blob: 11cfee185a5ded782103fcf3f3d383caa86e1a49 [file] [log] [blame]
Tao Bao481bab82017-12-21 11:23:09 -08001#
2# Copyright (C) 2018 The Android Open Source Project
3#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16
17import copy
Tao Baoc7b403a2018-01-30 18:19:04 -080018import os
Tao Baofabe0832018-01-17 15:52:28 -080019import os.path
Tao Baoc7b403a2018-01-30 18:19:04 -080020import zipfile
Tao Bao481bab82017-12-21 11:23:09 -080021
22import common
Tianjiea2076132020-08-19 17:25:32 -070023import ota_metadata_pb2
Tao Bao04e1f012018-02-04 12:13:35 -080024import test_utils
Tianjiea2076132020-08-19 17:25:32 -070025from ota_utils import (
26 BuildLegacyOtaMetadata, CalculateRuntimeDevicesAndFingerprints,
Tianjiea5fca032021-06-01 22:06:28 -070027 ConstructOtaApexInfo, FinalizeMetadata, GetPackageMetadata, PropertyFiles)
Tao Bao481bab82017-12-21 11:23:09 -080028from ota_from_target_files import (
Tianjiea2076132020-08-19 17:25:32 -070029 _LoadOemDicts, AbOtaPropertyFiles,
Hongguang Chen49ab1b902020-10-19 14:15:43 -070030 GetTargetFilesZipForCustomImagesUpdates,
Yifan Hong38ab4d82020-06-18 15:19:56 -070031 GetTargetFilesZipForPartialUpdates,
Tianjiea2076132020-08-19 17:25:32 -070032 GetTargetFilesZipForSecondaryImages,
Kelvin Zhangcff4d762020-07-29 16:37:51 -040033 GetTargetFilesZipWithoutPostinstallConfig,
Tianjiea2076132020-08-19 17:25:32 -070034 Payload, PayloadSigner, POSTINSTALL_CONFIG,
Kelvin Zhang39aea442020-08-17 11:04:25 -040035 StreamingPropertyFiles, AB_PARTITIONS)
Daniel Normane9af70a2021-04-15 16:39:22 -070036from apex_utils import GetApexInfoFromTargetFiles
Kelvin Zhangcff4d762020-07-29 16:37:51 -040037from test_utils import PropertyFilesTestCase
Tao Baofabe0832018-01-17 15:52:28 -080038
Tianjiea2076132020-08-19 17:25:32 -070039
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +000040def construct_target_files(secondary=False, compressedApex=False):
Tao Baof7140c02018-01-30 17:09:24 -080041 """Returns a target-files.zip file for generating OTA packages."""
42 target_files = common.MakeTempFile(prefix='target_files-', suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -040043 with zipfile.ZipFile(target_files, 'w', allowZip64=True) as target_files_zip:
Tao Baof7140c02018-01-30 17:09:24 -080044 # META/update_engine_config.txt
45 target_files_zip.writestr(
46 'META/update_engine_config.txt',
47 "PAYLOAD_MAJOR_VERSION=2\nPAYLOAD_MINOR_VERSION=4\n")
48
Tao Bao15a146a2018-02-21 16:06:59 -080049 # META/postinstall_config.txt
50 target_files_zip.writestr(
51 POSTINSTALL_CONFIG,
52 '\n'.join([
53 "RUN_POSTINSTALL_system=true",
54 "POSTINSTALL_PATH_system=system/bin/otapreopt_script",
55 "FILESYSTEM_TYPE_system=ext4",
56 "POSTINSTALL_OPTIONAL_system=true",
57 ]))
58
Tao Bao5277d102018-04-17 23:47:21 -070059 ab_partitions = [
60 ('IMAGES', 'boot'),
61 ('IMAGES', 'system'),
62 ('IMAGES', 'vendor'),
63 ('RADIO', 'bootloader'),
64 ('RADIO', 'modem'),
65 ]
Tao Baof7140c02018-01-30 17:09:24 -080066 # META/ab_partitions.txt
Tao Baof7140c02018-01-30 17:09:24 -080067 target_files_zip.writestr(
68 'META/ab_partitions.txt',
Tao Bao5277d102018-04-17 23:47:21 -070069 '\n'.join([partition[1] for partition in ab_partitions]))
Tao Baof7140c02018-01-30 17:09:24 -080070
Kelvin Zhangc693d952020-07-22 19:21:22 -040071 # Create fake images for each of them.
Tao Bao5277d102018-04-17 23:47:21 -070072 for path, partition in ab_partitions:
73 target_files_zip.writestr(
74 '{}/{}.img'.format(path, partition),
75 os.urandom(len(partition)))
Tao Baof7140c02018-01-30 17:09:24 -080076
Tao Bao5277d102018-04-17 23:47:21 -070077 # system_other shouldn't appear in META/ab_partitions.txt.
Tao Baof7140c02018-01-30 17:09:24 -080078 if secondary:
79 target_files_zip.writestr('IMAGES/system_other.img',
80 os.urandom(len("system_other")))
81
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +000082 if compressedApex:
83 apex_file_name = 'com.android.apex.compressed.v1.capex'
84 apex_file = os.path.join(test_utils.get_current_dir(), apex_file_name)
85 target_files_zip.write(apex_file, 'SYSTEM/apex/' + apex_file_name)
86
Tao Baof7140c02018-01-30 17:09:24 -080087 return target_files
88
89
Tao Bao65b94e92018-10-11 21:57:26 -070090class LoadOemDictsTest(test_utils.ReleaseToolsTestCase):
Tao Bao481bab82017-12-21 11:23:09 -080091
92 def test_NoneDict(self):
93 self.assertIsNone(_LoadOemDicts(None))
94
95 def test_SingleDict(self):
96 dict_file = common.MakeTempFile()
97 with open(dict_file, 'w') as dict_fp:
98 dict_fp.write('abc=1\ndef=2\nxyz=foo\na.b.c=bar\n')
99
100 oem_dicts = _LoadOemDicts([dict_file])
101 self.assertEqual(1, len(oem_dicts))
102 self.assertEqual('foo', oem_dicts[0]['xyz'])
103 self.assertEqual('bar', oem_dicts[0]['a.b.c'])
104
105 def test_MultipleDicts(self):
106 oem_source = []
107 for i in range(3):
108 dict_file = common.MakeTempFile()
109 with open(dict_file, 'w') as dict_fp:
110 dict_fp.write(
111 'ro.build.index={}\ndef=2\nxyz=foo\na.b.c=bar\n'.format(i))
112 oem_source.append(dict_file)
113
114 oem_dicts = _LoadOemDicts(oem_source)
115 self.assertEqual(3, len(oem_dicts))
116 for i, oem_dict in enumerate(oem_dicts):
117 self.assertEqual('2', oem_dict['def'])
118 self.assertEqual('foo', oem_dict['xyz'])
119 self.assertEqual('bar', oem_dict['a.b.c'])
120 self.assertEqual('{}'.format(i), oem_dict['ro.build.index'])
Tao Baodf3a48b2018-01-10 16:30:43 -0800121
122
Tao Bao65b94e92018-10-11 21:57:26 -0700123class OtaFromTargetFilesTest(test_utils.ReleaseToolsTestCase):
Tao Baodf3a48b2018-01-10 16:30:43 -0800124 TEST_TARGET_INFO_DICT = {
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000125 'build.prop': common.PartitionBuildProps.FromDictionary(
126 'system', {
127 'ro.product.device': 'product-device',
128 'ro.build.fingerprint': 'build-fingerprint-target',
129 'ro.build.version.incremental': 'build-version-incremental-target',
130 'ro.build.version.sdk': '27',
131 'ro.build.version.security_patch': '2017-12-01',
132 'ro.build.date.utc': '1500000000'}
133 )
Tao Baodf3a48b2018-01-10 16:30:43 -0800134 }
135
136 TEST_SOURCE_INFO_DICT = {
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000137 'build.prop': common.PartitionBuildProps.FromDictionary(
138 'system', {
139 'ro.product.device': 'product-device',
140 'ro.build.fingerprint': 'build-fingerprint-source',
141 'ro.build.version.incremental': 'build-version-incremental-source',
142 'ro.build.version.sdk': '25',
143 'ro.build.version.security_patch': '2016-12-01',
144 'ro.build.date.utc': '1400000000'}
145 )
Tao Baodf3a48b2018-01-10 16:30:43 -0800146 }
147
Tao Bao1c320f82019-10-04 23:25:12 -0700148 TEST_INFO_DICT_USES_OEM_PROPS = {
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000149 'build.prop': common.PartitionBuildProps.FromDictionary(
150 'system', {
151 'ro.product.name': 'product-name',
152 'ro.build.thumbprint': 'build-thumbprint',
153 'ro.build.bar': 'build-bar'}
154 ),
155 'vendor.build.prop': common.PartitionBuildProps.FromDictionary(
156 'vendor', {
Tianjie2bb14862020-08-28 16:24:34 -0700157 'ro.vendor.build.fingerprint': 'vendor-build-fingerprint'}
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000158 ),
159 'property1': 'value1',
160 'property2': 4096,
161 'oem_fingerprint_properties': 'ro.product.device ro.product.brand',
Tao Bao1c320f82019-10-04 23:25:12 -0700162 }
163
Tao Baodf3a48b2018-01-10 16:30:43 -0800164 def setUp(self):
Tao Bao3bf8c652018-03-16 12:59:42 -0700165 self.testdata_dir = test_utils.get_testdata_dir()
166 self.assertTrue(os.path.exists(self.testdata_dir))
167
Tao Baodf3a48b2018-01-10 16:30:43 -0800168 # Reset the global options as in ota_from_target_files.py.
