073432019-11-01 12:28:31 -0700649 # Remove virtual_ab flag from secondary payload so that OTA client
650 # don't use snapshots for secondary update
651 pass
Tianjie Xu1c808002019-09-11 00:29:26 -0700652 else:
653 output_list.append(line)
654 return '\n'.join(output_list)
655
Tao Baof7140c02018-01-30 17:09:24 -0800656 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
657 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
658
Kelvin Zhang928c2342020-09-22 16:15:57 -0400659 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800660 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700661
Tao Bao0ff15de2019-03-20 11:26:06 -0700662 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800663 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800664 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
665 if info.filename == 'IMAGES/system_other.img':
666 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
667
668 # Primary images and friends need to be skipped explicitly.
669 elif info.filename in ('IMAGES/system.img',
670 'IMAGES/system.map'):
671 pass
Tao Bao3e759462019-09-17 22:43:11 -0700672
673 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
674 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
675 image_name = os.path.basename(info.filename)
676 if image_name not in ['{}.img'.format(partition) for partition in
677 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
678 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800679
Tao Bao15a146a2018-02-21 16:06:59 -0800680 # Skip copying the postinstall config if requested.
681 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
682 pass
683
Tianjie Xu1c808002019-09-11 00:29:26 -0700684 elif info.filename.startswith('META/'):
685 # Remove the unnecessary partitions for secondary images from the
686 # ab_partitions file.
687 if info.filename == AB_PARTITIONS:
688 with open(unzipped_file) as f:
689 partition_list = f.read().splitlines()
690 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700691 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400692 common.ZipWriteStr(target_zip, info.filename,
693 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700694 # Remove the unnecessary partitions from the dynamic partitions list.
695 elif (info.filename == 'META/misc_info.txt' or
696 info.filename == DYNAMIC_PARTITION_INFO):
697 modified_info = GetInfoForSecondaryImages(unzipped_file)
698 common.ZipWriteStr(target_zip, info.filename, modified_info)
699 else:
700 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800701
Tao Baof7140c02018-01-30 17:09:24 -0800702 common.ZipClose(target_zip)
703
704 return target_file
705
706
Tao Bao15a146a2018-02-21 16:06:59 -0800707def GetTargetFilesZipWithoutPostinstallConfig(input_file):
708 """Returns a target-files.zip that's not containing postinstall_config.txt.
709
710 This allows brillo_update_payload script to skip writing all the postinstall
711 hooks in the generated payload. The input target-files.zip file will be
712 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
713 contain the postinstall_config.txt entry, the input file will be returned.
714
715 Args:
716 input_file: The input target-files.zip filename.
717
718 Returns:
719 The filename of target-files.zip that doesn't contain postinstall config.
720 """
721 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400722 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800723 if POSTINSTALL_CONFIG not in input_zip.namelist():
724 return input_file
725
726 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
727 shutil.copyfile(input_file, target_file)
728 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
729 return target_file
730
731
Yifan Hong50e79542018-11-08 17:44:12 -0800732def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800733 super_block_devices,
734 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800735 """Returns a target-files.zip for retrofitting dynamic partitions.
736
737 This allows brillo_update_payload to generate an OTA based on the exact
738 bits on the block devices. Postinstall is disabled.
739
740 Args:
741 input_file: The input target-files.zip filename.
742 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800743 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800744
745 Returns:
746 The filename of target-files.zip with *.img replaced with super_*.img for
747 each block device in super_block_devices.
748 """
749 assert super_block_devices, "No super_block_devices are specified."
750
751 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800752 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800753
754 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
755 shutil.copyfile(input_file, target_file)
756
Kelvin Zhang928c2342020-09-22 16:15:57 -0400757 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800758 namelist = input_zip.namelist()
759
Yifan Hongb433eba2019-03-06 12:42:53 -0800760 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
761
762 # Remove partitions from META/ab_partitions.txt that is in
763 # dynamic_partition_list but not in super_block_devices so that
764 # brillo_update_payload won't generate update for those logical partitions.
