blob: 6b82d32cb0a98faabf9f2b2fe13080f875d5ec70 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
Doug Zongkereef39442009-04-02 12:14:19 -0700214"""
215
Tao Bao89fbb0f2017-01-10 10:47:58 -0800216from __future__ import print_function
217
Tao Bao32fcdab2018-10-12 10:30:39 -0700218import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700219import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500220import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800221import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500222import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700223import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800224import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800225import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500226import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800227import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700228import zipfile
229
230import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400231import ota_utils
Kelvin Zhang0876c412020-06-23 15:06:58 -0400232import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400233from check_target_files_vintf import CheckVintfIfTrebleEnabled
234from non_ab_ota import GenerateNonAbOtaPackage
235from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
236 PropertyFiles)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400237
Tao Bao481bab82017-12-21 11:23:09 -0800238if sys.hexversion < 0x02070000:
239 print("Python 2.7 or newer is required.", file=sys.stderr)
240 sys.exit(1)
241
Tao Bao32fcdab2018-10-12 10:30:39 -0700242logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800243
Kelvin Zhang2e417382020-08-20 11:33:11 -0400244OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700245OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700246OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700247OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700248OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700249OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
250if OPTIONS.worker_threads == 0:
251 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800252OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800253OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800254OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800255OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000256OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700257OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800258OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700259OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700260OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700261# Stash size cannot exceed cache_size * threshold.
262OPTIONS.cache_size = None
263OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800264OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700265OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700266OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700267OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700268OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800269OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800270OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700271OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500272OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700273OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700274OPTIONS.custom_images = {}
Tao Bao8dcf7382015-05-21 14:09:49 -0700275
Tao Bao15a146a2018-02-21 16:06:59 -0800276POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800277DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800278AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400279
Tao Baof0c4aa22018-04-30 20:29:30 -0700280# Files to be unzipped for target diffing purpose.
281TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700282 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700283 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800284RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700285
286# Images to be excluded from secondary payload. We essentially only keep
287# 'system_other' and bootloader partitions.
288SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000289 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700290 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700291 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800292
Tao Bao2dd1c482017-02-03 16:49:39 -0800293
Tao Baofabe0832018-01-17 15:52:28 -0800294class PayloadSigner(object):
295 """A class that wraps the payload signing works.
296
297 When generating a Payload, hashes of the payload and metadata files will be
298 signed with the device key, either by calling an external payload signer or
299 by calling openssl with the package key. This class provides a unified
300 interface, so that callers can just call PayloadSigner.Sign().
301
302 If an external payload signer has been specified (OPTIONS.payload_signer), it
303 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
304 that the signing key should be provided as part of the payload_signer_args.
305 Otherwise without an external signer, it uses the package key
306 (OPTIONS.package_key) and calls openssl for the signing works.
307 """
308
309 def __init__(self):
310 if OPTIONS.payload_signer is None:
311 # Prepare the payload signing key.
312 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
313 pw = OPTIONS.key_passwords[OPTIONS.package_key]
314
315 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
316 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
317 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
318 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700319 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800320
321 self.signer = "openssl"
322 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
323 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700324 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
325 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800326 else:
327 self.signer = OPTIONS.payload_signer
328 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700329 if OPTIONS.payload_signer_maximum_signature_size:
330 self.maximum_signature_size = int(
331 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700332 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700333 # The legacy config uses RSA2048 keys.
334 logger.warning("The maximum signature size for payload signer is not"
335 " set, default to 256 bytes.")
336 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700337
338 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700339 def _GetMaximumSignatureSizeInBytes(signing_key):
340 out_signature_size_file = common.MakeTempFile("signature_size")
341 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
342 out_signature_size_file), "--private_key={}".format(signing_key)]
343 common.RunAndCheckOutput(cmd)
344 with open(out_signature_size_file) as f:
345 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100346 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700347 signature_size)
348 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800349
350 def Sign(self, in_file):
351 """Signs the given input file. Returns the output filename."""
352 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
353 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700354 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800355 return out_file
356
357
Tao Bao40b18822018-01-30 18:19:04 -0800358class Payload(object):
359 """Manages the creation and the signing of an A/B OTA Payload."""
360
361 PAYLOAD_BIN = 'payload.bin'
362 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800363 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
364 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800365
Tao Bao667ff572018-02-10 00:02:40 -0800366 def __init__(self, secondary=False):
367 """Initializes a Payload instance.
368
369 Args:
370 secondary: Whether it's generating a secondary payload (default: False).
371 """
Tao Bao40b18822018-01-30 18:19:04 -0800372 self.payload_file = None
373 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800374 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800375
Tao Baof0c4aa22018-04-30 20:29:30 -0700376 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700377 # Don't pipe (buffer) the output if verbose is set. Let
378 # brillo_update_payload write to stdout/stderr directly, so its progress can
379 # be monitored.
380 if OPTIONS.verbose:
381 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
382 else:
383 common.RunAndCheckOutput(cmd)
384
Tao Bao40b18822018-01-30 18:19:04 -0800385 def Generate(self, target_file, source_file=None, additional_args=None):
386 """Generates a payload from the given target-files zip(s).