169 common.OPTIONS.incremental_source = None
170 common.OPTIONS.downgrade = False
Tao Bao393eeb42019-03-06 16:00:38 -0800171 common.OPTIONS.retrofit_dynamic_partitions = False
Tao Baodf3a48b2018-01-10 16:30:43 -0800172 common.OPTIONS.timestamp = False
173 common.OPTIONS.wipe_user_data = False
Tao Bao3bf8c652018-03-16 12:59:42 -0700174 common.OPTIONS.no_signing = False
175 common.OPTIONS.package_key = os.path.join(self.testdata_dir, 'testkey')
176 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400177 common.OPTIONS.package_key: None,
Tao Bao3bf8c652018-03-16 12:59:42 -0700178 }
179
180 common.OPTIONS.search_path = test_utils.get_search_path()
Tao Baodf3a48b2018-01-10 16:30:43 -0800181
Tianjiea2076132020-08-19 17:25:32 -0700182 @staticmethod
183 def GetLegacyOtaMetadata(target_info, source_info=None):
184 metadata_proto = GetPackageMetadata(target_info, source_info)
185 return BuildLegacyOtaMetadata(metadata_proto)
186
Tao Baodf3a48b2018-01-10 16:30:43 -0800187 def test_GetPackageMetadata_abOta_full(self):
188 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
189 target_info_dict['ab_update'] = 'true'
Kelvin Zhang39aea442020-08-17 11:04:25 -0400190 target_info_dict['ab_partitions'] = []
Tao Bao1c320f82019-10-04 23:25:12 -0700191 target_info = common.BuildInfo(target_info_dict, None)
Tianjiea2076132020-08-19 17:25:32 -0700192 metadata = self.GetLegacyOtaMetadata(target_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800193 self.assertDictEqual(
194 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400195 'ota-type': 'AB',
196 'ota-required-cache': '0',
197 'post-build': 'build-fingerprint-target',
198 'post-build-incremental': 'build-version-incremental-target',
199 'post-sdk-level': '27',
200 'post-security-patch-level': '2017-12-01',
201 'post-timestamp': '1500000000',
202 'pre-device': 'product-device',
Tao Baodf3a48b2018-01-10 16:30:43 -0800203 },
204 metadata)
205
206 def test_GetPackageMetadata_abOta_incremental(self):
207 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
208 target_info_dict['ab_update'] = 'true'
Kelvin Zhang39aea442020-08-17 11:04:25 -0400209 target_info_dict['ab_partitions'] = []
Tao Bao1c320f82019-10-04 23:25:12 -0700210 target_info = common.BuildInfo(target_info_dict, None)
211 source_info = common.BuildInfo(self.TEST_SOURCE_INFO_DICT, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800212 common.OPTIONS.incremental_source = ''
Tianjiea2076132020-08-19 17:25:32 -0700213 metadata = self.GetLegacyOtaMetadata(target_info, source_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800214 self.assertDictEqual(
215 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400216 'ota-type': 'AB',
217 'ota-required-cache': '0',
218 'post-build': 'build-fingerprint-target',
219 'post-build-incremental': 'build-version-incremental-target',
220 'post-sdk-level': '27',
221 'post-security-patch-level': '2017-12-01',
222 'post-timestamp': '1500000000',
223 'pre-device': 'product-device',
224 'pre-build': 'build-fingerprint-source',
225 'pre-build-incremental': 'build-version-incremental-source',
Tao Baodf3a48b2018-01-10 16:30:43 -0800226 },
227 metadata)
228
229 def test_GetPackageMetadata_nonAbOta_full(self):
Tao Bao1c320f82019-10-04 23:25:12 -0700230 target_info = common.BuildInfo(self.TEST_TARGET_INFO_DICT, None)
Tianjiea2076132020-08-19 17:25:32 -0700231 metadata = self.GetLegacyOtaMetadata(target_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800232 self.assertDictEqual(
233 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400234 'ota-type': 'BLOCK',
235 'ota-required-cache': '0',
236 'post-build': 'build-fingerprint-target',
237 'post-build-incremental': 'build-version-incremental-target',
238 'post-sdk-level': '27',
239 'post-security-patch-level': '2017-12-01',
240 'post-timestamp': '1500000000',
241 'pre-device': 'product-device',
Tao Baodf3a48b2018-01-10 16:30:43 -0800242 },
243 metadata)
244
245 def test_GetPackageMetadata_nonAbOta_incremental(self):
Tao Bao1c320f82019-10-04 23:25:12 -0700246 target_info = common.BuildInfo(self.TEST_TARGET_INFO_DICT, None)
247 source_info = common.BuildInfo(self.TEST_SOURCE_INFO_DICT, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800248 common.OPTIONS.incremental_source = ''
Tianjiea2076132020-08-19 17:25:32 -0700249 metadata = self.GetLegacyOtaMetadata(target_info, source_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800250 self.assertDictEqual(
251 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400252 'ota-type': 'BLOCK',
253 'ota-required-cache': '0',
254 'post-build': 'build-fingerprint-target',
255 'post-build-incremental': 'build-version-incremental-target',
256 'post-sdk-level': '27',
257 'post-security-patch-level': '2017-12-01',
258 'post-timestamp': '1500000000',
259 'pre-device': 'product-device',
260 'pre-build': 'build-fingerprint-source',
261 'pre-build-incremental': 'build-version-incremental-source',
Tao Baodf3a48b2018-01-10 16:30:43 -0800262 },
263 metadata)
264
265 def test_GetPackageMetadata_wipe(self):
Tao Bao1c320f82019-10-04 23:25:12 -0700266 target_info = common.BuildInfo(self.TEST_TARGET_INFO_DICT, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800267 common.OPTIONS.wipe_user_data = True
Tianjiea2076132020-08-19 17:25:32 -0700268 metadata = self.GetLegacyOtaMetadata(target_info)
Tao Baodf3a48b2018-01-10 16:30:43 -0800269 self.assertDictEqual(
270 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400271 'ota-type': 'BLOCK',
272 'ota-required-cache': '0',
273 'ota-wipe': 'yes',
274 'post-build': 'build-fingerprint-target',
275 'post-build-incremental': 'build-version-incremental-target',
276 'post-sdk-level': '27',
277 'post-security-patch-level': '2017-12-01',
278 'post-timestamp': '1500000000',
279 'pre-device': 'product-device',
Tao Baodf3a48b2018-01-10 16:30:43 -0800280 },
281 metadata)
282
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +0000283 @test_utils.SkipIfExternalToolsUnavailable()
Daniel Normane9af70a2021-04-15 16:39:22 -0700284 def test_GetApexInfoFromTargetFiles(self):
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +0000285 target_files = construct_target_files(compressedApex=True)
Daniel Normane9af70a2021-04-15 16:39:22 -0700286 apex_infos = GetApexInfoFromTargetFiles(target_files, 'system')
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +0000287 self.assertEqual(len(apex_infos), 1)
288 self.assertEqual(apex_infos[0].package_name, "com.android.apex.compressed")
289 self.assertEqual(apex_infos[0].version, 1)
290 self.assertEqual(apex_infos[0].is_compressed, True)
291 # Compare the decompressed APEX size with the original uncompressed APEX
292 original_apex_name = 'com.android.apex.compressed.v1_original.apex'
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500293 original_apex_filepath = os.path.join(
294 test_utils.get_current_dir(), original_apex_name)
Mohammad Samiul Islam9fd58862021-01-06 13:33:25 +0000295 uncompressed_apex_size = os.path.getsize(original_apex_filepath)
296 self.assertEqual(apex_infos[0].decompressed_size, uncompressed_apex_size)
297
Tianjiea5fca032021-06-01 22:06:28 -0700298 @staticmethod
299 def construct_tf_with_apex_info(infos):
300 apex_metadata_proto = ota_metadata_pb2.ApexMetadata()
301 apex_metadata_proto.apex_info.extend(infos)
302
303 output = common.MakeTempFile(suffix='.zip')
304 with zipfile.ZipFile(output, 'w') as zfp:
305 common.ZipWriteStr(zfp, "META/apex_info.pb",
306 apex_metadata_proto.SerializeToString())
307 return output
308
309 def test_ConstructOtaApexInfo_incremental_package(self):
310 infos = [ota_metadata_pb2.ApexInfo(package_name='com.android.apex.1',
311 version=1000, is_compressed=False),
312 ota_metadata_pb2.ApexInfo(package_name='com.android.apex.2',
313 version=2000, is_compressed=True)]
314 target_file = self.construct_tf_with_apex_info(infos)
315
316 with zipfile.ZipFile(target_file) as target_zip:
317 info_bytes = ConstructOtaApexInfo(target_zip, source_file=target_file)
318 apex_metadata_proto = ota_metadata_pb2.ApexMetadata()
319 apex_metadata_proto.ParseFromString(info_bytes)
320
321 info_list = apex_metadata_proto.apex_info
322 self.assertEqual(2, len(info_list))
323 self.assertEqual('com.android.apex.1', info_list[0].package_name)
324 self.assertEqual(1000, info_list[0].version)
325 self.assertEqual(1000, info_list[0].source_version)
326
Tao Bao393eeb42019-03-06 16:00:38 -0800327 def test_GetPackageMetadata_retrofitDynamicPartitions(self):
Tao Bao1c320f82019-10-04 23:25:12 -0700328 target_info = common.BuildInfo(self.TEST_TARGET_INFO_DICT, None)
Tao Bao393eeb42019-03-06 16:00:38 -0800329 common.OPTIONS.retrofit_dynamic_partitions = True
Tianjiea2076132020-08-19 17:25:32 -0700330 metadata = self.GetLegacyOtaMetadata(target_info)
Tao Bao393eeb42019-03-06 16:00:38 -0800331 self.assertDictEqual(
332 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400333 'ota-retrofit-dynamic-partitions': 'yes',
334 'ota-type': 'BLOCK',
335 'ota-required-cache': '0',
336 'post-build': 'build-fingerprint-target',
337 'post-build-incremental': 'build-version-incremental-target',
338 'post-sdk-level': '27',
339 'post-security-patch-level': '2017-12-01',
340 'post-timestamp': '1500000000',
341 'pre-device': 'product-device',
Tao Bao393eeb42019-03-06 16:00:38 -0800342 },
343 metadata)
344
Tao Baodf3a48b2018-01-10 16:30:43 -0800345 @staticmethod
346 def _test_GetPackageMetadata_swapBuildTimestamps(target_info, source_info):
Tianjie Xu0fde41e2020-05-09 05:24:18 +0000347 (target_info['build.prop'].build_props['ro.build.date.utc'],
348 source_info['build.prop'].build_props['ro.build.date.utc']) = (
349 source_info['build.prop'].build_props['ro.build.date.utc'],
350 target_info['build.prop'].build_props['ro.build.date.utc'])
Tao Baodf3a48b2018-01-10 16:30:43 -0800351
352 def test_GetPackageMetadata_unintentionalDowngradeDetected(self):
353 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
354 source_info_dict = copy.deepcopy(self.TEST_SOURCE_INFO_DICT)
355 self._test_GetPackageMetadata_swapBuildTimestamps(
356 target_info_dict, source_info_dict)
357
Tao Bao1c320f82019-10-04 23:25:12 -0700358 target_info = common.BuildInfo(target_info_dict, None)
359 source_info = common.BuildInfo(source_info_dict, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800360 common.OPTIONS.incremental_source = ''
Tianjiea2076132020-08-19 17:25:32 -0700361 self.assertRaises(RuntimeError, self.GetLegacyOtaMetadata, target_info,
Tao Baodf3a48b2018-01-10 16:30:43 -0800362 source_info)
363
364 def test_GetPackageMetadata_downgrade(self):
365 target_info_dict = copy.deepcopy(self.TEST_TARGET_INFO_DICT)
366 source_info_dict = copy.deepcopy(self.TEST_SOURCE_INFO_DICT)
367 self._test_GetPackageMetadata_swapBuildTimestamps(
368 target_info_dict, source_info_dict)
369
Tao Bao1c320f82019-10-04 23:25:12 -0700370 target_info = common.BuildInfo(target_info_dict, None)
371 source_info = common.BuildInfo(source_info_dict, None)
Tao Baodf3a48b2018-01-10 16:30:43 -0800372 common.OPTIONS.incremental_source = ''
373 common.OPTIONS.downgrade = True
374 common.OPTIONS.wipe_user_data = True
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500375 common.OPTIONS.spl_downgrade = True
Tianjiea2076132020-08-19 17:25:32 -0700376 metadata = self.GetLegacyOtaMetadata(target_info, source_info)
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500377 # Reset spl_downgrade so other tests are unaffected
378 common.OPTIONS.spl_downgrade = False
Tianjiea2076132020-08-19 17:25:32 -0700379
Tao Baodf3a48b2018-01-10 16:30:43 -0800380 self.assertDictEqual(
381 {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400382 'ota-downgrade': 'yes',
383 'ota-type': 'BLOCK',
384 'ota-required-cache': '0',
385 'ota-wipe': 'yes',
386 'post-build': 'build-fingerprint-target',
387 'post-build-incremental': 'build-version-incremental-target',
388 'post-sdk-level': '27',
389 'post-security-patch-level': '2017-12-01',
390 'post-timestamp': '1400000000',
391 'pre-device': 'product-device',
392 'pre-build': 'build-fingerprint-source',
393 'pre-build-incremental': 'build-version-incremental-source',
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500394 'spl-downgrade': 'yes',
Tao Baodf3a48b2018-01-10 16:30:43 -0800395 },
396 metadata)
Tao Baofabe0832018-01-17 15:52:28 -0800397
Tao Bao82490d32019-04-09 00:12:30 -0700398 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baof7140c02018-01-30 17:09:24 -0800399 def test_GetTargetFilesZipForSecondaryImages(self):
400 input_file = construct_target_files(secondary=True)
401 target_file = GetTargetFilesZipForSecondaryImages(input_file)
402
403 with zipfile.ZipFile(target_file) as verify_zip:
404 namelist = verify_zip.namelist()