765 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
766 with open(ab_partitions_file) as f:
767 ab_partitions_lines = f.readlines()
768 ab_partitions = [line.strip() for line in ab_partitions_lines]
769 # Assert that all super_block_devices are in ab_partitions
770 super_device_not_updated = [partition for partition in super_block_devices
771 if partition not in ab_partitions]
772 assert not super_device_not_updated, \
773 "{} is in super_block_devices but not in {}".format(
774 super_device_not_updated, AB_PARTITIONS)
775 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400776 new_ab_partitions = common.MakeTempFile(
777 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800778 with open(new_ab_partitions, 'w') as f:
779 for partition in ab_partitions:
780 if (partition in dynamic_partition_list and
Kelvin Zhang39aea442020-08-17 11:04:25 -0400781 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700782 logger.info("Dropping %s from ab_partitions.txt", partition)
783 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800784 f.write(partition + "\n")
785 to_delete = [AB_PARTITIONS]
786
Yifan Hong50e79542018-11-08 17:44:12 -0800787 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800788 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800789
790 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
791 # is a regular update on devices without dynamic partitions support.
792 to_delete += [DYNAMIC_PARTITION_INFO]
793
Tao Bao03fecb62018-11-28 10:59:23 -0800794 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700795 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800796 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800797
798 common.ZipDelete(target_file, to_delete)
799
Yifan Hong50e79542018-11-08 17:44:12 -0800800 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
801
802 # Write super_{foo}.img as {foo}.img.
803 for src, dst in replace.items():
804 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700805 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800806 unzipped_file = os.path.join(input_tmp, *src.split('/'))
807 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
808
Yifan Hongb433eba2019-03-06 12:42:53 -0800809 # Write new ab_partitions.txt file
810 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
811
Yifan Hong50e79542018-11-08 17:44:12 -0800812 common.ZipClose(target_zip)
813
814 return target_file
815
816
Tao Baof0c4aa22018-04-30 20:29:30 -0700817def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -0800818 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -0700819 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -0800820 if not OPTIONS.no_signing:
821 staging_file = common.MakeTempFile(suffix='.zip')
822 else:
823 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -0800824 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang928c2342020-09-22 16:15:57 -0400825 compression=zipfile.ZIP_DEFLATED, allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -0800826
Tao Bao481bab82017-12-21 11:23:09 -0800827 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -0400828 assert "ab_partitions" in OPTIONS.source_info_dict, \
829 "META/ab_partitions.txt is required for ab_update."
830 assert "ab_partitions" in OPTIONS.target_info_dict, \
831 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -0700832 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
833 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -0800834 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -0400835 assert "ab_partitions" in OPTIONS.info_dict, \
836 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -0700837 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -0800838 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -0800839
Yifan Hong50e79542018-11-08 17:44:12 -0800840 if OPTIONS.retrofit_dynamic_partitions:
841 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -0800842 target_file, target_info.get("super_block_devices").strip().split(),
843 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong50e79542018-11-08 17:44:12 -0800844 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -0800845 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -0400846 # Target_file may have been modified, reparse ab_partitions
847 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
848 target_info.info_dict['ab_partitions'] = zfp.read(
849 AB_PARTITIONS).strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -0800850
Kelvin Zhang39aea442020-08-17 11:04:25 -0400851 # Metadata to comply with Android OTA package format.
852 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -0800853 # Generate payload.
854 payload = Payload()
855
Kelvin Zhang39aea442020-08-17 11:04:25 -0400856 partition_timestamps = []
Tao Bao40b18822018-01-30 18:19:04 -0800857 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -0700858 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -0800859 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Tao Baoff1b86e2017-10-03 14:17:57 -0700860 else:
Tianjiea2076132020-08-19 17:25:32 -0700861 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhang39aea442020-08-17 11:04:25 -0400862 partition_timestamps = [
863 part.partition_name + ":" + part.version
864 for part in metadata.postcondition.partition_state]
Tao Bao40b18822018-01-30 18:19:04 -0800865 additional_args = ["--max_timestamp", max_timestamp]
Kelvin Zhang39aea442020-08-17 11:04:25 -0400866 if partition_timestamps:
867 additional_args.extend(
868 ["--partition_timestamps", ",".join(
869 partition_timestamps)]
870 )
Tao Baoc098e9e2016-01-07 13:03:56 -0800871
Tao Bao40b18822018-01-30 18:19:04 -0800872 payload.Generate(target_file, source_file, additional_args)
Tao Baoc098e9e2016-01-07 13:03:56 -0800873
Tao Bao40b18822018-01-30 18:19:04 -0800874 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -0800875 payload_signer = PayloadSigner()
876 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -0800877
Tao Bao40b18822018-01-30 18:19:04 -0800878 # Write the payload into output zip.