387
388 Args:
389 target_file: The filename of the target build target-files zip.
390 source_file: The filename of the source build target-files zip; or None if
391 generating a full OTA.
392 additional_args: A list of additional args that should be passed to
393 brillo_update_payload script; or None.
394 """
395 if additional_args is None:
396 additional_args = []
397
398 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
399 cmd = ["brillo_update_payload", "generate",
400 "--payload", payload_file,
401 "--target_image", target_file]
402 if source_file is not None:
403 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700404 if OPTIONS.disable_fec_computation:
405 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500406 if OPTIONS.disable_verity_computation:
407 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800408 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700409 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800410
411 self.payload_file = payload_file
412 self.payload_properties = None
413
414 def Sign(self, payload_signer):
415 """Generates and signs the hashes of the payload and metadata.
416
417 Args:
418 payload_signer: A PayloadSigner() instance that serves the signing work.
419
420 Raises:
421 AssertionError: On any failure when calling brillo_update_payload script.
422 """
423 assert isinstance(payload_signer, PayloadSigner)
424
425 # 1. Generate hashes of the payload and metadata files.
426 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
427 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
428 cmd = ["brillo_update_payload", "hash",
429 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700430 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800431 "--metadata_hash_file", metadata_sig_file,
432 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700433 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800434
435 # 2. Sign the hashes.
436 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
437 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
438
439 # 3. Insert the signatures back into the payload file.
440 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
441 suffix=".bin")
442 cmd = ["brillo_update_payload", "sign",
443 "--unsigned_payload", self.payload_file,
444 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700445 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800446 "--metadata_signature_file", signed_metadata_sig_file,
447 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700448 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800449
450 # 4. Dump the signed payload properties.
451 properties_file = common.MakeTempFile(prefix="payload-properties-",
452 suffix=".txt")
453 cmd = ["brillo_update_payload", "properties",
454 "--payload", signed_payload_file,
455 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700456 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800457
Tao Bao667ff572018-02-10 00:02:40 -0800458 if self.secondary:
459 with open(properties_file, "a") as f:
460 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
461
Tao Bao40b18822018-01-30 18:19:04 -0800462 if OPTIONS.wipe_user_data:
463 with open(properties_file, "a") as f:
464 f.write("POWERWASH=1\n")
465
466 self.payload_file = signed_payload_file
467 self.payload_properties = properties_file
468
Tao Bao667ff572018-02-10 00:02:40 -0800469 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800470 """Writes the payload to the given zip.
471
472 Args:
473 output_zip: The output ZipFile instance.
474 """
475 assert self.payload_file is not None
476 assert self.payload_properties is not None
477
Tao Bao667ff572018-02-10 00:02:40 -0800478 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800479 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
480 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
481 else:
482 payload_arcname = Payload.PAYLOAD_BIN
483 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
484
Tao Bao40b18822018-01-30 18:19:04 -0800485 # Add the signed payload file and properties into the zip. In order to
486 # support streaming, we pack them as ZIP_STORED. So these entries can be
487 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800488 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800489 compress_type=zipfile.ZIP_STORED)
490 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800491 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800492 compress_type=zipfile.ZIP_STORED)
493
494
Tao Bao481bab82017-12-21 11:23:09 -0800495def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800496 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800497 if not oem_source:
498 return None
499
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800500 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800501 for oem_file in oem_source:
502 with open(oem_file) as fp:
503 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800504 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700505
Doug Zongkereef39442009-04-02 12:14:19 -0700506
Tao Baod3fc38a2018-03-08 16:09:01 -0800507class StreamingPropertyFiles(PropertyFiles):
508 """A subclass for computing the property-files for streaming A/B OTAs."""
509
510 def __init__(self):
511 super(StreamingPropertyFiles, self).__init__()
512 self.name = 'ota-streaming-property-files'
513 self.required = (
514 # payload.bin and payload_properties.txt must exist.
515 'payload.bin',
516 'payload_properties.txt',
517 )
518 self.optional = (
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700519 # care_map is available only if dm-verity is enabled.
520 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800521 'care_map.txt',
522 # compatibility.zip is available only if target supports Treble.
523 'compatibility.zip',
524 )
525
526
Tao Bao85f16982018-03-08 16:28:33 -0800527class AbOtaPropertyFiles(StreamingPropertyFiles):
528 """The property-files for A/B OTA that includes payload_metadata.bin info.
529
530 Since P, we expose one more token (aka property-file), in addition to the ones
531 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
532 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
533 doesn't exist as a separate ZIP entry, but can be used to verify if the
534 payload can be applied on the given device.
535
536 For backward compatibility, we keep both of the 'ota-streaming-property-files'
537 and the newly added 'ota-property-files' in P. The new token will only be
538 available in 'ota-property-files'.
539 """
540
541 def __init__(self):
542 super(AbOtaPropertyFiles, self).__init__()
543 self.name = 'ota-property-files'
544
545 def _GetPrecomputed(self, input_zip):
546 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
547 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
548
549 @staticmethod
550 def _GetPayloadMetadataOffsetAndSize(input_zip):
551 """Computes the offset and size of the payload metadata for a given package.