Tao Bao615b65d2019-10-06 22:59:45 -0700405 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
Tao Baof7140c02018-01-30 17:09:24 -0800406
407 self.assertIn('META/ab_partitions.txt', namelist)
Tao Baof7140c02018-01-30 17:09:24 -0800408 self.assertIn('IMAGES/system.img', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700409 self.assertIn('RADIO/bootloader.img', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800410 self.assertIn(POSTINSTALL_CONFIG, namelist)
Tao Baof7140c02018-01-30 17:09:24 -0800411
Tao Bao3e759462019-09-17 22:43:11 -0700412 self.assertNotIn('IMAGES/boot.img', namelist)
Tao Baof7140c02018-01-30 17:09:24 -0800413 self.assertNotIn('IMAGES/system_other.img', namelist)
414 self.assertNotIn('IMAGES/system.map', namelist)
Tao Bao3e759462019-09-17 22:43:11 -0700415 self.assertNotIn('RADIO/modem.img', namelist)
Tao Baof7140c02018-01-30 17:09:24 -0800416
Tao Bao3e759462019-09-17 22:43:11 -0700417 expected_ab_partitions = ['system', 'bootloader']
Tianjie Xu1c808002019-09-11 00:29:26 -0700418 self.assertEqual('\n'.join(expected_ab_partitions), ab_partitions)
419
Tao Bao82490d32019-04-09 00:12:30 -0700420 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao15a146a2018-02-21 16:06:59 -0800421 def test_GetTargetFilesZipForSecondaryImages_skipPostinstall(self):
422 input_file = construct_target_files(secondary=True)
423 target_file = GetTargetFilesZipForSecondaryImages(
424 input_file, skip_postinstall=True)
425
426 with zipfile.ZipFile(target_file) as verify_zip:
427 namelist = verify_zip.namelist()
428
429 self.assertIn('META/ab_partitions.txt', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800430 self.assertIn('IMAGES/system.img', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700431 self.assertIn('RADIO/bootloader.img', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800432
Tao Bao3e759462019-09-17 22:43:11 -0700433 self.assertNotIn('IMAGES/boot.img', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800434 self.assertNotIn('IMAGES/system_other.img', namelist)
435 self.assertNotIn('IMAGES/system.map', namelist)
Tao Bao3e759462019-09-17 22:43:11 -0700436 self.assertNotIn('RADIO/modem.img', namelist)
Tao Bao15a146a2018-02-21 16:06:59 -0800437 self.assertNotIn(POSTINSTALL_CONFIG, namelist)
438
Tao Bao82490d32019-04-09 00:12:30 -0700439 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao12489802018-07-12 14:47:38 -0700440 def test_GetTargetFilesZipForSecondaryImages_withoutRadioImages(self):
441 input_file = construct_target_files(secondary=True)
442 common.ZipDelete(input_file, 'RADIO/bootloader.img')
443 common.ZipDelete(input_file, 'RADIO/modem.img')
444 target_file = GetTargetFilesZipForSecondaryImages(input_file)
445
446 with zipfile.ZipFile(target_file) as verify_zip:
447 namelist = verify_zip.namelist()
448
449 self.assertIn('META/ab_partitions.txt', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700450 self.assertIn('IMAGES/system.img', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700451 self.assertIn(POSTINSTALL_CONFIG, namelist)
452
Tao Bao3e759462019-09-17 22:43:11 -0700453 self.assertNotIn('IMAGES/boot.img', namelist)
Tao Bao12489802018-07-12 14:47:38 -0700454 self.assertNotIn('IMAGES/system_other.img', namelist)
455 self.assertNotIn('IMAGES/system.map', namelist)
456 self.assertNotIn('RADIO/bootloader.img', namelist)
457 self.assertNotIn('RADIO/modem.img', namelist)
458
Tao Bao82490d32019-04-09 00:12:30 -0700459 @test_utils.SkipIfExternalToolsUnavailable()
Tianjie Xu1c808002019-09-11 00:29:26 -0700460 def test_GetTargetFilesZipForSecondaryImages_dynamicPartitions(self):
461 input_file = construct_target_files(secondary=True)
462 misc_info = '\n'.join([
463 'use_dynamic_partition_size=true',
464 'use_dynamic_partitions=true',
465 'dynamic_partition_list=system vendor product',
466 'super_partition_groups=google_dynamic_partitions',
467 'super_google_dynamic_partitions_group_size=4873781248',
468 'super_google_dynamic_partitions_partition_list=system vendor product',
469 ])
470 dynamic_partitions_info = '\n'.join([
471 'super_partition_groups=google_dynamic_partitions',
472 'super_google_dynamic_partitions_group_size=4873781248',
473 'super_google_dynamic_partitions_partition_list=system vendor product',
474 ])
475
Kelvin Zhang928c2342020-09-22 16:15:57 -0400476 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
Tianjie Xu1c808002019-09-11 00:29:26 -0700477 common.ZipWriteStr(append_zip, 'META/misc_info.txt', misc_info)
478 common.ZipWriteStr(append_zip, 'META/dynamic_partitions_info.txt',
479 dynamic_partitions_info)
480
481 target_file = GetTargetFilesZipForSecondaryImages(input_file)
482
483 with zipfile.ZipFile(target_file) as verify_zip:
484 namelist = verify_zip.namelist()
Tao Bao615b65d2019-10-06 22:59:45 -0700485 updated_misc_info = verify_zip.read('META/misc_info.txt').decode()
Tianjie Xu1c808002019-09-11 00:29:26 -0700486 updated_dynamic_partitions_info = verify_zip.read(
Tao Bao615b65d2019-10-06 22:59:45 -0700487 'META/dynamic_partitions_info.txt').decode()
Tianjie Xu1c808002019-09-11 00:29:26 -0700488
489 self.assertIn('META/ab_partitions.txt', namelist)
Tianjie Xu1c808002019-09-11 00:29:26 -0700490 self.assertIn('IMAGES/system.img', namelist)
491 self.assertIn(POSTINSTALL_CONFIG, namelist)
492 self.assertIn('META/misc_info.txt', namelist)
493 self.assertIn('META/dynamic_partitions_info.txt', namelist)
494
Tao Bao3e759462019-09-17 22:43:11 -0700495 self.assertNotIn('IMAGES/boot.img', namelist)
Tianjie Xu1c808002019-09-11 00:29:26 -0700496 self.assertNotIn('IMAGES/system_other.img', namelist)
497 self.assertNotIn('IMAGES/system.map', namelist)
498
499 # Check the vendor & product are removed from the partitions list.
500 expected_misc_info = misc_info.replace('system vendor product',
501 'system')
502 expected_dynamic_partitions_info = dynamic_partitions_info.replace(
503 'system vendor product', 'system')
504 self.assertEqual(expected_misc_info, updated_misc_info)
505 self.assertEqual(expected_dynamic_partitions_info,
506 updated_dynamic_partitions_info)
507
508 @test_utils.SkipIfExternalToolsUnavailable()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700509 def test_GetTargetFilesZipForPartialUpdates_singlePartition(self):
510 input_file = construct_target_files()
511 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
512 common.ZipWriteStr(append_zip, 'IMAGES/system.map', 'fake map')
513
514 target_file = GetTargetFilesZipForPartialUpdates(input_file, ['system'])
515 with zipfile.ZipFile(target_file) as verify_zip:
516 namelist = verify_zip.namelist()
517 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
518
519 self.assertIn('META/ab_partitions.txt', namelist)
520 self.assertIn('META/update_engine_config.txt', namelist)
521 self.assertIn('IMAGES/system.img', namelist)
522 self.assertIn('IMAGES/system.map', namelist)
523
524 self.assertNotIn('IMAGES/boot.img', namelist)
525 self.assertNotIn('IMAGES/system_other.img', namelist)
526 self.assertNotIn('RADIO/bootloader.img', namelist)
527 self.assertNotIn('RADIO/modem.img', namelist)
528
529 self.assertEqual('system', ab_partitions)
530
531 @test_utils.SkipIfExternalToolsUnavailable()
532 def test_GetTargetFilesZipForPartialUpdates_unrecognizedPartition(self):
533 input_file = construct_target_files()
534 self.assertRaises(ValueError, GetTargetFilesZipForPartialUpdates,
535 input_file, ['product'])
536
537 @test_utils.SkipIfExternalToolsUnavailable()
538 def test_GetTargetFilesZipForPartialUpdates_dynamicPartitions(self):
539 input_file = construct_target_files(secondary=True)
540 misc_info = '\n'.join([
541 'use_dynamic_partition_size=true',
542 'use_dynamic_partitions=true',
543 'dynamic_partition_list=system vendor product',
544 'super_partition_groups=google_dynamic_partitions',
545 'super_google_dynamic_partitions_group_size=4873781248',
546 'super_google_dynamic_partitions_partition_list=system vendor product',
547 ])
548 dynamic_partitions_info = '\n'.join([
549 'super_partition_groups=google_dynamic_partitions',
550 'super_google_dynamic_partitions_group_size=4873781248',
551 'super_google_dynamic_partitions_partition_list=system vendor product',
552 ])
553
554 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
555 common.ZipWriteStr(append_zip, 'META/misc_info.txt', misc_info)
556 common.ZipWriteStr(append_zip, 'META/dynamic_partitions_info.txt',
557 dynamic_partitions_info)
558
559 target_file = GetTargetFilesZipForPartialUpdates(input_file,
560 ['boot', 'system'])
561 with zipfile.ZipFile(target_file) as verify_zip:
562 namelist = verify_zip.namelist()
563 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
564 updated_misc_info = verify_zip.read('META/misc_info.txt').decode()
565 updated_dynamic_partitions_info = verify_zip.read(
566 'META/dynamic_partitions_info.txt').decode()
567
568 self.assertIn('META/ab_partitions.txt', namelist)
569 self.assertIn('IMAGES/boot.img', namelist)
570 self.assertIn('IMAGES/system.img', namelist)
571 self.assertIn('META/misc_info.txt', namelist)
572 self.assertIn('META/dynamic_partitions_info.txt', namelist)
573
574 self.assertNotIn('IMAGES/system_other.img', namelist)
575 self.assertNotIn('RADIO/bootloader.img', namelist)
576 self.assertNotIn('RADIO/modem.img', namelist)
577
578 # Check the vendor & product are removed from the partitions list.
579 expected_misc_info = misc_info.replace('system vendor product',
580 'system')
581 expected_dynamic_partitions_info = dynamic_partitions_info.replace(
582 'system vendor product', 'system')
583 self.assertEqual(expected_misc_info, updated_misc_info)
584 self.assertEqual(expected_dynamic_partitions_info,
585 updated_dynamic_partitions_info)
586 self.assertEqual('boot\nsystem', ab_partitions)
587
588 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao15a146a2018-02-21 16:06:59 -0800589 def test_GetTargetFilesZipWithoutPostinstallConfig(self):
590 input_file = construct_target_files()
591 target_file = GetTargetFilesZipWithoutPostinstallConfig(input_file)
592 with zipfile.ZipFile(target_file) as verify_zip:
593 self.assertNotIn(POSTINSTALL_CONFIG, verify_zip.namelist())
594
Tao Bao82490d32019-04-09 00:12:30 -0700595 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao15a146a2018-02-21 16:06:59 -0800596 def test_GetTargetFilesZipWithoutPostinstallConfig_missingEntry(self):
597 input_file = construct_target_files()
598 common.ZipDelete(input_file, POSTINSTALL_CONFIG)
599 target_file = GetTargetFilesZipWithoutPostinstallConfig(input_file)
600 with zipfile.ZipFile(target_file) as verify_zip:
601 self.assertNotIn(POSTINSTALL_CONFIG, verify_zip.namelist())
602
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700603 @test_utils.SkipIfExternalToolsUnavailable()
604 def test_GetTargetFilesZipForCustomImagesUpdates_oemDefaultImage(self):
605 input_file = construct_target_files()
606 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
607 common.ZipWriteStr(append_zip, 'IMAGES/oem.img', 'oem')
608 common.ZipWriteStr(append_zip, 'IMAGES/oem_test.img', 'oem_test')
609
610 target_file = GetTargetFilesZipForCustomImagesUpdates(
611 input_file, {'oem': 'oem.img'})
612
613 with zipfile.ZipFile(target_file) as verify_zip:
614 namelist = verify_zip.namelist()
615 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
616 oem_image = verify_zip.read('IMAGES/oem.img').decode()
617
618 self.assertIn('META/ab_partitions.txt', namelist)
619 self.assertEqual('boot\nsystem\nvendor\nbootloader\nmodem', ab_partitions)
620 self.assertIn('IMAGES/oem.img', namelist)
621 self.assertEqual('oem', oem_image)
622
623 @test_utils.SkipIfExternalToolsUnavailable()
624 def test_GetTargetFilesZipForCustomImagesUpdates_oemTestImage(self):
625 input_file = construct_target_files()
626 with zipfile.ZipFile(input_file, 'a', allowZip64=True) as append_zip:
627 common.ZipWriteStr(append_zip, 'IMAGES/oem.img', 'oem')
628 common.ZipWriteStr(append_zip, 'IMAGES/oem_test.img', 'oem_test')
629
630 target_file = GetTargetFilesZipForCustomImagesUpdates(
631 input_file, {'oem': 'oem_test.img'})
632
633 with zipfile.ZipFile(target_file) as verify_zip:
634 namelist = verify_zip.namelist()
635 ab_partitions = verify_zip.read('META/ab_partitions.txt').decode()
636 oem_image = verify_zip.read('IMAGES/oem.img').decode()
637
638 self.assertIn('META/ab_partitions.txt', namelist)
639 self.assertEqual('boot\nsystem\nvendor\nbootloader\nmodem', ab_partitions)
640 self.assertIn('IMAGES/oem.img', namelist)
641 self.assertEqual('oem_test', oem_image)
642
Tao Bao3bf8c652018-03-16 12:59:42 -0700643 def _test_FinalizeMetadata(self, large_entry=False):
644 entries = [
645 'required-entry1',
646 'required-entry2',
647 ]
648 zip_file = PropertyFilesTest.construct_zip_package(entries)
649 # Add a large entry of 1 GiB if requested.