879 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -0800880
Tao Baof7140c02018-01-30 17:09:24 -0800881 # Generate and include the secondary payload that installs secondary images
882 # (e.g. system_other.img).
883 if OPTIONS.include_secondary:
884 # We always include a full payload for the secondary slot, even when
885 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -0800886 secondary_target_file = GetTargetFilesZipForSecondaryImages(
887 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -0800888 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -0800889 secondary_payload.Generate(secondary_target_file,
890 additional_args=additional_args)
Tao Baof7140c02018-01-30 17:09:24 -0800891 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -0800892 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -0800893
Tianjie Xucfa86222016-03-07 16:31:19 -0800894 # If dm-verity is supported for the device, copy contents of care_map
895 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400896 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -0800897 if (target_info.get("verity") == "true" or
Kelvin Zhang39aea442020-08-17 11:04:25 -0400898 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700899 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
900 "META/" + x in target_zip.namelist()]
901
902 # Adds care_map if either the protobuf format or the plain text one exists.
903 if care_map_list:
904 care_map_name = care_map_list[0]
905 care_map_data = target_zip.read("META/" + care_map_name)
906 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -0800907 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700908 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -0800909 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -0800910 else:
Tao Bao32fcdab2018-10-12 10:30:39 -0700911 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -0700912
Tao Bao21803d32017-04-19 10:16:09 -0700913 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -0800914
Yifan Hong9276cf02019-08-21 16:37:04 -0700915 CheckVintfIfTrebleEnabled(target_file, target_info)
916
Tao Baofe5b69a2018-03-02 09:47:43 -0800917 # We haven't written the metadata entry yet, which will be handled in
918 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -0800919 common.ZipClose(output_zip)
920
Tao Bao85f16982018-03-08 16:28:33 -0800921 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
922 # all the info of the latter. However, system updaters and OTA servers need to
923 # take time to switch to the new flag. We keep both of the flags for
924 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -0800925 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -0800926 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -0800927 StreamingPropertyFiles(),
928 )
929 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -0800930
Tao Baoc098e9e2016-01-07 13:03:56 -0800931
Doug Zongkereef39442009-04-02 12:14:19 -0700932def main(argv):
933
934 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -0700935 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -0700936 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -0700937 elif o in ("-i", "--incremental_from"):
938 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -0700939 elif o == "--full_radio":
940 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -0700941 elif o == "--full_bootloader":
942 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -0800943 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700944 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -0800945 elif o == "--downgrade":
946 OPTIONS.downgrade = True
947 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -0800948 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -0700949 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -0700950 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800951 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -0800952 elif o == "--oem_no_mount":
953 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -0700954 elif o in ("-e", "--extra_script"):
955 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +0200956 elif o in ("-t", "--worker_threads"):
957 if a.isdigit():
958 OPTIONS.worker_threads = int(a)
959 else:
960 raise ValueError("Cannot parse value %r for option %r - only "
961 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800962 elif o in ("-2", "--two_step"):
963 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -0800964 elif o == "--include_secondary":
965 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -0800966 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +0900967 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -0700968 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -0700969 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -0800970 elif o == "--block":
971 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800972 elif o in ("-b", "--binary"):
973 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -0700974 elif o == "--stash_threshold":
975 try:
976 OPTIONS.stash_threshold = float(a)
977 except ValueError:
978 raise ValueError("Cannot parse value %r for option %r - expecting "
979 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -0800980 elif o == "--log_diff":
981 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -0700982 elif o == "--payload_signer":
983 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700984 elif o == "--payload_signer_args":
985 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700986 elif o == "--payload_signer_maximum_signature_size":
987 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -0700988 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700989 # TODO(Xunchang) remove this option after cleaning up the callers.