552
553 (From system/update_engine/update_metadata.proto)
554 A delta update file contains all the deltas needed to update a system from
555 one specific version to another specific version. The update format is
556 represented by this struct pseudocode:
557
558 struct delta_update_file {
559 char magic[4] = "CrAU";
560 uint64 file_format_version;
561 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
562
563 // Only present if format_version > 1:
564 uint32 metadata_signature_size;
565
566 // The Bzip2 compressed DeltaArchiveManifest
567 char manifest[metadata_signature_size];
568
569 // The signature of the metadata (from the beginning of the payload up to
570 // this location, not including the signature itself). This is a
571 // serialized Signatures message.
572 char medatada_signature_message[metadata_signature_size];
573
574 // Data blobs for files, no specific format. The specific offset
575 // and length of each data blob is recorded in the DeltaArchiveManifest.
576 struct {
577 char data[];
578 } blobs[];
579
580 // These two are not signed:
581 uint64 payload_signatures_message_size;
582 char payload_signatures_message[];
583 };
584
585 'payload-metadata.bin' contains all the bytes from the beginning of the
586 payload, till the end of 'medatada_signature_message'.
587 """
588 payload_info = input_zip.getinfo('payload.bin')
Shashikant Baviskar338856f2018-04-12 12:11:22 +0900589 payload_offset = payload_info.header_offset
590 payload_offset += zipfile.sizeFileHeader
591 payload_offset += len(payload_info.extra) + len(payload_info.filename)
Tao Bao85f16982018-03-08 16:28:33 -0800592 payload_size = payload_info.file_size
593
Tao Bao59cf0c52019-06-25 10:04:24 -0700594 with input_zip.open('payload.bin') as payload_fp:
Tao Bao85f16982018-03-08 16:28:33 -0800595 header_bin = payload_fp.read(24)
596
597 # network byte order (big-endian)
598 header = struct.unpack("!IQQL", header_bin)
599
600 # 'CrAU'
601 magic = header[0]
602 assert magic == 0x43724155, "Invalid magic: {:x}".format(magic)
603
604 manifest_size = header[2]
605 metadata_signature_size = header[3]
606 metadata_total = 24 + manifest_size + metadata_signature_size
607 assert metadata_total < payload_size
608
609 return (payload_offset, metadata_total)
610
611
Yifan Hong38ab4d82020-06-18 15:19:56 -0700612def UpdatesInfoForSpecialUpdates(content, partitions_filter,
613 delete_keys=None):
614 """ Updates info file for secondary payload generation, partial update, etc.
615
616 Scan each line in the info file, and remove the unwanted partitions from
617 the dynamic partition list in the related properties. e.g.
618 "super_google_dynamic_partitions_partition_list=system vendor product"
619 will become "super_google_dynamic_partitions_partition_list=system".
620
621 Args:
622 content: The content of the input info file. e.g. misc_info.txt.
623 partitions_filter: A function to filter the desired partitions from a given
624 list
625 delete_keys: A list of keys to delete in the info file
626
627 Returns:
628 A string of the updated info content.
629 """
630
631 output_list = []
632 # The suffix in partition_list variables that follows the name of the
633 # partition group.
634 list_suffix = 'partition_list'
635 for line in content.splitlines():
636 if line.startswith('#') or '=' not in line:
637 output_list.append(line)
638 continue
639 key, value = line.strip().split('=', 1)
640
641 if delete_keys and key in delete_keys:
642 pass
643 elif key.endswith(list_suffix):
644 partitions = value.split()
645 # TODO for partial update, partitions in the same group must be all
646 # updated or all omitted
647 partitions = filter(partitions_filter, partitions)
648 output_list.append('{}={}'.format(key, ' '.join(partitions)))
649 else:
650 output_list.append(line)
651 return '\n'.join(output_list)
652
653
Tao Bao15a146a2018-02-21 16:06:59 -0800654def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800655 """Returns a target-files.zip file for generating secondary payload.
656
657 Although the original target-files.zip already contains secondary slot
658 images (i.e. IMAGES/system_other.img), we need to rename the files to the
659 ones without _other suffix. Note that we cannot instead modify the names in
660 META/ab_partitions.txt, because there are no matching partitions on device.
661
662 For the partitions that don't have secondary images, the ones for primary
663 slot will be used. This is to ensure that we always have valid boot, vbmeta,
664 bootloader images in the inactive slot.
665
666 Args:
667 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800668 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800669
670 Returns:
671 The filename of the target-files.zip for generating secondary payload.
672 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700673
674 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700675 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700676 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700677 content = f.read()
678 # Remove virtual_ab flag from secondary payload so that OTA client
679 # don't use snapshots for secondary update
680 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
681 return UpdatesInfoForSpecialUpdates(
682 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
683 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700684
Tao Baof7140c02018-01-30 17:09:24 -0800685 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
686 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
687
Kelvin Zhang928c2342020-09-22 16:15:57 -0400688 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800689 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700690
Tao Bao0ff15de2019-03-20 11:26:06 -0700691 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800692 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800693 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
694 if info.filename == 'IMAGES/system_other.img':
695 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
696
697 # Primary images and friends need to be skipped explicitly.