650 if large_entry:
Kelvin Zhang928c2342020-09-22 16:15:57 -0400651 with zipfile.ZipFile(zip_file, 'a', allowZip64=True) as zip_fp:
Tao Bao3bf8c652018-03-16 12:59:42 -0700652 zip_fp.writestr(
653 # Using 'zoo' so that the entry stays behind others after signing.
654 'zoo',
655 'A' * 1024 * 1024 * 1024,
656 zipfile.ZIP_STORED)
657
Tianjiea2076132020-08-19 17:25:32 -0700658 metadata = ota_metadata_pb2.OtaMetadata()
Tao Bao3bf8c652018-03-16 12:59:42 -0700659 output_file = common.MakeTempFile(suffix='.zip')
660 needed_property_files = (
661 TestPropertyFiles(),
662 )
663 FinalizeMetadata(metadata, zip_file, output_file, needed_property_files)
Tianjiea2076132020-08-19 17:25:32 -0700664 self.assertIn('ota-test-property-files', metadata.property_files)
Tao Bao3bf8c652018-03-16 12:59:42 -0700665
Tao Bao82490d32019-04-09 00:12:30 -0700666 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700667 def test_FinalizeMetadata(self):
668 self._test_FinalizeMetadata()
669
Tao Bao82490d32019-04-09 00:12:30 -0700670 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700671 def test_FinalizeMetadata_withNoSigning(self):
672 common.OPTIONS.no_signing = True
673 self._test_FinalizeMetadata()
674
Tao Bao82490d32019-04-09 00:12:30 -0700675 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700676 def test_FinalizeMetadata_largeEntry(self):
677 self._test_FinalizeMetadata(large_entry=True)
678
Tao Bao82490d32019-04-09 00:12:30 -0700679 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700680 def test_FinalizeMetadata_largeEntry_withNoSigning(self):
681 common.OPTIONS.no_signing = True
682 self._test_FinalizeMetadata(large_entry=True)
683
Tao Bao82490d32019-04-09 00:12:30 -0700684 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao3bf8c652018-03-16 12:59:42 -0700685 def test_FinalizeMetadata_insufficientSpace(self):
686 entries = [
687 'required-entry1',
688 'required-entry2',
689 'optional-entry1',
690 'optional-entry2',
691 ]
692 zip_file = PropertyFilesTest.construct_zip_package(entries)
Kelvin Zhang928c2342020-09-22 16:15:57 -0400693 with zipfile.ZipFile(zip_file, 'a', allowZip64=True) as zip_fp:
Tao Bao3bf8c652018-03-16 12:59:42 -0700694 zip_fp.writestr(
695 # 'foo-entry1' will appear ahead of all other entries (in alphabetical
696 # order) after the signing, which will in turn trigger the
697 # InsufficientSpaceException and an automatic retry.
698 'foo-entry1',
699 'A' * 1024 * 1024,
700 zipfile.ZIP_STORED)
701
Tianjiea2076132020-08-19 17:25:32 -0700702 metadata = ota_metadata_pb2.OtaMetadata()
Tao Bao3bf8c652018-03-16 12:59:42 -0700703 needed_property_files = (
704 TestPropertyFiles(),
705 )
706 output_file = common.MakeTempFile(suffix='.zip')
707 FinalizeMetadata(metadata, zip_file, output_file, needed_property_files)
Tianjiea2076132020-08-19 17:25:32 -0700708 self.assertIn('ota-test-property-files', metadata.property_files)
Tao Bao3bf8c652018-03-16 12:59:42 -0700709
Tao Baoae5e4c32018-03-01 19:30:00 -0800710
Tao Bao69203522018-03-08 16:09:01 -0800711class TestPropertyFiles(PropertyFiles):
712 """A class that extends PropertyFiles for testing purpose."""
713
714 def __init__(self):
715 super(TestPropertyFiles, self).__init__()
716 self.name = 'ota-test-property-files'
717 self.required = (
718 'required-entry1',
719 'required-entry2',
720 )
721 self.optional = (
722 'optional-entry1',
723 'optional-entry2',
724 )
725
726
Tianjiea2076132020-08-19 17:25:32 -0700727class PropertyFilesTest(PropertyFilesTestCase):
Tao Baof5110492018-03-02 09:47:43 -0800728
Tao Bao82490d32019-04-09 00:12:30 -0700729 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoae5e4c32018-03-01 19:30:00 -0800730 def test_Compute(self):
Tao Baof5110492018-03-02 09:47:43 -0800731 entries = (
Tao Bao69203522018-03-08 16:09:01 -0800732 'required-entry1',
733 'required-entry2',
Tao Baof5110492018-03-02 09:47:43 -0800734 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700735 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800736 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400737 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800738 property_files_string = property_files.Compute(zip_fp)
Tao Baof5110492018-03-02 09:47:43 -0800739
Tao Bao69203522018-03-08 16:09:01 -0800740 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -0700741 self.assertEqual(4, len(tokens))
Tao Baof5110492018-03-02 09:47:43 -0800742 self._verify_entries(zip_file, tokens, entries)
743
Tao Bao69203522018-03-08 16:09:01 -0800744 def test_Compute_withOptionalEntries(self):
Tao Baof5110492018-03-02 09:47:43 -0800745 entries = (
Tao Bao69203522018-03-08 16:09:01 -0800746 'required-entry1',
747 'required-entry2',
748 'optional-entry1',
749 'optional-entry2',
Tao Baof5110492018-03-02 09:47:43 -0800750 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700751 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800752 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400753 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800754 property_files_string = property_files.Compute(zip_fp)
Tao Baof5110492018-03-02 09:47:43 -0800755
Tao Bao69203522018-03-08 16:09:01 -0800756 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -0700757 self.assertEqual(6, len(tokens))
Tao Baof5110492018-03-02 09:47:43 -0800758 self._verify_entries(zip_file, tokens, entries)
759
Tao Bao69203522018-03-08 16:09:01 -0800760 def test_Compute_missingRequiredEntry(self):
761 entries = (
762 'required-entry2',
763 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700764 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800765 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400766 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800767 self.assertRaises(KeyError, property_files.Compute, zip_fp)
768
Tao Bao82490d32019-04-09 00:12:30 -0700769 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoae5e4c32018-03-01 19:30:00 -0800770 def test_Finalize(self):
Tao Baof5110492018-03-02 09:47:43 -0800771 entries = [
Tao Bao69203522018-03-08 16:09:01 -0800772 'required-entry1',
773 'required-entry2',
Tao Baof5110492018-03-02 09:47:43 -0800774 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700775 'META-INF/com/android/metadata.pb',
Tao Baof5110492018-03-02 09:47:43 -0800776 ]
Tao Bao3bf8c652018-03-16 12:59:42 -0700777 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800778 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400779 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700780 raw_metadata = property_files.GetPropertyFilesString(
Tao Baoae5e4c32018-03-01 19:30:00 -0800781 zip_fp, reserve_space=False)
782 streaming_metadata = property_files.Finalize(zip_fp, len(raw_metadata))
Tao Bao69203522018-03-08 16:09:01 -0800783 tokens = self._parse_property_files_string(streaming_metadata)
Tao Baof5110492018-03-02 09:47:43 -0800784
Tianjiea2076132020-08-19 17:25:32 -0700785 self.assertEqual(4, len(tokens))
Tao Baof5110492018-03-02 09:47:43 -0800786 # 'META-INF/com/android/metadata' will be key'd as 'metadata' in the
787 # streaming metadata.
788 entries[2] = 'metadata'
Tianjiea2076132020-08-19 17:25:32 -0700789 entries[3] = 'metadata.pb'
Tao Baof5110492018-03-02 09:47:43 -0800790 self._verify_entries(zip_file, tokens, entries)
791
Tao Bao82490d32019-04-09 00:12:30 -0700792 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoae5e4c32018-03-01 19:30:00 -0800793 def test_Finalize_assertReservedLength(self):
Tao Baof5110492018-03-02 09:47:43 -0800794 entries = (
Tao Bao69203522018-03-08 16:09:01 -0800795 'required-entry1',
796 'required-entry2',
797 'optional-entry1',
798 'optional-entry2',
Tao Baof5110492018-03-02 09:47:43 -0800799 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700800 'META-INF/com/android/metadata.pb',
Tao Baof5110492018-03-02 09:47:43 -0800801 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700802 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800803 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400804 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Baof5110492018-03-02 09:47:43 -0800805 # First get the raw metadata string (i.e. without padding space).
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700806 raw_metadata = property_files.GetPropertyFilesString(
Tao Baoae5e4c32018-03-01 19:30:00 -0800807 zip_fp, reserve_space=False)
Tao Baof5110492018-03-02 09:47:43 -0800808 raw_length = len(raw_metadata)
809
810 # Now pass in the exact expected length.
Tao Baoae5e4c32018-03-01 19:30:00 -0800811 streaming_metadata = property_files.Finalize(zip_fp, raw_length)
Tao Baof5110492018-03-02 09:47:43 -0800812 self.assertEqual(raw_length, len(streaming_metadata))
813
814 # Or pass in insufficient length.
815 self.assertRaises(
Tao Bao3bf8c652018-03-16 12:59:42 -0700816 PropertyFiles.InsufficientSpaceException,
Tao Baoae5e4c32018-03-01 19:30:00 -0800817 property_files.Finalize,
Tao Baof5110492018-03-02 09:47:43 -0800818 zip_fp,
Tao Baoae5e4c32018-03-01 19:30:00 -0800819 raw_length - 1)
Tao Baof5110492018-03-02 09:47:43 -0800820
821 # Or pass in a much larger size.
Tao Baoae5e4c32018-03-01 19:30:00 -0800822 streaming_metadata = property_files.Finalize(
Tao Baof5110492018-03-02 09:47:43 -0800823 zip_fp,
Tao Baoae5e4c32018-03-01 19:30:00 -0800824 raw_length + 20)
Tao Baof5110492018-03-02 09:47:43 -0800825 self.assertEqual(raw_length + 20, len(streaming_metadata))
826 self.assertEqual(' ' * 20, streaming_metadata[raw_length:])
827
Tao Baoae5e4c32018-03-01 19:30:00 -0800828 def test_Verify(self):
829 entries = (
Tao Bao69203522018-03-08 16:09:01 -0800830 'required-entry1',
831 'required-entry2',
832 'optional-entry1',
833 'optional-entry2',
834 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700835 'META-INF/com/android/metadata.pb',
Tao Bao69203522018-03-08 16:09:01 -0800836 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700837 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800838 property_files = TestPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400839 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800840 # First get the raw metadata string (i.e. without padding space).