990 logger.warning("The option '--payload_signer_key_size' is deprecated."
991 " Use '--payload_signer_maximum_signature_size' instead.")
992 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -0700993 elif o == "--extracted_input_target_files":
994 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -0800995 elif o == "--skip_postinstall":
996 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -0800997 elif o == "--retrofit_dynamic_partitions":
998 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -0800999 elif o == "--skip_compatibility_check":
1000 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001001 elif o == "--output_metadata_path":
1002 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001003 elif o == "--disable_fec_computation":
1004 OPTIONS.disable_fec_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001005 elif o == "--force_non_ab":
1006 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001007 elif o == "--boot_variable_file":
1008 OPTIONS.boot_variable_file = a
Doug Zongkereef39442009-04-02 12:14:19 -07001009 else:
1010 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001011 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001012
1013 args = common.ParseOptions(argv, __doc__,
Tao Bao337633f2017-12-06 15:20:19 -08001014 extra_opts="b:k:i:d:e:t:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001015 extra_long_opts=[
Dan Albert8b72aef2015-03-23 19:13:21 -07001016 "package_key=",
1017 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001018 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001019 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001020 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001021 "downgrade",
Tao Bao3e6161a2017-02-28 11:48:48 -08001022 "override_timestamp",
Dan Albert8b72aef2015-03-23 19:13:21 -07001023 "extra_script=",
1024 "worker_threads=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001025 "two_step",
Tao Baof7140c02018-01-30 17:09:24 -08001026 "include_secondary",
Dan Albert8b72aef2015-03-23 19:13:21 -07001027 "no_signing",
1028 "block",
1029 "binary=",
1030 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001031 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001032 "verify",
Tao Bao8dcf7382015-05-21 14:09:49 -07001033 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001034 "log_diff=",
Tao Baodea0f8b2016-06-20 17:55:06 -07001035 "payload_signer=",
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001036 "payload_signer_args=",
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001037 "payload_signer_maximum_signature_size=",
xunchang376cc7c2019-04-08 23:04:58 -07001038 "payload_signer_key_size=",
Dan Willemsencea5cd22017-03-21 14:44:27 -07001039 "extracted_input_target_files=",
Tao Bao15a146a2018-02-21 16:06:59 -08001040 "skip_postinstall",
Yifan Hong50e79542018-11-08 17:44:12 -08001041 "retrofit_dynamic_partitions",
xunchangabfa2652019-02-19 16:27:10 -08001042 "skip_compatibility_check",
xunchang1cfe2512019-02-19 14:14:48 -08001043 "output_metadata_path=",
Tianjie Xu1b079832019-08-28 12:19:23 -07001044 "disable_fec_computation",
Yifan Hong65afc072020-04-17 10:08:10 -07001045 "force_non_ab",
Tianjied6867162020-05-10 14:30:13 -07001046 "boot_variable_file=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001047 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001048
1049 if len(args) != 2:
1050 common.Usage(__doc__)
1051 sys.exit(1)
1052
Tao Bao32fcdab2018-10-12 10:30:39 -07001053 common.InitLogging()
1054
Tao Bao5d182562016-02-23 11:38:39 -08001055 if OPTIONS.downgrade:
Tao Bao5d182562016-02-23 11:38:39 -08001056 # We should only allow downgrading incrementals (as opposed to full).
1057 # Otherwise the device may go back from arbitrary build with this full
1058 # OTA package.