698 elif info.filename in ('IMAGES/system.img',
699 'IMAGES/system.map'):
700 pass
Tao Bao3e759462019-09-17 22:43:11 -0700701
702 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
703 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
704 image_name = os.path.basename(info.filename)
705 if image_name not in ['{}.img'.format(partition) for partition in
706 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
707 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800708
Tao Bao15a146a2018-02-21 16:06:59 -0800709 # Skip copying the postinstall config if requested.
710 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
711 pass
712
Tianjie Xu1c808002019-09-11 00:29:26 -0700713 elif info.filename.startswith('META/'):
714 # Remove the unnecessary partitions for secondary images from the
715 # ab_partitions file.
716 if info.filename == AB_PARTITIONS:
717 with open(unzipped_file) as f:
718 partition_list = f.read().splitlines()
719 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700720 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400721 common.ZipWriteStr(target_zip, info.filename,
722 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700723 # Remove the unnecessary partitions from the dynamic partitions list.
724 elif (info.filename == 'META/misc_info.txt' or
725 info.filename == DYNAMIC_PARTITION_INFO):
726 modified_info = GetInfoForSecondaryImages(unzipped_file)
727 common.ZipWriteStr(target_zip, info.filename, modified_info)
728 else:
729 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800730
Tao Baof7140c02018-01-30 17:09:24 -0800731 common.ZipClose(target_zip)
732
733 return target_file
734
735
Tao Bao15a146a2018-02-21 16:06:59 -0800736def GetTargetFilesZipWithoutPostinstallConfig(input_file):
737 """Returns a target-files.zip that's not containing postinstall_config.txt.
738
739 This allows brillo_update_payload script to skip writing all the postinstall
740 hooks in the generated payload. The input target-files.zip file will be
741 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
742 contain the postinstall_config.txt entry, the input file will be returned.
743
744 Args:
745 input_file: The input target-files.zip filename.
746
747 Returns:
748 The filename of target-files.zip that doesn't contain postinstall config.
749 """
750 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400751 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800752 if POSTINSTALL_CONFIG not in input_zip.namelist():
753 return input_file
754
755 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
756 shutil.copyfile(input_file, target_file)
757 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
758 return target_file
759
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400760def ParseInfoDict(target_file_path):
761 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
762 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800763
Yifan Hong38ab4d82020-06-18 15:19:56 -0700764def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
765 """Returns a target-files.zip for partial ota update package generation.
766
767 This function modifies ab_partitions list with the desired partitions before
768 calling the brillo_update_payload script. It also cleans up the reference to
769 the excluded partitions in the info file, e.g misc_info.txt.
770
771 Args:
772 input_file: The input target-files.zip filename.
773 ab_partitions: A list of partitions to include in the partial update
774
775 Returns:
776 The filename of target-files.zip used for partial ota update.
777 """
778
779 def AddImageForPartition(partition_name):
780 """Add the archive name for a given partition to the copy list."""
781 for prefix in ['IMAGES', 'RADIO']:
782 image_path = '{}/{}.img'.format(prefix, partition_name)
783 if image_path in namelist:
784 copy_entries.append(image_path)
785 map_path = '{}/{}.map'.format(prefix, partition_name)
786 if map_path in namelist:
787 copy_entries.append(map_path)
788 return
789
790 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
791
792 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400793 original_ab_partitions = input_zip.read(
794 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700795 namelist = input_zip.namelist()
796
797 unrecognized_partitions = [partition for partition in ab_partitions if
798 partition not in original_ab_partitions]
799 if unrecognized_partitions:
800 raise ValueError("Unrecognized partitions when generating partial updates",
801 unrecognized_partitions)
802
803 logger.info("Generating partial updates for %s", ab_partitions)
804
805 copy_entries = ['META/update_engine_config.txt']
806 for partition_name in ab_partitions:
807 AddImageForPartition(partition_name)
808
809 # Use zip2zip to avoid extracting the zipfile.
810 partial_target_file = common.MakeTempFile(suffix='.zip')
811 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
812 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
813 common.RunAndCheckOutput(cmd)
814
815 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
816 allowZip64=True)
817 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
818 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
819 '\n'.join(ab_partitions))
820 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
821 if info_file not in input_zip.namelist():
822 logger.warning('Cannot find %s in input zipfile', info_file)
823 continue
824 content = input_zip.read(info_file).decode()
825 modified_info = UpdatesInfoForSpecialUpdates(
826 content, lambda p: p in ab_partitions)
827 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
828
829 # TODO(xunchang) handle 'META/care_map.pb', 'META/postinstall_config.txt'
830 common.ZipClose(partial_target_zip)
831
832 return partial_target_file
833
834
Yifan Hong50e79542018-11-08 17:44:12 -0800835def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800836 super_block_devices,
837 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800838 """Returns a target-files.zip for retrofitting dynamic partitions.
839
840 This allows brillo_update_payload to generate an OTA based on the exact
841 bits on the block devices. Postinstall is disabled.
842
843 Args:
844 input_file: The input target-files.zip filename.
845 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800846 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800847
848 Returns:
849 The filename of target-files.zip with *.img replaced with super_*.img for
850 each block device in super_block_devices.
851 """
852 assert super_block_devices, "No super_block_devices are specified."