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700841 raw_metadata = property_files.GetPropertyFilesString(
Tao Bao69203522018-03-08 16:09:01 -0800842 zip_fp, reserve_space=False)
843
844 # Should pass the test if verification passes.
845 property_files.Verify(zip_fp, raw_metadata)
846
847 # Or raise on verification failure.
848 self.assertRaises(
849 AssertionError, property_files.Verify, zip_fp, raw_metadata + 'x')
850
851
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400852class StreamingPropertyFilesTest(PropertyFilesTestCase):
Kelvin Zhangc693d952020-07-22 19:21:22 -0400853 """Additional validity checks specialized for StreamingPropertyFiles."""
Tao Bao69203522018-03-08 16:09:01 -0800854
855 def test_init(self):
856 property_files = StreamingPropertyFiles()
857 self.assertEqual('ota-streaming-property-files', property_files.name)
858 self.assertEqual(
859 (
860 'payload.bin',
861 'payload_properties.txt',
862 ),
863 property_files.required)
864 self.assertEqual(
865 (
Tianjied868c122021-06-07 16:11:47 -0700866 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700867 'care_map.pb',
Tao Bao69203522018-03-08 16:09:01 -0800868 'care_map.txt',
869 'compatibility.zip',
870 ),
871 property_files.optional)
872
873 def test_Compute(self):
874 entries = (
Tao Baoae5e4c32018-03-01 19:30:00 -0800875 'payload.bin',
876 'payload_properties.txt',
877 'care_map.txt',
Tao Bao69203522018-03-08 16:09:01 -0800878 'compatibility.zip',
879 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700880 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800881 property_files = StreamingPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400882 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Bao69203522018-03-08 16:09:01 -0800883 property_files_string = property_files.Compute(zip_fp)
884
885 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -0700886 self.assertEqual(6, len(tokens))
Tao Bao69203522018-03-08 16:09:01 -0800887 self._verify_entries(zip_file, tokens, entries)
888
889 def test_Finalize(self):
890 entries = [
891 'payload.bin',
892 'payload_properties.txt',
893 'care_map.txt',
894 'compatibility.zip',
895 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700896 'META-INF/com/android/metadata.pb',
Tao Bao69203522018-03-08 16:09:01 -0800897 ]
Tao Bao3bf8c652018-03-16 12:59:42 -0700898 zip_file = self.construct_zip_package(entries)
Tao Bao69203522018-03-08 16:09:01 -0800899 property_files = StreamingPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400900 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700901 raw_metadata = property_files.GetPropertyFilesString(
Tao Bao69203522018-03-08 16:09:01 -0800902 zip_fp, reserve_space=False)
903 streaming_metadata = property_files.Finalize(zip_fp, len(raw_metadata))
904 tokens = self._parse_property_files_string(streaming_metadata)
905
Tianjiea2076132020-08-19 17:25:32 -0700906 self.assertEqual(6, len(tokens))
Tao Bao69203522018-03-08 16:09:01 -0800907 # 'META-INF/com/android/metadata' will be key'd as 'metadata' in the
908 # streaming metadata.
909 entries[4] = 'metadata'
Tianjiea2076132020-08-19 17:25:32 -0700910 entries[5] = 'metadata.pb'
Tao Bao69203522018-03-08 16:09:01 -0800911 self._verify_entries(zip_file, tokens, entries)
912
913 def test_Verify(self):
914 entries = (
915 'payload.bin',
916 'payload_properties.txt',
917 'care_map.txt',
918 'compatibility.zip',
Tao Baoae5e4c32018-03-01 19:30:00 -0800919 'META-INF/com/android/metadata',
Tianjiea2076132020-08-19 17:25:32 -0700920 'META-INF/com/android/metadata.pb',
Tao Baoae5e4c32018-03-01 19:30:00 -0800921 )
Tao Bao3bf8c652018-03-16 12:59:42 -0700922 zip_file = self.construct_zip_package(entries)
Tao Baoae5e4c32018-03-01 19:30:00 -0800923 property_files = StreamingPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -0400924 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Baoae5e4c32018-03-01 19:30:00 -0800925 # First get the raw metadata string (i.e. without padding space).
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -0700926 raw_metadata = property_files.GetPropertyFilesString(
Tao Baoae5e4c32018-03-01 19:30:00 -0800927 zip_fp, reserve_space=False)
928
929 # Should pass the test if verification passes.
930 property_files.Verify(zip_fp, raw_metadata)
931
932 # Or raise on verification failure.
933 self.assertRaises(
934 AssertionError, property_files.Verify, zip_fp, raw_metadata + 'x')
935
Tao Baofabe0832018-01-17 15:52:28 -0800936
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400937class AbOtaPropertyFilesTest(PropertyFilesTestCase):
Kelvin Zhangc693d952020-07-22 19:21:22 -0400938 """Additional validity checks specialized for AbOtaPropertyFiles."""
Tao Baob6304672018-03-08 16:28:33 -0800939
940 # The size for payload and metadata signature size.
941 SIGNATURE_SIZE = 256
942
943 def setUp(self):
944 self.testdata_dir = test_utils.get_testdata_dir()
945 self.assertTrue(os.path.exists(self.testdata_dir))
946
947 common.OPTIONS.wipe_user_data = False
948 common.OPTIONS.payload_signer = None
949 common.OPTIONS.payload_signer_args = None
950 common.OPTIONS.package_key = os.path.join(self.testdata_dir, 'testkey')
951 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -0400952 common.OPTIONS.package_key: None,
Tao Baob6304672018-03-08 16:28:33 -0800953 }
954
955 def test_init(self):
956 property_files = AbOtaPropertyFiles()
957 self.assertEqual('ota-property-files', property_files.name)
958 self.assertEqual(
959 (
960 'payload.bin',
961 'payload_properties.txt',
962 ),
963 property_files.required)
964 self.assertEqual(
965 (
Tianjied868c122021-06-07 16:11:47 -0700966 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700967 'care_map.pb',
Tao Baob6304672018-03-08 16:28:33 -0800968 'care_map.txt',
969 'compatibility.zip',
970 ),
971 property_files.optional)
972
Tao Bao82490d32019-04-09 00:12:30 -0700973 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baob6304672018-03-08 16:28:33 -0800974 def test_GetPayloadMetadataOffsetAndSize(self):
975 target_file = construct_target_files()
976 payload = Payload()
977 payload.Generate(target_file)
978
979 payload_signer = PayloadSigner()
980 payload.Sign(payload_signer)
981
982 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -0400983 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baob6304672018-03-08 16:28:33 -0800984 payload.WriteToZip(output_zip)
985
986 # Find out the payload metadata offset and size.
987 property_files = AbOtaPropertyFiles()
988 with zipfile.ZipFile(output_file) as input_zip:
989 # pylint: disable=protected-access
990 payload_offset, metadata_total = (
991 property_files._GetPayloadMetadataOffsetAndSize(input_zip))
992
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700993 # The signature proto has the following format (details in
994 # /platform/system/update_engine/update_metadata.proto):
995 # message Signature {
996 # optional uint32 version = 1;
997 # optional bytes data = 2;
998 # optional fixed32 unpadded_signature_size = 3;
999 # }
1000 #
1001 # According to the protobuf encoding, the tail of the signature message will
1002 # be [signature string(256 bytes) + encoding of the fixed32 number 256]. And
1003 # 256 is encoded as 'x1d\x00\x01\x00\x00':
1004 # [3 (field number) << 3 | 5 (type) + byte reverse of 0x100 (256)].
1005 # Details in (https://developers.google.com/protocol-buffers/docs/encoding)
1006 signature_tail_length = self.SIGNATURE_SIZE + 5
1007 self.assertGreater(metadata_total, signature_tail_length)
Tao Baob6304672018-03-08 16:28:33 -08001008 with open(output_file, 'rb') as verify_fp:
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001009 verify_fp.seek(payload_offset + metadata_total - signature_tail_length)
1010 metadata_signature_proto_tail = verify_fp.read(signature_tail_length)
1011
1012 self.assertEqual(b'\x1d\x00\x01\x00\x00',
1013 metadata_signature_proto_tail[-5:])
1014 metadata_signature = metadata_signature_proto_tail[:-5]
Tao Baob6304672018-03-08 16:28:33 -08001015
1016 # Now we extract the metadata hash via brillo_update_payload script, which
1017 # will serve as the oracle result.
1018 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
1019 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
1020 cmd = ['brillo_update_payload', 'hash',
1021 '--unsigned_payload', payload.payload_file,
1022 '--signature_size', str(self.SIGNATURE_SIZE),
1023 '--metadata_hash_file', metadata_sig_file,
1024 '--payload_hash_file', payload_sig_file]
Tao Bao73dd4f42018-10-04 16:25:33 -07001025 proc = common.Run(cmd)
Tao Baob6304672018-03-08 16:28:33 -08001026 stdoutdata, _ = proc.communicate()
1027 self.assertEqual(
1028 0, proc.returncode,
Tao Bao73dd4f42018-10-04 16:25:33 -07001029 'Failed to run brillo_update_payload:\n{}'.format(stdoutdata))
Tao Baob6304672018-03-08 16:28:33 -08001030
1031 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
1032
1033 # Finally we can compare the two signatures.
1034 with open(signed_metadata_sig_file, 'rb') as verify_fp:
1035 self.assertEqual(verify_fp.read(), metadata_signature)
1036
1037 @staticmethod
Tao Bao3bf8c652018-03-16 12:59:42 -07001038 def construct_zip_package_withValidPayload(with_metadata=False):
1039 # Cannot use construct_zip_package() since we need a "valid" payload.bin.
Tao Baob6304672018-03-08 16:28:33 -08001040 target_file = construct_target_files()
1041 payload = Payload()
1042 payload.Generate(target_file)
1043
1044 payload_signer = PayloadSigner()
1045 payload.Sign(payload_signer)
1046
1047 zip_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001048 with zipfile.ZipFile(zip_file, 'w', allowZip64=True) as zip_fp:
Tao Baob6304672018-03-08 16:28:33 -08001049 # 'payload.bin',
1050 payload.WriteToZip(zip_fp)
1051
1052 # Other entries.
1053 entries = ['care_map.txt', 'compatibility.zip']
1054
1055 # Put META-INF/com/android/metadata if needed.
1056 if with_metadata:
1057 entries.append('META-INF/com/android/metadata')
Tianjiea2076132020-08-19 17:25:32 -07001058 entries.append('META-INF/com/android/metadata.pb')
Tao Baob6304672018-03-08 16:28:33 -08001059
1060 for entry in entries:
1061 zip_fp.writestr(
1062 entry, entry.replace('.', '-').upper(), zipfile.ZIP_STORED)
1063
1064 return zip_file
1065
Tao Bao82490d32019-04-09 00:12:30 -07001066 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baob6304672018-03-08 16:28:33 -08001067 def test_Compute(self):
Tao Bao3bf8c652018-03-16 12:59:42 -07001068 zip_file = self.construct_zip_package_withValidPayload()
Tao Baob6304672018-03-08 16:28:33 -08001069 property_files = AbOtaPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -04001070 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Tao Baob6304672018-03-08 16:28:33 -08001071 property_files_string = property_files.Compute(zip_fp)
1072
1073 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -07001074 # "7" indcludes the four entries above, two metadata entries, and one entry
Tao Baob6304672018-03-08 16:28:33 -08001075 # for payload-metadata.bin.