1059 if OPTIONS.incremental_source is None:
Elliott Hughesd8a52f92016-06-20 14:35:47 -07001060 raise ValueError("Cannot generate downgradable full OTAs")
Tao Bao5d182562016-02-23 11:38:39 -08001061
Tao Bao2db13852018-01-08 22:28:57 -08001062 # Load the build info dicts from the zip directly or the extracted input
1063 # directory. We don't need to unzip the entire target-files zips, because they
1064 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1065 # When loading the info dicts, we don't need to provide the second parameter
1066 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1067 # some properties with their actual paths, such as 'selinux_fc',
1068 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001069 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001070 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001071 else:
Kelvin Zhang928c2342020-09-22 16:15:57 -04001072 with zipfile.ZipFile(args[0], 'r', allowZip64=True) as input_zip:
Tao Bao2db13852018-01-08 22:28:57 -08001073 OPTIONS.info_dict = common.LoadInfoDict(input_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001074
Tao Bao32fcdab2018-10-12 10:30:39 -07001075 logger.info("--- target info ---")
1076 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001077
1078 # Load the source build dict if applicable.
1079 if OPTIONS.incremental_source is not None:
1080 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhang928c2342020-09-22 16:15:57 -04001081 with zipfile.ZipFile(OPTIONS.incremental_source, 'r', allowZip64=True) as source_zip:
Tao Bao2db13852018-01-08 22:28:57 -08001082 OPTIONS.source_info_dict = common.LoadInfoDict(source_zip)
1083
Tao Bao32fcdab2018-10-12 10:30:39 -07001084 logger.info("--- source info ---")
1085 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001086
1087 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001088 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1089
Yifan Hong50e79542018-11-08 17:44:12 -08001090 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001091 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001092 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001093 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang39aea442020-08-17 11:04:25 -04001094 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001095 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1096 raise common.ExternalError(
1097 "Expect to generate incremental OTA for retrofitting dynamic "
1098 "partitions, but dynamic_partition_retrofit is not set in target "
1099 "build.")
1100 logger.info("Implicitly generating retrofit incremental OTA.")
1101 OPTIONS.retrofit_dynamic_partitions = True
1102
1103 # Skip postinstall for retrofitting dynamic partitions.
1104 if OPTIONS.retrofit_dynamic_partitions:
1105 OPTIONS.skip_postinstall = True
1106
Tao Baoc098e9e2016-01-07 13:03:56 -08001107 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001108 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1109 if OPTIONS.force_non_ab:
1110 assert allow_non_ab, "--force_non_ab only allowed on devices that supports non-A/B"
1111 assert ab_update, "--force_non_ab only allowed on A/B devices"
1112
1113 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001114
Christian Oderf63e2cd2017-05-01 22:30:15 +02001115 # Use the default key to sign the package if not specified with package_key.
1116 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001117 # A/B update is getting created.
1118 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001119 if OPTIONS.package_key is None:
1120 OPTIONS.package_key = OPTIONS.info_dict.get(
1121 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001122 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001123 # Get signing keys
1124 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
1125
Yifan Hong65afc072020-04-17 10:08:10 -07001126 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001127 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001128 target_file=args[0],
1129 output_file=args[1],
1130 source_file=OPTIONS.incremental_source)
1131
Dan Willemsencea5cd22017-03-21 14:44:27 -07001132 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001133 GenerateNonAbOtaPackage(
1134 target_file=args[0],
1135 output_file=args[1],
1136 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001137
Tao Baof0c4aa22018-04-30 20:29:30 -07001138 # Post OTA generation works.
1139 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1140 logger.info("Generating diff logs...")
1141 logger.info("Unzipping target-files for diffing...")
1142 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1143 source_dir = common.UnzipTemp(
1144 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001145
Tao Baof0c4aa22018-04-30 20:29:30 -07001146 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001147 target_files_diff.recursiveDiff(
1148 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001149
Tao Bao32fcdab2018-10-12 10:30:39 -07001150 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001151
1152
1153if __name__ == '__main__':
1154 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001155 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001156 main(sys.argv[1:])
Tao Bao32fcdab2018-10-12 10:30:39 -07001157 except common.ExternalError:
1158 logger.exception("\n ERROR:\n")
Doug Zongkereef39442009-04-02 12:14:19 -07001159 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07001160 finally:
1161 common.Cleanup()