853
854 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800855 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800856
857 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
858 shutil.copyfile(input_file, target_file)
859
Kelvin Zhang928c2342020-09-22 16:15:57 -0400860 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800861 namelist = input_zip.namelist()
862
Yifan Hongb433eba2019-03-06 12:42:53 -0800863 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
864
865 # Remove partitions from META/ab_partitions.txt that is in
866 # dynamic_partition_list but not in super_block_devices so that
867 # brillo_update_payload won't generate update for those logical partitions.
868 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
869 with open(ab_partitions_file) as f:
870 ab_partitions_lines = f.readlines()
871 ab_partitions = [line.strip() for line in ab_partitions_lines]
872 # Assert that all super_block_devices are in ab_partitions
873 super_device_not_updated = [partition for partition in super_block_devices
874 if partition not in ab_partitions]
875 assert not super_device_not_updated, \
876 "{} is in super_block_devices but not in {}".format(
877 super_device_not_updated, AB_PARTITIONS)
878 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400879 new_ab_partitions = common.MakeTempFile(
880 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800881 with open(new_ab_partitions, 'w') as f:
882 for partition in ab_partitions:
883 if (partition in dynamic_partition_list and
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400884 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700885 logger.info("Dropping %s from ab_partitions.txt", partition)
886 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800887 f.write(partition + "\n")
888 to_delete = [AB_PARTITIONS]
889
Yifan Hong50e79542018-11-08 17:44:12 -0800890 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800891 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800892
893 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
894 # is a regular update on devices without dynamic partitions support.
895 to_delete += [DYNAMIC_PARTITION_INFO]
896
Tao Bao03fecb62018-11-28 10:59:23 -0800897 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700898 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800899 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800900
901 common.ZipDelete(target_file, to_delete)
902
Yifan Hong50e79542018-11-08 17:44:12 -0800903 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
904
905 # Write super_{foo}.img as {foo}.img.
906 for src, dst in replace.items():
907 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700908 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800909 unzipped_file = os.path.join(input_tmp, *src.split('/'))
910 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
911
Yifan Hongb433eba2019-03-06 12:42:53 -0800912 # Write new ab_partitions.txt file
913 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
914
Yifan Hong50e79542018-11-08 17:44:12 -0800915 common.ZipClose(target_zip)
916
917 return target_file
918
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400919
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700920def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
921 """Returns a target-files.zip for custom partitions update.
922
923 This function modifies ab_partitions list with the desired custom partitions
924 and puts the custom images into the target target-files.zip.
925
926 Args:
927 input_file: The input target-files.zip filename.
928 custom_images: A map of custom partitions and custom images.
929
930 Returns:
931 The filename of a target-files.zip which has renamed the custom images in
932 the IMAGS/ to their partition names.
933 """
934 # Use zip2zip to avoid extracting the zipfile.
935 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
936 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
937
938 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
939 namelist = input_zip.namelist()
940
941 # Write {custom_image}.img as {custom_partition}.img.
942 for custom_partition, custom_image in custom_images.items():
943 default_custom_image = '{}.img'.format(custom_partition)
944 if default_custom_image != custom_image:
945 logger.info("Update custom partition '%s' with '%s'",
946 custom_partition, custom_image)
947 # Default custom image need to be deleted first.
948 namelist.remove('IMAGES/{}'.format(default_custom_image))
949 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
950 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
951 default_custom_image)])
952
953 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
954 common.RunAndCheckOutput(cmd)
955
956 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -0800957
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400958def GeneratePartitionTimestampFlags(partition_state):
959 partition_timestamps = [
960 part.partition_name + ":" + part.version
961 for part in partition_state]
962 return ["--partition_timestamps", ",".join(partition_timestamps)]
963
Kelvin Zhang80195722020-11-04 14:38:34 -0500964def GeneratePartitionTimestampFlagsDowngrade(pre_partition_state, post_partition_state):
965 assert pre_partition_state is not None
966 partition_timestamps = {}
967 for part in pre_partition_state:
968 partition_timestamps[part.partition_name] = part.version
969 for part in post_partition_state:
970 partition_timestamps[part.partition_name] = \
971 max(part.version, partition_timestamps[part.partition_name])
972 return [
973 "--partition_timestamps",
974 ",".join([key + ":" + val for (key, val) in partition_timestamps.items()])
975 ]
976
Kelvin Zhang65029a22020-11-03 10:07:51 -0500977def IsSparseImage(filepath):
978 with open(filepath, 'rb') as fp:
979 # Magic for android sparse image format
980 # https://source.android.com/devices/bootloader/images
981 return fp.read(4) == b'\x3A\xFF\x26\xED'
982
983def SupportsMainlineGkiUpdates(target_file):
984 """Return True if the build supports MainlineGKIUpdates.