Tianjiea2076132020-08-19 17:25:32 -07001076 self.assertEqual(7, len(tokens))
Tao Baob6304672018-03-08 16:28:33 -08001077 self._verify_entries(
1078 zip_file, tokens, ('care_map.txt', 'compatibility.zip'))
1079
Tao Bao82490d32019-04-09 00:12:30 -07001080 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baob6304672018-03-08 16:28:33 -08001081 def test_Finalize(self):
Tao Bao3bf8c652018-03-16 12:59:42 -07001082 zip_file = self.construct_zip_package_withValidPayload(with_metadata=True)
Tao Baob6304672018-03-08 16:28:33 -08001083 property_files = AbOtaPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -04001084 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -07001085 raw_metadata = property_files.GetPropertyFilesString(
Tao Baob6304672018-03-08 16:28:33 -08001086 zip_fp, reserve_space=False)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001087 property_files_string = property_files.Finalize(
1088 zip_fp, len(raw_metadata))
Tao Baob6304672018-03-08 16:28:33 -08001089
1090 tokens = self._parse_property_files_string(property_files_string)
Tianjiea2076132020-08-19 17:25:32 -07001091 # "7" includes the four entries above, two metadata entries, and one entry
Tao Baob6304672018-03-08 16:28:33 -08001092 # for payload-metadata.bin.
Tianjiea2076132020-08-19 17:25:32 -07001093 self.assertEqual(7, len(tokens))
Tao Baob6304672018-03-08 16:28:33 -08001094 self._verify_entries(
1095 zip_file, tokens, ('care_map.txt', 'compatibility.zip'))
1096
Tao Bao82490d32019-04-09 00:12:30 -07001097 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baob6304672018-03-08 16:28:33 -08001098 def test_Verify(self):
Tao Bao3bf8c652018-03-16 12:59:42 -07001099 zip_file = self.construct_zip_package_withValidPayload(with_metadata=True)
Tao Baob6304672018-03-08 16:28:33 -08001100 property_files = AbOtaPropertyFiles()
Kelvin Zhang928c2342020-09-22 16:15:57 -04001101 with zipfile.ZipFile(zip_file, 'r', allowZip64=True) as zip_fp:
Zhomart Mukhamejanov603655f2018-05-04 12:35:09 -07001102 raw_metadata = property_files.GetPropertyFilesString(
Tao Baob6304672018-03-08 16:28:33 -08001103 zip_fp, reserve_space=False)
1104
1105 property_files.Verify(zip_fp, raw_metadata)
1106
1107
Tao Bao65b94e92018-10-11 21:57:26 -07001108class PayloadSignerTest(test_utils.ReleaseToolsTestCase):
Tao Baofabe0832018-01-17 15:52:28 -08001109
1110 SIGFILE = 'sigfile.bin'
1111 SIGNED_SIGFILE = 'signed-sigfile.bin'
1112
1113 def setUp(self):
Tao Bao04e1f012018-02-04 12:13:35 -08001114 self.testdata_dir = test_utils.get_testdata_dir()
Tao Baofabe0832018-01-17 15:52:28 -08001115 self.assertTrue(os.path.exists(self.testdata_dir))
1116
1117 common.OPTIONS.payload_signer = None
1118 common.OPTIONS.payload_signer_args = []
1119 common.OPTIONS.package_key = os.path.join(self.testdata_dir, 'testkey')
1120 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -04001121 common.OPTIONS.package_key: None,
Tao Baofabe0832018-01-17 15:52:28 -08001122 }
1123
Tao Baofabe0832018-01-17 15:52:28 -08001124 def _assertFilesEqual(self, file1, file2):
1125 with open(file1, 'rb') as fp1, open(file2, 'rb') as fp2:
1126 self.assertEqual(fp1.read(), fp2.read())
1127
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001128 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baofabe0832018-01-17 15:52:28 -08001129 def test_init(self):
1130 payload_signer = PayloadSigner()
1131 self.assertEqual('openssl', payload_signer.signer)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001132 self.assertEqual(256, payload_signer.maximum_signature_size)
Tao Baofabe0832018-01-17 15:52:28 -08001133
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001134 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baofabe0832018-01-17 15:52:28 -08001135 def test_init_withPassword(self):
1136 common.OPTIONS.package_key = os.path.join(
1137 self.testdata_dir, 'testkey_with_passwd')
1138 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -04001139 common.OPTIONS.package_key: 'foo',
Tao Baofabe0832018-01-17 15:52:28 -08001140 }
1141 payload_signer = PayloadSigner()
1142 self.assertEqual('openssl', payload_signer.signer)
1143
1144 def test_init_withExternalSigner(self):
1145 common.OPTIONS.payload_signer = 'abc'
1146 common.OPTIONS.payload_signer_args = ['arg1', 'arg2']
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001147 common.OPTIONS.payload_signer_maximum_signature_size = '512'
Tao Baofabe0832018-01-17 15:52:28 -08001148 payload_signer = PayloadSigner()
1149 self.assertEqual('abc', payload_signer.signer)
1150 self.assertEqual(['arg1', 'arg2'], payload_signer.signer_args)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001151 self.assertEqual(512, payload_signer.maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -07001152
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001153 @test_utils.SkipIfExternalToolsUnavailable()
1154 def test_GetMaximumSignatureSizeInBytes_512Bytes(self):
xunchang376cc7c2019-04-08 23:04:58 -07001155 signing_key = os.path.join(self.testdata_dir, 'testkey_RSA4096.key')
Tao Bao82490d32019-04-09 00:12:30 -07001156 # pylint: disable=protected-access
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001157 signature_size = PayloadSigner._GetMaximumSignatureSizeInBytes(signing_key)
1158 self.assertEqual(512, signature_size)
Tao Baofabe0832018-01-17 15:52:28 -08001159
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001160 @test_utils.SkipIfExternalToolsUnavailable()
1161 def test_GetMaximumSignatureSizeInBytes_ECKey(self):
1162 signing_key = os.path.join(self.testdata_dir, 'testkey_EC.key')
1163 # pylint: disable=protected-access
1164 signature_size = PayloadSigner._GetMaximumSignatureSizeInBytes(signing_key)
1165 self.assertEqual(72, signature_size)
1166
1167 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baofabe0832018-01-17 15:52:28 -08001168 def test_Sign(self):
1169 payload_signer = PayloadSigner()
1170 input_file = os.path.join(self.testdata_dir, self.SIGFILE)
1171 signed_file = payload_signer.Sign(input_file)
1172
1173 verify_file = os.path.join(self.testdata_dir, self.SIGNED_SIGFILE)
1174 self._assertFilesEqual(verify_file, signed_file)
1175
1176 def test_Sign_withExternalSigner_openssl(self):
1177 """Uses openssl as the external payload signer."""
1178 common.OPTIONS.payload_signer = 'openssl'
1179 common.OPTIONS.payload_signer_args = [
1180 'pkeyutl', '-sign', '-keyform', 'DER', '-inkey',
1181 os.path.join(self.testdata_dir, 'testkey.pk8'),
1182 '-pkeyopt', 'digest:sha256']
1183 payload_signer = PayloadSigner()
1184 input_file = os.path.join(self.testdata_dir, self.SIGFILE)
1185 signed_file = payload_signer.Sign(input_file)
1186
1187 verify_file = os.path.join(self.testdata_dir, self.SIGNED_SIGFILE)
1188 self._assertFilesEqual(verify_file, signed_file)
1189
1190 def test_Sign_withExternalSigner_script(self):
1191 """Uses testdata/payload_signer.sh as the external payload signer."""
1192 common.OPTIONS.payload_signer = os.path.join(
1193 self.testdata_dir, 'payload_signer.sh')
Tao Bao30e31142019-04-09 00:12:30 -07001194 os.chmod(common.OPTIONS.payload_signer, 0o700)
Tao Baofabe0832018-01-17 15:52:28 -08001195 common.OPTIONS.payload_signer_args = [
1196 os.path.join(self.testdata_dir, 'testkey.pk8')]
1197 payload_signer = PayloadSigner()
1198 input_file = os.path.join(self.testdata_dir, self.SIGFILE)
1199 signed_file = payload_signer.Sign(input_file)
1200
1201 verify_file = os.path.join(self.testdata_dir, self.SIGNED_SIGFILE)
1202 self._assertFilesEqual(verify_file, signed_file)
Tao Baoc7b403a2018-01-30 18:19:04 -08001203
1204
Tao Bao65b94e92018-10-11 21:57:26 -07001205class PayloadTest(test_utils.ReleaseToolsTestCase):
Tao Baoc7b403a2018-01-30 18:19:04 -08001206
1207 def setUp(self):
Tao Bao04e1f012018-02-04 12:13:35 -08001208 self.testdata_dir = test_utils.get_testdata_dir()
Tao Baoc7b403a2018-01-30 18:19:04 -08001209 self.assertTrue(os.path.exists(self.testdata_dir))
1210
1211 common.OPTIONS.wipe_user_data = False
1212 common.OPTIONS.payload_signer = None
1213 common.OPTIONS.payload_signer_args = None
1214 common.OPTIONS.package_key = os.path.join(self.testdata_dir, 'testkey')
1215 common.OPTIONS.key_passwords = {
Kelvin Zhang39aea442020-08-17 11:04:25 -04001216 common.OPTIONS.package_key: None,
Tao Baoc7b403a2018-01-30 18:19:04 -08001217 }
1218
Tao Baoc7b403a2018-01-30 18:19:04 -08001219 @staticmethod
Tao Baof7140c02018-01-30 17:09:24 -08001220 def _create_payload_full(secondary=False):
1221 target_file = construct_target_files(secondary)
Tao Bao667ff572018-02-10 00:02:40 -08001222 payload = Payload(secondary)
Tao Baoc7b403a2018-01-30 18:19:04 -08001223 payload.Generate(target_file)
1224 return payload
1225
Tao Baof7140c02018-01-30 17:09:24 -08001226 @staticmethod
1227 def _create_payload_incremental():
1228 target_file = construct_target_files()
1229 source_file = construct_target_files()
Tao Baoc7b403a2018-01-30 18:19:04 -08001230 payload = Payload()
1231 payload.Generate(target_file, source_file)
1232 return payload
1233
Tao Bao82490d32019-04-09 00:12:30 -07001234 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001235 def test_Generate_full(self):
1236 payload = self._create_payload_full()
1237 self.assertTrue(os.path.exists(payload.payload_file))
1238
Tao Bao82490d32019-04-09 00:12:30 -07001239 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001240 def test_Generate_incremental(self):
1241 payload = self._create_payload_incremental()
1242 self.assertTrue(os.path.exists(payload.payload_file))
1243
Tao Bao82490d32019-04-09 00:12:30 -07001244 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001245 def test_Generate_additionalArgs(self):
Tao Baof7140c02018-01-30 17:09:24 -08001246 target_file = construct_target_files()
1247 source_file = construct_target_files()
Tao Baoc7b403a2018-01-30 18:19:04 -08001248 payload = Payload()
1249 # This should work the same as calling payload.Generate(target_file,
1250 # source_file).
1251 payload.Generate(
1252 target_file, additional_args=["--source_image", source_file])
1253 self.assertTrue(os.path.exists(payload.payload_file))
1254
Tao Bao82490d32019-04-09 00:12:30 -07001255 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001256 def test_Generate_invalidInput(self):
Tao Baof7140c02018-01-30 17:09:24 -08001257 target_file = construct_target_files()
Tao Baoc7b403a2018-01-30 18:19:04 -08001258 common.ZipDelete(target_file, 'IMAGES/vendor.img')
1259 payload = Payload()
Tao Baobec89c12018-10-15 11:53:28 -07001260 self.assertRaises(common.ExternalError, payload.Generate, target_file)
Tao Baoc7b403a2018-01-30 18:19:04 -08001261
Tao Bao82490d32019-04-09 00:12:30 -07001262 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001263 def test_Sign_full(self):
1264 payload = self._create_payload_full()
1265 payload.Sign(PayloadSigner())
1266
1267 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001268 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baoc7b403a2018-01-30 18:19:04 -08001269 payload.WriteToZip(output_zip)
1270
1271 import check_ota_package_signature
1272 check_ota_package_signature.VerifyAbOtaPayload(
1273 os.path.join(self.testdata_dir, 'testkey.x509.pem'),
1274 output_file)
1275
Tao Bao82490d32019-04-09 00:12:30 -07001276 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001277 def test_Sign_incremental(self):
1278 payload = self._create_payload_incremental()
1279 payload.Sign(PayloadSigner())
1280
1281 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001282 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baoc7b403a2018-01-30 18:19:04 -08001283 payload.WriteToZip(output_zip)
1284
1285 import check_ota_package_signature
1286 check_ota_package_signature.VerifyAbOtaPayload(
1287 os.path.join(self.testdata_dir, 'testkey.x509.pem'),
1288 output_file)
1289
Tao Bao82490d32019-04-09 00:12:30 -07001290 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001291 def test_Sign_withDataWipe(self):
1292 common.OPTIONS.wipe_user_data = True
1293 payload = self._create_payload_full()
1294 payload.Sign(PayloadSigner())
1295
1296 with open(payload.payload_properties) as properties_fp:
1297 self.assertIn("POWERWASH=1", properties_fp.read())
1298
Tao Bao82490d32019-04-09 00:12:30 -07001299 @test_utils.SkipIfExternalToolsUnavailable()
Tao Bao667ff572018-02-10 00:02:40 -08001300 def test_Sign_secondary(self):
1301 payload = self._create_payload_full(secondary=True)
1302 payload.Sign(PayloadSigner())
1303
1304 with open(payload.payload_properties) as properties_fp:
1305 self.assertIn("SWITCH_SLOT_ON_REBOOT=0", properties_fp.read())
1306
Tao Bao82490d32019-04-09 00:12:30 -07001307 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001308 def test_Sign_badSigner(self):
1309 """Tests that signing failure can be captured."""
1310 payload = self._create_payload_full()
1311 payload_signer = PayloadSigner()
1312 payload_signer.signer_args.append('bad-option')
Tao Baobec89c12018-10-15 11:53:28 -07001313 self.assertRaises(common.ExternalError, payload.Sign, payload_signer)
Tao Baoc7b403a2018-01-30 18:19:04 -08001314
Tao Bao82490d32019-04-09 00:12:30 -07001315 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001316 def test_WriteToZip(self):
1317 payload = self._create_payload_full()
1318 payload.Sign(PayloadSigner())
1319
1320 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001321 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baoc7b403a2018-01-30 18:19:04 -08001322 payload.WriteToZip(output_zip)
1323
1324 with zipfile.ZipFile(output_file) as verify_zip:
1325 # First make sure we have the essential entries.
1326 namelist = verify_zip.namelist()
1327 self.assertIn(Payload.PAYLOAD_BIN, namelist)
1328 self.assertIn(Payload.PAYLOAD_PROPERTIES_TXT, namelist)
1329
1330 # Then assert these entries are stored.
1331 for entry_info in verify_zip.infolist():
1332 if entry_info.filename not in (Payload.PAYLOAD_BIN,
1333 Payload.PAYLOAD_PROPERTIES_TXT):
1334 continue
1335 self.assertEqual(zipfile.ZIP_STORED, entry_info.compress_type)
1336
Tao Bao82490d32019-04-09 00:12:30 -07001337 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baoc7b403a2018-01-30 18:19:04 -08001338 def test_WriteToZip_unsignedPayload(self):
1339 """Unsigned payloads should not be allowed to be written to zip."""
1340 payload = self._create_payload_full()
1341
1342 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001343 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baoc7b403a2018-01-30 18:19:04 -08001344 self.assertRaises(AssertionError, payload.WriteToZip, output_zip)
1345
1346 # Also test with incremental payload.
1347 payload = self._create_payload_incremental()
1348
1349 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001350 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Baoc7b403a2018-01-30 18:19:04 -08001351 self.assertRaises(AssertionError, payload.WriteToZip, output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001352
Tao Bao82490d32019-04-09 00:12:30 -07001353 @test_utils.SkipIfExternalToolsUnavailable()
Tao Baof7140c02018-01-30 17:09:24 -08001354 def test_WriteToZip_secondary(self):
1355 payload = self._create_payload_full(secondary=True)
1356 payload.Sign(PayloadSigner())
1357
1358 output_file = common.MakeTempFile(suffix='.zip')
Kelvin Zhang928c2342020-09-22 16:15:57 -04001359 with zipfile.ZipFile(output_file, 'w', allowZip64=True) as output_zip:
Tao Bao667ff572018-02-10 00:02:40 -08001360 payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001361
1362 with zipfile.ZipFile(output_file) as verify_zip:
1363 # First make sure we have the essential entries.
1364 namelist = verify_zip.namelist()
1365 self.assertIn(Payload.SECONDARY_PAYLOAD_BIN, namelist)
1366 self.assertIn(Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT, namelist)
1367
1368 # Then assert these entries are stored.
1369 for entry_info in verify_zip.infolist():
1370 if entry_info.filename not in (
Kelvin Zhang39aea442020-08-17 11:04:25 -04001371 Payload.SECONDARY_PAYLOAD_BIN,
1372 Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT):
Tao Baof7140c02018-01-30 17:09:24 -08001373 continue
1374 self.assertEqual(zipfile.ZIP_STORED, entry_info.compress_type)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001375
1376
1377class RuntimeFingerprintTest(test_utils.ReleaseToolsTestCase):
1378 MISC_INFO = [
1379 'recovery_api_version=3',
1380 'fstab_version=2',
1381 'recovery_as_boot=true',
Kelvin Zhang39aea442020-08-17 11:04:25 -04001382 'ab_update=true',
Tianjie Xu9afb2212020-05-10 21:48:15 +00001383 ]
1384
1385 BUILD_PROP = [
Tianjie Xu9afb2212020-05-10 21:48:15 +00001386 'ro.build.id=build-id',
1387 'ro.build.version.incremental=version-incremental',
1388 'ro.build.type=build-type',
1389 'ro.build.tags=build-tags',
Tianjieb37c5be2020-10-15 21:27:10 -07001390 'ro.build.version.release=version-release',
1391 'ro.build.version.release_or_codename=version-release',
Tianjied6867162020-05-10 14:30:13 -07001392 'ro.build.version.sdk=30',
1393 'ro.build.version.security_patch=2020',
Tianjiea2076132020-08-19 17:25:32 -07001394 'ro.build.date.utc=12345678',
1395 'ro.system.build.version.release=version-release',
1396 'ro.system.build.id=build-id',
1397 'ro.system.build.version.incremental=version-incremental',
1398 'ro.system.build.type=build-type',
1399 'ro.system.build.tags=build-tags',
1400 'ro.system.build.version.sdk=30',
1401 'ro.system.build.version.security_patch=2020',
1402 'ro.system.build.date.utc=12345678',
1403 'ro.product.system.brand=generic',
1404 'ro.product.system.name=generic',
1405 'ro.product.system.device=generic',
Tianjie Xu9afb2212020-05-10 21:48:15 +00001406 ]
1407
1408 VENDOR_BUILD_PROP = [
Tianjiea2076132020-08-19 17:25:32 -07001409 'ro.vendor.build.version.release=version-release',
1410 'ro.vendor.build.id=build-id',
1411 'ro.vendor.build.version.incremental=version-incremental',
1412 'ro.vendor.build.type=build-type',
1413 'ro.vendor.build.tags=build-tags',
1414 'ro.vendor.build.version.sdk=30',
1415 'ro.vendor.build.version.security_patch=2020',
1416 'ro.vendor.build.date.utc=12345678',
Tianjie Xu9afb2212020-05-10 21:48:15 +00001417 'ro.product.vendor.brand=vendor-product-brand',
1418 'ro.product.vendor.name=vendor-product-name',
1419 'ro.product.vendor.device=vendor-product-device'
1420 ]
1421
1422 def setUp(self):
1423 common.OPTIONS.oem_dicts = None
1424 self.test_dir = common.MakeTempDir()
Tianjied6867162020-05-10 14:30:13 -07001425 self.writeFiles({'META/misc_info.txt': '\n'.join(self.MISC_INFO)},
1426 self.test_dir)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001427
Tianjied6867162020-05-10 14:30:13 -07001428 def writeFiles(self, contents_dict, out_dir):
Tianjie Xu9afb2212020-05-10 21:48:15 +00001429 for path, content in contents_dict.items():
Tianjied6867162020-05-10 14:30:13 -07001430 abs_path = os.path.join(out_dir, path)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001431 dir_name = os.path.dirname(abs_path)
1432 if not os.path.exists(dir_name):
1433 os.makedirs(dir_name)
1434 with open(abs_path, 'w') as f:
1435 f.write(content)
1436
1437 @staticmethod
1438 def constructFingerprint(prefix):
1439 return '{}:version-release/build-id/version-incremental:' \
1440 'build-type/build-tags'.format(prefix)
1441
1442 def test_CalculatePossibleFingerprints_no_dynamic_fingerprint(self):
1443 build_prop = copy.deepcopy(self.BUILD_PROP)
1444 build_prop.extend([
1445 'ro.product.brand=product-brand',
1446 'ro.product.name=product-name',
1447 'ro.product.device=product-device',
1448 ])
1449 self.writeFiles({
1450 'SYSTEM/build.prop': '\n'.join(build_prop),
1451 'VENDOR/build.prop': '\n'.join(self.VENDOR_BUILD_PROP),
Tianjied6867162020-05-10 14:30:13 -07001452 }, self.test_dir)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001453
Tianjied6867162020-05-10 14:30:13 -07001454 build_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
1455 expected = ({'product-device'},
1456 {self.constructFingerprint(
1457 'product-brand/product-name/product-device')})
1458 self.assertEqual(expected,
1459 CalculateRuntimeDevicesAndFingerprints(build_info, {}))
Tianjie Xu9afb2212020-05-10 21:48:15 +00001460
1461 def test_CalculatePossibleFingerprints_single_override(self):
1462 vendor_build_prop = copy.deepcopy(self.VENDOR_BUILD_PROP)
1463 vendor_build_prop.extend([
1464 'import /vendor/etc/build_${ro.boot.sku_name}.prop',
1465 ])
1466 self.writeFiles({
1467 'SYSTEM/build.prop': '\n'.join(self.BUILD_PROP),
1468 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1469 'VENDOR/etc/build_std.prop':
1470 'ro.product.vendor.name=vendor-product-std',
1471 'VENDOR/etc/build_pro.prop':
1472 'ro.product.vendor.name=vendor-product-pro',
Tianjied6867162020-05-10 14:30:13 -07001473 }, self.test_dir)
Tianjie Xu9afb2212020-05-10 21:48:15 +00001474
Tianjied6867162020-05-10 14:30:13 -07001475 build_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
1476 boot_variable_values = {'ro.boot.sku_name': ['std', 'pro']}
1477
1478 expected = ({'vendor-product-device'}, {
Tianjie Xu9afb2212020-05-10 21:48:15 +00001479 self.constructFingerprint(
1480 'vendor-product-brand/vendor-product-name/vendor-product-device'),