985
986 This function scans the product.img file in IMAGES/ directory for
987 pattern |*/apex/com.android.gki.*.apex|. If there are files
988 matching this pattern, conclude that build supports mainline
989 GKI and return True
990
991 Args:
992 target_file: Path to a target_file.zip, or an extracted directory
993 Return:
994 True if thisb uild supports Mainline GKI Updates.
995 """
996 if target_file is None:
997 return False
998 if os.path.isfile(target_file):
999 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1000 if not os.path.isdir(target_file):
1001 assert os.path.isdir(target_file), \
1002 "{} must be a path to zip archive or dir containing extracted"\
1003 " target_files".format(target_file)
1004 image_file = os.path.join(target_file, "IMAGES", "product.img")
1005
1006 if not os.path.isfile(image_file):
1007 return False
1008
1009 if IsSparseImage(image_file):
1010 # Unsparse the image
1011 tmp_img = common.MakeTempFile(suffix=".img")
1012 subprocess.check_output(["simg2img", image_file, tmp_img])
1013 image_file = tmp_img
1014
1015 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1016 output = subprocess.check_output(cmd).decode()
1017
1018 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1019 return pattern.search(output) is not None
1020
Tao Baof0c4aa22018-04-30 20:29:30 -07001021def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001022 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001023 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001024 if not OPTIONS.no_signing:
1025 staging_file = common.MakeTempFile(suffix='.zip')
1026 else:
1027 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001028 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang928c2342020-09-22 16:15:57 -04001029 compression=zipfile.ZIP_DEFLATED, allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001030
Tao Bao481bab82017-12-21 11:23:09 -08001031 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001032 assert "ab_partitions" in OPTIONS.source_info_dict, \
1033 "META/ab_partitions.txt is required for ab_update."
1034 assert "ab_partitions" in OPTIONS.target_info_dict, \
1035 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001036 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1037 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang31233e52020-11-03 13:42:46 -05001038 vendor_prop = source_info.info_dict.get("vendor.build.prop")
1039 if vendor_prop and \
1040 vendor_prop.GetProp("ro.virtual_ab.compression.enabled") == "true":
1041 # TODO(zhangkelvin) Remove this once FEC on VABC is supported
1042 logger.info("Virtual AB Compression enabled, disabling FEC")
1043 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001044 OPTIONS.disable_verity_computation = True
Tao Bao481bab82017-12-21 11:23:09 -08001045 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001046 assert "ab_partitions" in OPTIONS.info_dict, \
1047 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001048 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001049 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001050
Yifan Hong38ab4d82020-06-18 15:19:56 -07001051 additional_args = []
1052
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001053 # Prepare custom images.
1054 if OPTIONS.custom_images:
1055 target_file = GetTargetFilesZipForCustomImagesUpdates(
1056 target_file, OPTIONS.custom_images)
1057
Yifan Hong50e79542018-11-08 17:44:12 -08001058 if OPTIONS.retrofit_dynamic_partitions:
1059 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001060 target_file, target_info.get("super_block_devices").strip().split(),
1061 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001062 elif OPTIONS.partial:
1063 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1064 OPTIONS.partial)
1065 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -08001066 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001067 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001068 # Target_file may have been modified, reparse ab_partitions
1069 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1070 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001071 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001072
Kelvin Zhang39aea442020-08-17 11:04:25 -04001073 # Metadata to comply with Android OTA package format.
1074 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001075 # Generate payload.
1076 payload = Payload()
1077
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001078 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001079 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001080 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001081 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001082 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
1083 metadata.precondition.partition_state,
1084 metadata.postcondition.partition_state
1085 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001086 else:
Tianjiea2076132020-08-19 17:25:32 -07001087 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001088 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1089 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001090
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001091 additional_args += ["--max_timestamp", max_timestamp]
1092
Kelvin Zhang65029a22020-11-03 10:07:51 -05001093 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001094 logger.warn("Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001095 additional_args.extend(["--full_boot", "true"])
1096
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001097 payload.Generate(
1098 target_file,
1099 source_file,
1100 additional_args + partition_timestamps_flags
1101 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001102
Tao Bao40b18822018-01-30 18:19:04 -08001103 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -08001104 payload_signer = PayloadSigner()
1105 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001106
Tao Bao40b18822018-01-30 18:19:04 -08001107 # Write the payload into output zip.
1108 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001109
Tao Baof7140c02018-01-30 17:09:24 -08001110 # Generate and include the secondary payload that installs secondary images
1111 # (e.g. system_other.img).
1112 if OPTIONS.include_secondary:
1113 # We always include a full payload for the secondary slot, even when
1114 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001115 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1116 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001117 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001118 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001119 additional_args=["--max_timestamp",
Kelvin Zhang6cdf3912020-11-10 09:28:23 -05001120 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001121 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001122 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001123
Tianjie Xucfa86222016-03-07 16:31:19 -08001124 # If dm-verity is supported for the device, copy contents of care_map
1125 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001126 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001127 if (target_info.get("verity") == "true" or
Kelvin Zhang39aea442020-08-17 11:04:25 -04001128 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001129 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1130 "META/" + x in target_zip.namelist()]
1131
1132 # Adds care_map if either the protobuf format or the plain text one exists.
1133 if care_map_list:
1134 care_map_name = care_map_list[0]
1135 care_map_data = target_zip.read("META/" + care_map_name)
1136 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001137 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001138 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001139 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001140 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001141 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001142
Tao Bao21803d32017-04-19 10:16:09 -07001143 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001144
Yifan Hong9276cf02019-08-21 16:37:04 -07001145 CheckVintfIfTrebleEnabled(target_file, target_info)
1146
Tao Baofe5b69a2018-03-02 09:47:43 -08001147 # We haven't written the metadata entry yet, which will be handled in
1148 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001149 common.ZipClose(output_zip)
1150
Tao Bao85f16982018-03-08 16:28:33 -08001151 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1152 # all the info of the latter. However, system updaters and OTA servers need to
1153 # take time to switch to the new flag. We keep both of the flags for
1154 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001155 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001156 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001157 StreamingPropertyFiles(),
1158 )
1159 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001160
Tao Baoc098e9e2016-01-07 13:03:56 -08001161
Doug Zongkereef39442009-04-02 12:14:19 -07001162def main(argv):
1163
1164 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001165 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001166 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001167 elif o in ("-i", "--incremental_from"):
1168 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001169 elif o == "--full_radio":
1170 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001171 elif o == "--full_bootloader":
1172 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001173 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001174 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001175 elif o == "--downgrade":
1176 OPTIONS.downgrade = True
1177 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001178 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001179 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001180 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001181 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001182 elif o == "--oem_no_mount":
1183 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001184 elif o in ("-e", "--extra_script"):
1185 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001186 elif o in ("-t", "--worker_threads"):
1187 if a.isdigit():
1188 OPTIONS.worker_threads = int(a)
1189 else:
1190 raise ValueError("Cannot parse value %r for option %r - only "
1191 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001192 elif o in ("-2", "--two_step"):
1193 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001194 elif o == "--include_secondary":
1195 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001196 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001197 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001198 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001199 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001200 elif o == "--block":
1201 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001202 elif o in ("-b", "--binary"):
1203 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001204 elif o == "--stash_threshold":
1205 try:
1206 OPTIONS.stash_threshold = float(a)
1207 except ValueError:
1208 raise ValueError("Cannot parse value %r for option %r - expecting "
1209 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001210 elif o == "--log_diff":
1211 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001212 elif o == "--payload_signer":
1213 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001214 elif o == "--payload_signer_args":
1215 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001216 elif o == "--payload_signer_maximum_signature_size":
1217 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001218 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001219 # TODO(Xunchang) remove this option after cleaning up the callers.
1220 logger.warning("The option '--payload_signer_key_size' is deprecated."
1221 " Use '--payload_signer_maximum_signature_size' instead.")
1222 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001223 elif o == "--extracted_input_target_files":
1224 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001225 elif o == "--skip_postinstall":
1226 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001227 elif o == "--retrofit_dynamic_partitions":
1228 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001229 elif o == "--skip_compatibility_check":
1230 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001231 elif o == "--output_metadata_path":
1232 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001233 elif o == "--disable_fec_computation":
1234 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001235 elif o == "--disable_verity_computation":
1236 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001237 elif o == "--force_non_ab":
1238 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001239 elif o == "--boot_variable_file":
1240 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001241 elif o == "--partial":
1242 partitions = a.split()
1243 if not partitions:
1244 raise ValueError("Cannot parse partitions in {}".format(a))
1245 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001246 elif o == "--custom_image":
1247 custom_partition, custom_image = a.split("=")
1248 OPTIONS.custom_images[custom_partition] = custom_image
Doug Zongkereef39442009-04-02 12:14:19 -07001249 else:
1250 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001251 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001252
1253 args = common.ParseOptions(argv, __doc__,
Tao Bao337633f2017-12-06 15:20:19 -08001254 extra_opts="b:k:i:d:e:t:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001255 extra_long_opts=[
Dan Albert8b72aef2015-03-23 19:13:21 -07001256 "package_key=",
1257 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001258 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001259 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001260 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001261 "downgrade",
Tao Bao3e6161a2017-02-28 11:48:48 -08001262 "override_timestamp",
Dan Albert8b72aef2015-03-23 19:13:21 -07001263 "extra_script=",
1264 "worker_threads=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001265 "two_step",
Tao Baof7140c02018-01-30 17:09:24 -08001266 "include_secondary",
Dan Albert8b72aef2015-03-23 19:13:21 -07001267 "no_signing",
1268 "block",
1269 "binary=",
1270 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001271 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001272 "verify",
Tao Bao8dcf7382015-05-21 14:09:49 -07001273 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001274 "log_diff=",
Tao Baodea0f8b2016-06-20 17:55:06 -07001275 "payload_signer=",
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001276 "payload_signer_args=",
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001277 "payload_signer_maximum_signature_size=",
xunchang376cc7c2019-04-08 23:04:58 -07001278 "payload_signer_key_size=",
Dan Willemsencea5cd22017-03-21 14:44:27 -07001279 "extracted_input_target_files=",
Tao Bao15a146a2018-02-21 16:06:59 -08001280 "skip_postinstall",
Yifan Hong50e79542018-11-08 17:44:12 -08001281 "retrofit_dynamic_partitions",
xunchangabfa2652019-02-19 16:27:10 -08001282 "skip_compatibility_check",
xunchang1cfe2512019-02-19 14:14:48 -08001283 "output_metadata_path=",
Tianjie Xu1b079832019-08-28 12:19:23 -07001284 "disable_fec_computation",
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001285 "disable_verity_computation",
Yifan Hong65afc072020-04-17 10:08:10 -07001286 "force_non_ab",
Tianjied6867162020-05-10 14:30:13 -07001287 "boot_variable_file=",
Yifan Hong38ab4d82020-06-18 15:19:56 -07001288 "partial=",
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001289 "custom_image=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001290 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001291
1292 if len(args) != 2:
1293 common.Usage(__doc__)
1294 sys.exit(1)
1295
Tao Bao32fcdab2018-10-12 10:30:39 -07001296 common.InitLogging()
1297
Tao Bao2db13852018-01-08 22:28:57 -08001298 # Load the build info dicts from the zip directly or the extracted input
1299 # directory. We don't need to unzip the entire target-files zips, because they
1300 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1301 # When loading the info dicts, we don't need to provide the second parameter
1302 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1303 # some properties with their actual paths, such as 'selinux_fc',
1304 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001305 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001306 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001307 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001308 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001309
1310 if OPTIONS.downgrade:
1311 # We should only allow downgrading incrementals (as opposed to full).