1481 self.constructFingerprint(
1482 'vendor-product-brand/vendor-product-std/vendor-product-device'),
1483 self.constructFingerprint(
1484 'vendor-product-brand/vendor-product-pro/vendor-product-device'),
Tianjied6867162020-05-10 14:30:13 -07001485 })
1486 self.assertEqual(
1487 expected, CalculateRuntimeDevicesAndFingerprints(
1488 build_info, boot_variable_values))
Tianjie Xu9afb2212020-05-10 21:48:15 +00001489
1490 def test_CalculatePossibleFingerprints_multiple_overrides(self):
1491 vendor_build_prop = copy.deepcopy(self.VENDOR_BUILD_PROP)
1492 vendor_build_prop.extend([
1493 'import /vendor/etc/build_${ro.boot.sku_name}.prop',
1494 'import /vendor/etc/build_${ro.boot.device_name}.prop',
1495 ])
1496 self.writeFiles({
1497 'SYSTEM/build.prop': '\n'.join(self.BUILD_PROP),
1498 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1499 'VENDOR/etc/build_std.prop':
1500 'ro.product.vendor.name=vendor-product-std',
1501 'VENDOR/etc/build_product1.prop':
1502 'ro.product.vendor.device=vendor-device-product1',
1503 'VENDOR/etc/build_pro.prop':
1504 'ro.product.vendor.name=vendor-product-pro',
1505 'VENDOR/etc/build_product2.prop':
1506 'ro.product.vendor.device=vendor-device-product2',
Tianjied6867162020-05-10 14:30:13 -07001507 }, self.test_dir)
1508
1509 build_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
1510 boot_variable_values = {
Tianjie Xu9afb2212020-05-10 21:48:15 +00001511 'ro.boot.sku_name': ['std', 'pro'],
1512 'ro.boot.device_name': ['product1', 'product2'],
1513 }
1514
Tianjied6867162020-05-10 14:30:13 -07001515 expected_devices = {'vendor-product-device', 'vendor-device-product1',
1516 'vendor-device-product2'}
1517 expected_fingerprints = {
Tianjie Xu9afb2212020-05-10 21:48:15 +00001518 self.constructFingerprint(
1519 'vendor-product-brand/vendor-product-name/vendor-product-device'),
1520 self.constructFingerprint(
1521 'vendor-product-brand/vendor-product-std/vendor-device-product1'),
1522 self.constructFingerprint(
1523 'vendor-product-brand/vendor-product-pro/vendor-device-product1'),
1524 self.constructFingerprint(
1525 'vendor-product-brand/vendor-product-std/vendor-device-product2'),
1526 self.constructFingerprint(
Tianjied6867162020-05-10 14:30:13 -07001527 'vendor-product-brand/vendor-product-pro/vendor-device-product2')
1528 }
1529 self.assertEqual((expected_devices, expected_fingerprints),
1530 CalculateRuntimeDevicesAndFingerprints(
1531 build_info, boot_variable_values))
1532
1533 def test_GetPackageMetadata_full_package(self):
1534 vendor_build_prop = copy.deepcopy(self.VENDOR_BUILD_PROP)
1535 vendor_build_prop.extend([
1536 'import /vendor/etc/build_${ro.boot.sku_name}.prop',
1537 ])
1538 self.writeFiles({
1539 'SYSTEM/build.prop': '\n'.join(self.BUILD_PROP),
1540 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1541 'VENDOR/etc/build_std.prop':
1542 'ro.product.vendor.name=vendor-product-std',
1543 'VENDOR/etc/build_pro.prop':
1544 'ro.product.vendor.name=vendor-product-pro',
Kelvin Zhang39aea442020-08-17 11:04:25 -04001545 AB_PARTITIONS: '\n'.join(['system', 'vendor']),
Tianjied6867162020-05-10 14:30:13 -07001546 }, self.test_dir)
1547
1548 common.OPTIONS.boot_variable_file = common.MakeTempFile()
1549 with open(common.OPTIONS.boot_variable_file, 'w') as f:
1550 f.write('ro.boot.sku_name=std,pro')
1551
1552 build_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
Tianjiea2076132020-08-19 17:25:32 -07001553 metadata_dict = BuildLegacyOtaMetadata(GetPackageMetadata(build_info))
1554 self.assertEqual('vendor-product-device', metadata_dict['pre-device'])
Tianjied6867162020-05-10 14:30:13 -07001555 fingerprints = [
1556 self.constructFingerprint(
1557 'vendor-product-brand/vendor-product-name/vendor-product-device'),
1558 self.constructFingerprint(
1559 'vendor-product-brand/vendor-product-pro/vendor-product-device'),
1560 self.constructFingerprint(
1561 'vendor-product-brand/vendor-product-std/vendor-product-device'),
1562 ]
Tianjiea2076132020-08-19 17:25:32 -07001563 self.assertEqual('|'.join(fingerprints), metadata_dict['post-build'])
1564
1565 def CheckMetadataEqual(self, metadata_dict, metadata_proto):
1566 post_build = metadata_proto.postcondition
1567 self.assertEqual('|'.join(post_build.build),
1568 metadata_dict['post-build'])
1569 self.assertEqual(post_build.build_incremental,
1570 metadata_dict['post-build-incremental'])
1571 self.assertEqual(post_build.sdk_level,
1572 metadata_dict['post-sdk-level'])
1573 self.assertEqual(post_build.security_patch_level,
1574 metadata_dict['post-security-patch-level'])
1575
1576 if metadata_proto.type == ota_metadata_pb2.OtaMetadata.AB:
1577 ota_type = 'AB'
1578 elif metadata_proto.type == ota_metadata_pb2.OtaMetadata.BLOCK:
1579 ota_type = 'BLOCK'
1580 else:
1581 ota_type = ''
1582 self.assertEqual(ota_type, metadata_dict['ota-type'])
1583 self.assertEqual(metadata_proto.wipe,
1584 metadata_dict.get('ota-wipe') == 'yes')
1585 self.assertEqual(metadata_proto.required_cache,
1586 int(metadata_dict.get('ota-required-cache', 0)))
1587 self.assertEqual(metadata_proto.retrofit_dynamic_partitions,
1588 metadata_dict.get(
Tianjie2bb14862020-08-28 16:24:34 -07001589 'ota-retrofit-dynamic-partitions') == 'yes')
Tianjied6867162020-05-10 14:30:13 -07001590
1591 def test_GetPackageMetadata_incremental_package(self):
1592 vendor_build_prop = copy.deepcopy(self.VENDOR_BUILD_PROP)
1593 vendor_build_prop.extend([
1594 'import /vendor/etc/build_${ro.boot.sku_name}.prop',
1595 ])
1596 self.writeFiles({
Kelvin Zhang39aea442020-08-17 11:04:25 -04001597 'META/misc_info.txt': '\n'.join(self.MISC_INFO),
1598 'META/ab_partitions.txt': '\n'.join(['system', 'vendor', 'product']),
Tianjied6867162020-05-10 14:30:13 -07001599 'SYSTEM/build.prop': '\n'.join(self.BUILD_PROP),
1600 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1601 'VENDOR/etc/build_std.prop':
1602 'ro.product.vendor.device=vendor-device-std',
1603 'VENDOR/etc/build_pro.prop':
1604 'ro.product.vendor.device=vendor-device-pro',
1605 }, self.test_dir)
1606
1607 common.OPTIONS.boot_variable_file = common.MakeTempFile()
1608 with open(common.OPTIONS.boot_variable_file, 'w') as f:
1609 f.write('ro.boot.sku_name=std,pro')
1610
1611 source_dir = common.MakeTempDir()
1612 source_build_prop = [
1613 'ro.build.version.release=source-version-release',
1614 'ro.build.id=source-build-id',
1615 'ro.build.version.incremental=source-version-incremental',
1616 'ro.build.type=build-type',
1617 'ro.build.tags=build-tags',
1618 'ro.build.version.sdk=29',
1619 'ro.build.version.security_patch=2020',
Tianjiea2076132020-08-19 17:25:32 -07001620 'ro.build.date.utc=12340000',
1621 'ro.system.build.version.release=source-version-release',
1622 'ro.system.build.id=source-build-id',
1623 'ro.system.build.version.incremental=source-version-incremental',
1624 'ro.system.build.type=build-type',
1625 'ro.system.build.tags=build-tags',
1626 'ro.system.build.version.sdk=29',
1627 'ro.system.build.version.security_patch=2020',
1628 'ro.system.build.date.utc=12340000',
1629 'ro.product.system.brand=generic',
1630 'ro.product.system.name=generic',
1631 'ro.product.system.device=generic',
Tianjied6867162020-05-10 14:30:13 -07001632 ]
1633 self.writeFiles({
1634 'META/misc_info.txt': '\n'.join(self.MISC_INFO),
Kelvin Zhang39aea442020-08-17 11:04:25 -04001635 'META/ab_partitions.txt': '\n'.join(['system', 'vendor', 'product']),
Tianjied6867162020-05-10 14:30:13 -07001636 'SYSTEM/build.prop': '\n'.join(source_build_prop),
1637 'VENDOR/build.prop': '\n'.join(vendor_build_prop),
1638 'VENDOR/etc/build_std.prop':
1639 'ro.product.vendor.device=vendor-device-std',
1640 'VENDOR/etc/build_pro.prop':
1641 'ro.product.vendor.device=vendor-device-pro',
1642 }, source_dir)
1643 common.OPTIONS.incremental_source = source_dir
1644
1645 target_info = common.BuildInfo(common.LoadInfoDict(self.test_dir))
1646 source_info = common.BuildInfo(common.LoadInfoDict(source_dir))
1647
Tianjiea2076132020-08-19 17:25:32 -07001648 metadata_proto = GetPackageMetadata(target_info, source_info)
1649 metadata_dict = BuildLegacyOtaMetadata(metadata_proto)
Tianjied6867162020-05-10 14:30:13 -07001650 self.assertEqual(
1651 'vendor-device-pro|vendor-device-std|vendor-product-device',
Tianjiea2076132020-08-19 17:25:32 -07001652 metadata_dict['pre-device'])
Tianjie2bb14862020-08-28 16:24:34 -07001653 source_suffix = ':source-version-release/source-build-id/' \
1654 'source-version-incremental:build-type/build-tags'
Tianjied6867162020-05-10 14:30:13 -07001655 pre_fingerprints = [
1656 'vendor-product-brand/vendor-product-name/vendor-device-pro'
Tianjie2bb14862020-08-28 16:24:34 -07001657 '{}'.format(source_suffix),
Tianjied6867162020-05-10 14:30:13 -07001658 'vendor-product-brand/vendor-product-name/vendor-device-std'
Tianjie2bb14862020-08-28 16:24:34 -07001659 '{}'.format(source_suffix),
Tianjied6867162020-05-10 14:30:13 -07001660 'vendor-product-brand/vendor-product-name/vendor-product-device'
Tianjie2bb14862020-08-28 16:24:34 -07001661 '{}'.format(source_suffix),
Tianjied6867162020-05-10 14:30:13 -07001662 ]
Tianjiea2076132020-08-19 17:25:32 -07001663 self.assertEqual('|'.join(pre_fingerprints), metadata_dict['pre-build'])
Tianjied6867162020-05-10 14:30:13 -07001664
1665 post_fingerprints = [
1666 self.constructFingerprint(
1667 'vendor-product-brand/vendor-product-name/vendor-device-pro'),
1668 self.constructFingerprint(
1669 'vendor-product-brand/vendor-product-name/vendor-device-std'),
1670 self.constructFingerprint(
1671 'vendor-product-brand/vendor-product-name/vendor-product-device'),
1672 ]
Tianjiea2076132020-08-19 17:25:32 -07001673 self.assertEqual('|'.join(post_fingerprints), metadata_dict['post-build'])
1674
1675 self.CheckMetadataEqual(metadata_dict, metadata_proto)
Tianjie2bb14862020-08-28 16:24:34 -07001676
1677 pre_partition_states = metadata_proto.precondition.partition_state
1678 self.assertEqual(2, len(pre_partition_states))
1679 self.assertEqual('system', pre_partition_states[0].partition_name)
1680 self.assertEqual(['generic'], pre_partition_states[0].device)
1681 self.assertEqual(['generic/generic/generic{}'.format(source_suffix)],
1682 pre_partition_states[0].build)
1683
1684 self.assertEqual('vendor', pre_partition_states[1].partition_name)
1685 self.assertEqual(['vendor-device-pro', 'vendor-device-std',
1686 'vendor-product-device'], pre_partition_states[1].device)
1687 vendor_fingerprints = post_fingerprints
1688 self.assertEqual(vendor_fingerprints, pre_partition_states[1].build)
1689
1690 post_partition_states = metadata_proto.postcondition.partition_state
1691 self.assertEqual(2, len(post_partition_states))
1692 self.assertEqual('system', post_partition_states[0].partition_name)
1693 self.assertEqual(['generic'], post_partition_states[0].device)
1694 self.assertEqual([self.constructFingerprint('generic/generic/generic')],
1695 post_partition_states[0].build)
1696
1697 self.assertEqual('vendor', post_partition_states[1].partition_name)
1698 self.assertEqual(['vendor-device-pro', 'vendor-device-std',
1699 'vendor-product-device'], post_partition_states[1].device)
1700 self.assertEqual(vendor_fingerprints, post_partition_states[1].build)