1312 # Otherwise the device may go back from arbitrary build with this full
1313 # OTA package.
1314 if OPTIONS.incremental_source is None:
1315 raise ValueError("Cannot generate downgradable full OTAs")
1316
Tao Baoc098e9e2016-01-07 13:03:56 -08001317
Yifan Hong38ab4d82020-06-18 15:19:56 -07001318 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1319 # target-file and reload the info_dict. So the info will be consistent with
1320 # the modified target-file.
1321
Tao Bao32fcdab2018-10-12 10:30:39 -07001322 logger.info("--- target info ---")
1323 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001324
Kelvin Zhang80195722020-11-04 14:38:34 -05001325
Tao Bao2db13852018-01-08 22:28:57 -08001326 # Load the source build dict if applicable.
1327 if OPTIONS.incremental_source is not None:
1328 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001329 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001330
Tao Bao32fcdab2018-10-12 10:30:39 -07001331 logger.info("--- source info ---")
1332 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001333
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001334 if OPTIONS.partial:
1335 OPTIONS.info_dict['ab_partitions'] = \
1336 list(
1337 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1338 )
1339 if OPTIONS.source_info_dict:
1340 OPTIONS.source_info_dict['ab_partitions'] = \
1341 list(
1342 set(OPTIONS.source_info_dict['ab_partitions']) & set(OPTIONS.partial)
1343 )
1344
Tao Bao2db13852018-01-08 22:28:57 -08001345 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001346 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1347
Yifan Hong50e79542018-11-08 17:44:12 -08001348 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001349 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001350 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001351 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang39aea442020-08-17 11:04:25 -04001352 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001353 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1354 raise common.ExternalError(
1355 "Expect to generate incremental OTA for retrofitting dynamic "
1356 "partitions, but dynamic_partition_retrofit is not set in target "
1357 "build.")
1358 logger.info("Implicitly generating retrofit incremental OTA.")
1359 OPTIONS.retrofit_dynamic_partitions = True
1360
1361 # Skip postinstall for retrofitting dynamic partitions.
1362 if OPTIONS.retrofit_dynamic_partitions:
1363 OPTIONS.skip_postinstall = True
1364
Tao Baoc098e9e2016-01-07 13:03:56 -08001365 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001366 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1367 if OPTIONS.force_non_ab:
1368 assert allow_non_ab, "--force_non_ab only allowed on devices that supports non-A/B"
1369 assert ab_update, "--force_non_ab only allowed on A/B devices"
1370
1371 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001372
Christian Oderf63e2cd2017-05-01 22:30:15 +02001373 # Use the default key to sign the package if not specified with package_key.
1374 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001375 # A/B update is getting created.
1376 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001377 if OPTIONS.package_key is None:
1378 OPTIONS.package_key = OPTIONS.info_dict.get(
1379 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001380 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001381 # Get signing keys
1382 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
1383
Yifan Hong65afc072020-04-17 10:08:10 -07001384 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001385 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001386 target_file=args[0],
1387 output_file=args[1],
1388 source_file=OPTIONS.incremental_source)
1389
Dan Willemsencea5cd22017-03-21 14:44:27 -07001390 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001391 GenerateNonAbOtaPackage(
1392 target_file=args[0],
1393 output_file=args[1],
1394 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001395
Tao Baof0c4aa22018-04-30 20:29:30 -07001396 # Post OTA generation works.
1397 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1398 logger.info("Generating diff logs...")
1399 logger.info("Unzipping target-files for diffing...")
1400 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1401 source_dir = common.UnzipTemp(
1402 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001403
Tao Baof0c4aa22018-04-30 20:29:30 -07001404 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001405 target_files_diff.recursiveDiff(
1406 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001407
Tao Bao32fcdab2018-10-12 10:30:39 -07001408 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001409
1410
1411if __name__ == '__main__':
1412 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001413 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001414 main(sys.argv[1:])
Tao Bao32fcdab2018-10-12 10:30:39 -07001415 except common.ExternalError:
1416 logger.exception("\n ERROR:\n")
Doug Zongkereef39442009-04-02 12:14:19 -07001417 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07001418 finally:
1419 common.Cleanup()